News & Analysis as of

Scams Cyber Attacks

DLA Piper

Australia: Anti-Scam Measures and Ransomware Reporting on the Agenda

DLA Piper on

Cyber regulation is changing in Australia. As governments globally grapple with the everchanging and increasingly challenging cyber landscape, Australia is poised to implement new laws and update existing regulation in order...more

BakerHostetler

Weekly Blockchain Blog - September 2024

BakerHostetler on

Crypto Payments Firms Announce New Integrations and Initiatives - According to reports, fintech bank Revolut recently announced a partnership with Ledger, a major crypto hardware wallet provider, to make it easier for...more

BakerHostetler

Deeper Dive: Understanding the 2023-24 Crypto Threat Landscape

BakerHostetler on

As the Web3 and digital assets ecosystem continues to grow, hacks, scams and other threats remain a major cause for concern and a potential impediment to broader adoption. Data from various sources indicates that after a year...more

Dorsey & Whitney LLP

Cybercrime Trends: A Midyear Review

Dorsey & Whitney LLP on

Cybercriminals continue to outpace the best efforts of regulators, law enforcement, and cybersecurity professionals. Recent reporting from the Federal Bureau of Investigation demonstrates that cybercriminals are increasingly...more

Baker Donelson

Medical Records Scams: What You Need to Know

Baker Donelson on

In today's digital age, the health care industry faces a growing threat from scammers who don't have to use sophisticated cyberattacks; they can use the most routine task to steal information from unwitting and...more

Katten Muchin Rosenman LLP

Gone Phishing – Vigilance in the New Scam Era - Kattison Avenue | Issue 12

"Thank you for your order." "We tried delivering your package." We have all seen these subject lines in our inbox, but some are not so innocent. Business impersonation scams are not new, but some of their tricks are. These...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #390 – National Consumer Protection Week

This week is National Consumer Protection Week. Based on the recent statistics published by the FTC on online, digital, and voice scamming, consumers sorely need more help protecting themselves from scams....more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #371 – Internet Safety Guide for Seniors

I was talking to a client today about a security incident and the discussion turned to how threat actors are using increasingly more sophisticated ways to attack individuals and companies. She lamented that we know more than...more

Goodwin

Generative AI and Financial Services: A Recent View From the UK Regulator

Goodwin on

In a recent speech, Nikhil Rathi, CEO of the UK Financial Conduct Authority (FCA), set out the FCA’s latest views on the role of artificial intelligence (AI) in financial services. The speech highlights many benefits but also...more

Ervin Cohen & Jessup LLP

Insurance Coverage for Email Scams

A genuine looking email is sent to a company’s accounts payable department with instructions from its president to pay money to a certain account. The “To” and “From” headers and the signature block look identical to hundreds...more

Kohrman Jackson & Krantz LLP

Sextortion, Deepfakes, and AI Scams: How to Protect Children from Cyberattacks

Cyberattacks are a growing threat, with children being among the most vulnerable of targets. The internet serves as a platform for criminals to access children under the guise of anonymity...more

Ervin Cohen & Jessup LLP

Companies That Pay Hackers May Be Able to Recoup Their Losses

Where companies are victimized by ransomware or email scams, their losses arise from payments made by an officer or employee of the company. In the case of ransomware, a company’s files are held hostage pending payment...more

Ervin Cohen & Jessup LLP

Email Scam Losses May Find Recourse Via Cyber Or Business Interruption Coverage

Losses arising from email scams are usually covered, if at all, under a company’s crime policy. But a recent decision from The District Court in Minnesota suggests that recourse may also be found under an insured’s cyber or...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - December 2022 #2

Robinson & Cole LLP on

CYBERSECURITY - Nineteen States Have Banned TikTok on Government-Issued Devices - Governors of numerous states have issued Executive Orders in the past several weeks banning TikTok from government-issued devices and...more

Woodruff Sawyer

Scams and Viruses: Which Email Attachments Are Safe to Open?

Woodruff Sawyer on

Email scams and viruses are nothing new—threats like phishing emails and malware have been around since the days when services like AOL still dominated the internet and email landscape. However, while technology has made a...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - August 2022 #3

Robinson & Cole LLP on

CYBERSECURITY - CISA + MS-ISAC Alert: Threat Actors Exploiting Zimbra Collaboration Suite - On August 16, 2022, CISA (the Cybersecurity and Infrastructure Security Agency) and the Multi-State Information Sharing & Analysis...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - June 2022 #2

Robinson & Cole LLP on

CYBERSECURITY - Joint Advisory Warns of Chinese-Sponsored Attacks on Telecommunications Companies - A joint advisory issued June 7, 2022, by the Cybersecurity & Infrastructure Security Agency, FBI and the National...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - April 2022 #4

Robinson & Cole LLP on

CYBERSECURITY - Intelligence Points to Likely Russian Attacks on Critical Infrastructure - The cybersecurity authorities of the United States (including CISA, FBI, NSA and DOE), Australia, Canada, New Zealand, and the...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - March 2022 #3

Robinson & Cole LLP on

CYBERSECURITY - Cyber-Attackers Politically Aligned - The most recent Accenture Global Incident Report (the Report) shows that cyber-attackers have political views and are divided between support for Russia or Ukraine....more

BakerHostetler

U.S. Bank Acquires Blockchain Infrastructure; SEC Approves Blockchain-Based Exchange; FTC Warns on Crypto Scams; NFT Threats,...

BakerHostetler on

U.S. Bank Seeks to Launch Stablecoin; New Crypto Payments Data Released - A well-known digital payments consortium sold its technology platform this week to a U.S.-based bank known for its cryptocurrency-related offerings....more

Bass, Berry & Sims PLC

Privacy Peril: New Invoice – Action Required!

Bass, Berry & Sims PLC on

According to Microsoft, 91% of cyberattacks start with an email. In an earlier Privacy Peril we provided information on prevalent words phishers of men and women insert in an email subject line to grab the recipient’s...more

Holland & Knight LLP

Gmail to Use Verified Trademark Logo Badges to Combat Email Scammers

Holland & Knight LLP on

In the face of the ever-growing threat of cyberattacks disguised in emails from phishers, impostors and other increasingly sophisticated security scammers, Google has launched a tool to allow organizations to fight back by...more

Robinson+Cole Data Privacy + Security Insider

Phishing, Vishing, and Smishing—Your Employees Need to Know the Newest Schemes

New dictionary words have been formed to describe online scams. Phishing, one that everyone knows by now, is when a scammer uses a pretext in an email to get someone to click on a link or attachment in the email to deploy...more

Lowenstein Sandler LLP

Contradictory Responses by Privacy Regulators Post-COVID-19: Balancing the Economy With Cybersecurity in a Changed World (Privacy)

The COVID-19 pandemic has had a disparate effect on privacy regulators, with varying levels of enforcement advocated by different government entities; the California Attorney General, the U.S. Department of Health & Human...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #239 – Hackers Know How to Embarrass You

There have been numerous examples of how hackers can get hold of sensitive and deeply personal information and use it against individuals to embarrass and extort them into sending money or compromising pictures to the hackers...more

49 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide