Malware

News & Analysis as of

Is Ransomware a Notifiable Data Breach Event?

There is no doubt that companies face unprecedented volume and variation in both disruptive and intrusive cyberattacks on their networks. Among the different attack methodologies today, ransomware is quickly becoming a major...more

On the Move and At Risk: Safeguards for Mitigating Mobile Device Vulnerabilities While Traveling Overseas

Employees use their smartphones as a key tool for accessing information during a work day – especially when outside the office and traveling on business. While smartphones, tablets, laptops and other devices may increase...more

Emerging Trends Newsletter - Q2

We are thrilled to bring you the 2nd installment of Stinson Leonard Street's Emerging Trends newsletter. Recent Delaware Supreme Court Opinion Limits General Personal Jurisdiction for Foreign Corporation - Recent...more

Wendy’s reports over 1,000 restaurants affected by breach announced earlier this year

Back in May of this year, Wendy’s reported “fewer than 300” locations had been hacked by malicious malware that targeted customer credit card information. Last week, Wendy’s released a list of 1,025 restaurant locations that...more

Hackers using cyber weapons to attack IT systems

A depressing new report by security firm LightCyber opines that hackers are using cyber weapons to evade detection when deploying attacks to IT systems rather than malware. In fact, the report says that cybercriminals are...more

Omni Hotels latest hotel chain hit with malware

Omni Hotels notified guests on Friday, July 8, 2016, that its point of sale systems were compromised with malware from December 23, 2015, through June 15, 2016....more

OCR Releases Guidance on Ransomware & HIPAA

On July 11, 2016, the U.S. Department of Health and Human Services, Office for Civil Rights (“OCR”) issued guidance (the “Guidance”) for health care entities relating to ransomware and the Health Insurance Portability and...more

Analogizing an Internet Accessible Computer to Broken Window Blind, Court Finds No Expectation of Privacy in Computers

A federal court in the Eastern District of Virginia has held that a user utilizing a computer connected to the Internet has no expectation of privacy because hackers have repeatedly demonstrated their ability to circumvent...more

Privacy Tip #42 – Android users beware of new malware HummingBad

Software maker Check Point has detected and reported that a new malware, dubbed HummingBad, discovered in February, may have infected at least 10 million Android devices around the world. Check Point has released an...more

Cybersecurity, Use of Internet of Things Technology Concern Manufacturers

Powered in part by the growing use of Internet of Things (IoT) technologies, cybersecurity has surged to become one of the leading concerns for global manufacturers, according to a recently released study....more

World Energy Council warns utility industry of advanced malware

The World Energy Council recently warned the utility industry that one of the top threats to the energy sector is advanced malware attacks. The warning noted that the utility sector is vulnerable because of the size of the...more

Is The Most Frightening Cyber Trend Numbness Leading to Complacency?

Today’s new cyber world necessitates protection of what is most important to you. The cyber landscape continues to change on a near daily basis and shows no signs of slowing. K2 Intelligence’s Jeremy Kroll and Austin...more

First home cyber protection insurance offered by Hartford Steam Boiler

The Hartford Steam Boiler Inspection and Insurance Company has announced that it is offering “the first personal lines cyber insurance program for consumers, protecting against computer attacks, cyber extortion, online fraud...more

DHS and DOJ Release Updated Guidance for Sharing Cyber Threat Indicators and Defensive Measures

On June 15, in response to feedback from non-federal entities on guidance released in February, the Departments of Homeland Security (DHS) and Justice (DOJ) issued updated guidance for companies about sharing cyber threat...more

Your Organization is Impacted by Ransomware - Now What?

Some forms of cyber extortion are automated and not targeted at any specific victim. For example, “ransomware” refers to a type of malware that prevents users from accessing their systems unless, and until, a ransom is paid....more

Wendy’s Data Breach Expands in Scope, Malware Attacks Point-of-Sale System

Fast-food chain, Wendy’s, has disclosed that the number of franchised restaurants hit by a recent cyber-attack was “considerably higher” than the fewer than 300 locations that it had originally suggested were impacted....more

Practice Spotlight: Best Practices for Responding to the Threat of Ransomware

Ransomware, a specialized form of malware used for extortion attempts, has been around the internet for more than a decade but now, because of a rash of recent attacks, has moved to the forefront as the most problematic cyber...more

Chiropractic Clinic Hit with Malware

Complete Chiropractic & Bodywork Therapies, located in Ann Arbor, Michigan, recently notified 4,082 patients that its server, which contained the electronic medical record and billing information of patients, was infected...more

FBI Report: Ransomware and Phishing Scams Increasing

We can’t go a week without commenting on how rampant ransomware is in the industry. The FBI recently released a report confirming how devastating ransomware has become for U.S. businesses....more

Responding to ransomware attacks: A guide for health care providers

As if data privacy and HIPAA concerns were not enough for health care entities to fret over, enter another data threat that has already caught many health care systems off guard – ransomware attacks....more

Employee Error Accounts for Most Security Breaches

A recent study by a well-known information security company captures one of the most common information security fallacies: that information security is a technology problem. Most businesses view mitigating information...more

Experian sponsors Ponemon study on data breach

Experian Data Breach Resolution sponsored a recently released Ponemon Study entitled “Managing Insider Risk through Training & Culture.” The report is quite timely in light of all of the recent successful W-2 phishing...more

Ransomware: Electronic Extortion for a Digital Era

Last month, the FBI asked the American Bar Association to share a cyberalert with its members warning of an increased risk of ransomware. Ransomware poses significant legal and operational risks to businesses. Personnel at...more

Senate hearing reviews ransomware in a school system

On May 18, the Senate Judiciary Committee Subcommittee on Crime and Terrorism heard from Charles C. Hucks, the Executive Director of Technology for the Horry County, South Carolina, School System. The 52 schools and the...more

Think you’re covered? Think again

Commercial General Liability policies (CGL) typically do not include data protection loss coverage, although some insurers offer additional data protection endorsements. Normally those additional endorsements only cover data...more

130 Results
|
View per page
Page: of 6
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×