CYBERSECURITY -
Patch Adobe ColdFusion Vulnerabilities Being Exploited in the Wild ASAP -
Adobe has issued alerts on three vulnerabilities affecting its ColdFusion product. The first alert, issued on July 11, 2023,...more
7/24/2023
/ Adobe ,
Artificial Intelligence ,
Cyber Attacks ,
Cybersecurity ,
Cybersecurity Framework ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Drones ,
EU ,
Hackers ,
Machine Learning ,
Vulnerability Assessments
CYBERSECURITY -
Second Security Directive Issued by TSA to Pipeline Operators -
The U.S. Transportation Security Administration (TSA) issued its second Security Directive to the pipeline industry on July 20, 2021,...more
7/23/2021
/ Customs and Border Protection ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Drones ,
FBI ,
Hackers ,
Infrastructure ,
Location Data ,
NASA ,
Olympics ,
Pipelines ,
Ransomware ,
TSA
CYBERSECURITY -
Further Fall-Out from Russian Hacking of SolarWinds -
U.S. intelligence agencies, including the FBI, the Office of the Director of National Intelligence, the National Security Agency and the Cybersecurity...more
1/8/2021
/ Browser History ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Drones ,
Federal Breach Notification Standard ,
General Data Protection Regulation (GDPR) ,
Hackers ,
Personally Identifiable Information ,
Ports ,
Russia ,
Software ,
SolarWinds
The Federal Bureau of Investigations Internet Crime Complaint Center (IC3) recently issued a public service announcement warning private companies about the increasing numbers of ransomware attacks affecting private industry....more
10/14/2019
/ Americans with Disabilities Act (ADA) ,
California Consumer Privacy Act (CCPA) ,
Cyber Attacks ,
Cybersecurity ,
Dentists ,
Department of Defense (DOD) ,
Drones ,
FBI ,
Federal Aviation Administration (FAA) ,
Federal Contractors ,
Hackers ,
Health Care Providers ,
OCR ,
Personal Data ,
Personally Identifiable Information ,
PHI ,
Popular ,
Ransomware ,
SCOTUS ,
Title III ,
Unmanned Aircraft Systems ,
UPS ,
Vulnerability Assessments ,
Websites ,
WhatsApp
Darkreading.com has issued a survey entitled Monetizing the Insider: The Growing Symbiosis of Insiders and the Dark Web, which states that malicious insiders are responsible for 27 percent of all cybercrime. This statistic...more
12/10/2018
/ Authentication ,
Cybersecurity ,
Dark Web ,
Data Breach ,
Data Privacy ,
Drones ,
GPS ,
Hackers ,
Law Enforcement ,
Marriott ,
Personally Identifiable Information ,
Popular ,
Putative Class Actions ,
Recruitment Incentives ,
State and Local Government ,
Unmanned Aircraft Systems ,
USPS ,
Vulnerability Assessments
Inogen, which manufactures portable oxygen devices, has alerted the Securities and Exchange Commission in a recent filing that it is notifying 30,000 individuals that their personal information was compromised when a hacker...more
4/20/2018
/ Airspace ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Drones ,
EPIC ,
Federal Aviation Administration (FAA) ,
Hackers ,
Medical Devices ,
Personal Data ,
Ransomware ,
Risk Management
On the heels of the ransomware that had the City of Atlanta scrambling last week, New York City Mayor Bill de Blasio announced the launch of “NYC Secure,” a free mobile app that will alert New York City residents of...more
4/10/2018
/ Blockchain ,
Cambridge Analytica ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Distributed Ledger Technology (DLT) ,
Drones ,
Electric Vehicles ,
Electronically Stored Information ,
Facebook ,
Legislative Agendas ,
New Legislation ,
Part 107 ,
Personal Data ,
Proposed Legislation ,
Ransomware ,
Social Media ,
State Data Breach Notification Statutes ,
Taxi Cabs ,
US v Microsoft
Power Company Fined for Contractor Copying Data to its Own Insecure Network -
Vendor management continues to be a problem for all industries, but some are scarier than others. The North American Electric Reliability Corp....more
3/30/2018
/ Asset Management ,
Cloud Storage ,
Cybersecurity ,
Data Breach ,
Driverless Cars ,
Drones ,
Electronically Stored Information ,
Energy Sector ,
Federal Aviation Administration (FAA) ,
FERC ,
Fraud ,
Identity Theft ,
Infrastructure ,
NERC ,
NIST ,
Part 107 ,
Popular ,
Social Security ,
State Data Breach Notification Statutes ,
Third-Party Service Provider ,
Unmanned Aircraft Systems ,
Utilities Sector ,
Vulnerability Assessments
Russians Continue to Attack U.S. Energy and Power Sectors -
Late last week, a joint statement by the Department of Homeland Security and the Federal Bureau of Investigation confirmed that the Russian government has been...more
3/23/2018
/ Cambridge Analytica ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Driverless Cars ,
Drones ,
Energy Sector ,
Exports ,
Facebook ,
Hackers ,
Online Travel Vendors ,
Orbitz ,
Personally Identifiable Information ,
Russia ,
Trump Administration ,
Uber ,
UK Data Protection Act ,
Unmanned Aircraft Systems
Health Care Organizations Saw an 89% Increase in Ransomware in 2017 -
Our experience last year is consistent with the conclusion of a new report issued by Cryptonite in its 2017 Health Care Cyber Research Report—that the...more
1/16/2018
/ Customs and Border Protection ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Drones ,
Financial Industry Regulatory Authority (FINRA) ,
Hackers ,
Health Care Providers ,
HIPAA Audits ,
Initial Coin Offering (ICOs) ,
Malware ,
Mobile Devices ,
OCR ,
Personally Identifiable Information ,
Privacy Concerns ,
Ransomware ,
Transportation Industry
We previously warned readers about the Locky ransomware, which is potent and designed to use phishing emails to lure users to click on links and attachments, including pdfs.
Now, researchers at Cylance have discovered...more
11/20/2017
/ Antitrust Provisions ,
Big Data ,
Colleges ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Drones ,
Educational Institutions ,
Email ,
Hackers ,
Information Technology ,
Malware ,
Personally Identifiable Information ,
Ransomware ,
Universities ,
Unmanned Aircraft Systems
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more
10/24/2017
/ Amazon Marketplace ,
Biometric Information ,
Biometric Information Privacy Act ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Drones ,
Electronically Stored Information ,
Email ,
Extraterritoriality Rules ,
Hackers ,
Hyatt ,
Microsoft ,
Mobile Devices ,
Network Security ,
Personal Data ,
Privacy Concerns ,
Public Wireless Networks ,
Risk Management ,
SCOTUS ,
Stored Communications Act ,
US-CERT ,
Vulnerability Assessments ,
Wifi ,
Wireless Technology