Cyber Attacks

News & Analysis as of

Cyber Security Takes Centre Stage in UK Government’s Strategy

The UK Department for Culture, Media and Sport recently released a statement on cyber security, in which it urged businesses to take better care to protect against cyber criminals. This statement follows publication of its...more

Senate hearing reviews ransomware in a school system

On May 18, the Senate Judiciary Committee Subcommittee on Crime and Terrorism heard from Charles C. Hucks, the Executive Director of Technology for the Horry County, South Carolina, School System. The 52 schools and the...more

Employee Data Security: Perquisite or Prerequisite?

One of the many costs of doing business in this day and age is the threat of a data breach. In the past several years data breach incidents have occurred with increasing frequency. From Target to eBay and Sony to Ashley...more

The Network and Information Security Directive: Serious Cyber Attacks Will Require Notification

The Council of the European Union adopted the EU Network and Information Security (NIS) Directive (the ‘Directive’) 17 May, ready for final adoption by the European Parliament. The Directive, initially proposed in 2013, has...more

Privacy Tip #35 – Employees still careless—don’t be that employee

According to a study by Softchoice, 1-in-5 employees still keep their passwords in plain sight (like a Post-it Note on their desk or in the top drawer of their desk—now that’s original), have accessed work files from a device...more

Most Frequently Hacked Industries Now Includes Manufacturing

Second only to health care, the manufacturing industry is now one of the most frequently hacked industries (according to IBM’s 2016 Cyber Security Intelligence Index). And more importantly, automotive manufacturing was the...more

TeslaCrypt Ransomware Developers Retire, Release Master Decryption Key

Ransomware is a particularly nefarious type of malware that hijacks computers and forces victims to pay a ransom in order to access their files. One of the reasons it is so successful is because ransomware developers use...more

Your daily dose of financial news The Brief – 5.20.16

Manhattan USA Preet Bharara’s back in front of the cameras and back on the insider-trading horse with the announcement yesterday of criminal charges against well-known sports bettor Billy Walters and former investment banker...more

New Study confirms that 9 out of 10 businesses have experienced a hacking incident in the last year

Hartford Steam Boiler released a study on May 17, 2016, that states that nine out of ten businesses have experienced at least one hacking incident in the past year, which represents a 21 percent increase since 2014....more

What Companies Need to Know About Cyber Threat Information Sharing Under CISA

Cyber threat information sharing has the potential to provide numerous benefits for organizations (both public and private) faced with cyberattacks, which are increasing in frequency and sophistication. Cyber threat...more

Newest Ponemon study released on health care data breaches

The Ponemon Institute has recently released its Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data. The study has included business associates for the past two years. The study included information received...more

FDIC reports five “major” data incidents to Congress

The Federal Deposit Insurance Corporation (FDIC) reported on Monday, May 16, 2016, that it had experienced five “major incidents” involving the disclosure of taxpayers’ personal information since the last incident we reported...more

Cyber Security

Roughly one million pieces of malware—computer viruses or malicious software—are released every day. In recent years, we’ve witnessed an unprecedented level of activity in the cyber arena, both in the form of increased...more

5 Ways to Defend Against Ransomware

Last week, Fish hosted a cybersecurity panel session at our L.E.A.D. retreat in Dallas. We discussed the need for a full-spectrum cybersecurity risk assessment and plan, and during the course of the presentation, we touched...more

Recent Settlements and Upcoming Audits Highlight the Continuing Need to Focus on Core HIPAA Compliance Measures

Recent settlements and initiatives conducted by the Office for Civil Rights ("OCR") at the U.S. Department of Health and Human Services highlight the continuing need for focus on compliance with the privacy and security...more

Come Back With a Warrant: Proposed Rule Change Expands the Government’s Ability to Access Electronically Stored Information in...

On April 28, 2016 the United States Supreme Court proposed a modification to Federal Rule of Criminal Procedure 41 that significantly alters the manner in which the government can obtain search warrants to access computer...more

Round Two: SWIFT Reports Another Bank Attack

For the second time this year, SWIFT is reporting another cyber-attack on a commercial bank. In a notice issued this morning, SWIFT said that attackers with a “deep and sophisticated knowledge of specific operational...more

Sentencing of Keys, Responsible for 2010 LA Times Data Breach, Should Remind Companies to Fortify Cybersecurity and Plan Response...

A federal judge in California recently sentenced a former employee of KTXL Fox40, a Tribune Company-owned television station, to two years in prison for three felony convictions relating to his assistance to the “hacktivist”...more

Your daily dose of financial news The Brief – 5.13.16

We learned yesterday of the effect that broken mergers are having on some hedge funds. Now comes news that, like many other institutional investors, large US insurance companies are yanking huge sums of money out of their...more

FBI Warns of the Rise in Ransomware

On April 29, 2016, the Federal Bureau of Investigation (FBI) released a warning regarding the increase in ransomware cyberattacks. During 2015, law enforcement saw an increase in ransomware attacks, particularly against...more

Help! They've got Grandma's Data and They're Holding it for Ransom!

Imagine if you started to open a resident’s file on your computer and this message came up on your screen against a red background...more

PCI DSS 3.2: It’s here, what does it mean for you?

The Payment Card Industry Security Standards Council (PCI SSC) has released a new version of its data security standard for the protection of cardholder data, the Payment Card Industry Data Security Standard (PCI DSS). PCI...more

A Closer Look At The Fallout From The Home Depot Data Breach

More than a year and a half ago, Home Depot announced that it had been a victim of one of the largest data breaches in U.S. history. Media outlets reported that the breach had affected Home Depot’s customers who had made...more

The Scariest Hack So Far

Hackers have upped the ante. Data controllers wax fondly about the good old days when data was outright stolen. Back then, in 2013, there was a sense of fair play. Trolls did troll things. Assuming the victim implemented and...more

Stick Up Your Hands! The Increasingly Common Form of Ransom, and the Insurance That Will Help You Recoup Some of Your Funds

It was recently revealed that the Hollywood Presbyterian Medical Center paid $17,000 in bitcoins as ransom to hackers who infiltrated and disabled its computer network. This is not the first time hackers have held up a...more

849 Results
|
View per page
Page: of 34
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×