News & Analysis as of

Data Protection Hackers Internet

Robinson+Cole Data Privacy + Security Insider

CrowdStrike Customers Targeted by Threat Actors Using Fake Help Websites

If you are a customer of CrowdStrike, you are working on recovering from the outage that occurred on July 19, 2024. As if that isn’t enough disruption, CrowdStrike is warning customers that threat actors are taking advantage...more

Troutman Pepper

Digital Planning Podcast - Interview With Leeza Garber

Troutman Pepper on

The Digital Planning Podcast is designed to educate individuals about all things digital in connection with estate planning, business planning, and estate administration. Your hosts, attorneys Jennifer Zegel, Ross Bruch, and...more

K2 Integrity

Cybersecurity Awareness Month may be over – but threats are year round

K2 Integrity on

Cybersecurity Awareness Month may have ended on October 31, but cyber criminals are active 365 days a year, and they’re online looking for vulnerabilities around the clock. Every day, we also spend time online: navigating the...more

Robinson+Cole Data Privacy + Security Insider

FIN8 Back in Business Stealing Credit Card Information with Badhatch

Security research firm Gigamon has reported that the nasty cybercriminal group FIN8 may have reappeared in June after a two year silence. FIN8 is known for implementing malware on point of sale systems to steal credit card...more

Fisher Phillips

What Employers Need to Know About the Dark Web

Fisher Phillips on

The average internet user may be largely unaware that there are actually different “levels” of the internet. First, there is the surface level of the internet where companies post their webpages, and where employees may...more

Robinson+Cole Data Privacy + Security Insider

Imgur Discloses Breach Affecting Email and Passwords of 1.7 Million Users

On November 24, 2017, image-sharing website Imgur disclosed that email addresses and passwords of 1.7 million users were stolen in a 2014 hack on the company. Imgur became aware of the breach on November 23, 2017 when a...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - October 2017 #4

Robinson & Cole LLP on

Energy and Critical Infrastructure Industries Warned of Increased Attacks by FBI and DHS - The FBI and Department of Homeland Security issued a joint statement on October 20, 2017 warning of an increased danger of a...more

Seyfarth Shaw LLP

Cybersecurity Best Practices

Seyfarth Shaw LLP on

When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more

Proskauer on Privacy

Tales from the (Quantum) Crypt

Proskauer on Privacy on

The dream of hack-proof communication just got a little closer to reality. On August 16, 2016, China launched the world’s first “quantum satellite,” a project the Chinese government hopes will enable it to build a...more

K&L Gates LLP

Internet of Things – What does it mean for business?

K&L Gates LLP on

What is the Internet of Things? The 'Internet of Things' (IoT) is a catchphrase describing the increasing interconnectedness between smart devices and sensors facilitated through their connection to the internet. It's not a...more

Bilzin Sumberg

Legal Insights on the Ashley Madison Hack: Part I

Bilzin Sumberg on

Internet commenters and legal analysts alike are buzzing about the Ashley Madison hack. The website -- which billed itself as a networking site for anyone who wanted to discretely arrange an extramarital affair -- has already...more

Ballard Spahr LLP

NIST Guide Highlights Cybersecurity Considerations for Utilities and Manufacturing Companies

Ballard Spahr LLP on

In 2013 alone, the U.S. Department of Homeland Security (DHS) and its Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to more than 256 cyber-incident reports—more than half of them in the energy...more

Locke Lord LLP

Solving the Legal Challenges of Trustworthy Online Identity

Locke Lord LLP on

In this age of phishing, hacking, identity fraud, and other forms of cybercrime, answering two simple questions – “Who are you?” and “How can you prove it?” – is fast becoming a critical requirement for online business...more

Foley & Lardner LLP

From Carjacking to Carhacking – Lessons for the Internet of Things

Foley & Lardner LLP on

The Internet of Things (IoT) is coming and perhaps the first place we will see the proverbial rubber hit the road is with something near and dear to Americans – our cars. The ever increasing connectivity of cars is creating a...more

PilieroMazza PLLC

Cybersecurity Monday: Who Is Shopping for Your Data?

PilieroMazza PLLC on

At this time of year, everyone is shopping for a good bargain. And with “Cyber Monday,” the internet has become the place to go for the best deals. The shift to online and cloud-based information systems and data storage has...more

K&L Gates LLP

Viruses, Trojans and Spyware, Oh My! The Yellow Brick Road to Coverage in the Land of Internet Oz – Part I

K&L Gates LLP on

We’re not in e-Kansas anymore. And there’s no denying that present day internet Oz, while extraordinary, is increasingly scary. Cyber attacks of various types continue to escalate across the globe. As aptly stated by one...more

Sands Anderson PC

Is Your Cyber-Security Better Than a Fortune 500's?

Sands Anderson PC on

Half of Fortune 500 companies would face “serious harm” or be “adversely impacted” by a cyber-attack. The greatest perceived harms are loss or theft of confidential information, loss of reputation and direct loss from...more

17 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide