Hacker breached HealthCare.gov insurance site

Posted by $ Your_Name_Goes_Here 10 years, 8 months ago to Government
29 comments | Share | Flag

Good thing no one had their personal data on this site. Oh, wait...


All Comments

  • Posted by NealS 10 years, 8 months ago in reply to this comment.
    I do, at least now I do. I'm having bacon and fried eggs almost every morning with an English Muffin.
    Reply | Permalink  
  • Posted by $ allosaur 10 years, 8 months ago
    I wonder if the hacker first got PO'd because his mama found the Affordable Heath Care to be extremely unaffordable in her case. Mama, papa, brother, sister, friend, relatives et als or some combination thereof.
    Reply | Permalink  
  • Posted by $ jbrenner 10 years, 8 months ago in reply to this comment.
    I got your quirky sense of humor, and I enjoyed it. What was missing from my comment was the smirk that accompanied it.
    Reply | Permalink  
  • Posted by $ jbrenner 10 years, 8 months ago in reply to this comment.
    It is rhetorical, but given that you had to ask, then my comment had its full effect.
    Reply | Permalink  
  • Posted by NealS 10 years, 8 months ago in reply to this comment.
    How about a new POST Heading of strictly one-liners, on all the lies and half truths from our government. Who wants to start that one? Or do you think it will grow so large and bog down the gulch?
    Reply | Permalink  
  • Posted by $ jlc 10 years, 8 months ago
    The government must state that there were no consumer files present - because if there were, they would be fined (by the government) and required to send out notifications to every individual who _might_ have been compromised. HIPAA has been very strict about this, charging fines: Theft of an unencrypted laptop in 2012 containing 148 sets of patient data (to be used for research) generated a fine of $250,000.

    It would be amusing to see the government chase its tail, fining itself into an abyss, over this. Perhaps we can watch...

    Jan
    Reply | Permalink  
  • Posted by H6163741 10 years, 8 months ago in reply to this comment.
    Lois lerner's emails were lost, and her hard drive accidentally melted; the borders are more secure than they have ever been...
    Reply | Permalink  
  • Posted by Maritimus 10 years, 8 months ago in reply to this comment.
    For all my life I ate what my nose declared smelling good and what my tongue and my palate declared tasting good. That is with the exception of the decade (1941-1951) when Germans led by Hitler and Commies installed by Stalin tried to starve us to death. I think that the risk of that approach is less then crossing a street or boarding a plane.
    There is no such thing as a risk-free lunch ;-)
    I see no confusion.
    Reply | Permalink  
  • Posted by NealS 10 years, 8 months ago
    The administration and the media are saying this is so insignificant that it wouldn't have even been reported if it had been anyone else. So there!!!

    Whoops, I almost forgot, does anyone remember anything about the reports and the media's take on, "You can keep your insurance", or "You can keep your doctor"? "We did not target anyone, it was just a couple rouge agents", "ISIS is just the JV", "It wasn't a terrorist attack it was a video", or any of the other things these people try to get us to believe.

    How are we expected to believe anything this administration or the mainstream media puts out anymore. Is it really true now that salt is good for you? Why was it bad before? Should I eat eggs or not? I'm more confused today than I ever was.
    Reply | Permalink  
  • Posted by $ blarman 10 years, 8 months ago
    And weren't there a lot of warnings from computer gurus and Congress alike that this would happen way before it ever began?
    Reply | Permalink  
  • Posted by $ blarman 10 years, 8 months ago in reply to this comment.
    Security gurus name them distinctly (crackers have malicious intent), but the media never does. I prefer the terms White Hat and Black Hat. A White Hat is a professional/paid consultant that attempts to break security systems so as to work with the systems originator to shore up the breaches. A Black Hat attempts to break systems for plunder.
    Reply | Permalink  

  • Comment hidden. Undo