Cyber Attacks Internet

News & Analysis as of

Dodge, Ram, and Jeep vehicles recalled due to hacking vulnerabilities

As technology moves forward, more and more of our everyday gadgets will be connected to the Internet. With that convenience may come some vulnerabilities. On July 24, 2015, Chrysler and its parent company FCA US LLC (FCA US)...more

“Life is short. Have an affair.”® And have your data hacked and leaked

Hackers calling themselves “The Impact Team” announced on July 15th that it has compromised the extramarital affair site AshleyMadison.com, and companion sites Cougar Life and Established Men, including absconding with up to...more

“Life is Short. Have an Affair.” But is it Worth It?

“Life is short. Have an affair.” This advice comes courtesy of the Ashley Madison website, a company which put a spin on the old adage and the dating website industry by building its business around assisting married people...more

Commerce Dept. Reviewing Stakeholders' Cybersecurity Comments

The U.S. Department of Commerce’s Internet Policy Task Force (IPTF) is currently reviewing feedback collected in response to a Request for Public Comment on cyber threats facing the digital ecosystem and economy, with the...more

FBI warns of continued use of Cryptowall ransomware schemes

The FBI’s Internet Crime Complaint Center recently issued an alert “Criminals Continue to Defraud and Extort Funds from Victims Using Cryptowall Ransomware Schemes” that indicates that the Center continues to receive...more

The FBI has been busy

The FBI and U.S. Attorney’s Office for the Southern District of New York announced yesterday (July 8, 2015) that VLADIMIR TSASTSIN pled guilty to wire fraud and computer intrusion charges “arising from his operation of a...more

Solving the Legal Challenges of Trustworthy Online Identity

In this age of phishing, hacking, identity fraud, and other forms of cybercrime, answering two simple questions – “Who are you?” and “How can you prove it?” – is fast becoming a critical requirement for online business...more

From Carjacking to Carhacking – Lessons for the Internet of Things

The Internet of Things (IoT) is coming and perhaps the first place we will see the proverbial rubber hit the road is with something near and dear to Americans – our cars. The ever increasing connectivity of cars is creating a...more

How Recent Data Breaches are Changing the Face of Cybersecurity for the Private Sector

If "The Year of the Breach" and the rapid start to data breaches in 2015 have taught us anything, it is that any company is susceptible to a cyber attack; and, while data breaches are not a new concept, the way the private...more

Cybersecurity Monday: Who Is Shopping for Your Data?

At this time of year, everyone is shopping for a good bargain. And with “Cyber Monday,” the internet has become the place to go for the best deals. The shift to online and cloud-based information systems and data storage has...more

FFIEC Advises Banks On Website, ATM Cyber Attacks

On April 2, the FFIEC advised financial institutions that distributed denial-of-service (DDoS) attacks on a financial institution’s public websites present operational and reputation risks. If coupled with attempted fraud, a...more

Viruses, Trojans and Spyware, Oh My! The Yellow Brick Road to Coverage in the Land of Internet Oz – Part I

We’re not in e-Kansas anymore. And there’s no denying that present day internet Oz, while extraordinary, is increasingly scary. Cyber attacks of various types continue to escalate across the globe. As aptly stated by one...more

Is Your Cyber-Security Better Than a Fortune 500's?

Half of Fortune 500 companies would face “serious harm” or be “adversely impacted” by a cyber-attack. The greatest perceived harms are loss or theft of confidential information, loss of reputation and direct loss from...more

EU Proposed Directive on Network and Information Security

On 7 February, the European Commission (EC) published an EU Cyber Security Strategy encompassing a proposed Directive on Network and Information Security (NIS Directive). The aim of the Strategy and NIS Directive is to...more

Vague Definitions in CISPA Raise Concerns of SOPA 2.0 [Video]

April 12 (Bloomberg Law) -- Trevor Timm, activist at the Electronic Frontier Foundation, talks with Bloomberg Law's Lee Pacchia about the Cyber Intelligence Sharing and Protection Act (CISPA), a new bill that attempts to...more

15 Results
|
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×