Cyber Crimes Cybersecurity

News & Analysis as of

Cyber Activities Added to the OFAC Target List – How do you ensure you are compliant?

In December of 2015 the Department of the Treasury’s Office of Foreign Assets Control (“OFAC”) issued regulations implementing the President’s April 1, 2015 Executive Order (“EO”), “Blocking the Property of Certain Persons...more

Rise in Cyberattacks on Professional Services Firms

Wilson Elser’s Cyber Incident Response Team has seen an alarming uptick in cyber-criminal activity targeted at professional services firms, particularly accounting firms. As described in more detail below, the criminal...more

Human Error Called The Most Common Factor In Data Breaches

As reported in the December 9, 2015 Wall Street Journal Law Blog, a recent report by the Association of Corporate Counsel (“ACC”) revealed that the most common reason for a data breach at companies is “employee error.” ...more

Five Questions with Tom Vincent

Why did GableGotwals create a cybersecurity practice group? Information has become much more accessible and transportable — essentially, more vulnerable — over just the past few years. This increased vulnerability has...more

House Establishes Institute to Formalize its Seven-Year Fight Against Cybercrime

On the fourteenth anniversary of 9-11, H.R. 3490—the Strengthening State and Local Cyber Crime Fighting Act—was introduced in the U.S. House of Representatives. On Monday, November 30, 2015, it passed with an overwhelming...more

Social Engineering Losses—Embarrassing Scam or Insured Loss?

The term Social Engineering keeps cropping up recently in the new world of cybersecurity—to what does this term refer? To a scam as old as the hills. You know the con: an innocuous person asks you to accept a cashier’s...more

Breaches, Damned Breaches and Their Statistics

Interesting conclusions about data breach costs emerge from two new studies, the 2015 Ponemon Institute’s Cost of Cyber Crime Study: Global and the 2015 NetDiligence® Cyber Claims Study. While the phrase alluded to in our...more

Recent Amendments to Security Breach Notification Laws Further Complicate Breach Notification for Employers

It is not a matter of "if" but "when" an employer will be required to notify employees of a security breach.  Forty-seven states require employers to notify employees when defined categories of personal information, including...more

Uber class action case hits roadblock

A California federal judge has ruled that a former Uber driver who is suing Uber in a proposed class action case was unable to show that he suffers an immediate threat of identity theft and dismissed the driver’s first...more

Senate passes Cybersecurity Information Sharing Act

After a long delay, with a vote of 74 to 21, the United States Senate passed the Cybersecurity Information Sharing Act (CISA) on October 27, 2015. The bill has been touted as being controversial and is opposed by...more

Colleges and Universities Are Prime Cyberattack Targets: What’s Behind the Threat?

When it comes to cyberattack targets, many think of retailers and associated credit card transactions or customer information, or perhaps healthcare providers with their ever-increasing storage and transmission of electronic...more

The Evolving World of Privacy and Data Security Covered at Nossaman-UCI Cyber Symposium

On October 12, Nossaman and UC Irvine hosted their first annual cyber symposium at the Los Angeles City Club. The event brought experts together to discuss a variety of critical issues in the worlds of privacy and data...more

Could a Vendor’s Lax Info Security Ruin Your Holiday Sales? Seven Preventative Steps for Retailers

Many of the largest retailer data security breaches have been caused or enabled by the acts or omissions of retailers’ vendors, such as the widely publicized incident at Target Corporation. Several such breaches occurred...more

Purchasing Cyber Insurance? Important Considerations from the Recent Nossaman/ UCI Cyber Symposium

On October 12, 2015, Nossaman and UC Irvine hosted a Cyber Symposium at the City Club in Los Angeles. The event included four panels of Nossaman lawyers, UCI professors, and private professionals who are experts in the areas...more

New York Stock Exchange releases cybersecurity guide for public companies

We continue to urge CEOs and boards of public companies (and private and not-for profits) to harken the call of getting a handle on cybersecurity risk to companies today. Not too soon, the New York Stock Exchange published a...more

Disgruntled Former Tribune Company Employee Who Aided Hacking Convicted; Could Face Jail Time

On October 7, 2015, former Tribune Company employee Matthew Keys was convicted of three felonies stemming in part from assistance he provided to the hacking collective Anonymous to alter content on the LA Times’ website. ...more

Keeping the Data-Breach Headlines In Perspective

From the Sony Pictures settlement, to the Ashley Madison debacle, data breaches are making big headlines of late. And when it comes to one case in particular — the data breach at luxury retailer Neiman Marcus (Remijas v....more

Illinois to Host Cyber Risk and Security Conferences; CSBS to Co-host

On October 14, the Illinois Division of Banking announced that it would host two Cyber Risk and Security Conferences on November 9 and November 16. With the growing number of threats to financial data systems, cyber and data...more

When a Cyber Attack Has Physical Impact

October ordinarily brings the return of crisp air, fall foliage, and Halloween. This year, for the first time, it also brings National Cyber Security Awareness Month. Yet designating a month to increase cybersecurity...more

The Internet of Things and the Inevitable Collision with Product Liability PART 4: Government Oversight

The exponential growth of the Internet of Things (IoT) is far outpacing the ability of stakeholders to address safety standards and security concerns. This is not unusual as rapidly developing technology often challenges...more

Alphabet Soup and Data Security

In the span of two days, mobile device users learned of two data breaches that could compromise their personal data. In one, Experian (a credit reporting agency) reported that it was hacked, potentially putting 15 million...more

US China Trade War

The October blog post will be broken up into two parts. This October 15th post will comment on the TPP Agreement signed today and well as President Xi Jinping’s recent trip to the US and my impressions from Beijing, China...more

American Thrift Stores announces data breach

American Thrift Stores announced this week that like other retailers, it has been hit with a security breach “that occurred through software used by a third-party service provider” that allowed “criminals from Easter Europe”...more

Mainbrace: October 2015, No. 4

As with the world economy, the shipping markets are currently experiencing a major bout of volatility. The wide range of matters we are handling in our maritime law practice certainly reflects the current swings the shipping...more

“My, what beautiful eyes you have . . .” – Biometric Data and Privacy

Biometric data – obviously not in just the movies anymore. It is alive, well, and increasingly being used in our everyday society. But, on September 23, 2015, when the Office of Personnel Management revealed that fingerprint...more

212 Results
|
View per page
Page: of 9

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×