Hackers

News & Analysis as of

Health Care Employees at the Frontline in The Battle Against Ransomware

As recent noteworthy attacks have shown, no health care organization or provider is safe from ransomware threats, and the results of an attack can be devastating. Ransomware is a virus which limits or eliminates access to...more

8th Circuit Upholds Data Breach Coverage for Bank Loss Following Hacker’s Fraudulent Transfer

Last week, the Eighth Circuit upheld a lower court’s ruling in State Bank of Bellingham v. BancInsure Inc., finding that a bank employee’s negligence in securing its computer network did not preclude coverage for a data...more

Data Privacy Considerations for Starting or Evaluating a Bounty Program

Data security officers typically look for security risks by monitoring reports from automated security systems, listening to employees’ reports of security issues, and/or auditing IT systems. There is a great deal of debate,...more

SSO – Single Sign On

Due to recent high profile data breaches users have a heightened awareness of security and how they manage or don’t manage their various account credentials. People are beginning to pay more attention to the advice given to...more

Senate hearing reviews ransomware in a school system

On May 18, the Senate Judiciary Committee Subcommittee on Crime and Terrorism heard from Charles C. Hucks, the Executive Director of Technology for the Horry County, South Carolina, School System. The 52 schools and the...more

Employment Law Navigator – Week in Review: May 2016 #4

Last week the long-awaited final FLSA overtime regulations were published. The regulations are intended to make an additional 4.2 million workers eligible for overtime. The new rules raise the salary threshold for exempt...more

Most Frequently Hacked Industries Now Includes Manufacturing

Second only to health care, the manufacturing industry is now one of the most frequently hacked industries (according to IBM’s 2016 Cyber Security Intelligence Index). And more importantly, automotive manufacturing was the...more

TeslaCrypt Ransomware Developers Retire, Release Master Decryption Key

Ransomware is a particularly nefarious type of malware that hijacks computers and forces victims to pay a ransom in order to access their files. One of the reasons it is so successful is because ransomware developers use...more

Are You Secure?

U.S. Securities and Exchange Commission (“SEC”) Chair Mary Jo White confirmed Tuesday that cyber security is the biggest risk currently facing the financial system. Her strong warning of the threat posed by hackers follows...more

LinkedIn admits that 2012 data breach in fact affected 117 million users’ data

A LinkedIn data breach in 2012 supposedly exposed 6.5 million LinkedIn users’ hashed passwords. LinkedIn announced yesterday (May 18, 2016) that in fact, it impacted more than 177 million user accounts, and that the...more

Your daily dose of financial news The Brief – 5.20.16

Manhattan USA Preet Bharara’s back in front of the cameras and back on the insider-trading horse with the announcement yesterday of criminal charges against well-known sports bettor Billy Walters and former investment banker...more

Cyber-Security and the Rise of the Vigilante Hacker - Can illegally obtained data be used in a civil proceeding?

In the world of cyber hacks and leaks, there are two general categories of players: the fraudsters who steal data in order to obtain a profit, and the “hacktivists” who expose data, purportedly for the greater good....more

New Study confirms that 9 out of 10 businesses have experienced a hacking incident in the last year

Hartford Steam Boiler released a study on May 17, 2016, that states that nine out of ten businesses have experienced at least one hacking incident in the past year, which represents a 21 percent increase since 2014....more

An Addendum to the Scariest Hack So Far

Andy Johnson-Laird, President of Johnson-Laird, Inc., was kind enough to offer advice on three security techniques he recommends to detect and deny hackers, such as those we discussed in last week’s blog post....more

Cyber Security

Roughly one million pieces of malware—computer viruses or malicious software—are released every day. In recent years, we’ve witnessed an unprecedented level of activity in the cyber arena, both in the form of increased...more

DOJ Sentences Founder of Money Laundering Operation to 20 Years Imprisonment

On May 6, the DOJ announced that U.S. District Judge Denise L. Cote sentenced the founder of a Costa Rica-based virtual currency company to 20 years imprisonment and ordered him to pay a $500,000 fine for charges related to...more

Come Back With a Warrant: Proposed Rule Change Expands the Government’s Ability to Access Electronically Stored Information in...

On April 28, 2016 the United States Supreme Court proposed a modification to Federal Rule of Criminal Procedure 41 that significantly alters the manner in which the government can obtain search warrants to access computer...more

Round Two: SWIFT Reports Another Bank Attack

For the second time this year, SWIFT is reporting another cyber-attack on a commercial bank. In a notice issued this morning, SWIFT said that attackers with a “deep and sophisticated knowledge of specific operational...more

Wendy’s confirms data breach of point of sale system

Wendy’s confirmed yesterday in its first quarter financial statement that its investigation into a credit card breach did uncover malicious software on its point of sale systems on fewer than 300 of its stores nationwide. It...more

Sentencing of Keys, Responsible for 2010 LA Times Data Breach, Should Remind Companies to Fortify Cybersecurity and Plan Response...

A federal judge in California recently sentenced a former employee of KTXL Fox40, a Tribune Company-owned television station, to two years in prison for three felony convictions relating to his assistance to the “hacktivist”...more

House Caucus Formed To Protect The Security Of Cars

On April 28, 2016, four members of the U.S. House of Representatives launched a bipartisan caucus dedicated to addressing security and safety concerns raised by new innovation in connected and autonomous vehicles (or...more

A Closer Look At The Fallout From The Home Depot Data Breach

More than a year and a half ago, Home Depot announced that it had been a victim of one of the largest data breaches in U.S. history. Media outlets reported that the breach had affected Home Depot’s customers who had made...more

The Scariest Hack So Far

Hackers have upped the ante. Data controllers wax fondly about the good old days when data was outright stolen. Back then, in 2013, there was a sense of fair play. Trolls did troll things. Assuming the victim implemented and...more

Stick Up Your Hands! The Increasingly Common Form of Ransom, and the Insurance That Will Help You Recoup Some of Your Funds

It was recently revealed that the Hollywood Presbyterian Medical Center paid $17,000 in bitcoins as ransom to hackers who infiltrated and disabled its computer network. This is not the first time hackers have held up a...more

American Dental Association inadvertently mails USB drives infected with malware to its members

The American Dental Association (ADA) recently mailed 37,000 credit card sized flash drives to its members that included new billing codes, entitled 2016 CDT Manual. Unfortunately, also included on the USB drive was malware...more

678 Results
|
View per page
Page: of 28
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×