Latest Publications

Share:

International Maritime Bureau warns of cyber attacks

Following the issuance of Plymouth University Maritime Cyber Threats Research Group study on the risk of cyber threats, the International Maritime Bureau (IMB) recently issued a warning to shipping and maritime companies to...more

World Energy Council warns utility industry of advanced malware

The World Energy Council recently warned the utility industry that one of the top threats to the energy sector is advanced malware attacks. The warning noted that the utility sector is vulnerable because of the size of the...more

Illinois data breach law amended and includes new twists

Governor Bruce Rauner signed several new provisions into law amending Illinois’ Personal Information Privacy Act, including health insurance and medical information into the definition of personal information that triggers...more

Privacy Tip #40 – Dashcam apps and driving habits

Huh? What is a dashcam app? A dashcam app uses a smartphones on the dashboard of a car to record traffic accidents, cars running red lights and bad drivers causing accidents. Dashcams can detect hard braking and can...more

First home cyber protection insurance offered by Hartford Steam Boiler

The Hartford Steam Boiler Inspection and Insurance Company has announced that it is offering “the first personal lines cyber insurance program for consumers, protecting against computer attacks, cyber extortion, online fraud...more

Connecticut governor signs student privacy act into law

On June 9, 2016, Governor Dannel Malloy, who continues to show his commitment to data privacy, signed An Act Concerning Student Data Privacy into law, effective October 1, 2016. The law requires any local or regional...more

Raytheon/Ponemon survey confirms companies wait until an event to hire a data security vendor

The results of a Raytheon commissioned Ponemon study released on June 7, 2016 shows that at least two-thirds of businesses wait until they have experienced a cyber-attack or data breach to hire and retain security vendors to...more

Recreational model aircraft hobbyist files appeal against FAA for drone registration

We previously reported that model aircraft hobbyist John Taylor filed suit against the Federal Aviation Administration (FAA) challenging the requirement to register with the FAA in order to fly his model aircraft near his...more

Privacy Tip #39 – Be Wary of IRS Phone Scams

Although the IRS has warned taxpayers on multiple occasions about IRS phone scams, consumers continue to be victims. A lucrative scam for years, which according to the IRS, has cost victims more than $26 million since 2013,...more

Another popular car broken into by security researchers

We have kept abreast of the security vulnerabilities of cars that have been exposed by security researchers. This time, researchers are asking Mitsubishi to recall approximately 100,000 Outlander hybrid vehicles as they were...more

KitNipBox Sues Meowbox for Allegedly Hacking Website and Stealing Trade Secrets

Cat product service provider KitNipBox sued rival Meowbox in federal court in Washington alleging that Meowbox hacked into KitNipBox’s website to steal its trade secrets and confidential information and to disrupt its...more

Privacy Tip #38 – Genetic Privacy and the Use of Genomic Information

Genetic information is basically one’s DNA sequence, which includes health information and genetic information about the individual and their family. It is at the core of one’s individual privacy, as well as providing...more

Chiropractic Clinic Hit with Malware

Complete Chiropractic & Bodywork Therapies, located in Ann Arbor, Michigan, recently notified 4,082 patients that its server, which contained the electronic medical record and billing information of patients, was infected...more

US-CERT Warns of Old SAP Software Vulnerability

The U.S. Department of Homeland Security Computer Emergency Readiness Team (US-CERT) recently issued an alert to the public about a vulnerability in old software developed by SAP SE that cyberattackers are using to infiltrate...more

State Sponsored Attacks Increasing and Targeting Industrial Facilities

A representative of Honeywell Process Solutions (Honeywell), which provides cybersecurity services for over 400 industrial sites worldwide, recently commented publicly that Honeywell is seeing an increase in nation-state and...more

Credit Card Issuers Cleared to Proceed Against Home Depot

Recently, a federal judge in Georgia ruled that the class action filed against Home Depot by the credit card companies could proceed. The judge stated that the card issuers’ allegations that Home Depot was negligent in its...more

FBI Report: Ransomware and Phishing Scams Increasing

We can’t go a week without commenting on how rampant ransomware is in the industry. The FBI recently released a report confirming how devastating ransomware has become for U.S. businesses....more

EMR company settles with FTC for posting physician surveys that contained health information on its website

Cloud-based electronic medical record (EMR) company Practice Fusion has agreed to settle an enforcement action with the FTC that alleges that it misled consumers when it solicited reviews of their doctors. The FTC alleges...more

Medical Records of NFL Players Taken in Theft of Unencrypted Laptop

A Washington Redskins trainers’ unencrypted laptop was located in a backpack that was stolen on April 15th. Unfortunately, the laptop contained medical exam results for NFL Combine attendees since 2004, which is estimated to...more

Maritime cyber threats are real and need to be addressed

A study published by Plymouth University’s Maritime Cyber Threats Research Group indicates that maritime vessels are at risk for cyber-attacks as many have outdated software and are not designed with cybersecurity in mind....more

Proposed amendment to Illinois biometrics privacy law introduced then stalled

On May 26, 2016, Illinois Senator Terry Link filed a proposed amendment to the Illinois Biometric Information Privacy Act that would presumably ease the rules relating to the collection and use of biometric data. What irked...more

Privacy Tip #37 – Beware of fake USB drives and phone chargers

USB drives and phone chargers are expensive. Hackers know that. One way hackers are gaining access to get into computers to steal data is by planting USB drives and phone chargers in public areas, hoping someone will pick it...more

Kansas Heart Hospital pays ransom but attackers renege on their word

In a rare and twisted result, Kansas Heart Hospital was hit with a ransomware attack on May 18th, and made the decision to pay a “small amount” to the attackers in order to get its data back. Kansas Heart stated that no...more

Experian sponsors Ponemon study on data breach

Experian Data Breach Resolution sponsored a recently released Ponemon Study entitled “Managing Insider Risk through Training & Culture.” The report is quite timely in light of all of the recent successful W-2 phishing...more

Privacy Tip #36 – Connected car security

A recent Government Accountability Office report outlined vehicle cybersecurity concerns, outlining that hackers can penetrate the technology of vehicles in both long range and short range attacks, including targeting...more

2,211 Results
 / 
View per page
Page: of 89

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide