Forwarded from: Adam Shostack <adam@private> Oh, come on. It's not the size of the breach, it's what data was taken. Or perhaps it's the size of the data set: "A computerized analysis of four data breaches..." On Fri, Dec 09, 2005 at 12:37:13AM -0600, InfoSec News wrote: | http://www.signonsandiego.com/news/business/20051208-9999-1b8identity.html | | By Bruce V. Bigelow | UNION-TRIBUNE STAFF WRITER | December 8, 2005 | | A computerized analysis of four data breaches that compromised | personal information on some 500,000 people suggests the alarm that | often accompanies electronic break-ins may be largely unwarranted. | | On the other hand, the study also suggests that publicity can help | deter fraudsters from using the stolen data. | | The analysis, conducted over the past six months by San Diego's ID | Analytics, is believed to be the first to calculate just how much | fraud occurred after each security breach. _________________________________________ Earn your Master's degree in Information Security ONLINE www.msia.norwich.edu/csi Study IA management practices and the latest infosec issues. Norwich University is an NSA Center of Excellence.
This archive was generated by hypermail 2.1.3 : Mon Dec 12 2005 - 01:07:05 PST