News & Analysis as of

Smartphones Mobile Devices Cybersecurity

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #284 – Check Out EFF’s Surveillance Self-Defense Playlist: Getting to Know Your Phone

The Electronic Frontier Foundation (EFF) (www.eff.org) is a wonderful resource for privacy-related issues and concerns. I check its website frequently to make sure I am aware of the latest issues and concerns around privacy....more

Womble Bond Dickinson

Remember Good Data Hygiene: An Official Advisory from the US Government

Womble Bond Dickinson on

Our government is telling us that bringing home that new holiday iPhone® should be a more complicated process than most of us realize. New US Department of Homeland Security (DHS) guidance is appropriately timed to coincide...more

Wilson Sonsini Goodrich & Rosati

New FTC Report Recommends Steps to Improve Mobile Security Updates

In February 2018, the Federal Trade Commission (FTC) released a report that explores the complexities of the mobile ecosystem and makes recommendations for industry to improve the mobile security update process for consumers....more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - March 2018 #3

Robinson & Cole LLP on

Verizon's Protected Health Information Data Breach Report Concludes that Insiders Are Greatest Threat to Health Care Entities - Verizon recently issued its Protected Health Information Data Breach Report, which is always...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #130 – Smartphones Targeted by Dark Caracal Attack

There is a global malware campaign that is targeting mobile devices across the world. It is called Dark Caracal, which is believed to be sourced in Beirut by the Lebanese General Security Directorate. ...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #103 – Smartphone Replacement Parts Subject to Hacking

You drop your smartphone and now there are a million cracks and you can hardly read your texts. Getting the screen replaced by the manufacturer of the phone is usually expensive and sometimes it is so expensive that it makes...more

Robinson+Cole Data Privacy + Security Insider

Privacy TIp #86 - Android Users Vulnerable to Malware through Apps

University of Michigan researchers have discovered that hundreds of applications in Google Play turn Android phones into a server that allow the user to connect the phone directly to a PC and leave open insecure ports...more

Robinson+Cole Data Privacy + Security Insider

Smartphone Malware Up 400% in 2016

Here’s some more good news. Not really. According to a recent report by Nokia, malware infections against mobile devices were at an all- time high in 2016. Infections on smartphones rose almost 400 percent and...more

Robins Kaplan LLP

A Selfie’s Worth a Thousand Dollars

Robins Kaplan LLP on

A picture might be worth a thousand words, but could it also be worth a thousand dollars? New technology by MasterCard and Amazon may mean that the new hammock you’ve been eying online is only a camera flash away....more

Robinson+Cole Data Privacy + Security Insider

Android smartphones Stagefright engine vulnerable

It is being reported that 95% of all Android smartphones are vulnerable to being hacked with a text message, which is being called the “heartbleed for mobile.” According to security experts, the vulnerability exploits the...more

Poyner Spruill LLP

“Bring Your Own Device” To Work Programs: Regulatory and Legal Risks and How To Minimize Them

Poyner Spruill LLP on

If you’ve ever left your mobile phone on an airplane, in a restaurant, or somewhere other than in your possession, you know it’s frightening enough to think of losing the device itself, which costs a premium, as well as your...more

BakerHostetler

2014 Mobile Privacy and Security Trends and What to Look for in 2015

BakerHostetler on

Most analysts and commentators agree that 2014 was the year mobile reached a tipping point. With over 1 billion mobile smartphones in circulation, 2014 marked the first year that mobile Internet usage surpassed desktop use in...more

Mintz - Privacy & Cybersecurity Viewpoints

On the Third Day of Privacy, My Smartphone Followed Me…

In 2013 geolocation and biometrics were hot topics. Apple included a fingerprint reader on the new iPhone which was either really cool or an epic fail depending on your viewpoint, and Google and the NSA are tracking our...more

13 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide