Cybersecurity Hackers

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Insurance News, Spring 2016

Hackers interfere with a GPS signal, causing a vessel’s onboard navigation systems to falsely interpret position and heading. Somali pirates employ hackers to infiltrate a shipping company’s network to identify vessels in the...more

New report warns health care industry to expect more ransomware attacks

A new report of a survey of around 30 mid-sized hospitals by the Health Information Trust Alliance (HITRUST) concludes that health care entities should be prepared for an increase in ransomware attacks in the near future....more

The President Agrees: Cybersecurity Must Include Your Car

For those of us who watch the automotive industry, the most interesting name on the list of appointees to President Barack Obama’s Commission on Enhancing National Cybersecurity was Joe Sullivan. Why Mr. Sullivan? Because he...more

Revenge of the Dorks: Their Time Has Come and They Might be Malicious

A nerd. A dork. A geek. You’ve seen them. You know them. Maybe you are one of them. And you definitely know the type. In fact, it was way back in the 1980s when a group of bullied collegiate outcasts rose up to defeat an...more

Preparing Your Organization Today to Win Its Future (Possibly Inevitable) Cyber Lawsuit: Making Crown Jewels Out of Paper

One day in the not too distant future, your organization may be fighting to protect its balance sheet against high-stakes claims in a cyber tort trial. Arrayed against you will be the best of the class action plaintiff’s...more

DHS Warns of New Ransomware Threats

The Department of Homeland Security (“DHS”) recently issued a joint alert with the Canadian Cyber Incident Response Centre warning of two new ransomware threats behind recent well-publicized attacks against healthcare...more

NHTSA’s Claimed Jurisdiction Over Software and Applications May Stifle Innovation

Motor vehicle technology is rapidly changing to enhance safety and provide navigation, mobility, and accessibility solutions for drivers. Manufacturer-installed automatic braking, adaptive cruise control, blind-spot...more

Cybersecurity Claim Under CGL Policy Prevails Against Strong Insurance Industry Pushback, As Fourth Circuit Upholds Policyholder’s...

Action Item: In a digital age, where companies and individuals increasingly rely on the Internet in their personal and commercial activities, the Travelers Indem. Co. of Am. v. Portal Healthcare Solutions, LLC, No. 13-1944...more

Cyber Attacks Continue to Grow and Evolve

Cyber criminals continue to prey on websites with unpatched vulnerabilities and ill-protected point of sale (POS) systems to steal credentials such as personal data, credit card numbers and bank account details. Common...more

FBI issues another warning of a “dramatic increase” in phishing spoofs of CEOs

We have consistently reported about increased phishing attacks through emails that purport to come from high level executives, including CEOs. According to the FBI, the hackers use sophisticated social engineering to spoof...more

Sony settles employees’ class action suit for up to $8M

The Sony data breach in 2014 was one of the most significant breaches experienced and was a first on many fronts. It was alleged to have been caused by North Korean hackers (calling themselves Guardians of Peace) seeking to...more

Open Communication and Collaboration Make Campus Networks Vulnerable to Cyberattack

Institutions of higher education face growing threats from cyber attackers. Instances of attacks on universities are increasing, with recent large-scale attacks at some of the country's top universities. Approximately one...more

BakerHostetler Data Security Incident Response Report: Being “Compromise Ready” Better Positions Companies to Respond to Incidents...

On March 30, 2016, we released our second annual Data Security Incident Response Report. The report analyzes data from more than 300 incidents on which the firm advised in 2015. The report looks at causes of incidents,...more

Recent indictment underscores threat to financial institutions’ cybersecurity

In an era of cyberwarfare, financial institutions can find themselves in the crossfire. The U.S. government indicted seven Iranian hackers last week, charging the individuals for their roles in a 2011 series of cyber-attacks...more

Cyber-Security Alert: D.C. Area Hospital Chain MedStar Targeted By Hackers

MedStar, a Washington, D.C.-area hospital chain, became the latest healthcare industry victim of a cyber-attack when hackers breached its systems with a crippling virus. MedStar operates 10 hospitals in the D.C./Baltimore...more

Is Cyberinsurance the Chicken or the Egg?

The insurance industry has been making the case to Congress that cyberinsurance can be a path to good security practices, encouraging different groups inside an organization to better communicate with one another. The process...more

FBI issues warning to law firms

The FBI has issued a Private Industry Notification to law firms indicating that a cyber crime insider trading ring is targeting “international law firm information used to facilitate business ventures.” According to the FBI...more

FBI and Traffic Safety Administration issue warning about car hackings

On March 21, 2016, the FBI and the U.S. National Highway Traffic Safety Administration issued a public safety announcement outlining the dangers of cars getting hacked. The announcement follows the media reporting about...more

Cyber Insurance: Make Sure You Understand Your Coverage

Today, businesses are increasingly purchasing cyber-specific insurance in an effort to mitigate the financial impact of a breach or other cybercrime. In terms of what might be covered in a cyber insurance policy, there are...more

Body hackers: Implanting RFID chips in the human body

An RFID chip can hold encrypted information, unique enough to say, identify you as the owner of your smartphone (to unlock it), or open a door (to your home). A bizarre new company, Grindhouse Wetware, started by Amal...more

Response to data breach at UCLA creates controversy

Universities are an attractive target for hackers because they contain many access points in their networks, and the networks contain financial and personal data as well as intellectual property. Last summer, hackers breached...more

TruShield report says more cyber-threats in 2016 than ever before

TruShield released its 2015 Annual Cyber Threat Intelligence Report, and the outlook: 2016 will see even more ransomware and phishing attacks than last year. And guess who is facing the biggest threat? Law firms. Paul...more

Hacking Gains New Heights with Threat to Big Pharma

Cyber attacks have broken free from their initial molds of carting off with consumer credit card numbers or stealing someone’s identity. The act of digitally digging into cyberspace has hit the U.S. Department of Health &...more

Developments in Cybersecurity: Privacy Laws, Hacking Beyond Customer Data, and Communicating with Corporate Boards

I. Legal Exposure to Federal and State Privacy Laws - A. Federal Statutes and Enforcement - 1. Federal Trade Commission Act, 15 U.S.C. §§ 41-58 - The Federal Trade Commission (FTC) has emerged as the leading...more

Another Cyber Coverage Gap? Some Carriers Resisting Coverage Of Commercial Cyber Fraud

In the fast-developing world of cyber threats and corresponding cyber coverage, at least two insurance carriers are pushing back against covering losses arising out the transfer of funds to cyber fraudsters after employees...more

383 Results
|
View per page
Page: of 16
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×