Cybersecurity Hackers

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

You Asked: Can My Employees Hack My Company?

Yes! Employees and other insiders – think Edward Snowden – can, and in fact, do play a role in most data breaches or cyber-security incidents. Companies must ensure their data protection policies include not only training but...more

Employer Did Not Owe Legal Duty to Protect Employees' Hacked Personal and Financial Records

University of Pittsburgh Medical Center (UPMC) maintained a human resource database containing current and former employees' names, dates of birth, social security numbers, tax information, addresses, salaries, and bank...more

Vendor Causes Breach of Over 5,000 Patient Records

The continued risk that vendors pose to companies, including health care entities cannot be overemphasized. This week, Sentara Healthcare (Sentara) announced that one of its third-party vendors was the victim of a...more

College Pays Bitcoin Ransom to Unlock Encrypted Data

The scourge of “ransomware”—malicious computer viruses that prevent entities from accessing their own data until they pay a ransom—has spread to the higher education sphere. In early January 2017, a California public...more

The Anthem Breach – A Retrospective

Many people and news outlets have opined, weighed in, and informed the public about the 2015 Anthem breach. It is still a hot topic in January 2017, because it currently lines up with other hot stories about hacking ordered...more

Los Angeles Community College Pays Ransomware to Retrieve Data

On December 30, 2016, the Los Angeles Community College computer network was kidnapped by cyber criminals requesting a ransom for its return. The ransomware encrypted the college’s entire network system, including...more

Car Technologies Capture Attention, Excitement at CES 2017

At this year’s Consumer Electronics Show, automotive technology continued its growing role at the show and shared the spotlight with virtual and augmented reality systems, video recording toothbrushes, and smart home products...more

Privacy Perils: Beware Browser Autofill

The ingenuity of determined fraudsters should never be underestimated. Gizmodo, a technology website, reports on a simple scheme where hackers capture your sensitive information merely by hijacking the autofill features found...more

Maritime Cybersecurity Regulation on the Horizon

Over the past year, various institutions and organizations—both domestic and international—have shown an interest in moving the increasingly prevalent cybersecurity conversation offshore. Domestically, both Congress and...more

Can a PA Employer be Liable to its Employees for a Data Breach?

It’s a nightmare scenario for any employer: you’ve been hacked. Thousands of your employees’ names, birthdates, Social Security numbers, and bank account information have been stolen. This information is used to file...more

Law Firm Data Breaches Demonstrate the Expanding Scope of Cyber Attacks

In a case of “cyber meets securities fraud,” the United States Attorney’s Office for the Southern District of New York (“SDNY”) recently indicted three foreign nationals on charges of insider trading, wire fraud, and computer...more

Studies Show Ransomware up 6,000% and Reaps Billions and Phishing Emails are Used in 91% of all Cyber-Attacks

A recent IBM study shows that ransomware increased 6,000 percent in 2016 over 2015. According to the report, ransomware was present in almost 40 percent of all spam email messages....more

No More Ransom Project Expands Membership and Tools

The No More Ransom Project, a coalition of security companies and law enforcement, which was launched through a partnership with the European Cybercrime Centre, the National High Tech Crime Unit of the Netherlands police,...more

PA Appellate Court Finds No Common Law Duty For Employer Handling Of Employee Info After Data Breach

The Pennsylvania Superior Court held yesterday in Dittman v. UPMC et al. that an employer owes no common law duty under a negligence theory to use reasonable care in the collection and storage of employee information and...more

FTC Takes Action Against D-Link for Deceptive Practices Endangering the IoT

The U.S. Federal Trade Commission (“FTC”) has filed a lawsuit against device manufacturer D-link for allegedly deceiving the marketplace about the security of its products and, in turn, unfairly placing customer privacy at...more

Privacy Tip #69 – Hit with Ransomware? To Pay or Not to Pay

Every day I get a call from a client asking for help involving ransomware. Friends have called in a panic when that dreadful message comes up on the screen informing you that you are the victim of ransomware with instructions...more

Class Action Quarterly Update - Fall 2016

Class action filings during the fall of 2016 continued to be dominated by Telephone Consumer Protection Act (“TCPA”) cases. As of October 1, 2016, nearly 150 cases have been filed; these filings are both daily in frequency...more

FTC Brings Action Against D-Link in Ongoing Effort to Secure the Internet of Things

One area of concern for data privacy and cybersecurity professionals is the security of the Internet of Things, which refers to the digitally connected smart devices present in almost every aspect of our lives and growing...more

FTC sues IoT Device Manufacturer D-Link for Lax Cyber Security Practices

On January 5, 2017, the Federal Trade Commission (“FTC”) filed a complaint against computer networking hardware manufacturer D-Link Corporation, alleging that the company’s wireless routers, IP cameras, and other “Internet of...more

Obama Uses Executive Order Authority to Respond to Malicious Russian Cyber Activity - President Amends EO 13964 From April 2015 in...

President Barack Obama amended Executive Order (EO) 13964 on December 29, 2016, in response to intelligence community findings that the Russian government engaged in malicious cyber activity with respect to the U.S. electoral...more

FTC Files Lawsuit Against Taiwanese Manufacturer for Alleged Lax Security in Wireless Routers and Cameras and Related Marketing...

The Federal Trade Commission has filed a lawsuit in federal court claiming that a networking equipment manufacturer engaged in unfair and deceptive acts, exposing thousands of consumers to the risk of cyberattack from...more

FINRA Focus on Cybersecurity Continues

On November 14, the Financial Industry Regulatory Authority (FINRA) imposed a $650,000 fine against Lincoln Financial Securities Corporation (Lincoln Financial) for its failure to implement adequate data security measures to...more

Insurance Coverage for Lost Profits Arising from Cyber Attacks on the U.S. Power Grid – Contingent Business Interruption Coverage...

The Washington Post reported Friday that Russian hackers had penetrated the U.S. utility grid through Burlington Electric, a Vermont utility. Although the utility later clarified that the attacked computer was not connected...more

Geo Political Cyber Warfare And Your Business

The cyber war battlefield has expanded, and your business is now a fighter and a target. A new U.S. Government report explains many reasons for identifying and penalizing Russian hackers, the Russian intelligence...more

Can Your Pacemaker Be Hacked?

A famous Homeland episode involved a terrorist gaining access to the Vice-President’s pacemaker. Accessing medical devices to wreak havoc was one of the motivations behind certain provisions of the Digital Millennium...more

595 Results
|
View per page
Page: of 24
Popular Topics

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×