Warning of Another Medical Device Vulnerable to Hacking
Written by: Richard Sheinis, Esq. In a precursor of things to come, earlier this month the CERT Division of the Software Engineering institute based at Carnegie Melon University has warned that the Epiphany Cardio Server is vulnerable to hackin
LabMD Defeats FTC
Written by: Richard Sheinis, Esq. In a surprising ruling, the FTC has taken a big hit to its self-appointed power to regulate the data security practices of every business in the country. On Friday, November 13, the FTC Chief Administrative Law
Defending The Technology Based Medical Malpractice Case Of The Future
By: Richard Sheinis, Esq. The medical industry is taking advantage of wireless technology to change the very premise of how case has been provided for hundreds of years. Regardless of whether a doctor was performing bloodletting in the 1700’s
EU Court of Justice Declares the US Safe Harbor for the Transfer of Data to Be Invalid
Written by: Richard Sheinis, Esq. In a ruling that can have great ramifications for technology companies, and almost any U.S. company that does business in the EU, the EU Court of Justice has ruled that the Safe Harbor provisions, which for yea
Obama and Chinese President Reach Agreement to Stop State Sponsored Hacking. Really?
Written by: Richard Sheinis, Esq. On Friday of last week, President Obama announced that he and Chinese President Xi Jinping reached a “common understanding” not to conduct or support state sponsored hacking. “We have agreed that neither
Hackers Use Syrian Refugee Crisis to Scam You
In a classic case of “social engineering” hackers are using the Syrian refugee crisis to scam people out of money and information. Whenever a humanitarian crises hits, hackers will set up fake websites, send phishing e-mails, and use social
E-Mail Scam Tricking Businesses Into Wiring Funds to Hackers Grows 270%
This week the FBI said an e-mail scam that tricks businesses into wiring funds to hackers has increased 270% since the beginning of 2015. The FBI has named the scam “Business E-Mail Compromise” or “BEC”. The scam occurs when a hacker inf
Third Circuit Rules in Favor of FTC Having Authority to Regulate Data Security
On August 24, in FTC v. Wyndham Worldwide Corp., the Third Circuit Court of Appeals found that the FTC had authority to regulate cyber security under the “unfairness” prong of Section 5 of the Federal Trade Practices Act. The background of
Cyber Scam Gets Executive to Wire Funds to the Hackers
Ubiquiti Networks, Inc. was recently the victim of a cyber scam in which the thieves sent spoof communications to executives to trick them into wiring funds to the fraudsters to the tune of $46.7 million. Go to Krebs on Security, http://krebson
FDA Urges Hospitals to Discontinue Use of Hospira Infusion System Due to Cybersecurity Vulnerabilities
In a warning that is the first of its kind, on July 31, 2015, the FDA encouraged healthcare facilities to stop using the Hospira Symbiq Infusion System due to cybersecurity vulnerabilities. (http://www.fda.gov/MedicalDevices/Safety/AlertsandNoti