Hackers Data Protection

News & Analysis as of

Cybersecurity Hacks Remind Law Firms to Secure Their Data

In late December 2016, the United States Attorney’s office in Manhattan unsealed an indictment accusing three Chinese traders of hacking into two US-based global law firms to obtain insider information on mergers and...more

Data Breach Response: Orchestrating Legal and Technical Resources to Contain and Mitigate

Data breaches are inevitable and the aftermath of a data breach can be a significantly difficult exercise. When legal and technical resources work together, both proactively and reactively, the response can run more smoothly....more

A Primer On FTC Cybersecurity Enforcement

According to the Breach Level Index, the total number of data records lost or stolen in just the first half of 2016 was 554,454,942, stemming from 974 breach incidents. In the entire year of 2015, there were 707.5 million...more

The Truth in Mac Security

For decades, it has been assumed that MacBook and iPhone devices are hack proof and virus free. Their advertisements and claims for being indestructible were never questioned. Yet, nothing is truly immune to intrusion....more

Cyber Security and Social Engineering: A Big Low Tech Problem

Headline-grabbing cyber hacks of email accounts belonging to celebrities, corporations, government officials and political campaigns are becoming the norm. Cybersecurity intended to guard against these acts brings to mind...more

Cyberattacker Offers Access to Private Data From 60 Universities and Agencies

In February 2017, a private threat intelligence firm alerted more than 60 organizations – institutions of higher education and governmental entities – that their internal databases had been breached by a Russian-speaking...more

China moves to implement security review of network products and services: but leaves foreign investor and manufacturer concerns...

On 4 February 2017, the Cyberspace Administration of China issued a draft of the Network Products and Services Security Review Measures (“Draft Measures”) for public comment: the Draft Measures remain open for comments until...more

Ruling Vacating Target Consumer Class Settlement Highlights The Problem Of Standing In Data Breach Cases

When hackers steal consumer data, injury to consumers is not a foregone conclusion. This is particularly so where credit and debit card numbers are stolen. Banks, not consumers, bear the cost of fraudulent charges. ...more

Ransomware? Everywhere!

The definition of “ransomware” can sound pretty academic. For example, the FBI describes ransomware as “a type of malware installed on a computer or server that encrypts the files, making them inaccessible until a specified...more

Employees Expecting Tax Refunds? So Are Your Hackers

With the beginning of the 2016 tax season, employers should be on high alert for the wave of W-2 spear phishing scams coming their way once again this year. Companies that fall victim to this type of scam likely will be faced...more

Business Cybersecurity: Two Recent Court Decisions Highlight the Need to Take Preemptive Action Against Data Breaches

Nowadays, the prudent business owner should be cognizant of cybersecurity and the public relations and legal costs that can arise from a data breach. By holding personal information of customers, employees, or anyone else,...more

Eighth Circuit Remands Proposed Settlement in Target Data Breach Class Action

The Eighth Circuit Court of Appeals has remanded a $10 million settlement in the Target data breach class action on the grounds that the district court had not rigorously analyzed the propriety of the class...more

Data Breaches: An Employer’s Duty to Protect Employees’ Personal Information

Recently, there has been much discussion about the Superior Court of Pennsylvania’s ruling in Dittman v. UPMC, which affirmed a lower court’s order dismissing an employee class action against their employer over a data...more

Cancer Services Provider Confronts Ransomware Bully

My newest hero in the fight against ransomware is Little Red Door Cancer Services of East Central Indiana (Little Red Door). I am sending a donation to it to celebrate its courage in the last few weeks. Little Red Door...more

Employer Has No Legal Duty To Protect Employee Electronic Information

A court in Pennsylvania recently held that an employer does not have a legal duty to act reasonably in managing its computer systems to safeguard sensitive personal information collected from its employees, when the employer...more

You Asked: Can My Employees Hack My Company?

Yes! Employees and other insiders – think Edward Snowden – can, and in fact, do play a role in most data breaches or cyber-security incidents. Companies must ensure their data protection policies include not only training but...more

Employer Did Not Owe Legal Duty to Protect Employees' Hacked Personal and Financial Records

University of Pittsburgh Medical Center (UPMC) maintained a human resource database containing current and former employees' names, dates of birth, social security numbers, tax information, addresses, salaries, and bank...more

The Anthem Breach – A Retrospective

Many people and news outlets have opined, weighed in, and informed the public about the 2015 Anthem breach. It is still a hot topic in January 2017, because it currently lines up with other hot stories about hacking ordered...more

Maritime Cybersecurity Regulation on the Horizon

Over the past year, various institutions and organizations—both domestic and international—have shown an interest in moving the increasingly prevalent cybersecurity conversation offshore. Domestically, both Congress and...more

Studies Show Ransomware up 6,000% and Reaps Billions and Phishing Emails are Used in 91% of all Cyber-Attacks

A recent IBM study shows that ransomware increased 6,000 percent in 2016 over 2015. According to the report, ransomware was present in almost 40 percent of all spam email messages....more

PA Appellate Court Finds No Common Law Duty For Employer Handling Of Employee Info After Data Breach

The Pennsylvania Superior Court held yesterday in Dittman v. UPMC et al. that an employer owes no common law duty under a negligence theory to use reasonable care in the collection and storage of employee information and...more

FTC Takes Action Against D-Link for Deceptive Practices Endangering the IoT

The U.S. Federal Trade Commission (“FTC”) has filed a lawsuit against device manufacturer D-link for allegedly deceiving the marketplace about the security of its products and, in turn, unfairly placing customer privacy at...more

FTC Files Lawsuit Against Taiwanese Manufacturer for Alleged Lax Security in Wireless Routers and Cameras and Related Marketing...

The Federal Trade Commission has filed a lawsuit in federal court claiming that a networking equipment manufacturer engaged in unfair and deceptive acts, exposing thousands of consumers to the risk of cyberattack from...more

The State of Cybersecurity in 2016 and the (potential) Great Cyber Fire

Cybersecurity hit the news hard in 2016. The number of high profile, and troubling, cyber incidents increased significantly. The Democratic National Committee and one of Clinton’s top advisor’s being hacked, with leaked...more

One Less (Regulator) Affair for AshleyMadison.com: Site Operators Agree to Settle U.S. Charges Stemming from 2015 Breach

Remember the 2015 AshleyMadison.com data breach, where hackers gained access to the personal information of about 36 million users from over 46 countries, and threatened and carried through on their promise to release the...more

304 Results
|
View per page
Page: of 13
Cybersecurity

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×