News & Analysis as of

Cyber Crimes

Privacy Perils: Hackers Breach Instagram User Accounts

by Bass, Berry & Sims PLC on

Engineers at Instagram have revealed that hackers managed to gain access to the contact numbers and email addresses (but not passwords) of some of Instagram's users via a bug in the app's API (Application Programming...more

Not So Entertaining: Cybercrime In The Entertainment Industry

by Jackson Lewis P.C. on

Although certain industries are known targets for cyber attacks – healthcare, financial, government – cyber attacks pose a threat to all sectors. Organizations in the entertainment industry have increasingly become targets of...more

Massachusetts Lawmakers Turn Attention to Cybersecurity

by Mintz Levin on

In the wake of growing concerns about data privacy and cyber threats, Massachusetts lawmakers are increasingly focused on evaluating and improving the state’s cybersecurity policies and information technology infrastructure....more

Cyber Crime Pays! Different Attacks Have Different Values

by Miles & Stockbridge P.C. on

Cisco’s midyear report showed that CEO fraud netted cybercrime five times more money than ransomware over the last three years. CEO fraud is a scam in which cybercriminals spoof company e-mail accounts and impersonate...more

D.C. Circuit Holds Cyber-Theft of Customers’ Medical Identifying Information Created Sufficient Increased Risk of Harm to...

Earlier this month, an appellate panel of the federal DC Circuit unanimously held that individuals affected by a healthcare insurer’s data breach in 2014 could pursue claims against the insurer stemming from the cyberattack....more

Privacy Perils: Calamity Con Men

by Bass, Berry & Sims PLC on

It is a sad fact of life that no misfortune is so bad that someone won't try to take advantage of it. Our hearts go out to the victims of Hurricane Harvey, and our gratitude to those offering help to those affected by the...more

Phishing in Flood Waters: Avoiding Hurricane Harvey Cyber Risks

by Jackson Walker on

Unfortunately, it is common for cyber criminals to capitalize on natural disasters. The Department of Homeland Security (“DHS”) warns users to exercise caution in handling any email with subject line, attachments, or...more

Navy Investigating Whether Ship Collision Resulted from Cyber-Attack

The United States Navy is investigating whether the recent collision of the USS John S. McCain with a Liberian tanker off Singapore may have been caused by a cyber-attack....more

Five Coverage Tips from Recent E-mail Scam Insurance Decisions

by Orrick - Trust Anchor on

The number of decisions considering claims for insurance coverage resulting from Business Email Compromise (“BEC”) scams has been increasing, providing policyholders with some hope, and some clarity, in this muddy area....more

District Courts Buck Trend on Fidelity Coverage for Social Engineering and Business Email Compromise Schemes

by Carlton Fields on

The FBI continues to warn that losses are on the rise from business email compromise (BEC) or “social engineering” schemes, which the Bureau describes as: Carried out by transnational criminal organizations that employ...more

Avoiding Management Struggles When it Comes to Data Breaches: Part 4

by Bryan Cave on

The best way for a company to handle a data breach is to be prepared. As we discuss in our data breach readiness handbook, preparation includes, among other things, drafting an incident response plan, reviewing...more

Follow the Money and Beware the Extra “L”: First Department Sustains Claims against Fund Administrator After Hackers Grab Millions

A legal feud is underway between the world’s biggest hedge fund administrator and a former client over an email scam that resulted in hackers stealing millions in client funds. And not surprisingly, the time-honored...more

Court Holds Crime Policy Covers Business Compromise Email Loss

The “business compromise email” is what the FBI calls the “$5 billion scam,” but apparently an insurance company did not agree with an insured company that they had been the victim of a crime....more

At the Intersection of Cybersecurity and White Collar

by Blank Rome LLP on

The global "ransomware" cyberattack in early May 2017 resulted in tens of thousands of computer systems being taken hostage by hackers and, in the instances involving hospitals, put lives at risk. Companies that suffered...more

Privacy Tip #97 – Send Your Kid to Cyber Camp This Summer

I have lamented repeatedly that we have a dearth of cyber talent in the U.S. to meet the needs of employers. Many of our clients recruit talent from other countries in order to meet their cyber needs. The need continues to...more

Ashley Madison Settles Data Breach Case for $11.2M

Ashley Madison, which suffered a data breach in 2015 involving the loss of 37 million users’ personal and financial information, has settled the suit for $11.2 million....more

Buyout Firms Must Take Action to Respond to Global Cyber Threats

by Latham & Watkins LLP on

Cybercrime has become a critical issue for buyout firms as hackers are increasingly targeting sensitive business data to profit from insider knowledge. According to a Private Funds Management survey of 91 PE houses, 54% of PE...more

Cyber Threats Equal Serious Threats

by Burr & Forman on

Every where you look these days, there seems to be another report of a cyber attack--attacks which do not discriminate based on industry type, size of business, or impact. In other words, everyone is vulnerable. In fact, the...more

Three Million Wrestling Fans’ Data Compromised

World Wrestling Entertainment, Inc. (WWE) has announced that it is investigating a “vulnerability of [a] database” containing over three million users’ names, addresses, email addresses, dates of birth, educational...more

House Spending Bill for Homeland Security Heavy on Border Wall, Enforcement, and Deportation

On Tuesday, July 11, the House Appropriations Committee released a spending bill for the Department of Homeland Security (DHS). It features increases in spending to both the Customs and Border Patrol (CBP) and Immigration and...more

Ransomware is taking the world by storm; does insurance respond?

On June 27, 2017, the world had its second major ransomware attack in two months, and experts are predicting more to come. The first, named WannaCry, began May 12, and quickly spread to over 400,000 machines, the vast...more

Senate Passes Russia and Iran Sanctions Legislation

by Bass, Berry & Sims PLC on

On June 19, 2017, the U.S. Senate overwhelmingly passed a bill mandating sanctions against Russia and Iran and a 30-day congressional review period should the president attempt to reduce those sanctions....more

Data Breach Disruptions: The Cost of Cybercrime in Canada

News about malicious cyber-attacks have been flooding media outlets in recent weeks as high-profile viruses (including WannaCry and Petya) continue to hit leading global and Canadian companies. What’s the cost here at home?...more

Authorities Investigating Cyber Intrusion of Numerous U.S. Nuclear Power Plants

It’s scary to think about, but anything that is online is hackable. Including critical infrastructure like nuclear power plants. It has been reported that U.S. authorities are investigating a cyber intrusion that has hit...more

Alabama Man Sentenced to Prison for Elaborate “Phishing” Scheme

by Balch & Bingham LLP on

An Alabama man has been sentenced to spend six months in prison for illegally accessing the personal information of over fifty women. For over two years, Kevin Maldonado engaged in a hacking technique called “phishing,”...more

563 Results
|
View per page
Page: of 23
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.