News & Analysis as of

Cyber Crimes

Fraud and Forgery: From Vintage Violins to Today’s Real Estate Transaction

Fraud has a long history. In a recent blog in the Orchestrating Real Estate Series, New Things to Consider in Section 1031 after the Tax Cut and Jobs Act of 2017, I discussed how famous violin maker Jean-Phillipe...more

SEC Releases Interpretive Guidance on Cybersecurity Risk and Incident Disclosures

by Moore & Van Allen PLLC on

On Feb. 22, 2018, the Securities and Exchange Commission (SEC) issued its first interpretive guidance since October 2011 on public companies’ cybersecurity risk and incident disclosure obligations. ...more

Pipeline Companies Targeted by Cyber-Attacks

Reports show that U.S. energy companies reported more than 350 cybersecurity incidents to the U.S. Department of Homeland Security between 2011 and 2015. Pipeline companies are included in that statistic....more

Data Breach Notification Coming to Canada

by Littler on

The Government of Canada has announced that its proposed data breach notification requirements pursuant to the Digital Privacy Act (the “Act”) will take effect on November 1, 2018. The Act amends Canada’s Personal...more

Blockchain Provides Opportunity for Financial Services Companies

by Epiq on

The global financial system is a network that efficiently moves trillions of dollars among billions of people every day, but it’s constantly threatened by fraud and crime....more

Tax Season Brings Resurgence in Form W-2 Tax Scam

by Locke Lord LLP on

There are three certainties in life: death, taxes, and the knowledge that Ben Franklin’s famous adage will be co-opted. A twenty-first century version of it may be that “in this world nothing can be said to be certain, except...more

Privacy Perils: Not I Said the Fly, Nor Me Said the Bee

by Bass, Berry & Sims PLC on

We have all been cautioned so often about the risks of opening malware-infected email attachments, or clicking on fraudulent links embedded in an email, we can become desensitized to the actual danger. We think "surely, in...more

Have You Covered Your Basics? A Cybersecurity Checkup: Part 1 (5min)

by Winstead PC on

In over a decade watching cybersecurity threats evolve and organizations respond, it strikes me that every organization has to start from the basics and is challenged to retain that core focus, no matter how expansive their...more

Privacy & Cybersecurity Update - March 2018

In this month's edition of our Privacy & Cybersecurity Update, we discuss all 50 states now having data breach notification laws, state attorneys general and their opposition to a federal data breach notification law, the FBI...more

The Warning Behind the Numbers: New York’s 2017 Data Breach Report

On its face, last week’s report that the number of data breaches reported last year to New York’s Attorney General spiked to an all-time high of 1,583 – up 23 percent from 2016 – was not good news....more

You May Not Have the Insurance Coverage for Computer Fraud That You Think You Do

by Newmeyer & Dillion LLP on

If you think you have adequately protected your company by purchasing a computer fraud insurance policy, you may be wrong. Exclusions in the policy may result in your insurance carrier being able to deny coverage for some...more

What to Consider On Day One of a Data Breach

Prepare yourself for a possible data breach with these helpful tips from Pillsbury lawyer Mercedes Tunstall. On Pillsbury’s Cybersecurity.law microsite, Tunstall discusses the Who, What and When of responding to a breach....more

The IRS Criminal Investigation Division Releases Its Annual Report for 2017

by Moskowitz LLP on

The purpose of the IRS Criminal Investigation (IRS CI) Division is to investigate criminal violations of the Internal Revenue Code and other related financial crimes to ensure compliance with the law and public confidence in...more

North Carolina Security Breach Report 2017

by Moore & Van Allen PLLC on

According to the recently released North Carolina Attorney General Security Breach Report, nearly 5,337,154 North Carolinians were impacted by security breaches in 2017. ...more

Verizon Protected Health Information Data Breach Report Concludes that Insiders Are Greatest Threat to Health Care Entities

Verizon recently issued its Protected Health Information (PHI) Data Breach Report, which is always an interesting read. Not surprisingly, Verizon’s report concludes that based upon analysis of 1,360 security incidents...more

Data Privacy + Cybersecurity Insider - March 2018 #3

by Robinson & Cole LLP on

Verizon's Protected Health Information Data Breach Report Concludes that Insiders Are Greatest Threat to Health Care Entities - Verizon recently issued its Protected Health Information Data Breach Report, which is always...more

Lauri Love – How high has the forum bar really been set?

by White & Case LLP on

In what has been hailed as a landmark decision, the High Court recently refused to allow the extradition of UK citizen Lauri Love to the USA for offences of cyber theft, activating the forum bar for the first time since its...more

Monday Briefing: Hacks, Public Companies and the SEC

With the U.S. Securities and Exchange Commission’s updated cybersecurity guidance hot off the press, let’s start the week by taking a look at public company cyberattack reporting statistics....more

Domain Names: The dangers of “snapping”

by Hogan Lovells on

DNS Belgium, the Registry operating the .BE country code Top Level Domain (ccTLD), recently published an article warning domain name owners of the risks inherent in the practice of “snapping”. ...more

FBI Issues New Warning to Businesses About Phishing Campaigns

In a recent Public Service Announcement dated February 21, 2018 entitled “Increase in W-2 Phishing Campaigns,” the Federal Bureau of Investigations (FBI) issued another alert about an increase in phishing campaigns since the...more

Data Privacy + Cybersecurity Insider - March 2018 #2

by Robinson & Cole LLP on

Cybersecurity Task Force Launched in Arizona - Arizona Governor Doug Ducey launched the Arizona Cybersecurity Team (ACT) by Executive Order on March 1, 2018. The ACT is comprised of 22 members representing officials from...more

SEC Cybersecurity Disclosure and Controls Checklist

In February 2018 the SEC outlined its views with respect to cybersecurity disclosure requirements under the federal securities laws as they apply to public reporting companies. Set forth below is a checklist of items included...more

Small and Mid-Sized Companies are the New Targets of Business Email Compromise

by Womble Bond Dickinson on

Originally published in the Upstate Business Journal on February 15, 2018. Meet Peter — a longtime employee and the backbone of your business’s day-to-day finance and accounting operations. Today he got an email from the...more

Washington Suburb Targeted by Cybercrime and Ransomware Attacks – Cyber News

by White and Williams LLP on

A recent report from The Seattle Times provides details on a series of social engineering and ransomware attacks successfully perpetrated on a Seattle suburb during the second half of 2017. The incidents of cyber scams...more

SEC Guidance Focuses on Cybersecurity Procedures and Disclosure Issues

On Feb. 21, the Securities and Exchange Commission (SEC) released interpretive guidance on public companies’ disclosure practices regarding cybersecurity breaches and risks to the public....more

672 Results
|
View per page
Page: of 27
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.