Posts Tagged: "cyber attacks"

China’s new anti-terror law highlights tensions between national security and digital privacy

Chinese legislators have attempted to enact anti-terror legislation purportedly designed to protect Chinese citizens against terrorist threats. In late December, China passed a law requiring both telecommunications and Internet companies operating in the country to provide decryption, technical interfaces and other assistance to public and state security organizations to conduct investigations of potential terrorist activities. The tech sector has misgivings about Chinese regulations that would force the handing over of sensitive data. Imagine a leak of encryption keys leading Chinese hackers to degrade performance of a foreign tech provider, all in the name of promoting indigenous innovation. That’s a pretty extreme scenario, but one that’s not completely unimaginable considering recent cybersecurity headlines.

In the face of growing e-commerce fraud, many merchants not prepared for holidays

As card-present transactions become less susceptible to fraud because of the shift to EMV chip card technologies, it’s expected that more fraud will shift to online platforms where it’s still relatively easy to input fraudulent financial information without being noticed; some reports indicate that online retail fraud in the U.S. alone is expected to rise by 106 percent in three years after October’s EMV liability shift from banks to business owners. One way that businesses conducting sales online can get themselves ready to respond quickly to fraud is through effective planning prior to major sales events like Black Friday or, perhaps more important when thinking about e-commerce, Cyber Monday. If those workers handling fulfillment of online orders are more aware of expected sales projections, it will help them be more aware of clues that the business might be a target for fraud if actual sales figures differ wildly.

A lax attitude towards data security could leave law firms in the lurch

Law firms are coming under growing scrutiny for a lack of effort in addressing hacking concerns or even coming clean with the threats which they have faced. A cybersecurity report released in February of this year by Citigroup Inc. (NYSE:C) lambasted law firms for being at high risk for cyber intrusions while the industry standard for cybersecurity remains much lower than for other industries. Law firms who deal with incredibly valuable intellectual properties should be acutely aware of the risks that they face from hackers, especially those from overseas. Patented technologies have been the target of international hackers in recent months. Just this May, the U.S. Justice Department charged six Chinese nationals with stealing IP related to wireless technologies developed by a couple of American companies.

Trade Secrets: Managing Information Assets in the Age of Cyberespionage

The titans of the 19th Century made fortunes because they controlled access to the raw materials and infrastructure of commerce: steel, oil, lumber, railroads, canals, shipping. In contrast, the Third Industrial Revolution creates value not just from ideas that improve our ability to transform materials, but from information itself. This shift to intangible assets has been profound, but so swift that few have paid sufficient attention to the magnitude of the change. In the Information Age, your secrets – a new technology, a business plan, insights extracted from data analytics – define your competitive advantage. And because business is global, competition can emerge anywhere, anytime.

Law firms are the new target for IP theft: Basic Protections

At a minimum, two-factor authentication rather than a single password, should be used to protect most types of confidential data. With two-factor authentication, the user is required to use two of the following three forms of identification – something they know (password or PIN), something they possess (a token or USB stick) or a physical characteristic of the user (finger swipe) in order to gain access to the data. For more sensitive data, a multi-factor approach offers an even higher degree of security. In multi-factor authentication, a user must use three or more forms of identification. For example, in addition to a password and a token, users are required to answer one or more custom questions, known only to the user.

Banks struggle to keep up as cybersecurity risks increase

Regulations will likely start rolling out in the coming year starting at the state level. In May of last year, for example, the New York State Department of Financial Services released a report which said that the agency would add cybersecurity measures to the list of items that it investigates when evaluating a bank’s overall safety and soundness. New York, and New York City in particular, is home to a huge banking industry that represents some of our nation’s largest financial institutions, including American Express, JPMorgan Chase, Goldman Sachs and Merrill Lynch. According to remarks made by NYS DFS Superintendent Benjamin Lawsky in late February, state regulations could involve the use of multi-layer authentication systems for firms regulated by the DFS.

USPTO, NIST on Front Lines of Cybersecurity Partnership

Throughout 2014, stories of major data breaches and hacking incidents have dominated the mainstream media. Customers of major corporations like Target, Home Depot, JPMorgan Chase, Bank of America and Neiman Marcus have been the targets of malware, phishing schemes and other malicious acts of cyber crime within the past year. As a result, hackers have gained access to private information pertaining to tens of millions of financial accounts…. During 2013, there were a total of 7,577 patent applications filed with the USPTO in the field of cybersecurity. The vast majority of these patent applications are coming from the United States, with the most filings coming from the states of California, New York and Texas. The top five companies filing patents within this field were IBM, Symantec, Google, Microsoft and Samsung.

Data Security Systems and the Prevention of Identy Theft

Home Depot may be the latest and largest breach to become news, but it’s certainly not the only one and hacking activity seems to be ramping up in the past few months. Malicious software known as Backoff, responsible for the Target breach, has also been identified as a potential culprit in recent breaches at Dairy Queen, Supervalu and United Parcel Service. Law enforcement officials have theorized that an Eastern European group may be responsible for a majority of these breaches because of links to Ukraine in the malware’s code… [R]ecent data breaches at major corporations have agitated some financial technology developers to look for more secure options for conducting transactions without cash. Many are touting a new wave of debit and credit cards which have microchips that improve data security as a possible answer.

How to Respond to Cyber Attacks on Your Business

Identity theft, and the various cyber attacks undertaken to accomplish this crime, are somewhat related to infringements of intellectual properties that we cover here at IPWatchdog. The top asset that any company has is their good name, and much like a trademark that has become compromised, it’s very difficult for an individual to fix misappropriation of their identity even when it’s the fault of a malicious hacker. But as deeply troubling as it is for individuals to have their identity stolen it can be equally crippling for the businesses who allow for sensitive personal information to be taken by nefarious actors. Most businesses simply cannot afford to have their good business name associated with a cyber attack.