Latest Posts › Hackers

Share:

The Arizona Data Breach Law

All U.S states have laws about data security and what to do when there’s a data breach. Here is what’s in the Arizona law. Who The Law Applies To. The law applies to anyone who conducts business in Arizona and who owns or...more

Snell & Wilmer Rolls Out Interactive Data Breach Map

Snell & Wilmer’s Breach Response Team regularly guides clients through all phases of data breach and cyber incident response, including leading internal investigations related to data breaches and cyber incidents in...more

Business Email Compromise: What It Is and What You Can Do

Business email compromise (“BEC”) is a type of cyberattack that is increasing at an alarming pace. The U.S. Federal Bureau of Investigation estimated in a May 2017 alert that global losses due to BEC scams totaled more than...more

How to Protect and Secure Your Connected Devices

The Federal Bureau of Investigation is warning companies and the public to be aware of vulnerabilities that cybercriminals could exploit in connected devices, otherwise known as Internet of Things devices....more

Travelers, Beware the “Darkhotel” Hacks Over Hotel Internet

Business travelers may be targeted and hacked through hotel Wi-Fi networks, according to a recent report by Kaspersky Lab. Hackers have been stealing company data from top executives at luxury hotels in an attack known as...more

5 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide