In the age of targeted intrusions, sophisticated criminal and nation-state actors are often compromising hundreds of systems within a single company’s environment. However, companies are often only seeing a small portion of the entire incident, as their response to such invasions can be, and often is, too narrowly shaped by state security breach notification requirements, […]
Uncategorized
FTC Updates Advertising Disclosure Guidelines to Address Online and Mobile Environment
The FTC recently released an update to its 2000 report, “Dot Com Disclosures” offering further guidance on effective disclosures for advertising in digital media. The FTC instructed advertisers to adopt the perspective of a reasonable consumer, and should assume consumers do not read the entire website or screen, just as they don’t read every word […]
U.S. Secret Service Issues Advisory on Attacks Targeting Prepaid Debit Account Payment Processors
After observing a noticeable increase in sophisticated attacks targeting payment processors of prepaid debit accounts in which criminals are able to manipulate balances of accounts and/or fraud prevention controls, the United States Secret Service released an Industry Advisory on March 15, 2013. The Advisory outlines several “macro” and “prepaid platform specific” strategies that payment processers […]
Article 29 Working Party Advises App Developers and Others Distributing Mobile Apps On Consent
The European Community’s Article 29 Working Party has just published an opinion on smartphone apps that discusses the obligations of app developers and all other parties involved in the development and distribution of apps under European data protection law. Among the Working Party’s recommendations is that free and informed consent of end users is essential for […]
Kim Peretti Interviewed by BankInfoSecurity About her Discussion at the 2013 RSA Conference
On February 27, Alston & Bird’s Kim Peretti spoke at the 2013 RSA conference. Following the conference, Kim was interviewed by BankInfoSecurity about her discussion during the conference. In the video interview entitled, “Tips and Tools for Breach Investigations,” Peretti discusses: Areas most frequently overlooked; Lessons learned from recent investigations; Technology tools to aid investigators. To […]