News & Analysis as of

Sony vs. N. Korea – Let Capitalism Fight Totalitarianism!

Cyber terrorism, North Korea, Sony, extortion, free speech, The Interview, international relations, journalistic ethics, cyber security… can it get any better than this?...more

Did Sony Let the Terrorists Win?

Unless you’ve been living under a rock recently, you’ve probably heard about the hoopla caused by the new Seth Rogen and James Franco movie called the interview. The movie follows a plot to assassinate North Korean dictator...more

The Interview: Cyber Attacks and The First Amendment

The fallout from a massive cyber attack on Sony in November escalated tremendously this week. After exposing embarrassing emails and confidential company information, stealing the screenplay for an upcoming James Bond movie,...more

Cybersecurity Monday: Who Is Shopping for Your Data?

At this time of year, everyone is shopping for a good bargain. And with “Cyber Monday,” the internet has become the place to go for the best deals. The shift to online and cloud-based information systems and data storage has...more

Sophisticated Hackers Target Insider Information

A security consulting firm has discovered a sophisticated hacking campaign that has targeted more than 100 public companies, investment banks and law firms. In a report released December 1, cybersecurity firm FireEye...more

Cyber Monday – December 1, 2014

Welcome to December – we hope you had a restful and enjoyable Thanksgiving holiday. Here are a few privacy bits and bytes to start your week. 1. ICYMI – 60 Minutes Explains Credit Card Hacking...more

Privacy Tuesday - November 2014 #2

Here are three privacy stories to start your week - 1. Dear “financial institution” : how is your data security?! Senator Elizabeth Warren (D-Mass) announced (press release) that on November 18 the Senator...more

Medical Information More Valuable to Hackers Than Credit Card Numbers

In light of the recently reported large healthcare data breaches that have resulted in the potential theft of the personal information of millions of patients, the FBI warned healthcare providers yet again of the dangers of...more

Health Care E-Note - September 2014

In This Issue: - Doctors, Insurers Critical of Medicare Physician Fee Schedule - Health Spending Expected to Increase Modestly Over Next Decade - U.S. Hospitals Have Highest Administrative Costs...more

Target Files Motion to Dismiss Data Breach Lawsuit

By now, we all know about the massive data breach at national retailer Target over the 2013 holiday season. The cyber-attack was carried out by sophisticated criminal hackers, who allegedly gained access to Target’s network...more

Massive Online Security Breach – Are You Reactive or Proactive?

A few weeks ago, a Russian cyber gang amassed around 1.2 billion user name and password credentials belonging to more than 500 million email addresses. This may be to date the largest cache of stolen data. The cyber gang...more

Weighing in – 1.2 Billion Usernames and Passwords. What, Me Worry About CyberSecurity?

Last month one of our lead articles was Cyber Security: Forewarned is Fair-Warned. Last week the New York Times published an article reporting that at least 1.2 billion usernames and passwords were hacked by a Russian...more

Community Health Systems' HIPAA Breach: Significant Lessons for Health Care and Non-Health Care Companies

On August 18, 2014, Community Health Systems, Inc. (CHS) publicly confirmed, in a filing with the Securities and Exchange Commission (CHS filing), that its computer network was attacked between April and June 2014 by hackers...more

Chinese Hackers Infiltrate Health System Network – Information of 4.5 Million Individuals Stolen

Community Health Systems, Inc. (“CHS”) reported yesterday that the information of approximately 4.5 million individuals has been affected by a Chinese cyber-attack. CHS and its affiliates own and operate 206 hospitals in 29...more

Russian Crime Ring Possesses Mass Quantities of Stolen Online Information

With recent reports that a Russian crime ring may have stolen the largest collection of online data — including 1.2 billion username and password combinations—effective data security is more critical than ever for all...more

What Companies Can Do to Protect Themselves in the Face of Yet Another Massive Data Breach

Last week it was reported that a small group of Russian computer hackers illegally obtained an unprecedented quantity of internet credentials, including 1.2 billion username and password combinations, and over 500 million...more

How Are You Affected By The Recent Massive Data Breach?

As you have probably seen, it was announced on Tuesday, August 5th, that usernames and passwords from 1.2 billion Internet accounts from over 420,000 websites were stolen by a criminal organization in Russia. According to...more

Cyber and Data Security and Privacy Liability: The Problem Isn’t Going Away. Get Out in Front of the Problem By Insuring Your...

On August 6, 2014, the New York Times – and other media outlets – reported that a Russian crime ring had amassed the largest known collection of stolen Internet data – a cache of at least 1.2 billion user name and password...more

Hackers steal 1.2 billion passwords – 4 steps to take now

The New York Times reported this week that an organized Russian criminal group stole approximately 1.2 billion user name and password credentials associated with more than 500 million email addresses from hundreds of...more

Did Russian Hackers Really Amass Over a Billion Passwords?

It was widely reported yesterday in The New York Times and elsewhere that a sophisticated Russian crime ring was holding a massive cache of stolen Internet credentials. According to the private security firm Hold Security, a...more

DOJ Charges Chinese Military Hackers with Economic Espionage

In what is the first case of its kind, the Justice Department has filed criminal charges against Chinese military officers for hacking U.S. Companies. Five Chinese military officers, all members of China’s Peoples’ Liberation...more

Cybersecurity, solar energy and the electric grid

A group of Russian hackers claims to have identified security gaps in widely-used solar panel monitoring software. The monitoring platform's developer is said to be fixing the gaps -- but can hackers damage the electric...more

A CTO’s Views On How To Combat Hackers & Cybercriminals

In this article, I delve into the views and opinions of a chief technology officer of a telecommunications company to understand important steps a company can take to combat hackers and cyber-criminals....more

License to Hack? DOJ Seeks Expanded Authority to Use Hacking Techniques

As part of its increased focus on combating cybercrime, the U.S. Department of Justice is pushing to loosen requirements for obtaining search warrants in order to allow them greater freedom to hack into the computers of...more

You're Not Immune: Hackers Target Health Care Providers Of All Shapes & Sizes

For health care providers, exposure to cyberattacks is becoming a stark reality. Findings in a recently released Health Care Cyberthreat Report by cybersecurity leaders confirmed the health care industry's vulnerabilities for...more

53 Results
|
View per page
Page: of 3