Cyber Crimes

News & Analysis as of

FireEye report shows PoS attacks have compromised more than 20 million cards

FireEye recently issued a report that indicates that bank card data of over 20 million individuals has been compromised since 2014. According to the report, point of sale attacks that have affected the retail and hospitality...more

Blog: European Parliament: Opinion on virtual currencies – regulation’s on its way (part 2)

The European Parliament’s Internal Market & Consumer Protection Committee has published an Opinion about virtual currencies. In the Opinion, which was prepared by rapporteur Ulrike Trebesius, the Committee calls on the...more

Phishing and Spoofing Scams — A Few Tips to Protect Yourself and Your Business

The phone rings. The caller ID says it’s your attorney’s office. When you answer, you are told you owe your attorney additional money and are directed to call a toll-free number. When you call the number, you are told how...more

What You Need To Know About The FCA’s Business Plan For 2016/17

On 5 April 2016, the UK Financial Conduct Authority (FCA) published its Business Plan for 2016/17. The Business Plan sets out a roadmap for the FCA’s principal areas of focus over the coming year. Overall, there was...more

Government Seeks Civil Forfeiture of Funds Stolen in Business E-Mail Fraud

On April 14, 2016, the U.S. Attorney for the Southern District of New York filed a civil forfeiture action seeking to recover nearly $100 million stolen from an unidentified U.S. company through a form of wire fraud or...more

Cyber Attacks Continue to Grow and Evolve

Cyber criminals continue to prey on websites with unpatched vulnerabilities and ill-protected point of sale (POS) systems to steal credentials such as personal data, credit card numbers and bank account details. Common...more

Hacker steals Norfolk Admirals customer data

A Norfolk Admirals fan notified the Admirals last week that his information was posted online. Another customer found out that her information was posted online from the service Have I been Pwned? Her son’s name and address...more

Lessons from the Bangladesh Central Bank Heist

By now, you’ve probably heard about the massive cyber attack that hit Bangladesh’s central bank last month, resulting in the loss of $81 million through fraudulent transfers to accounts in the Philippines. Although the size...more

BakerHostetler Data Security Incident Response Report: Being “Compromise Ready” Better Positions Companies to Respond to Incidents...

On March 30, 2016, we released our second annual Data Security Incident Response Report. The report analyzes data from more than 300 incidents on which the firm advised in 2015. The report looks at causes of incidents,...more

FBI’s cyber most wanted: Spotlight on Firas Dardar and Ahmed Agha

New additions to the FBI’s Cyber’s Most Wanted List show “the line between ordinary criminal hackers and potential national security threats is increasingly blurry,” according to Assistant Attorney General for National...more

How Employers Can Help Prevent W-2's From Being Breached and Their Employees From Becoming Victims of ID Theft

The Internal Revenue Service issued an alert about an emerging phishing email scheme that purports to be from company executives and requests personal information on employees. The IRS has learned this scheme – part of...more

Spear Phishing E-mail Scheme Surges For W-2 Forms

In the midst of this tax season, a number of companies have fallen victim to the latest spear phishing e-mail scheme, resulting in the unauthorized disclosure of their employees’ W-2 information and learning the hard lesson...more

Cyber prosecutions update

The feds have been busy on the cyber prosecutions front. First, on March 18, 2016, the FBI announced that a multi-agency collaborative effort blew up an identity theft ring whose leader was an inmate in a Georgia prison. The...more

FBI issues warning to law firms

The FBI has issued a Private Industry Notification to law firms indicating that a cyber crime insider trading ring is targeting “international law firm information used to facilitate business ventures.” According to the FBI...more

Chinese National Pleads Guilty To Conspiracy To Commit Cyber Theft Of Export-Controlled Technology

On March 23, 2016, U.S. law enforcement authorities announced that Su Bin, a citizen of the People's Republic of China and a resident of Canada, pleaded guilty to conspiracy to violate the Arms Export Control Act, the...more

"IRS Issues Alert on Phishing Scheme to Obtain Payroll Data"

The Internal Revenue Service (IRS) recently issued an alert regarding a phishing email scheme in which cybercriminals pose as governmental officials or company executives and request employee payroll and tax data, including...more

Latest "Ransomware" Attack Affects Hospital Data – How Secure Are Your Patient Data?

Several high-profile attacks on health insurance companies and health systems have taught us that health care entities are vulnerable to hackers, who hope to make substantial profit on pilfered health information. The recent...more

Your daily dose of financial news The Brief – 3.18.16

The Fed’s patience on rate hikes coupled with surging commodities prices (including oil over $40/barrel for the first time since December) helped push the Dow into positive territory for the year – WSJ... So apparently...more

Cyber Crime in Higher Education

With each passing year, higher education becomes a more vulnerable target of cybercrime. Symantec’s 2015 Internet Security Threat Report indicates that education is the third most frequently breached of the public or private...more

New Take on Old Phishing Scam Wreaking Havoc on HR Departments

From would-be Nigerian princes to foreign lottery officials, cybercriminals have been known to assume all sorts of false identities to carry out email phishing scams that trick unsuspecting consumers into clicking on...more

President’s Cybersecurity National Action Plan Seeks to Leverage Private Sector Expertise for Federal Advancement

As stated by Wired, “It’s all the standard advice you’d give a tech novice,” aptly sums up the White House’s Cybersecurity National Action Plan (CNAP) that President Obama unveiled on February 9, 2016. Announced as part of...more

Testing the Limits – Cyber Coverage Litigation Update

The growing percentage of businesses that purchase cyber security and data privacy insurance portends a growing number of claims and, inevitably, litigation over some of those claims. Wells Fargo’s 2015 Cyber Security and...more

Nearly 50 Million Records Breached in California Since 2012

Earlier this month, the California Attorney General’s Office released the 2016 Data Breach Report covering years 2012 through 2015 for the State of California (the “AG’s Report”). The AG’s Report reveals that 557 data...more

New malware steals banking credentials and holds data ransom

Researchers at Palo Alto Networks have reported that malware dubbed Xbot is targeting devices in Australia and Russia but predict that the malware may become widespread. It is particularly worrisome as it attacks...more

Can Ransomware Trap Your Health Information? OCR Highlights the Risk of Cyber Extortion in its Cyber-Awareness Initiative

The U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) has been highlighting the threat posed by “ransomware”—when an organization is locked out of its own systems and files by cyber criminals who...more

325 Results
|
View per page
Page: of 13
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×