News & Analysis as of

Hackers Cybersecurity

Art Galleries, Dealers, Buyers, and Sellers Now the Target of High-Stakes Digital Heists

In the financial industry, companies engaging in million-dollar transactions invest in the latest in technology in order to safeguard valuable assets. However, in the art world—a market built on relationships and...more

Top 10 Topics for Directors in 2018

EXECUTIVE SUMMARY - 1. Cybersecurity threats. Cybersecurity preparedness is essential in 2018 as the risk of, and associated adverse impact of, breaches continue to rise. The past year redefined the upward bounds of the...more

Asset Management Regulatory Roundup - December 2017 - Issue 12

by Dechert LLP on

A compact summary of the most recent regulatory and tax developments relevant to the UK asset management industry. This issue includes details of the FCA’s stance on the reporting of cyber attacks; the Government’s opinion on...more

Senate Bill Introduced To Protect Personally Identifiable Information

by Jackson Lewis P.C. on

Primarily motivated by the several recent massive data breaches, Senate Democrats recently introduced a bill geared toward protecting Americans’ personal information against cyber attacks and to ensure timely notification and...more

When It Comes to Cybersecurity, Passwords are Passé

by Nexsen Pruet, PLLC on

In the ever-changing landscape of data security, it is increasingly clear that law firms of all sizes, from the one-lawyer shop to the 1,000-lawyer megafirm, are being targeted by hackers. As the methods used to gain access...more

At the End of Your Tether: Addressing, Responding to and Insuring Cryptocurrency Theft

by Reed Smith on

On November 20-21, 2017, Tether, the company behind USDT – a digital token backed by fiat currencies like the dollar and euro – disclosed that a hack resulted in the loss of $30.95 million worth of tokens. Tether posted an...more

Cyber Risk News & Trends - December 2017

Cybersecurity This Month - Continued onslaught of phishing and travel threats - Internet data breaches threaten the usernames and passwords of billions of people, but bad actors find phishing is the most effective way...more

Exploring Legal Malpractice Exposure Faced by Law Firms and Lawyers from Use of Technology

by Reminger Co., LPA on

The relationship between technology and the practice of law is a paradox at best. Computers, tablets, cell phones, and other forms of technology provide an enormous benefit by permitting the creation, storage, transmission...more

Data Privacy + Cybersecurity Insider - November 2017 #4

by Robinson & Cole LLP on

Intel has confirmed it has a bug in its remote server management tool. The tool, known as Management Engine, permits administrators of IT systems to access devices remotely to apply updates or troubleshoot problems for users....more

Healthcare Data Breaches Continue but Fell in October

The news about data breaches always seems to be dire lately. Some good news: data breaches in the healthcare industry were lower in October than in September, based upon reportable data breaches to the Office for Civil Rights...more

Uber’s Response to Data Breach? Pay the Hackers to Keep Quiet About It: Cybersecurity Trends

by CloudNine on

Hackers stole the personal data of 57 million customers and drivers from Uber last year. Their response? Conceal the breach for more than a year, and pay the hackers $100,000 to delete the data (sure they did) and keep quiet...more

Celebrate National Tax Security Awareness Week!

by Snell & Wilmer on

While it may be better known as “Cyber Monday”, today also marks the start of the second annual National Tax Security Awareness Week (November 27 to December 1). The Internal Revenue Service, state tax agencies and the tax...more

Florida Blue Breach Exposes Applications of 939 Individuals

Blue Cross Blue Shield of Florida (Florida Blue) has announced that 475 applications for insurance were backed up to the cloud, on an unsecured cloud server, by an unaffiliated agent of Real Time Health Quotes, and exposed...more

Imgur Discloses Breach Affecting Email and Passwords of 1.7 Million Users

On November 24, 2017, image-sharing website Imgur disclosed that email addresses and passwords of 1.7 million users were stolen in a 2014 hack on the company. Imgur became aware of the breach on November 23, 2017 when a...more

Privacy Tip #115 – Cyber Monday Safe Online Shopping

It is estimated that we will spend $4 billion online this year, including on Cyber Monday, coming up in just a few days. With the increase in online shopping, particularly over the holidays, it is prime time for scheming...more

Is Your Company Car Exposing Sensitive Data To Hackers?

by Fisher Phillips on

In today’s world, where lots of sensitive data are stored electronically, prudent companies utilize sophisticated computer cyber security systems to prevent the hacking of such data. They likely also require employees to...more

Smart-Home Devices: The Ugly

The Ugly of Technology — Ransomware Technology is fundamentally good and helpful to us; but, like so many things in our modern world, there is the good…the bad…and the ugly. In October 2016, what might have been the largest...more

Global Privacy & Cybersecurity Update Vol. 16

by Jones Day on

UNITED STATES - Regulatory—Policy, Best Practices, and Standards - United States and China Renew Promise Not to Hack - On October 4, U.S. and Chinese officials agreed to not engage in targeted hacking. Per a...more

Fall Data Breach Roundup And 2018 Preview: Supreme Court, OPM, Equifax And More!

by Carlton Fields on

As 2017 draws to a close, data breach class actions abound, while questions regarding what suffices for Article III standing in these cases remain—with litigants hoping the Supreme Court will soon weigh in....more

Cyber Insurance: Managing Your Cyber Liability and Avoiding Coverage Gaps

by Hogan Lovells on

Mark Goodman is a partner in our San Francisco office. In this hoganlovells.com interview, he addresses the need for companies to manage their cyber risk and the role that insurance plays in an organization’s overall risk...more

Locky Ransomware Variant Difficult to Detect

We previously warned readers about the Locky ransomware, which is potent and designed to use phishing emails to lure users to click on links and attachments, including pdfs....more

Data Privacy + Cybersecurity Insider - November 2017 #3

by Robinson & Cole LLP on

We previously warned readers about the Locky ransomware, which is potent and designed to use phishing emails to lure users to click on links and attachments, including pdfs. Now, researchers at Cylance have discovered...more

The evolving cyber insurance market: How IT companies, financial institutions, and other nontraditional players can offer cyber...

by Hogan Lovells on

In this hoganlovells.com interview, Hogan Lovells counsel Robert Fettman discusses the evolution of cyber insurance, the level of regulatory oversight applied to covered entities, and ways that noninsurance companies can...more

Defending The Business-To-Business Data Breach Lawsuit

by Ellis & Winters LLP on

Hardly a day goes by without a headline announcing that a prominent company has fallen victim to a data breach. These headlines are followed, almost inevitably, by reports of class action lawsuits filed by consumers whose...more

SEC Cyber Watch: Finally, New Guidelines for Breach Disclosures?

The U.S. Securities and Exchange Commission has signaled that it expects to issue updated guidelines on reporting cybersecurity incidents. “I think this issue is important enough, wide-ranging enough that we should tackle...more

908 Results
|
View per page
Page: of 37
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.