Cybersecurity Hackers

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
News & Analysis as of

Cyber Security and Social Engineering: A Big Low Tech Problem

Headline-grabbing cyber hacks of email accounts belonging to celebrities, corporations, government officials and political campaigns are becoming the norm. Cybersecurity intended to guard against these acts brings to mind...more

A Close Look at Policy Wording Is Essential to Ensure Coverage for Cyber Risks

As the demand for insurance coverage for cyber-related losses continues to grow, more insurance companies are offering cyber insurance policies and endorsements, but the market is far from mature and the available policies...more

Yahoo Data Breach Update: A Third Notification + Shareholders Sue

Last week, Yahoo issued another warning to some of its customers telling them that their personal information may have been compromised in a data breach. This is the third notification to Yahoo users that their information...more

Cyberattacker Offers Access to Private Data From 60 Universities and Agencies

In February 2017, a private threat intelligence firm alerted more than 60 organizations – institutions of higher education and governmental entities – that their internal databases had been breached by a Russian-speaking...more

Sony Cyber-Attackers Lurking at Financial Supervisor “Watering Hole” Target Banks and Others

Cybersecurity specialists at BAE Systems and Symantec announced last week new evidence suggesting that the criminals behind the notorious 2014 attack on Sony Corp. are also responsible for recent cyber-attacks involving 104...more

Cybersecurity Obligations of Directors - Guidance from the United States Decisions

Your organization will in all likelihood suffer a cyberattack. According to a recent study by Accenture, the average Canadian organization faces about 96 cyberattacks per year, nearly one third of which result in a security...more

China moves to implement security review of network products and services: but leaves foreign investor and manufacturer concerns...

On 4 February 2017, the Cyberspace Administration of China issued a draft of the Network Products and Services Security Review Measures (“Draft Measures”) for public comment: the Draft Measures remain open for comments until...more

Former NSA Contractor Indicted for Theft of Government Property

The United States Department of Justice (DOJ) has announced that a former contractor of a defense contractor has been indicted for stealing over 75 percent of hacking tools belonging to the Nations Security Agency’s offensive...more

TortSource: Ransomware: A Reportable Breach?

In the past several years, a huge increase has occurred in the number of electronic attacks in the United States using ransomware, a form of malware that targets and encrypts critical data and systems for the purpose of...more

Ruling Vacating Target Consumer Class Settlement Highlights The Problem Of Standing In Data Breach Cases

When hackers steal consumer data, injury to consumers is not a foregone conclusion. This is particularly so where credit and debit card numbers are stolen. Banks, not consumers, bear the cost of fraudulent charges. ...more

Ransomware? Everywhere!

The definition of “ransomware” can sound pretty academic. For example, the FBI describes ransomware as “a type of malware installed on a computer or server that encrypts the files, making them inaccessible until a specified...more

St. Jude Cybersecurity Vulnerability Extended to Provider-Owned Devices

Earlier this week, the U.S. Department of Homeland Security (DHS) updated a prior advisory revealing cybersecurity vulnerabilities in St. Jude Medical’s Merlin@home transmitter....more

Hotel Cybersecurity: What can happen when hackers strike?

Last year, at the Global Hospitality Group’s Meet the Money™ Conference, I participated in a panel on Cybersecurity and we discussed how cybersecurity issues affect the hotel industry. One of the comments was that hotels,...more

CFOs Identify Cyber-Attacks as One of their Top Operational Risks

FM Global and CFO Research Services have partnered together and recently issued a study titled “Finance’s Role in Operational Risk Management: CFO Research on Building a Resilient Company.” ...more

Business Cybersecurity: Two Recent Court Decisions Highlight the Need to Take Preemptive Action Against Data Breaches

Nowadays, the prudent business owner should be cognizant of cybersecurity and the public relations and legal costs that can arise from a data breach. By holding personal information of customers, employees, or anyone else,...more

Eighth Circuit Remands Proposed Settlement in Target Data Breach Class Action

The Eighth Circuit Court of Appeals has remanded a $10 million settlement in the Target data breach class action on the grounds that the district court had not rigorously analyzed the propriety of the class...more

What Privacy Counsel Can Learn from the Unclassified Intelligence Report on Russian Activities and Intentions

Civilian privacy officers and counsel have a rare opportunity following the publication of the January 6, 2017 report from the Office of the Director of National Intelligence, commissioned by Former President Obama, regarding...more

Mainbrace: January 2017 (No. 1)

As we launch into a new year, uncertainty remains the word of the day. Whatever your political leanings, it would be hard to dispute that the inauguration of the Trump administration augurs change on many fronts, from...more

Privacy Perils: The Numbers (Might) Lie

As if there weren't enough concerns over the security of your banking and credit card accounts – thefts of card numbers, card skimmers and online account hacking, to name a few....more

Data Breaches: An Employer’s Duty to Protect Employees’ Personal Information

Recently, there has been much discussion about the Superior Court of Pennsylvania’s ruling in Dittman v. UPMC, which affirmed a lower court’s order dismissing an employee class action against their employer over a data...more

Cyber-physical Attacks on Critical Infrastructure: What’s Keeping Your Insurer Awake at Night?

Cyber-physical attacks on critical infrastructure that have the potential to damage those physical assets and to cause widespread losses to third parties are keeping your insurer awake at night. A cyber-physical attack on...more

Cancer Services Provider Confronts Ransomware Bully

My newest hero in the fight against ransomware is Little Red Door Cancer Services of East Central Indiana (Little Red Door). I am sending a donation to it to celebrate its courage in the last few weeks. Little Red Door...more

You Asked: Can My Employees Hack My Company?

Yes! Employees and other insiders – think Edward Snowden – can, and in fact, do play a role in most data breaches or cyber-security incidents. Companies must ensure their data protection policies include not only training but...more

Employer Did Not Owe Legal Duty to Protect Employees' Hacked Personal and Financial Records

University of Pittsburgh Medical Center (UPMC) maintained a human resource database containing current and former employees' names, dates of birth, social security numbers, tax information, addresses, salaries, and bank...more

Vendor Causes Breach of Over 5,000 Patient Records

The continued risk that vendors pose to companies, including health care entities cannot be overemphasized. This week, Sentara Healthcare (Sentara) announced that one of its third-party vendors was the victim of a...more

618 Results
|
View per page
Page: of 25
Popular Topics

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×