A recent deepfake scam has rocked the financial landscape of Hong Kong, demonstrating the extreme lengths to which cybercriminals are willing to go to defraud unsuspecting victims. This sophisticated scheme, which saw attackers coerce an employee into transferring a...
Cyber Security & Data Breach
Don’t Take The Bait: How To Prevent A Phishing Attack
It’s late Friday afternoon and the COO of your company emails you with an urgent request to send him the HR spreadsheet you have been working on. Frantic, you immediately reply and send him the requested information. But it wasn’t the COO emailing you; it was a...
Un-Nudify Me: Removal Options for Deepfake Pornography Victims
The AI Deepfake Pornography Pandemic The rapid advancement of artificial intelligence (AI) technology has created new challenges that significantly disrupts established legal principles. One facet of AI, with a large potential for abuse, is its seamless capability to...
SEC Adopts New and Burdensome Cybersecurity Disclosure Rules
The Securities and Exchange Commission (SEC) recently adopted rules requiring public companies to quickly disclose “material cybersecurity incidents” and to annually disclose material information regarding a company’s cybersecurity risk management, strategy, and...
Who’s Liable When Your Cryptocurrency Is Stolen?
One of the asserted advantages of blockchain and cryptocurrency is their operation outside the commercial banking system. However, this very feature poses a challenge when cryptocurrency is stolen—or more accurately, transferred without the account holder's...
Coverage Challenges in Ransomware Claims: Cyber Insurance Policies and Trends in Denials
A consistent pattern emerges in data breach and cyber-attack cases when companies turn to their insurers for coverage after such incidents. Whether they possess specialized cyber insurance or not, insurers often decline claims, citing various reasons such as failure...
Supreme Court Rules in Favor of Online Harasser
Online threats and harassment pose a significant problem in today's digital landscape. With the Internet's global reach, the ease of publishing and posting content, and the potential for anonymity or lack of consequences, individuals find it convenient to share...
Sextortion, Deepfakes, and AI Scams: How to Protect Children from Cyberattacks
Cyberattacks are a growing threat, with children being among the most vulnerable of targets. The internet serves as a platform for criminals to access children under the guise of anonymity. These criminals lurk on popular applications and social media platforms...
Federal Court Rules No Common Law Duty to Prevent or Respond to Data Breaches
Like most healthcare entities, Indiana’s Trinity Health collects, stores, maintains and uses a large volume of particularly sensitive information about patients and others, including Personally Identifiable Information (PII) and Protected Health Information (PHI),...
TikTok Time is Up: Montana Becomes the First U.S. State to Ban the App
Only two months after a federal bill was introduced to ban TikTok nationwide, Montana has become the first U.S. state to officially ban TikTok from operating in the state. Governor Greg Gianforte signed S.B 419 into law on Wednesday after the Montana House of...