News & Analysis as of

Vulnerability Assessments

Data Privacy + Cybersecurity Insider - January 2018 #3

by Robinson & Cole LLP on

Think Tank Says Nuclear Missiles Can be Inadvertently Launched Through Cyber-Attacks - Just before the false alarm in Hawaii last weekend when residents were erroneously warned of an impending missile attack, think tank...more

Think Tank Says Nuclear Missiles Can be Inadvertently Launched Through Cyber-Attacks

Just before the false alarm last weekend in Hawaii when residents were erroneously warned of an impending missile attack, think tank Chatham House issued a report stating that it had identified vulnerabilities in nuclear...more

Privacy Tip #122 – What’s Up with WhatsApp’s Security Flaws?

WhatsApp has been applauded for adding end-to-end encryption on its platform to secure conversations of its users two years ago. But encryption has its challenges, despite its security posture....more

Post-market medical devices, cybersecurity, and the U.S. FDA’s growing concerns

by Hogan Lovells on

From insulin pumps and pacemakers to defibrillators, medical devices increasingly rely on wireless and internet connectivity for efficient operations. Unfortunately, these interconnections also leave devices vulnerable to an...more

Spectre And Meltdown Vulnerabilities Affect Processors In Wide Range of Computing Devices

This week, the world learned of widespread and serious vulnerabilities in most central processing units (CPU). CPUs manage the instructions received from the hardware and software running on a computer. The vulnerabilities,...more

Privacy Tip #121 – Patch Patch Patch

We all learned the hard way how important patching vulnerabilities are when a major data breach occurred during 2017 that exposed the personal information of 80 percent of U.S. adults that was reportedly avoidable with a...more

Your Daily Dose of Financial News

by Robins Kaplan LLP on

AT&T has dropped plans to sell the Mate 10—the newest smartphone from China’s Huawei Technologies—just before the partnership was to be announced. AT&T gave no reasons for its abrupt reversal, but lawmakers have recently...more

Federal Trade Commission Approves Settlement with Lenovo Over Ad Software

The Federal Trade Commission (FTC) has approved its proposed settlement with Lenovo, Inc. over the installation of pre-installed advertising software called VisualDiscovery onto Lenovo laptops. According to the FTC, the...more

Data Privacy + Cybersecurity Insider - December 2017 #3

by Robinson & Cole LLP on

Apple has pushed an update to iOS 11.2 to its users. Users should consider pushing any updates that are recommended by the manufacturer, as there is usually a reason behind the update, and many times it is to fix a...more

Corporate Security in Private Industry and the Protection of Public Spaces Under Their Control

On December 11, a homemade explosive device was set off in an underground walkway connecting two New York City subway lines beneath the Port Authority bus terminal near Times Square, which accommodates 220,000 passenger trips...more

HomeKit Vulnerability: One More Reason to Accept New iOS 11.2

Apple has pushed an update to iOS 11.2 to its users. Users should consider pushing any updates that are recommended by the manufacturer, as there is usually a reason behind the update, and many times it is to fix a...more

White House Announces Vulnerabilities Equities Policy and Process

by Balch & Bingham LLP on

On November 15, 2017, the Trump administration released the Vulnerabilities Equities Policy and Process. This documents describes the process by which U.S. agencies and departments determine whether to disclose or restrict...more

Privacy Tip #112 – LG Releases IoT Software Update

Security researchers at Check Point discovered software vulnerabilities in LG IoT devices which allowed them to potentially gain control over LG refrigerators, ovens, dishwashers and a live feed from a robot vacuum cleaner. A...more

Government Warns of Threat Activity Targeting Critical Infrastructure through Third-Party Access

A cloak of secrecy usually covers covert government activities when it comes to the latest cyber threats and intelligence. But in a rare public statement, the U.S. government has warned that hackers are targeting government...more

Data Privacy + Cybersecurity Insider - October 2017 #3

by Robinson & Cole LLP on

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more

“KRACK” WiFi Security Vulnerability Discovered

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks....more

Data Privacy + Cybersecurity Insider - October 2017 #2

by Robinson & Cole LLP on

FBI Issues Flash Alert on Apache Struts Vulnerability - The Apache Struts vulnerability has been mentioned frequently in the media over the past month, as it is believed to have been involved in one of the largest and most...more

Plaintiffs’ Lawyer Predicts $1 Billion Settlement in Data Breach Case – But Where’s the “Harm”?

by Orrick - Trust Anchor on

This week, a high profile plaintiffs’ firm (Edelson) stated that “if done right,” the data breach class actions against Equifax should yield more than $1 billion in cash going directly to more than 143 million consumers...more

The Mummy’s Hand and a Risk-Based Approach at the Board Level

by Thomas Fox on

Today we consider the 1940’s film, The Mummy’s Hand as the second installment in Universal Pictures series featuring this creature. Boris Karloff departed the role and it was taken over for one film by Tom Tyler, who was...more

Equifax Flunked Index Provider’s Cybersecurity Test A Year Ago

A financial index provider foretold the Equifax Inc. data breach more than a year ago, warning that the rating agency “is vulnerable to data theft and security breaches.”...more

OCIE Lessons From Cybersecurity 2 Initiative

by Carlton Fields on

On August 7, the SEC’s Office of Compliance Inspections and Examinations (OCIE) issued a risk alert containing observations from its Cybersecurity 2 Exam Initiative. As a follow-up to the 2014 Cybersecurity 1 initiative, the...more

Bipartisan Group of Senators Introduce Bill to Impose Baseline Security Requirements for IoT Devices Provided to U.S. Government

by Hogan Lovells on

On August 1, a bipartisan group of four senators introduced a bill that would impose specific cybersecurity requirements on providers of Internet of Things (IoT) devices when doing business with the U.S. Government and...more

Privacy Tip #99 – If you are an IoT Fanatic, this App is for You

Last January, the Federal Trade Commission (FTC) launched the IoT Home Inspector Challenge, a contest that requested participants to come up with a tool that would identify security issues that are caused by out-of-date...more

FTC Submits Comment To Aid NTIA In Developing Internet of Things Guidance

by Ballard Spahr LLP on

In its latest effort to address security concerns about Internet of Things (IoT) devices, the Federal Trade Commission (FTC) has submitted public comments to the National Telecommunications and Information Administration's...more

Malware Capable of Shutting Down Electric Grids Confirmed

by Hogan Lovells on

Malware was recently identified that appears to have been designed and deployed by a nation-state to target and shut down electric grids. According to published reports, this malware currently appears to be capable of...more

45 Results
|
View per page
Page: of 2
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.