News & Analysis as of

Hackers Cell Phones

Kohrman Jackson & Krantz LLP

The FBI Warns Clevelanders About a Rise in Digital Theft

Cellphones have become a necessity for many people throughout the world, allowing convenience and interconnectivity in the palm of our hands – but they’ve also opened the door to a new type of theft. On April 26, the...more

Robinson+Cole Data Privacy + Security Insider

T-Mobile Clarifies Facts of Security Incident in Press Release

There has been a flurry of reporting in the past few days on the T-Mobile customer data compromise, with allegations that the compromise affected up to 100 million customers. ...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - Issue 3, August 2020

The Editors' Note - Welcome to the third issue of Decoded, Spilman's e-newsletter focusing on technology law, including data security, privacy standards, financing technologies, and digital-based means of conducting...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #217 – Law Enforcement Warns of Juice-Jacking Scam

If, like me, you travel a lot, listen up—the Los Angeles District Attorney’s Office has issued an advisory as part of its fraud education campaign warning travelers not to use free USB charging stations offered in airports,...more

Bass, Berry & Sims PLC

Privacy Perils: Don't Call Me, I'll Call You

Bass, Berry & Sims PLC on

Many of those pesky unsolicited calls to your cell phone are illegal. If you’re tired of receiving unwanted calls, you can go to https://complaints.donotcall.gov/complaint/complaintcheck.aspx, fill in some information, and...more

Faegre Drinker Biddle & Reath LLP

Newly-Discovered Vulnerability Highlights the Security Concerns Surrounding Bluetooth Technology

A recent report by researchers at the Helmholz Center for Information Security (CISPA), Singapore University of Technology and Design, and the University of Oxford has revealed that Bluetooth technology is vulnerable to a new...more

Hinshaw & Culbertson LLP

Protecting Your Cell Phone When a Hacker Gets Your Number

Risk Management Question - In haste, you mistakenly respond to a spoofed email that appears to be from a colleague before realizing you've just provided your cell phone number to a hacker. Or, you leave your cell phone in a...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - January 2019 #3

Robinson & Cole LLP on

Cybercriminals have launched a new campaign that not only requires the victim to pay a ransom to have their data decrypted, but when the victim is directed to a PayPal account to pay the ransom and get the decryption key to...more

Gray Reed

An Employer’s Spooky Interpretation of its Bring Your Own Device (BYOD) Policy

Gray Reed on

Mark Eting is one of Duncey’s Caps top outside sales agents. Because the company is based in Texas, but Mark lives in Cleveland and sells for the company in the northeast, Mark purchased a personal computer and a laptop to...more

Blank Rome LLP

AT&T Sued for $224 Million after Cryptocurrency Theft

Blank Rome LLP on

Recent lawsuit by cryptocurrency investor seeking $200 million in damages highlights the importance of data protection policies and the potential risk exposure to litigation in the cryptocurrency sector....more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - August 2018 #4

Robinson & Cole LLP on

A new ransomware, dubbed “Ryuk,” has surfaced in the last few weeks and is said to be targeting large organizations in the United States. The attackers behind Ryuk have reportedly made more than $640,000 in just two weeks,...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #153 – SIM Card Swap Scams

I am speaking at a conference in one of my favorite cities (okay, it’s Chicago) and I was having dinner at the bar when the patron next to me asked me what I do for a living. ...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - June 2018 #4

Robinson & Cole LLP on

Just weeks after Mexico’s central bank was targeted by hackers who stole $15 million, Chile’s biggest bank, Banco de Chile, announced on May 28, 2018, that it had been struck by a “virus” that affected its workstations,...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #130 – Smartphones Targeted by Dark Caracal Attack

There is a global malware campaign that is targeting mobile devices across the world. It is called Dark Caracal, which is believed to be sourced in Beirut by the Lebanese General Security Directorate. ...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #128 – Basic Smartphone Settings to Thwart Hackers

When talking to colleagues and friends, it appears that folks do not understand how their smartphones work and the data that can be accessed through them. This prompted me to again give basic steps that can be used to protect...more

Robinson+Cole Data Privacy + Security Insider

HomeKit Vulnerability: One More Reason to Accept New iOS 11.2

Apple has pushed an update to iOS 11.2 to its users. Users should consider pushing any updates that are recommended by the manufacturer, as there is usually a reason behind the update, and many times it is to fix a...more

Seyfarth Shaw LLP

Cybersecurity Best Practices

Seyfarth Shaw LLP on

When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #103 – Smartphone Replacement Parts Subject to Hacking

You drop your smartphone and now there are a million cracks and you can hardly read your texts. Getting the screen replaced by the manufacturer of the phone is usually expensive and sometimes it is so expensive that it makes...more

Bass, Berry & Sims PLC

Privacy Perils: Don't "Play" Around with Some Google Apps

Bass, Berry & Sims PLC on

A group of researchers at the University of Michigan has discovered that hundreds of applications in Google Play, whose function is to turn Android phones into a server that allows the user to connect their phone directly to...more

Robinson+Cole Data Privacy + Security Insider

Privacy TIp #86 - Android Users Vulnerable to Malware through Apps

University of Michigan researchers have discovered that hundreds of applications in Google Play turn Android phones into a server that allow the user to connect the phone directly to a PC and leave open insecure ports...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #31 – Landlines still a safe way to communicate but telephone companies want to drop them

I am pretty up to date on data privacy and security and technology, but the 60 Minutes episode this past Sunday night floored even me. If you didn’t see it, it is worth streaming. Basically, 60 Minutes showed Karsten...more

Carlton Fields

Federal Court Issues $1 Million Contempt Award for Repeated Cell Phone Unlocking Misconduct

Carlton Fields on

On March 18, United States District Judge Ursula Ungaro of the United States District Court for the Southern District of Florida entered an order against a Hong Kong-based company that was improperly distributing prohibited...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #7 – Who is listening to your conversations through your smartphone microphone?

I’ve always known that my smartphone had a microphone. If nothing else, it obviously has to be used for the Shazam app so I can figure out the name of that great song. So that is the only time I use the microphone on my...more

Robinson+Cole Data Privacy + Security Insider

Android smartphones Stagefright engine vulnerable

It is being reported that 95% of all Android smartphones are vulnerable to being hacked with a text message, which is being called the “heartbleed for mobile.” According to security experts, the vulnerability exploits the...more

24 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide