Data Privacy and Cybersecurity
As the ransomware racket has evolved it has become both more commercial and more professional. New ransomware gangs have adopted the language and practices of…
A new documentary looks at the brief history and future prospects of “The Perfect Weapon,” the title of both the documentary and the book on…
Someone or some organization has been launching a series of coordinated attacks designed to disrupt Trickbot, a collection of more than two million malware-infected Windows…
From the UK, an information security website lays out a systematic communications strategy for companies that have suffered a data breach. This post, a summation/analysis…
According to a poll taken by KPMG, most consumers would take their business elsewhere if they found out that a company had suffered a cyber-attack…
A cybersecurity expert who has Top Secret clearance with the Defense Department and was an “integral architect in the development of the Air Force’s first cyber weapon system,” has sued Red McCombs Toyota…
A healthcare industry security publication reports a spate of apparently successful ransomware attacks, in which hackers posted some of the data they claim to have…
Texas-based Tyler Technologies sells services to state and local governments including tax software, software for courts, and enterprise financial software systems. It had more than…
In 2016 a group of ethical hackers in the Netherlands were looking through a password database that had leaked out of LinkedIn a few years…
All practicing attorneys face daily threats from cybercriminals worldwide. It does not matter whether you work for a large firm or are in a solo…