News & Analysis as of

Vulnerability Assessments Risk Management

Privacy Tip #112 – LG Releases IoT Software Update

Security researchers at Check Point discovered software vulnerabilities in LG IoT devices which allowed them to potentially gain control over LG refrigerators, ovens, dishwashers and a live feed from a robot vacuum cleaner. A...more

Data Privacy + Cybersecurity Insider - October 2017 #3

by Robinson & Cole LLP on

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more

“KRACK” WiFi Security Vulnerability Discovered

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks....more

Plaintiffs’ Lawyer Predicts $1 Billion Settlement in Data Breach Case – But Where’s the “Harm”?

by Orrick - Trust Anchor on

This week, a high profile plaintiffs’ firm (Edelson) stated that “if done right,” the data breach class actions against Equifax should yield more than $1 billion in cash going directly to more than 143 million consumers...more

The Mummy’s Hand and a Risk-Based Approach at the Board Level

by Thomas Fox on

Today we consider the 1940’s film, The Mummy’s Hand as the second installment in Universal Pictures series featuring this creature. Boris Karloff departed the role and it was taken over for one film by Tom Tyler, who was...more

Bipartisan Group of Senators Introduce Bill to Impose Baseline Security Requirements for IoT Devices Provided to U.S. Government

by Hogan Lovells on

On August 1, a bipartisan group of four senators introduced a bill that would impose specific cybersecurity requirements on providers of Internet of Things (IoT) devices when doing business with the U.S. Government and...more

Malware Capable of Shutting Down Electric Grids Confirmed

by Hogan Lovells on

Malware was recently identified that appears to have been designed and deployed by a nation-state to target and shut down electric grids. According to published reports, this malware currently appears to be capable of...more

EBA Report on Risks and Vulnerabilities of the EU Banking System

On July 17, the European Banking Authority (EBA) published a report on risks and vulnerabilities of the EU banking system. The report considered EBA key risk indicators and EBA risk assessment questionnaires for banks and...more

8 Results
|
View per page
Page: of 1
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.