Hackers

News & Analysis as of

Wendy’s Successful in Trimming Data Breach Class Action Suit But No Dismissal

We have previously discussed the class action case filed against Wendy’s as a result of a data breach. The case was initially dismissed based upon lack of standing, but the plaintiffs were given the opportunity to amend the...more

21st Century Data Breaches: Not All Fun and Games

Data breaches can occur in the most surprising places. When data breaches affect sensitive, private information—especially those of children—companies can face scrutiny from regulatory agencies and be exposed to civil (and...more

Email Marketing Attorneys and the FTC Clash Over and Settle Spam Claims

Last week, email marketing lawyers and the Federal Trade Commission (“FTC”) announced a $500,000.00 settlement between the agency and a company offering weight-loss products which were allegedly marketed via email in...more

Privacy Perils: Data Collection from Connected Devices

While the WikiLeaks CIA dump makes for interesting reading about our nation's capability to hack certain connected devices, it does not mean we are all being spied on while waiting for a microwave burrito. However, fanciful...more

Companies May Soon Have a New Defense Against Cyber-Attacks

The Active Cyber Defense Certainty Act is a new bill that is gaining positive bipartisan support and significant interest from business communities, lawmakers and academics. The proposed bill amends the Computer Fraud and...more

Home Depot Settles with Financial Institutions

A federal judge has preliminarily approved a proposed settlement of $25 million between Home Depot and financial institutions that issued payment cards that were affected by the Home Depot data breach in 2014. This proposed...more

The Two Faces of Hacking: Data Scientists are Doing Bad to Do Good.

American and Canadian data scientists, librarians, hackers and activists have united in a “rogue” movement to locate and archive climate data maintained by U.S. agencies. Environmental scholars and librarians at the...more

Wendy’s Executives and Board File Motion to Dismiss

We previously reported that Wendy’s was hit with a putative class action shareholders’ derivative suit in December following its data breach in 2016. Late last week, the executives and Board of Wendy’s filed a Motion to...more

Cybersecurity Hacks Remind Law Firms to Secure Their Data

In late December 2016, the United States Attorney’s office in Manhattan unsealed an indictment accusing three Chinese traders of hacking into two US-based global law firms to obtain insider information on mergers and...more

Federal Agencies Hit with 30,899 Cyberincidents in 2016

The Office of Management and Budget (OMB) released a report this week indicating that federal agencies experience almost 31,000 cyberincidents in 2016. The Federal Deposit Insurance Corporation was responsible for 10 of 16...more

Data Breach Response: Orchestrating Legal and Technical Resources to Contain and Mitigate

Data breaches are inevitable and the aftermath of a data breach can be a significantly difficult exercise. When legal and technical resources work together, both proactively and reactively, the response can run more smoothly....more

Your Daily Dose of Financial News

Financial transaction provider Euronet Worldwide’s made an unsolicited bid to acquire MoneyGram for about $1 billion in cash, throwing a wrench into Ant Financial’s plan to use MG as a way to break into the US market and...more

The Impact of Cybersecurity Concerns on M&A Activities is Growing: eDiscovery Trends

This is the second story that I’ve covered in the past several months where cybersecurity concerns impacted merger and acquisitions. See below for more on the first one… After Verizon Communications took a $350...more

Cybersecurity: Yes, They Will Hack Your Car

Auto manufacturers are increasingly equipping vehicles with rapidly advancing technologies, raising concerns regarding how the public will be affected by these changes. Manufacturers are beginning to implement automated...more

Are You Liable If Your Station is Hacked?

Somehow, hackers manage access to your radio station audio chain and broadcast alternate programming with indecent or profane content. What will be the FCC’s reaction? Do you notify the FCC? Originally published on Radio...more

“W-2 Phishing Attacks Targeting Businesses to Cash in on Busy Tax Season: 10 Tips to Protect Your Business”

Cyber criminals are taking advantage of tax season to lure valuable W-2 information from vulnerable businesses. An example of a common phishing scheme starts with a scammer posing as a legitimate employee of a company,...more

Medical Device Malware Medjack.3 Poses Threat to Hospitals

Medjack is a form of malware that was specifically developed to attack medical devices, such as heart monitors, CT and MRI machines, insulin pumps and PAC systems....more

Yahoo Breaches Cost Shareholders $350 Million From Lowered Purchase Price, CEO Forfeits $14 Million in Compensation

Yahoo’s troubles for failing to timely disclose security breaches provides rare insight into quantifying the financial and other costs to a company’s shareholders and leadership when a security breach occurs and is...more

Verifone Investigating Breach of its Internal Corporate Network

Verifone, the largest maker of credit card point of sale terminals in the U.S., which assists various industries, including retailers, with credit and debit card swipe and process services, has affirmed that it is...more

Privacy Tip #77 – FTC Offers Tips to Businesses That Have Been Impersonated by Phishing Schemes

On March 6, 2017, the Federal Trade Commission (FTC) released tips and a video to businesses that have been impersonated by Phishing schemes. The guidance, entitled “Has a phishing scam hooked your company’s good name?”...more

Yahoo incident reinforces vital role of counsel in cybersecurity

It has widely been reported that Yahoo has experienced significant legal and business impacts as a result of several cybersecurity breaches. On 1 March, Yahoo disclosed the findings of an independent board committee and...more

It's W-2 Phishing Season: How to Stop, and Respond to, Tax-Related Identity Fraud Aimed at Your Organization's Employees

HR and payroll professionals nationwide have been, and will continue to be, targeted with e-mails apparently sent by a senior executive but actually sent by scammers who ask for a prompt reply with the 2016 W-2s for all of...more

Experts Warning of New Google Chrome Malware Scam

Cybersecurity experts have been warning users about a Google Chrome scam that targets Windows users in the US, UK, Canada and Australia. The scam, which began in December, uses a pop-up stating “The ‘HoeflerText’ font wasn’t...more

Horizon BCBS of New Jersey Pays State $1.1 million for HIPAA violations

We often forget that state AG’s have jurisdiction under the HIPAA Omnibus Rule to levy fines and penalties against HIPAA covered entities for violations. This is because the Office for Civil Rights has traditionally taken the...more

SEC Speaks 2017

Commission staff highlight key developments and successes in the SEC enforcement program. As they do every year, senior officials from the US Securities and Exchange Commission (SEC or the Commission), including current...more

1,043 Results
|
View per page
Page: of 42
Cybersecurity

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×