Cyber Crimes Cybersecurity

News & Analysis as of

UK Financial Regulatory Developments - May 2016 #11

The Law Society responds to ESMA’s EU MAR consultation - The Law Society has published the Law Society and City of London Law Society Company Law Committees Joint Market Abuse Working Party’s response to ESMA’s...more

Cybersecurity: You can't afford to ignore it anymore

In late March, newspapers confirmed that a Russian hacker named "Oleras" targeted 48 law firms (most of which are Am Law 100 firms). Oleras planned to hack these firms to secure confidential and highly valuable insider...more

Financial Institutions Spend More on Cybersecurity

Financial institutions have been at the forefront of protecting their customers’ personal information, including names, addresses, phone numbers, account numbers, Social Security numbers, income, and credit histories. The...more

Chubb advisory warns construction industry of increased risk of cyber threats

In its advisory entitled “New Business Models, Technology Raise Professional Liability Risks for Contractors,” Chubb has outlined the risks of cyber threats associated with new technologies being used by the construction...more

Phishing and Spoofing Scams — A Few Tips to Protect Yourself and Your Business

The phone rings. The caller ID says it’s your attorney’s office. When you answer, you are told you owe your attorney additional money and are directed to call a toll-free number. When you call the number, you are told how...more

What You Need To Know About The FCA’s Business Plan For 2016/17

On 5 April 2016, the UK Financial Conduct Authority (FCA) published its Business Plan for 2016/17. The Business Plan sets out a roadmap for the FCA’s principal areas of focus over the coming year. Overall, there was...more

Cyber Attacks Continue to Grow and Evolve

Cyber criminals continue to prey on websites with unpatched vulnerabilities and ill-protected point of sale (POS) systems to steal credentials such as personal data, credit card numbers and bank account details. Common...more

BakerHostetler Data Security Incident Response Report: Being “Compromise Ready” Better Positions Companies to Respond to Incidents...

On March 30, 2016, we released our second annual Data Security Incident Response Report. The report analyzes data from more than 300 incidents on which the firm advised in 2015. The report looks at causes of incidents,...more

FBI issues warning to law firms

The FBI has issued a Private Industry Notification to law firms indicating that a cyber crime insider trading ring is targeting “international law firm information used to facilitate business ventures.” According to the FBI...more

Chinese National Pleads Guilty To Conspiracy To Commit Cyber Theft Of Export-Controlled Technology

On March 23, 2016, U.S. law enforcement authorities announced that Su Bin, a citizen of the People's Republic of China and a resident of Canada, pleaded guilty to conspiracy to violate the Arms Export Control Act, the...more

President’s Cybersecurity National Action Plan Seeks to Leverage Private Sector Expertise for Federal Advancement

As stated by Wired, “It’s all the standard advice you’d give a tech novice,” aptly sums up the White House’s Cybersecurity National Action Plan (CNAP) that President Obama unveiled on February 9, 2016. Announced as part of...more

Testing the Limits – Cyber Coverage Litigation Update

The growing percentage of businesses that purchase cyber security and data privacy insurance portends a growing number of claims and, inevitably, litigation over some of those claims. Wells Fargo’s 2015 Cyber Security and...more

Cyber Activities Added to the OFAC Target List – How do you ensure you are compliant?

In December of 2015 the Department of the Treasury’s Office of Foreign Assets Control (“OFAC”) issued regulations implementing the President’s April 1, 2015 Executive Order (“EO”), “Blocking the Property of Certain Persons...more

Rise in Cyberattacks on Professional Services Firms

Wilson Elser’s Cyber Incident Response Team has seen an alarming uptick in cyber-criminal activity targeted at professional services firms, particularly accounting firms. As described in more detail below, the criminal...more

Human Error Called The Most Common Factor In Data Breaches

As reported in the December 9, 2015 Wall Street Journal Law Blog, a recent report by the Association of Corporate Counsel (“ACC”) revealed that the most common reason for a data breach at companies is “employee error.” ...more

Five Questions with Tom Vincent

Why did GableGotwals create a cybersecurity practice group? Information has become much more accessible and transportable — essentially, more vulnerable — over just the past few years. This increased vulnerability has...more

House Establishes Institute to Formalize its Seven-Year Fight Against Cybercrime

On the fourteenth anniversary of 9-11, H.R. 3490—the Strengthening State and Local Cyber Crime Fighting Act—was introduced in the U.S. House of Representatives. On Monday, November 30, 2015, it passed with an overwhelming...more

Social Engineering Losses—Embarrassing Scam or Insured Loss?

The term Social Engineering keeps cropping up recently in the new world of cybersecurity—to what does this term refer? To a scam as old as the hills. You know the con: an innocuous person asks you to accept a cashier’s...more

Breaches, Damned Breaches and Their Statistics

Interesting conclusions about data breach costs emerge from two new studies, the 2015 Ponemon Institute’s Cost of Cyber Crime Study: Global and the 2015 NetDiligence® Cyber Claims Study. While the phrase alluded to in our...more

Recent Amendments to Security Breach Notification Laws Further Complicate Breach Notification for Employers

It is not a matter of "if" but "when" an employer will be required to notify employees of a security breach.  Forty-seven states require employers to notify employees when defined categories of personal information, including...more

Uber class action case hits roadblock

A California federal judge has ruled that a former Uber driver who is suing Uber in a proposed class action case was unable to show that he suffers an immediate threat of identity theft and dismissed the driver’s first...more

Senate passes Cybersecurity Information Sharing Act

After a long delay, with a vote of 74 to 21, the United States Senate passed the Cybersecurity Information Sharing Act (CISA) on October 27, 2015. The bill has been touted as being controversial and is opposed by...more

Colleges and Universities Are Prime Cyberattack Targets: What’s Behind the Threat?

When it comes to cyberattack targets, many think of retailers and associated credit card transactions or customer information, or perhaps healthcare providers with their ever-increasing storage and transmission of electronic...more

The Evolving World of Privacy and Data Security Covered at Nossaman-UCI Cyber Symposium

On October 12, Nossaman and UC Irvine hosted their first annual cyber symposium at the Los Angeles City Club. The event brought experts together to discuss a variety of critical issues in the worlds of privacy and data...more

Could a Vendor’s Lax Info Security Ruin Your Holiday Sales? Seven Preventative Steps for Retailers

Many of the largest retailer data security breaches have been caused or enabled by the acts or omissions of retailers’ vendors, such as the widely publicized incident at Target Corporation. Several such breaches occurred...more

223 Results
|
View per page
Page: of 9
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×