Eversheds Sutherland Cybersecurity and Privacy Insights Blog
content top

Videocast: Data manipulation–an overview

The next generation of cyber threats—data manipulation attacks—is already here. Increasingly, organizations need not only protect their data from theft and ransomware, but also from subtle changes designed to disrupt, embarrass, extort or even undermine the integrity of systems, companies and institutions. Organizations therefore should consider getting out ahead of this new form of...

Indictment in Massive Iranian Cyberbreach Shows Companies Still Vulnerable

If general counsel fear their companies are vulnerable to cyberattacks from far afield, they have good reason. An indictment unsealed Friday details how hackers hired by the Iranian government broke into computer systems of at least 36 U.S. companies, including technology firms, banks, media companies and a law firm. Learn...

Today’s cybersecurity strategies are “not sufficiently robust or scalable,” Nuclear Threat Initiative says

The cyber threat to nuclear facilities is serious, but the challenge going forward is evident,” Dr. Page Stoutland, NTI vice president of scientific and technicals affairs, said in the post. “Threats and vulnerabilities will continue to mount. Today’s strategy is not sufficiently robust or scalable, and a high level of cybersecurity may never be compatible with current nuclear plant...

Helping it click into place – Our monthly Asia cybersecurity update

During 2017, cyberattacks continued to evolve and develop sophistication, exploiting both previously unidentified vulnerabilities and known vulnerabilities in new ways. Ransomware attacks such as Petya and WannaCry put critical functions across the world and across industries on hold, while the Mirai botnet attack, unleashed in late 2016, highlighted the increasing vulnerabilities of...

Cyber Attacks on U.S. Power Grids Can Be Deterred With Password Changes

A key to preventing cyber attacks from crippling U.S. power grids could be changing passwords on internet routers, wifi-connected thermostats and smart lawn-sprinklers. “A significant share” of internet attacks result from unchanged factory default passwords on web-connected devices that allow hackers to break in and and install malware, according to a Jan. 18 report by the Advanced...

« Older Entries