Cyber Threats
In the Biden Administration’s continuing effort to reduce the risk of cybersecurity spyware from foreign adversaries, including Russia, the United States Department of Commerce (Commerce) issued a final rule (Rule) on June...more
I always watch what the federal government requires of its employees’ use of technology to get a feel for risks and what is coming down the pike from a regulatory standpoint—this has been going on for years. That’s why I was...more
On May 7, 2024, the Office of the National Cyber Director (ONCD) released the 2024 Report on the Cybersecurity Posture of the United States (the Report). The Report outlines the top trends of 2023, which include...more
As threatened, TikTok, Inc. and ByteDance, Ltd., the owner of the TikTok app, filed suit against the United States on May 7, 2024, alleging that the Protecting Americans From Foreign Adversary Controlled Applications Act...more
President Biden signed a historical aid package into law on Tuesday that includes aid for Ukraine, Israel, and the Indo-Pacific region. The package also includes a bill increasing sanctions on Russian assets and requiring...more
Editor's Note: In a historic and bold move, the U.S. government has implemented unprecedented sanctions against the Intellexa Consortium and its key figures for their roles in deploying spyware that jeopardizes privacy and...more
The close of 2023 solidified trends in established class action theories and provided a glimpse of new theories to come. In the auto total loss valuation sphere, one that has seen a lot of action for many years,...more
We recently cautioned employers about their confidential information showing up in selfies posted online, but social media is not the only reason employees are taking photos at work. Picture this: An employee quickly...more
Cyberattacks are a growing threat, with children being among the most vulnerable of targets. The internet serves as a platform for criminals to access children under the guise of anonymity...more
The cyber landscape these days can be terrifying. Malware, ransomware, spyware, phishing, cloud-based computing and so much more are enough to keep even a compliance veteran up all night. There are other risks to consider,...more
Before we jump into February developments — trigger warning if you are a Russian hacker — for those keeping track of breach notification requirements, the National Credit Union Administration (NCUA) Board approved a final...more
New York AG Letitia James settled with Powerline Group Inc., fifteen related entities, and their owner (collectively, “Powerline”), over allegations that Powerline violated New York Executive Law § 63(12) and General Business...more
CYBERSECURITY - Health Care Organizations Warned of Venus Ransomware - The Health Care Sector Cybersecurity Coordination Center (IC3) recently released an Analyst’s Note to health care organizations providing information...more
This week, a lawsuit was filed in the U.S. District Court of Massachusetts against the Commonwealth of Massachusetts for its use of a COVID-19 contact-tracing app for residents’ mobile phones. However, very few residents...more
Malware is an umbrella term for all malicious software. What is malware? Malware is an umbrella term that includes all types of malicious software, including viruses, worms, Trojans, ransomware, and spyware. These...more
We often see more mobile devices come into our forensic lab than traditional computers (desktops and laptops). One reason for that is because mobile devices are consistently becoming more like computers. Device users can send...more
Spyware Vendor RCS Labs Observed Infecting Android and iOS users with Commercial Surveillance Tools - Google's Threat Analysis Group (TAG) published a report regarding RCS Labs' activity involving infecting Android and iOS...more
SEC Proposes and Seeks Comments on New Cybersecurity Rules - At an open meeting on February 9, 2022, the Securities and Exchange Commission (“SEC”) voted three-to-one to propose new and amended rules regarding cybersecurity...more
The U.S. Government is continuing its frequent and highly visible use of denied party lists as an important tool in administering the export control laws. Each of the Bureau of Industry and Security (BIS), the Office of...more
How can we allow open access to sophisticated tools that can attack anyone’s phones undetected? It seems like creating tools that can only be used for illegal and immoral purposes should be banned by society. ...more
This week I read a worried headline claiming that, in a recent consumer data breach, the hackers had managed to access consumers’ telephone numbers. This was treated as an important and troubling revelation....more
Your personal information is threatened by more pernicious tools and attacks each year. While this blog often describes poorly written privacy laws stifling business and dangerous bureaucratic overreach by privacy...more
The team behind cryptocurrency Litecoin is scrambling after an employee “retweeted what turned out to be an untrue announcement about a partnership with Walmart Inc,” a move that briefly sent Litecoin and other cryptos...more
The Federal Trade Commission (“FTC”) reached a settlement with stalkerware app company Support King, LLC d/b/a SpyFone.com and its CEO (collectively “SpyFone”) to resolve allegations that it secretly harvested and shared...more
The official transition to a new administration and early Cabinet selections helped drive Wall Street to new highs on Tuesday, with the Dow topping 30,000 for the first time and the S&P 500 up 1.6% to another new high, too....more