Cybersecurity Cyber Attacks

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Dodge, Ram, and Jeep vehicles recalled due to hacking vulnerabilities

As technology moves forward, more and more of our everyday gadgets will be connected to the Internet. With that convenience may come some vulnerabilities. On July 24, 2015, Chrysler and its parent company FCA US LLC (FCA US)...more

Privacy & Cybersecurity Newsletter: International Edition July 2015

Retail Tracking Update: Privacy Guidance Following Nomi Technologies - There is currently a widespread effort to quantify everything, from steps, to sleep, to batted ball exit velocity. Fifteen years ago, TV host Jeremy...more

Getting More Personal: California Amends Data Security Law

California’s data security statute will get a little more “personal” as of January 1, thanks to a recently-passed amendment revising the definition of covered personal information. On July 14 California expanded the...more

Higher Education Institutions Increasingly Falling Victim to Cyberattacks

Higher education institutions are treasure troves for hackers. Colleges and universities are huge repositories of research data, sensitive information for large populations of applicants and enrolled students (personal,...more

The Connected Car and Keeping YOU in the Driver’s Seat

Remember KITT? KITT (the Knight Industries Two Thousand) was the self-directed, self-driving, supercomputer hero of the popular 1980s television show Knight Rider. Knight Rider was a science fiction fantasy profiling the “car...more

FERC, NERC and Business Blackout: New CIP Standards and Fictional Cyber Attacks

The Federal Energy Regulatory Commission (FERC) issued a Notice of Proposed Rulemaking (NOPR) July 16, 2015, proposing to approve various Critical Infrastructure Protection (CIP) reliability standards proposed by the North...more

Treasury Deputy Secretary Raskin Delivers Remarks on Cybersecurity in the Financial Sector

On July 14, Deputy Secretary of the Treasury Sarah Bloom Raskin delivered remarks at the American Bankers Association Summer Leadership meeting in Baltimore. Speaking on cybersecurity and cyber-resiliency in banking and the...more

This Is Not Your Father's Oldsmobile: Car Hacking and the SPY Car Act

Not coincidentally, on July 21, 2015, Wired Magazine published an article with groundbreaking evidence of hacking a car wirelessly, and Senators Edward Markey (D-Mass.) and Richard Blumenthal (D-Conn.) introduced legislation...more

Auto manufacturers’ alliance create information sharing and analysis center for cyber-threats

Twelve automakers that make up the Alliance of Automobile Manufacturers (AAM) have agreed to form an information sharing and analysis center (Auto ISAC) that will facilitate the sharing of cyber security data to stay abreast...more

Seventh Circuit overturns Neiman Marcus data breach class action dismissal

In an unusual turn for recent data breach class action cases, the Seventh Circuit this week found that a likely threat of identity theft is sufficient for a proposed class to have standing to sue Nieman Marcus for a...more

[Event] The Aerospace & Defense Forum: SPAWAR: The Navy's Information Dominance Systems Command- July 28, 5:30pm - San Diego, CA

Guest Presenter: Mr. Patrick M. Sullivan, Executive Director, Space and Naval Warfare Systems Command - What areas are most important and likely to be funded in the near term? - How does SPAWAR view sequestration...more

Cybersecurity is once again a hot topic as Illinois undergoes PIPA update

Cybersecurity is a hot topic at both the state and federal level. Specifically, Illinois is in the process of amending its Personal Information Protection Act (“PIPA”). Illinois SB 1833 will amend PIPA by establishing more...more

Orrick's Policyholder Insider Quarterly

Five Lessons Health Care Companies Should Learn From Cyberattacks - The American health care industry is under attack by sophisticated hackers seeking access to electronic medical records. Since January, three health...more

UCLA Health System announces data breach affecting 4.5 million patients and medical providers

Adding to the long list of cyber hacking victims, the UCLA Health System announced on Friday (July 17, 2015) that it confirmed on May 5, 2015 that a cyber-attacker had accessed parts of UCLA Health’s network back to September...more

Commerce Dept. Reviewing Stakeholders' Cybersecurity Comments

The U.S. Department of Commerce’s Internet Policy Task Force (IPTF) is currently reviewing feedback collected in response to a Request for Public Comment on cyber threats facing the digital ecosystem and economy, with the...more

Cybercrime Forum Darkode nailed by the DOJ and FBI

Last week, (July 15, 2015), the Department of Justice (DOJ) announced that the coordinated law enforcement efforts of 20 countries, including the U.S. effectively dismantled the computer hacking forum Darkode with criminal...more

Blog: UCLA Health Announces It Was A Victim of a Cybersecurity Attack

UCLA Health announced today that it was the victim of a cybersecurity attack. The press report disseminated by UCLA Health noted there is evidence that computer systems containing sensitive personal data and health data was...more

Spoofing Whales: How Companies Can Protect Their CEOs and CFOs from the "Business Email Compromise”

Cyber scammers continually innovate new means to extract valuable information from unsuspecting victims. And a new form of cyber fraud is exploiting the close relationship between CEOs and CFOs. Identifying this threat — and...more

“Hacking Team” Gets Hacked, Caught Using Trivial Passwords

Until last week, an Italian cybersecurity company known as “Hacking Team” was reputed to be an elite provider of sophisticated spyware and hacking tools to numerous governments, police agencies and intelligence services. But...more

Is a Uniform Federal Data Breach Law Really Necessary?

In June 2015, the United States Office of Personnel Management announced a massive data breach. Estimates are that the breach compromises the personal information of up to 18 million current, former and potential federal...more

DOJ Deputy Assistant AG Delivers Testimony at Senate Subcommittee Hearing Regarding Cyber Crime

On July 8, the DOJ’s Deputy Assistant AG, David Bitkower, delivered his testimony before the Senate Judiciary Subcommittee on Crime and Terrorism’s hearing entitled, “Cyber Crime: Modernizing Our Legal Framework for the...more

Cyber Liability Insurance – Does Your Retail Business Need It?

The news is full these days of hackers stealing credit card and other customer information from United States retailers such as Home Depot, Target, and Neiman Marcus (and the federal government) among others. These...more

Privacy Monday – July 2015

Welcome to the dog days of summer 2015. Three privacy & security bits and bytes to start your week (if you are reading this on vacation … good for you!) 1. ICYMI: Massive Data Breach at OPM Claims Victim — The Director...more

SCOTUS Decision in Spokeo Could Have Significant Impact on Data Breach Litigation

Following several significant data breaches in 2014 and 2015, including one reported just last week by the IRS, organizations of all types are on high alert to safeguard against data breaches and to prepare incident response...more

Data Breach Decisions Setting A Higher Threshold For Standing For Plaintiffs Do Not Mean Businesses Are Off The Hook

There are only two types of companies left in the United States: those that have been hacked and those that will be hacked. In the last year alone, forty-three percent (43%) of U.S. companies experienced a data breach,...more

347 Results
|
View per page
Page: of 14

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×