Latest Posts › Cyber Crimes

Share:

Business Email Compromise Fraud: Should the Party Best Positioned to Avoid the Fraud Bear the Loss?

Business email compromise (“BEC”) occurs when a payee’s business email account is compromised or impersonated. The threat actor, posing as the payee or its representative (e.g., the head of the accounting department), sends...more

Fifth Circuit Requires Insurance Coverage for Cyberattack on Payment-Processing System

Cybercriminals continue to find payment card data enticing. And despite the increasingly stringent safeguards designed to prevent misappropriation, payment credentials are routinely compromised. We have recently written about...more

2 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide