News & Analysis as of

Malware Cyber Crimes Email

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #263 – Fake Emails and Texts Spoofing UPS and FedEx

Cyber criminals are taking advantage of the increase in online holiday shopping due to the pandemic. They know people are buying gifts online and sending the packages to the recipients. Often, the recipients do not know they...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #226 – Beware – Well-Known Brands Used for Phishing Schemes

A new study by Check Point Research shows that cyber criminals are using well-known brands to lure victims into clicking on nefarious links, providing personal information or credentials, or getting users to transfer money....more

Zelle  LLP

Conflicts in Circuits’ Approach to Email Scams Hold Lessons

Zelle LLP on

With unprecedented activity online, cybercrime is growing in frequency, sophistication and aggregate effect. Despite the increased visibility of cybercrime, cybersecurity continues to lag behind this curve. Cybercriminals...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - July 2019 #4

Robinson & Cole LLP on

Security research firm Gigamon has reported that the nasty cybercriminal group FIN8 may have reappeared in June after a two-year silence. FIN8 is known for implementing malware on point of sale systems to steal credit card...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #155 - Home Buyers Tricked Out of Down Payments by Scammers

An old trick is coming back and working. It is a wire fraud scheme targeted at homeowners instead of businesses, and it is happening at an alarming rate....more

Robinson+Cole Data Privacy + Security Insider

Botnet Necurs Turns Its Focus On Banks

Just days after the FBI issued a private warning to the banking industry, the botnet network known as Necurs began a spamming campaign that targeted the banking industry. The activity was discovered by the security research...more

Burr & Forman

Best Practices to Detect and Prevent File-Less and Click-Less Malware

Burr & Forman on

Hackers are clever at exploiting weaknesses in an organization’s systems. They are also efficient. After an organization installs robust cybersecurity controls, hackers will typically look for an easier target or they will...more

Bass, Berry & Sims PLC

Privacy Perils: Not I Said the Fly, Nor Me Said the Bee

We have all been cautioned so often about the risks of opening malware-infected email attachments, or clicking on fraudulent links embedded in an email, we can become desensitized to the actual danger. We think "surely, in...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - November 2017 #3

Robinson & Cole LLP on

We previously warned readers about the Locky ransomware, which is potent and designed to use phishing emails to lure users to click on links and attachments, including pdfs. Now, researchers at Cylance have discovered...more

Robinson+Cole Data Privacy + Security Insider

Energy and Critical Infrastructure Industries Warned of Increased Attacks by FBI and DHS

The FBI and Department of Homeland Security issued a joint statement on October 20 warning of an increased danger of a malicious “multi-stage intrusion campaign” to critical infrastructure industries, including the energy...more

King & Spalding

United States Department Of Justice Seeks To Dismantle Massive Kelihos Botnet, Files Complaint In Federal District Court

King & Spalding on

The United States Department of Justice (“DOJ”) recently announced that it would be undertaking an “extensive effort to disrupt and dismantle the Kelihos botnet – a global network of tens of thousands of infected computers...more

Patterson Belknap Webb & Tyler LLP

FBI Issues Ransomware Warning

Amid cyber-attacks that have spread around the globe affecting at least 150 countries, the Federal Bureau of Investigation has issued a FLASH report warning of the effects of a ransomware known as “WannaCry.” The warning –...more

Robinson+Cole Data Privacy + Security Insider

IBM Issues 2017 X-Force Threat Intelligence Index Findings

Last week, IBM published its X-Force Threat Intelligence Index (Index), which summarizes the state of leaked records and vulnerabilities to data in 2016. It is depressing, but informative....more

Fisher Phillips

Let's Go Phishing!

Fisher Phillips on

Emails, lots and lots of emails, filling our inboxes. Even with the best security and filters, it seems that hackers are simply building better mousetraps. The bigger problem, however, is the trusting nature of individuals...more

Robinson+Cole Data Privacy + Security Insider

Los Angeles Community College Pays Ransomware to Retrieve Data

On December 30, 2016, the Los Angeles Community College computer network was kidnapped by cyber criminals requesting a ransom for its return. The ransomware encrypted the college’s entire network system, including...more

Cadwalader, Wickersham & Taft LLP

Law Firm Data Breaches Demonstrate the Expanding Scope of Cyber Attacks

In a case of “cyber meets securities fraud,” the United States Attorney’s Office for the Southern District of New York (“SDNY”) recently indicted three foreign nationals on charges of insider trading, wire fraud, and computer...more

Patterson Belknap Webb & Tyler LLP

Indictment Issued in Law Firm Hacks

In what New York’s top federal prosecutor called a “wake-up call for law firms around the world,” three Chinese citizens have been charged with hacking into the servers of two prominent – but unidentified – international law...more

Robinson+Cole Data Privacy + Security Insider

Phishing as a Service

A recent report from Imperva, Inc. has identified a Phishing as a Service (PhaaS) being offered on a Russian website. The United States Computer Emergency Readiness Team defines phishing as “an attempt by an individual or...more

King & Spalding

Project CAMERASHY Details Cyberespionage By China’s Military

King & Spalding on

In a story reminiscent of a Tom Clancy plot, the Wall Street Journal reported last Thursday on “meticulously documented” cyberespionage conducted by China’s People’s Liberation Army (“PLA”) Unit 78020 to further strategic...more

19 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide