CYBERSECURITY -
White House Focused on Combating Ransomware -
Ransomware attacks are frequent and escalating as we speak. Double extortion scams are hitting companies at a dizzying pace, and catching companies, large...more
7/16/2021
/ Article III ,
Biden Administration ,
Canon ,
COPPA ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Drones ,
Federal Aviation Administration (FAA) ,
Hackers ,
Ransomware ,
Smart Devices ,
Standing ,
Telemarketing ,
Text Messages
COVID-19 Vaccine Test Lab Hit by Maze Ransomware -
Despite the fact that the hackers behind Maze ransomware previously promised not to hit medical organizations during the coronavirus pandemic, the ransomware recently...more
3/31/2020
/ California Consumer Privacy Act (CCPA) ,
Coronavirus/COVID-19 ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Drones ,
Federal Aviation Administration (FAA) ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Ransomware ,
Spam ,
Telecommuting ,
Telehealth
Researchers at Sentinel One and Dragos have detected malicious code, called EKANS or Snake, that has been designed specifically to target industrial control systems (ICS), including those of oil refineries, manufacturing...more
2/7/2020
/ China ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Health and Human Services (HHS) ,
Drones ,
Hackers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Identity Theft ,
Infectious Diseases ,
Malware ,
Medical Records ,
OCR ,
Personally Identifiable Information ,
Point of Sale Terminals ,
Public Health ,
Retailers ,
Tax Fraud ,
Vulnerability Assessments
National Veterinary Associates (NVA), a large network of veterinary hospitals and clinics, has reportedly been the victim of a ransomware attack. According to the reports, NVA employs more than 2,600 veterinarians, with over...more
12/11/2019
/ Aviation Industry ,
Beneficiaries ,
Biometric Information ,
Bitcoin ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Drones ,
Hackers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Medicare ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
Restaurant Industry ,
Settlement Agreements ,
Virtual Currency
According to a recent survey of cybersecurity professionals by AT&T Cybersecurity entitled “Confidence: the perception and reality of cybersecurity threats,” phishing and cloud security threats are keeping them up at...more
5/3/2019
/ Best Practices ,
Cyber Attacks ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Health and Human Services (HHS) ,
Drones ,
Federal Aviation Administration (FAA) ,
Hackers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
HITECH Act ,
Limitation of Liability Clause ,
Phishing Scams ,
Popular ,
Unmanned Aircraft Systems
Cybercriminals have launched a new campaign that not only requires the victim to pay a ransom to have their data decrypted, but when the victim is directed to a PayPal account to pay the ransom and get the decryption key to...more
1/21/2019
/ Biometric Information ,
California Consumer Privacy Act (CCPA) ,
Cell Phones ,
Commercial General Liability Policies ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data-Sharing ,
Drones ,
Geological Data ,
Hackers ,
HIPAA Breach ,
Personally Identifiable Information ,
Ransomware ,
Right to Privacy ,
Risk Management ,
Rulemaking Process ,
WISP
For data security buffs like me, the recent McAfee® Labs Threats Report, December 2018 is, or should be, a top pick on the list. Well, maybe not for the holiday reading list. We need to be careful not to bring up the results...more
12/27/2018
/ Article III ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Driverless Cars ,
Drones ,
Experian ,
Hackers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Information Technology ,
OCR ,
Public Health ,
Risk Management ,
Smart Devices ,
Standing ,
Transportation Industry ,
Vaccinations ,
Value-Based Care ,
Vulnerability Assessments
According to reports by WhoWhatWhy and the Associated Press, five security experts have confirmed a private citizen’s allegation that the Georgia Online Voter Database contains a major security flaw and is vulnerable to...more
11/12/2018
/ Commercial Use ,
Credit Cards ,
Customer-Loyalty Programs ,
Data Breach ,
Databases ,
Drones ,
HIPAA Breach ,
Hospitality Industry ,
Hotels ,
Identity Theft ,
Kenya ,
Phishing Scams ,
USPS ,
Vulnerability Assessments
The U.S. Patent and Trademark Office (USPTO) announced last week that it has discovered unauthorized users have attempted to hack into its online trademark system to attempt to make unauthorized changes to active trademark...more
10/29/2018
/ Airspace ,
Beyond Visual Line Of Sight (BVLOS) ,
Centers for Medicare & Medicaid Services (CMS) ,
Credit Security Freeze ,
Cyber Attacks ,
Data Breach ,
Drones ,
Employee Training ,
General Electric ,
Hackers ,
HIPAA Breach ,
Intellectual Property Protection ,
Legal Ethics ,
New Legislation ,
Risk Management ,
Small Business ,
Trademark Application ,
Trademark Registration ,
Unmanned Aircraft Systems ,
USPTO
Many consumers are unaware that retailers use facial recognition technology in retail stores to monitor shoppers and prevent shoplifting. Consumers see cameras in retail stores and assume they are there to monitor for...more
10/15/2018
/ Americans with Disabilities Act (ADA) ,
COPPA ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Disability Discrimination ,
Driverless Cars ,
Drones ,
Enforcement Actions ,
EU-US Privacy Shield ,
Facial Recognition Technology ,
Federal Aviation Administration (FAA) ,
Federal Trade Commission (FTC) ,
OIG ,
Online Safety for Children ,
Personally Identifiable Information ,
Popular ,
Regulatory Standards ,
Title III ,
Trump Administration ,
Unmanned Aircraft Systems ,
Website Accessibility ,
Website Owner Liability ,
Websites
The State of California is once again leading the way with trying to keep up with technology and protecting consumers. Senate Bill 327 requires Internet of Things (IoT) developers to implement “reasonable security features”...more
10/1/2018
/ Biometric Information ,
Biometric Information Privacy Act ,
Blockchain ,
COPPA ,
Cyber Attacks ,
Cyber Insurance ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Protection ,
Drones ,
Fingerprints ,
General Data Protection Regulation (GDPR) ,
Hackers ,
Hurricane Florence ,
Insurance Claims ,
Internet of Things ,
Online Safety for Children ,
Passwords ,
Popular ,
Property Damage ,
Settlement ,
State Farm ,
Uber
We have previously reported on the ongoing cybersecurity issues with St. Jude defibrillators [view related posts here, here, and here]. On June 29, 2018, the Food and Drug Administration (FDA) classified the required firmware...more
7/16/2018
/ Adidas ,
Computer Fraud and Abuse Act (CFAA) ,
Constitutional Challenges ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Drones ,
Emergency Management Plans ,
Emergency Response ,
EU-US Privacy Shield ,
Federal Aviation Administration (FAA) ,
Federal Trade Commission (FTC) ,
Food and Drug Administration (FDA) ,
Hackers ,
Healthcare ,
Healthcare Facilities ,
HIPAA Breach ,
Medical Devices ,
Mobile Apps ,
Popular ,
Ransomware ,
Regulatory Requirements ,
Regulatory Violations ,
St Jude Medical Center ,
Wildfires
Just weeks after Mexico’s central bank was targeted by hackers who stole $15 million, Chile’s biggest bank, Banco de Chile, announced on May 28, 2018, that it had been struck by a “virus” that affected its workstations,...more
7/2/2018
/ Banks ,
Carpenter v US ,
Cell Phones ,
Credit Reporting Agencies ,
Criminal Convictions ,
Cryptocurrency ,
Currency Exchange ,
Data Breach ,
Drones ,
Electronic Records ,
Electronically Stored Information ,
Exigent Circumstances ,
Fourth Amendment ,
Geolocation ,
Hackers ,
Harassment ,
Identity Theft ,
Location Data ,
location-da ,
Malware ,
NYDFS ,
Probable Cause ,
Reasonable Expectation of Privacy ,
Registration Requirement ,
Remand ,
Reversal ,
Robocalling ,
SCOTUS ,
Third-Party ,
Warrantless Searches
Bezop Cryptocurrency Investors’ Personal Information Exposed -
Kromtech Security has reported that the sensitive personal information of more than 25,000 investors of Bezop cryptocurrency was exposed when a MongoDB...more
5/4/2018
/ Cryptocurrency ,
Cybersecurity ,
Data Breach ,
Digital Currency ,
Drones ,
Hackers ,
Health Care Providers ,
HIPAA Breach ,
Hospitality Industry ,
PHI ,
Smart Devices ,
Unmanned Aircraft Systems ,
Virtual Currency
“Orangeworm” Targeting Health Care Industry -
In what is being called a systematic targeting of large health care organizations, pharmaceutical companies, and IT companies and equipment manufacturers that service the...more
4/27/2018
/ Blue Shield ,
Criminal Investigations ,
Cyber Attacks ,
Cyber Insurance ,
Data Breach ,
Digital Currency ,
Drones ,
Enforcement Actions ,
Extraterritoriality Rules ,
Hackers ,
Health Care Providers ,
Healthcare ,
Medical Devices ,
Personal Data ,
PHI ,
Risk Management ,
Scams ,
September 11th Victim Compensation Fund ,
SunTrust ,
Unmanned Aircraft Systems ,
US v Microsoft ,
Virtual Currency
On the heels of the ransomware that had the City of Atlanta scrambling last week, New York City Mayor Bill de Blasio announced the launch of “NYC Secure,” a free mobile app that will alert New York City residents of...more
4/10/2018
/ Blockchain ,
Cambridge Analytica ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Distributed Ledger Technology (DLT) ,
Drones ,
Electric Vehicles ,
Electronically Stored Information ,
Facebook ,
Legislative Agendas ,
New Legislation ,
Part 107 ,
Personal Data ,
Proposed Legislation ,
Ransomware ,
Social Media ,
State Data Breach Notification Statutes ,
Taxi Cabs ,
US v Microsoft
Power Company Fined for Contractor Copying Data to its Own Insecure Network -
Vendor management continues to be a problem for all industries, but some are scarier than others. The North American Electric Reliability Corp....more
3/30/2018
/ Asset Management ,
Cloud Storage ,
Cybersecurity ,
Data Breach ,
Driverless Cars ,
Drones ,
Electronically Stored Information ,
Energy Sector ,
Federal Aviation Administration (FAA) ,
FERC ,
Fraud ,
Identity Theft ,
Infrastructure ,
NERC ,
NIST ,
Part 107 ,
Popular ,
Social Security ,
State Data Breach Notification Statutes ,
Third-Party Service Provider ,
Unmanned Aircraft Systems ,
Utilities Sector ,
Vulnerability Assessments
U.S. Estimates that Cyber Hacks Cost Up to $109 Billion in 20 -
The Council for Economic Advisors (CEA) issued a report this month, entitled “The Cost of Malicious Cyber Activity to the U.S. Economy,” which concludes that...more
2/26/2018
/ Banking Sector ,
Bitcoin ,
Class Action ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Department of Justice (DOJ) ,
Digital Currency ,
Disclosure Requirements ,
Drones ,
Federal Agency Taskforce ,
Hackers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Malware ,
OCR ,
PHI ,
Publicly-Traded Companies ,
Securities and Exchange Commission (SEC) ,
TCPA ,
Virtual Currency
US-CERT Warns of New Ransomware: Bad Rabbit -
The U.S. Computer Emergency Readiness Team (US-CERT) is warning companies in the U.S. about a new ransomware dubbed “Bad Rabbit.” US-CERT stated it has received multiple...more
11/3/2017
/ Airspace ,
Biometric Information ,
Centers for Medicare & Medicaid Services (CMS) ,
Children's Health Insurance Program (CHIP) ,
Class Action ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Department of Transportation (DOT) ,
Drones ,
Federal Aviation Administration (FAA) ,
Federal Pilot Programs ,
Fingerprints ,
Hackers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Hilton ,
Hospitality Industry ,
Hotels ,
Hyatt ,
Information Technology ,
Internet of Things ,
LG Electronics ,
Malware ,
Medicare Access and CHIP Reauthorization (MACRA) ,
MIPS ,
NASA ,
Personally Identifiable Information ,
Ransomware ,
Risk Management ,
Unmanned Aircraft Systems ,
US-CERT
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more
10/24/2017
/ Amazon Marketplace ,
Biometric Information ,
Biometric Information Privacy Act ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Drones ,
Electronically Stored Information ,
Email ,
Extraterritoriality Rules ,
Hackers ,
Hyatt ,
Microsoft ,
Mobile Devices ,
Network Security ,
Personal Data ,
Privacy Concerns ,
Public Wireless Networks ,
Risk Management ,
SCOTUS ,
Stored Communications Act ,
US-CERT ,
Vulnerability Assessments ,
Wifi ,
Wireless Technology