News & Analysis as of

Email Cybersecurity

Business Email Compromise: What It Is and What You Can Do

by Snell & Wilmer on

Business email compromise (“BEC”) is a type of cyberattack that is increasing at an alarming pace. The U.S. Federal Bureau of Investigation estimated in a May 2017 alert that global losses due to BEC scams totaled more than...more

Energy and Critical Infrastructure Industries Warned of Increased Attacks by FBI and DHS

The FBI and Department of Homeland Security issued a joint statement on October 20 warning of an increased danger of a malicious “multi-stage intrusion campaign” to critical infrastructure industries, including the energy...more

Data Privacy + Cybersecurity Insider - October 2017 #3

by Robinson & Cole LLP on

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more

Privacy Perils: Phishing in the Ocean of Apps

by Bass, Berry & Sims PLC on

News about phishing attacks implemented through email and websites is very common (see Déjà vu All Over Again; American Express – New Bait for an Old Phishing Lure; Beware of Text Scam, iPhone Users; Beware New Hacker Scheme...more

Privacy & Cybersecurity Update - September 2017

In this month's edition of our Privacy & Cybersecurity Update, we take a look at the first annual review of the Privacy Shield by U.S. and EU officials, and the Federal Trade Commission's first actions alleging Privacy Shield...more

Cybersecurity Best Practices

by Seyfarth Shaw LLP on

When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more

US-CERT Warns of Potential Hurricane Harvey Phishing Scams

As if the devastating effects of Hurricane Harvey are not bad enough, the United States Computer Emergency Readiness Team (US-CERT) of the Department of Homeland Security is warning of a different threat: falling victim (or...more

Two Court Rulings Show Coverage Difficulties for “Fake President” Fraud

by Nossaman LLP on

A few weeks back, the Insurance Recovery report posted a blog about the difficulty obtaining insurance coverage for “fake president” fraud, which is also known as business e-mail compromise, or social engineering fraud. Two...more

Follow the Money and Beware the Extra “L”: First Department Sustains Claims against Fund Administrator After Hackers Grab Millions

A legal feud is underway between the world’s biggest hedge fund administrator and a former client over an email scam that resulted in hackers stealing millions in client funds. And not surprisingly, the time-honored...more

Cybersecurity: Spear Phishing Covered Under Insurance Policy Where Code Manipulated

by Bennett Jones LLP on

Increasingly, insureds faced with cyber fraud losses are going to the courts to interpret their policies. In The Brick Warehouse LP v. Chubb Insurance Company of Canada, 2017 ABQB 413 [The Brick Warehouse], and in Taylor &...more

DOJ Asks SCOTUS to Take on Microsoft Case and Verizon Suffers its own Data Breach: eDiscovery Trends

by CloudNine on

A rare two-topic day, but both are notable… Remember the Microsoft Ireland Warrant case, where the Second Circuit reversed earlier rulings and denied the government’s efforts to compel Microsoft to provide emails in that...more

The Remedy for the New Cyber Threat Posing Major Coverage Problems: “Fake President” E-mails

by Nossaman LLP on

In the last few weeks, we have seen yet another widespread ransomware attack that hit nearly one hundred companies around the world. It reminded me of a recent request from a client, made just after news broke of the...more

Alabama Man Sentenced to Prison for Elaborate “Phishing” Scheme

by Balch & Bingham LLP on

An Alabama man has been sentenced to spend six months in prison for illegally accessing the personal information of over fifty women. For over two years, Kevin Maldonado engaged in a hacking technique called “phishing,”...more

Southern Oregon University Victim of Phishing Scheme

Last month, Southern Oregon University (SOU) announced that it was the victim of a $1.9 million phishing scheme. SOU received an email purportedly from their contractor, Anderson Construction, requesting the April payment for...more

What Lawyers Should Know To Avoid Online Scams

According to a February 2017 American Bar Association press release, “cyber-related risks have escalated based on the sensitivity and nefarious uses of that data. Last year, for example, the Manhattan U.S. attorney’s office...more

Phishing Lures: What To Do If You’ve Taken The Bait - U.S. Version

by Dickinson Wright on

Sometimes, it’s easy to know you’re being phished. There’s little chance that a bank administrator in a country you’ve never heard of really needs your help to get the unclaimed money of a deceased, rich foreigner out of the...more

Cyber Issues in Shipping

by Reed Smith on

We have had reports of an email scam being circulated amongst owners and charterers and, in particular, being sent to ships. These emails are being sent by scammers posing as law firms in order to distribute malware,...more

Before You Hit “Send”: Ensuring Your Attorney-Client Emails Comply with the new ABA Guidance

by Patrick Law Group, LLC on

Today’s attorneys rely heavily on technology to communicate with clients, especially email. At the same time, given the sensitive nature of many attorney-client communications and the potential windfall to anyone who...more

US-CERT Encourages Companies to Act on FBI Guidance to Protect Email Systems

Recently the United States Computer Emergency Readiness Team (US-CERT), an organization within the Department of Homeland Security’s (DHS) National Protection and Programs Directorate (NPPD) and a branch of the Office of...more

Encrypting Emails: ABA Issues New Guidance Addressing Security Concerns over Attorney-Client Communications

In May, the American Bar Association (“ABA”) released a Formal Opinion 477, providing guidance on attorney use of emails in communication with clients. In doing so, the ABA has promulgated a new standard when considering the...more

China's revised draft data localisation measures

by Hogan Lovells on

On 19 May 2017, the Cyberspace Administration of China (the “CAC“) released a revised draft of its Security Assessment for Personal Information and Important Data Transmitted Outside of the People’s Republic of China Measures...more

ABA Encourages Encryption of Emails When Transmitting Confidential Client Information

by Seyfarth Shaw LLP on

In a recent formal Ethics Opinion, the American Bar Association stressed that lawyers must make reasonable efforts to prevent inadvertent or unauthorized access to confidential information relating to the representation of...more

DocuSign Breach Leads to Email Malware Campaign Requesting Wire Transfers

Electronic signature technology company DocuSign has admitted that it suffered a breach of one of its computer systems resulting in stolen data including customer and user email addresses. The breach has allowed the hackers...more

Watch What You Click (Again!): DocuSign Confirms Data Breach Incident

by Selman Breitman LLP on

Well-known and very popular digital signature service DocuSign acknowledged a data breach incident in which a large number of customer email addresses were stolen. The company announced on its website that the data stolen was...more

Helping To Protect Your Company From A Cyber-Attack: Eight Tips For Human Resources Professionals And In-House Employment Counsel

by Littler on

Recent, highly publicized data security incidents highlight the continued vulnerability of corporate information systems. Notably, employees who fall prey to sophisticated phishing e-mails and other scams often contribute to...more

98 Results
|
View per page
Page: of 4
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.