News & Analysis as of

Authentication Hackers

Ankura

Ankura CTIX FLASH Update - May 2022

Ankura on

German Entities Targeted with PowerShell RAT - Threat actors are actively targeting German entities with custom PowerShell payloads to gather information about the ongoing conflict between Russia and Ukraine. The malicious...more

Manatt, Phelps & Phillips, LLP

Improved Method for Overcoming Hacking by Turning On and Off Authentication Held Patent Eligible

In CosmoKey Solutions GMBH & Co. KG v. Duo Security LLC, the Federal Circuit held that an improved method for overcoming computer hacking by turning on and off the authentication process was patent eligible. The court held...more

Ballard Spahr LLP

FinCEN Director Blanco Addresses “Cyber Hygiene”

Ballard Spahr LLP on

FinCEN Director Kenneth A. Blanco delivered prepared remarks on September 24 at the 2019 Federal Identity (FedID) Forum and Exposition in Tampa, Florida. Director Blanco summarized the topics of his remarks by stating the...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - March 2019 #3

Robinson & Cole LLP on

The headlines of hacking incidents against counties, cities and towns are racking up like the retail space was several years ago. The hackers have targeted state and municipalities to wreak their havoc. This week, Orange...more

Robinson+Cole Data Privacy + Security Insider

Closing The Door Behind Your MFA Implementation

I came across an article last week that indicated there was a successful attack on Microsoft’s Office 365 and Google’s G Suite environments that was able to bypass multi-factor authentication (MFA). However, after reading the...more

Stoel Rives - Global Privacy & Security Blog®

New tool released that may allow bad actors with almost any skill set to bypass many implementations of Two-Factor Authentication...

Until recently, hackers have had limited success stealing Two-Factor Authentication (2FA) PIN and token information. Unfortunately, a tool has been released that will now make it much easier for practically any bad actor to...more

Robinson+Cole Data Privacy + Security Insider

The Latest Hack into a Smart Home Camera – Another Reason to Use Two Factor Authentication

Sometimes I feel like I’m the Grinch at a party when I talk shop about the latest massive data breach or horrible hacker story that is in the news. We say things like, “it’s not if, but when” there will be another data...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - December 2018

Robinson & Cole LLP on

Darkreading.com has issued a survey entitled Monetizing the Insider: The Growing Symbiosis of Insiders and the Dark Web, which states that malicious insiders are responsible for 27 percent of all cybercrime. This statistic...more

BCLP

Passwords

BCLP on

Many consumers, and many employees, have dozens of passwords for access to different systems, services, networks, device, and terminals. From a corporate perspective, many companies have at least two policies that impact...more

McManis Faulkner

Hackers are Vampires - Keep Them from Feeding on Your Private Information

McManis Faulkner on

According to myth, vampires can only enter your home if you let them in. Hackers, the vampires of cyber-world, are out there, waiting for you to ‘invite’ them in so they may feed on your private information. There is no...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Passwords Are Getting Ridiculous, Right? Consider Simplifying Your Company's Two-Factor Authentication With A Physical Security...

If you clicked on this post, that means you probably fall into one of two categories. Category 1: You are really tired of having to come up with – and remember – increasingly more complicated passwords, only to then be asked...more

Opportune LLP

Power Plants: Cybersecurity Threats and Risks (Part 2)

Opportune LLP on

“Defense in depth” refers to employing multiple layers of security that makes it more difficult for cyber hackers to gain access to sensitive plant control networks. These can include complex passwords, shorter password...more

Hinshaw & Culbertson LLP

Cyber Alert - Dual Factor Authentication Can Be Hacked By Phishing

Risk Management Question: Dual factor authentication greatly increases your online security, but it is no panacea. Dual factor authentication can be compromised through social engineering and phishing exploits. What can law...more

Snell & Wilmer

FTC’s “Stick With Security” #3: Require Secure Passwords and Authentication

Snell & Wilmer on

On August 11, 2017, the FTC released its third “Stick with Security” principle, which touched on the necessity of strong authentication practices. Secure passwords and fortified authentication practices make it that much...more

Bass, Berry & Sims PLC

Privacy Perils: 2FA or Not 2FA - That is the Question

We've previously described and recommended the use of multi-factor (or two factor) authentication (2FA) on multiple occasions...more

Bass, Berry & Sims PLC

Privacy Perils: Identify Theft and Social Networking

Bass, Berry & Sims PLC on

Identity theft through social networking is on the rise. Hacked accounts may be used to impersonate you and potentially cause reputational harm, or may even link the hacker to your financial account information and...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #49 – Use a Passphrase Instead of a Password

I love to train employees on data privacy and security. It tends to be rather entertaining as I can tell crazy stories about real life scenarios about data breaches or compromises. The stores are quite beneficial, as most...more

Bryan Cave Leighton Paisner

How to Avoid or Respond to Wire Transfer Fraud

Businesses are increasingly falling victim to wire fraud scams – sometimes referred to as “man-in-the-email” or “business email compromise” scams. Although there are multiple variants, a common situation involves an attacker...more

King & Spalding

GAO Issues Report Citing Shortcomings In Federal Government Cybersecurity

King & Spalding on

On July 8, 2015, the Government Accountability Office (“GAO”) issued a report finding that agencies across the federal government continue to have shortcomings in preventing, detecting, and responding to cyber threats. The...more

Manatt, Phelps & Phillips, LLP

Class Is in Session: The FTC Launches New Data Security Initiative

Why it matters - The Federal Trade Commission (FTC) kicked off a new educational initiative to provide guidance to businesses in the area of data security. Based on the lessons learned from more than 50 of the agency's...more

20 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide