News & Analysis as of

Cell Phones Cybersecurity

HaystackID

Ambient Light Sensors to Malware Threats: MIT Unveils Smartphone Privacy Risks Amid Market Turbulence

HaystackID on

Editor's Note: In a significant study from MIT's CSAIL, researchers have unveiled vulnerabilities in smartphone ambient light sensors, highlighting them as potential channels for privacy breaches. This discovery underscores...more

Kohrman Jackson & Krantz LLP

The FBI Warns Clevelanders About a Rise in Digital Theft

Cellphones have become a necessity for many people throughout the world, allowing convenience and interconnectivity in the palm of our hands – but they’ve also opened the door to a new type of theft. On April 26, the...more

Robinson+Cole Data Privacy + Security Insider

T-Mobile Clarifies Facts of Security Incident in Press Release

There has been a flurry of reporting in the past few days on the T-Mobile customer data compromise, with allegations that the compromise affected up to 100 million customers. ...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #284 – Check Out EFF’s Surveillance Self-Defense Playlist: Getting to Know Your Phone

The Electronic Frontier Foundation (EFF) (www.eff.org) is a wonderful resource for privacy-related issues and concerns. I check its website frequently to make sure I am aware of the latest issues and concerns around privacy....more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - Issue 3, August 2020

The Editors' Note - Welcome to the third issue of Decoded, Spilman's e-newsletter focusing on technology law, including data security, privacy standards, financing technologies, and digital-based means of conducting...more

Bass, Berry & Sims PLC

Privacy Peril: I Spy Your Wi-Fi

Bass, Berry & Sims PLC on

Our previous Privacy Peril provided information on securing your private Wi-Fi network from public access. Here, we offer guidance on avoiding the opposite – inadvertently disclosing confidential private information through...more

Faegre Drinker Biddle & Reath LLP

Newly-Discovered Vulnerability Highlights the Security Concerns Surrounding Bluetooth Technology

A recent report by researchers at the Helmholz Center for Information Security (CISPA), Singapore University of Technology and Design, and the University of Oxford has revealed that Bluetooth technology is vulnerable to a new...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - January 2019 #3

Robinson & Cole LLP on

Cybercriminals have launched a new campaign that not only requires the victim to pay a ransom to have their data decrypted, but when the victim is directed to a PayPal account to pay the ransom and get the decryption key to...more

Gray Reed

An Employer’s Spooky Interpretation of its Bring Your Own Device (BYOD) Policy

Gray Reed on

Mark Eting is one of Duncey’s Caps top outside sales agents. Because the company is based in Texas, but Mark lives in Cleveland and sells for the company in the northeast, Mark purchased a personal computer and a laptop to...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - August 2018 #4

Robinson & Cole LLP on

A new ransomware, dubbed “Ryuk,” has surfaced in the last few weeks and is said to be targeting large organizations in the United States. The attackers behind Ryuk have reportedly made more than $640,000 in just two weeks,...more

Wilson Sonsini Goodrich & Rosati

New FTC Report Recommends Steps to Improve Mobile Security Updates

In February 2018, the Federal Trade Commission (FTC) released a report that explores the complexities of the mobile ecosystem and makes recommendations for industry to improve the mobile security update process for consumers....more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #135 – Cybersecurity Spring Cleaning Tips

Here’s a great idea offered by the National Cyber Security Alliance and the Better Business Bureau: while you are doing your spring cleaning, don’t forget to do a digital spring cleaning too—that is, your computer, cellphone...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #130 – Smartphones Targeted by Dark Caracal Attack

There is a global malware campaign that is targeting mobile devices across the world. It is called Dark Caracal, which is believed to be sourced in Beirut by the Lebanese General Security Directorate. ...more

Mintz - Privacy & Cybersecurity Viewpoints

Carpenter v. United States Privacy Case Pushes Supreme Court to Decide Fourth Amendment Protections of Cell Phone Metadata

The U.S. Supreme Court heard oral arguments in what may become one of the defining consumer privacy cases of our generation. The central question in Carpenter v. United States asks whether the government violates the Fourth...more

King & Spalding

Can You Find Me Now? U.S. Supreme Court Considers Cell Phone Location Tracking Data In The Digital Age In Landmark Privacy Case

King & Spalding on

On November 29, 2017, the U.S. Supreme Court heard oral argument in United States v. Carpenter, a case that could fundamentally change the way the government collects, uses, and tracks individuals’ location information...more

Bradley Arant Boult Cummings LLP

Drawing the Line: Supreme Court Addresses Major Privacy Rights in Cell Phone Dispute

On Wednesday, November 29, 2017, the Supreme Court heard arguments in the appeal of Timothy Carpenter, a man convicted and sentenced to 116 years for his role in a series of armed robberies. In proving his guilt, prosecutors...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Supreme Court Hears Oral Argument Today in Major Case Regarding Cell Phone Location Privacy

In Carpenter v. United States, federal investigators sought cellphone location data for a set of persons suspected in a series of robberies. The Fourth Amendment prevents the government from conducting unreasonable searches...more

Seyfarth Shaw LLP

Cybersecurity Best Practices

Seyfarth Shaw LLP on

When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #103 – Smartphone Replacement Parts Subject to Hacking

You drop your smartphone and now there are a million cracks and you can hardly read your texts. Getting the screen replaced by the manufacturer of the phone is usually expensive and sometimes it is so expensive that it makes...more

Robins Kaplan LLP

Your Daily Dose of Financial News

Robins Kaplan LLP on

Chevron CEO John Watson is out in a move that leaves the energy giant without a board-confirmed successor and marks the “dramatic shift under way at big oil companies as they adapt to a prolonged period of lower prices...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - June 2017

Robinson & Cole LLP on

The American Institute of CPAs (AICPA), has released a risk management reporting framework intended to "establish a common, underlying language for Cybersecurity risk management reporting — almost akin to US GAAP or IFRS...more

Robinson+Cole Data Privacy + Security Insider

Privacy TIp #86 - Android Users Vulnerable to Malware through Apps

University of Michigan researchers have discovered that hundreds of applications in Google Play turn Android phones into a server that allow the user to connect the phone directly to a PC and leave open insecure ports...more

King & Spalding

Lawmakers Push FCC To Confront Cell Phone Cyber Threats

King & Spalding on

In a letter dated March 28, 2017, Senator Ron Wyden, D-Ore., and Representative Ted Lieu, D-Calif., urged the Federal Communications Commission (“FCC”) to address cybersecurity vulnerabilities in the cell phone industry,...more

Fenwick & West LLP

Securities Litigation and Enforcement Newsletter

Fenwick & West LLP on

In this our second edition of Fenwick’s Securities Litigation and Enforcement Newsletter, we continue to provide you with short insights about timely securities litigation and enforcement developments. This edition’s topics...more

Robinson+Cole Data Privacy + Security Insider

Android smartphones Stagefright engine vulnerable

It is being reported that 95% of all Android smartphones are vulnerable to being hacked with a text message, which is being called the “heartbleed for mobile.” According to security experts, the vulnerability exploits the...more

31 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide