News & Analysis as of

Hackers Cybersecurity

GameStop Currently Investigating Possible Data Breach

by Revision Legal on

GameStop is the most recent potential victim of cyber data breach, and the company recently hired a leading security firm to conduct an investigation into allegations that the company’s website was hacked and that customer...more

Qakbot: Insight into a Persistent, Polymorphic Malware from the Cyber Defense Team at K2 Intelligence

Qakbot (Qbot) first emerged in 2009 as a piece of malware designed to steal online banking credentials from infected computers. It used classic key-logger technology combined with an ability to steal active session...more

Deeper Dive: Phishing/Hacking/Malware Attack Remain Leading Cause of Security Incidents

by BakerHostetler on

During 2016, our BakerHostetler privacy and data protection team worked on data security incidents across virtually all industries. For the second year in a row, phishing/hacking/malware attacks have accounted for the largest...more

Security Breach Notification Becomes More Complex For Employers

by Littler on

With new and sophisticated schemes perpetrated by hackers and scammers, and sensitive personal information becoming increasingly accessible to numerous insiders, it is only a matter of time before most employers will be...more

ACC Issues Data Security Guidelines for In-House Counsel to Evaluate Law Firms

The Association of Corporate Counsel (ACC) has issued its first-ever data security guidelines, which outline basic data security measures that in-house counsel can use to evaluate their outside counsel....more

Be Compromise Ready: Go Back to the Basics

by BakerHostetler on

We are excited to release our third annual BakerHostetler Data Security Incident Response Report. This report analyzes the more than 450 data security incidents we led clients through in 2016. Companies continued to...more

Data Breach Risks for 401(k) and Retirement Plans

by Jones Day on

There has been a recent spike in attacks on 401(k) and retirement plans by cyber criminals. Some have been reported publicly, and we are aware of several nonpublic incidents as well....more

FBI Warning on Cybercriminals Targeting FTP Servers to Compromise Protected Health Information

by Roetzel & Andress on

In March 2017, the Federal Bureau of Investigation (FBI) issued a Private Industry Notice (Notice) advising that the FBI is aware that cybercriminals are actively targeting File Transfer Protocol (FTP) servers in “anonymous”...more

Gone Phishin’: Hack Leads to HIPAA Settlement

While your business may indeed be a “victim” when hit by a phishing attack, your enterprise can also be responsible for violations of law associated with the incident. Earlier this week, the HHS Office for Civil Rights...more

Privacy and the Internet of Medical Things: What’s a curmudgeon to do?

by Thompson Coburn LLP on

One of the authors of this piece uses a medical device that is wirelessly networked to the device’s vendor. The author recently received a text message from the vendor, sending “congratulations” for using the device for an...more

Is Computer Security Broken?

The Economist certainly thinks computer security is broken (and it’s hard to argue the contrary). In its April 8 edition, The Economist’s cover story proclaims, “Why computers will never be safe.” While that’s good news for...more

Cybercrime and Data Breach a Rising Threat to All Employers

by Conn Maciel Carey LLP on

Over the past six months, we have observed a significant uptick in inquiries about data breach and other cyberthreats from area businesses. We are asked about pursuing claims for recovery of funds lost due to fraud by...more

(Alleged) Spammer Squares Off With (Alleged) Hacker, Highlighting Risk of Cyber Threats

What’s in a name? Obviously a lot, as businesses in all industries invest significant time and money to protect their reputations. But, in some sectors, the line between positive and pejorative can be quite thin. Take...more

Trump Meets Xi: Will They Talk Cybersecurity?

President Trump has repeatedly claimed that his predecessor was weak on China. But at least with respect to cybersecurity, the facts don’t support that charge. In 2015, “following all-night negotiations,” Robert Silvers...more

Smartphone Malware Up 400% in 2016

Here’s some more good news. Not really. According to a recent report by Nokia, malware infections against mobile devices were at an all- time high in 2016. Infections on smartphones rose almost 400 percent and...more

A New FBI Warning for Healthcare Providers

The FBI has issued new guidance specifically applicable to medical and dental facilities regarding the cybersecurity risk of File Transfer Protocol (“FTP”) servers operating in “anonymous” mode. FTPs are routinely used to...more

Shining a Light on the Darknet: What Every Business Should Know

The portion of the Internet that most people generally use is only one of three layers. The commonly used layer that is accessible by search engines is referred to as the clearnet or the surface web and represents only about...more

21st Century Data Breaches: Not All Fun and Games

by McGuireWoods LLP on

Data breaches can occur in the most surprising places. When data breaches affect sensitive, private information—especially those of children—companies can face scrutiny from regulatory agencies and be exposed to civil (and...more

Companies May Soon Have a New Defense Against Cyber-Attacks

by Jackson Lewis P.C. on

The Active Cyber Defense Certainty Act is a new bill that is gaining positive bipartisan support and significant interest from business communities, lawmakers and academics. The proposed bill amends the Computer Fraud and...more

Cybersecurity Hacks Remind Law Firms to Secure Their Data

In late December 2016, the United States Attorney’s office in Manhattan unsealed an indictment accusing three Chinese traders of hacking into two US-based global law firms to obtain insider information on mergers and...more

Federal Agencies Hit with 30,899 Cyberincidents in 2016

The Office of Management and Budget (OMB) released a report this week indicating that federal agencies experience almost 31,000 cyberincidents in 2016. The Federal Deposit Insurance Corporation was responsible for 10 of 16...more

Data Breach Response: Orchestrating Legal and Technical Resources to Contain and Mitigate

Data breaches are inevitable and the aftermath of a data breach can be a significantly difficult exercise. When legal and technical resources work together, both proactively and reactively, the response can run more smoothly....more

The Impact of Cybersecurity Concerns on M&A Activities is Growing: eDiscovery Trends

by CloudNine on

This is the second story that I’ve covered in the past several months where cybersecurity concerns impacted merger and acquisitions. See below for more on the first one… After Verizon Communications took a $350...more

Cybersecurity: Yes, They Will Hack Your Car

by Foley & Lardner LLP on

Auto manufacturers are increasingly equipping vehicles with rapidly advancing technologies, raising concerns regarding how the public will be affected by these changes. Manufacturers are beginning to implement automated...more

“W-2 Phishing Attacks Targeting Businesses to Cash in on Busy Tax Season: 10 Tips to Protect Your Business”

by Sedgwick LLP on

Cyber criminals are taking advantage of tax season to lure valuable W-2 information from vulnerable businesses. An example of a common phishing scheme starts with a scammer posing as a legitimate employee of a company,...more

645 Results
|
View per page
Page: of 26
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!