Internet of Things Data Breach

News & Analysis as of

Data Breach Involving CloudPets “Smart” Toys Raises Internet-of-Things Security Concerns

On February 27, 2017, news reports disclosed a major security breach involving Spiral Toys, the seller of the CloudPets brand of internet-connected stuffed animals. The Bluetooth-connected CloudPets toys allow users to...more

Cyber Security and Social Engineering: A Big Low Tech Problem

Headline-grabbing cyber hacks of email accounts belonging to celebrities, corporations, government officials and political campaigns are becoming the norm. Cybersecurity intended to guard against these acts brings to mind...more

[Event] Who's in the Driver's Seat? What the Connected Car Shows Us About the Legal and Regulatory Issues of the Internet of...

The Internet of Things (IoT) is creating unprecedented opportunities and challenges – launching groundbreaking collaboration among disparate industries and generating insightful data from uncommon sources....more

"Privacy & Cybersecurity Update - January 2017"

In this edition of our Privacy & Cybersecurity Update, we discuss how the prospect of a new chair and three new commissioners at the FTC may impact the agency's approach to cybersecurity regulation, a new Massachusetts...more

Privacy and Data Security: 2017 Year in Preview

Few issues keep executives awake at night more than Privacy and Data Security. New regulations and threats alike are plentiful, varied, and evolving. The rate of change for cybersecurity and information governance continues...more

"Privacy & Cybersecurity Update - December 2016"

In this month's edition of our Privacy & Cybersecurity Update, we examine modifications to New York state's proposed cybersecurity regulations for financial institutions, a 5th Circuit ruling that a phishing scam is not...more

The State of Cybersecurity in 2016 and the (potential) Great Cyber Fire

Cybersecurity hit the news hard in 2016. The number of high profile, and troubling, cyber incidents increased significantly. The Democratic National Committee and one of Clinton’s top advisor’s being hacked, with leaked...more

House Energy & Commerce Committee Holds Hearing on Security of the Internet of Things

The growing scale of cybersecurity concerns is prompting action from government leadership on the federal level. Before the Thanksgiving recess, the House’s Committee on Energy and Commerce got in on the act when two of its...more

Cybersecurity 2017 – The Year in Preview: Emerging Security Threats

Editor’s note: This is the fourth in a continuing end-of-year series. See our previous posts on trade secrets, state regulation and law enforcement, and HIPAA compliance. Our last two posts will focus on the energy...more

NIST Releases Comprehensive Cyber Security Guidelines for the Internet of Things

As the Internet of Things continues to grow and expand, the fact that guidance on security measures and protections is a necessity has become increasingly evident. Recently, the National Institute of Standards and Technology...more

Forrester Cyber Predictions for 2017: Harsh Reality

Forrester recently issued its “2017 Predictions: Dynamics that Will Shape the Future in the Age of the Consumer,” which among others, makes interesting predictions relating to cybersecurity risks coming up in 2017....more

Consider Cyberliability and Network Business Interruption Insurance Coverage in Light of Recent DDoS Internet Attack

The October 21, 2016 DDoS attack on the internet’s domain name system infrastructure underscores the need to consider cyberliability insurance coverage as a critical component of your company’s security and privacy breach...more

Senate Commerce Committee Members Air Laundry List of Pressing Issues Including Privacy, Data Security, and FTC Enforcement

On September 27th, the Senate Committee on Commerce, Science, and Transportation held a general oversight hearing of the FTC, which covered a multitude of major policy issues and included testimony from Chairwoman Edith...more

Ten Things You Need To Know About Ransomware

In 2013, hackers attacked a venerable Swansea, Massachusetts institution via ransomware. Ransomware is software that locks users out of computers or specific files until the victim pays a “fee” to release the lock. Such...more

Cyber Attacks Reach Subrogation

It was just a matter of time. As cyber-attacks rose and the data security breaches became increasingly devastating to businesses and individuals, cyber breach insurance became more prevalent. And where insurance appears,...more

"Privacy & Cybersecurity Update - June 2016"

In this edition of our Privacy & Cybersecurity Update, we examine the impact of Brexit on EU data protection, court rulings on cyber insurance policy exclusions and coverage gaps, recent statements from the FTC and the...more

Cybersecurity, Use of Internet of Things Technology Concern Manufacturers

Powered in part by the growing use of Internet of Things (IoT) technologies, cybersecurity has surged to become one of the leading concerns for global manufacturers, according to a recently released study....more

First home cyber protection insurance offered by Hartford Steam Boiler

The Hartford Steam Boiler Inspection and Insurance Company has announced that it is offering “the first personal lines cyber insurance program for consumers, protecting against computer attacks, cyber extortion, online fraud...more

U.S. House Committee On Homeland Security Holds Hearing On States’ Preparation For Cyber Threats

On Tuesday, May 24, 2016, the U.S. House Committee on Homeland Security (the “Committee”) held a hearing titled “Enhancing Preparedness and Response Capabilities to Address Cyber Threats.” The hearing was convened jointly by...more

Beyond Breach: Challenges in Cybersecurity & Coverage

Some of the biggest threats to cybersecurity involve controlling, damaging and interrupting systems, denying access to critical data and destroying data; “breach” not so much. Organizations need to make sure that their...more

Privacy & Cybersecurity Newsletter: April 2016

What seems like a long time ago now, in 2011 PricewaterhouseCoopers (PwC) warned that “there is no question that law firms are among the companies being targeted by cyber criminals.” Despite this, many law firms believed (or...more

Revenge of the Dorks: Their Time Has Come and They Might be Malicious

A nerd. A dork. A geek. You’ve seen them. You know them. Maybe you are one of them. And you definitely know the type. In fact, it was way back in the 1980s when a group of bullied collegiate outcasts rose up to defeat an...more

The Case of the Hacked Hospital: When a Cyber Breach Becomes a Health Crisis

Recently, we noted vulnerability issues from use of the Internet of Things and how that has come to impact the health industry. Recent events continue to highlight this development. Since the start of the year, there have...more

What’s on the Cybersecurity Horizon for 2016?

The last twelve months saw many high-profile and innovative cyber-threats, costly and embarrassing breaches, and several cybersecurity trends. Many executives and boards have been reactive rather than proactive, catalyzing...more

Advertising Law - December 2015 #4

Copper-Infused Apparel Company Settles With FTC for $1.4M - Tommie Copper, Inc. and company founder Thomas Kallish reached a deal with the Federal Trade Commission to settle charges that they misled consumers by claiming...more

46 Results
|
View per page
Page: of 2
Cybersecurity

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×