Hackers

News & Analysis as of

New York AG Reports that Data Breaches Cost New York Businesses over $1B Last Year

The current headline in data security is a just-released report from the New York Attorney General's Office (the "AG Report") announcing that the number of reported data breaches more than tripled between 2006 and 2013,...more

They are coming for your client’s data. What will you do if they succeed?

Data security breaches—no industry is immune. These hackers can phish, spoof, skim, packet sniff, and key log their way into your system. Once a hacker successfully hacks into a corporation’s server, the breach will go...more

Hedge Fund Hack Results in Trade Secret Loss, and Raises SEC Reporting Issues

Data breaches may be nothing new, but they are certainly evolving into bigger and more notorious infractions. While the data breaches of yesterday may have involved accidental disclosure or disgruntled former employees, the...more

Fraudulent use of a service by hackers – a lesson for service providers

A recent case contains some salutary lessons for service providers concerning liability for fraudulent use of their services. It appears that unless the contract has clear terms to the contrary then the service provider, not...more

Data Breach Laws Continue to Come

Retail. Financial services. Health care. Energy. Not an industry has been spared when it comes to recent data and cyber breaches, and the colossal damage that occurs to the interests of the company, its employees, and third...more

TRO LLC – GET IT? Sprung From Prison, Hacker Creates Hedge Fund That Shorts Stocks Of Companies With Security Vulnerabilities

Self-proclaimed Internet troll and hacker Andrew “weev” Auernheimer has big plans now that he’s been sprung from prison. We identified Auernheimer’s imprisonment and appeal as one of the top trade secret stories of...more

DOJ Charges Chinese Military Hackers with Economic Espionage

In what is the first case of its kind, the Justice Department has filed criminal charges against Chinese military officers for hacking U.S. Companies. Five Chinese military officers, all members of China’s Peoples’ Liberation...more

United States Charges China with Cyber-Espionage in Unprecedented Indictment

This morning, the U.S. Department of Justice (DOJ) announced that a grand jury in the Western District of Pennsylvania has indicted five Chinese military officials on charges of computer hacking, economic espionage, and...more

United States v. China: The Battle over Cyber-Espionage Results in Criminal Charges

For those of us who have been active in cybersecurity, it is a well known fact that the Chinese government, acting through its military, has been the most prolific global perpetrators of cyber-espionage. Over the past several...more

Cybersecurity, solar energy and the electric grid

A group of Russian hackers claims to have identified security gaps in widely-used solar panel monitoring software. The monitoring platform's developer is said to be fixing the gaps -- but can hackers damage the electric...more

A CTO’s Views On How To Combat Hackers & Cybercriminals

In this article, I delve into the views and opinions of a chief technology officer of a telecommunications company to understand important steps a company can take to combat hackers and cyber-criminals....more

Internet of Things at the Salone, but what legal issues for furnitures?

The Internet of Things will generate 9 billion devices by 2018 according to estimates, but the recent hacker attack that caused a fridge to send over 750,000 spam and phishing messages over the Christmas break create concerns...more

License to Hack? DOJ Seeks Expanded Authority to Use Hacking Techniques

As part of its increased focus on combating cybercrime, the U.S. Department of Justice is pushing to loosen requirements for obtaining search warrants in order to allow them greater freedom to hack into the computers of...more

You're Not Immune: Hackers Target Health Care Providers Of All Shapes & Sizes

For health care providers, exposure to cyberattacks is becoming a stark reality. Findings in a recently released Health Care Cyberthreat Report by cybersecurity leaders confirmed the health care industry's vulnerabilities for...more

Message from New York Court: Rely on CGL Policy Coverage for Data Breaches at Your Own Peril

A New York trial court announced a decision on February 21, 2014, that may be a harbinger of wide-reaching limitations on insurance coverage for data breaches under commercial general liability (CGL) policies. The court’s...more

Personal Injury Coverage Does not Apply to Data Breach

According to a Law360 report, Sony Units Denied Coverage For Suits Tied To Cyber Attack (subscription required), a New York state judge ruled last Friday in the Zurich v. Sony insurance litigation that the stealing of...more

“Sophisticated” Breach Exposes 300,000 Student Records at University of Maryland: 3 Questions You Should Ask

Officials at the University of Maryland (“University” or “UMD”) announced that UMD was the victim of a significant security breach that took place on Tuesday, February 18 (the “Breach” or “Incident”). The Incident,...more

Access Of Computer System With Log-In Credentials Is Not Unlawful “Hacking”

A California federal court in Enki Corporation v. Freedman held that a former employee’s access of the employer’s computer systems through his log-in credentials did not amount to unlawful hacking under either the Computer...more

Fenwick Employment Brief - February 2014

A California federal court in Enki Corporation v. Freedman held that a former employee’s access of the employer’s computer systems through his log-in credentials did not amount to unlawful hacking under either the Computer...more

Q&A with Andrew Benedict-Nelson from Insight Labs

Greentarget recently participated in two days of training on how to address a problem from different, unique ways. Andrew Benedict-Nelson led this training and took some time to talk about the lessons learned and why it’s...more

Can Violating Social Media Terms of Use Make You Guilty of Violating the CFAA?

LinkedIn has filed a suit against John Does in response to a spate of “data scraping” perpetrated by unknown individuals, in violation of the website’s terms and conditions.This is the latest federal case in the Northern...more

Hackers' Withdrawal Of Funds Not Covered Under Property "All Risks" Policy

In Metro Brokers, Inc. v. Transportation Insurance Company, Inc. Civil Action no. 1:12-cv-3010-ODE, (2013), the United States District Court for the Northern District of Georgia applied Georgia contract law to find no...more

Valuable $50,000 Twitter Account Allegedly Stolen

There was an interesting January 29, 2014, article on CNET written by Don Reisinger describing how a thief/hacker allegedly hijacked an Internet domain name and e-mail account belonging to Naoki Hiroshima and stole his...more

"Cybersecurity: Amid Increasing Attacks and Government Controversy, a Framework to Reduce Risk Emerges"

2013 likely will be considered a watershed period in the role of cybersecurity in corporate strategy and management. While there were few significant legislative developments, a marked increase in cybersecurity attacks...more

Data Security Breach at Target is an Important Lesson for All Companies

News about the data security breach at Target is rapidly developing. Current reports indicate that in the last few weeks, the credit and debit card information for as many as 40 million Target customers was compromised.1 The...more

105 Results
|
View per page
Page: of 5