News & Analysis as of

Hackers Data Security Social Media

Robinson+Cole Data Privacy + Security Insider

X Hit with DDoS Attack

According to Security Week, X (formerly Twitter) was hit with a distributed denial-of-service (DDoS) attack that disrupted tens of thousands of X users’ ability to access the platform on March 10, 2025....more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - October 2021

Robinson & Cole LLP on

CYBERSECURITY - Cyber Criminals Focusing on Clinics + Business Associates - As hospital systems become more hardened to cyber-attacks, cyber criminals are focusing their efforts on smaller providers, such as outpatient...more

Cozen O'Connor

41-State Data Breach Settlement | Additional CCPA Regulations | Suit Over Patient Discharge Notice

Cozen O'Connor on

Antitrust- Attorneys General Testify in House Hearing on Big Tech and Competition- •On March 18, 2021, Colorado AG Phil Weiser and Nebraska AG Doug Peterson testified before the Subcommittee on Antitrust, Commercial,...more

Bass, Berry & Sims PLC

Privacy Perils: Beware Brand Phishing

Bass, Berry & Sims PLC on

We often think of phony financial institution emails as a bad actor’s phishing scheme of choice to capture confidential bank account numbers or other private financial information. While those phishing emails certainly do...more

Robinson+Cole Data Privacy + Security Insider

Health Information Sharing and Analysis Center Warns Health Systems to Be Wary of Iranian Cyber-Attacks

Following the escalation of tensions between the United States and Iran in the past week, the Health Information Sharing and Analysis Center (H-ISAC) is warning hospitals and health systems that Iran could attack health...more

McDermott Will & Emery

What Articles Don’t Usually Tell You About Reputation Management

McDermott Will & Emery on

Joseph Hall once said, “A reputation once broken may possibly be repaired, but the world will always keep their eyes on the spot where the crack was”. In 2019 we like to think there is a filter for everything, but what about...more

Butler Snow LLP

Court Allows Company to Surreptitiously Monitor Former Employee’s Social Media Account to Support its Trade Secrets Claim

Butler Snow LLP on

A federal court of appeals recently found that there was nothing wrong with a company monitoring a departed employee’s Facebook account and using that information to pursue a trade secrets claim against four former employees....more

K&L Gates LLP

Digital Crisis PR: Top Five Items to Include in a Digital Crisis Plan

K&L Gates LLP on

Today’s world demands a multifaceted approach to digital content that can negatively affect your business. In this episode, we outline the five key steps to take in the face of a digital crisis, from defining what constitutes...more

Pillsbury - Internet & Social Media Law Blog

Would You Like Malware with Your Grumpy Cat Meme?

Social media companies like Facebook and Twitter have written “white papers” and devoted considerable resources to projects intended to create services that encourage trust and a sense of familiarity on the part of users....more

K2 Integrity

Protecting Your Privacy Online Is Possible

K2 Integrity on

Navigating the crossroads of security and convenience is a balancing act, but it can be done. Two minutes. That’s all it takes to perform a Google search on yourself—or anyone you choose—and obtain a virtual encyclopedia...more

Foley & Lardner LLP

Health Care Employees at the Frontline in The Battle Against Ransomware

Foley & Lardner LLP on

As recent noteworthy attacks have shown, no health care organization or provider is safe from ransomware threats, and the results of an attack can be devastating. Ransomware is a virus which limits or eliminates access to...more

Robinson+Cole Data Privacy + Security Insider

Report says social media one of biggest security threats to companies

A new report released by Osterman Research, sponsored by Actiance, GWAVA and Smarsh, tells us that social media is one of the biggest security threats for companies. Malware is increasingly making its way into companies via...more

King & Spalding

Coordinated Hackers Infiltrate 200 Targeted Employees’ LinkedIn Networks

King & Spalding on

Cybersecurity researchers at the Dell SecureWorks Counter Threat Unit (“Dell CTU”) uncovered a network of approximately 25 fake LinkedIn profiles that Dell CTU believes were used by an Iran-linked hacker group to establish at...more

Pillsbury - Internet & Social Media Law Blog

Ashley Madison and Coming to “Terms” with Data Protection

A recent massive data hack of an online dating site Ashley Madison once again proves that what one publishes, says, or does online, even in seemingly private forums, is never completely private. It’s also a reminder that the...more

14 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide