News & Analysis as of

Project CAMERASHY Details Cyberespionage By China’s Military

In a story reminiscent of a Tom Clancy plot, the Wall Street Journal reported last Thursday on “meticulously documented” cyberespionage conducted by China’s People’s Liberation Army (“PLA”) Unit 78020 to further strategic...more

Employees: Your Role in Keeping Trade Secrets ‘Secret’

As an employee, do you know what you should be doing to protect your company’s critical business information and trade secrets? It’s likely that in your employment contract you agreed not to disclose confidential corporate...more

Who is Stealing Your Trade Secrets? An Overview of Key Threats

Every company has trade secrets – for some, they may be special manufacturing processes, for other organizations, trade secrets could include product formulae, customer lists, software code or marketing strategies. The more...more

Apple’s Liability for the Xcode Hack

I don’t think I’m going out on a limb by speculating that someone, somewhere is preparing a class-action suit based on the recently disclosed hack of Apple’s app ecosystem. How did it happen? In a nutshell, hackers were able...more

European authorities arrest alleged banking malware developers

Law enforcement authorities have announced the arrest of two individuals-one a Russian national and the other Moldovan, both of whom are alleged to have developed and implemented banking malware known as Citadel and Dridex....more

Insider Trading Hack was Cinematic in Scope

The U.S. Department of Justice announced indictments in Brooklyn and New Jersey last month of 32 people for fraudulently obtaining inside information and then using that knowledge to make millions in the market, in the...more

Seventh Circuit Finds Article III Standing for Data Breach Class Action Based on Allegations of Future Harm

In the wake of numerous data breach cases dismissed for lack of Article III standing based on the Supreme Court’s decision in Clapper v. Amnesty Int’l USA, 133 S. Ct. 1138, 1147 (2013), the Seventh Circuit Court of Appeals...more

Fred’s Inc. discloses data breach to SEC

In its most recent filing with the Securities and Exchange Commission (SEC), Fred’s Inc. disclosed this week that a security firm found malware in its system that was designed to lift customer credit card information....more

Are You the Next Cybercrime Target?

How valuable is your data? If you store personally identifiable information, such as Social Security numbers, protected health information under HIPAA, and even more mundane information such as dates of birth and e-mail...more

FERC, NERC and Business Blackout: New CIP Standards and Fictional Cyber Attacks

The Federal Energy Regulatory Commission (FERC) issued a Notice of Proposed Rulemaking (NOPR) July 16, 2015, proposing to approve various Critical Infrastructure Protection (CIP) reliability standards proposed by the North...more

DOJ Cracks Down on Cyber Criminals

The Department of Justice (DOJ) recently announced the largest coordinated international law enforcement effort ever directed at an online cyber-criminal forum. Financial institutions and other companies should consider...more

DOJ Deputy Assistant AG Delivers Testimony at Senate Subcommittee Hearing Regarding Cyber Crime

On July 8, the DOJ’s Deputy Assistant AG, David Bitkower, delivered his testimony before the Senate Judiciary Subcommittee on Crime and Terrorism’s hearing entitled, “Cyber Crime: Modernizing Our Legal Framework for the...more

How To Destroy Your Law Firms Ranking With Link Building

Ranking well in search is a lot like trust. It is difficult to build and very easy to destroy. Sometimes clients come to us with websites that are in pretty bad shape and it is usually because of link building activity gone...more

FBI warns of continued use of Cryptowall ransomware schemes

The FBI’s Internet Crime Complaint Center recently issued an alert “Criminals Continue to Defraud and Extort Funds from Victims Using Cryptowall Ransomware Schemes” that indicates that the Center continues to receive...more

The FBI has been busy

The FBI and U.S. Attorney’s Office for the Southern District of New York announced yesterday (July 8, 2015) that VLADIMIR TSASTSIN pled guilty to wire fraud and computer intrusion charges “arising from his operation of a...more

Mobile App Developer Settles with FTC and New Jersey AG Over Virtual Currency Mining

On June 29, a mobile app developer entered into an agreement with the FTC and the New Jersey AG to settle allegations that the developer engaged in deceptive and unfair practices by marketing its rewards app, called “Prized,”...more

Travel Wi-Fi and Security. You May Not Know Who’s Watching.

Over the past few years, users have become increasingly aware of the inherent dangers of connecting to unsecured Wi-Fi networks. Unfortunately, existing security vulnerabilities in the underlying network hardware may still...more

Unsecured Networks More Susceptible to Data Theft

Over the past few years, users have become increasingly aware of the inherent dangers of connecting to unsecured Wi-Fi networks. Unfortunately, existing security vulnerabilities in the underlying network hardware may still...more

FFIEC: Beware Cyber Attacks, Destructive Malware

Why it matters - In a pair of joint statements, the Federal Financial Institutions Examination Council (FFIEC) cautioned financial institutions about cyber attacks compromising credentials and destructive malware. The...more

The FFIEC Warns Financial Institutions of the Dangers of Cyberattacks Involving Destructive Malware

On March 30th, the Federal Financial Institutions Examination Council (FFIEC) issued two Joint Statements on behalf of its members to warn financial institutions about the threats posed to various credentials by cyberattacks...more

IBM identifies cybercriminals’ increased use of Dyre Wolf to steal millions

IBM researchers reported late last week that they have identified an increase in the use of Dyre Wolf malware which has contributed to the loss of millions of dollars from victim companies. Dyre Wolf allows the intruders to...more

Privacy Tuesday – February 2015

Three things you should know on this Privacy Tuesday: Over 110,000 Facebook Uses Hit With Malware - Cybercriminals are targeting Facebook users with malware embedded in videos that are pushed to their timeline...more

Reminder: CASL’s Software Installation Provisions Took Effect on January 15, 2015

Phase 2 of Canada’s Anti-Spam Legislation (CASL) relating to the installation of computer programs will come into force on January 15, 2015. Commonly referred to as the malware prohibition, CASL goes far beyond prohibiting...more

FBI Issues Alert Following Unprecedented Malware Attack against U.S. Company

Last week, the Federal Bureau of Investigation (FBI) warned U.S. businesses to be alert for a malicious software bug capable of erasing hard drives and crashing networks. Although not specifically mentioned, cybersecurity...more

$150,000 HIPAA Settlement Following Breach of Unsecured PHI Due To Malware

The U.S. Department of Health and Human Services (HHS) Office of Civil Rights (OCR) announced on December 8, 2014 that a community behavioral health organization agreed to pay $150,000 and adopt a corrective action plan to...more

45 Results
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.