Cybersecurity Hackers

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Internet of Things at the Salone, but what legal issues for furnitures?

The Internet of Things will generate 9 billion devices by 2018 according to estimates, but the recent hacker attack that caused a fridge to send over 750,000 spam and phishing messages over the Christmas break create concerns...more

License to Hack? DOJ Seeks Expanded Authority to Use Hacking Techniques

As part of its increased focus on combating cybercrime, the U.S. Department of Justice is pushing to loosen requirements for obtaining search warrants in order to allow them greater freedom to hack into the computers of...more

You're Not Immune: Hackers Target Health Care Providers Of All Shapes & Sizes

For health care providers, exposure to cyberattacks is becoming a stark reality. Findings in a recently released Health Care Cyberthreat Report by cybersecurity leaders confirmed the health care industry's vulnerabilities for...more

Message from New York Court: Rely on CGL Policy Coverage for Data Breaches at Your Own Peril

A New York trial court announced a decision on February 21, 2014, that may be a harbinger of wide-reaching limitations on insurance coverage for data breaches under commercial general liability (CGL) policies. The court’s...more

Valuable $50,000 Twitter Account Allegedly Stolen

There was an interesting January 29, 2014, article on CNET written by Don Reisinger describing how a thief/hacker allegedly hijacked an Internet domain name and e-mail account belonging to Naoki Hiroshima and stole his...more

"Cybersecurity: Amid Increasing Attacks and Government Controversy, a Framework to Reduce Risk Emerges"

2013 likely will be considered a watershed period in the role of cybersecurity in corporate strategy and management. While there were few significant legislative developments, a marked increase in cybersecurity attacks...more

Data Security Breach at Target is an Important Lesson for All Companies

News about the data security breach at Target is rapidly developing. Current reports indicate that in the last few weeks, the credit and debit card information for as many as 40 million Target customers was compromised.1 The...more

Before Becoming The Next Target: Recent Case Highlights The Need To Consider Insurance For Data Breaches

If only one of Target, Snapchat, Facebook, Twitter, Adobe, and so on and so forth, had suffered a serious data breach within the last few months that would be sufficiently troubling. Yet data breaches have become so...more

To 8-K, or not to 8-K? For Target, that is indeed the question.

As anyone with a pulse and a computer, television or carrier pigeon knows, Target Corporation (NYSE: TGT) suffered a major data breach in December – the extent of which is still being uncovered – and pegs the latest number of...more

Scammers Continue to Target Customers

There have been numerous reports that West Virginia Attorney General Patrick Morrisey issued a warning to consumers on Monday, January 13, 204, about a Target gift card scam occurring throughout the country on social media...more

A Weapon Against Hackers on the Home Front

Although headlines have focused on foreign cyberattacks, plenty are U.S.-based—and can be remedied. Over the past year the national press has repeatedly reported on the vulner­ability of our intellectual property to...more

A Weapon Against Hackers on Home Front

Over the past year the national press has repeatedly reported on the vulner­ability of our intellectual property to nation-state hackers like China, which have reportedly accessed and stolen highly con­fidential data by...more

A New Year’s Resolution to Avoid Cyber Attacks: It Is Not IF but WHEN … Just Ask Target

On December 13, 2013, it was reported that Target was the victim of a successful cyber attack, resulting in the theft of personal financial information from up to 110 million Target credit card customers – the largest theft...more

Happy 2014!

After a brief hiatus for the holidays and our “12 Days of Privacy” series, we are back. We have had a series of late year — and new year — data breaches in the news. These latest incidents should prompt New Year’s...more

On the 11th Day of Privacy, class counsel served on me……

. . . a data breach class action. Hackers and plaintiffs’ lawyers could combine to make 2014 the year when class actions concerning theft of sensitive information proliferate. On this 11th Day of Privacy, we look...more

Poetic Justice - 2013 Wrap Up (Part 1 of 2)

This is the time of year to anxiously look forward to all that is anticipated to come in 2014. But it is also the time to look back at all that has happened in 2013. Rather than simply give you links to all of the stimulating...more

Trade Secrets Watch 2013 Year-In-Review

It’s been a hot year in the trade secrets field, with some huge verdicts and settlements, a renewed spotlight on cyberattacks, and an unusual flurry of trade secrets legislation. Trade Secrets Watch’s 2013 Year-in-Review...more

Hacking Back: For Now, Be Vigilant Rather Than a Vigilante

In the cyber-security world, "hacking back" – using hacker-like techniques to defend a company's IT systems by going on the offensive and instituting countermeasures to cyberattacks -- is generating much buzz. For example,...more

Attacked On All Fronts : FTC Defends Its Authority to Sue Companies That Are Victims of Hacking for “Unfair” Security Practices

Getting hacked by Russian hackers three times in two years has turned out to be only half of the problem for Wyndham Worldwide Corporation. The Federal Trade Commission, in a broad interpretation of the authority granted to...more

Cyber Law Tracker: CERT Updates CryptoLocker Ransomware Alert

This year, US-CERT (the United States Computer Emergency Readiness Team) identified a malware campaign titled CryptoLocker, and last week, it updated the alert on this malware. CryptoLocker is a new version of ransomware that...more

2013: Year of the Mega Breach Cybersecurity Awareness Month - A Good Time for a Crisis Audit

Already this year, hackers have perpetrated seven "mega breaches" (breaches involving over 1 million records each), compromising and exposing over 112 million total records. The average size of a data breach in the U.S. this...more

Insuring Your Company Against Cyber-Attacks

Earlier this month, the Department of Justice announced the indictment of 13 individuals associated with the hacker organization Anonymous for a widespread scheme to disrupt and shut down commercial and government websites....more

What To Do When Your Domain is Hijacked?

You just awoke to find your domain name has been hijacked and your website is down, your site replaced by ads for sexual performance enhancing products. Your domain is now owned by an individual in Thailand with a phony name...more

Polsinelli Podcast - Cybersecurity Threats - What Every Business Owner Should Know [Video]

Is your company doing everything it can to protect its electronic data? All too often confidential electronic information is stolen leaving business owners and customers at risk. In this week’s “Inside Law” podcast, ...more

Website Operator Permitted to Revoke Access of Previously Authorized User Under the Computer Fraud and Abuse Act

The Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030) levies penalties on a person who "intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains... information from any...more

61 Results
|
View per page
Page: of 3