Hackers Cybersecurity

News & Analysis as of

21st Century Data Breaches: Not All Fun and Games

Data breaches can occur in the most surprising places. When data breaches affect sensitive, private information—especially those of children—companies can face scrutiny from regulatory agencies and be exposed to civil (and...more

Companies May Soon Have a New Defense Against Cyber-Attacks

The Active Cyber Defense Certainty Act is a new bill that is gaining positive bipartisan support and significant interest from business communities, lawmakers and academics. The proposed bill amends the Computer Fraud and...more

Cybersecurity Hacks Remind Law Firms to Secure Their Data

In late December 2016, the United States Attorney’s office in Manhattan unsealed an indictment accusing three Chinese traders of hacking into two US-based global law firms to obtain insider information on mergers and...more

Federal Agencies Hit with 30,899 Cyberincidents in 2016

The Office of Management and Budget (OMB) released a report this week indicating that federal agencies experience almost 31,000 cyberincidents in 2016. The Federal Deposit Insurance Corporation was responsible for 10 of 16...more

Data Breach Response: Orchestrating Legal and Technical Resources to Contain and Mitigate

Data breaches are inevitable and the aftermath of a data breach can be a significantly difficult exercise. When legal and technical resources work together, both proactively and reactively, the response can run more smoothly....more

The Impact of Cybersecurity Concerns on M&A Activities is Growing: eDiscovery Trends

This is the second story that I’ve covered in the past several months where cybersecurity concerns impacted merger and acquisitions. See below for more on the first one… After Verizon Communications took a $350...more

Cybersecurity: Yes, They Will Hack Your Car

Auto manufacturers are increasingly equipping vehicles with rapidly advancing technologies, raising concerns regarding how the public will be affected by these changes. Manufacturers are beginning to implement automated...more

“W-2 Phishing Attacks Targeting Businesses to Cash in on Busy Tax Season: 10 Tips to Protect Your Business”

Cyber criminals are taking advantage of tax season to lure valuable W-2 information from vulnerable businesses. An example of a common phishing scheme starts with a scammer posing as a legitimate employee of a company,...more

Medical Device Malware Medjack.3 Poses Threat to Hospitals

Medjack is a form of malware that was specifically developed to attack medical devices, such as heart monitors, CT and MRI machines, insulin pumps and PAC systems....more

Yahoo Breaches Cost Shareholders $350 Million From Lowered Purchase Price, CEO Forfeits $14 Million in Compensation

Yahoo’s troubles for failing to timely disclose security breaches provides rare insight into quantifying the financial and other costs to a company’s shareholders and leadership when a security breach occurs and is...more

Privacy Tip #77 – FTC Offers Tips to Businesses That Have Been Impersonated by Phishing Schemes

On March 6, 2017, the Federal Trade Commission (FTC) released tips and a video to businesses that have been impersonated by Phishing schemes. The guidance, entitled “Has a phishing scam hooked your company’s good name?”...more

Yahoo incident reinforces vital role of counsel in cybersecurity

It has widely been reported that Yahoo has experienced significant legal and business impacts as a result of several cybersecurity breaches. On 1 March, Yahoo disclosed the findings of an independent board committee and...more

Experts Warning of New Google Chrome Malware Scam

Cybersecurity experts have been warning users about a Google Chrome scam that targets Windows users in the US, UK, Canada and Australia. The scam, which began in December, uses a pop-up stating “The ‘HoeflerText’ font wasn’t...more

SEC Speaks 2017

Commission staff highlight key developments and successes in the SEC enforcement program. As they do every year, senior officials from the US Securities and Exchange Commission (SEC or the Commission), including current...more

Let's Go Phishing!

Emails, lots and lots of emails, filling our inboxes. Even with the best security and filters, it seems that hackers are simply building better mousetraps. The bigger problem, however, is the trusting nature of individuals...more

A Primer On FTC Cybersecurity Enforcement

According to the Breach Level Index, the total number of data records lost or stolen in just the first half of 2016 was 554,454,942, stemming from 974 breach incidents. In the entire year of 2015, there were 707.5 million...more

Cyber Security and Social Engineering: A Big Low Tech Problem

Headline-grabbing cyber hacks of email accounts belonging to celebrities, corporations, government officials and political campaigns are becoming the norm. Cybersecurity intended to guard against these acts brings to mind...more

A Close Look at Policy Wording Is Essential to Ensure Coverage for Cyber Risks

As the demand for insurance coverage for cyber-related losses continues to grow, more insurance companies are offering cyber insurance policies and endorsements, but the market is far from mature and the available policies...more

Yahoo Data Breach Update: A Third Notification + Shareholders Sue

Last week, Yahoo issued another warning to some of its customers telling them that their personal information may have been compromised in a data breach. This is the third notification to Yahoo users that their information...more

Cyberattacker Offers Access to Private Data From 60 Universities and Agencies

In February 2017, a private threat intelligence firm alerted more than 60 organizations – institutions of higher education and governmental entities – that their internal databases had been breached by a Russian-speaking...more

Sony Cyber-Attackers Lurking at Financial Supervisor “Watering Hole” Target Banks and Others

Cybersecurity specialists at BAE Systems and Symantec announced last week new evidence suggesting that the criminals behind the notorious 2014 attack on Sony Corp. are also responsible for recent cyber-attacks involving 104...more

Cybersecurity Obligations of Directors - Guidance from the United States Decisions

Your organization will in all likelihood suffer a cyberattack. According to a recent study by Accenture, the average Canadian organization faces about 96 cyberattacks per year, nearly one third of which result in a security...more

China moves to implement security review of network products and services: but leaves foreign investor and manufacturer concerns...

On 4 February 2017, the Cyberspace Administration of China issued a draft of the Network Products and Services Security Review Measures (“Draft Measures”) for public comment: the Draft Measures remain open for comments until...more

Former NSA Contractor Indicted for Theft of Government Property

The United States Department of Justice (DOJ) has announced that a former contractor of a defense contractor has been indicted for stealing over 75 percent of hacking tools belonging to the Nations Security Agency’s offensive...more

TortSource: Ransomware: A Reportable Breach?

In the past several years, a huge increase has occurred in the number of electronic attacks in the United States using ransomware, a form of malware that targets and encrypts critical data and systems for the purpose of...more

631 Results
|
View per page
Page: of 26
Cybersecurity

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×