Life is short - it is shorter when hackers tell your spouse Shame hacking -- the use, or threatened use, of purportedly hacked data for embarrassing or extorting people by threatening to expose such compromising data if they do not comply with the demands made of them -- is a thing. A search engine for … Continue reading Is #ShameHacking Coming Next? Hackers Breach Search Engine for Japanese Sex Hotels
12/31/19 Two decades ago to the day, I sat right here in my home study and thought about how my career as a cyber incident responder was surely about to blast off. Though I had only been licensed to practice law for under two months, I just knew this subject matter was it -- my … Continue reading 2 Decades Later: Cyber Risk Isn’t Y2K–It Is An Unsolved Risk That You Must Take Seriously
Cybercriminals are using a bad cyber extortion trifecta of (1) using ransomware to encrypt victim companies' data, (2) publicizing the names of those companies that don't pay up, and (3) then exposing the data they stole from the companies. This is bad stuff and companies had better be ready to protect themselves. Read more: Ransomware … Continue reading Ransomware + Publicize Victim Companies + Expose Stolen Data = Bad Cyber Extortion Trifecta
Why is the FBI warning about smart TV cybersecurity? Because a smart TV is a computer -- it is just built into a really large monitor -- and it should be secured like a computer because hackers can hack it just like any other computer. (See FBI Warning)Listen to Shawn Tuma discuss this issue on … Continue reading Why is the FBI Warning About Smart TVs?
Business leaders are beginning to understand that cyber is not just an IT issue, a legal issue, or any other silo-ed issue, but that it is an overall business risk issue and that makes managing cyber risk a team sport. This week I had the privilege of moderating a panel discussion that was titled "Sharing … Continue reading Sharing the Load: What are Chief Privacy Officers, Chief Information Security Officers, and General Counsel Doing in Real Life to Divide Up Roles and Responsibilities? (conference panel discussion)