The Basic Facts Yahoo announced that it had a data breach in late 2014 and 500 million users’ account information was stolen. The account information may include names, email addresses, telephone numbers, date of birth, passwords (most encrypted with bcrypt, but apparently not all), security questions, and security question answers. People who have Yahoo-based services…
Search Results for: hack a car
Four Security Issues All Business Contracts Should Address
Note: this article was previously posted on Norse’s DarkMatters. A recent lawsuit provides a nice case study for how businesses’ contracts can play a critical role in their cybersecurity strategy. Before the court is this question: Who was responsible for maintaining cybersecurity safeguards for a bank’s website, the bank or the company that designed and…
Three Takeaways from the Target Data Breach Ruling
Note: this article was previously posted on Norse’s DarkMatters. In December 2014, the Court in the Target data breach lawsuits issued a ruling that will impact the future course of data breach litigation (the Order).
The Nature of Cybersecurity and Strategies for Unprecedented Cyber Attacks
What is foreseeable is that cyber attacks often are not. A few years ago the Sony Pictures Entertainment (SPE) hack turned on its head the business world that was already trying to come to grips with the Target, Home Depot, Neiman Marcus, and many other data breaches. There was one thing about the SPE breach…
1 Step to Improve Your Company’s Cybersecurity Today
THE ANSWER: The answer is at the bottom, click here to see it now. Cybersecurity is sounding more and more like the magical mystical snake oil elixir of the new millennium. And, for good reason. Everybody is selling the miracle cure, the one tool that will fix everything, and they are doing so with scare…
SuperValu Data Breach Class Action Dismissed for Lack of Harm
Because the data breach class action plaintiffs were unable to show they sustained any actual harm, the Minnesota U.S. District Court granted SuperValu’s Motion to Dismiss their case, without prejudice, on January 7, 2016. In its Memorandum Opinion, the Court distinguished the Target and Neiman Marcus cases because “[t]hose cases included factual allegations of substantial data misuse…
Social Media Malware: What Is It and How do You Avoid It?
Guest Post by Cassie Phillips You can’t have spent more than a week on the internet without hearing about malware and its adverse effects on your computer or even your smartphone (smartphone malware is on the rise as well). Perhaps you’ve even had to spend half a day cleaning it off your computer yourself. It…
Wyndham and FTC settle data breach dispute — Wyndham got 20 years
On December 9, 2015, the FTC announced that it and Wyndham Hotels had settled their long-running dispute that led to an opinion from the Third Circuit Court of Appeals confirming the FTC’s authority to regulate cybersecurity. The gist of the settlement is that, for the next 20 years, Wyndham must do the following: obtain annual…
FTC v. Wyndham Worldwide Solidifies the FTC’s Role in Regulating Cybersecurity
The FTC has authority to regulate cybersecurity under the unfairness prong of § 45(a) of the Federal Trade Commission Act and companies have fair notice that their specific cybersecurity practices could fall short of that provision. F.T.C. v. Wyndham Worldwide Corp., 799 F.3d 236 (3rd Cir. Aug. 24, 2015). Here are a few key points…
Excellus Blue Cross Blue Shield’s big data breach and the security lessons we all need to learn
Guest Post by Debbie Fletcher There are two possible conversations that could be kicked off by the news of the major data breach at Excellus Blue Cross Blue Shield in which more than 10 million customer accounts were exposed. The first possible conversation is about internet security and what businesses and organizations of all sizes…
You must be logged in to post a comment.