News & Analysis as of

Malware

2017 Security Breaches: Frequency and Severity on the Rise (Updated)

by Revision Legal on

We periodically update this post with recent data breach statistics. Now that we’re into the final quarter of 2017, it’s time to look back at the largest data breaches of 2017. This was originally published in December,...more

“KRACK” WiFi Security Vulnerability Discovered

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks....more

Hyatt Data Breach Impacts 41 Locations in 11 Countries

Hyatt Hotels Corporation recently announced that it had identified malicious software code resulting in unauthorized access to customer payment card information. Hyatt disclosed that upon investigating the incident, it...more

Another Bumpy Week for Equifax: Virus Hits Website, IRS Suspends Contract and Hacked UK Residents Notified

It was another chaotic week for Equifax Inc., still scrambling to stem the torrent of bad news after its massive data breach last month that has potentially affected more than half of the U.S.’s adult population....more

FTC’s “Stick With Security” #5: Segment Your Network And Monitor Who’s Trying To Get In And Out

by Snell & Wilmer on

On August 25, 2017, the FTC released its fifth “Stick with Security” principal, which focused on how companies can protect their virtual “entrances and exits” and make life harder for hackers. The FTC believes that the...more

FBI Issues Flash Alert on Apache Struts Vulnerability

The Apache Struts vulnerability has been mentioned frequently in the media over the past month, as it is believed to have been involved in one of the largest and most damaging data breaches in history....more

Your Daily Dose of Financial News

by Robins Kaplan LLP on

Goldman’s deal-making advising is sputtering a bit these days, so Lloyd and the gang are working on generating some of those deals themselves through a new Innovations Lab internal venture....more

McAfee Report Lists Health Care Sector as Most Targeted Industry for Cyber-Attacks

In its cyber security incident report outlining vulnerabilities for the second quarter of 2017, security firm McAfee lists the health care sector as having suffered the most security incidents, which surpasses the public...more

Data Privacy + Cybersecurity Insider - October 2017

by Robinson & Cole LLP on

McAfee Report Lists Health Care Sector as Most Targeted Industry for Cyber-Attacks - In its cybersecurity incident report outlining vulnerabilities for the second quarter of 2017, security firm McAfee lists the health care...more

Locating Digital Breadcrumbs: Programs Can Run, But They Can’t Hide

by Seyfarth Shaw LLP on

Determining whether programs or malware actually ran on a system is an important goal of seasoned examiners when investigating computer evidence. Generally, there are several artifacts left behind anytime executables are...more

Legislature Addresses Ransomware Threat With Criminal Penalties

by Murtha Cullina on

It is fitting that on the first day of Cybersecurity Awareness Month, new legislation takes effect regarding one of the most destructive types of malware. In response to the rapidly increasing rate of computer extortion...more

Aviation and Petrochemical Industries Subject to Hacking by Iran

Hackers working on behalf of the Iranian government have been targeting the aviation and petrochemical industries in the United States, Saudi Arabia, and South Korean since 2013, according to a report released by FireEye...more

Cybersecurity Best Practices

by Seyfarth Shaw LLP on

When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more

K&L Gates Triage: Cyber Insurance Issues for the Healthcare Industry

by K&L Gates LLP on

This episode provides an overview of the major cyber security issues affecting the health care industry. Given that health care is one of the most frequently targeted industries by data hackers, this episode outlines the...more

The Data Report Episode 14: Zero Day

by Bilzin Sumberg on

Module Four: When It All Goes Wrong (Part III) Once a data breach is discovered there is a limited amount of time to begin assessing, addressing, and eliminating the problem. In this episode of The Data Report, Litigation...more

Offshore Cybersecurity Guidelines Issued

DNV GL recently issued a new globally applicable recommended practice (DNLVGL-RP-G108) to assist oil and gas operators, system integrators and managers, and vendors in the offshore industry to manage increasing cybersecurity...more

Capitol Hill Healthcare Update

by BakerHostetler on

Republicans’ last-ditch effort to overhaul the Affordable Care Act (ACA) suffered potentially fatal blows as GOP senators in recent days voiced either outright opposition to or serious reservations about legislation pushed by...more

Global Privacy & Cybersecurity Update Vol. 15

by Jones Day on

UNITED STATES - Regulatory—Policy, Best Practices, and Standards - FTC Comments on Improvements to IoT Device Security - On June 19, the Federal Trade Commission ("FTC") submitted comments to a working group organized by the...more

Kaspersky Lab and Due Diligence – How Do You Minimize Risk?

Kaspersky Lab, a Russian-owned cybersecurity company that sells anti-virus software and other kinds of IT systems security products, has been banned from use by the federal government. This latest development comes by way of...more

File Share Platforms and Business Risk

by Seyfarth Shaw LLP on

The use of open file sharing platforms in business continues to increase in 2017; Dropbox alone has over 200,000 active business accounts. Unfortunately, the convenience of these platforms and the increase in use by...more

US-CERT Warns of Potential Hurricane Harvey Phishing Scams

As if the devastating effects of Hurricane Harvey are not bad enough, the United States Computer Emergency Readiness Team (US-CERT) of the Department of Homeland Security is warning of a different threat: falling victim (or...more

CyberSecurity Concerns - Hackers, The Seventh Fleet And Human Error

by Poyner Spruill LLP on

When the USS John S. McCain collided with the tanker Alnic MC near Singapore, it was the third such collision this summer. The ship sustained damage at the waterline, flooding a crew sleeping area. Such incidents are...more

The Data Report Episode 12: Malicious Tools

by Bilzin Sumberg on

Module Four: When It All Goes Wrong The fourth module of The Data Report discusses the nature of data breaches, who might be responsible, what typically happens, what should happen, and what you can do to prepare for a...more

National Academies of Sciences, Engineering and Medicine Release Report Recommending Ways to Improve the Resilience of Nation’s...

On July 20, 2017, the National Academies of Sciences, Engineering, and Medicine (NASEM) released a report directing the U.S. Department of Energy (DOE) and the U.S. Department of Homeland Security (DHS) to develop solutions...more

Russian Cyber Attack on US Nuclear Power Stations

by Miles & Stockbridge P.C. on

A report from the FBI and the Department of Homeland Security warns of malware attacks targeting mainly nuclear power stations and energy facilities. The attacks started in May of this year....more

340 Results
|
View per page
Page: of 14
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.