News & Analysis as of

Cyber Attacks Hackers Spoofing

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

Porter Hedges LLP

Cyber Alert: Business Email Compromise Schemes Increasing

Porter Hedges LLP on

We’ve all heard the sad story: A transaction is about to close. The buyer is preparing to wire funds to the seller. Unbeknownst to the buyer, a hacker has hijacked the parties’ email communications to replace the wiring...more

McAfee & Taft

Beware of phishing schemes relating to aviation escrow matters

McAfee & Taft on

The McAfee & Taft Aviation Group has recently seen an increase in the number of phishing schemes relating to aviation escrow matters. Phishing is the fraudulent attempt to obtain sensitive information or data, such as...more

Epstein Becker & Green

Cyber Coverage in the Age of COVID-19 Need Not Result in Pandemonium

Epstein Becker & Green on

While businesses and their employees continue to operate in the “new frontier” of working-from-home during the COVID-19 pandemic and the gradual reopening of the economy, a serious risk continues to present itself: the threat...more

Zelle  LLP

Conflicts in Circuits’ Approach to Email Scams Hold Lessons

Zelle LLP on

With unprecedented activity online, cybercrime is growing in frequency, sophistication and aggregate effect. Despite the increased visibility of cybercrime, cybersecurity continues to lag behind this curve. Cybercriminals...more

Farella Braun + Martel LLP

Are Losses Resulting from Phishing Incidents Covered by Crime Policies Insuring Against Computer Fraud?

It is an all-too-common dilemma. As phishing schemes have become more prevalent and more sophisticated, businesses of all sizes have fallen victim to these attacks where a fraudster will use a spoofed email or other deceptive...more

Skadden, Arps, Slate, Meagher & Flom LLP

Cross-Border Investigations Update - January 2019

This issue of Skadden’s semiannual Cross-Border Investigations Update takes a close look at recent cases, regulatory activity and other key developments, including DOJ guidance on the use of corporate monitors in criminal...more

Sheppard Mullin Richter & Hampton LLP

Fool Me Twice…SEC’s latest Cyber-Fraud ROI Indicates Future Enforcement Against Hacker Victims

In the aftermath of the Securities and Exchange Commission’s (“SEC”) latest Report of Investigation (“Report”) regarding cyberattacks via “spoofed or manipulated electronic communications,” companies should prepare to adjust...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - November 2018

Robinson & Cole LLP on

Non-profit organizations collect, use and disclose personal information just like any other for-profit industry. However, non-profit organizations often don’t have the same resources to devote to data security as their...more

Bradley Arant Boult Cummings LLP

Cyber Insurance: Court’s Recent Decisions May Change What Your Policy Covers

Cyber incidents can take many forms—phishing, insider theft, SQL injection, malware, denial of service, session hijacking, credential farming, or just old fashion “hacking.” Although many of these attack vectors employ...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - August 2018

Robinson & Cole LLP on

Russian Hackers Successfully Phished Hundreds of U.S. Companies Last Year - The Department of Homeland Security (DHS) has indicated that Russian hackers successful attacked the energy, nuclear, aviation, and critical...more

Pillsbury - Policyholder Pulse blog

Two New Federal Decisions Are Beacons for Policyholders Navigating Computer Fraud Claims for Spoofing Losses

On insurance coverage issues, sometimes the boat seems to be listing in the wrong direction. For example, insurers have long tilted the decks to avoid coverage for “spoofing” attacks and similar kinds of email fraud by...more

White and Williams LLP

Second Circuit Holds Phishing Email Using PHP Script is Covered “Computer Fraud”

Scams from business compromise emails (BECs) have been labeled by the FBI as a “$5 billion” problem. Sometimes known as “CEO Fraud,” BECs are where an email, purportedly coming from a high-ranking company official or vendor,...more

Snell & Wilmer

Business Email Compromise: What It Is and What You Can Do

Snell & Wilmer on

Business email compromise (“BEC”) is a type of cyberattack that is increasing at an alarming pace. The U.S. Federal Bureau of Investigation estimated in a May 2017 alert that global losses due to BEC scams totaled more than...more

Poyner Spruill LLP

CyberSecurity Concerns - Hackers, The Seventh Fleet And Human Error

Poyner Spruill LLP on

When the USS John S. McCain collided with the tanker Alnic MC near Singapore, it was the third such collision this summer. The ship sustained damage at the waterline, flooding a crew sleeping area. Such incidents are...more

15 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide