News & Analysis as of

Malware Technology

Foley & Lardner LLP

Recommendations for Managing Cybersecurity Threats in the Manufacturing Sector

Foley & Lardner LLP on

In the hyper-connected era of smart manufacturing, accelerated by “Industry 4.0,” the manufacturing sector is undergoing a digital revolution. By leveraging technologies such as advanced automation, artificial intelligence,...more

Dunlap Bennett & Ludwig PLLC

“Why Can’t They Just Ban It?”: Practical Suggestions For The Federal Government To Ban TikTok

This is the final article of a three-article series about the challenges the American federal government faces in its efforts to ban TikTok. The first article set up the legal and political posture of attempts to ban TikTok...more

Woods Rogers

How to Protect Your Business Against Ransomware

Woods Rogers on

Within the past decade, technology has evolved extremely rapidly, which can be both beneficial and difficult for business owners to navigate. Just as common technology like laptops and mobile banking has evolved, so have the...more

Womble Bond Dickinson

Is Accountability Even Possible?

Womble Bond Dickinson on

How can we allow open access to sophisticated tools that can attack anyone’s phones undetected? It seems like creating tools that can only be used for illegal and immoral purposes should be banned by society. ...more

K2 Integrity

Understanding the DNS Attacks: Convenience v Security

K2 Integrity on

How Did This Attack Happen? While the attack is still under investigation, initial reports indicate that it was part of a genre of DDoS that infects Internet of Things (IoT) devices, such as webcams, DVRs, routers, smart TVs,...more

Robinson+Cole Data Privacy + Security Insider

iPhones Vulnerable to Pegasus—Update Your iPhone Now

Apple has issued an urgent warning to iPhone users about a crucial iOS update that is the only way to protect iPhones from “the extremely malicious Pegasus software.” According to Apple, Pegasus can completely take over...more

Sheppard Mullin Richter & Hampton LLP

Espionage and Export Controls: The iPhone Hack Highlights The New World of Warfare

Last week, researchers at Citizen Lab uncovered sophisticated new spyware that allowed hackers to take complete control of anyone’s iPhone, turning the phone into a pocket-spy to intercept communications, track movements and...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide