Have the Flood Gates Been Opened for Cyber Breach Lawsuits?
Up until now, most lawsuits against retailers by customers whose personal information was stolen by hackers in a data breach, were dismissed by the courts in the early stages of litigation because the theft of personal information, such as credi
Cyber Cheating on Your Spouse Just Doesn’t Pay
When I was a kid, my mother would always tell me it doesn’t pay to sneak around because I would always get caught. Never has this advice rang so true as when I read about a website for married people seeking affairs that was hacked this week.
Medjacking. . . Hackers Hi-Jacking Medical Devices
In recent posts I have discussed the need for security to keep hackers from injecting malware into medical devices. Now, TrapX Laboratories has issued a paper on an attack vector called MEDJACK, or “Medical Device Hi-Jack” (http://trapx.com/
Building Code for Medical Device Software Security
Earlier this month I published a Post on, “The Importance of Cyber Security in Telemedicine”, highlighting the importance of security for medical devices that can be hacked. Almost as if on cue, or more likely the result of lucky timing, on
The Importance Of Cyber Security In Telemedicine
Telemedicine is coming to a hospital or medical office near you. What is telemedicine? Simply put, telemedicine is when the medical provider is in one location and the patient is in another. The medical professional uses telecommunication techno
A Tool To Unlock Ransomware
As many of you know, ransomware is a malware that infects Windows systems and encrypts files to make them inaccessible and unusable. At the time of the infection, the hacker demands payment in exchange for the decryption key. Even if the ransom
The Real Reason The FTC Does Not Like The White House’s Consumer Privacy Bill
In January, President Obama announced that he would release a draft Consumer Privacy Bill intended to give consumers more control over how data about them is collected and used. The draft Bill was released on February 27, 2015, and already there
President’s Big Data and Privacy Working Group Interim Report Is Troubling
In January 2014, President Obama appointed John Podesta, Counselor to the President, to lead a review of big data and privacy. On February 5, 2015, the Big Data and Privacy Working Group issued an interim report detailing their progress. Unfortu
A Simple Lesson for Employers and Employees Courtesy of the Sony Data Breach
Many Sony executives are embarrassed, to say the least, by their e-mails, which have been made public as a result of their data breach. (http://variety.com/2014/biz/news/leaked-sony-emails-reveal-jokes-about-obama-and-race-1201376676/). I have p
The Inevitable Showdown to Control the Data from Your Fitness App
By now, most of us have heard about the health tracking capabilities of HealthKit, part of Apple’s latest iPhone operating system, iOS 8. HealthKit offers the ability of users to track and share personal health and medical data such as diet, e