It is so hard to keep up with the latest ways the bad guys try to infiltrate company data. One new technique is called warshipping, and its implementation is pretty simple and a little old school.
...more
8/12/2019
/ Air Traffic Control Systems ,
Blockchain ,
Call Centers ,
Cyber Attacks ,
Cybersecurity ,
Data Privacy ,
Drones ,
Federal Aviation Administration (FAA) ,
Hackers ,
Mobile Apps ,
Personally Identifiable Information ,
Privacy Settings
Cybercriminals have launched a new campaign that not only requires the victim to pay a ransom to have their data decrypted, but when the victim is directed to a PayPal account to pay the ransom and get the decryption key to...more
1/21/2019
/ Biometric Information ,
California Consumer Privacy Act (CCPA) ,
Cell Phones ,
Commercial General Liability Policies ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data-Sharing ,
Drones ,
Geological Data ,
Hackers ,
HIPAA Breach ,
Personally Identifiable Information ,
Ransomware ,
Right to Privacy ,
Risk Management ,
Rulemaking Process ,
WISP
New Year’s is a time to look back on the happenings of the year and focus on the lessons and reminders those events have provided. For our final newsletter of the year, we’d like to share with you our top 10 most read posts...more
12/31/2018
/ Banking Sector ,
Blockchain ,
Connected Items ,
Cryptocurrency ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Distributed Ledger Technology (DLT) ,
Drones ,
Federal Aviation Administration (FAA) ,
Financial Conduct Authority (FCA) ,
Hackers ,
Initial Coin Offering (ICOs) ,
Investment Opportunities ,
Personally Identifiable Information ,
Popular ,
Wells Fargo
We reported last week that a spyware maker recently compromised users’ and victims’ sensitive information. Since that time, another spyware maker, mSpy, which holds itself out as having over a million users employing its...more
9/11/2018
/ Banking Sector ,
Class Action ,
Class Certification ,
Consumer Privacy Rights ,
Criminal Convictions ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cybersecurity ,
Cybersecurity Framework ,
Data Breach ,
Financial Services Industry ,
Hackers ,
Insurance Industry ,
Legislative Agendas ,
NYDFS ,
Pending Legislation ,
Personally Identifiable Information ,
Popular ,
Spyware ,
State and Local Government ,
Vulnerability Assessments ,
Yahoo!
It has been reported that a hacker was able to break into the servers of TheTruthSpy, a company that is described as “one of the most notorious stalkerware companies out there” (Motherboard, August 2018) and was able to steal...more
9/4/2018
/ Airspace ,
Arbitration ,
Biometric Information ,
Biometric Information Privacy Act ,
Blockchain ,
Commercial Use ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Distributed Ledger Technology (DLT) ,
Do Not Call List ,
Drones ,
Emerging Technology Companies ,
Employee Privacy Rights ,
Employer Liability Issues ,
Employment Litigation ,
Federal Aviation Administration (FAA) ,
General Data Protection Regulation (GDPR) ,
Hackers ,
Personally Identifiable Information ,
Popular ,
Safety Standards ,
Southwest Airlines ,
Unmanned Aircraft Systems
The Federal Energy Regulatory Commission (FERC) announced on July 19, 2018, that it is directing the North American Electric Reliability Corporation (NERC) “to develop and submit modifications to the NERC Reliability...more
7/30/2018
/ Banking Sector ,
Bitcoin ,
Blockchain ,
Bulk Electric System ,
Cyber Attacks ,
Cyber Incident Reporting ,
Cybersecurity ,
Dark Web ,
Digital Currency ,
Distributed Ledger Technology (DLT) ,
Drones ,
Electricity ,
Energy Sector ,
FERC ,
Final Rules ,
Financial Fraud ,
Financial Institutions ,
Financial Services Industry ,
Hackers ,
LifeLock ,
Malware ,
National Security ,
NERC ,
Phishing Scams ,
Popular ,
Reliability Standards ,
Reporting Requirements ,
Sensitive Business Information ,
US Air Force ,
Utilities Sector ,
Virtual Currency
CYBERSECURITY -
Ticketmaster Hit With Malware Compromising UK Customers’ Data -
Ticketmaster has reported that it has “identified malicious software on a customer support product hosted by Inbenta Technologies, an...more
7/6/2018
/ Consumer Privacy Rights ,
Cyber Attacks ,
Data Breach ,
Data Collection ,
Entertainment Industry ,
Event Tickets ,
Hackers ,
Malware ,
New Legislation ,
Personal Data ,
Personally Identifiable Information ,
Scams ,
State and Local Government ,
State Data Breach Notification Statutes ,
Tax Preparers ,
TIAA CREF ,
Vacation Rentals
Apple has pushed an update to iOS 11.2 to its users. Users should consider pushing any updates that are recommended by the manufacturer, as there is usually a reason behind the update, and many times it is to fix a...more
12/22/2017
/ Apple ,
Blockchain ,
Cyber Attacks ,
Data Breach ,
Distributed Ledger Technology (DLT) ,
Drones ,
Federal Aviation Administration (FAA) ,
Hackers ,
Mobile Apps ,
Mobile Devices ,
Popular ,
Ransomware ,
Registration Requirement ,
Risk Management ,
Smartphones ,
Technology ,
Trump Administration ,
Unmanned Aircraft Systems ,
Vulnerability Assessments
FBI Issues Flash Alert on Apache Struts Vulnerability -
The Apache Struts vulnerability has been mentioned frequently in the media over the past month, as it is believed to have been involved in one of the largest and most...more
10/18/2017
/ Blockchain ,
Breach Notification Rule ,
Cryptocurrency ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Digital Currency ,
Distributed Ledger Technology (DLT) ,
Drones ,
Enforcement Actions ,
Faxes ,
Federal Aviation Administration (FAA) ,
Hackers ,
Health Care Providers ,
HIPAA Breach ,
Initial Coin Offering (ICOs) ,
Office Equipment ,
PHI ,
Popular ,
Ransomware ,
Securities and Exchange Commission (SEC) ,
Securities Fraud ,
Unregistered Securities ,
Virtual Currency ,
Vulnerability Assessments
Companies doing business with the U.S. Department of Defense are facing new requirements for reporting data security breaches and for acquiring cloud computing services. The Interim Rule, effective August 26, 2015, amends the...more
9/9/2015
/ Cloud Computing ,
Compliance ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Defense (DOD) ,
DFARS ,
Federal Contractors ,
Hackers ,
Interim Rule ,
NDAA ,
Reporting Requirements