States face health law cybersecurity challenges

Feb 25, 2014 by Ricardo Alonso-Zaldivar

(AP)—Security experts working for the government on the rollout of President Barack Obama's health care law worried that state computer systems could become a back door for hackers.

Documents provided to The Associated Press show that more than two-thirds of state systems that were supposed to tap into federal computers to verify sensitive personal information for coverage were initially rated as "high risk" for security problems.

The administration says the documents offer only a partial and "outdated" snapshot, and the cited were either resolved or are being addressed. Officials say no successful cyber-attacks have taken place.

Back-door attacks have been in the news lately with the Target breach. Hackers are believed to have accessed information on millions of Target customers through the computer network of a contractor.

Explore further: Pa. vendor confirms link to Target data probe (Update)

not rated yet
add to favorites email to friend print save as pdf

Related Stories

Pa. vendor confirms link to Target data probe (Update)

Feb 07, 2014

Minneapolis-based Target isn't commenting on reports that a Pittsburgh-area heating and refrigeration company is being investigated as the possible portal through which computer hackers stole credit card numbers from 40 million ...

Hackers sue German government over NSA spying

Feb 03, 2014

A group of computer hackers and human rights campaigners in Germany announced Monday that they are suing their government for allegedly breaking the law by aiding foreign spies.

Recommended for you

Study shows role of media in sharing life events

15 hours ago

To share is human. And the means to share personal news—good and bad—have exploded over the last decade, particularly social media and texting. But until now, all research about what is known as "social sharing," or the ...

UK: Former reporter sentenced for phone hacking

22 hours ago

(AP)—A former British tabloid reporter was given a 10-month suspended prison sentence Thursday for his role in the long-running phone hacking scandal that shook Rupert Murdoch's media empire.

Evaluating system security by analyzing spam volume

23 hours ago

The Center for Research on Electronic Commerce (CREC) at The University of Texas at Austin is working to protect consumer data by using a company's spam volume to evaluate its security vulnerability through the SpamRankings.net ...

Surveillance a part of everyday life

Jul 24, 2014

Details of casual conversations and a comprehensive store of 'deleted' information were just some of what Victoria University of Wellington students found during a project to uncover what records companies ...

European Central Bank hit by data theft

Jul 24, 2014

(AP)—The European Central Bank said Thursday that email addresses and other contact information have been stolen from a database that serves its public website, though it stressed that no internal systems or market-sensitive ...

Twitter admits to diversity problem in workforce

Jul 24, 2014

(AP)—Twitter acknowledged Wednesday that it has been hiring too many white and Asian men to fill high-paying technology jobs, just like several other major companies in Silicon Valley.

User comments : 0