News & Analysis as of

Today's Popular Updates Scams Phishing Scams

A repository for the most well-read content on JD Supra at any given time, along with occasional roundups of popular content by specific topic. Also stop by for monthly recaps of hot articles for the previous... more +
A repository for the most well-read content on JD Supra at any given time, along with occasional roundups of popular content by specific topic. Also stop by for monthly recaps of hot articles for the previous thirty days. less -
BakerHostetler

Deeper Dive: Understanding the 2023-24 Crypto Threat Landscape

BakerHostetler on

As the Web3 and digital assets ecosystem continues to grow, hacks, scams and other threats remain a major cause for concern and a potential impediment to broader adoption. Data from various sources indicates that after a year...more

Dorsey & Whitney LLP

Cybercrime Trends: A Midyear Review

Dorsey & Whitney LLP on

Cybercriminals continue to outpace the best efforts of regulators, law enforcement, and cybersecurity professionals. Recent reporting from the Federal Bureau of Investigation demonstrates that cybercriminals are increasingly...more

Foodman CPAs & Advisors

Holiday Scams Propelled By Artificial Intelligence

Foodman CPAs & Advisors on

On 11/22/23, the U.S. Department of the Treasury’s Office of Cybersecurity and Critical Infrastructure Protection office released an advisory providing tips to consumers to avoid becoming the victim of cyber or online...more

K2 Integrity

As Cryptocurrency Becomes More Mainstream, Payment Scam Risks Increase

K2 Integrity on

Payment scams exploiting the lure of cryptocurrency are a growing concern for individuals and businesses—losses from crypto scams increased from $907 million in 2021 to $2.57 billion in 2022. These scams typically involve...more

Ervin Cohen & Jessup LLP

Email Scam Losses May Find Recourse Via Cyber Or Business Interruption Coverage

Losses arising from email scams are usually covered, if at all, under a company’s crime policy. But a recent decision from The District Court in Minnesota suggests that recourse may also be found under an insured’s cyber or...more

BakerHostetler

Top NFT-Related Cybersecurity, Phishing, Hacking and Other Risks in 2022

BakerHostetler on

The continued growth of the market for nonfungible tokens (NFTs) in 2022 has helped shape the zeitgeist of what has been referenced colloquially by some as the “fourth industrial revolution,” defined largely by network effect...more

Woodruff Sawyer

Scams and Viruses: Which Email Attachments Are Safe to Open?

Woodruff Sawyer on

Email scams and viruses are nothing new—threats like phishing emails and malware have been around since the days when services like AOL still dominated the internet and email landscape. However, while technology has made a...more

Bass, Berry & Sims PLC

Privacy Peril: New Invoice – Action Required!

Bass, Berry & Sims PLC on

According to Microsoft, 91% of cyberattacks start with an email. In an earlier Privacy Peril we provided information on prevalent words phishers of men and women insert in an email subject line to grab the recipient’s...more

Lowenstein Sandler LLP

Contradictory Responses by Privacy Regulators Post-COVID-19: Balancing the Economy With Cybersecurity in a Changed World (Privacy)

The COVID-19 pandemic has had a disparate effect on privacy regulators, with varying levels of enforcement advocated by different government entities; the California Attorney General, the U.S. Department of Health & Human...more

Alston & Bird

Cybersecurity and COVID-19: Four Categories of Cyber Threats and Practical Tips in Response

Alston & Bird on

Our Cybersecurity Preparedness & Response Team discusses the current COVID-19 threat landscape, focusing on four major categories of threats and highlighting practical steps companies can take in response....more

Epiq

How to Avoid Falling Victim to Wire Transfer Fraud

Epiq on

According to the Association for Financial Professionals’ Payment and Fraud Controls report, 2017 was a record year for payment fraud. The tactics employed by scammers and other malicious outsiders continue to grow more...more

McManis Faulkner

Take the Test: Will You Fall Prey to Phishing? 6 Tips to Identifying an Email Scam

McManis Faulkner on

Email is the driving force of communication. Lawyers often receive over 100 emails a day. It can be easy to overlook potential scams hidden in your inbox. Hopefully, your firm has the proper security protocols in place:...more

Seyfarth Shaw LLP

Cybersecurity Best Practices

Seyfarth Shaw LLP on

When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more

Jaburg Wilk

Trademark Owners Beware of Chinese Domain Name Marketing Ploy

Jaburg Wilk on

Some e-mail marketing ploys are pretty clever and some spam or phishing attempts brilliantly disguised as valid e-mail. While there are many great reasons to register your trademark with the United States Patent & Trademark...more

Foley Hoag LLP - Security, Privacy and the...

IRS Warns of “Surge” in Tax Season Phishing Scams

Tax season ‘tis the season to be phishing, according to the IRS. The IRS has issued a warning to payroll and human resources professionals about a “surge” in phishing emails seen this year. One of the preferred tactics of...more

15 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide