News & Analysis as of

Cyber Attacks

Privacy Tip #114 – Your Email May Have Been Hijacked and You Don’t Know It

A new study by Google, the University of California Berkeley and the International Computer Science Institute has concluded that email users are being threatened by massive credential theft and phishing schemes are the...more

Data Breach Costs an Average of $3.6 Million

There have been a myriad of research studies attempting to come up with the “cost” of a data breach. The most recent, released by AT&T, estimates that it costs organizations $3.6 million to recover from a data breach....more

The evolving cyber insurance market: How IT companies, financial institutions, and other nontraditional players can offer cyber...

by Hogan Lovells on

In this hoganlovells.com interview, Hogan Lovells counsel Robert Fettman discusses the evolution of cyber insurance, the level of regulatory oversight applied to covered entities, and ways that noninsurance companies can...more

Defending The Business-To-Business Data Breach Lawsuit

by Ellis & Winters LLP on

Hardly a day goes by without a headline announcing that a prominent company has fallen victim to a data breach. These headlines are followed, almost inevitably, by reports of class action lawsuits filed by consumers whose...more

Your Daily Dose of Financial News

by Robins Kaplan LLP on

Big news out of Uber this weekend, where the company and its board resolved outstanding issues with Travis Kalanick in order to finalize a deal in which a SoftBank-led consortium of investors will buy up about $1 billion of...more

Data Privacy + Cybersecurity Insider - November 2017 #2

by Robinson & Cole LLP on

Michigan Governor Rick Snyder has signed into law the Cyber Civilian Corps Act, which established the Michigan Cyber Civilian Corps, dubbed MiC3. The corps has been in existence for three years but not statutorily deployed. ...more

A Question of Privilege: Court Wrestles With Attorney-Client and Work Product Issues in Data Breach Case

In a significant ruling addressing the scope of the attorney-client privilege and work product doctrine in a data breach case, a Federal judge in Oregon ordered Premera Blue Cross, the Washington-based healthcare services...more

Beazley Publishes Special Report on 2017 Healthcare Breaches

Beazley has published a report outlining data breaches in the first nine months of 2017. The report notes that the highest cause of a data breach in 2017 so far are unintended disclosures, which accounted for 41 percent of...more

Michigan Governor Establishes Cyber Civilian Corp.

Michigan Governor Rick Snyder has signed into law the Cyber Civilian Corps Act, which established the Michigan Cyber Civilian Corps, dubbed MiC3, which has been in existence for three years, but not statutorily deployed....more

Hackers Increasingly Using Weak RDP Credentials In Ransomware Attacks

by Fox Rothschild LLP on

Industry publication Data Breach Today reports hackers are increasingly exploiting weak Remote Desktop Protocol (RDP) credentials to launch ransomware attacks. “Many enterprises use remote desktop protocol to remotely...more

Damaging, but Preventable: WannaCry Report Reveals Vital Cyberattack Prevention Practices

by Faegre Baker Daniels on

In May 2017, ransomware known as WannaCry affected computers in organizations around the world, encrypting data and demanding “ransoms” of between $300 and $600, payable in Bitcoin. WannaCry spread through organizations’...more

Hilton Settles Data Breach Investigations with NY and VT AGs

Hilton Domestic Operating Co., Inc. (Hilton) has agreed to pay the New York and Vermont Attorneys General $700,000 to settle allegations that they violated those state consumer protection and data breach notification laws...more

Data Privacy + Cybersecurity Insider - November 2017

by Robinson & Cole LLP on

US-CERT Warns of New Ransomware: Bad Rabbit - The U.S. Computer Emergency Readiness Team (US-CERT) is warning companies in the U.S. about a new ransomware dubbed “Bad Rabbit.” US-CERT stated it has received multiple...more

Business Email Compromise: What It Is and What You Can Do

by Snell & Wilmer on

Business email compromise (“BEC”) is a type of cyberattack that is increasing at an alarming pace. The U.S. Federal Bureau of Investigation estimated in a May 2017 alert that global losses due to BEC scams totaled more than...more

Privacy Tip #112 – LG Releases IoT Software Update

Security researchers at Check Point discovered software vulnerabilities in LG IoT devices which allowed them to potentially gain control over LG refrigerators, ovens, dishwashers and a live feed from a robot vacuum cleaner. A...more

US-CERT Warns of New Ransomware: Bad Rabbit

The U.S. Computer Emergency Readiness Team (US-CERT)is warning companies in the U.S. about a new ransomware dubbed “Bad Rabbit.” US-CERT stated that it has received multiple reports of infections by Bad Rabbit in countries...more

Ghost Ships, Shadow Brokers and Cryptoworms: October is National Cyber Security Awareness Month

by Baker Donelson on

In a chillingly apropos follow-on to the mid-summer global Petya and WannaCry cyber/ransomware attacks, which crippled businesses and government interests around the world, October has been dubbed “National Cyber Security...more

Standing Only Gets You So Far. Scottrade Offers Tactics To Win The Data Breach Class Action War

by Orrick - Trust Anchor on

A recent skirmish about standing in data breach class actions (this time in the Eighth Circuit), involving securities and brokerage firm Scottrade, suggests that, even if plaintiffs win that limited question, there are other...more

Don’t Let Hackers Profit from Your Privacy

These days, data sharing is more than a business—it’s an industry. Every day, data aggregators and brokers comb the internet for personal information. Because they rarely engage directly with us, we are dangerously unaware of...more

Happy Halloween! Is Your Franchise System Insured For Social Engineering Fraud Claims?

by Fox Rothschild LLP on

As cyber scams become more widespread and sophisticated, social engineering fraud is quickly turning into one of the most popular way for a thief to rip-off a company using computers. Every franchise system should be asking...more

Top 10 Best Practices for Handling a Data Breach

by Fenwick & West LLP on

Data breaches are a reality that all businesses need to take seriously. Knowing your vulnerabilities is only part of the solution. You and your key stakeholders should be prepared with an incident response plan that defines...more

Thinking About Bugs

by Reed Smith on

Security bugs may have wildly disparate paths of extermination. Some are quietly patched with code updates, while others make the national news and trigger companies’ incident response plans. Is your company aware of the data...more

ALERT: Prepare to be Ransomed: A Primer on Legal Obligations Before and After Ransomware Strikes

by Pullman & Comley, LLC on

According to a recent U.S. Government Interagency report, ransomware is the fastest growing malware threat, targeting users of all types. An incredible 51 percent of respondents in a January 2017 study by the Ponemon...more

FERC Proposes New Cybersecurity Rules for Electric Grid

The Federal Energy Regulatory Commission (FERC) has proposed new rules to enhance cybersecurity for the electric grid in the U.S., which includes security management controls to specifically respond to risks associated with...more

Energy and Critical Infrastructure Industries Warned of Increased Attacks by FBI and DHS

The FBI and Department of Homeland Security issued a joint statement on October 20 warning of an increased danger of a malicious “multi-stage intrusion campaign” to critical infrastructure industries, including the energy...more

1,575 Results
|
View per page
Page: of 63
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.