News & Analysis as of

Hackers Data Protection Telecommunications

Robinson+Cole Data Privacy + Security Insider

Public Urged to Encrypt Mobile Phone Messaging and Calls

On December 4, 2024, four of the five members of the Five Eyes intelligence-sharing group (the United States, Australia, Canada, and New Zealand) law enforcement and cyber security agencies (Agencies) published a joint guide...more

Katten Muchin Rosenman LLP

NSA Wants Industry to Disclose Details of Telecom Hacks in Light of Chinese Involvement

On November 20, 2024, the director of the National Security Agency, General Timothy Haugh, urged the private sector to take swift, collective action to share key details about breaches they have suffered at the hands of...more

Ankura

Ankura CTIX FLASH Update - December 8, 2023, Ankura CTIX

Ankura on

New Linux Remote Access Trojan "Krasue" Targets Thai Telecom Sector - A newly discovered Remote Access Trojan (RAT) for Linux has been seen targeting telecommunications firms in Thailand as reported by Group-IB. Named RAT...more

Troutman Pepper Locke

Cyber Capsule - February 2023

Troutman Pepper Locke on

Before we jump into February developments — trigger warning if you are a Russian hacker — for those keeping track of breach notification requirements, the National Credit Union Administration (NCUA) Board approved a final...more

Robinson+Cole Data Privacy + Security Insider

T-Mobile Clarifies Facts of Security Incident in Press Release

There has been a flurry of reporting in the past few days on the T-Mobile customer data compromise, with allegations that the compromise affected up to 100 million customers. ...more

Lighthouse

Does Cellular 5G Equal 5x the Fraud and Misconduct Risk?

Lighthouse on

Increased cellular speed through mobile devices offer increased opportunity for fraudsters to circumvent corporate IT controls by using shadow IT platforms to infiltrate proprietary and confidential data at scale, wreak havoc...more

Shumaker, Loop & Kendrick, LLP

Client Alert: Protecting Intellectual Property in Remote-Based Work Settings

During the COVID-19 pandemic, teleworking has become both a requirement and a preference to facilitate a safe and healthy workplace. However, remote-based work settings may pose intentional and unintentional threats to...more

Lowndes

Five Cybersecurity Practices to Minimize Risk During Coronavirus

Lowndes on

As concerns about the coronavirus (COVID-19) continue to grow, many companies are planning to have more employees work from home. While these measures are aimed at keeping employees healthy and safe, it’s also important to...more

Proskauer on Privacy

Tales from the (Quantum) Crypt

Proskauer on Privacy on

The dream of hack-proof communication just got a little closer to reality. On August 16, 2016, China launched the world’s first “quantum satellite,” a project the Chinese government hopes will enable it to build a...more

Bilzin Sumberg

Alphabet Soup and Data Security

Bilzin Sumberg on

In the span of two days, mobile device users learned of two data breaches that could compromise their personal data. In one, Experian (a credit reporting agency) reported that it was hacked, potentially putting 15 million...more

K&L Gates LLP

Internet of Things – What does it mean for business?

K&L Gates LLP on

What is the Internet of Things? The 'Internet of Things' (IoT) is a catchphrase describing the increasing interconnectedness between smart devices and sensors facilitated through their connection to the internet. It's not a...more

11 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide