5 Key Takeaways from Verizon’s GC on Lessons Learned from Yahoo Deal

A good friend recently shared with me the article Verizon GC on the Lessons Learned from Deal with Yahoo (use Linkedin for paywall access) because he thought it would be valuable information to add to my own cybersecurity knowledge toolbox. Given the experience Verizon’s GC has gained through this process, when he talks about lessons [...]

Insider Misuse of Computers: No Big Deal? It Can Be a Data Breach, Ask Boeing

Insider misuse triggers a breach just like outside hackers. When a company’s information is compromised because of insider[1] misuse of computers or information, regardless of insider’s intentions, the result for the company and the data subjects of that information is often the same as if it were an attack by an outside adversary – it [...]

“Shame Hacking” Liberal Groups — Is It Really Russian Hackers Doing It?

But it's the Russians! The ubiquitous Russians are at it again, or, so we are being told. You know, the Russian hackers who are everywhere, doing everything nefarious in the world, and victimizing poor little helpless "us" here in the United States . . . BREAKING!  Wikileaks: CIA 'Stole' Russian Malware, Uses It to ‘Misdirect Attribution’ [...]

Verizon Requires $350 Million Discount and Yahoo Share in Data Breach Liability — Good Deal?

UPDATE: Yahoo Shareholders Sue Over Massive Data Breaches (Law 360 paywall) Verizon and Yahoo have renegotiated their deal in the wake of Yahoo's revelations of its past data breaches. Verizon had agreed to pay $4.8 billion for Yahoo's Internet business in July 2016, but that was before Yahoo disclosed that it had two of the largest data [...]

David Beckham’s Exposed Emails Exemplify Shame Hacking Threat

Hackers have obtained David Beckham's embarrassing emails from his advisors in an extortion plot in which the advisors were told "pay up or we'll release emails," according to a recent news report. When the advisors refused to pay the £1million demand, the hackers released the emails. This is yet another example of what I call shame hacking, a topic [...]