Cyber Threats

News & Analysis as of

Tax Season Becomes "Spear Phishing" Season for Cybercriminals

Imagine this scenario. Your HR team receives an email from your CEO: "I want you to send me W-2s of employees' wage and tax statement for 2015, I need them in PDF file type, you can send it as an attachment." They hurry to...more

Los Angeles Community College Pays Ransomware to Retrieve Data

On December 30, 2016, the Los Angeles Community College computer network was kidnapped by cyber criminals requesting a ransom for its return. The ransomware encrypted the college’s entire network system, including email...more

Cybersecurity Incident Response: Who You Gonna Call?

Who should you call when you suspect, or are certain of, a data breach? Data breaches and other cybersecurity incidents have become of a fact of life. Yahoo! recently disclosed that data for over one billion users was...more

Studies Show Ransomware up 6,000% and Reaps Billions and Phishing Emails are Used in 91% of all Cyber-Attacks

A recent IBM study shows that ransomware increased 6,000 percent in 2016 over 2015. According to the report, ransomware was present in almost 40 percent of all spam email messages....more

No More Ransom Project Expands Membership and Tools

The No More Ransom Project, a coalition of security companies and law enforcement, which was launched through a partnership with the European Cybercrime Centre, the National High Tech Crime Unit of the Netherlands police,...more

Hack Attacks!

Lately, the news has lead with stories about the alleged Russian hacking of various American political organizations, ostensibly for the purpose of influencing the 2016 elections. U.S. law enforcement has surmised that the...more

Global Cybersecurity Threats to the Maritime Sector

Cybersecurity risks to the nation's critical infrastructure (CI) – defined as 16 CI sectors, including transportation and maritime – continue to grow exponentially. The incoming Trump Administration has made it clear that...more

Federal Cybersecurity Landscape for 2017

Regardless of who won the presidential election, it was always expected that cybersecurity would continue to be a leading concern for business and government alike. As new cyber threats and the evolution of technology and the...more

IMO Interim Guidelines: Recent Developments in Maritime Cyber Risk Management

Cyber risk management continues to be one of the most significant challenges currently facing the maritime industry. With an overreliance on information technology (‘‘IT’’) and operational technology (‘‘OT’’), the shipping...more

The State of Cybersecurity in 2016 and the (potential) Great Cyber Fire

Cybersecurity hit the news hard in 2016. The number of high profile, and troubling, cyber incidents increased significantly. The Democratic National Committee and one of Clinton’s top advisor’s being hacked, with leaked...more

2016 was the Year of the Data Breach

Although every year we lament about the significance of data breaches in the past year, 2016 was by far the worst. Data breaches were rampant, victimizing every industry and numbing consumers in the process. It was so bad...more

FDA Guidance on Cybersecurity in Medical Devices

On December 28, 2016, the Food and Drug Administration (FDA) issued guidance on Postmarket Management of Cybersecurity in Medical Devices. The guidance clarified aspects of the reporting requirements under Part 806 (21 CFR...more

Retail and Consumer Products Law Roundup - December 2016

How Retailers Can Avoid Regulatory Scrutiny During Holiday Season - With the holiday season often accounting for one-third of a retailer’s annual sales, competition can be fierce. Tempting as it is to grab for every...more

White House Releases Checklist to Improve Grid Resiliency

The new plan builds on efforts to improve the response to attacks and disasters but recognizes that the needed investments may require regulatory changes to ensure cost recovery by utilities....more

Phishing as a Service

A recent report from Imperva, Inc. has identified a Phishing as a Service (PhaaS) being offered on a Russian website. The United States Computer Emergency Readiness Team defines phishing as “an attempt by an individual or...more

Recent Litigation Against Product Manufacturers Shows the Reach of Cybersecurity Liability

Plaintiffs have increasingly sought to hold companies accountable through litigation for security breaches or hacks of their computer systems that store personal information. Two recent court decisions in California...more

Cybersecurity Guidelines for Vehicles

With the prevalence and increasing severity of cyber-attacks, and in the wake of the recent, massive denial of service attack on Dyn, there is a growing public awareness of the potential risks associated with security...more

Cybersecurity 2017 – The Year in Preview: Emerging Security Threats

Editor’s note: This is the fourth in a continuing end-of-year series. See our previous posts on trade secrets, state regulation and law enforcement, and HIPAA compliance. Our last two posts will focus on the energy...more

Center for Cyber & Homeland Security Issues Report on How the Private Sector Can Actively Defend Against Cyber Threats

Earlier this year, the Center for Cyber & Homeland Security at the George Washington University (“Center”) announced a new project on active defense against cyber threats. The Center established a high-level task force to...more

Attacking Cybersecurity from the Inside Out: Part III

Over the last couple of weeks, we’ve explored the steps a company’s leadership team should take to prioritize cybersecurity and how businesses can improve their cybersecurity strategy by enhancing their employee-level cyber...more

Bryan Cave Data Security Breach Handbook - 2016

Since the first publication of this handbook in 2014, the legal ramifications for mishandling a data security incident have become more severe. In the United States, the number of federal and state laws that claim to...more

FinCEN: Cyber Events Should Be Reported via SARs

The Financial Crimes Enforcement Network (FinCEN) reminded banks that they are required to report cyber-enabled crime and cyber events just like any other suspicious activity. What happened - Observing that...more

NIST Releases Cybersecurity Guide for Small Businesses

We often hear from small businesses that they do not believe they can be a “target” of hackers, or that they are at risk of a cyber intrusion. This thought is naïve as small businesses are at risk of cyber intrusions, and due...more

Cybersecurity Threats May Impact Your Digital Health

As the healthcare industry continues to embrace the Internet of Things, cybersecurity may present unprecedented health and privacy risks to patients. Wireless-enabled medical devices are increasingly common. For some...more

Growing Concern over Security of IoT Devices

Recent attempted cyberattacks that used Internet of Things (IoT) devices to effect the attempted attacks have led to growing concern within the federal government over the security of such devices and the potential such...more

308 Results
|
View per page
Page: of 13
Popular Topics

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×