Video: What to do if you have a Yahoo account (Tuma on WFMJ News)

Video interview: Shawn Tuma discusses what to do if you believe your Yahoo account has been compromised – WFMJ NBC News, Youngstown-Warren, Ohio Full news article: What to do if you believe your Yahoo account has been compromise – WFMJ.com News weather sports for Youngstown-Warren Ohio ______________________ Shawn Tuma (@shawnetuma) is a business lawyer with …

Yahoo Data Breach – Some Facts & Questions (i.e., was it really the Russians?)

The Basic Facts Yahoo announced that it had a data breach in late 2014 and 500 million users’ account information was stolen. The account information may include names, email addresses, telephone numbers, date of birth, passwords (most encrypted with bcrypt, but apparently not all), security questions, and security question answers. People who have Yahoo-based services …

Musings about the Equifax Data Breach

This is intended to be an old-fashioned “blog” about thoughts on the Equifax data breach. It will be ongoing so please check back regularly. Topics Media interviews and commentary We are seeing shame hacking taken to a new level Will I lead a consumer class action lawsuit against Equifax? Lawsuits and investigations against Equifax What …

National data breach notification law pros and cons? What do you think?

What are the pros and cons of a national breach notification law? What are the questions that need to be asked to facilitate this discussion? What are the critical points that need to be made?

CYBERSECURITY FOR YOUR LAW FIRM

TABLE OF CONTENTS INTRODUCTION.  The Most Important Point of this Guide: The Law Firm Must Have Adequate Cybersecurity Defenses.  THE IMPACT OF CYBERSECURITY LAW.  Cybersecurity is a Legal Issue.  The Conundrum of Cybersecurity Law Schizophrenia.  LAWYER’S & LAW FIRM’S UNIQUE OBLIGATION TO PROTECT CLIENT DATA.  UNDERSTANDING THE BASICS OF CYBERSECURITY AND CYBERATTACKS.  What are the …

WikiLeaks and CIA’s Russian Hacking Tools & Techniques: Was it really the Russians?

In the wake of WikiLeaks’ Vault7 release of documents revealing the CIA’s hacking tools, I must revisit a key section of a post from September 2016. The section was about the convenience of blaming “the Russians” given the craze of attributing everything wrong in the cyber world to the seemingly omnipresent “Russians.” See: “SHAME HACKING” …

“Shame Hacking” Liberal Groups — Is It Really Russian Hackers Doing It?

But it’s the Russians! The ubiquitous Russians are at it again, or, so we are being told. You know, the Russian hackers who are everywhere, doing everything nefarious in the world, and victimizing poor little helpless “us” here in the United States . . . BREAKING!  Wikileaks: CIA ‘Stole’ Russian Malware, Uses It to ‘Misdirect Attribution’ …

David Beckham’s Exposed Emails Exemplify Shame Hacking Threat

Hackers have obtained David Beckham’s embarrassing emails from his advisors in an extortion plot in which the advisors were told “pay up or we’ll release emails,” according to a recent news report. When the advisors refused to pay the £1million demand, the hackers released the emails. This is yet another example of what I call shame hacking, a topic …

Porn, Politics & Cybersecurity: Are We Seeing Shame Hacking with Texas Elector?

Is the Texas elector who refuses to vote for Trump the first example of shame hacking in politics? In previous posts, I have written about shame hacking which is the use of hacked data for embarrassing or extorting people by threatening to expose such compromising data if they do not comply with whatever demands were made of them. …