Cyber Attacks Internet

News & Analysis as of

Law Firm Data Breaches Demonstrate the Expanding Scope of Cyber Attacks

In a case of “cyber meets securities fraud,” the United States Attorney’s Office for the Southern District of New York (“SDNY”) recently indicted three foreign nationals on charges of insider trading, wire fraud, and computer...more

Internet Law in a Trump Presidency

In a Democracy, transitions in leadership happen more frequently than in any other form of government. And with those transitions, some previous policies and orders are preserved and some are reversed. This approach to...more

Affair Website Ashley Madison Fined $8.75 Million Over Data Breach, Misrepresentations

The Federal Trade Commission (FTC) has entered into a multimillion dollar settlement with the owners and operators of AshleyMadison.com, a dating website for people interested in having discreet affairs, related to the...more

Ashley Madison Settles with FTC and State AGs for $1.6 Million

We have previously reported on the Ashley Madison data breach and subsequent litigation. On December 14th, Ashley Madison announced that it has agreed to pay $1.6 million and implement additional security measures to settle...more

China Employment Law Alert: New Data Privacy Obligations for Employers

The National People's Congress Standing Committee has now finalised the new Cyber Security Law ("CSL"), to take effect on 1 June 2017. The fast development of the internet in China has caused a rapid escalation of security...more

House Committee Warns Congress to Set Security Standards

Recently, members of the House Energy and Commerce Committee told Congress that they must set cyber security standards for all devices connected to the internet or else face the possibility of a major cyberattack that could...more

Latest Cyber Attack a Wake-up Call: What are your company’s IoT exposures?

The Internet of Things gives rise to many risks and exposures that companies and their insurers were not thinking about as recently as a couple years ago, and probably aren’t fully cognizant of today....more

When smart goes bad: Why internet security does not just refer to computers

A growing trend in the consumer electronics industry is the use of so-called “smart” devices — electronics that use wi-fi connections to allow them to be controlled remotely over the internet. From smart thermostats that can...more

The Impact of the Smart Home Revolution on Product Liability and Fire Cause Determinations

The concept of the Internet of Things (IoT) has existed for more than 15 years. Technology pioneer Kevin Ashton is widely credited with coining the term in 1999 to describe the connection of physical objects to the internet...more

FFIEC Weighs in on Cybersecurity in Light of Unprecedented Risk of Cyber Threats

As financial institutions of all sizes continue to face unprecedented cybersecurity risk, the Federal Financial Institutions Examination Council (FFIEC) released its Cybersecurity Assessment Tool. The Assessment is...more

Internet of Things – What does it mean for business?

What is the Internet of Things? The 'Internet of Things' (IoT) is a catchphrase describing the increasing interconnectedness between smart devices and sensors facilitated through their connection to the internet. It's not a...more

Is Ashley Madison abusing the Digital Millennium Copyright Act in the Wake of Hack?

In July, a group of hackers identifying themselves as the Impact Team took over the computer systems of Avid Life Media (“ALM”), the parent company of the adultery-oriented website Ashley Madison, threatening to release the...more

Ashley Madison Fallout: Class Actions, Pentagon investigation and easily searchable data

We previously reported that hackers The Impact Team had posted legitimate detailed information about 36 million adultery website Ashley Madison users. In the wake of the shocking posting of the data last week, two class...more

Legal Insights on the Ashley Madison Hack: Part I

Internet commenters and legal analysts alike are buzzing about the Ashley Madison hack. The website -- which billed itself as a networking site for anyone who wanted to discretely arrange an extramarital affair -- has already...more

NIST Guide Highlights Cybersecurity Considerations for Utilities and Manufacturing Companies

In 2013 alone, the U.S. Department of Homeland Security (DHS) and its Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to more than 256 cyber-incident reports—more than half of them in the energy...more

Ashley Madison’s Impact on New Jersey Divorce

Names, email addresses, credit card information, billing addresses and more for over 36,000,000 registered users have been released on the internet by the Ashley Madison Hackers. While many of the registered accounts may...more

Dodge, Ram, and Jeep vehicles recalled due to hacking vulnerabilities

As technology moves forward, more and more of our everyday gadgets will be connected to the Internet. With that convenience may come some vulnerabilities. On July 24, 2015, Chrysler and its parent company FCA US LLC (FCA US)...more

“Life is short. Have an affair.”® And have your data hacked and leaked

Hackers calling themselves “The Impact Team” announced on July 15th that it has compromised the extramarital affair site AshleyMadison.com, and companion sites Cougar Life and Established Men, including absconding with up to...more

“Life is Short. Have an Affair.” But is it Worth It?

“Life is short. Have an affair.” This advice comes courtesy of the Ashley Madison website, a company which put a spin on the old adage and the dating website industry by building its business around assisting married people...more

Commerce Dept. Reviewing Stakeholders' Cybersecurity Comments

The U.S. Department of Commerce’s Internet Policy Task Force (IPTF) is currently reviewing feedback collected in response to a Request for Public Comment on cyber threats facing the digital ecosystem and economy, with the...more

FBI warns of continued use of Cryptowall ransomware schemes

The FBI’s Internet Crime Complaint Center recently issued an alert “Criminals Continue to Defraud and Extort Funds from Victims Using Cryptowall Ransomware Schemes” that indicates that the Center continues to receive...more

The FBI has been busy

The FBI and U.S. Attorney’s Office for the Southern District of New York announced yesterday (July 8, 2015) that VLADIMIR TSASTSIN pled guilty to wire fraud and computer intrusion charges “arising from his operation of a...more

Solving the Legal Challenges of Trustworthy Online Identity

In this age of phishing, hacking, identity fraud, and other forms of cybercrime, answering two simple questions – “Who are you?” and “How can you prove it?” – is fast becoming a critical requirement for online business...more

From Carjacking to Carhacking – Lessons for the Internet of Things

The Internet of Things (IoT) is coming and perhaps the first place we will see the proverbial rubber hit the road is with something near and dear to Americans – our cars. The ever increasing connectivity of cars is creating a...more

How Recent Data Breaches are Changing the Face of Cybersecurity for the Private Sector

If "The Year of the Breach" and the rapid start to data breaches in 2015 have taught us anything, it is that any company is susceptible to a cyber attack; and, while data breaches are not a new concept, the way the private...more

30 Results
|
View per page
Page: of 2
Popular Topics

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×