Cyber Crimes Federal Bureau of Investigation

News & Analysis as of

FBI Warns of Romance Scams that “Break Hearts and Bank Accounts”

On the eve of Valentine’s Day, the FBI issued a timely warning about the rise of “Romance Scams.” This type of Internet crime typically targets older widowed or divorced women. While these women are typically computer...more

Obama Uses Executive Order Authority to Respond to Malicious Russian Cyber Activity - President Amends EO 13964 From April 2015 in...

President Barack Obama amended Executive Order (EO) 13964 on December 29, 2016, in response to intelligence community findings that the Russian government engaged in malicious cyber activity with respect to the U.S. electoral...more

Hey! Did You Hear? The United States Imposed Sanctions Against Russia.

For those of us who live and breathe U.S. economic sanctions, we are used to most people largely ignoring what goes on in our world. The United States’ recent imposition of new sanctions against Russia, however, was not one...more

Internet of Things (IoT) Security Takes Center Stage At FBI, DHS, NIST and Congress

On October 21, 2016, a domain name service host and internet management company experienced at least two waves of a distributed denial of service (DDoS) attack that impacted at least 80 websites, including those belonging to...more

A Closer Look: Practical Tips to Managing a Ransomware Attack Part 2

Part 1 of this two part series laid out the state of the industry regarding ransomware. In Part 2, this post will examine what steps to take, or not to take, during and after a ransomware attack. “We’ve Been Hit – Now...more

Data Breach Decision Points: Part 4

The best way for a company to handle a data breach is to be prepared. As we discuss in our data breach readiness handbook, preparation includes, among other things, drafting an incident response plan, reviewing...more

A New Chapter in the Cybersecurity? Is there a Role for Active Deterrence?

In the 1969 film Butch Cassidy and the Sundance Kid, after Butch and Sundance rob Union Pacific Railroad (“Union Pacific”) the first time, Union Pacific employs a stronger safe. After Butch and Sundance rob Union Pacific a...more

Back to School – Avoiding Theft of Data and Money via the “Business Email Compromise” Scam

The FBI warned this summer that the “Business Email Compromise” (“BEC”) scam continues to grow, evolve, and target businesses of all sizes. As reported by the FBI in June, the scam had hit more than 22,000 victims for a...more

Privacy Tip #37 – Beware of fake USB drives and phone chargers

USB drives and phone chargers are expensive. Hackers know that. One way hackers are gaining access to get into computers to steal data is by planting USB drives and phone chargers in public areas, hoping someone will pick it...more

Beware of Emerging Cyber Scams – Part 1: Business Email Compromise

This is the first in a series of articles about increasingly sophisticated cyber scams, and follows several alerts issued by the FBI’s Internet Crime Complaint Center (IC3). These scams include: (1) Business Email...more

Government Seeks Civil Forfeiture of Funds Stolen in Business E-Mail Fraud

On April 14, 2016, the U.S. Attorney for the Southern District of New York filed a civil forfeiture action seeking to recover nearly $100 million stolen from an unidentified U.S. company through a form of wire fraud or...more

FBI’s cyber most wanted: Spotlight on Firas Dardar and Ahmed Agha

New additions to the FBI’s Cyber’s Most Wanted List show “the line between ordinary criminal hackers and potential national security threats is increasingly blurry,” according to Assistant Attorney General for National...more

Cyber prosecutions update

The feds have been busy on the cyber prosecutions front. First, on March 18, 2016, the FBI announced that a multi-agency collaborative effort blew up an identity theft ring whose leader was an inmate in a Georgia prison. The...more

FBI issues warning to law firms

The FBI has issued a Private Industry Notification to law firms indicating that a cyber crime insider trading ring is targeting “international law firm information used to facilitate business ventures.” According to the FBI...more

The FBI’s “Cyber Most Wanted”

We’ve all heard of the FBI’s “Most Wanted” list, but fewer people know that the FBI has a special most wanted list just for computer criminals. The FBI’s “Cyber’s Most Wanted” list features the FBI’s most wanted computer...more

Colleges and Universities Are Prime Cyberattack Targets: What’s Behind the Threat?

When it comes to cyberattack targets, many think of retailers and associated credit card transactions or customer information, or perhaps healthcare providers with their ever-increasing storage and transmission of electronic...more

CIA Director’s email account hacked

An anonymous hacker has contacted the New York Post to explain how he was able to hack into the CIA Director’s AOL email account. According to several reports, a high school student and his two friends implemented social...more

Policyholder Insider Quarterly

Some Words Are More Equal Than Others: BancInsure vs. FDIC - In George Orwell's "Animal Farm", the governing principle that "all animals are equal" was revised by the pigs, who had ascended into power, to "all animals...more

The Internet of Things and the Inevitable Collision with Product Liability PART 4: Government Oversight

The exponential growth of the Internet of Things (IoT) is far outpacing the ability of stakeholders to address safety standards and security concerns. This is not unusual as rapidly developing technology often challenges...more

Alphabet Soup and Data Security

In the span of two days, mobile device users learned of two data breaches that could compromise their personal data. In one, Experian (a credit reporting agency) reported that it was hacked, potentially putting 15 million...more

How to Protect and Secure Your Connected Devices

The Federal Bureau of Investigation is warning companies and the public to be aware of vulnerabilities that cybercriminals could exploit in connected devices, otherwise known as Internet of Things devices....more

Don’t Get Locked Out: Is Ransomware a Threat to Your Business?

Ransomware is a type of malware that locks access to a computer and its drives. Many forms of ransomware take complete control of the computer system, encrypt all of the files, and deny access to the system and any files...more

OPM admits 5.6 million fingerprints stolen during breach

The Office of Personnel Management (OPM) reported yesterday that fingerprint data stolen during the breach of almost 22 million Americans’ data is estimated to be 5.6 million instead of the original estimate of 1.1 million....more

Business E-mail Compromise Scam v2.0

In March, we reported on the Business E-mail Compromise (BEC) scam where criminals target employees responsible for wiring company money, and trick them into wiring money under false pretenses to fraudulent accounts...more

Throwback Thursday: Why Trade Secret Theft Isn’t Just a Digital Problem And What Businesses Can Do About It

With stories of cyberattacks and data breaches on a seemingly endless loop, businesses and governments have been doubling down on their efforts to protect digital information and assets.  But, in some industries, the greatest...more

36 Results
|
View per page
Page: of 2
Popular Topics

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×