Hackers

News & Analysis as of

Privacy Tip #20 – FTC releases new online tools for identity theft victims-take advantage of them!

As one who is frequently asked “What happens when I become the victim of identity theft?” or “How do I prevent myself from becoming the victim of identity theft?”, I am a pretty big fan of the FTC’s website and refer people...more

Tearing Down the Silos

AML and cybersecurity teams must discover what they have in common, identify mutual strengths and weaknesses, and move toward an effective fusion of functions, processes, and mindsets. ...more

Will Wearable Technology Be a Boost To Enterprise Security?

Shiran Kleiderman of K2 Intelligence looks at how wearable technology and the Internet of Things can help boost enterprise security, when done right...more

Government Contractors Brace For Continuing Changes in Cybersecurity Regulations

The federal government has responded to recent data breaches by making cybersecurity a top priority, and it continues to consider and implement a number of regulations that affect government contractors. Over the past...more

Fraternal Order of Police data breach

The nation’s largest police union recently suffered a data breach enabling hackers to steal hundreds of private internal documents including bargaining contracts, the names and addresses of several police officers, and...more

Weak Baby Monitor Security Subject of FTC Internet of Things Study

On January 19, the Federal Trade Commission posted the results of a small study of baby monitor security, finding that four out of five devices tested did not have basic security procedures in place. The FTC warned that such...more

Ukranian cyber hacker pleads guilty

Sergei Vovnenko, a Ukranian hacker, pleaded guilty last week in federal court in Newark, New Jersey to aggravated identity theft and conspiracy to commit wire fraud by using more than 13,000 computers to steal log-in...more

Ukranian cyber hacker pleads guilty

Sergei Vovnenko, a Ukranian hacker, pleaded guilty last week in federal court in Newark, New Jersey to aggravated identity theft and conspiracy to commit wire fraud by using more than 13,000 computers to steal log-in...more

Breaking News: Hacker’s Conviction Affirmed Despite Lower Court’s Error

This week, the United States Supreme Court upheld a conviction under the Computer Fraud and Abuse Act despite the Court’s acknowledgement that the jury had been wrongfully instructed on the elements of the crime charged. ...more

When Mechanical Failure is to Fault

Automobiles have thousands of parts. Each of these parts operate in concert to propel the vehicle down the road. When these parts fail they can make a vehicle unsafe to drive. Brake failures, tire blowouts, malfunctioning...more

Technology Industry Newsletter - January 2016

As we begin the new year, it is a good time to reflect on the emerging trends in technology that present opportunities to be explored by entrepreneurs who are considering starting new businesses and growing existing...more

Spies, Hacking & Civil Liberties in the UK

In late 2015, Theresa May, the UK Home Secretary introduced the Investigatory Powers Bill (the “Bill”). Mrs May stated that the Bill was introduced to ensure that surveillance laws are “modern, fit for purpose and can...more

The Rise of Driverless Cars

Automotive industry experts claim that we will be sharing the road with totally autonomous cars within the next five years. The benefits of driverless cars are obvious. People on average spend about two hours per day in a car...more

Chris Correa Isn’t Billy Beane and This Isn’t Moneyball

The lights going on and off within the head of former St. Louis Cardinals scouting director Chris Correa were once probably flickering more actively than the lights inside of The Staples Center just before the Los Angeles...more

Tax season may bring more breaches; new victim, TaxAct

This tax season, the Internal Revenue Service (IRS) has been working closely with big tax preparation vendors and chains to improve the security this year and safeguard against widespread identity theft. The IRS is now...more

SuperValu Consolidated Class Action Data Breach Complaint Dismissed For Lack Of Standing

On January 7, 2016, the U.S. District Court for the District of Minnesota dismissed for lack of standing the consolidated data breach complaint filed by consumers against SuperValu, Inc., AB Acquisition, LLC, and New...more

MLB Computer Hacking Scandal – The Intersection of Compliance and Cyber Security

Sorry but I have to begin this blog post with a short prescript on the passing of Glenn Frey. The Eagles were such a huge part of my teenage and college years that I am compelled to write about Glenn Frey and the band he...more

Headed Toward a Short Circuit? Robots, Special Education Students, and Legal Risks

When I was a kid, I loved the movie Short Circuit. (I know: I’m both dating myself and making you question my taste in movies). I always wondered if the day would come when I would have my own walking, talking robot friend...more

Former Cardinals Scouting Director pleads guilty to hacking the Astros’ database

Last Friday, Chris Correa, the former scouting director of the St. Louis Cardinals, pleaded guilty in federal court in Texas for unlawfully accessing the Houston Astros’ database, which included scouting and draft...more

Stealing Bases Okay; Stealing Data Not So Much

On January 8, 2016, Christopher Correa, the former director of Baseball Development for the St. Louis Cardinals, pleaded guilty to each count of a five-count criminal information, charging him with felony violations of...more

Former Cardinals Scouting Director Pleads Guilty to Hacking Astros’ Computer Systems

Economic espionage and computer hacking can touch all industries and business types. Computer hacking is a federal crime, and federal prosecutors are aggressively targeting cases involving the unauthorized access of a...more

Sanction rules adopted for cyberattackers

The federal government issued The Cyber-Related Sanctions Regulation on December 31, 2015, which allows the freezing of assets of suspects who aid in cyberattacks. The Regulation follows an Executive Order from April, 2015,...more

“We’ve Been Hacked!”—New Developments in Cyber-Security Litigation

February’s Business Litigation Report advised clients that they could prepare for potential data breaches by conducting readiness audits and preparing cyber incident response plans. (See Traversing the Breach, February 2015.)...more

What’s on the Cybersecurity Horizon for 2016?

The last twelve months saw many high-profile and innovative cyber-threats, costly and embarrassing breaches, and several cybersecurity trends. Many executives and boards have been reactive rather than proactive, catalyzing...more

Quincy Credit Union ATM machines compromised in skimming scheme

Hundreds of Quincy Credit Union (Massachusetts) customers reported that unauthorized ATM withdrawals were made from their accounts over the holiday weekend. Officials now believe that skimmers were placed on ATM machines in...more

554 Results
|
View per page
Page: of 23

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×