News & Analysis as of

Mobile Devices Cyber Attacks

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 23, Number 1. Outlook 2023: Ransomware Threats Multiply as Rogue Nation-States Sponsor More...

Report on Patient Privacy Volume 23, no 1 (January 2023) Ransomware—including increased attacks from criminal groups affiliated with rogue nation-states such as Russia and North Korea—will continue to dominate the health...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 23, Number 1. Privacy Briefs: January 2023

Report on Patient Privacy Volume 23, no 1 (January 2023) The Centers for Medicare & Medicaid Services (CMS) said a data breach at a Medicare subcontractor impacted the personally identifiable information and protected...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #338 – Be Aware of Apps Infected with Malware

Like all technology, mobile apps can be infected with malicious code, or malware, that is intended to gain access to your mobile phone when you download the app. Although app stores try their best to not allow malicious apps...more

Eversheds Sutherland (US) LLP

US Cybersecurity and Data Privacy review and update: Looking back on our 2021 articles and planning ahead for 2022

The past year’s trends in privacy and cybersecurity are set to intensify in 2022, with heightened threats, increased regulations, and elevated expectations - as well as new opportunities. To navigate the year ahead, we lay...more

Robinson+Cole Data Privacy + Security Insider

Apple Issues Patches: Apply Them Now and Alert Your Employees to Do the Same

Earlier this week, Apple issued another patch—this one is said to address a reported vulnerability that “an application may be able to execute arbitrary code with kernel privileges.” According to Apple, it “is aware of a...more

Hogan Lovells

UK Government set to move forwards with regulation on consumer IoT device security

Hogan Lovells on

UK Government set to move forwards with regulation on consumer IoT device security The UK Government has just announced that it intends to draw up legislation aimed at ensuring that all consumer smart devices sold in the UK...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - January 2019 #5

Robinson & Cole LLP on

I was a speaker at a recent conference of municipalities in a state last week, and during my presentation, I mentioned the various cyber-attacks that have affected cities, towns and educational departments in the U.S....more

Robinson+Cole Data Privacy + Security Insider

California Law IoT Devised to Have “Reasonable Security Feature”

On September 28, 2018, California passed Senate Bill No. 327, Chapter 886, which regulates the security of all internet of things (IoT) devices sold in California. ...more

Hogan Lovells

California Passes First-Of-Its-Kind Law Focused on Internet of Things Cybersecurity

Hogan Lovells on

Late last month, California Governor Jerry Brown signed the first US Internet of Things (IoT) cybersecurity legislation: Senate Bill 327 and Assembly Bill 1906. ...more

Robinson+Cole Data Privacy + Security Insider

Schneider Electric USBs Infected with Malware

Schneider Electric recently issued a consumer warning that it mistakenly shipped USB drives to its customers that were infected with malware. Schneider Electric stated in its alert that “Schneider Electric has determine that...more

Robinson+Cole Data Privacy + Security Insider

iPhone Users Targeted by New Malware Campaign

Cisco Talos has discovered a new menace to iPhone users—a sophisticated malware campaign targeting iPhones to trick users into downloading an open-source mobile device management (MDM) solution that gives the hackers control...more

Snell & Wilmer

Has Your Computer Been Hijacked For Illicit Cryptocurrency Mining?

Snell & Wilmer on

Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - March 2018 #3

Robinson & Cole LLP on

Verizon's Protected Health Information Data Breach Report Concludes that Insiders Are Greatest Threat to Health Care Entities - Verizon recently issued its Protected Health Information Data Breach Report, which is always...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #130 – Smartphones Targeted by Dark Caracal Attack

There is a global malware campaign that is targeting mobile devices across the world. It is called Dark Caracal, which is believed to be sourced in Beirut by the Lebanese General Security Directorate. ...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - January 2018 #2

Robinson & Cole LLP on

Health Care Organizations Saw an 89% Increase in Ransomware in 2017 - Our experience last year is consistent with the conclusion of a new report issued by Cryptonite in its 2017 Health Care Cyber Research Report—that the...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - December 2017 #3

Robinson & Cole LLP on

Apple has pushed an update to iOS 11.2 to its users. Users should consider pushing any updates that are recommended by the manufacturer, as there is usually a reason behind the update, and many times it is to fix a...more

Robinson+Cole Data Privacy + Security Insider

HomeKit Vulnerability: One More Reason to Accept New iOS 11.2

Apple has pushed an update to iOS 11.2 to its users. Users should consider pushing any updates that are recommended by the manufacturer, as there is usually a reason behind the update, and many times it is to fix a...more

Robinson+Cole Data Privacy + Security Insider

“KRACK” WiFi Security Vulnerability Discovered

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks....more

Robinson+Cole Data Privacy + Security Insider

Privacy TIp #86 - Android Users Vulnerable to Malware through Apps

University of Michigan researchers have discovered that hundreds of applications in Google Play turn Android phones into a server that allow the user to connect the phone directly to a PC and leave open insecure ports...more

Robinson+Cole Data Privacy + Security Insider

Massachusetts Data Breach Notification History Now Available Online

The Massachusetts Office of Consumer Affairs and Business Regulation (OCABR) has published an online list of data breach notifications issued each year to Massachusetts residents since 2007, the inception of the...more

Robinson+Cole Data Privacy + Security Insider

FTC Releases Tips & Advice on Ransomware

On November 10, 2016, the Federal Trade Commission (FTC) released tips and advice for businesses and consumers on ransomware. For businesses, the FTC released Ransomware – A closer look and a companion video, Defend against...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #53 – Valuable Lesson: Don’t Write Down Passwords

I have been doing a lot of live employee training lately. I really enjoy it, and have been told that it is some of the most entertaining training around. The reason why I can get the audience to laugh is because I tell real...more

Robinson+Cole Data Privacy + Security Insider

iPhones Vulnerable to Pegasus—Update Your iPhone Now

Apple has issued an urgent warning to iPhone users about a crucial iOS update that is the only way to protect iPhones from “the extremely malicious Pegasus software.” According to Apple, Pegasus can completely take over...more

Patterson Belknap Webb & Tyler LLP

On the Move and At Risk: Safeguards for Mitigating Mobile Device Vulnerabilities While Traveling Overseas

Employees use their smartphones as a key tool for accessing information during a work day – especially when outside the office and traveling on business. While smartphones, tablets, laptops and other devices may increase...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #37 – Beware of fake USB drives and phone chargers

USB drives and phone chargers are expensive. Hackers know that. One way hackers are gaining access to get into computers to steal data is by planting USB drives and phone chargers in public areas, hoping someone will pick it...more

34 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide