News & Analysis as of

Hackers

Privacy Perils: Don't "Play" Around with Some Google Apps

by Bass, Berry & Sims PLC on

A group of researchers at the University of Michigan has discovered that hundreds of applications in Google Play, whose function is to turn Android phones into a server that allows the user to connect their phone directly to...more

2017 Security Breaches: Frequency and Severity on the Rise

by Revision Legal on

We are only six months into 2017, and we can already tell that it is going to be a bumper year with regard to instances of data security breaches. Looking back at the hacking statistics from 2015 and 2016, we should not be...more

Malware Capable of Shutting Down Electric Grids Confirmed

by Hogan Lovells on

Malware was recently identified that appears to have been designed and deployed by a nation-state to target and shut down electric grids. According to published reports, this malware currently appears to be capable of...more

Autonomous Cars One Step Closer to Reality in Colorado

by Ballard Spahr LLP on

This month, Colorado joined a growing list of nearly half of U.S. states when it enacted a law approving the use of autonomous driving systems. The Colorado law governs systems capable of controlling highly and fully...more

Over 80 Percent of Hacking Related Breaches Were Related to Password Issues: Cybersecurity Trends

by CloudNine on

I’ve referred to last year’s Verizon Data Breach Investigations Report (DBIR) in several webcasts lately (including this one) and realized that this year’s report should have already come out by now. Sure enough it has,...more

Data Gets Personal

by Conduent on

The average total cost per data breach for a U.S. company is $4 million, not to mention reputational damage to the brand and possible litigation1 . No entity is immune from ransomware gangs, careless employees exposing...more

Yet another Target settlement highlights data breach costs

by Thompson Coburn LLP on

In what appears to be the closing act of the saga that is the Target data breach, on May 23 the retailer announced it had reached a settlement agreement with a coalition of 47 states’ attorneys general. Pursuant to the...more

ECRI Institute Releases Guidance on How to Protect Your Medical Device Systems

by Knobbe Martens on

The ECRI Institute released new guidance in its article: “Ransomware Attacks: How to Protect Your Medical Device Systems” on May 18, 2017. The report recommends various protective actions for hospitals to take and points to...more

OneLogin Suffers and Notifies Customers of very Sophisticated and Scary Intrusion

San Francisco based OneLogin, which provides single sign on and identity management services for companies and app vendors, recently notified its users that it has discovered an unauthorized access to its data....more

“Fireball” Malware a Threat to Health Care Industry

A new report released by Check Point has security personnel working in the health care industry particularly concerned and they are warning their colleagues about the existence of “Fireball.”...more

Privacy Perils: 2FA or Not 2FA - That is the Question

by Bass, Berry & Sims PLC on

We've previously described and recommended the use of multi-factor (or two factor) authentication (2FA) on multiple occasions...more

Privacy Tip #91 – Teen App Wishbone Compromised—Female Teenagers at Risk

Social networking app Wishbone, which is used primarily by teenage girls to vote on various teenage type quizzes, like favorite entertainers or fashion, has been hacked....more

WannaCry, Adylkuzz, and Cyber Breach: How to Maximize Insurance Coverage in the Event of Cyber Attack

by King & Spalding on

The worldwide hack that surfaced on May 12—known as “WannaCry”—wreaked havoc on hundreds of thousands of computers across the globe and is one of the biggest ransomware hacks the world has ever experienced. The U.K.’s...more

Compliance into the Weeds-Episode 41, Reality Winner and Internal Controls

by Thomas Fox on

In this episode, Matt Kelly and I take a deep dive into the weeds around the story of Reality Winner, the leaking of the NSA report of Russian hacking of the US Presidential campaign and election. We tie it to internal...more

Filling in the Gaps on Medical Device Cybersecurity

by Hogan Lovells on

Cybersecurity has become a hot button topic for many in the medical device industry following the announcement of several high-profile medical device vulnerabilities and in light of the recent WannaCry ransomware attack that...more

Business Litigation Alert: "Expect More. Pay More. No Sale for Target After Paying Out Over $60M in Data Breach Settlements"

by Porter Hedges LLP on

Last week, Target announced that it reached a settlement of $18.5 million with attorney generals in 47 states and the District of Columbia over the massive security breach it suffered in 2013....more

Home Depot Settles Data Breach Suit for $25M

As a result of a $25 million settlement reached with the remaining banks and credit unions, the litigation against Home Depot stemming from its 2014 data breach will finally end....more

Record-Setting Target Settlement Changes Expectations for Institutional Data Security

On May 24, 47 state attorneys general settled with Target for $18.5 million regarding its 2013 data breach. The implications of the agreement may be more far-reaching than many companies realize. The fact that nearly all...more

The Ninth Circuit Holds that California’s Anti-Hacking Law, Penal Code Section 502, does not Proscribe Unauthorized “Access” to a...

by Nossaman LLP on

California’s Computer Data Access And Fraud Act, Cal. Pen. Code, § 502 (“CDAFA”) is a state law analog to the federal Computer Fraud and Abuse Act, 18 U.S.C. § 1030 et seq. (“CFAA”). Both are aimed at fighting unauthorized...more

Want to Find Malware in Your Network Sooner? Listen to Your Network: Cybersecurity Best Practices

by CloudNine on

One of the most telling statistics about cybersecurity and data breaches that we covered during Wednesday’s webcast was from last year’s Verizon Data Breach Incident Report which said that almost 93 percent of breach...more

Privacy & Cybersecurity Update - May 2017

In this edition of our Privacy and Cybersecurity Update, we take a look at the Trump administration's executive order outlining its cybersecurity plans, Acting FTC Chairwoman Maureen Ohlhausen's comments on the possible...more

Recent Healthcare Data Breaches

by Revision Legal on

Healthcare computer systems harbor the most useful three pieces of personal identifying information that can be used for fraud and identity theft – names, Social Security numbers, and dates of birth. With these three pieces...more

Pacemakers at Risk for Remote Tampering

A new study by WhiteScope concludes that pacemakers from four manufacturers contain security weaknesses that expose them to remote tampering. Pacemakers run on radio frequency and health care providers can adjust them to...more

Post-WannaCry—US-CERT Warns of Samba Security Flaw

Following the massive WannaCry event, the mantra among security folks is push patches to vulnerabilities as soon as they are released. US-CERT issued a warning late last week that there is a newly discovered flaw,...more

Privacy Tip #90 – Payment Card Breaches - Both Sides of the Story

We hear daily about another payment card breach at a retail store, restaurant chain or hotel line. The response to a payment card breach differs from company to company. I get a lot of questions about payment card breaches...more

1,194 Results
|
View per page
Page: of 48
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.