<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Privacy Risk Report &#187; hackers</title>
	<atom:link href="https://privacyriskreport.com/tag/hackers/feed/" rel="self" type="application/rss+xml" />
	<link>https://privacyriskreport.com</link>
	<description></description>
	<lastBuildDate>Fri, 03 Feb 2023 16:49:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>First Class Hack: Researcher Claims Airplane In-Flight Entertainment Systems Give Path to Flight Controls</title>
		<link>https://privacyriskreport.com/first-class-hack-researcher-claims-airplane-in-flight-entertainment-systems-give-path-to-flight-controls-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=first-class-hack-researcher-claims-airplane-in-flight-entertainment-systems-give-path-to-flight-controls-2</link>
		<comments>https://privacyriskreport.com/first-class-hack-researcher-claims-airplane-in-flight-entertainment-systems-give-path-to-flight-controls-2/#comments</comments>
		<pubDate>Thu, 22 Dec 2016 18:18:40 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[policy]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1056</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/first-class-hack-researcher-claims-airplane-in-flight-entertainment-systems-give-path-to-flight-controls-2/' data-emailit-title='First Class Hack: Researcher Claims Airplane In-Flight Entertainment Systems Give Path to Flight Controls'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>To overcome his anxiety with flying, IOActive’s researcher/author, Ruben Santamarta, began “spending some flights hacking stuff.” In his December 20, 2016 blog post, “In Flight Hacking Systems,” Santamarta describes how he  tried to gain a better understanding of the In-Flight Entertainment... <a class="more-link" href="https://privacyriskreport.com/first-class-hack-researcher-claims-airplane-in-flight-entertainment-systems-give-path-to-flight-controls-2/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/first-class-hack-researcher-claims-airplane-in-flight-entertainment-systems-give-path-to-flight-controls-2/' data-emailit-title='First Class Hack: Researcher Claims Airplane In-Flight Entertainment Systems Give Path to Flight Controls'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/first-class-hack-researcher-claims-airplane-in-flight-entertainment-systems-give-path-to-flight-controls-2/">First Class Hack: Researcher Claims Airplane In-Flight Entertainment Systems Give Path to Flight Controls</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/first-class-hack-researcher-claims-airplane-in-flight-entertainment-systems-give-path-to-flight-controls-2/' data-emailit-title='First Class Hack: Researcher Claims Airplane In-Flight Entertainment Systems Give Path to Flight Controls'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>To overcome his anxiety with flying, IOActive’s researcher/author, Ruben Santamarta, began “spending some flights hacking stuff.” In his December 20, 2016 blog post, “<a href="http://blog.ioactive.com/2016/12/in-flight-hacking-system.html">In Flight Hacking Systems</a>,” Santamarta describes how he  tried to gain a better understanding of the In-Flight Entertainment Systems (IFE) manufactured by Panasonic Avionics and installed in major airline carriers such as Virgin, KLM and American Airlines. After learning how the IFE operates, <a href="http://www.telegraph.co.uk/technology/2016/12/20/hackers-could-take-control-plane-using-in-flight-entertainment/">other reports </a>indicate Santamarta was able “to hijack in-flight displays to change information such as altitude and location, control cabin lighting and hack into the announcements systems.” Santamarta also claimed he could access the credit card information of frequent flyers’ information stored in the in-flight automatic payment system.</p>
<p>Santamarta’s hacking activities prompt the question of whether he could have hacked the aircraft controls using the IFE as “an attack vector.” Santamarta claims that, depending on the hacker’s abilities, it would be “totally feasible” to take over an aircraft’s controls using the IFE systems as an access point. Santamarta advises airlines to isolate or segregate systems controlling airplane from the IFE systems.</p>
<p>Santamarta’s blog post indicates that many commercial aircraft’s networks are divided into the following “four domains” based on the type of data they handle:  (1) passenger entertainment; (2) passenger owned devices;  (3) airline information services; and (4) aircraft control. Based on his findings, Santamarta believes the best solution to reduce the chances that hackers take control over an aircraft’s controls involves physically isolating these systems from each other; “this means that as long as there is a physical path that connects both domains, we can’t disregard the potential for attack.”</p>
<p>Santamarta concludes the blog post with the following advice, “the responsibility for security does not solely rests with an IFE manufacturer, an aircraft manufacturer or the fleet operator. Each plays an important role in assuring a secure environment.”</p>
<p>In its December 20, 2016 statement, Panasonic disagreed with Santamarta’s findings and has called them “inaccurate and misleading” and further claims the blog post “mixed hypothetical vulnerabilities with specifics about Panasonic’s systems to come up with its results.” Panasonic’s statement also <a href="http://www.ctvnews.ca/sci-tech/in-flight-entertainment-hack-panasonic-rejects-cybersecurity-report-1.3211221" target="_blank">rejects the portion of the report</a> stating that access can be gained to credit card information. Panasonic further offered the reminder that hackers could be criminally charged for trying to access any system on an aircraft.</p>
<p>Regardless of whether Santamarta or Panasonic are correct about the security of IFE systems, Santamarta’s point that the various systems of the aircraft should be completely isolated from each other cannot be overlooked. While common sense tells us that we should not keep the crown jewels in the garage with the gardening tools, it is easy to abandon this common sense approach when it comes to cyber security. In the same way you don’t want the IFE systems providing “an attack vector” to get to an aircraft’s controls, our businesses and homes should not only try to completely avoid a cyber incident, but should limit the amount of damage if a cyber incident takes place.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/first-class-hack-researcher-claims-airplane-in-flight-entertainment-systems-give-path-to-flight-controls-2/' data-emailit-title='First Class Hack: Researcher Claims Airplane In-Flight Entertainment Systems Give Path to Flight Controls'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/first-class-hack-researcher-claims-airplane-in-flight-entertainment-systems-give-path-to-flight-controls-2/">First Class Hack: Researcher Claims Airplane In-Flight Entertainment Systems Give Path to Flight Controls</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/first-class-hack-researcher-claims-airplane-in-flight-entertainment-systems-give-path-to-flight-controls-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Failure to Redact Personal Information from Court Document Does Not Result in Private Cause of Action</title>
		<link>https://privacyriskreport.com/failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action</link>
		<comments>https://privacyriskreport.com/failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action/#comments</comments>
		<pubDate>Mon, 24 Oct 2016 18:12:18 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyber litigation]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[private cause of action]]></category>
		<category><![CDATA[Target]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=972</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action/' data-emailit-title='Failure to Redact Personal Information from Court Document Does Not Result in Private Cause of Action'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>In August 2015, Privacy Risk Report published a post regarding Target sealing its documents associated to the massive 2013 data breach in order to protect itself from hackers. Target contended that if documents related to its data breach litigation were filed... <a class="more-link" href="https://privacyriskreport.com/failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action/' data-emailit-title='Failure to Redact Personal Information from Court Document Does Not Result in Private Cause of Action'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action/">Failure to Redact Personal Information from Court Document Does Not Result in Private Cause of Action</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action/' data-emailit-title='Failure to Redact Personal Information from Court Document Does Not Result in Private Cause of Action'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>In August 2015, <em>Privacy Risk Report</em> published a post regarding <a href="https://privacyriskreport.com/target-litigation-reveals-concern-hackers-may-use-court-documents-to-gain-information/" target="_blank">Target sealing its documents</a> associated to the massive 2013 data breach in order to protect itself from hackers. Target contended that if documents related to its data breach litigation were filed unsealed, there was a chance that hackers would have access to “detailed information about Target’s IT infrastructure, Target’s information security controls, and information about Target’s information security policies and procedures.” Following Target’s lead, there is more litigation stemming from the inadvertent disclosure of private information on a court’s online website.</p>
<p>In its October 18, 2016, decision, a court in <a href="https://privacyriskreport.com/wp-content/uploads/2016/10/Memo_McCoy_Fisher.pdf" target="_blank"><em>McCoy v. Fisher</em></a> dismissed a plaintiff’s complaint against a law firm that failed to redact personal information in a court document that ended up on the court’s website for a short time. In April 2015, defendants Jeffrey B. Fisher and The Fisher Law Group (Fisher Law), initiated a foreclosure action against plaintiffs Antonio McCoy and his former wife after they defaulted on their Maryland home loan. During the foreclosure action, Fisher Law filed a document that McCoy claimed included his loan number and his social security number. In May 2015, Fisher Law sent McCoy a letter notifying him of the inadvertent disclosure of personal information and further stated that the unredacted documents may have included McCoy’s loan number and his social security number.</p>
<p>As is the case in many jurisdictions, Maryland Rule 1-322.1 states, “the filer of any paper or electronic filing with a Maryland court must redact or omit certain ‘personal identifier information’ from the document before it is filed, including an individual’s social security number.”</p>
<p>On February 4, 2016, McCoy, a <em>pro se</em> litigant, filed his complaint seeking recovery under the Gramm-Leach-Bliley Act for the alleged disclosure of private information, the Ninth Amendment of the U.S. Constitution and negligence theories.</p>
<p>In its motion to dismiss, Fisher Law argued first that McCoy failed to establish he had standing to bring the action. Specifically, Fisher Law asserted McCoy’s action should be dismissed because McCoy merely claimed he could be the victim of identity theft in the future. And, <a href="https://privacyriskreport.com/seventh-circuit-weighs-in-on-article-iii-standing-for-data-breach-plaintiffs/">as seen on a number of other occasions</a>,  under the <em>Clapper </em>decision, the U.S. Supreme Court has held that “standing must be based on the ‘substantial risk’ that harm will occur, so long as the future injury is ‘certainly impending.’” That is, “allegations of ‘possible future injury’ are not sufficient” to sustain a cause of action.</p>
<p>While the <em>McCoy</em> court found it had no controlling law in the 4th U.S. Circuit Court of Appeals on this standing issue, it relied on the holding in <a href="https://privacyriskreport.com/spokeo-decision-already-having-concrete-impact-on-data-breach-class-action-litigation/" target="_blank"><em>Khan v. Children’s Nat’l Health Sys</em>.</a>, where the court found the named plaintiff could not prove injury in fact because the plaintiff failed to allege “facts indicating that the hackers have attempted to engage in any misuse of [the hospital] patients’ personal information since the breach was discovered.” In <em>Khan</em>, the court held “the mere loss of data—without any evidence that it has been either viewed or misused—does not constitute any injury sufficient to confer standing.”</p>
<p>In dismissing the complaint, the <em>McCoy</em> court found McCoy’s claims of future injuries to be speculative at best. “At most, Plaintiff alleges that his information was accidentally made publicly available for a period of time, introducing the risk that a bad actor <em>could</em> obtain such information.” The <em>McCoy</em> court found no evidence that McCoy’s information was accessed or misused during the six days it was viewable by the public on PACER, the court’s online website.</p>
<p>There should be no doubt that the potential use of information found in documents maintained on court websites by criminals should be a concern. Consequently, Target’s argument to file documents under seal to protect private information from hackers may be justified in certain situations. However, the <em>McCoy</em> decision demonstrates that when private information inadvertently ends up on court websites, a person will need to meet the same standards as any litigant in a data breach case. That is, a litigant will need to demonstrate that harm was done by the disclosure with more than speculation.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action/' data-emailit-title='Failure to Redact Personal Information from Court Document Does Not Result in Private Cause of Action'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action/">Failure to Redact Personal Information from Court Document Does Not Result in Private Cause of Action</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/failure-to-redact-personal-information-from-court-document-does-not-result-in-private-cause-of-action/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Home Is Where the Hacker Is: Cyber Coverage Becoming Necessary for Homeowners</title>
		<link>https://privacyriskreport.com/home-is-where-the-hacker-is-cyber-coverage-becoming-necessary-for-homeowners/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=home-is-where-the-hacker-is-cyber-coverage-becoming-necessary-for-homeowners</link>
		<comments>https://privacyriskreport.com/home-is-where-the-hacker-is-cyber-coverage-becoming-necessary-for-homeowners/#comments</comments>
		<pubDate>Thu, 16 Jun 2016 16:55:00 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[insurance claims]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=797</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/home-is-where-the-hacker-is-cyber-coverage-becoming-necessary-for-homeowners/' data-emailit-title='Home Is Where the Hacker Is: Cyber Coverage Becoming Necessary for Homeowners'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>There has been significant discussion since 2015 on how the “internet of things” is expected to impact our daily life, including our homes. In general, the term “internet of things” (IoT) refers to a network of “smart” devices found in... <a class="more-link" href="https://privacyriskreport.com/home-is-where-the-hacker-is-cyber-coverage-becoming-necessary-for-homeowners/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/home-is-where-the-hacker-is-cyber-coverage-becoming-necessary-for-homeowners/' data-emailit-title='Home Is Where the Hacker Is: Cyber Coverage Becoming Necessary for Homeowners'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/home-is-where-the-hacker-is-cyber-coverage-becoming-necessary-for-homeowners/">Home Is Where the Hacker Is: Cyber Coverage Becoming Necessary for Homeowners</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/home-is-where-the-hacker-is-cyber-coverage-becoming-necessary-for-homeowners/' data-emailit-title='Home Is Where the Hacker Is: Cyber Coverage Becoming Necessary for Homeowners'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>There has been significant discussion since 2015 on how the <a href="https://privacyriskreport.com/privacy-concerns-grow-as-smart-appliances-provide-voluntary-and-involuntary-access-to-our-homes/">“internet of things”</a> is expected to impact our daily life, including our homes. In general, the term “internet of things” (IoT) refers to a network of “smart” devices found in the typical home that collect and exchange data over the internet. However, despite the risks posed by the IoT and the integration of technology into our homes, there has been little discussion of  insurance policies that are available to homeowners or renters to provide coverage for these claims.</p>
<p>In 2016, the IoT became an emerging issue for cyber security claims under <a href="https://privacyriskreport.com/first-party-insurance-claims-related-to-the-internet-of-things-an-emerging-issue-for-2016/">first-party insurance policies</a>:</p>
<p><em>As the IoT becomes more ingrained in our homes and business, we can expect insurance coverage issues to continue to flourish. The vast majority of these issues caused by the IoT will raise questions under first-party insurance policies. Consequently, we anticipate cyber security and first-party insurance coverage to be an emerging trend in 2016.</em></p>
<p>In addition to issues caused by the IoT, homeowners and renters face many of the same risks corporations and governments face including malware attacks, online fraud and data breaches of valuable information. It is also clear that hackers are no longer focused solely on large corporate and government targets. Less sophisticated hackers will search for <a href="https://privacyriskreport.com/recent-data-breach-at-chicago-parking-garages-shows-us-the-danger-when-hackers-seek-smaller-targets/">smaller and less sophisticated targets</a>, finding a windfall in homes and residences.</p>
<p>These recent developments in cyber security make the idea of having personal cyber insurance valuable to homeowners and renters. Therefore, it was only a matter of time before insurers started to market cyber coverage directly to homeowners and renters.</p>
<p>On June 14, 2016, Hartford Steam Boiler Inspection and Insurance Company (HSB) announced that it was offering what it billed as “<a href="http://www.businesswire.com/news/home/20160614005922/en/HSB-Introduces-Cyber-Insurance-Consumers">the first personal lines cyber insurance program for consumers</a>.” This new product is offered to homeowners and renters, along with family members living in the household, to protect against a variety of issues generally related to cyber security. In particular, HSB’s press release states its new “Home Cyber Coverage” policy provides homeowners with the following coverage:</p>
<ul>
<li>“Computer Attack to remove malware and reprogram computers and tablets, Wi-Fi routers or other Internet access points.”</li>
<li>“Home Systems Attack restores devices connected to the Internet, including smart phones, thermostats, smart appliances and security and monitoring systems.”</li>
<li>“Cyber Extortion with professional assistance on how to respond to a ransomware attack and payment of ransom when approved.”</li>
<li>“Data Breach including forensic IT and legal reviews, notification and recovery services when private non-business data entrusted to an individual is lost, stolen or published.</li>
<li>“Online Fraud for losses due to identity theft, phishing schemes, illegal bank and credit card transfers, forgery, counterfeit currency, and other deceptions.”</li>
</ul>
<p>The HSB policy does not provide coverage for cyber bullying, but <a href="https://privacyriskreport.com/the-rise-of-ransomware-and-cyberbullying-insurance/">other insurers</a> have been offering this coverage to homeowners.</p>
<p>While the IoT has received substantial publicity recently, discussion about these claims and insurance for these claims will likely go through a similar evolution as was the case with cyber insurance for corporate and <a href="https://privacyriskreport.com/new-survey-indicates-statelocal-governments-have-different-cybersecurity-concerns-than-the-federal-government/">governmental bodies</a>. Homeowners will likely question whether <a href="https://privacyriskreport.com/the-upward-trend-in-cyberliability-insurance/">cyber insurance is valuable</a> until eventually concluding that this coverage has merit. As this evolution takes place, homeowners and renters are likely to see more cyber coverage products developed in this market space in the coming years.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/home-is-where-the-hacker-is-cyber-coverage-becoming-necessary-for-homeowners/' data-emailit-title='Home Is Where the Hacker Is: Cyber Coverage Becoming Necessary for Homeowners'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/home-is-where-the-hacker-is-cyber-coverage-becoming-necessary-for-homeowners/">Home Is Where the Hacker Is: Cyber Coverage Becoming Necessary for Homeowners</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/home-is-where-the-hacker-is-cyber-coverage-becoming-necessary-for-homeowners/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Law Firms&#8217; Work Product Has No Privileges Against Hackers</title>
		<link>https://privacyriskreport.com/law-firms-work-product-has-no-privileges-against-hackers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=law-firms-work-product-has-no-privileges-against-hackers</link>
		<comments>https://privacyriskreport.com/law-firms-work-product-has-no-privileges-against-hackers/#comments</comments>
		<pubDate>Mon, 25 Apr 2016 20:37:14 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyber claims]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[law firm]]></category>
		<category><![CDATA[law firms]]></category>
		<category><![CDATA[panama papers]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=706</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/law-firms-work-product-has-no-privileges-against-hackers/' data-emailit-title='Law Firms&#8217; Work Product Has No Privileges Against Hackers'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>It appears that large retailers and hospitals are no longer the only targets for hackers as evidenced by the hack at the Panamanian law firm, Mossack Fonseca, generally referred to as the “Panama Papers.” While the identity of the hackers is... <a class="more-link" href="https://privacyriskreport.com/law-firms-work-product-has-no-privileges-against-hackers/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/law-firms-work-product-has-no-privileges-against-hackers/' data-emailit-title='Law Firms&#8217; Work Product Has No Privileges Against Hackers'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/law-firms-work-product-has-no-privileges-against-hackers/">Law Firms&#8217; Work Product Has No Privileges Against Hackers</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/law-firms-work-product-has-no-privileges-against-hackers/' data-emailit-title='Law Firms&#8217; Work Product Has No Privileges Against Hackers'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>It appears that large retailers and hospitals are no longer the only targets for hackers as evidenced by the hack at the Panamanian law firm, Mossack Fonseca, generally referred to as the “<span style="color: #1f497d;"><a href="http://www.forbes.com/sites#/sites/luisakroll/2016/04/03/billionaires-former-billionaires-outed-for-offshore-wealth-by-the-panama-papers/">Panama Papers</a>.</span>” While the identity of the hackers is still unknown, the extent of these crimes is starting to be fully realized. Reports <a href="http://www.forbes.com/sites/jasonbloomberg/2016/04/21/cybersecurity-lessons-learned-from-panama-papers-breach/" target="_blank">indicate the hackers took millions of documents,</a> including emails belonging to the law firm’s clients. There has already been substantial fallout from this hack including the <a href="http://www.usatoday.com/story/news/world/2016/04/05/panama-papers-icelands-leader-may-ready-resign/82645064/" target="_blank">resignation of Iceland<span style="color: #1f497d;">’</span>s prime minister </a>and <a href="http://www.reuters.com/article/us-pakistan-politics-idUSKCN0XL0A0">uncertainty for a number of other world leaders</a>.</p>
<p>Perhaps the most startling fact about this crime is the lack of sophistication needed to steal sensitive client information. The combination of outdated safeguards and highly-sensitive information provide<span style="color: #1f497d;">s</span> a ripe target for hackers. Specifically, commentators believe this attack originated when the law firm failed to update its web servers:</p>
<p style="margin-left: .5in;"><em>The fact that Mossack Fonseca’s web servers were many months out of date was particularly egregious, especially considering the sensitivity of their clients’ information. “They seem to have been caught in a time warp,”</em> <em>says Alan Woodward, a cybersecurity expert from University of Surrey and consultant to Europol’s European Cybercrime Centre. “If I were a client of theirs I’d be very concerned that they were communicating using such outdated technology.”</em></p>
<p>In addition to the “Panama Papers” incident, there should be little question law firms hackers are looking to exploit vulnerability at law firms. It has recently come to light that <a href="http://www.abajournal.com/news/article/posts_on_cyber_criminal_forum_outline_plans_for_law_firm_hack_attacks_seeki" target="_blank">hackers have launched “phishing” attacks </a>aimed at law firm employees and personnel. In an attempt to gain access to documents related to corporate mergers, authorities recently learned of a scheme offering to pay hackers $100,000 in addition to half the profits of the first $1 million taken from law firms. In particular, after gaining access to law firm networks, the hackers were instructed to conduct key word searches to find documents related to pending mergers or other transactions that the hackers could use to turn a profit.</p>
<p>In response to this scheme, the <a href="http://www.americanbar.org/groups/leadership/office_of_the_president/cybersecurity.html" target="_blank">FBI recently issued an alert through the American Bar Association </a>warning law firms of this threat. The FBI alert describes the scheme as follows:</p>
<p style="margin-left: .5in;"><em>A financially motivated cyber crime insider trading scheme targets international law firm information used to facilitate business ventures. The scheme involves a hacker compromising the law firm’s computer networks and monitoring them for material, non-public information (MNPI). This information, gained prior to a public announcement, is then used by a criminal with international stock market expertise to strategically place bids and generate a monetary profit.</em></p>
<p>The evolution of the hacker threat from large (highly secured) targets to smaller (lacking security) targets has not been a surprise. What has been surprising is the fact that the smaller targets did not see the threat evolve to put them in the crosshairs. Further, the fact that a number of international law firms have found themselves to be targets demonstrates difficulties in protecting against hackers. The threat to law firms should also provide insight to accounting firms, real estate brokers and any other smaller operation about the value of cyber security.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/law-firms-work-product-has-no-privileges-against-hackers/' data-emailit-title='Law Firms&#8217; Work Product Has No Privileges Against Hackers'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/law-firms-work-product-has-no-privileges-against-hackers/">Law Firms&#8217; Work Product Has No Privileges Against Hackers</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/law-firms-work-product-has-no-privileges-against-hackers/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
