Cybersecurity Hackers

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Russian Crime Ring Possesses Mass Quantities of Stolen Online Information

With recent reports that a Russian crime ring may have stolen the largest collection of online data — including 1.2 billion username and password combinations—effective data security is more critical than ever for all...more

What Companies Can Do to Protect Themselves in the Face of Yet Another Massive Data Breach

Last week it was reported that a small group of Russian computer hackers illegally obtained an unprecedented quantity of internet credentials, including 1.2 billion username and password combinations, and over 500 million...more

Massive Hacking Operation Further Reveals Weakness of Passwords

A small private cybersecurity firm recently revealed that a Russian computer hacking organization amassed more than 1.2 billion username and password combinations. The data was collected across a wide swath of websites, from...more

How Are You Affected By The Recent Massive Data Breach?

As you have probably seen, it was announced on Tuesday, August 5th, that usernames and passwords from 1.2 billion Internet accounts from over 420,000 websites were stolen by a criminal organization in Russia. According to...more

Privacy Tuesday – August 2014

We are just two Mondays away from Labor Day, the traditional end of summer in the United States. Here are some privacy tidbits to get your week started. See especially Jake Romero’s piece on the new Delaware data...more

Russian Cyberattack May Trigger State Security Laws And Notification Obligations

Now that entities are aware that at least 1.2 billion records have been compromised from websites spanning across all industries, a question arises whether entities have an obligation to investigate whether their websites...more

From Russia With Love: ‘Do svidaniya’ Peace Of Mind, Hello Information Security Training

So, this is rather embarrassing to admit, but I am one of those people that knows exactly what to do when your personal information is stolen. It’s not embarrassing that I know what to do. It’s embarrassing why I know what to...more

Cyber and Data Security and Privacy Liability: The Problem Isn’t Going Away. Get Out in Front of the Problem By Insuring Your...

On August 6, 2014, the New York Times – and other media outlets – reported that a Russian crime ring had amassed the largest known collection of stolen Internet data – a cache of at least 1.2 billion user name and password...more

Business Litigation Alert: "Cybersecurity Costs Rising: How will the Government Respond?"

A new study reveals that hackers now cost consumers and businesses between $375 and $575 billion worldwide, with North America and Europe experiencing the highest losses. Those numbers are only expected to grow as the U.S....more

New York AG Reports that Data Breaches Cost New York Businesses over $1B Last Year

The current headline in data security is a just-released report from the New York Attorney General's Office (the "AG Report") announcing that the number of reported data breaches more than tripled between 2006 and 2013,...more

They are coming for your client’s data. What will you do if they succeed?

Data security breaches—no industry is immune. These hackers can phish, spoof, skim, packet sniff, and key log their way into your system. Once a hacker successfully hacks into a corporation’s server, the breach will go...more

Data Breach Laws Continue to Come

Retail. Financial services. Health care. Energy. Not an industry has been spared when it comes to recent data and cyber breaches, and the colossal damage that occurs to the interests of the company, its employees, and third...more

United States Charges China with Cyber-Espionage in Unprecedented Indictment

This morning, the U.S. Department of Justice (DOJ) announced that a grand jury in the Western District of Pennsylvania has indicted five Chinese military officials on charges of computer hacking, economic espionage, and...more

United States v. China: The Battle over Cyber-Espionage Results in Criminal Charges

For those of us who have been active in cybersecurity, it is a well known fact that the Chinese government, acting through its military, has been the most prolific global perpetrators of cyber-espionage. Over the past several...more

Cybersecurity, solar energy and the electric grid

A group of Russian hackers claims to have identified security gaps in widely-used solar panel monitoring software. The monitoring platform's developer is said to be fixing the gaps -- but can hackers damage the electric...more

A CTO’s Views On How To Combat Hackers & Cybercriminals

In this article, I delve into the views and opinions of a chief technology officer of a telecommunications company to understand important steps a company can take to combat hackers and cyber-criminals....more

Internet of Things at the Salone, but what legal issues for furnitures?

The Internet of Things will generate 9 billion devices by 2018 according to estimates, but the recent hacker attack that caused a fridge to send over 750,000 spam and phishing messages over the Christmas break create concerns...more

License to Hack? DOJ Seeks Expanded Authority to Use Hacking Techniques

As part of its increased focus on combating cybercrime, the U.S. Department of Justice is pushing to loosen requirements for obtaining search warrants in order to allow them greater freedom to hack into the computers of...more

You're Not Immune: Hackers Target Health Care Providers Of All Shapes & Sizes

For health care providers, exposure to cyberattacks is becoming a stark reality. Findings in a recently released Health Care Cyberthreat Report by cybersecurity leaders confirmed the health care industry's vulnerabilities for...more

Message from New York Court: Rely on CGL Policy Coverage for Data Breaches at Your Own Peril

A New York trial court announced a decision on February 21, 2014, that may be a harbinger of wide-reaching limitations on insurance coverage for data breaches under commercial general liability (CGL) policies. The court’s...more

Valuable $50,000 Twitter Account Allegedly Stolen

There was an interesting January 29, 2014, article on CNET written by Don Reisinger describing how a thief/hacker allegedly hijacked an Internet domain name and e-mail account belonging to Naoki Hiroshima and stole his...more

"Cybersecurity: Amid Increasing Attacks and Government Controversy, a Framework to Reduce Risk Emerges"

2013 likely will be considered a watershed period in the role of cybersecurity in corporate strategy and management. While there were few significant legislative developments, a marked increase in cybersecurity attacks...more

Data Security Breach at Target is an Important Lesson for All Companies

News about the data security breach at Target is rapidly developing. Current reports indicate that in the last few weeks, the credit and debit card information for as many as 40 million Target customers was compromised.1 The...more

Before Becoming The Next Target: Recent Case Highlights The Need To Consider Insurance For Data Breaches

If only one of Target, Snapchat, Facebook, Twitter, Adobe, and so on and so forth, had suffered a serious data breach within the last few months that would be sufficiently troubling. Yet data breaches have become so...more

To 8-K, or not to 8-K? For Target, that is indeed the question.

As anyone with a pulse and a computer, television or carrier pigeon knows, Target Corporation (NYSE: TGT) suffered a major data breach in December – the extent of which is still being uncovered – and pegs the latest number of...more

76 Results
|
View per page
Page: of 4