Cyber Crimes

News & Analysis as of

Cyber Activities Added to the OFAC Target List – How do you ensure you are compliant?

In December of 2015 the Department of the Treasury’s Office of Foreign Assets Control (“OFAC”) issued regulations implementing the President’s April 1, 2015 Executive Order (“EO”), “Blocking the Property of Certain Persons...more

Rise in Cyberattacks on Professional Services Firms

Wilson Elser’s Cyber Incident Response Team has seen an alarming uptick in cyber-criminal activity targeted at professional services firms, particularly accounting firms. As described in more detail below, the criminal...more

FinCrimes Update: December 2015 Summary, Volume 2, Issue 10

AML/BSA & OFAC: OFAC PUBLISHES CYBER-RELATED SANCTIONS REGULATIONS - On December 31, OFAC issued regulations to implement Executive Order 13694 of April 1, 2015, “Blocking the Property of Certain Persons Engaging in...more

Stealing Bases Okay; Stealing Data Not So Much

On January 8, 2016, Christopher Correa, the former director of Baseball Development for the St. Louis Cardinals, pleaded guilty to each count of a five-count criminal information, charging him with felony violations of...more

OFAC Publishes Cyber-Related Sanctions Regulations

On December 31, OFAC issued regulations to implement Executive Order 13694 of April 1, 2015, “Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities.” Effective immediately, the...more

How Can That Not Be Covered? I Have Cyber Insurance! - Failing to negotiate coverage enhancements can leave huge holes in your...

In the past few years, many companies have purchased cyber liability insurance to help cover their risk of computer fraud or attack. However, if not properly negotiated, some cyber insurance policies may not fully protect...more

News of Note for the Internet-Minded – 12/17/15

Stories of interest this week include a developers showcase for the HoloLens, robots able to feel textures like humans, a cool billion invested in AI, and more. Giroptic is building a GoPro for virtual reality. MIT app lets...more

Cybersecurity and resiliency: The Financial Sector’s “New Frontier”

“The Internet has a dark side,” Deputy Treasury Secretary Sarah Bloom Raskin remarked while addressing senior level banking executives at this year’s Clearing House Annual Conference. Raskin focused her comments on malicious...more

Human Error Called The Most Common Factor In Data Breaches

As reported in the December 9, 2015 Wall Street Journal Law Blog, a recent report by the Association of Corporate Counsel (“ACC”) revealed that the most common reason for a data breach at companies is “employee error.” ...more

Safeguard Your Finances From Online Threats

Cybercrime is among the top concerns today for our business clients, but limiting the risk of identity theft should be a topic you consider at home and with your family, as well as in the boardroom. This article will provide...more

Obscured by the Cloud? Advanced Instructional Systems and the Scourge of Online IP Theft

The conveniences of cloud computing are many, but so are the dangers of doing business in the cloud. For businesses whose intellectual property is accessible in the cloud, there is the constant threat that that intellectual...more

Five Questions with Tom Vincent

Why did GableGotwals create a cybersecurity practice group? Information has become much more accessible and transportable — essentially, more vulnerable — over just the past few years. This increased vulnerability has...more

House Establishes Institute to Formalize its Seven-Year Fight Against Cybercrime

On the fourteenth anniversary of 9-11, H.R. 3490—the Strengthening State and Local Cyber Crime Fighting Act—was introduced in the U.S. House of Representatives. On Monday, November 30, 2015, it passed with an overwhelming...more

Social Engineering Losses—Embarrassing Scam or Insured Loss?

The term Social Engineering keeps cropping up recently in the new world of cybersecurity—to what does this term refer? To a scam as old as the hills. You know the con: an innocuous person asks you to accept a cashier’s...more

Breaches, Damned Breaches and Their Statistics

Interesting conclusions about data breach costs emerge from two new studies, the 2015 Ponemon Institute’s Cost of Cyber Crime Study: Global and the 2015 NetDiligence® Cyber Claims Study. While the phrase alluded to in our...more

Recent Amendments to Security Breach Notification Laws Further Complicate Breach Notification for Employers

It is not a matter of "if" but "when" an employer will be required to notify employees of a security breach.  Forty-seven states require employers to notify employees when defined categories of personal information, including...more

Report on Student Data Privacy Highlights Two Key Issues For School Leaders

Student data privacy is the “it” issue right now in edtech, as evidenced by a recent special Student Data Privacy Report (free registration required) issued by Education Week. Education Week prefaces the report with a fact...more

Uber class action case hits roadblock

A California federal judge has ruled that a former Uber driver who is suing Uber in a proposed class action case was unable to show that he suffers an immediate threat of identity theft and dismissed the driver’s first...more

Senate passes Cybersecurity Information Sharing Act

After a long delay, with a vote of 74 to 21, the United States Senate passed the Cybersecurity Information Sharing Act (CISA) on October 27, 2015. The bill has been touted as being controversial and is opposed by...more

Hacker arrests and prosecutions update

We previously reported that alleged Ukranian hacker Sergey Vovnenko, also known as “Flycracker,” “Fly” and “Darklife” was extradited from Italy, arrested and charged in New Jersey federal court for his part in disbursing the...more

Colleges and Universities Are Prime Cyberattack Targets: What’s Behind the Threat?

When it comes to cyberattack targets, many think of retailers and associated credit card transactions or customer information, or perhaps healthcare providers with their ever-increasing storage and transmission of electronic...more

The Evolving World of Privacy and Data Security Covered at Nossaman-UCI Cyber Symposium

On October 12, Nossaman and UC Irvine hosted their first annual cyber symposium at the Los Angeles City Club. The event brought experts together to discuss a variety of critical issues in the worlds of privacy and data...more

Could a Vendor’s Lax Info Security Ruin Your Holiday Sales? Seven Preventative Steps for Retailers

Many of the largest retailer data security breaches have been caused or enabled by the acts or omissions of retailers’ vendors, such as the widely publicized incident at Target Corporation. Several such breaches occurred...more

Purchasing Cyber Insurance? Important Considerations from the Recent Nossaman/ UCI Cyber Symposium

On October 12, 2015, Nossaman and UC Irvine hosted a Cyber Symposium at the City Club in Los Angeles. The event included four panels of Nossaman lawyers, UCI professors, and private professionals who are experts in the areas...more

New York Stock Exchange releases cybersecurity guide for public companies

We continue to urge CEOs and boards of public companies (and private and not-for profits) to harken the call of getting a handle on cybersecurity risk to companies today. Not too soon, the New York Stock Exchange published a...more

299 Results
|
View per page
Page: of 12

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×