Third Circuit Rules in Favor of FTC Having Authority to Regulate Data Security
On August 24, in FTC v. Wyndham Worldwide Corp., the Third Circuit Court of Appeals found that the FTC had authority to regulate cyber security under the “unfairness” prong of Section 5 of the Federal Trade Practices Act. The background of
Cyber Scam Gets Executive to Wire Funds to the Hackers
Ubiquiti Networks, Inc. was recently the victim of a cyber scam in which the thieves sent spoof communications to executives to trick them into wiring funds to the fraudsters to the tune of $46.7 million. Go to Krebs on Security, http://krebson
FDA Urges Hospitals to Discontinue Use of Hospira Infusion System Due to Cybersecurity Vulnerabilities
In a warning that is the first of its kind, on July 31, 2015, the FDA encouraged healthcare facilities to stop using the Hospira Symbiq Infusion System due to cybersecurity vulnerabilities. (http://www.fda.gov/MedicalDevices/Safety/AlertsandNoti
Have the Flood Gates Been Opened for Cyber Breach Lawsuits?
Up until now, most lawsuits against retailers by customers whose personal information was stolen by hackers in a data breach, were dismissed by the courts in the early stages of litigation because the theft of personal information, such as credi
Cyber Cheating on Your Spouse Just Doesn’t Pay
When I was a kid, my mother would always tell me it doesn’t pay to sneak around because I would always get caught. Never has this advice rang so true as when I read about a website for married people seeking affairs that was hacked this week.
Medjacking. . . Hackers Hi-Jacking Medical Devices
In recent posts I have discussed the need for security to keep hackers from injecting malware into medical devices. Now, TrapX Laboratories has issued a paper on an attack vector called MEDJACK, or “Medical Device Hi-Jack” (http://trapx.com/
Building Code for Medical Device Software Security
Earlier this month I published a Post on, “The Importance of Cyber Security in Telemedicine”, highlighting the importance of security for medical devices that can be hacked. Almost as if on cue, or more likely the result of lucky timing, on
The Importance Of Cyber Security In Telemedicine
Telemedicine is coming to a hospital or medical office near you. What is telemedicine? Simply put, telemedicine is when the medical provider is in one location and the patient is in another. The medical professional uses telecommunication techno
A Tool To Unlock Ransomware
As many of you know, ransomware is a malware that infects Windows systems and encrypts files to make them inaccessible and unusable. At the time of the infection, the hacker demands payment in exchange for the decryption key. Even if the ransom
The Real Reason The FTC Does Not Like The White House’s Consumer Privacy Bill
In January, President Obama announced that he would release a draft Consumer Privacy Bill intended to give consumers more control over how data about them is collected and used. The draft Bill was released on February 27, 2015, and already there