Hackers

News & Analysis as of

Cybersecurity Obligations of Directors - Guidance from the United States Decisions

Your organization will in all likelihood suffer a cyberattack. According to a recent study by Accenture, the average Canadian organization faces about 96 cyberattacks per year, nearly one third of which result in a security...more

China moves to implement security review of network products and services: but leaves foreign investor and manufacturer concerns...

On 4 February 2017, the Cyberspace Administration of China issued a draft of the Network Products and Services Security Review Measures (“Draft Measures”) for public comment: the Draft Measures remain open for comments until...more

Former NSA Contractor Indicted for Theft of Government Property

The United States Department of Justice (DOJ) has announced that a former contractor of a defense contractor has been indicted for stealing over 75 percent of hacking tools belonging to the Nations Security Agency’s offensive...more

Privacy Perils: Social Engineering Fraud - the C-Suite Maneuver

It's a common misconception that cyber-criminals use sophisticated technical tools to hack into a person's computer or online accounts. More often than not, cyber attackers use old fashioned trickery or "social engineering"...more

TortSource: Ransomware: A Reportable Breach?

In the past several years, a huge increase has occurred in the number of electronic attacks in the United States using ransomware, a form of malware that targets and encrypts critical data and systems for the purpose of...more

Ruling Vacating Target Consumer Class Settlement Highlights The Problem Of Standing In Data Breach Cases

When hackers steal consumer data, injury to consumers is not a foregone conclusion. This is particularly so where credit and debit card numbers are stolen. Banks, not consumers, bear the cost of fraudulent charges. ...more

Of Greek Gods and Data Breaches

The sorry story of Chris Correa, the St. Louis Cardinal executive convicted of hacking into the Houston Astros computer system expanded last month when Federal Judge Lynn Hughes unsealed details about the extent of the...more

IRS Issues Warning of “Dangerous W2 Phishing Scam”

We always see a surge in W2 email phishing schemes this time of year, as it is tax time, and many individuals are filing their tax returns in order to get a quick refund. So are criminals and cyber-hackers. ...more

Ransomware? Everywhere!

The definition of “ransomware” can sound pretty academic. For example, the FBI describes ransomware as “a type of malware installed on a computer or server that encrypts the files, making them inaccessible until a specified...more

St. Jude Cybersecurity Vulnerability Extended to Provider-Owned Devices

Earlier this week, the U.S. Department of Homeland Security (DHS) updated a prior advisory revealing cybersecurity vulnerabilities in St. Jude Medical’s Merlin@home transmitter....more

Employees Expecting Tax Refunds? So Are Your Hackers

With the beginning of the 2016 tax season, employers should be on high alert for the wave of W-2 spear phishing scams coming their way once again this year. Companies that fall victim to this type of scam likely will be faced...more

Hotel Cybersecurity: What can happen when hackers strike?

Last year, at the Global Hospitality Group’s Meet the Money™ Conference, I participated in a panel on Cybersecurity and we discussed how cybersecurity issues affect the hotel industry. One of the comments was that hotels,...more

Employer (Still) Has No Duty to Protect Confidential Information

The University of Pittsburgh Medical Center continues to get support from the court system in a data breach suit that affected more than 60,000 former and current employees, as Barley Snyder attorneys continue to follow the...more

No Harm, But Foul? FTC Sues Internet of Things Maker D-Link for Security “Vulnerabilities” Despite No Allegations of Breach

Shortly after the new year, the Federal Trade Commission filed suit in the Northern District of California against D-Link Corporation, a Taiwan-based maker of wireless routers, Internet Protocol (IP) cameras, and software...more

CFOs Identify Cyber-Attacks as One of their Top Operational Risks

FM Global and CFO Research Services have partnered together and recently issued a study titled “Finance’s Role in Operational Risk Management: CFO Research on Building a Resilient Company.” ...more

Business Cybersecurity: Two Recent Court Decisions Highlight the Need to Take Preemptive Action Against Data Breaches

Nowadays, the prudent business owner should be cognizant of cybersecurity and the public relations and legal costs that can arise from a data breach. By holding personal information of customers, employees, or anyone else,...more

Major League Baseball fines Cardinals and Plucks Draft Picks for Hacking the Astros

It doesn’t always pay to be a hacker. Major League Baseball (MLB) this week made a strong statement about its tolerance for teams hacking other teams. We previously reported on the incident when a Cardinals employee hacked...more

Eighth Circuit Remands Proposed Settlement in Target Data Breach Class Action

The Eighth Circuit Court of Appeals has remanded a $10 million settlement in the Target data breach class action on the grounds that the district court had not rigorously analyzed the propriety of the class...more

What Privacy Counsel Can Learn from the Unclassified Intelligence Report on Russian Activities and Intentions

Civilian privacy officers and counsel have a rare opportunity following the publication of the January 6, 2017 report from the Office of the Director of National Intelligence, commissioned by Former President Obama, regarding...more

Arming Employers Against Internal Hackers, the 11th Circuit Clarifies CFAA’s “Loss” Requirement

The Eleventh Circuit ruled last week in a wrongful discharge turned Computer Fraud and Abuse Act (“CFAA”) case, spinning the employee’s case against his employer on its head. The facts of Brown Jordan International, Inc. v....more

Mainbrace: January 2017 (No. 1)

As we launch into a new year, uncertainty remains the word of the day. Whatever your political leanings, it would be hard to dispute that the inauguration of the Trump administration augurs change on many fronts, from...more

Privacy Perils: The Numbers (Might) Lie

As if there weren't enough concerns over the security of your banking and credit card accounts – thefts of card numbers, card skimmers and online account hacking, to name a few....more

Data Breaches: An Employer’s Duty to Protect Employees’ Personal Information

Recently, there has been much discussion about the Superior Court of Pennsylvania’s ruling in Dittman v. UPMC, which affirmed a lower court’s order dismissing an employee class action against their employer over a data...more

Cyber-physical Attacks on Critical Infrastructure: What’s Keeping Your Insurer Awake at Night?

Cyber-physical attacks on critical infrastructure that have the potential to damage those physical assets and to cause widespread losses to third parties are keeping your insurer awake at night. A cyber-physical attack on...more

Cancer Services Provider Confronts Ransomware Bully

My newest hero in the fight against ransomware is Little Red Door Cancer Services of East Central Indiana (Little Red Door). I am sending a donation to it to celebrate its courage in the last few weeks. Little Red Door...more

1,012 Results
|
View per page
Page: of 41
Popular Topics

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×