Internet, Information Technology & e-Discovery Blog

Internet, Information Technology & e-Discovery Blog

Social changes brought about by the Internet & Technology

Category Archives: Cyber

Subscribe to Cyber RSS Feed

GUEST BLOG: Wanna keep up with pending Cyber legislation?

Posted in Cyber, eCommerce
My Guest Blogger Eddie Block (CISSP, CIPM, CIPP/G, CISA, CEH) is a senior attorney in Gardere’s Litigation Group and member of the Cybersecurity and Privacy Legal Services Team who focuses on all aspects of information cyber security, including credentialing functions, firewall and IDS deployment and monitoring, and penetration testing, and related complex litigation. The Texas… Continue Reading

Do you want China to control cyber and IT news? Think about this – China Oceanwide is acquiring news media giant IDG

Posted in Cyber, eCommerce, Internet Privacy, IT Industry
Computerworld announced that “tech journalism pioneer International Data Group [IDG], publisher of Computerworld, PCWorld and hundreds of other tech publications worldwide” is being acquired by China Oceanwide for a price of “less than $1 billion.” The January 19, 2017 report entitled “China Oceanwide, IDG Capital to acquire Computerworld-parent IDG” included this background about “IDG, a… Continue Reading

FTC sues IoT manufacturer for failure to secure devices from cyberattacks!

Posted in Cyber, eCommerce
The Federal Trade Commission (FTC) filed a lawsuit against “D-Link Corporation and its U.S. subsidiary, alleging that inadequate security measures taken by the company left its wireless routers and Internet cameras vulnerable to hackers and put U.S. consumers’ privacy at risk.” The Complaint filed on January 5, 2017 in the US District Court in the… Continue Reading

Cyber challenge to secure IoT home devices

Posted in Cyber, eCommerce
The Federal Trade Commission (FTC) “it is challenging the public to create an innovative tool that will help protect consumers from security vulnerabilities in the software of home devices connected to the Internet of Things.”  The FTC announcement on January 4, 2017 was entitled “Challenge to Combat Security Vulnerabilities in Home Devices” included these statements:… Continue Reading

Cybersecurity Report Card for 2016: Overall “C-“ but bad news since the Cloud gets a “D-“ and Mobile gets an “F”!

Posted in Cyber, IT Industry
Tenable Network Security surveyed “700 security practitioners across seven key industry verticals and nine countries” that produced “a single report card score that represents overall confidence levels of security practitioners that the world’s cyber defenses are meeting expectations.”  The “2017 Global Cybersecurity Assurance Report Card” from Tenable with research partner CyberEdge Group included these comments… Continue Reading

CYBER & TECHNOLOGY Ups and Downs in 2016 – Encryption a Big Success, but Fake News a Big Failure

Posted in Cyber, eCommerce
The New York Times reported the best and worse technology from “exploding smartphones and hoverboards to the proliferation of fake news on social media, many of our tech hardware, software and web products suffered embarrassing failures.”  The December 14, 2016 article entitled  “Biggest Tech Failures and Successes of 2016” included these observations of the successes… Continue Reading

Another Cyberattack at Southwest Airlines?

Posted in Cyber, eCommerce
Southwest’s website was down for about 3 hours so Southwest tweeted that “We are aware and investigating current issues with our website, and we have implemented flexible accommodations for those being affected.” The Dallas News report from December 21, 2016 entitled “Southwest Airlines suffers website outage; airport operations unaffected” stated that the 3 hours service… Continue Reading

GUEST BLOG: In the wake of Yahoo’s CONFESSION it’s time for you learn about 2-factor authentication!

Posted in Cyber, eCommerce
My Guest Blogger Eddie Block (CISSP, CIPM, CIPP/G, CISA, CEH) is a senior attorney in Gardere’s Litigation Group and member of the Cybersecurity and Privacy Legal Services Team who focuses on all aspects of information cyber security, including credentialing functions, firewall and IDS deployment and monitoring, and penetration testing, and related complex litigation. Last week… Continue Reading

Take a minute and read Yahoo’s 238 word CONFESSION about the Cyber theft of 1+ billion user accounts!

Posted in Cyber, eCommerce, Internet Privacy
Yahoo’s public confession entitled “Important Security Information for Yahoo Users”  about the August 2013 theft of “data associated with more than one billion user accounts” including “the stolen user account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (using MD5) and, in some cases, encrypted or unencrypted security questions… Continue Reading

GUEST BLOG: Presidential Commission Report Highlights Cybersecurity Risks for lawyers!

Posted in Cyber, eCommerce
My Guest Blogger Eddie Block (CISSP, CIPM, CIPP/G, CISA, CEH) is a senior attorney in Gardere’s Litigation Group and member of the Cybersecurity and Privacy Legal Services Team who focuses on all aspects of information cyber security, including credentialing functions, firewall and IDS deployment and monitoring, and penetration testing, and related complex litigation. Law firms… Continue Reading

Cyber Legal Risks to Most Businesses since 55% of Senior Management Delegates Compliance

Posted in Cyber, eCommerce, Internet Access
PwC’s survey of over 800 Compliance Officers was “designed to give corporate compliance officers benchmarking data to help them understand common industry practices today and plan for more effective, more efficient compliance operations in the future.” The report entitled “PwC State of Compliance Study 2016” highlighted these legal risks to most businesses caused by lack… Continue Reading

GUEST BLOG: Watch Out for Cyber Threats while Shopping during the Holidays (THINK WIFI)!

Posted in Cyber, eCommerce
My Guest Blogger Eddie Block (CISSP, CIPM, CIPP/G, CISA, CEH) is a senior attorney in Gardere’s Litigation Group and member of the Cybersecurity and Privacy Legal Services Team who focuses on all aspects of information cyber security, including credentialing functions, firewall and IDS deployment and monitoring, and penetration testing, and related complex litigation. As we welcome… Continue Reading

Healthcare is the biggest target for Cyberattacks in 2017!

Posted in Cyber, eCommerce, Internet Privacy
Experian reported that the “healthcare sector may continue to be the focal point for hackers as medical identity theft remains lucrative and easy for cyber criminals to exploit.”  The November 28, 2016 report entitled “2017 Fourth Annual Data Breach Industry Forecast” included this takeaway advice: As attackers shift their focus, an increase in hospital breaches… Continue Reading

Cyber criminals will target IoT since by 2020 92% of all data will be in the cloud!

Posted in Cyber
Rest assured that cyber criminals read Cisco’s report that cloud usage will grow significantly based on the scope of “big data and associated Internet of Things” with expectations that cloud usage as of 2015 at about “3.9 zettabytes (ZB) per year…to 14.1 ZB per year by 2020.” The November 2016 Cisco report entitled “Cisco Global… Continue Reading

Guess what? Cyber threats are directed at ATMs!

Posted in Cyber, eCommerce
Business Insurance reported that “Cyber criminals have remotely attacked cash machines in more than a dozen countries across Europe this year, using malicious software that forces machines to spit out cash.”  The November 21, 2016 report entitled “Hackers target ATMs across Europe as cyber threat grows” cites Russian cyber security firm Group IB and Diebold… Continue Reading

About 75% of companies don’t have adequate Cyber Security Incident Response Plans (IRPs), so how Cyber Resilient is your Company? Or Law Firm?

Posted in Cyber, eCommerce
Of the 2,000 IT and IT security professionals surveyed by the Ponemon Institute “75% of respondents admit they do not have a formal cyber security incident response plan (CSIRP) that is applied consistently across the organization” and 51% rated cyber resilience as “very important or essential to achieving a strong security posture.”  The November 2016… Continue Reading

Artificial Intelligence (think IBM’s Watson) now directed to cybersecurity

Posted in Cyber
Infoworld reported that “IBM Security is currently in the middle of a year-long research project working with eight universities to help train Watson to tackle cybercrime.”  The November 15, 2016 article entitled “How IBM’s Watson will change cybersecurity” includes a reference to IBM’s Security Intelligence comments by Diana Kelley that “We need to make sure… Continue Reading

Hacker gets 45 months in jail for stealing encrypted personal data & launching cyber attacks

Posted in Cyber, Internet Access, Internet Privacy
A federal judge sentenced NullCrew hacker Timothy Justen French to prison for playing a “central role in an extensive, deliberate, and destructive hacking campaign that inflicted widespread and serious harm to businesses, governments, non-profits, and thousands of individuals”…which “ cyber-attacks caused at least $792,000 in monetary loss to victim companies, universities and governmental bodies.” On… Continue Reading

The Cyber Underground and what you need to know about the DarkNet Marketplaces

Posted in Cyber, eCommerce
The US recently joined  Operation Hyperion to “share criminal intelligence and collaborate on operations to combat transnational crime” with the Five Eyes Law Enforcement Group (FELEG), an international coalition of law enforcement agencies from Australia, Canada, New Zealand, and the United Kingdom.  On November 1, 2016 the FBI issued its “A Primer on DarkNet Marketplaces… Continue Reading

BUSINESS ALERT: Cyberattacks are directed at ERP systems since they are difficult to secure

Posted in Cyber, IT Industry
Ponemon Institute issued a report after it “surveyed 607 IT and IT security practitioners who are involved in the security of SAP” and that 58% “of respondents rate the difficulty of securing SAP applications as high and 65 percent of respondents rate their level of concern about malware infections in the SAP infrastructure as very… Continue Reading

BLACK HAT SURVEY: Employee Training is in the top 5 ways to avoid hacking!

Posted in Cyber, IT Industry
Thycotic took a survey of 250+ hackers at the August 2016 Black Hat conference and reported that “77% say no password is safe from hackers—or the government” which is hardly surprising. The “Black Hat 2016: Hacker Survey Report” included these comments about training: Extend IT Security Awareness Training The weakest link in most organization’s security… Continue Reading

New Cyber rules for DOD contractors may be creating new problems!

Posted in Cyber
Law360 reported that many experts are concerned that “companies who share cybersecurity incident information with a DOD contractor will be considered a third-party beneficiary of the DOD, with the ability to sue if confidential information is leaked or stolen, but that offers little solace to those who have their information stolen.” The October 20, 2016… Continue Reading

Can the G7 really protect the financial world from cybercrime?

Posted in Cyber, eCommerce
Reuters reported that the Group of Seven (G7) industrial powers (Britain, Canada, France, Germany, Italy, Japan and the US) “agreed on guidelines for protecting the global financial sector from cyber attacks following a series of cross-border bank thefts by hackers.”  The October 11, 2016 report entitled “G7 sets common cyber-security guidelines for financial sector” included… Continue Reading