Cognizant Confirms Maze Ransomware Attack -
The criminals behind the Maze ransomware [view recent related posts here and here] have gone big and hit Cognizant, one of the largest technology consulting companies in the U.S.,...more
4/25/2020
/ Coronavirus/COVID-19 ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Drones ,
Fast-Food Industry ,
Loss Prevention ,
National Security ,
NYDFS ,
Personal Data ,
Personally Identifiable Information ,
Phishing Scams ,
Popular ,
Ransomware ,
U.S. Navy
City of Durham, NC Hit With Ryuk Ransomware -
Another city—Durham, North Carolina—has become the victim of a ransomware attack stemming from a Russian hacker group following a successful phishing scheme. After falling...more
3/13/2020
/ California Consumer Privacy Act (CCPA) ,
China ,
Coronavirus/COVID-19 ,
Crisis Management ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Health and Human Services (HHS) ,
Electronic Protected Health Information (ePHI) ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Infectious Diseases ,
Municipalities ,
New Legislation ,
Personal Data ,
Personally Identifiable Information ,
Private Right of Action ,
Public Health ,
Ransomware
Ransomware Attacks Predicted to Occur Every 11 Seconds in 2021 with a Cost of $20 Billion -
Confirming what we are seeing in the field, cybersecurity firm Cybersecurity Ventures has predicted that, globally, businesses in...more
2/14/2020
/ Bitcoin ,
Brand ,
California Consumer Privacy Act (CCPA) ,
China ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Digital Wallets ,
Drones ,
Email ,
Emergency Response ,
General Data Protection Regulation (GDPR) ,
Hackers ,
Legislative Agendas ,
Medical Devices ,
Personal Data ,
Personally Identifiable Information ,
Phishing Scams ,
Proposed Legislation ,
Regulatory Requirements ,
Risk Mitigation ,
Rulemaking Process ,
State Attorneys General ,
Threat Management ,
Unmanned Aircraft Systems ,
Vulnerability Assessments
It’s getting difficult to keep up with the jargon of all of the new digital scams. The SaaSes in the beginning became regular business terms, such as Software-as-a-Service (SaaS), and Business Processes-as-aService (BPaaS)....more
1/24/2020
/ Artificial Intelligence ,
Cyber Crimes ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data-Sharing ,
Health Insurance Portability and Accountability Act (HIPAA) ,
NIST ,
Online Platforms ,
Personal Data ,
PHI ,
Risk Management ,
SaaS
FBI Warns of Retaliatory Cyber-Attack from Iran -
The Federal Bureau of Investigation (FBI) is warning of a heightened likelihood of Iranian cyber-attacks following the escalation of tension between the U.S. and Iran. This...more
1/17/2020
/ Assassinations ,
California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Management ,
Data Privacy ,
Data Protection ,
Data Security ,
Dating Services ,
Drones ,
Federal Aviation Administration (FAA) ,
GAO ,
Hackers ,
Information Management ,
Iran ,
Mobile Apps ,
Online Reviews ,
Personal Data ,
Personally Identifiable Information ,
Research Reports ,
Risk Management ,
State Attorneys General ,
Unmanned Aircraft Systems ,
Vulnerability Assessments ,
Yelp
The Washington Post, as part of an investigate report, worked with a hacker to figure out what kind of information OnStar is collecting (and what data is stored in your car) on a randomly selected 2017 Chevy Volt....more
Security researchers Intezer and IBM X-Force have identified a new ransomware that is seriously vicious. It’s PureLocker—named because it is programmed in PureBasic language, which is apparently unusual.
...more
11/15/2019
/ Biometric Information ,
California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Management ,
DNA ,
Facial Recognition Technology ,
Fingerprints ,
Genetic Materials ,
Genetic Testing ,
Hackers ,
Microsoft ,
Personal Data ,
Ransomware ,
Vulnerability Assessments
Cyberliability insurance provider Beazley Insurance Company has analyzed its internal breach response data and determined that in its experience, there has been a thirty-seven percent (37%) increase in ransomware attacks this...more
11/8/2019
/ California Consumer Privacy Act (CCPA) ,
Civil Monetary Penalty ,
Criminal Investigations ,
Cyber Attacks ,
Cybersecurity ,
Data Collection ,
Data Management ,
Data Privacy ,
Databases ,
Department of Health and Human Services (HHS) ,
DMV ,
DNA ,
Drones ,
Federal Aviation Administration (FAA) ,
Genetic Materials ,
Hackers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
HIPAA Breach ,
Law Enforcement ,
Managed Service Providers (MSPs) ,
Personal Data ,
Personally Identifiable Information ,
Prescription Drugs ,
Ransomware ,
Social Security Numbers
Energy Sector’s Reliance on IoT Increases Cyber Vulnerabilities -
CyberX recently released its 2020 Global IoT/ICS Risk Report (Report), which compiles survey questions and answers from 1,821 production networks of...more
11/4/2019
/ Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Protection ,
Energy Sector ,
FBI ,
Internet of Things ,
New Legislation ,
Personal Data ,
Personally Identifiable Information ,
Ransomware ,
Veterans ,
Vulnerability Assessments ,
Vulnerable Victims
A recent Ponemon Institute study finds that small and mid-sized businesses continue to be targeted by cybercriminals, and are struggling to direct an appropriate amount of resources to combat the attacks.
...more
10/18/2019
/ California Consumer Privacy Act (CCPA) ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Hackers ,
Information Technology ,
National Security Agency (NSA) ,
Network Security ,
Personal Data ,
Personally Identifiable Information ,
Virtual Private Networks ,
Vulnerability Assessments
The Federal Bureau of Investigations Internet Crime Complaint Center (IC3) recently issued a public service announcement warning private companies about the increasing numbers of ransomware attacks affecting private industry....more
10/14/2019
/ Americans with Disabilities Act (ADA) ,
California Consumer Privacy Act (CCPA) ,
Cyber Attacks ,
Cybersecurity ,
Dentists ,
Department of Defense (DOD) ,
Drones ,
FBI ,
Federal Aviation Administration (FAA) ,
Federal Contractors ,
Hackers ,
Health Care Providers ,
OCR ,
Personal Data ,
Personally Identifiable Information ,
PHI ,
Popular ,
Ransomware ,
SCOTUS ,
Title III ,
Unmanned Aircraft Systems ,
UPS ,
Vulnerability Assessments ,
Websites ,
WhatsApp
The Ecuadorian Ministry of Telecommunications and Information Security has announced an investigation into data analytics company Novaestrat after news broke this week that the company left an Elasticsearch server open...more
9/23/2019
/ California Consumer Privacy Act (CCPA) ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Data Protection ,
Ecuador ,
Hackers ,
Passwords ,
Personal Data ,
Personally Identifiable Information ,
Popular
DHS Warns Businesses of Risk of Iranian-Backed Wiper Malware Attacks -
The tension with Iran has generally increased, and it has been reported that the U.S. has launched a cyber-attack against Iran. In retaliation, the risk...more
7/5/2019
/ Biometric Information ,
Canada ,
Closing a Business ,
Colleges ,
Connected Items ,
Cybersecurity ,
Data Collection ,
Data Management ,
Data Privacy ,
Department of Homeland Security (DHS) ,
Drones ,
Educational Institutions ,
Information Technology ,
Internet of Things ,
Iran ,
Malware ,
Medical Devices ,
Personal Data ,
Pharmaceutical Industry ,
Popular ,
Universities
Protection of industrial control systems is crucial to the security of our country. The National Cybersecurity Center of Excellence (NCCoE) has announced a project for which it is seeking comment: Detecting and Protecting...more
6/17/2019
/ Amazon Marketplace ,
Capital Raising ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Drones ,
Enforcement Actions ,
Federal Aviation Administration (FAA) ,
Industrial Space ,
Initial Coin Offering (ICOs) ,
Manufacturing Facilities ,
Microsoft ,
Mobile Apps ,
National Security Agency (NSA) ,
Part 107 ,
Personal Data ,
Popular ,
Quest Diagnostics ,
Securities and Exchange Commission (SEC) ,
Securities Violations ,
Social Media ,
Unregistered Securities ,
Waivers ,
Wellness Programs
Vicious malware continues to be deployed by China-based attackers. A new strain of malware, dubbed “HiddenWasp,” which has the ability to remotely infect computers, has been discovered by a security researcher at Intezar. The...more
6/7/2019
/ California Consumer Privacy Act (CCPA) ,
China ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Exploitation ,
Extortion ,
FBI ,
Genetic Materials ,
Genetic Testing ,
Hackers ,
Information Technology ,
Malware ,
OIG ,
Online Safety for Children ,
Personal Data ,
Personally Identifiable Information ,
Popular ,
Quest Diagnostics ,
Vulnerable Victims
“Orangeworm” Targeting Health Care Industry -
In what is being called a systematic targeting of large health care organizations, pharmaceutical companies, and IT companies and equipment manufacturers that service the...more
4/27/2018
/ Blue Shield ,
Criminal Investigations ,
Cyber Attacks ,
Cyber Insurance ,
Data Breach ,
Digital Currency ,
Drones ,
Enforcement Actions ,
Extraterritoriality Rules ,
Hackers ,
Health Care Providers ,
Healthcare ,
Medical Devices ,
Personal Data ,
PHI ,
Risk Management ,
Scams ,
September 11th Victim Compensation Fund ,
SunTrust ,
Unmanned Aircraft Systems ,
US v Microsoft ,
Virtual Currency
Inogen, which manufactures portable oxygen devices, has alerted the Securities and Exchange Commission in a recent filing that it is notifying 30,000 individuals that their personal information was compromised when a hacker...more
4/20/2018
/ Airspace ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Drones ,
EPIC ,
Federal Aviation Administration (FAA) ,
Hackers ,
Medical Devices ,
Personal Data ,
Ransomware ,
Risk Management
Pipeline Companies Targeted by Cyber-Attacks -
Reports show that U.S. energy companies reported more than 350 cybersecurity incidents to the U.S. Department of Homeland Security between 2011 and 2015. Pipeline companies are...more
4/13/2018
/ Class Action ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Digital Currency ,
Drones ,
Energy Sector ,
Hackers ,
HIPAA Breach ,
Oil & Gas ,
Personal Data ,
Pipelines ,
Social Media ,
TCPA ,
Virtual Currency
On the heels of the ransomware that had the City of Atlanta scrambling last week, New York City Mayor Bill de Blasio announced the launch of “NYC Secure,” a free mobile app that will alert New York City residents of...more
4/10/2018
/ Blockchain ,
Cambridge Analytica ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Distributed Ledger Technology (DLT) ,
Drones ,
Electric Vehicles ,
Electronically Stored Information ,
Facebook ,
Legislative Agendas ,
New Legislation ,
Part 107 ,
Personal Data ,
Proposed Legislation ,
Ransomware ,
Social Media ,
State Data Breach Notification Statutes ,
Taxi Cabs ,
US v Microsoft
The Federal Aviation Administration (FAA) was served with an 836,796-person lawsuit last week alleging wrongful collection of personal data and money under unmanned aerial system (UAS or drone) regulations....more
A new report issued by the World Economic Forum (WEF) called “Global Risks Report 2018,” lists the threat of cyber-warfare and cyber-attacks affecting the public as the world’s third greatest threat in 2018, only behind...more
1/26/2018
/ Android ,
Blockchain ,
Class Action ,
Cryptocurrency ,
Cybersecurity ,
Data Protection ,
Digital Currency ,
Distributed Ledger Technology (DLT) ,
Drones ,
Farms ,
Federal Aviation Administration (FAA) ,
General Data Protection Regulation (GDPR) ,
Google ,
Identity Theft ,
International Data Transfers ,
Personal Data ,
Smartphones ,
Tax Fraud ,
Technology Sector ,
Tracking Systems ,
Unmanned Aircraft Systems
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more
10/24/2017
/ Amazon Marketplace ,
Biometric Information ,
Biometric Information Privacy Act ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Drones ,
Electronically Stored Information ,
Email ,
Extraterritoriality Rules ,
Hackers ,
Hyatt ,
Microsoft ,
Mobile Devices ,
Network Security ,
Personal Data ,
Privacy Concerns ,
Public Wireless Networks ,
Risk Management ,
SCOTUS ,
Stored Communications Act ,
US-CERT ,
Vulnerability Assessments ,
Wifi ,
Wireless Technology
Did you know that a Victoria’s Secret catalog is one of the top reasons that Congress included privacy protections in the Gramm-Leach Bliley Act (GLB Act)? The GLB Act protects consumers’ financial information and requires...more
SiteSearch, John Ayers, LeapLab and Leads Company (the defendants) settled with the Federal Trade Commission (FTC) for “knowingly provid[ing] scammers with hundreds of thousands of consumers’ sensitive personal information.”...more
We wrote previously about the “Hell No Barbie Campaign” and the recent lawsuit against Mattel for its Hello Barbie doll privacy violations, but through all this hype, we have yet to learn exactly what Hello Barbie is truly...more