Key Points: Illumina DNA sequencing machines are vulnerable to exploitation. Both the Cybersecurity and Infrastructure Security Agency (CISA) and the Food and Drug Administration (FDA) have published advisories urging all...more
Notwithstanding federal, state, and local privacy and cybersecurity laws that may apply, employers may generally use artificial intelligence, data analytics, and other software and technologies to track remote workers. The...more
You probably heard about the recent hack of Twitter accounts that took place on July 15, 2020. The hackers took over several prominent Twitter accounts, which resulted in a scam that netted over $118,000 in bitcoin for the...more
Organizations across the United States are preparing to respond to increasingly dire warnings from public health authorities and the need to take action to mitigate the spread of the coronavirus and the disease it causes,...more
As organizations prepare for certain contingency work arrangements in response to the coronavirus (COVID-19) outbreak, companies must also focus attention on ensuring appropriate cyber hygiene. ...more
In March 2015, the Internal Revenue Service (“IRS”) convened an unprecedented coalition of state tax agencies and private-sector tax industry officials to fight back against emerging criminal syndicates exploiting sensitive...more
Cisco is warning customers using its Adaptive Security Appliance (ASA) software about a virtual private network (VPN) bug that could "allow an unauthenticated, remote attacker to cause a reload of the affected system or to...more
On 24 August 2017, the Chinese Ministry of Industry and Information Technology (“MIIT“) issued the final version of the Rules on the Administration of Internet Domain Names (“New Domain Name Rules“). These new Rules will come...more