Cyber Attacks Hackers

News & Analysis as of

Senate hearing reviews ransomware in a school system

On May 18, the Senate Judiciary Committee Subcommittee on Crime and Terrorism heard from Charles C. Hucks, the Executive Director of Technology for the Horry County, South Carolina, School System. The 52 schools and the...more

Most Frequently Hacked Industries Now Includes Manufacturing

Second only to health care, the manufacturing industry is now one of the most frequently hacked industries (according to IBM’s 2016 Cyber Security Intelligence Index). And more importantly, automotive manufacturing was the...more

TeslaCrypt Ransomware Developers Retire, Release Master Decryption Key

Ransomware is a particularly nefarious type of malware that hijacks computers and forces victims to pay a ransom in order to access their files. One of the reasons it is so successful is because ransomware developers use...more

Your daily dose of financial news The Brief – 5.20.16

Manhattan USA Preet Bharara’s back in front of the cameras and back on the insider-trading horse with the announcement yesterday of criminal charges against well-known sports bettor Billy Walters and former investment banker...more

New Study confirms that 9 out of 10 businesses have experienced a hacking incident in the last year

Hartford Steam Boiler released a study on May 17, 2016, that states that nine out of ten businesses have experienced at least one hacking incident in the past year, which represents a 21 percent increase since 2014....more

Cyber Security

Roughly one million pieces of malware—computer viruses or malicious software—are released every day. In recent years, we’ve witnessed an unprecedented level of activity in the cyber arena, both in the form of increased...more

Come Back With a Warrant: Proposed Rule Change Expands the Government’s Ability to Access Electronically Stored Information in...

On April 28, 2016 the United States Supreme Court proposed a modification to Federal Rule of Criminal Procedure 41 that significantly alters the manner in which the government can obtain search warrants to access computer...more

Round Two: SWIFT Reports Another Bank Attack

For the second time this year, SWIFT is reporting another cyber-attack on a commercial bank. In a notice issued this morning, SWIFT said that attackers with a “deep and sophisticated knowledge of specific operational...more

Sentencing of Keys, Responsible for 2010 LA Times Data Breach, Should Remind Companies to Fortify Cybersecurity and Plan Response...

A federal judge in California recently sentenced a former employee of KTXL Fox40, a Tribune Company-owned television station, to two years in prison for three felony convictions relating to his assistance to the “hacktivist”...more

A Closer Look At The Fallout From The Home Depot Data Breach

More than a year and a half ago, Home Depot announced that it had been a victim of one of the largest data breaches in U.S. history. Media outlets reported that the breach had affected Home Depot’s customers who had made...more

The Scariest Hack So Far

Hackers have upped the ante. Data controllers wax fondly about the good old days when data was outright stolen. Back then, in 2013, there was a sense of fair play. Trolls did troll things. Assuming the victim implemented and...more

Stick Up Your Hands! The Increasingly Common Form of Ransom, and the Insurance That Will Help You Recoup Some of Your Funds

It was recently revealed that the Hollywood Presbyterian Medical Center paid $17,000 in bitcoins as ransom to hackers who infiltrated and disabled its computer network. This is not the first time hackers have held up a...more

American Dental Association inadvertently mails USB drives infected with malware to its members

The American Dental Association (ADA) recently mailed 37,000 credit card sized flash drives to its members that included new billing codes, entitled 2016 CDT Manual. Unfortunately, also included on the USB drive was malware...more

Your daily dose of financial news The Brief – 5.2.16

Nearly a year-and-a-half after announcing their plans to join forces, Halliburton and Baker Hughes have reportedly called off their $35 billion merger. Serious DOJ reservations about the deal and a wildly changed energy...more

Hackers responsible for ruthless SpyEye Trojan sentenced to 24 1/2 years

The Department of Justice has announced that two hackers who built and sold the Trojan called SpyEye, that caused close to $1 billion in banking losses, have been sentenced for a combined 24 1/2 years in federal court in...more

FireEye report shows PoS attacks have compromised more than 20 million cards

FireEye recently issued a report that indicates that bank card data of over 20 million individuals has been compromised since 2014. According to the report, point of sale attacks that have affected the retail and hospitality...more

Police department drones vulnerable to hackers?

While there has been much debate over police department drones and individual privacy, now, a new concern has emerged: the threat of hackers. Recently, a security researcher, Nils Rodday, used a laptop and $40 worth of...more

Insurance News, Spring 2016

Hackers interfere with a GPS signal, causing a vessel’s onboard navigation systems to falsely interpret position and heading. Somali pirates employ hackers to infiltrate a shipping company’s network to identify vessels in the...more

Ashley Madison attorney-client communications leaked in data breach

We all remember the Ashley Madison data breach. The hackers, calling themselves “The Impact Team” requested that the Ashley Madison extramarital affair site, and Cougar Life and Established Men sites be “taken down.” When...more

Cyber Attacks Continue to Grow and Evolve

Cyber criminals continue to prey on websites with unpatched vulnerabilities and ill-protected point of sale (POS) systems to steal credentials such as personal data, credit card numbers and bank account details. Common...more

Sony settles employees’ class action suit for up to $8M

The Sony data breach in 2014 was one of the most significant breaches experienced and was a first on many fronts. It was alleged to have been caused by North Korean hackers (calling themselves Guardians of Peace) seeking to...more

Is Data Really a “Toxic” Asset?

In his “Data Is a Toxic Asset” blog post, Bruce Schneier argues that data is a toxic asset and that the lesson all the recent data breaches are teaching us is that storing this asset is “dangerous,” because it makes companies...more

Privacy Tip #29 – U.S. + Canada issue joint ransomware special alert—read and follow recommendations

We have frequently alerted individuals and companies about the increasing risk and success posed by sophisticated phishing schemes. It has become such a real and grave problem that the U.S. Computer Emergency Readiness...more

Hacker steals Norfolk Admirals customer data

A Norfolk Admirals fan notified the Admirals last week that his information was posted online. Another customer found out that her information was posted online from the service Have I been Pwned? Her son’s name and address...more

Lessons from the Bangladesh Central Bank Heist

By now, you’ve probably heard about the massive cyber attack that hit Bangladesh’s central bank last month, resulting in the loss of $81 million through fraudulent transfers to accounts in the Philippines. Although the size...more

345 Results
|
View per page
Page: of 14
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×