News & Analysis as of

Cell Phones Data Protection Cybersecurity

HaystackID

Ambient Light Sensors to Malware Threats: MIT Unveils Smartphone Privacy Risks Amid Market Turbulence

HaystackID on

Editor's Note: In a significant study from MIT's CSAIL, researchers have unveiled vulnerabilities in smartphone ambient light sensors, highlighting them as potential channels for privacy breaches. This discovery underscores...more

Robinson+Cole Data Privacy + Security Insider

T-Mobile Clarifies Facts of Security Incident in Press Release

There has been a flurry of reporting in the past few days on the T-Mobile customer data compromise, with allegations that the compromise affected up to 100 million customers. ...more

Faegre Drinker Biddle & Reath LLP

Newly-Discovered Vulnerability Highlights the Security Concerns Surrounding Bluetooth Technology

A recent report by researchers at the Helmholz Center for Information Security (CISPA), Singapore University of Technology and Design, and the University of Oxford has revealed that Bluetooth technology is vulnerable to a new...more

Gray Reed

An Employer’s Spooky Interpretation of its Bring Your Own Device (BYOD) Policy

Gray Reed on

Mark Eting is one of Duncey’s Caps top outside sales agents. Because the company is based in Texas, but Mark lives in Cleveland and sells for the company in the northeast, Mark purchased a personal computer and a laptop to...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - August 2018 #4

Robinson & Cole LLP on

A new ransomware, dubbed “Ryuk,” has surfaced in the last few weeks and is said to be targeting large organizations in the United States. The attackers behind Ryuk have reportedly made more than $640,000 in just two weeks,...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #135 – Cybersecurity Spring Cleaning Tips

Here’s a great idea offered by the National Cyber Security Alliance and the Better Business Bureau: while you are doing your spring cleaning, don’t forget to do a digital spring cleaning too—that is, your computer, cellphone...more

Seyfarth Shaw LLP

Cybersecurity Best Practices

Seyfarth Shaw LLP on

When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more

Mintz - Privacy & Cybersecurity Viewpoints

Privacy Monday: October 7, 2013

Despite the government shutdown, the Supreme Court is in for the 2013-2014 session. There are a couple of privacy cases on the agenda. U.S. v. Wurie and Riley v. California - At issue: Separate appeals over...more

Mintz - Privacy & Cybersecurity Viewpoints

NIST Issues Guidelines on Mobile Security

The National Institute of Standards and Technology (NIST) has issued guidelines to help federal agencies manage and secure mobile devices used by their employees for government business....more

Mintz - Privacy & Cybersecurity Viewpoints

FCC: Carriers Must Protect Certain Data Collected on Mobile Handsets

Aiming to “address the real privacy and security risks that consumers face when telecommunications carriers use their control of customers’ mobile devices to collect information about their customers’ use of the network,” the...more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide