Cybersecurity

 
 
  • eye iris scan biometric 599460976 420
    Biometric Info Emerging As Major Liability Risk

    A law in Illinois is seen as a possible model, as more states contemplate regulating how companies handle consumer biometric information. The Illinois law, known as the Biometric Information Privacy act, was passed in part because the...

    • Posted 15 hours ago
    • 0
  • iStock_chair
    Thousands of Cybersecurity Jobs Left Unfilled

    Analysts say that somewhere between 100,000 and 350,000 vacant cybersecurity positions are waiting for qualified candidates. The exponential growth of global hacking has caused a skyrocketing demand for the positions, which start at around $80,000 per year...

    • Posted 3 days ago
    • 0
  • iStock_000028575662 SPY IN CUBICLE 420
    FOX News Accused Of Hacking Host

    Former Fox News host Adrea Tantaros says the company hacked into her computer and then launched an online harassment campaign to discredit her. Tantaros, who has also filed a lawsuit against the channel for sexual harassment she...

    • Posted 3 days ago
    • 0
  • PRIVACY NEWSPAPER 420
    Watch Out When Opting For “VPN” Internet Connections

    Now that Congress and the Trump administration have blocked proposed Obama administration internet privacy rules, internet providers will be free to harvest their customers’ browsing history and sell it. The prospect of having everything from their idle...

    • Posted 3 days ago
    • 0
  • Gavel on laptop computer keyboard concept for online internet auction or legal assistance
    Russian Hacker Gets 27-Year Prison Sentence

    The Federal District Court in Seattle made an example of Russian hacker Roman Valerevich Seleznev, who sold millions of credit card numbers on the black market, sentencing him to 27 years in prison. That’s the longest sentence...

    • Posted 4 days ago
    • 0
  • The Life Cycle of a Data Breach

    A data breach can be an existential crisis for an unprepared business, and in the best case it’s likely to be expensive and disruptive. Treat data security as an integral part of the company risk profile, and...

    • Posted 7 days ago
    • 0
  • Flyin documents paper information 486187916 420
    An Expert Conversation About “Proportionality”

    E-Discovery software company Exterro convened three experts to discuss a recent case where the concept of “proportionality,” as addressed by Rule 26, played a significant role. The case was Solo v. United Parcel Services in the Eastern...

    • Posted 1 week ago
    • 0
  • iStock_work email
    Phishing Incident Costs Health Center $400K

    A Colorado health center has agreed to pay $400,000 to settle potential non-compliance with HIPAA following a 2011 phishing incident. In that incident, a hacker allegedly accessed Metro Community Provider Network employees’ email accounts, acquiring electronically protected...

    • Posted 1 week ago
    • 0
  • businessman balancing on tightrope city
    New Options In The Volatile Cyber Insurance Market

    When buying cyber insurance, shoppers  are warned to look carefully at the fine print and watch for exclusions, as the industry struggles with a rapidly shifting threat landscape and relatively little in the way of claims history. Meanwhile,...

    • Posted 2 weeks ago
    • 0
  • Using cell phone while driving
    Company Disconnects Internet-Controlled Garage Door After Customer Complaint

    A customer identified as R. Martin was having problems with his app-controlled garage door, ordered from Colorado start-up Garadget. He went onto the company’s community board to complain, and then posted a negative review on Amazon. Shortly...

    • Posted 2 weeks ago
    • 0