Internet, Information Technology & e-Discovery Blog

Internet, Information Technology & e-Discovery Blog

Social changes brought about by the Internet & Technology

Category Archives: eCommerce

Subscribe to eCommerce RSS Feed

Google fined $2.7 BILLION!

Posted in eCommerce
The NPR reported that Google violated EU antitrust laws as it “denied other companies the chance to compete on the merits and to innovate. And most importantly, it denied European consumers a genuine choice of services and the full benefits of innovation.”  The June 27, 2017 article entitled “Google Hit With $2.7 Billion Fine By… Continue Reading

Anthem agrees to pay $115 million for 2015 cyber intrusion to settle litigation!

Posted in Cyber, eCommerce, Internet Privacy reported that “Anthem Inc., the largest U.S. health insurance company, has agreed to settle litigation over a hacking in 2015 that compromised about 79 million people’s personal health information for $115 million, which lawyers said would be the largest settlement ever for a data breach.”  The June 26, 2017 report entitled “Anthem to pay… Continue Reading

Honda plant halted operations because of WannaCry Ransonware!

Posted in Cyber, eCommerce
The Financial Times reported that the “Japanese carmaker revealed that it temporarily halted production at its Sayama plant, northwest of Tokyo, after it discovered that some of its computers were affected by the ransomware late on Sunday.”  The June 21, 2017 Financial Times report entitled “Honda plant hit by WannaCry ransomware attack” included a confession… Continue Reading

7 Flavors of CyberCrimeware as a Service (CaaS) includes Ransomware as a Service (RaaS)!

Posted in Cyber, eCommerce
Darkreading reported that inexpensive CaaS include malware “botnets, phishing and backdoors are all offered on the cheap as subscription. These days even crime is in the cloud.”  The June 13, 2017 Darkreading report was entitled “The Rising Tide of Crimeware-as-a-Service” included these comments about RaaS: The incipient rise of ransomware has occurred in lockstep with… Continue Reading

IBM Blockchain & AIG team up for “Smart Insurance”

Posted in eCommerce
Reuters reported that “AIG and IBM completed a pilot of a so-called “smart contract” multi-national policy for Standard Chartered Bank PLC which the companies said is the first of its kind using blockchain’s digital ledger technology.” The June 15, 2017 report entitled “AIG teams with IBM to use blockchain for ‘smart’ insurance policy” included this… Continue Reading

Cyber criminal’s phishing leads to 4+ years in prison for stealing airline tickets, which employee training could have avoided!

Posted in Cyber, eCommerce
Darkreading reported a 4+ year jail sentence for stealing airline tickets by using “phishing campaigns targeted customers of Travelport and Sabre, causing phishing emails to be delivered to their customers for the purpose of obtaining and stealing their unique log-in credentials.”  On June 5, 2017 the Department Justice issued a press release entitled “West African computer… Continue Reading

Cyber attack probably caused BA to strand 75,000 passengers, but BA claims it just lost electricity! Haha!

Posted in Cyber, eCommerce
The Independent reported that Wallie Walsh (Chief of  British Airways’ owner International Airlines Group) broke his silence about BA’s IT failure last week that left 75,000 travelers stranded saying “it was not an IT failure, it was a problem caused by the failure of electrical power to our IT systems.” The June 1, 2017 report… Continue Reading

Facebook lied to the EU about privacy & will pay a $122 million fine!

Posted in eCommerce, Internet Privacy
The Washington Post reported that “Facebook was not honest about its ability to identify users who had both Facebook and WhatsApp accounts and link those accounts” during Facebook acquisition in 2014.  The May 18, 2017 report entitled “Facebook will pay $122 million in fines to the E.U.” included these details: When Facebook notified the acquisition… Continue Reading

Does Apple Pay infringe any patents?

Posted in eCommerce
The New York Times reported that Universal Secure Registry’s filed a lawsuit against Apple and Visa alleging that “Apple Pay digital payment technology violates its patents.”   The May 21, 2017 article in the New York Times was entitled “Apple Pay Violates Patents Held by Security Technology Inventor, Lawsuit Allege” and reported that Universal Secure… Continue Reading

Googlification: Google has taken over US schools and as a result – the next generation!

Posted in eCommerce, Social Media
The New York Times reported that “more than half the nation’s primary- and secondary-school students — more than 30 million children — use Google education apps like Gmail and Docs.”  The May 13, 2017 report entitled “How Google Took Over the Classroom” included the observation that Google has taken over replaced “Apple and Microsoft with… Continue Reading

Private Blockchains may not be secure!

Posted in Cyber, eCommerce
Coindesk recently published a blog which “attacks the idea that true immutability can be achieved in blockchain systems, arguing a more relative definition of this feature better encapsulates what’s the technology can achieve.” The May 9, 2017 article entitled “The Blockchain Immutability Myth” was a blog from “Dr.  Gideon Greenspan is the founder and CEO… Continue Reading

GUEST BLOG: Attorney Client Privilege Lost in the Cloud!

Posted in E-Discovery, eCommerce, Internet Access, Uncategorized
My Guest Blogger Eddie Block (CISSP, CIPM, CIPP/G, CISA, CEH) is a senior attorney in Gardere’s Litigation Group and member of the Cybersecurity and Privacy Legal Services Team who focuses on all aspects of information cyber security, including credentialing functions, firewall and IDS deployment and monitoring, and penetration testing, and related complex litigation.  Eddie blogs at JurisHacker. Attorney Client Privilege… Continue Reading

Arizona passes a law recognizing that Blockchain is secure!

Posted in eCommerce, Internet Privacy
CIO from IDG reported that the first state to legalize Blockchain with this description “A record or contract that is secured through blockchain technology is considered to be in an electronic form and to be an electronic record.” The May 4, 2017 article entitled “Is blockchain technology secure for your company’s transactions?” described countries that… Continue Reading

WEBINAR VIDEO: Blockchain Legal Risks

Posted in eCommerce
Gardere’s recent webinar includes a discussion about the future legal issues of Blockchain. Of course I think Blockchain will change the world since bitcoin, which relies on Blockchain, and other Blockchain uses currently impact everyone on earth.  You are welcome to watch the April 26, 2017 “Blockchain Legal Risks” webinar prepared and presented by me and Gardere… Continue Reading

4 ways to stop Spearphising (aka Business Email Compromise “BEC”) which has cost more than $2.3+ billion!

Posted in Cyber, eCommerce
Proofpoint’s report states that spearphising/BEC “have collectively scammed victims out of more than $2 billion globally” and that these “threats have hit more than 7,000 companies since the FBI’s Internet Crime Complaint Center (IC3) began tracking this type of scam in late 2013.” When I blogged about the FBI report “Watch out for BEC (Business… Continue Reading

IoT Privacy Lawsuit- Bose sued for taking headphone data without consent!

Posted in eCommerce, Internet Privacy
A class action was filed against Bose which alleges that Bose “Unbeknownst to its customers, however, Defendant designed Bose Connect to (i) collect and record the titles of the music and audio files its customers choose to play through their Bose wireless products and (ii) transmit such data along with other personal identifiers to third-parties—including… Continue Reading

GUEST BLOG: Do you know which 2 states don’t have data breach notification laws?

Posted in Cyber, eCommerce
My Guest Blogger Eddie Block (CISSP, CIPM, CIPP/G, CISA, CEH) is a senior attorney in Gardere’s Litigation Group and member of the Cybersecurity and Privacy Legal Services Team who focuses on all aspects of information cyber security, including credentialing functions, firewall and IDS deployment and monitoring, and penetration testing, and related complex litigation.  Eddie blogs at JurisHacker. Breach notification laws:… Continue Reading

Do you believe China’s new cyber laws are for real?

Posted in Cyber, eCommerce
Reuters reported that a new Chinese law “would require firms exporting data to undergo an annual security assessment law….[and] would ban the export of any economic, technological or scientific data whose transfer would pose a threat to security or public interests. It would also require firms to obtain the consent of users before transmitting data… Continue Reading

Cybercriminals demand ransomware from Apple, or else they will wipe 300 million iPhones!

Posted in Cyber, eCommerce
Forbes reported that “a hacker group calling itself Turkish Crime Family…reported having access to 300 million Apple accounts” and demanded “$75,000 in crypto-currency (either Bitcoin or Ethereum) or $100,000 in iTunes gift cards, and the data would be deleted.”  The March 22, 2017 report entitled “Hackers Threaten To Wipe 300M iPhones, iCloud Accounts Unless Apple… Continue Reading

Blockchain is what makes Bitcoin work, and is the real deal to change the world!

Posted in eCommerce, IT Industry
McKinsey’s interviewed Don Tapscott who defined Blockchain as an “immutable, unhackable distributed database of digital assets” which is a “giant, global spreadsheet that runs on millions and millions of computers.”  The May 2016 article entitled “How blockchains could change the world” included these comments about Bitcoin: Most blockchains—and Bitcoin is the biggest—are what you call permission-less… Continue Reading

Electronic Health Record (EHR) databases worth $500,000 to cybercriminals!

Posted in Cyber, eCommerce
Trend Micro’s conducted a study to learn more about “how stolen medical records are monetized after a breach, what types of data are stolen, how much they are sold for on the underground markets, and how cybercriminals make use of them” and use “Shodan scan data which reveals what healthcare-related devices and networks are connected… Continue Reading