Elder Abuse-Financial Exploitation and Fraud
Legally Qualified: Protecting Against Elder Investment Fraud and Exploitation
Digging Deeper, Episode 1: The Con Queen of Hollywood
What is Consumer Fraud and What Deceptions are Employed?
Crypto Payments Firms Announce New Integrations and Initiatives - According to reports, fintech bank Revolut recently announced a partnership with Ledger, a major crypto hardware wallet provider, to make it easier for...more
As the Web3 and digital assets ecosystem continues to grow, hacks, scams and other threats remain a major cause for concern and a potential impediment to broader adoption. Data from various sources indicates that after a year...more
Cybercriminals continue to outpace the best efforts of regulators, law enforcement, and cybersecurity professionals. Recent reporting from the Federal Bureau of Investigation demonstrates that cybercriminals are increasingly...more
"Thank you for your order." "We tried delivering your package." We have all seen these subject lines in our inbox, but some are not so innocent. Business impersonation scams are not new, but some of their tricks are. These...more
Stablecoin, Wallet Products Launch; German Bank Launches Crypto Services - Circle, a global fintech firm and issuer of the USDC stablecoin, has announced new smart contract functionality to allow holders of BUIDL, a...more
Cyberattacks are a growing threat, with children being among the most vulnerable of targets. The internet serves as a platform for criminals to access children under the guise of anonymity...more
Where companies are victimized by ransomware or email scams, their losses arise from payments made by an officer or employee of the company. In the case of ransomware, a company’s files are held hostage pending payment...more
The continued growth of the market for nonfungible tokens (NFTs) in 2022 has helped shape the zeitgeist of what has been referenced colloquially by some as the “fourth industrial revolution,” defined largely by network effect...more
Email scams and viruses are nothing new—threats like phishing emails and malware have been around since the days when services like AOL still dominated the internet and email landscape. However, while technology has made a...more
According to Microsoft, 91% of cyberattacks start with an email. In an earlier Privacy Peril we provided information on prevalent words phishers of men and women insert in an email subject line to grab the recipient’s...more
New dictionary words have been formed to describe online scams. Phishing, one that everyone knows by now, is when a scammer uses a pretext in an email to get someone to click on a link or attachment in the email to deploy...more
The past few months have been hard on many people and businesses. Some of us may even know individuals who lost their job due to the pandemic. Unfortunately, there are always those who prey on the misfortunate...more
In accordance with the CDC’s guidance on social distancing, more and more companies are increasing the number of employees working from home. As the number of employees working from home increases, so do the related cyber...more
Media outlets recently reported that Barbara Corcoran, one of the judges on the popular ABC show "Shark Tank," was the victim of a "spear phishing" scam....more
Risk Management Question - Fraudsters seeking to take your money or personal information use a variety of phone scams, including SMSishing (text-based phishing). How can you and your employees protect against phone scams?...more
Risk Management Question - As the 2019 holiday season quickly approaches, you can expect a flood of holiday-themed scams. Malicious actors are ready and waiting to exploit the goodwill of the holiday season by trying to...more
According to the Association for Financial Professionals’ Payment and Fraud Controls report, 2017 was a record year for payment fraud. The tactics employed by scammers and other malicious outsiders continue to grow more...more
Email is the driving force of communication. Lawyers often receive over 100 emails a day. It can be easy to overlook potential scams hidden in your inbox. Hopefully, your firm has the proper security protocols in place:...more
When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more
You may think there is no value in chasing domain name squatters because customers find your website through search engines, but consider squatters as internal and external security risks. A constantly evolving threat, there...more