Cyber Crimes

News & Analysis as of

Internet of Things and Cybercrime – what risks?

The Internet of Things is expected to lead to 50 billion connected devices by 2020 collecting and exchanging personal data about their users, their lives, their preferences and tastes. This will lead not only to relevant data...more

2014 Intelligence Authorization Act Imposes Cyber Breach Reporting Requirement on Intelligence Community Contractors - Many...

The federal government must publish new procedures 90 days after the 2014 Intelligence Authorization Act is signed. These procedures will become effective upon publication. Intelligence community contractors will be...more

TRO LLC – GET IT? Sprung From Prison, Hacker Creates Hedge Fund That Shorts Stocks Of Companies With Security Vulnerabilities

Self-proclaimed Internet troll and hacker Andrew “weev” Auernheimer has big plans now that he’s been sprung from prison. We identified Auernheimer’s imprisonment and appeal as one of the top trade secret stories of...more

A CTO’s Views On How To Combat Hackers & Cybercriminals

In this article, I delve into the views and opinions of a chief technology officer of a telecommunications company to understand important steps a company can take to combat hackers and cyber-criminals....more

Verizon’s Data Breach Report Reveals The Nine Most Pressing Corporate Security Threats

As April comes to a close, it’s time once again for Verizon Enterprise Solutions’ Data Breach Investigations Report to remind us just how important data security is to the corporate world. Released Wednesday, the report,...more

New Report Reveals Global Impact of Economic Crime

Economic crime is increasingly impacting global businesses according to a recent report from professional services firm PricewaterhouseCoopers (PwC). Globalization and growing reliance on technology and online processes are...more

Avoiding a Business Scam

Today, most of the scams reported in the news that are targeted against businesses seem to have gone high tech and usually involve illegal hacking into a company’s computer network. However, some fraud still occurs the old...more

High Profile Security Breaches Spur Congressional Action

Recently, several large retailers, including Target and Neiman Marcus, announced that hackers had compromised credit card and other personal consumer data. At Target, 40 million debt and credit cards were impacted and the...more

Renewed Congressional Interest in Federal Data Security and Breach Notification Legislation

In light of recent, well-publicized, data security breaches at major retailers and social media company Snapchat, legislators are renewing the call for new federal laws that would strengthen data security and notification...more

Cyber Law Tracker: Cybersquatting Ruling in the Ninth Circuit

This week, the U.S. Court of Appeals for the Ninth Circuit ruled that there is no cause of action for contributory cybersquatting under the Anticybersquatting Consumer Protection Act ("ACPA"), 15 U.S.C. § 1125(d). See...more

Viruses, Trojans and Spyware, Oh My! The Yellow Brick Road to Coverage in the Land of Internet Oz – Part I

We’re not in e-Kansas anymore. And there’s no denying that present day internet Oz, while extraordinary, is increasingly scary. Cyber attacks of various types continue to escalate across the globe. As aptly stated by one...more

The Increasing Cost of Cyber Crime

With Cyber-Attacks on the Rise, How Can You Prepare? The risk of a cyber-attack on a U.S. company is growing at an alarming rate. Unfortunately, cyber-attacks are not just an issue for large corporations, high tech...more

Data Protection and Privacy Laws in the Middle East

Justin Cornish is counsel in the Latham & Watkins Outsourcing and Technology Transactions Practice. He is a frequent speaker on the topic of data protection and privacy laws. With IT spending in the Middle East projected to...more

Spotlight On Belgium: Trends in the Legal Landscape - Issue 2, 2013

We are delighted to present you the second edition of Spotlight on Belgium, DLA Piper Belgium’s quarterly newsletter which aims to inform you about current legal developments that could affect your business. As the...more

Financial Services Legislative and Regulatory Update -- June 10‚ 2013

In This Issue: Leading the Past Week; Legislative Branch; Executive Branch; International; and Upcoming Hearings. Excerpt from Leading the Past Week - And the beat goes on… Another week with the White...more

Federal Government Expands AML Cybercrime Enforcement

On Tuesday, May 28, 2013, the Department of Justice (DOJ) announced the unsealing of an indictment against Liberty Reserve, S.A. (Liberty Reserve) in the Southern District of New York for operating a $6 billion money...more

Cyber Outlook: Executive Order Implementation, Congressional Action & Regulatory Requirements and Enforcement

With the occurrence of near daily threats against the nation’s critical infrastructure (CI), cybersecurity continues to be a constant concern of owners and operators of CI, Congress and the Obama Administration. Responses to...more

Cybersecurity Experts Urge Diligence at Portland Conference

From a Maine nonprofit group's leak of confidential data in February, to the May 9 discovery that a worldwide gang of criminals stole $45 million by hacking into a database of prepaid debit cards, information security...more

Enterprise Data Security For The Securities Lawyer

Assuring cybersecurity has become a necessity for businesses across all industries. Cybercrime — with over $1 trillion in annual profits — is now the most lucrative illegal global business. Any business with computers and...more

Bitcoins: Online Currency’s Uncharted Frontier

Bitcoin – it sounds like a token you might use to play skeeball at a beachside arcade. It is actually a relatively new, virtual online “currency” being used for payments across the Internet. While some observers have noted...more

20 Results
|
View per page
Page: of 1