Hackers

News & Analysis as of

Seventh Circuit Allows Data Breach Class Action to Proceed Against Neiman Marcus, Despite Lack of Current Harm to Credit Card...

Data breaches are often followed by class action suits in which the affected individuals seek damages. Corporations defending against such suits have used a 2013 Supreme Court case, Clapper v. Amnesty International, 133 S....more

That is SO last week - July 2015 #4

Last week, the Equality Act was introduced in Congress. If enacted, this historic legislation will prohibit discrimination in employment and other life activities on the basis of sexual orientation and gender identity. It’s...more

“Life is short. Have an affair.”® And have your data hacked and leaked

Hackers calling themselves “The Impact Team” announced on July 15th that it has compromised the extramarital affair site AshleyMadison.com, and companion sites Cougar Life and Established Men, including absconding with up to...more

Seventh Circuit Concludes Plaintiffs Have Standing to Sue in Data Breach Class Action

On July 20, 2015, the U.S. Court of Appeals for the Seventh Circuit held in Remijas v. Neiman Marcus Group that injuries associated with resolving fraudulent charges and protecting oneself against future identity theft after...more

DOJ Cracks Down on Cyber Criminals

The Department of Justice (DOJ) recently announced the largest coordinated international law enforcement effort ever directed at an online cyber-criminal forum. Financial institutions and other companies should consider...more

Forget Uber for a Moment. The Real Danger on the Road (and Elsewhere) May Be Remote Controlled Hijacking

Technology only imagined a decade ago is everywhere. It’s in our hands, on our laps, and on our desks. But it can also be found in our buildings and, increasingly, in and on our transportation infrastructure. Think wireless...more

This Is Not Your Father's Oldsmobile: Car Hacking and the SPY Car Act

Not coincidentally, on July 21, 2015, Wired Magazine published an article with groundbreaking evidence of hacking a car wirelessly, and Senators Edward Markey (D-Mass.) and Richard Blumenthal (D-Conn.) introduced legislation...more

“Life is Short. Have an Affair.” But is it Worth It?

“Life is short. Have an affair.” This advice comes courtesy of the Ashley Madison website, a company which put a spin on the old adage and the dating website industry by building its business around assisting married people...more

GAO Issues Report Citing Shortcomings In Federal Government Cybersecurity

On July 8, 2015, the Government Accountability Office (“GAO”) issued a report finding that agencies across the federal government continue to have shortcomings in preventing, detecting, and responding to cyber threats. The...more

Class Action Suit Filed Against UCLA After It Suffers Massive Data Breach Affecting 4.5 Million Individuals

In yet another data breach affecting millions of individuals, UCLA Health System (“UCLA”) reported on July 17, 2015, that hackers had accessed portions of its health network that contained personal information, including...more

Auto manufacturers’ alliance create information sharing and analysis center for cyber-threats

Twelve automakers that make up the Alliance of Automobile Manufacturers (AAM) have agreed to form an information sharing and analysis center (Auto ISAC) that will facilitate the sharing of cyber security data to stay abreast...more

Seventh Circuit overturns Neiman Marcus data breach class action dismissal

In an unusual turn for recent data breach class action cases, the Seventh Circuit this week found that a likely threat of identity theft is sufficient for a proposed class to have standing to sue Nieman Marcus for a...more

Class Is in Session: The FTC Launches New Data Security Initiative

Why it matters - The Federal Trade Commission (FTC) kicked off a new educational initiative to provide guidance to businesses in the area of data security. Based on the lessons learned from more than 50 of the agency's...more

Orrick's Policyholder Insider Quarterly

Five Lessons Health Care Companies Should Learn From Cyberattacks - The American health care industry is under attack by sophisticated hackers seeking access to electronic medical records. Since January, three health...more

Privacy Tuesday – July 2015: Hack Attack on Adultery Site Ashley Madison

Once again, data breaches and hacks are front and center, so here are three stories you should know about to start your week....more

You Can’t Just WISPer – Employers Must Publish or Display Security Policies

WISP is the acronym for Written Information Security Policy. The information at issue is an individual’s personal information and identifiers, such as a Social Security number, driver’s license number, credit or debit card...more

Cybercrime Forum Darkode nailed by the DOJ and FBI

Last week, (July 15, 2015), the Department of Justice (DOJ) announced that the coordinated law enforcement efforts of 20 countries, including the U.S. effectively dismantled the computer hacking forum Darkode with criminal...more

Spoofing Whales: How Companies Can Protect Their CEOs and CFOs from the "Business Email Compromise”

Cyber scammers continually innovate new means to extract valuable information from unsuspecting victims. And a new form of cyber fraud is exploiting the close relationship between CEOs and CFOs. Identifying this threat — and...more

25 year old sentenced to 13 years for hacking data broker databases

The Department of Justice has announced that 25 year old Hieu Minh Ngo has been sentenced to 13 years in prison. His sentence was lighter than expected because he has cooperated with authorities to catch more identity...more

“Hacking Team” Gets Hacked, Caught Using Trivial Passwords

Until last week, an Italian cybersecurity company known as “Hacking Team” was reputed to be an elite provider of sophisticated spyware and hacking tools to numerous governments, police agencies and intelligence services. But...more

The Internet of Things and the Inevitable Collision with Products Liability PART 2: One Step Closer

The Internet of Things and the Inevitable Collision with Products Liability, published in February 2015, identified a number of factors leading to the emergence and phenomenal growth of the Internet of Things (IoT). It also...more

Corporate Espionage is Real

Last month the country learned about the unauthorized access of the Houston Astros “Ground Control” database, which contained trade talks, proprietary statistics, and scouting reports, by members of the St. Louis Cardinals...more

Coders Oppose Government Access To Encrypted Data

A group of top coding specialists published a paper on July 6, 2015, arguing that law enforcement’s desire to access encrypted data is not only unfeasible, but would also possibly imperil the security and privacy of global...more

Cyber Liability Insurance – Does Your Retail Business Need It?

The news is full these days of hackers stealing credit card and other customer information from United States retailers such as Home Depot, Target, and Neiman Marcus (and the federal government) among others. These...more

Data Breach Decisions Setting A Higher Threshold For Standing For Plaintiffs Do Not Mean Businesses Are Off The Hook

There are only two types of companies left in the United States: those that have been hacked and those that will be hacked. In the last year alone, forty-three percent (43%) of U.S. companies experienced a data breach,...more

251 Results
|
View per page
Page: of 11

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×