Cyber Crimes Cybersecurity

News & Analysis as of

KPMG Survey Finds that Shoppers Care About Retail Data Breaches

On the heels of Eddie Bauer’s notification of a cyber intrusion affecting all of its retail stores in the U.S. and Canada, KPMG has released a study showing that almost one-fifth of respondents to a survey said they would...more

The Ashley Madison Breach: Canada-Australia Report of Investigation and Takeaways for all Organizations

On August 23, 2016, the Office of the Privacy Commissioner of Canada (OPC) released its joint report with the Office of the Australian Information Commissioner (OAIC) regarding its investigation of the 2015 Ashley Madison...more

The Goal of Gender Equality in Cybersecurity

I have the privilege of teaching the Privacy Law class at Roger Williams University School of Law (RWU). It is a required course for the school’s Joint Masters in Cybersecurity/Juris Doctor program, which is, to my knowledge,...more

LastPass Security Vulnerabilities Discovered

Passwords have always been a challenge. It is hard to remember them, and you are not supposed to use the same password across different platforms. Several companies, including LastPass, have tried to help consumers with...more

New Presidential Policy Directive Hopes to Coordinate Federal Response in the Event of a Cyber Attack

In an implicit acknowledgment that the Federal government's response to cyberattacks is diffused among quite a number of agencies, the White House issued Presidential Policy Directive (PPD) 41 last week (July 26). The...more

Illinois voter registration database hacked

The Illinois State Board of Elections has notified voters that its online voter registration site has been hacked. According to the letter sent to Illinois voters by the Board of Elections, “We have found no evidence...more

Is Ransomware a Notifiable Data Breach Event?

There is no doubt that companies face unprecedented volume and variation in both disruptive and intrusive cyberattacks on their networks. Among the different attack methodologies today, ransomware is quickly becoming a major...more

Potential Risks and Rewards of Cybersecurity Information Sharing Under CISA

When President Obama signed into law the Cybersecurity Act of 2015, which was designed to facilitate information sharing on cybersecurity threats between the public and private sectors, proponents hailed it as “our best...more

Black Hat Reports Increase in Cybersecurity Concerns

The 2016 Black Hat Attendee Survey was published in advance of the 2016 Black Hat Conference. Not surprisingly, the respondents to the survey conveyed an increased concern regarding security breaches versus 2015. An alarming...more

Collaboration Key to Combatting Cyber Threats: Federal Government Issues Final Guidance Clarifying Liability Protection for...

On June 15, the Department of Homeland Security (DHS) and the Department of Justice (DOJ) jointly issued final guidance on how the private sector and government will communicate cyber threat data and defensive measures under...more

Hackers using cyber weapons to attack IT systems

A depressing new report by security firm LightCyber opines that hackers are using cyber weapons to evade detection when deploying attacks to IT systems rather than malware. In fact, the report says that cybercriminals are...more

Omni Hotels latest hotel chain hit with malware

Omni Hotels notified guests on Friday, July 8, 2016, that its point of sale systems were compromised with malware from December 23, 2015, through June 15, 2016....more

Home Depot Challenges Banks’ Standing to Recover Losses Related to Data Breaches

In the aftermath of major data breaches at deep-pocketed retailers and other businesses, there is typically no shortage of litigants who move quickly to seek compensation from the business at which the breach occurred. But...more

Gartner identifies future cyber security technologies to fight cyber crime

A recent Gartner report has identified what it believes to be the Top 10 Cyber Security Technologies for the future to assist businesses with combating cyber crime....more

Also In the News - Data, Privacy, & Security Practice Report - June 2016

Average Cost Of Data Breaches Estimated At $4 Million Worldwide, $7 Million In The U.S. - A new study published by IBM and the Ponemon Institute sets the average total cost of a data breach at $4 million. The study,...more

World Energy Council warns utility industry of advanced malware

The World Energy Council recently warned the utility industry that one of the top threats to the energy sector is advanced malware attacks. The warning noted that the utility sector is vulnerable because of the size of the...more

Data Breaches Response Costs Continue to Rise

SEC Chair Mary Jo White recently opined that cyber security is the biggest risk facing the United States financial system. Companies should take heed of that warning in light of the release of the 2016 Cost of Data Breach...more

They Will Click: Cybersecurity and the Human Factor

Cybercrime cost the world economy about $445 billion in 2014 and the 2015 numbers will be even higher. The cost of data breaches will reach $2.1 trillion globally by 2019. Worldwide spending on information security is...more

Federal District Court Finds No Cyber Insurance Coverage For Costly Credit Card Fraud Assessments

In one of the first court decisions to analyze in depth the coverage provided by a cyber policy, a federal judge has found that PF Chang’s policy came up short. Following a 2014 data breach in which hackers accessed and...more

Burr Alert: Two Federal Courts of Appeal Find Insurance Coverage for Data Breaches

Cases with intersecting issues of data breach and insurance coverage continue to slowly wind their way through the court system. After a number of past losses dealt to insureds who sought insurance coverage under their...more

Beware of Emerging Cyber Scams – Part 1: Business Email Compromise

This is the first in a series of articles about increasingly sophisticated cyber scams, and follows several alerts issued by the FBI’s Internet Crime Complaint Center (IC3). These scams include: (1) Business Email...more

SWIFT CEO announces customer security programme

Following a series of thefts from international banks utilizing the Society for World Interbank Financial Telecommunication (SWIFT) communication system, the Chief Executive Officer of SWIFT announced a sweeping five part...more

Unforeseen Consequences of Hacking: When Someone Wants To Use Your Cybercrime Misfortune Against You In A Litigation

Companies that are hacked face a range of repercussions, such as notifying clients and customers that the privacy of their information has been compromised and implementing a new security system. In July 2015, it was highly...more

Cyber Security Takes Centre Stage in UK Government’s Strategy

The UK Department for Culture, Media and Sport recently released a statement on cyber security, in which it urged businesses to take better care to protect against cyber criminals. This statement follows publication of its...more

UK Financial Regulatory Developments - May 2016 #11

The Law Society responds to ESMA’s EU MAR consultation - The Law Society has published the Law Society and City of London Law Society Company Law Committees Joint Market Abuse Working Party’s response to ESMA’s...more

230 Results
|
View per page
Page: of 10
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×