Cyber Crimes Cybersecurity

News & Analysis as of

Data Privacy and Security Considerations in M&A Transactions

By some estimates, cybercrime costs the global economy $445 billion annually. If cybercrime were a single country, this dollar amount would place it within the world’s top 30 countries in terms of gross domestic product, and...more

Two Oft-Neglected Cybersecurity Protections

With each passing year, cybercrime moves further into the mainstream of public company existence. What until recently was mostly an annoying, abstract concern for a handful of companies is now a daily menace that impacts...more

President Issues Executive Order to Block Assets of Foreign Cyber Attackers

President Obama recently issued Executive Order 13694 (EO 13694 or EO), “Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities.” EO 13694 is aimed at deterring cyber attacks,...more

United States Goes on the Offensive Against International Cybercrime - 2015 Cybersecurity Executive Order

On April 1, President Obama signed an Executive Order to combat the "national emergency" sparked by a rapidly evolving global cybercrime environment. The Executive Order directs the U.S. Treasury Department to impose...more

IBM identifies cybercriminals’ increased use of Dyre Wolf to steal millions

IBM researchers reported late last week that they have identified an increase in the use of Dyre Wolf malware which has contributed to the loss of millions of dollars from victim companies. Dyre Wolf allows the intruders to...more

Executive Order Blocks Property of Those Engaging in Malicious Cyber Activities

The executive order enables US government agencies to block the assets of any foreign person determined to have engaged in malicious cyber-enabled activities....more

Information Sharing Can Help Fortify Your Cybersecurity Strategy

Having strong cybersecurity policies is critical for protecting a company's business, as the amount of commerce conducted over networks and the Internet increases each year. Last month the Congressional Research Service...more

Cyber Sanctions and National Security

In response to the growing cyber security threats from outside of the United States, the U.S. Government has added an entire new category of sanctioned individuals and organizations to its list of Specially Designated...more

President Obama’s April Fools' Day Order on Cyberterrorism – No Joking About It!

While it’s not clear whether the President’s release today of an Executive Order, "Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities," was purposefully timed to coincide with...more

New Tools for Companies Against Cybercrime

Obama administration proposal would reduce legal ambiguities and allow civil RICO claims. On January 2015, the Obama administration announced a series of proposals to strength­en the country’s response to...more

Five Minutes With … National Security and Cybercrime Professor Ahmed Ghappour

This marks the inaugural “Five Minutes With” feature that Trade Secrets Watch will run occasionally.  These will be question-and-answers with notable figures in the trade secrets world. TSW got a chance to sit down with UC...more

EU Art. 29 Assesses Cybercrime Assessment

The Article 29 Data Protection Working Party (Working Party) sent a letter to the Council of Europe discussing its first assessment of several cybercrime scenarios presented at the 2014 Cybercrime@Octopus conference...more

FBI Director James Comey To The Private Sector: “You need protection. You need guidance. I need information.”

FBI Director Comey delivered a keynote speech at the annual International Conference on Cyber Security this past Wednesday at Fordham University. In his speech, Director Comey discussed a number of organizational changes over...more

Cybersecurity: It’s Not Just An “IT” Problem Anymore

Cybersecurity breaches made headlines in 2014, but how troubling is it? Very, according to findings recently published by PricewaterhouseCoopers LLP (PwC). According to PwC’s research, global cybersecurity incidents...more

Cybersecurity Litigation Monthly Newsletter

Symantec Corporation, the data security software provider, filed a motion to quash the plaintiffs’ third-party subpoena in the consolidated class action over Target Corporation’s massive customer data breach in late 2013. ...more

DOJ Announces Formation of Cybersecurity Unit In Efforts to Prevent Cybercrime

On December 4, Assistant AG Leslie Caldwell delivered remarks at the Cybercrime 2020 Symposium regarding the DOJ’s recent efforts to fight cybercrime. Specifically, Caldwell noted the DOJ’s Criminal Division is (i) increasing...more

FinCrimes Update - November 2014 Summary, Volume 1, Issue 9

IN THIS ISSUE: BSA/AML & OFAC | Virtual Currency & Payment Systems | FCPA & Anti-Corruption | Criminal Enforcement. ...more

Blog: Cyberthieves Collect Confidential Information, Apparently To Conduct Insider Trading

Here is an unnerving warning from FireEye, a cybersecurity firm, discussed in this article from MarketWatch, regarding a sophisticated, native-English-speaking group, designated FIN4, that has targeted almost 100 public...more

Hold Your Cards Close: Data Protection and the Gaming Industry

Increased cybercrimes and data security threats have recently made headline news with reports of massive data security breaches at major U.S. companies, including Target and more recently, The Home Depot. Risks of data...more

Tokenization Introduced to Tackle Cyber Crime

On November 3, a large financial services company announced the rollout of its Token Service (Service) for online, mobile app, and in-store mobile purchases. The Service is designed to increase security and reduce...more

Internet of Things and Cybercrime – what risks?

The Internet of Things is expected to lead to 50 billion connected devices by 2020 collecting and exchanging personal data about their users, their lives, their preferences and tastes. This will lead not only to relevant data...more

2014 Intelligence Authorization Act Imposes Cyber Breach Reporting Requirement on Intelligence Community Contractors - Many...

The federal government must publish new procedures 90 days after the 2014 Intelligence Authorization Act is signed. These procedures will become effective upon publication. Intelligence community contractors will be...more

A CTO’s Views On How To Combat Hackers & Cybercriminals

In this article, I delve into the views and opinions of a chief technology officer of a telecommunications company to understand important steps a company can take to combat hackers and cyber-criminals....more

Verizon’s Data Breach Report Reveals The Nine Most Pressing Corporate Security Threats

As April comes to a close, it’s time once again for Verizon Enterprise Solutions’ Data Breach Investigations Report to remind us just how important data security is to the corporate world. Released Wednesday, the report,...more

Avoiding a Business Scam

Today, most of the scams reported in the news that are targeted against businesses seem to have gone high tech and usually involve illegal hacking into a company’s computer network. However, some fraud still occurs the old...more

34 Results
|
View per page
Page: of 2

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×