Hackers

News & Analysis as of

FireEye report shows PoS attacks have compromised more than 20 million cards

FireEye recently issued a report that indicates that bank card data of over 20 million individuals has been compromised since 2014. According to the report, point of sale attacks that have affected the retail and hospitality...more

Wyoming Medical Center victim of phishing scheme affecting 3,184 patients

Phishing incidents in February that may have compromised the data of 3,184 patients, including their names, dates of birth, medical record and account numbers, dates of service and medical information is causing Wyoming...more

AOL, Dropbox and the Big “uh-oh”

A New York couple brought suit against their former law firm because it used an America Online account to transact firm business. If you are my age you probably remember that AOL and “You’ve got mail!” were the future—back...more

3 Simple Tools to Help Optimize Your Law Firm’s Website in 2016

Creating a great website that speaks to your audience, is easy to use, and encourages interaction with your brand is no small feat. However, many companies and law firms may not realize that it’s only half the battle due to...more

From Ashley Madison to the Panama Papers: Is Hacked Data Fair Game?

We’ve previously written about the distinctions between hacking credit and other financial data in comparison to hacking private information. (See Ashley Madison and Coming to “Terms” with Data Protection.) The issue of how...more

Police department drones vulnerable to hackers?

While there has been much debate over police department drones and individual privacy, now, a new concern has emerged: the threat of hackers. Recently, a security researcher, Nils Rodday, used a laptop and $40 worth of...more

Privacy Tip #31 – Landlines still a safe way to communicate but telephone companies want to drop them

I am pretty up to date on data privacy and security and technology, but the 60 Minutes episode this past Sunday night floored even me. If you didn’t see it, it is worth streaming. Basically, 60 Minutes showed Karsten...more

Insurance News, Spring 2016

Hackers interfere with a GPS signal, causing a vessel’s onboard navigation systems to falsely interpret position and heading. Somali pirates employ hackers to infiltrate a shipping company’s network to identify vessels in the...more

New report warns health care industry to expect more ransomware attacks

A new report of a survey of around 30 mid-sized hospitals by the Health Information Trust Alliance (HITRUST) concludes that health care entities should be prepared for an increase in ransomware attacks in the near future....more

How to Avoid or Respond to Wire Transfer Fraud

Businesses are increasingly falling victim to wire fraud scams – sometimes referred to as “man-in-the-email” or “business email compromise” scams. Although there are multiple variants, a common situation involves an attacker...more

Ashley Madison attorney-client communications leaked in data breach

We all remember the Ashley Madison data breach. The hackers, calling themselves “The Impact Team” requested that the Ashley Madison extramarital affair site, and Cougar Life and Established Men sites be “taken down.” When...more

Your daily dose of financial news The Brief – 4.20.16

As Yahoo took stock of its suitors yesterday, it released word that its business “continued to deteriorate in the first quarter, putting more pressure on the company to find a buyer quickly for its Internet operations.”...more

Class Action Roundup: Winter 2016

Where the (Class) Action Is - This issue of Roundup wraps up 2015 with another slate of interesting cases spanning industries and subject matter. The running theme of ascertainability is now stretching into antitrust...more

The President Agrees: Cybersecurity Must Include Your Car

For those of us who watch the automotive industry, the most interesting name on the list of appointees to President Barack Obama’s Commission on Enhancing National Cybersecurity was Joe Sullivan. Why Mr. Sullivan? Because he...more

Revenge of the Dorks: Their Time Has Come and They Might be Malicious

A nerd. A dork. A geek. You’ve seen them. You know them. Maybe you are one of them. And you definitely know the type. In fact, it was way back in the 1980s when a group of bullied collegiate outcasts rose up to defeat an...more

Preparing Your Organization Today to Win Its Future (Possibly Inevitable) Cyber Lawsuit: Making Crown Jewels Out of Paper

One day in the not too distant future, your organization may be fighting to protect its balance sheet against high-stakes claims in a cyber tort trial. Arrayed against you will be the best of the class action plaintiff’s...more

DHS Warns of New Ransomware Threats

The Department of Homeland Security (“DHS”) recently issued a joint alert with the Canadian Cyber Incident Response Centre warning of two new ransomware threats behind recent well-publicized attacks against healthcare...more

NHTSA’s Claimed Jurisdiction Over Software and Applications May Stifle Innovation

Motor vehicle technology is rapidly changing to enhance safety and provide navigation, mobility, and accessibility solutions for drivers. Manufacturer-installed automatic braking, adaptive cruise control, blind-spot...more

Cybersecurity Claim Under CGL Policy Prevails Against Strong Insurance Industry Pushback, As Fourth Circuit Upholds Policyholder’s...

Action Item: In a digital age, where companies and individuals increasingly rely on the Internet in their personal and commercial activities, the Travelers Indem. Co. of Am. v. Portal Healthcare Solutions, LLC, No. 13-1944...more

Cyber Attacks Continue to Grow and Evolve

Cyber criminals continue to prey on websites with unpatched vulnerabilities and ill-protected point of sale (POS) systems to steal credentials such as personal data, credit card numbers and bank account details. Common...more

FBI issues another warning of a “dramatic increase” in phishing spoofs of CEOs

We have consistently reported about increased phishing attacks through emails that purport to come from high level executives, including CEOs. According to the FBI, the hackers use sophisticated social engineering to spoof...more

Sony settles employees’ class action suit for up to $8M

The Sony data breach in 2014 was one of the most significant breaches experienced and was a first on many fronts. It was alleged to have been caused by North Korean hackers (calling themselves Guardians of Peace) seeking to...more

Is Data Really a “Toxic” Asset?

In his “Data Is a Toxic Asset” blog post, Bruce Schneier argues that data is a toxic asset and that the lesson all the recent data breaches are teaching us is that storing this asset is “dangerous,” because it makes companies...more

Privacy Tip #29 – U.S. + Canada issue joint ransomware special alert—read and follow recommendations

We have frequently alerted individuals and companies about the increasing risk and success posed by sophisticated phishing schemes. It has become such a real and grave problem that the U.S. Computer Emergency Readiness...more

Tidewater Community College hit with phishing scam exposing data of 3,193 employees

Tidewater Community College (Tidewater) has announced that the personal information, including names and Social Security numbers of 3,193 current and former faculty and staff members was compromised in a phishing scheme and...more

644 Results
|
View per page
Page: of 26
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×