We have kept abreast of the security vulnerabilities of cars that have been exposed by security researchers. This time, researchers are asking Mitsubishi to recall approximately 100,000 Outlander hybrid vehicles as they were...more
Cat product service provider KitNipBox sued rival Meowbox in federal court in Washington alleging that Meowbox hacked into KitNipBox’s website to steal its trade secrets and confidential information and to disrupt its...more
6/14/2016
/ Civil Conspiracy ,
Confidential Information ,
Cyber Attacks ,
Cyber Crimes ,
ECPA ,
Electronic Communications ,
Hackers ,
Tortious Interference ,
Trade Secrets ,
Trademark Infringement ,
Unfair Competition ,
Unjust Enrichment ,
Websites
Genetic information is basically one’s DNA sequence, which includes health information and genetic information about the individual and their family. It is at the core of one’s individual privacy, as well as providing...more
Complete Chiropractic & Bodywork Therapies, located in Ann Arbor, Michigan, recently notified 4,082 patients that its server, which contained the electronic medical record and billing information of patients, was infected...more
The U.S. Department of Homeland Security Computer Emergency Readiness Team (US-CERT) recently issued an alert to the public about a vulnerability in old software developed by SAP SE that cyberattackers are using to infiltrate...more
A representative of Honeywell Process Solutions (Honeywell), which provides cybersecurity services for over 400 industrial sites worldwide, recently commented publicly that Honeywell is seeing an increase in nation-state and...more
Recently, a federal judge in Georgia ruled that the class action filed against Home Depot by the credit card companies could proceed. The judge stated that the card issuers’ allegations that Home Depot was negligent in its...more
We can’t go a week without commenting on how rampant ransomware is in the industry. The FBI recently released a report confirming how devastating ransomware has become for U.S. businesses....more
Cloud-based electronic medical record (EMR) company Practice Fusion has agreed to settle an enforcement action with the FTC that alleges that it misled consumers when it solicited reviews of their doctors. The FTC alleges...more
A Washington Redskins trainers’ unencrypted laptop was located in a backpack that was stolen on April 15th. Unfortunately, the laptop contained medical exam results for NFL Combine attendees since 2004, which is estimated to...more
A study published by Plymouth University’s Maritime Cyber Threats Research Group indicates that maritime vessels are at risk for cyber-attacks as many have outdated software and are not designed with cybersecurity in mind....more
On May 26, 2016, Illinois Senator Terry Link filed a proposed amendment to the Illinois Biometric Information Privacy Act that would presumably ease the rules relating to the collection and use of biometric data. What irked...more
USB drives and phone chargers are expensive. Hackers know that. One way hackers are gaining access to get into computers to steal data is by planting USB drives and phone chargers in public areas, hoping someone will pick it...more
In a rare and twisted result, Kansas Heart Hospital was hit with a ransomware attack on May 18th, and made the decision to pay a “small amount” to the attackers in order to get its data back. Kansas Heart stated that no...more
Experian Data Breach Resolution sponsored a recently released Ponemon Study entitled “Managing Insider Risk through Training & Culture.” The report is quite timely in light of all of the recent successful W-2 phishing...more
A recent Government Accountability Office report outlined vehicle cybersecurity concerns, outlining that hackers can penetrate the technology of vehicles in both long range and short range attacks, including targeting...more
We have been repeatedly warning our clients and readers about the massive and successful W-2 phishing schemes where hackers impersonate the CEO or CFO and send emails to payroll and/or HR folks in companies requesting W-2...more
6/1/2016
/ Cyber Crimes ,
Email ,
Hackers ,
Identity Theft ,
IRS ,
Payroll Records ,
Phishing Scams ,
Social Security Numbers ,
Sports ,
Tax Fraud ,
W-2
According to Noodles & Company (“Noodles”), it received information from Visa that Visa cards used by customers at its fast-food chains since January have “possibly” been compromised. It is presently investigating unusual...more
Diners who used credit and debit cards at the Tennessee based O’Charley’s restaurants between March 18, 2016, and April 8, 2016, were notified by O’Charley’s of a data breach that affected its point of sale systems. Consumers...more
The U.S. Food and Drug Administration (FDA) just issued draft guidance on the Use of Electronic Health Record Data in Clinical Investigations for comment within the next 60 days.
The guidance is intended to assist all...more
According to a study by Softchoice, 1-in-5 employees still keep their passwords in plain sight (like a Post-it Note on their desk or in the top drawer of their desk—now that’s original), have accessed work files from a device...more
A LinkedIn data breach in 2012 supposedly exposed 6.5 million LinkedIn users’ hashed passwords. LinkedIn announced yesterday (May 18, 2016) that in fact, it impacted more than 177 million user accounts, and that the...more
Hartford Steam Boiler released a study on May 17, 2016, that states that nine out of ten businesses have experienced at least one hacking incident in the past year, which represents a 21 percent increase since 2014....more
The Ponemon Institute has recently released its Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data. The study has included business associates for the past two years. The study included information received...more
The Federal Deposit Insurance Corporation (FDIC) reported on Monday, May 16, 2016, that it had experienced five “major incidents” involving the disclosure of taxpayers’ personal information since the last incident we reported...more