The IP of Everything Podcast - Episode 22 - The IP of Dog Toys
JONES DAY TALKS®: CFTC and DOJ Target Derivatives Trading Across Industries
In an increasingly digital world, the rise in cybercrime involving email scams has become a significant threat to individuals and organizations alike. These sophisticated attacks exploit human psychology and technological...more
A genuine looking email is sent to a company’s accounts payable department with instructions from its president to pay money to a certain account. The “To” and “From” headers and the signature block look identical to hundreds...more
Your CFO or accounts payable clerk receives a legitimate-looking email supposedly from the company’s president authorizing a wire transfer to a vendor or business partner. In reliance on that email, the company’s bank is...more
Consider the following two scenarios resulting in identical losses, but potentially two entirely different insurance coverage outcomes. In the first instance, a thief hacks, or gains unauthorized entry, into an insured’s...more
What You Need To Know: - Recent case law is trending favorably for policyholders to secure coverage for computer fraud claims under a wide array of insurance policies. - Because several types of policies may be...more
With unprecedented activity online, cybercrime is growing in frequency, sophistication and aggregate effect. Despite the increased visibility of cybercrime, cybersecurity continues to lag behind this curve. Cybercriminals...more
It is an all-too-common dilemma. As phishing schemes have become more prevalent and more sophisticated, businesses of all sizes have fallen victim to these attacks where a fraudster will use a spoofed email or other deceptive...more
Insurance Coverage – Computer Fraud – E-Mail "Spoofing" - Trick or Treat Editors' Note: Does anything cause deeper mortal terror than the prospect of an uncovered loss? In a tale that has an all-too infrequent happy ending...more
Insurance Coverage – Computer Fraud – E-Mail “Spoofing” - Medidata Sols., Inc. v. Fed. Ins. Co., 729 Fed. Appx. 117 (2d Cir. 2018), 2018 U.S. App. Lexis 18376, 2018 WL 3339245 - Risk Management Issue: Is e-mail “spoofing”...more
Cyber incidents can take many forms—phishing, insider theft, SQL injection, malware, denial of service, session hijacking, credential farming, or just old fashion “hacking.” Although many of these attack vectors employ...more
In this month's edition of our Privacy & Cybersecurity Update, we examine California's new sweeping privacy law, two U.S. agencies' report on "botnet" threats and the European Parliament's call to suspend the Privacy Shield....more
On insurance coverage issues, sometimes the boat seems to be listing in the wrong direction. For example, insurers have long tilted the decks to avoid coverage for “spoofing” attacks and similar kinds of email fraud by...more
Scams from business compromise emails (BECs) have been labeled by the FBI as a “$5 billion” problem. Sometimes known as “CEO Fraud,” BECs are where an email, purportedly coming from a high-ranking company official or vendor,...more
The “business compromise email” is what the FBI calls the “$5 billion scam,” but apparently an insurance company did not agree with an insured company that they had been the victim of a crime....more
The growing percentage of businesses that purchase cyber security and data privacy insurance portends a growing number of claims and, inevitably, litigation over some of those claims. Wells Fargo’s 2015 Cyber Security and...more