News & Analysis as of

Social Networks Cybersecurity

Orrick, Herrington & Sutcliffe LLP

5 Things You Need to Know About NIS 2

On 10 November 2022, the European Parliament approved the Network and Information Security 2 Directive ("NIS 2"), moving a step closer to expanding the scope of the Network and Information Security ("NIS") Directive, the EU's...more

Opportune LLP

Longing For A Digital Twin: What The Colonial Pipeline Cyberattack Can Teach Us About Planning For Uncertainty

Opportune LLP on

Find out why the recent Colonial Pipeline cyberattack reinforces the need for modeling and creating a digital twin of a supply chain, which can go a long way in planning for uncertainty....more

Hogan Lovells

El Comité Europeo de Protección de Datos y el targeting en redes sociales

Hogan Lovells on

Nadie puede ignorar la importancia de las redes sociales hoy en día. A nivel usuario, se han erigido como uno de los principales canales de comunicación y pilar de las nuevas (o no tan nuevas) generaciones, y a nivel de...more

ArentFox Schiff

Interactive Counsel Newsletter: Privacy Report: FBI Issues Updated Ransomware Guidance

ArentFox Schiff on

FBI Issues Updated Ransomware Guidance - A recent report from New Zealand-based cybersecurity firm Emsisoft has revealed the extent to which ransomware is being used in cyberattacks in the United States. The first 9 months...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - September 2019 #3

Robinson & Cole LLP on

Many cities in the United States utilize a self-pay portal for residents to pay bills online, known as Click2Gov. Click2Gov was compromised in 2017 and 2018, when hackers were able to access over 300,000 payment cards and...more

Foley & Lardner LLP

With More Than 8 Billion Things, Where Are the IoT Privacy Laws?

Foley & Lardner LLP on

No one knows for sure how many "things" are connected to the Internet, but the Federal Trade Commission reported last year that it was more than 8 billion, and that it would exceed 20 billion by the end of 2020! Astonishing...more

Epiq

Australia Takes Steps to Tighten Data Security Laws

Epiq on

Australia has recently taken significant action in the realm of data security that will potentially have global impact. In December 2018, the Australian Competition and Consumer Commission (“ACCC”) released recommendations on...more

Robinson+Cole Data Privacy + Security Insider

Facebook Acknowledges Breach of Sensitive Date for Nearly 30 Million Users

As we previously noted, Facebook originally announced a breach late last month, where hackers took advantage of a code vulnerability in the website’s “View As” feature, to access user’s data. ...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - October 2018

Robinson & Cole LLP on

On October 1, 2018, the Food and Drug Administration (FDA) issued its “Medical Device Cybersecurity Regional Incident Preparedness and Response Playbook” to address continued threats to medical devices that could affect...more

K2 Integrity

Too Good to Be True: Cyber Safety Tips

K2 Integrity on

When seasoned investigators are exposed to online scams, the protective warnings they give to others on social media safety and internet fraud suddenly become real. Read on to see how one of our own dodged an online rental...more

Pillsbury - Internet & Social Media Law Blog

Would You Like Malware with Your Grumpy Cat Meme?

Social media companies like Facebook and Twitter have written “white papers” and devoted considerable resources to projects intended to create services that encourage trust and a sense of familiarity on the part of users....more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #125 – Check + Set LinkedIn Privacy Settings

It is well known that hackers and fraudsters surf Facebook to find individuals who have not protected their information through Facebook’s privacy settings. People put a lot of information on Facebook that is very personal...more

K2 Integrity

Cybersecurity Awareness: Limiting Your Exposure and Visibility

K2 Integrity on

We spend so much time on our mobile phones and on social media, yet often we don’t think of how these tools are broadcasting our lives as we work and play. With just a few steps, you can limit what you are digitally telling...more

Pillsbury - Internet & Social Media Law Blog

The Doxing Dilemma: A Popular Tactic of Social Activists and Cyber Bullies Alike Remains Mostly Legal

After counter-protests ended in tragedy, a small group of social media users took to Twitter to expose the identities of the white supremacists and neo-Nazis rallying in Charlottesville, Va. Since last Sunday, the...more

Bass, Berry & Sims PLC

Privacy Perils: Know Your LinkedIn Settings

Who has viewed your LinkedIn profile lately? We are all at least a little curious to learn the answer and review such reports provided periodically by LinkedIn. However, unless you adjust your privacy settings accordingly,...more

BCLP

Data Privacy and Security: A Practical Guide for In-House Counsel, 2017 Edition

BCLP on

Boulder Partner David Zetoony published the 2017 edition of his handbook, Data Privacy and Security: A Practical Guide for In-House Counsel, on Jan. 28 – Data Privacy Day. The guide provides an overview of laws relevant to a...more

Jackson Lewis P.C.

President Donald J. Trump – What Lies Ahead for Privacy, Cybersecurity, e-Communication?

Jackson Lewis P.C. on

Following a brutal campaign – one laced with Wikileaks’ email dumps, confidential Clinton emails left unprotected, flurries of Twitter and other social media activity – it will be interesting to see how a Trump Administration...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #59 – Check your Privacy Settings on Your LinkedIn Account

I am watching Game 7 of the World Series, and it is the bottom of the 8th and the score is 6-6. It is very difficult to concentrate on this blog post. So I am taking the easy way out and reminding you to check the...more

McGuireWoods LLP

Social Media’s Expanding Distribution of Internet Advertising Impacts Privacy and Security

McGuireWoods LLP on

Last week, social media giant Facebook announced an expansion of its online advertising business to include serving ads to users who are not members of Facebook. Under a press posting titled “Bringing People Better Ads,”...more

King & Spalding

Coordinated Hackers Infiltrate 200 Targeted Employees’ LinkedIn Networks

King & Spalding on

Cybersecurity researchers at the Dell SecureWorks Counter Threat Unit (“Dell CTU”) uncovered a network of approximately 25 fake LinkedIn profiles that Dell CTU believes were used by an Iran-linked hacker group to establish at...more

Eversheds Sutherland (US) LLP

NAIC Cybersecurity Forum Focuses on Escalating Threats and Best Remediation Practices

On September 10, the National Association of Insurance Commissioners (NAIC) co-sponsored a cybersecurity forum at the Center for Strategic and International Studies in Washington, DC. Featuring an impressive line-up of senior...more

Zelle  LLP

That is SO last week - July 2015 #3

Zelle LLP on

There’s just no rest for employment lawyers this summer. We had another exciting week. The biggest news was the EEOC’s ruling that Title VII prohibits discrimination on the basis of sexual orientation. The agency found that...more

King & Spalding

Internet Of Things, News Websites Fare Poorly In Security And Privacy Review

King & Spalding on

On June 16, the Online Trust Alliance, an industry group focused on developing and encouraging best practices in online security and privacy, announced that a recent audit of approximately 1,000 websites showed that 46%...more

Baker Donelson

Cybersecurity in the Workplace: Obama's Proposals and More

Baker Donelson on

In the past five years, employers both big and small have become accustomed to social media and increased technology in the workplace. Everyone and their parents are on Facebook, and one cannot go anywhere without being asked...more

Cooley LLP

Alert: Pro-ISIS Hackers Targeting Media Outlets

Cooley LLP on

Recent widely publicized cyberattacks have made clear that nation-state hackers are now hacking companies for political purposes and they appear to be focused on broadcasters and other media companies....more

30 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide