Compliance Needs are Alive and Well: FTC's Recent Enforcement Activity
Excessive Compensation: What to do when the co-owners of your business pay themselves excessively
Deposit Account Litigation: Highlights From 2024 and What to Expect in 2025 — The Consumer Finance Podcast
Recognizing and Avoiding Trademark Scams and Hoaxes
Elder Abuse-Financial Exploitation and Fraud
Legally Qualified: Protecting Against Elder Investment Fraud and Exploitation
Digging Deeper, Episode 1: The Con Queen of Hollywood
What is Consumer Fraud and What Deceptions are Employed?
We have repeatedly warned our readers about malicious QR codes and their use by threat actors. Threat actors are now using these codes to disguise packages as gifts....more
Welcome to our eighth 2024 issue of Decoded - our technology law insights e-newsletter. Thank you for reading. EU AI Act Tightens Grip on High-Risk AI Systems: Five Critical Questions for U.S. Companies - Why this is...more
CYBERSECURITY - HC3 Warns Healthcare Organizations about Akira Ransomware Group - The Health Sector Cybersecurity Coordination Center (HC3) recently warned the health care sector about the Akira ransomware group that...more
I was talking to a client today about a security incident and the discussion turned to how threat actors are using increasingly more sophisticated ways to attack individuals and companies. She lamented that we know more than...more
CYBERSECURITY - 235 Million Twitter User Email Addresses Posted on Hacking Forum - Israeli cybersecurity firm Hudson Rock has reported that the email addresses of more than 235 million Twitter users have been stolen and...more
CYBERSECURITY - Nineteen States Have Banned TikTok on Government-Issued Devices - Governors of numerous states have issued Executive Orders in the past several weeks banning TikTok from government-issued devices and...more
Email scams and viruses are nothing new—threats like phishing emails and malware have been around since the days when services like AOL still dominated the internet and email landscape. However, while technology has made a...more
CYBERSECURITY - Intelligence Points to Likely Russian Attacks on Critical Infrastructure - The cybersecurity authorities of the United States (including CISA, FBI, NSA and DOE), Australia, Canada, New Zealand, and the...more
CYBERSECURITY - DOJ Takes Down RaidForums' Website - In an action against what has been described as one of the largest hacker forums in the world, the U.S. Department of Justice (DOJ) announced on April 12, 2022, that...more
CYBERSECURITY - State Department Establishes Bureau of Cyberspace and Digital Policy - The Department of State’s new Bureau of Cyberspace and Digital Policy (CDP) commenced operations on April 4, 2022. According to an...more
CYBERSECURITY - Cyber-Attackers Politically Aligned - The most recent Accenture Global Incident Report (the Report) shows that cyber-attackers have political views and are divided between support for Russia or Ukraine....more
CYBERSECURITY - Joint CISA/FBI Alert on Vulnerability in Zoho ManageEngine ServiceDesk Plus - On December 6, 2021, the Cybersecurity & Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI)...more
According to Microsoft, 91% of cyberattacks start with an email. In an earlier Privacy Peril we provided information on prevalent words phishers of men and women insert in an email subject line to grab the recipient’s...more
CYBERSECURITY - Law Enforcement Takes Down DoubleVPN - I love seeing another win for law enforcement in the cyber context. Servers and web domains owned by DoubleVPN, a virtual private network, were seized recently...more
When it comes to scams and frauds, it's not just individuals at risk, but also companies. In Episode 2 of Digging Deeper, Chris Morgan Jones interviews Jordan Arnold about corporate scams, and they even discuss cracking the...more
CYBERSECURITY - Ubiquiti Notifies Customers of Breach - Ubiquiti, a manufacturer of products used for networks such as routers, webcams and mesh networks, announced this week that an unauthorized access to its systems...more
CYBERSECURITY - C-Suite + Managers Pose Higher Security Risk to Organizations - You executives and managers who are in my age group (that is, you didn’t grow up with mobile devices and computers) listen up. According to...more
CYBERSECURITY - U.S. Organizations Doing Business in China Warned of Malware in Tax Software - The Federal Bureau of Investigations (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have issued a joint...more
CYBERSECURITY - SEC Issues Warning for Advisors and Broker-Dealers on Increased Ransomware Attacks - On July 10, 2020, the Securities and Exchange Commission (SEC), through its Office of Compliance Inspections and...more
FBI Issues Warning of Increased BEC During COVID-19 Pandemic - On April 6, 2020, the Federal Bureau of Investigation (FBI) issued a warning to companies to be aware of an increase in business email compromises (BEC)...more
Two Las Vegas casinos’ networks were down over the past week, with posted signs saying “Cash Only” throughout the casinos after a suspected ransomware attack. Electronic slot machines were silent as the casinos reacted to the...more
The predictions set forth in Experian’s Seventh Annual Data Breach Industry Forecast make sense and are worth a read. We are starting to see these types of intrusions and scams, and our experience is that once these types of...more
Schneider Electric recently issued a consumer warning that it mistakenly shipped to its customers USB drives that were infected with malware. Schneider Electric stated in its alert that “Schneider Electric has determined that...more
We all remember Kronos—the malicious malware that was sold by Russian underground forums in 2014 for $7,000. If you bought it, you were promised updates and development of new modules. The Kronos developers recently released...more
The Federal Trade Commission (FTC) has designated this week as National Consumer Protection Week, and has issued a report on the top frauds reported during 2017. Highlights from the report are as follows... ...more