News & Analysis as of

Technology Hackers

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, V 5, Issue 1, January 2024

The Current Status of Privacy Laws Across the United States - Unlike the General Data Protection Regulation (GDPR) in the European Union (EU), the United States does not have a nationwide comprehensive data privacy law....more

StoneTurn

Shifting Cyber Landscape – Crisis Awareness as a Means to Prevent and Prepare

StoneTurn on

Crises and uncertainty are inevitable forces in modern business, particularly in cyber and digital. General counsels and legal risk executives are well suited to lead preparedness and resiliency for future crises, uniting key...more

Vinson & Elkins LLP

PHMSA Suggests Operators Should Be Prepared to Operate Sophisticated Pipelines Manually

Vinson & Elkins LLP on

Should hazardous liquids pipelines be prepared to operate “manually” in the event of a future cyberattack? An almost million dollar fine proposed by the Pipeline and Hazardous Materials Safety Administration (“PHMSA”) on...more

Womble Bond Dickinson

Operational Technology: New Target For Network Security Obligations

Womble Bond Dickinson on

The past two decades have produced intense focus on information security to protect data. This priority remains important. But the change in administrations and the Continental Pipeline incident have redirected attention...more

Opportune LLP

SAP Issues Cybersecurity Alert: What You Can Do To Protect Your ERP

Opportune LLP on

Here’s how the SAP Community can mitigate the risk of a widespread cybersecurity incident involving their SAP systems....more

Opportune LLP

The Cybersecurity Risk Posed By Your Outdated ETRM System

Opportune LLP on

Is your ETRM system leaving you exposed to cybersecurity threats?...more

Farrell Fritz, P.C.

Hey Google: Are You Alone?

Farrell Fritz, P.C. on

Smart speakers – like Google Home and Amazon Echo – have changed the way our homes/offices function. Indeed, these voice-activated speakers execute simple commands provided by voice or smartphone application. With nothing...more

Hogan Lovells

Seminar round-up: Cybersecurity and the internet in International Investment Arbitration

Hogan Lovells on

On 11 April 2019 the Hogan Lovells International Arbitration team hosted a seminar on cybersecurity and the internet in International Investment Arbitration. It was a thoroughly interesting and informative session. ...more

Association of Certified E-Discovery...

Bold Thinking, Not Tinkering - What is the Hackathon's purpose?

The Hackathon brings together multiple streams of entrepreneurial activity (internationally) and taps into a global community of individuals and organizations with a passion for innovation via legal technology. Given that it...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - December 2017 #3

Robinson & Cole LLP on

Apple has pushed an update to iOS 11.2 to its users. Users should consider pushing any updates that are recommended by the manufacturer, as there is usually a reason behind the update, and many times it is to fix a...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #112 – LG Releases IoT Software Update

Security researchers at Check Point discovered software vulnerabilities in LG IoT devices which allowed them to potentially gain control over LG refrigerators, ovens, dishwashers and a live feed from a robot vacuum cleaner. A...more

Foley & Lardner LLP

17 Measures Every Company Should Consider to Reduce the Risk of Cyber-Intrusions

Foley & Lardner LLP on

The cars we drive to work every day run primarily on computers that collect thousands of data points. Same goes for the factory that manufactured them and the company that designed and sold them. This evolution makes...more

Orrick, Herrington & Sutcliffe LLP

No Harm, But Foul? FTC Sues Internet of Things Maker D-Link for Security “Vulnerabilities” Despite No Allegations of Breach

Shortly after the new year, the Federal Trade Commission filed suit in the Northern District of California against D-Link Corporation, a Taiwan-based maker of wireless routers, Internet Protocol (IP) cameras, and software...more

King & Spalding

Maritime Cybersecurity Regulation on the Horizon

King & Spalding on

Over the past year, various institutions and organizations—both domestic and international—have shown an interest in moving the increasingly prevalent cybersecurity conversation offshore. Domestically, both Congress and...more

Zelle  LLP

Employment Law Navigator – Week in Review: January 2017 #3

Zelle LLP on

Last week, there were developments in two cases in different Pennsylvania courts involving employer liability—or lack thereof—for data breaches involving employee personally identifiable information (PII). A Pennsylvania...more

Robinson+Cole Data Privacy + Security Insider

Toys Not Immune from Scrutiny Over Privacy and Security Weaknesses

In the wake of the holiday season, it seems that even toys are not immune from privacy and security pitfalls. Two “connected” toys, Genesis Toys’ My Friend Cayla and i-Que robot, have been accused of violating U.S. and...more

K2 Integrity

Understanding the DNS Attacks: Convenience v Security

K2 Integrity on

How Did This Attack Happen? While the attack is still under investigation, initial reports indicate that it was part of a genre of DDoS that infects Internet of Things (IoT) devices, such as webcams, DVRs, routers, smart TVs,...more

Robins Kaplan LLP

A Selfie’s Worth a Thousand Dollars

Robins Kaplan LLP on

A picture might be worth a thousand words, but could it also be worth a thousand dollars? New technology by MasterCard and Amazon may mean that the new hammock you’ve been eying online is only a camera flash away....more

Pillsbury Winthrop Shaw Pittman LLP

Picking Up Speed: DOT Releases Guidance on Automated Vehicles

New NHTSA guidance represents the federal government’s first attempt to develop a comprehensive regulatory structure for automated vehicles. This transformative technology offers vast promises and significant concerns...more

Robinson+Cole Data Privacy + Security Insider

iPhones Vulnerable to Pegasus—Update Your iPhone Now

Apple has issued an urgent warning to iPhone users about a crucial iOS update that is the only way to protect iPhones from “the extremely malicious Pegasus software.” According to Apple, Pegasus can completely take over...more

Sheppard Mullin Richter & Hampton LLP

Espionage and Export Controls: The iPhone Hack Highlights The New World of Warfare

Last week, researchers at Citizen Lab uncovered sophisticated new spyware that allowed hackers to take complete control of anyone’s iPhone, turning the phone into a pocket-spy to intercept communications, track movements and...more

Nossaman LLP

Cyber Risk and Reality – Procuring Transportation in the 21st Century

Nossaman LLP on

With the rapid pace of innovation and deployment of intelligent transportation systems (ITS) to enhance existing transportation infrastructure, transportation officials frequently procure and manage sophisticated systems that...more

K&L Gates LLP

Internet of Things – What does it mean for business?

K&L Gates LLP on

What is the Internet of Things? The 'Internet of Things' (IoT) is a catchphrase describing the increasing interconnectedness between smart devices and sensors facilitated through their connection to the internet. It's not a...more

Skadden, Arps, Slate, Meagher & Flom LLP

Privacy & Cybersecurity Update - August 2015

Third Circuit Affirms FTC’s Authority Over Cybersecurity: In the Wyndham case, the Third Circuit affirmed that the FTC has the authority to regulate cybersecurity under Section 5 of the FTC Act, and that the language of...more

Patrick Malone & Associates P.C. | DC Injury...

Getting the Best Medical Care: a Newsletter from Patrick Malone - January 2013

In This Issue: - Six Things to Think About as Technology Advances - For More Information - Recent Health Care News You Should Know About - Check Out Our Previous Tips - Deep Thoughts for the New Year: Ethical...more

25 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide