News & Analysis as of

Hackers

Privacy Tip #114 – Your Email May Have Been Hijacked and You Don’t Know It

A new study by Google, the University of California Berkeley and the International Computer Science Institute has concluded that email users are being threatened by massive credential theft and phishing schemes are the...more

Data Breach Costs an Average of $3.6 Million

There have been a myriad of research studies attempting to come up with the “cost” of a data breach. The most recent, released by AT&T, estimates that it costs organizations $3.6 million to recover from a data breach....more

Smart-Home Devices: Bad HAL

Internet of Things and Smart Homes - With about two billion do-this, do-that and do-the-other gadgets gaining space in big-box stores and online shopping carts – and another seven billion expected to flood the market by...more

The evolving cyber insurance market: How IT companies, financial institutions, and other nontraditional players can offer cyber...

by Hogan Lovells on

In this hoganlovells.com interview, Hogan Lovells counsel Robert Fettman discusses the evolution of cyber insurance, the level of regulatory oversight applied to covered entities, and ways that noninsurance companies can...more

Defending The Business-To-Business Data Breach Lawsuit

by Ellis & Winters LLP on

Hardly a day goes by without a headline announcing that a prominent company has fallen victim to a data breach. These headlines are followed, almost inevitably, by reports of class action lawsuits filed by consumers whose...more

SEC Cyber Watch: Finally, New Guidelines for Breach Disclosures?

The U.S. Securities and Exchange Commission has signaled that it expects to issue updated guidelines on reporting cybersecurity incidents. “I think this issue is important enough, wide-ranging enough that we should tackle...more

Indictment Of Day Trader For Hacking And Securities Fraud Demonstrates How Bitcoin Can Be Used For Money Laundering

by Fox Rothschild LLP on

Earlier this week, a federal grand jury in Brooklyn returned an indictment criminally charging a self-described “day trader” with various offenses in connection with an alleged computer hacking scheme involving more than 50...more

Data Privacy + Cybersecurity Insider - November 2017 #2

by Robinson & Cole LLP on

Michigan Governor Rick Snyder has signed into law the Cyber Civilian Corps Act, which established the Michigan Cyber Civilian Corps, dubbed MiC3. The corps has been in existence for three years but not statutorily deployed. ...more

Your Daily Dose of Financial News

by Robins Kaplan LLP on

AT&T’s chief is weighing in the DOJ’s call to sell CNN in order to make its deal with Time Warner go through, and, as Randall sees it, “selling CNN makes no sense”....more

SEC Enforcement Division Priorities Pertaining to Retail Investors and Cybersecurity

by Dechert LLP on

In a keynote speech to the Securities Enforcement Forum on October 26, 2017, U.S. SEC Division of Enforcement (Division) Co-Director Stephanie Avakian emphasized the protection of retail investors and cybersecurity as...more

Yes, Your Business Needs a Data Protection Officer

by Revision Legal on

On May 28, 2018, new data protections laws and regulations go into effect for the European Union (“EU”). The new regulations are called the General Data Protection Regulation (“GDPR”)....more

Beazley Publishes Special Report on 2017 Healthcare Breaches

Beazley has published a report outlining data breaches in the first nine months of 2017. The report notes that the highest cause of a data breach in 2017 so far are unintended disclosures, which accounted for 41 percent of...more

Michigan Governor Establishes Cyber Civilian Corp.

Michigan Governor Rick Snyder has signed into law the Cyber Civilian Corps Act, which established the Michigan Cyber Civilian Corps, dubbed MiC3, which has been in existence for three years, but not statutorily deployed....more

Day Trader Charged in Computer Hacking Scheme

by Dorsey & Whitney LLP on

Two key areas of focus for the SEC are retail investors and cyber. Both of those elements are present in the latest case filed by the U.S. Attorney’s Office for the Eastern District of New York which parallels a previously...more

Smart-Home Devices: The Good Stuff

Gadgets with Bluetooth technology, USB ports and wireless capabilities flood the market. Such specialized products adjust air-conditioners, play music and turn on lights. They also can tell whether a particular room in the...more

New York Introduces New Data Protection Legislation

by Fisher Phillips on

Citing a sixty percent increase in data breach notifications from 2015 to 2016, New York Attorney General Eric Schneiderman recently introduced the Stop Hacks and Improve Data Electronic Security Act (SHIELD) bill. The...more

Hackers Increasingly Using Weak RDP Credentials In Ransomware Attacks

by Fox Rothschild LLP on

Industry publication Data Breach Today reports hackers are increasingly exploiting weak Remote Desktop Protocol (RDP) credentials to launch ransomware attacks. “Many enterprises use remote desktop protocol to remotely...more

Clinical trials Part II: Privacy, cybersecurity risks, and managing ePHI

by Thompson Coburn LLP on

The ongoing digitization of the drug and medical device industries continues, and, as a result, new considerations have come to the forefront for companies engaged in clinical trials. In Part 1 of this series, we described a...more

Damaging, but Preventable: WannaCry Report Reveals Vital Cyberattack Prevention Practices

by Faegre Baker Daniels on

In May 2017, ransomware known as WannaCry affected computers in organizations around the world, encrypting data and demanding “ransoms” of between $300 and $600, payable in Bitcoin. WannaCry spread through organizations’...more

The Data Report Episode 20: Workplace Data Security - Identifying Red Flags

by Bilzin Sumberg on

Module Six: Workplace Data Security (Part I) Litigation attorney Jay Ward begins a new module discussing workplace privacy and data security. This episode of The Data Report focuses on best practices for businesses to...more

New York AG Announces SHIELD Act

by Jackson Lewis P.C. on

On November 2nd, New York Attorney General Eric T. Schneiderman announced his proposal of the SHIELD Act – Stop Hacks and Improve Electronic Data Security Act – a bill that would heighten data security requirements for...more

Hilton Settles Data Breach Investigations with NY and VT AGs

Hilton Domestic Operating Co., Inc. (Hilton) has agreed to pay the New York and Vermont Attorneys General $700,000 to settle allegations that they violated those state consumer protection and data breach notification laws...more

Data Privacy + Cybersecurity Insider - November 2017

by Robinson & Cole LLP on

US-CERT Warns of New Ransomware: Bad Rabbit - The U.S. Computer Emergency Readiness Team (US-CERT) is warning companies in the U.S. about a new ransomware dubbed “Bad Rabbit.” US-CERT stated it has received multiple...more

Business Email Compromise: What It Is and What You Can Do

by Snell & Wilmer on

Business email compromise (“BEC”) is a type of cyberattack that is increasing at an alarming pace. The U.S. Federal Bureau of Investigation estimated in a May 2017 alert that global losses due to BEC scams totaled more than...more

Privacy Tip #112 – LG Releases IoT Software Update

Security researchers at Check Point discovered software vulnerabilities in LG IoT devices which allowed them to potentially gain control over LG refrigerators, ovens, dishwashers and a live feed from a robot vacuum cleaner. A...more

1,437 Results
|
View per page
Page: of 58
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.