Cybercriminals have launched a new campaign that not only requires the victim to pay a ransom to have their data decrypted, but when the victim is directed to a PayPal account to pay the ransom and get the decryption key to...more
1/21/2019
/ Biometric Information ,
California Consumer Privacy Act (CCPA) ,
Cell Phones ,
Commercial General Liability Policies ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data-Sharing ,
Drones ,
Geological Data ,
Hackers ,
HIPAA Breach ,
Personally Identifiable Information ,
Ransomware ,
Right to Privacy ,
Risk Management ,
Rulemaking Process ,
WISP
New Year’s is a time to look back on the happenings of the year and focus on the lessons and reminders those events have provided. For our final newsletter of the year, we’d like to share with you our top 10 most read posts...more
12/31/2018
/ Banking Sector ,
Blockchain ,
Connected Items ,
Cryptocurrency ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Distributed Ledger Technology (DLT) ,
Drones ,
Federal Aviation Administration (FAA) ,
Financial Conduct Authority (FCA) ,
Hackers ,
Initial Coin Offering (ICOs) ,
Investment Opportunities ,
Personally Identifiable Information ,
Popular ,
Wells Fargo
On October 1, 2018, the Food and Drug Administration (FDA) issued its “Medical Device Cybersecurity Regional Incident Preparedness and Response Playbook” to address continued threats to medical devices that could affect...more
10/8/2018
/ Airspace ,
ATDS ,
Auto-Dialed Calls ,
Bitcoin ,
Cryptocurrency ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Digital Currency ,
Drones ,
Facebook ,
Food and Drug Administration (FDA) ,
Hackers ,
Investment Opportunities ,
Medical Devices ,
OMB ,
Online Platforms ,
Part 107 ,
Popular ,
Public Safety ,
Robocalling ,
Social Media ,
Social Networks ,
Toyota ,
Trading Platforms ,
Unmanned Aircraft Systems ,
Virtual Currency
We reported last week that a spyware maker recently compromised users’ and victims’ sensitive information. Since that time, another spyware maker, mSpy, which holds itself out as having over a million users employing its...more
9/11/2018
/ Banking Sector ,
Class Action ,
Class Certification ,
Consumer Privacy Rights ,
Criminal Convictions ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cybersecurity ,
Cybersecurity Framework ,
Data Breach ,
Financial Services Industry ,
Hackers ,
Insurance Industry ,
Legislative Agendas ,
NYDFS ,
Pending Legislation ,
Personally Identifiable Information ,
Popular ,
Spyware ,
State and Local Government ,
Vulnerability Assessments ,
Yahoo!
It has been reported that a hacker was able to break into the servers of TheTruthSpy, a company that is described as “one of the most notorious stalkerware companies out there” (Motherboard, August 2018) and was able to steal...more
9/4/2018
/ Airspace ,
Arbitration ,
Biometric Information ,
Biometric Information Privacy Act ,
Blockchain ,
Commercial Use ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Distributed Ledger Technology (DLT) ,
Do Not Call List ,
Drones ,
Emerging Technology Companies ,
Employee Privacy Rights ,
Employer Liability Issues ,
Employment Litigation ,
Federal Aviation Administration (FAA) ,
General Data Protection Regulation (GDPR) ,
Hackers ,
Personally Identifiable Information ,
Popular ,
Safety Standards ,
Southwest Airlines ,
Unmanned Aircraft Systems
CYBERSECURITY -
Ticketmaster Hit With Malware Compromising UK Customers’ Data -
Ticketmaster has reported that it has “identified malicious software on a customer support product hosted by Inbenta Technologies, an...more
7/6/2018
/ Consumer Privacy Rights ,
Cyber Attacks ,
Data Breach ,
Data Collection ,
Entertainment Industry ,
Event Tickets ,
Hackers ,
Malware ,
New Legislation ,
Personal Data ,
Personally Identifiable Information ,
Scams ,
State and Local Government ,
State Data Breach Notification Statutes ,
Tax Preparers ,
TIAA CREF ,
Vacation Rentals
Businesses are understandably focused this week on the looming effective date for the European Union’s General Data Protection Regulation (GDPR). For U.S. businesses, however, a proposed law closer to home would raise similar...more
On the heels of the ransomware that had the City of Atlanta scrambling last week, New York City Mayor Bill de Blasio announced the launch of “NYC Secure,” a free mobile app that will alert New York City residents of...more
4/10/2018
/ Blockchain ,
Cambridge Analytica ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Distributed Ledger Technology (DLT) ,
Drones ,
Electric Vehicles ,
Electronically Stored Information ,
Facebook ,
Legislative Agendas ,
New Legislation ,
Part 107 ,
Personal Data ,
Proposed Legislation ,
Ransomware ,
Social Media ,
State Data Breach Notification Statutes ,
Taxi Cabs ,
US v Microsoft
Apple has pushed an update to iOS 11.2 to its users. Users should consider pushing any updates that are recommended by the manufacturer, as there is usually a reason behind the update, and many times it is to fix a...more
12/22/2017
/ Apple ,
Blockchain ,
Cyber Attacks ,
Data Breach ,
Distributed Ledger Technology (DLT) ,
Drones ,
Federal Aviation Administration (FAA) ,
Hackers ,
Mobile Apps ,
Mobile Devices ,
Popular ,
Ransomware ,
Registration Requirement ,
Risk Management ,
Smartphones ,
Technology ,
Trump Administration ,
Unmanned Aircraft Systems ,
Vulnerability Assessments
FBI Issues Flash Alert on Apache Struts Vulnerability -
The Apache Struts vulnerability has been mentioned frequently in the media over the past month, as it is believed to have been involved in one of the largest and most...more
10/18/2017
/ Blockchain ,
Breach Notification Rule ,
Cryptocurrency ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Digital Currency ,
Distributed Ledger Technology (DLT) ,
Drones ,
Enforcement Actions ,
Faxes ,
Federal Aviation Administration (FAA) ,
Hackers ,
Health Care Providers ,
HIPAA Breach ,
Initial Coin Offering (ICOs) ,
Office Equipment ,
PHI ,
Popular ,
Ransomware ,
Securities and Exchange Commission (SEC) ,
Securities Fraud ,
Unregistered Securities ,
Virtual Currency ,
Vulnerability Assessments
On February 27, 2017, news reports disclosed a major security breach involving Spiral Toys, the seller of the CloudPets brand of internet-connected stuffed animals. The Bluetooth-connected CloudPets toys allow users to...more
3/9/2017
/ Children's Toys ,
COPPA ,
Data Breach ,
Data Collection ,
Data Privacy ,
Internet of Things ,
Mobile Devices ,
Popular ,
Smart Devices ,
Smartphones ,
Technology
On October 14, the National Association of Insurance Commissioners (NAIC) Cybersecurity (EX) Task Force released an updated draft of its Cybersecurity Bill of Rights. The bill, which updates a prior draft published for...more
Companies doing business with the U.S. Department of Defense are facing new requirements for reporting data security breaches and for acquiring cloud computing services. The Interim Rule, effective August 26, 2015, amends the...more
9/9/2015
/ Cloud Computing ,
Compliance ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Defense (DOD) ,
DFARS ,
Federal Contractors ,
Hackers ,
Interim Rule ,
NDAA ,
Reporting Requirements
On June 30th, the Federal Trade Commission (FTC) published a guide titled Start With Security: A Guide for Business, providing 10 lessons learned from the over 50 enforcement actions brought by the FTC against companies that...more