News & Analysis as of

Spoofing Cyber Attacks Fraud

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

BCLP

Navigating Legal Challenges In French Civil Fraud Cases: An In-depth Analysis

BCLP on

In recent years, banking fraud in France has surged, driven by advanced technology and the integration of payment methods and mobile banking. We do a deep dive into the legislation to help our clients stay informed and...more

Robinson+Cole Data Privacy + Security Insider

Threat Groups Using Translation Tools in Phishing Attacks

It used to be that one of the sure ways to identify a phishing email was to notice grammatical errors or broken English in the text of the communication. Thanks to new translation tools like Google Translate, that are...more

Lowenstein Sandler LLP

Fintech Company Secures Indemnity Coverage Under Professional Liability Policy for Fraudulent Funds Transfer Claim

Lowenstein Sandler LLP on

What You Need To Know: - Recent case law is trending favorably for policyholders to secure coverage for computer fraud claims under a wide array of insurance policies. - Because several types of policies may be...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide