Inside the Industry

Oct 2010–

Identity Theft Resource Center reports show that compromised data stores from healthcare organizations far outstrip other verticals this year.

according to figures recently updates, healthcare organization have disclose 119 breaches so far this year, more than three times the 39 breaches  suffered by the financial services industry. though many of these breaches aren’t necessarily caused directly by unauthorized access or hacking of healthcare databases, some experts believe that the high numbers are due to lax handling of how data is stored and accessed within theses databases.


The Chicago Police Department is teaming with a local university  to develop a system that predicts where crime will occur. According to the Chicago Sun-Times, the city’s police department, the Illinois Institute of Technology and Rand Corp are working together on the system, which predicts crime hot spots. With the data, the police can deploy resources more intelligently into the affected communities,. funded by a $200,000 grant from the National Institute of Justice, the stakeholders are tracking every incident that’s linked to a known gang member in the order to build the analytics engine.


Google’s Android mobile operating system has been hit by its first text-based Trojan, according to security firm Kaspersky Labs. The malicious software, called Trojan-SMS. AndroidOS.FakePlayer.a, has hit a number of mobile devices, the company said. The Trojan poses as a harmless media player application. Users are prompted to install a file of just over 13 Kbytes with the standard Android extension .apk. Once installed, it sends text messages to premium rate numbers controlled by cyber criminals who collect all the payments made from the victims’ accounts. the Trojan-SMS category is currently the most widespread class of malware for mobile phones, but Trojan-SMS.AndroidOS.FakePlayer.a is the first to specifically target the android platform.


Posted by on Oct 12th, 2010 and filed under Intel Brief. You can follow any responses to this entry through the RSS 2.0. Both comments and pings are currently closed.

Comments are closed