News & Analysis as of

Email Hackers

Jackson Lewis P.C.

Failure to Safeguard, Two Cyber Intrusions, and an $850,000 SEC Settlement

Jackson Lewis P.C. on

Virtually all organizations have an obligation to safeguard their personal data against unauthorized access or use. Failure to comply with such obligations can lead to significant financial and reputational harm. In a...more

BakerHostetler

We Talkin’ About Security. Or Are We? Another Look at the FTC’s Recent Settlement with Security Firm Verkada

BakerHostetler on

As we wrote about last week, the Federal Trade Commission (FTC) recently announced that it had entered a proposed settlement with video equipment surveillance company Verkada over the company’s alleged security failures....more

Bricker Graydon LLP

Scammers, SSNs, and Smelling Funny

Bricker Graydon LLP on

I was hanging out with my friend this weekend, both catching up on emails from a coffee shop. After a while, he turned to me. “Well sh*t. Looks like my social security number might be on the dark web.”...more

Kohrman Jackson & Krantz LLP

Victims of Concealed Online Attacks in Ohio Now Have More Time to File Suit

Last week, the Ohio Supreme Court ruled that victims of anonymous online attacks have an extension of time to file a lawsuit, holding that they can file a suit one year from date the targeted publication is discovered. This...more

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

Kohrman Jackson & Krantz LLP

How a John Doe Lawsuit Can Help You Unmask the Source of Fake Reviews, Defamation, and Harassment

The internet holds some of the largest threats an individual or business can face in 2024. Online threats can become even more challenging to address when the attacker acts anonymously...more

Katten Muchin Rosenman LLP

Gone Phishing – Vigilance in the New Scam Era - Kattison Avenue | Issue 12

"Thank you for your order." "We tried delivering your package." We have all seen these subject lines in our inbox, but some are not so innocent. Business impersonation scams are not new, but some of their tricks are. These...more

NAVEX

Immediate vs. Slow Burn Risks: A Balanced Cybersecurity Strategy

NAVEX on

The consequences of a cyberattack can be catastrophic, as we saw in the previous blog of this series. Cybersecurity is a business-wide responsibility that demands a proactive strategy extending far beyond technical solutions...more

Vinson & Elkins LLP

Who’s to Blame: Texas Federal Court Finds Contractual Counterparty Not Liable for Third-Party Wire Transfer Fraud

Vinson & Elkins LLP on

The facts are an oft-told business email compromise horror story: a hacker interjects themselves into an email discussion of a business deal, changes the wire instructions to their own account, and disappears with the...more

Mitratech Holdings, Inc

6 Ways Email & Spreadsheets Fall Short For Immigration Case Management

Managing immigration cases can be a complex and time-consuming process. With numerous documents, forms, deadlines, and client communication to juggle, relying on traditional methods like email and spreadsheets fall short....more

Constangy, Brooks, Smith & Prophete, LLP

Top ten cybersecurity tips for organizations during the holiday season

‘Tis the season for the hustle and bustle of year-end holiday activities. With that comes the increased risk of cybercriminals exploiting the season to find vulnerabilities. This includes taking advantage of increased online...more

Adams and Reese LLP

FinCEN Issues Alert of Scam E-Mail to Fraudulently Solicit BOI Reporting

Adams and Reese LLP on

The U.S. Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) has posted an alert stating it has been notified of recent fraudulent attempts by hackers to solicit information from individuals and...more

Tarter Krinsky & Drogin LLP

Be Cyber Aware

Hackers commit financial fraud by creating a fake email address mimicking the vendor’s name and emailing accounts payable saying that the vendor’s account information has been changed. Funds are then sent directly to the...more

Console and Associates, P.C.

NIH Federal Credit Union Notifies 14,706 Members of Data Breach

On July 5, 2023, the National Institutes of Health Federal Credit Union filed a notice of data breach with the Attorney General of Maine following the company’s discovery that an unauthorized party was able to get into an...more

Foley Hoag LLP - Security, Privacy and the...

As If Bank Failures Aren’t Enough – Hackers Are Exploiting the Chaos to Breach Security

The Massachusetts State Police Commonwealth Fusion Center (CFC) believes that cyber actors may use the current bank failures for future phishing and business email compromise (BEC) attacks. Cyber actors often use current...more

Constangy, Brooks, Smith & Prophete, LLP

Business email compromise: What you can do to prevent fraud and recover funds

Fight back against this major cyber threat. Business Email Compromise is one of the greatest cyber threats to businesses of all sizes and industries, particularly those involved in regular wire transfers of funds....more

Bass, Berry & Sims PLC

Privacy Peril: Don’t Sock it To Me

Bass, Berry & Sims PLC on

A recent Bleeping Computer article detailed a new phishing attack scheme originating from an Iranian-aligned hacking group leveraging the “social proof” psychology principle. First coined by Professor Robert Cialdini in...more

Shutts & Bowen LLP

Ransomware and Phishing Dangers On the Rise

Shutts & Bowen LLP on

Internet users have (mostly) learned to avoid scams by supposed Nigerian princes looking to share a vast inheritance, and there has been a rise in awareness of other common signs of phishing attempts, such as poor spelling...more

Woodruff Sawyer

Scams and Viruses: Which Email Attachments Are Safe to Open?

Woodruff Sawyer on

Email scams and viruses are nothing new—threats like phishing emails and malware have been around since the days when services like AOL still dominated the internet and email landscape. However, while technology has made a...more

Wiley Rein LLP

Court Holds Social Engineering Fraud Does Not Trigger Computer Fraud Coverage

Wiley Rein LLP on

The United States District Court for the District of Minnesota, applying Minnesota law, has held that an insured’s loss resulting from the insured’s payment of fraudulent invoices received from a bad actor who hacked into the...more

Carlton Fields

Federal Court Rules “Unauthorized Network Access Exclusion” Precludes Coverage for $1.3M Payment From Hacker’s Fraudulent Email

Carlton Fields on

The U.S. District Court for the Eastern District of Pennsylvania ruled that an insurance policy issued by Federal Insurance Co. excluded coverage for the transmission of $1.3 million by the insured in response to an email...more

Bass, Berry & Sims PLC

Privacy Peril: Stealers Wheel (Stuck in the Middle with You)

Bass, Berry & Sims PLC on

In one type of “man-in-the-middle” (MITM or MTM) attack, a bad actor inserts himself between a user (individual or business) and a web application (such as a bank’s website) to capture sensitive or personal confidential...more

Bass, Berry & Sims PLC

Privacy Peril:Chatty Cathy

Bass, Berry & Sims PLC on

We are all increasingly familiar with, and probably increasingly frustrated by, the use of chatbots to attempt to solve some problem we are having with a company, often delivery of a purchased item. The “virtual agent” (not...more

Robinson+Cole Data Privacy + Security Insider

Mailchimp Suffers a Data Breach

This week we learned that the email and social media marketing company Mailchimp suffered a data breach that allowed an intruder to view 319 Mailchimp accounts. According to multiple sources, audience data were accessed from...more

Wyrick Robbins Yates & Ponton LLP

Fraudulent Wire Transfers: Who Bears the Loss and How to Prevent Becoming A Victim

Cybercriminals exploited remote work during the COVID-19 pandemic.  In 2020, the FBI’s Internet Crime Complaint Center (IC3) saw a record 70% increase in the number of reported internet scams and losses exceeding $4.2...more

171 Results
 / 
View per page
Page: of 7

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide