Eversheds Sutherland Cybersecurity and Privacy Insights Blog
content top

Election Hackers Altered Voter Rolls, Stole Private Data, Officials Say

Eversheds Sutherland (US) Partner Michael Bahar is quoted in this Time Magazine providing insight on the hacking of state and local election databases in 2016. Specifically, Michael addresses key questions congressional investigators are including in their probe to determine the nature and scale of the Russian cybersecurity attack. Learn more.

Wannacry: Avoiding Being Held to Ransom

In recent weeks the disruptive power of ransomware has been displayed in the media, with the prominent strain ‘Wannacrypt’ or ‘Wannacry’ making headlines. High-profile ransomware attacks are not a new thing, last year ‘Locky’, a prolific ransomware strain, targeted 400,000 systems in its first week. Learn more.

Beware Spear Phishing Emails Sent to EDGAR Filers

Eversheds Sutherland (US) attorney Mark Thibodeaux is quoted in this ACA Insight article discussing how investment advisory firms can protect themselves from malicious emails. The article mentions how the Securities and Exchange Commission recently issued a notice as EDGAR filers have been sent phishing emails by a scammer in an attempt to illegally access their computers and networks....

Amendment to Criminal Procedure Rule 41 Impacts Data Privacy in U.S. and Abroad

On December 1, 2016, amended Rule 41 of the Federal Rules of Criminal Procedure (FRCP) went into effect, thus expanding federal law enforcement’s power to search and seize electronic data. The new rule will allow law enforcement to seek a warrant from a “magistrate judge with authority in any district where activities related to a crime may have occurred” and use that warrant to...

Major Law Firms Hacked

On March 29, 2016, it was reported that hackers infiltrated the systems of major U.S. law firms last summer, including Cravath, Swaine & Moore and Weil, Gotshal & Manges.  Federal law enforcement is investigating the hacks, which likely sought confidential information of publicly-traded companies for the purpose of insider trading. The extent to which the compromised data has...

« Older Entries Next Entries »