Crypto & Politics: Insights from Former Congressman David McIntosh
Mail and Wire Fraud Claims - RICO Report Podcast
Wire Fraud Scams: What You Need to Know - The Consumer Finance Podcast
Anatomy of a Successful Motion to Dismiss in RICO Case
Phishing: Cybersecurity’s Biggest Threat
Law Brief®: The Theranos Trial
Digging Deeper, Episode 1: The Con Queen of Hollywood
In less than 100 days, the Trump administration has implemented a dizzying array of new tariffs, significantly increasing costs and complexity for U.S. importers. The administration is keenly aware that companies operating in...more
The Town of Enfield, New Hampshire, appears to have been the victim of a man-in-the-middle scheme involving the transfer of $742,000 to a fraudulent bank account. The town is constructing a new $7.2 million public safety...more
Risk Trend - This risk alert highlights a recent trend of criminals using fraudulent wire transfer schemes to target financial institutions and the steps that clients can take to mitigate this increasing risk. We have...more
Wire fraud threats have been on the rise in recent years, with Hong Kong becoming a particularly attractive destination for fraudsters due to its status as a global financial hub. Criminals are using increasingly...more
Join Warner Norcross + Judd LLP attorneys Madelaine Lane, Kelly Hollingsworth and Nate Steed for a webinar focused on preventing and mitigating wire transfer fraud. Cyber criminals are utilizing phishing emails and other...more
Tips on Preparing to Defend Against Allegations of SBA Loan Fraud During the COVID-19 Crisis - Federal emergency relief legislation—including the Coronavirus Aid, Recovery, and Economic Security Act (“CARES Act”)—has...more
Cybersecurity and Privacy - Despite cries from corporations and privacy advocates across America for a unified federal privacy law, the nation’s toughest privacy law—the California Consumer Privacy Act (CCPA)—went into...more
Imagine this scenario: you’ve had a productive and mutually advantageous ongoing contractual relationship of several years with another party. You have built up quite a bit of trust over the years, and communicate regularly...more
We live in an age of escalating cybersecurity threats. Many intrusion threats are social engineering attacks, which seek to gain entry to an organization's computer systems via its personnel and not a hack to the computer...more
An increasing number of businesses are targeted by very sophisticated email scams designed to convince company employees responsible for executing financial transactions to wire funds to overseas accounts controlled by...more