News & Analysis as of

Hackers

Privacy Perils: What's in Your Container?

by Bass, Berry & Sims PLC on

The use of "containers" in web application development is growing, but not without potentially increasing threats to the security of the data we store in our apps and devices. Containers are stand-alone packages of software...more

Privacy Tip #97 – Send Your Kid to Cyber Camp This Summer

I have lamented repeatedly that we have a dearth of cyber talent in the U.S. to meet the needs of employers. Many of our clients recruit talent from other countries in order to meet their cyber needs. The need continues to...more

Ashley Madison Settles Data Breach Case for $11.2M

Ashley Madison, which suffered a data breach in 2015 involving the loss of 37 million users’ personal and financial information, has settled the suit for $11.2 million....more

Lessons From the CoinDash Initial Coin Offering Hack

On July 17, 2017, the CoinDash initial coin offering (ICO) was hacked within minutes of its launch, resulting in numerous potential purchasers sending their money to a fraudulent address. The hack has raised many questions...more

Cyber Law Tracker: New Connecticut Cybersecurity Strategy

by Pullman & Comley, LLC on

As its next step in the creation and implementation of a cybersecurity plan, the State of Connecticut has created a Cybersecurity Strategy document. This strategy specifically highlights the roles and vulnerabilities of state...more

Cyber Threats Equal Serious Threats

by Burr & Forman on

Every where you look these days, there seems to be another report of a cyber attack--attacks which do not discriminate based on industry type, size of business, or impact. In other words, everyone is vulnerable. In fact, the...more

Three Million Wrestling Fans’ Data Compromised

World Wrestling Entertainment, Inc. (WWE) has announced that it is investigating a “vulnerability of [a] database” containing over three million users’ names, addresses, email addresses, dates of birth, educational...more

VTech Escapes Class Action Case Over Breach of 11 Million Toy Users’ Information

In November 2015, VTech Electonics North America LLC (VTech) announced that an unauthorized party infiltrated its network and gained access to the personal information of 5 million adults and 6.5 million children through its...more

National Cyber Security Alert

by Clark Hill PLC on

The continuing increase of cyber-crime and the almost daily reports of hacking attacks against businesses, government agencies, and citizens highlight the persistence of this escalating national security and corporate threat....more

Hacker Steals Millions from Virtual Currency Exchange Bithumb

A cyber-attack against–Bithumb–one of South Korea’s largest cryptocurrency exchanges and one of the five largest in the world—has reaped access to the data of 30,000 users and drained their accounts in the process. Bithumb is...more

Ransomware is taking the world by storm; does insurance respond?

On June 27, 2017, the world had its second major ransomware attack in two months, and experts are predicting more to come. The first, named WannaCry, began May 12, and quickly spread to over 400,000 machines, the vast...more

Law Firms’ Data Duty: Protecting Client Information From Cybercriminals

by McGuireWoods LLP on

July 1, 2017 The impact from the recent Petya/NotPetya ransomware attack — or what was reported as a ransomware attack but now appears to be something even more damaging — continues to spread around the globe, with several...more

Class Action and Regulatory Settlements Reflect the Rising Cost of Data Breaches

by Carlton Fields on

As the number of data breaches continues to increase, so too do the costs. After a breach occurs, companies typically expend significant sums conducting investigations, notifying customers and regulators, and engaging in...more

HIPAA in the Age of Ransomware

According to a recent US Government Interagency report, ransomware is the fastest growing malware threat, targeting users of all types, including health care facilities. This past spring, for example, the WannaCry ransomware...more

The Remedy for the New Cyber Threat Posing Major Coverage Problems: “Fake President” E-mails

by Nossaman LLP on

In the last few weeks, we have seen yet another widespread ransomware attack that hit nearly one hundred companies around the world. It reminded me of a recent request from a client, made just after news broke of the...more

Authorities Investigating Cyber Intrusion of Numerous U.S. Nuclear Power Plants

It’s scary to think about, but anything that is online is hackable. Including critical infrastructure like nuclear power plants. It has been reported that U.S. authorities are investigating a cyber intrusion that has hit...more

Office of the National Coordinator Issues Guidance After NotPetya Attack

Following the most recent ransomware attack, known as NotPetya, (among other nicknames), many health care entities were victims of the ransomware, which prompted the Office of the National Coordinator (ONC) to issue guidance...more

Changing Cybersecurity Threats in the Context of the Internet of Things: Don’t Blink or You’ll Miss It

by Hogan Lovells on

In this hoganlovells.com interview, Washington, D.C.-based Hogan Lovells senior associate Paul Otto talks about security issues created by the exponential growth of the Internet of Things (IoT). ...more

Princeton Community Hospital Replaces Computer Network After Petya Attack

Numerous hospitals were victims to last week’s (aka NotPetya) ransomware attack. But one hospital—Princeton Community Hospital in West Virginia–has admitted that it is going to replace its entire computer network after Petya...more

Your Daily Dose of Financial News

by Robins Kaplan LLP on

Tesla’s rise to the top of the US car heap in terms of market value raised a lot of eyebrows a few months ago. GM bumped it back down yesterday, but its three months as #1 marked what felt like a serious shift in the auto...more

Alabama Man Sentenced to Prison for Elaborate “Phishing” Scheme

by Balch & Bingham LLP on

An Alabama man has been sentenced to spend six months in prison for illegally accessing the personal information of over fifty women. For over two years, Kevin Maldonado engaged in a hacking technique called “phishing,”...more

Fintech Forecast: Lawmakers and Regulators Poised to Revamp the Legal Landscape in 2017

Financial technology, or fintech, is poised to be the center of U.S. regulation in 2017. Industry experts estimate that between July 2015 and January 2016, more than $5.5 billion was invested in the fintech sector. As fintech...more

Increasingly Sophisticated And Damaging “NotPetya” Cyber Attack Highlights Importance Of Timely Update

by King & Spalding on

Last Tuesday morning, June 27, 2017, a version of the “Petya” malware attack—dubbed “NotPetya”—hit several multinational companies in a variety of industries. This is the second major cyber attack in just two months following...more

Southern Oregon University Victim of Phishing Scheme

Last month, Southern Oregon University (SOU) announced that it was the victim of a $1.9 million phishing scheme. SOU received an email purportedly from their contractor, Anderson Construction, requesting the April payment for...more

Stolen Tax Returns? Virginia Seeks a Solution.

Did someone steal your tax return? You are not alone. Indeed, the rise in tax-related identity theft has been well documented. In 2015, the FTC reported a 50% increase in identity theft complaints. A primary cause for...more

1,240 Results
|
View per page
Page: of 50
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.