I read an interesting article that discusses the intersection between social media and cybersecurity. The gist is that the bad guys use information they learn on social media (recall my lessons on business situational awareness) to engage in social engineering / spear phishing attacks based upon that intel. Read more: Why Hackers Love Companies Who Use Social…
Category: Cyber Espionage
Is China responsible for all the hacking it has been blamed for? Not according to Norse.
An interesting article about Norse’s upgrades to its ipviking system indicate that China may not be quite as bad as we previously thought: 3C: So what have you discovered? Stiansen: We’re learning that traffic and attacks coming out of China isn’t really China. It’s actually other nations using China’s infrastructure to do the attacks. It’s…
Private Investigators, You Are Not Immune From the Computer Hacking Laws
I have seen far too many cases where private investigators do things like install keyloggers on estranged-spouses computers, install sniffer programs to find their login credentials, and do other nefarious activities to hack their way into computers. Why should it come as a surprise to anyone that a PI has now been busted for hiring a…
Business Guide: Identifying and Protecting Trade Secrets Under the Texas Uniform Trade Secrets Act
Trade secrets are the lifeblood of a company but it can be a difficult issue to understand. Here is a free guide to help you identify and protect your company’s trade secrets. DOWNLOAD: Texas Business Guide for Identifying and Protecting Trade Secrets Yes, Your Business Has Trade Secrets Whether they realize it or not, virtually…
FBI Director Talks Cyber Espionage: Chinese Like “Drunk Burglar”
“[T]here are two kinds of big companies in the United States. There are those who’ve been hacked by the Chinese and those who don’t know they’ve been hacked by the Chinese” -FBI Director The pervasive threat that cyber espionage poses to American business is not a new topic on this blog — we have been talking about it…
Hackers’ Cracked 10 Financial Firms in Major Assault – Russian Officials Involved?
There is nothing new about cyber attacks coming from Russia, however, to actually be able to tie them to Russian government officials — albeit loosely — would be another step. Is this a hunch or do they have something more? Related: US Indicts Chinese Army Officers for Hacking US Companies The huge cyberattack on JPMorgan Chase that…
3 Steps the C-Suite Can Take to Strengthen Cyber Security
The C-Suite is ultimately responsible for failures of a company’s cyber security. A recent example of this is how Target’s CEO, CTO, and several Board Members were pushed out in the wake of its data breach. SEE BELOW FOR EVENT REGISTRATION! This puts leaders in a difficult position. It is almost a statistical certainty that…
Yes, an Employee Really Can Steal Your Data and Then SLAPP You for It?
Yes, in California it just happened! The fact that this happened in California should be of no comfort to Texas businesses, however, because the Texas Anti-SLAPP law comes from California and, therefore, California jurisprudence is considered persuasive authority in Texas. This means that in the not so distant future Texas employees could steal their employers’ data…
What is Corporate Espionage, Industrial Espionage, Cyber Espionage, and Economic Espionage? The DOJ Explains …
What is Cyber Espionage? Corporate espionage, industrial espionage, and cyber espionage all generally mean the same thing: (1) intentionally targeting or acquiring trade secrets of companies to benefit any foreign government, foreign instrumentality, or foreign agent, (FBI) which means, in simpler terms, (2) espionage conducted to gain a commercial advantage (Wikipedia). What is this not? This…
Collin County Bench Bar Presentation on Cyber Risks to Lawyers #CCBBF
This morning I have the privilege of speaking at the Collin County Bench Bar Conference and talking with a tremendous group of Collin County Judges and Lawyers about the risks that lawyers, their clients, and their law practices face from data insecurity issues. Here is the Prezi presentation that I will be using – take…