No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
Overview of Cybersecurity in Government Contracts
Cybersecurity: What Healthcare Providers Need to Know
No Password Required: The Teenage CEO of Girls Who Hack and Secure Open Vote, Who Is as Comfortable Behind a Mic as She Is Behind a Keyboard.
2022 DSIR Deeper Dive: NFTs
No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure
Webinar Recording - Crypto Breaches: Legal & Regulatory Update
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law
Defense In-Depth: Cybersecurity For Energy
Greetings and Felicitations - Aly McDevitt on Ransomware Case Study, Part 2
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
How to Protect your Organization From a Cybersecurity Attack
Phishing: Cybersecurity’s Biggest Threat
No Password Required: An Infowar Expert Paved the Path From Rock-And-Roll to Cybersecurity
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
CF on Cyber: The Anatomy of a Ransomware Attack - Part 1
Fighting Cyber Crime: The $1 Trillion Invisible Threat
Ethical hackers identified an arbitrary account takeover flaw in the administrator portal for Subaru’s Starlink service, which could allow a threat actor to hijack a vehicle through a Subaru employee account. This...more
Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more
The automotive industry has been a tight-knit and exclusive club since the 1950s automobile boom. After months of distress caused by semiconductor chip shortages, assembly plant shutdowns, and higher prices, is that still the...more
In this month's edition, we examine the Court of Justice of the European Union's decision invalidating the EU-U.S. Privacy Shield framework, as well as the U.S. government's response to the decision. We also examine two...more
On March 27, 2020, a five-year legal battle between three certified classes of Jeep Cherokee drivers and Fiat Chrysler came to a sudden end, when a federal judge in the Southern District of Illinois held that allegations that...more
The Washington Post, as part of an investigate report, worked with a hacker to figure out what kind of information OnStar is collecting (and what data is stored in your car) on a randomly selected 2017 Chevy Volt....more
Class-action litigation on claims that vehicles are vulnerable to hacking will go forward after the U.S. Supreme Court declined to review the class certification. The nation’s highest court denied the petition for certiorari...more
Happy New Year! While you are making (and soon breaking) your resolutions, here’s another lifestyle change to consider for 2019: putting your car fob in foil at night before you go to sleep. Why? Because the fob’s signal...more
Issues of cybersecurity in vehicles are high on consumers’ list of concerns in buying new vehicles. It also impacts public perception of self-driving cars, with a 2017 Cox Automotive survey finding 40% of consumers expressed...more
Plaintiff lawyers’ continued search for damage theories to assert in claims arising from a data breach – or fear of a breach – received a potential setback this week when Chief Judge Michael Reagan of the United States...more
Driverless cars and driver-assist systems are poised to change transportation as profoundly and as quickly as the internet has changed shopping and communications. Examples of the first wave of this technology that is on the...more
In today’s world, where lots of sensitive data are stored electronically, prudent companies utilize sophisticated computer cyber security systems to prevent the hacking of such data. They likely also require employees to...more
It is difficult these days to escape news of some sort of hack taking place. Whether it be hotels, pizza, telecoms, web service providers, or, of course, credit agencies. It should not surprise anyone that as automobiles...more
This month, Colorado joined a growing list of nearly half of U.S. states when it enacted a law approving the use of autonomous driving systems. The Colorado law governs systems capable of controlling highly and fully...more
With oil markets again in free fall, Saudi Arabia and Russia have agreed to cut production, and industry experts expect that the rest of OPEC may soon follow suit....more
The cars we drive to work every day run primarily on computers that collect thousands of data points. Same goes for the factory that manufactured them and the company that designed and sold them. This evolution makes...more
Auto manufacturers are increasingly equipping vehicles with rapidly advancing technologies, raising concerns regarding how the public will be affected by these changes. Manufacturers are beginning to implement automated...more
At this year’s Consumer Electronics Show, automotive technology continued its growing role at the show and shared the spotlight with virtual and augmented reality systems, video recording toothbrushes, and smart home products...more
Class action filings during the fall of 2016 continued to be dominated by Telephone Consumer Protection Act (“TCPA”) cases. As of October 1, 2016, nearly 150 cases have been filed; these filings are both daily in frequency...more
New NHTSA guidance represents the federal government’s first attempt to develop a comprehensive regulatory structure for automated vehicles. This transformative technology offers vast promises and significant concerns...more
The automotive industry has long been exempt from the cyber attacks that have affected so many companies operating in the financial services, healthcare and retail spaces. However, that is changing quickly due to the copious...more
In July 2016, the nonprofit Automotive Information Sharing and Analysis Center (“Auto-ISAC”) released a series of auto cybersecurity best practices to collectively address cyber threats that could pose unreasonable risks to...more
The Federal Communications Commission issued a notice last week notifying the public that it is accepting comments on the Petition filed by Public Knowledge and the Open Technology Institute at New America, which requests a...more
Auto-ISAC is not alone in its efforts to address potential cybersecurity risks imposed by connected vehicles. As we have previously discussed, in 2015 legislators introduced the SPY Car Act, which requires automakers to meet...more
We have previously reported on hackings of automobiles. Not only can hackings obtain information about your driving habits, your GPS usage and location, the use of your cell phone, access to your contacts, and other...more