News & Analysis as of

Malware

Privacy Tip #135 – Cybersecurity Spring Cleaning Tips

Here’s a great idea offered by the National Cyber Security Alliance and the Better Business Bureau: while you are doing your spring cleaning, don’t forget to do a digital spring cleaning too—that is, your computer, cellphone...more

What Employers Need to Know About the Dark Web

by Fisher Phillips on

The average internet user may be largely unaware that there are actually different “levels” of the internet. First, there is the surface level of the internet where companies post their webpages, and where employees may...more

Busy Data Breach Week

Unfortunately, it was another busy data breach week. Here’s a summary of the major ones. Delta Airlines admitted in a statement that the payment card data of several hundred thousand customers may have been compromised by...more

Notice of Appeal - A Quarterly Review of Third Circuit Opinions for White-Collar Criminal Lawyers - April 2018

by Cozen O'Connor on

Precedential Opinions of Note - Third Circuit Evaluates Standards for Conspiracy in Insider Trading Case - United States v. Metro (Feb. 14, 2018), No. 16-3813 Unanimous decision: Jordan (writing), Hardiman,...more

Privacy Perils: Not I Said the Fly, Nor Me Said the Bee

by Bass, Berry & Sims PLC on

We have all been cautioned so often about the risks of opening malware-infected email attachments, or clicking on fraudulent links embedded in an email, we can become desensitized to the actual danger. We think "surely, in...more

Atlanta Cyberattack Shows Importance of Cybersecurity for Municipalities

On March 22, 2018, a cyberattack hit the City of Atlanta. A ransomware program infected the City’s computer systems. That malware encrypted the city’s files, and officials believe it may also have provided unauthorized...more

Would You Like Malware with Your Grumpy Cat Meme?

Social media companies like Facebook and Twitter have written “white papers” and devoted considerable resources to projects intended to create services that encourage trust and a sense of familiarity on the part of users....more

Take the Test: Will You Fall Prey to Phishing? 6 Tips to Identifying an Email Scam

by McManis Faulkner on

Email is the driving force of communication. Lawyers often receive over 100 emails a day. It can be easy to overlook potential scams hidden in your inbox. Hopefully, your firm has the proper security protocols in place:...more

Data Privacy + Cybersecurity Insider - March 2018 #3

by Robinson & Cole LLP on

Verizon's Protected Health Information Data Breach Report Concludes that Insiders Are Greatest Threat to Health Care Entities - Verizon recently issued its Protected Health Information Data Breach Report, which is always...more

Privacy Tip #130 – Smartphones Targeted by Dark Caracal Attack

There is a global malware campaign that is targeting mobile devices across the world. It is called Dark Caracal, which is believed to be sourced in Beirut by the Lebanese General Security Directorate. ...more

Full Metal Cryptojacket

by Ifrah PLLC on

In retrospect, it all seems so predictable. International capitalism creates virtual currencies. Banks are avoided. Millennials hail a new world order of anonymous or nearly untraceable market transactions. Numerous parties...more

Data Privacy + Cybersecurity Insider - February 2018 #4

by Robinson & Cole LLP on

U.S. Estimates that Cyber Hacks Cost Up to $109 Billion in 20 - The Council for Economic Advisors (CEA) issued a report this month, entitled “The Cost of Malicious Cyber Activity to the U.S. Economy,” which concludes that...more

U.S. Estimates that Cyber Hacks Cost Up to $109 Billion in 2016

The Council for Economic Advisors (CEA) issued a report this month, entitled “The Cost of Malicious Cyber Activity to the U.S. Economy,” which concludes that “malicious cyber activity cost the U.S. economy between $57 billion...more

The Obvious Partnership — Compliance and Cybersecurity

by Michael Volkov on

Cybersecurity compliance, like the compliance profession, is rapidly growing. The forces pushing cyber compliance are two-fold: the ever-increasing and changing nature of cyber threats and harms, and the logical application...more

HaoBao Malware Hitting Banks Scans for Bitcoin Activity

Lazarus, the well-known hacking group responsible for the WannaCry ransomware attack from last year, as well as the attack on the Bangladesh Central Bank and Sony, is now targeting global financial firms and Bitcoin adopters...more

OCR Warns of Cyber Extortion and Provides Checklist

In its January newsletter, the Office for Civil Rights (OCR) focused on cyber extortion, which it stated has “risen steadily over the past couple of years and continue to be a major source of disruption for many...more

Federal Circuit Finds Claims Directed to Protecting Against Malware Patent Eligible

In Finjan, Inc. v. Blue Coat Systems, Inc., No. 2016-2520 (Fed. Cir. Jan. 10, 2018), the Federal Circuit reviewed Finjan’s assertion of two patents related to methods for protecting against malware. The Court (1) affirmed...more

OCC Identifies Cybersecurity as an Increasing Risk to Banks in Semiannual Risk Perspective

by Weiner Brodsky Kider PC on

The Office of the Comptroller of the Currency (OCC) recently released its Semiannual Risk Perspective for Fall 2017, assessing the risks facing national banks and federal savings associations as of June 30, 2017. A key risk...more

Three Practical Considerations When Evaluating Your Cyber Extortion Coverage

by K&L Gates LLP on

Cyber crime has increased significantly over the past several years, with no indications that the annual increases will stop or even slow down. Many analysts predict that global ransomware “damages” will exceed $5 Billion in...more

Understanding cyber insurance risks of target companies

Due to the dramatic increase and changing nature of cyber risks, mergers and acquisitions due diligence should expand to address cyber risks, available risk mitigation practices, and available insurance. Acquiring companies...more

Data Privacy + Cybersecurity Insider - January 2018 #3

by Robinson & Cole LLP on

Think Tank Says Nuclear Missiles Can be Inadvertently Launched Through Cyber-Attacks - Just before the false alarm in Hawaii last weekend when residents were erroneously warned of an impending missile attack, think tank...more

Think Tank Says Nuclear Missiles Can be Inadvertently Launched Through Cyber-Attacks

Just before the false alarm last weekend in Hawaii when residents were erroneously warned of an impending missile attack, think tank Chatham House issued a report stating that it had identified vulnerabilities in nuclear...more

Another Hitch in the Crypto Boom? North Korean Malware Hijacks Computers to Mine Monero Cryptocurrency

Researchers at cybersecurity firm AlienVault have discovered a computer virus of North Korean origin which infects and hijacks computers in order to mine Monero, a private digital currency which styles itself as “secure,...more

Data Privacy + Cybersecurity Insider - January 2018 #2

by Robinson & Cole LLP on

Health Care Organizations Saw an 89% Increase in Ransomware in 2017 - Our experience last year is consistent with the conclusion of a new report issued by Cryptonite in its 2017 Health Care Cyber Research Report—that the...more

Health Care Organizations Saw an 89 percent Increase in Ransomware in 2017

Our experience last year is consistent with the conclusion of a new report issued by Cryptonite in its 2017 Health Care Cyber Research Report—that the number of hacking events targeted at health care entities involving...more

383 Results
|
View per page
Page: of 16
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.