1. Dismiss Notice
  2. By continuing to use the site, you agree to the use of cookies .This website or its third-party tools use cookies, which are necessary to its functioning and required to achieve the purposes illustrated in the cookie policy.Find out more.
    Dismiss Notice
  3. Follow Casinomeister on Twitter | YouTube | Casinomeister.us US Residents Click here! |  Svenska Svenska | 
Dismiss Notice
REGISTER NOW!! Why? Because you can't do diddly squat without having been registered!

At the moment you have limited access to view most discussions: you can't make contact with thousands of fellow players, affiliates, casino reps, and all sorts of other riff-raff.

Registration is fast, simple and absolutely free so please, join Casinomeister here!

UC Berkeley Health Service Data Stolen

Discussion in 'The Attic' started by Mousey, May 8, 2009.

    May 8, 2009
  1. Mousey

    Mousey Ueber Meister Mouse

    Pencil Pusher
    You must register/login in order to see the link.

    The breach went undiscovered for six months, during which time Social Security numbers and health insurance information were stolen.

    By Thomas Claburn
    May 8, 2009 04:50 PM

    For six months, hackers had access to a server at the University of California, Berkeley, and stole personal information associated with as many as 160,000 students, alumni, and parents.

    In an uncommonly thorough disclosure, a UC Berkeley spokeswoman said that the data breach began on Oct. 9, and lasted through April 9, when university IT personnel found messages left by the hackers and took action to close the breach.

    Andrew Conry-Murray spoke with the president of RSA, Art Coviello, at EMC (NYSE: EMC) World 2008 about Data Loss Prevention. The compromised server housed information from the UC Berkeley campus health services center and contained "Social Security numbers, health insurance information, and nontreatment medical information, such as immunization records and names of some of the physicians they may have seen ....
  2. May 18, 2009
  3. vinylweatherman

    vinylweatherman You type well loads CAG MM

    STILL At Leisure
    United Kingdom

    This implies that this could have gone on indefinitely if the hackers had NOT put these messages up, and MAY be going on undetected elsewhere.

    It seems there are so many holes in the software used on servers connected to the internet that surely this is much more widespread than authorities believe. It is hackers that do this for "sport" that often blow the whistle on these vulnerabilities, I would expect a group of criminals would NOT leave messages, but would prefer to keep the exploit running for as long as possible for personal gain.

Share This Page