Hackers

News & Analysis as of

Sixth Circuit Lowers Bar For Plaintiff’s Standing To Sue In Data Breach Cases

On September 12, 2016, a split panel from the U.S. Court of Appeals for the Sixth Circuit held in an unpublished opinion that customers of Nationwide Mutual Insurance (“Nationwide”) could pursue claims stemming from a 2012...more

Don’t doubt the data breach: Massive Yahoo hack reminds us it’s not if, but when

Today, September 22, 2016, internet giant Yahoo announced a data breach that exposed the information of over 500 million of its users. The breach, announced by CEO Melissa Meyer, involved the breach of Yahoo servers exposing...more

Your daily dose of financial news - The Brief – 9.23.16

Well, see, Yahoo just doesn’t have enough on its plate these days. So why not the revelation that hackers stole data on 500 million users in 2014? The hack—thought to be a state-sponsored affair—is likely the biggest data...more

Privacy Tip #53 – Valuable Lesson: Don’t Write Down Passwords

I have been doing a lot of live employee training lately. I really enjoy it, and have been told that it is some of the most entertaining training around. The reason why I can get the audience to laugh is because I tell real...more

6th Circuit “Stands” Up for Plaintiffs in Data Breach Suit

A recent decision by the U.S. Sixth Circuit Court of Appeals lowers the threshold for standing in data breach cases, giving data breach victims an easier path to sue the companies from which their data was stolen. Adam Frey...more

Are Your Social Media Fans Cybersecurity Savvy?

Today’s online world is all about engaging and staying connected with others via social media. For businesses, establishing a presence on various social media platforms is an enticing way to connect with current customers as...more

The Aftermath of the Bitfinex Hack

In our August 9 blog post, we discussed the Bitfinex hack that rattled the bitcoin markets and raised serious questions about the security of bitcoin wallets and allocating risk in this new age of cyber theft. Through a...more

Hackers Post Athletes’ Medical and Drug Testing Records Online

Hacking group Fancy Bear, reportedly a Russian group, who allegedly hacked into the Democratic National Committee emails which made headlines, has posted U.S. Olympians’ medical and drug testing records online. Although it...more

Privacy Tip: Cover Your Computer Camera and Microphone

Someone may be using your laptop or your desktop web camera to watch and listen to you without your knowledge. It happens, and yes, it’s downright creepy. And to think that someone may be spying on your kids that way is...more

U.S. House Of Representatives Announces OPM Data Breach Findings

On Wednesday, September 7, Republicans on the U.S. House of Representatives’ Committee on Oversight and Government Reform released a report detailing the events leading up to the sweeping hack of the federal Office of...more

Accountant and Attorney Liability Newsbrief - Fall 2016

Massachusetts recently amended its pay equity statute, which substantially enforces the protections of the Massachusetts Equal Pay Act. These changes will go into effect in July 2018. The prohibitions against discriminating...more

Sixth Circuit Rules That Theft of PII from Insurance Company Results in Article III Standing

In its recent decision in Galaria v. Nationwide Mut. Ins. Co., no. 15-3386 (6th Cir. Sept. 12, 2016). Co., No. 15-3386 (6th Cir. Sept. 12, 2016), a divided Sixth Circuit panel held that plaintiffs had standing to assert...more

Cyber Alert: Security Vulnerabilities: You Don’t Need a Breach to Face Regulatory Scrutiny

Those who track newsworthy data breaches and other cybersecurity incidents know what type of fallout to expect from these events. Class action lawsuits from consumers, shareholders and financial institutions are now not an...more

Spoofing, Sports and the Panama Papers: BakerHostetler Offers Mid-Year Review of Cross-Border Government Investigations and...

Halfway through 2016, the international community has seen a staggering variety of cross-border investigations and enforcement actions. Brexit, the release of the Panama Papers, allegations of widespread sports doping and the...more

Galaria v. Nationwide: Data Breach Plaintiffs Standing Strong in the Sixth

This week, in the first post-Spokeo circuit court decision to address standing in a data-breach class action, the Sixth Circuit joined the Seventh Circuit in holding that plaintiffs whose sensitive personal information has...more

Auto-ISAC Pushes To Protect Internet-Enabled Connected Cars

In July 2016, the nonprofit Automotive Information Sharing and Analysis Center (“Auto-ISAC”) released a series of auto cybersecurity best practices to collectively address cyber threats that could pose unreasonable risks to...more

Don’t Ignore Ransomware Vulnerabilities; You Could Be Violating FTC Act

Last week, the Federal Trade Commission convened a ransomware workshop to discuss the rising epidemic of attacks against U.S. businesses and individuals. In a ransomware attack, a malicious actor tricks a user into...more

Privacy & Cybersecurity Update: New York State Proposes Cybersecurity Regulation for Financial Institutions

New York state has proposed a new regulation — to go into effect January 1, 2017 — that would require banks, insurance companies and other financial services institutions regulated by the New York State Department of...more

Banner Health Suits Raise Significant Questions for Data Breach Class Actions

Banner Health recently announced that hackers may have gained “unauthorized access to patient information” and “payment card data” from approximately 3.7 million patients, health plan members, food and beverage customers, and...more

Business Viewpoint with Tom Vincent: Early investments can pay off in protecting company information

A breach of a company’s information security, and the theft or loss of sensitive data, can be very expensive. These costs can often be reduced, however, by making investments in the security of the company’s information – and...more

Cyber Insurance: Common Pitfalls of the Insured

As we have noted in a number of recent posts, tech companies need cyber insurance. The risk of not having it is simply not worth it.  But cyber insurance policies can be confusing to understand because the policies vary...more

Hardware Password Defaults – Do You Change Them?

IT professionals have long understood the importance of changing the default password for network connected hardware devices (printers, switches, wireless access points, etc.). In the world of the Internet Of Things it seems...more

The Impact of the Smart Home Revolution on Product Liability and Fire Cause Determinations

The concept of the Internet of Things (IoT) has existed for more than 15 years. Technology pioneer Kevin Ashton is widely credited with coining the term in 1999 to describe the connection of physical objects to the internet...more

FTC Round-Up: NIST Framework Compliance Is Not Enough and Looming Ransomware Enforcement Activity

On August 31st and September 7th, 2016, the Federal Trade Commission (FTC) provided guidance regarding cybersecurity standards, which companies should consider when assessing their current data security posture....more

iPhones Vulnerable to Pegasus—Update Your iPhone Now

Apple has issued an urgent warning to iPhone users about a crucial iOS update that is the only way to protect iPhones from “the extremely malicious Pegasus software.” According to Apple, Pegasus can completely take over...more

814 Results
|
View per page
Page: of 33
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×