Go to Top

Tag Archives

Tag Archives: Employees

Cyberbullying Tragedy: A School District’s Obligations for Capturing Digital Evidence

A Case Study A young student has had enough. After months of relentless and cruel cyberbullying and internet harassment, the girl, in a moment of despondency and depression, ends her life. In the unthinkably sad aftermath, parents, teachers, and loved ones wonder what could have been done to prevent this senseless nightmare. Teachers and middle school administrators are accused, in a lawsuit filed by the dead girl’s parents, of missing …Read More

Ransomware Attack Destroys Years of Police Department Evidence

Are your clients prepared for a ransomware attack? The Background Imagine this scenario…you are a police detective. Early one morning you attempt to access your department’s database as you are working on a very important investigation. When you log in to your computer, you are greeted with a gut-wrenching message: “Your files have been encrypted. Make a Bitcoin payment to unlock your files”. This is the start of a very …Read More

W-2 Fraud: Are Your Clients Prepared for a W-2 “Phishing” Attack?

Tax Season Creates a Spike in These Catastrophic Incidents The Background Your HR Director walks into your office: her face ashen, her voice trembling. Earlier that day, she received an email from the company CFO asking her to email all employee W-2 forms to him. In her typical efficient manner, she complied immediately. The email from the CFO, however, was a phony. It was a “spoof” email sent from a …Read More

Phishing Update: The Bad Guys Are Getting More Sophisticated – And Losses Are Way Up

More Bad News…Your Loss From Phishing Fraud May Not Be Covered By Insurance Phishing scams are not new, but losses from these social engineering ploys are increasing dramatically as the fraudsters become more convincing in their techniques.  Indeed, this was one of the primary themes of this year’s Net Diligence Cyber Insurance conference in Santa Monica, California. It’s Getting Ugly Out There… The FBI estimates phishing attacks have cost organizations …Read More

Retweet Case Raises Free Speech Debate

Can a person be held criminally responsible for “Retweeting” another person’s content, or is such communication protected under The First Amendment’s “Free Speech” language? Communication in our electronic world is bending a number of legal concepts into strange new shapes. Consider Safya Roe Yassin, a 39-year-old citizen that was recently arrested for conspiracy and transmitting threats over state lines.  Her alleged crime?  Retweeting twitter posts from a third party that …Read More

An Executive Resigns: Misconduct Suspected, Employer Cannot Access Evidence on His Mobile Phone

“Sorry…You Are Locked Out of Your Own Data” Well, it happened again today.  We had to call a client and advise them that it will be nearly impossible, or at least very expensive to perform a forensic exam of one of their smart phones after the user of the phone, a key executive suspected of misconduct, abruptly resigned.  Why?  Because the device, a newer Apple iPhone, was password protected and …Read More

Your Law Firm Has Just Suffered a Data Breach…Do you Tell Your Clients?

Recent Law Firm Data Breaches are Reigniting This Debate Cyber attacks against some of the country’s top law firms are creating fresh concerns about protecting client data, and when lawyers should advise their clients that a breach has occurred. The Wall Street Journal has reported that hackers have attacked the networks of Cravath Swaine & Moore LLP,  Weil Gotshal & Manges LLP, and others.  While the motives of the hackers …Read More

New York Man Convicted for Hacking, Crashing Former Employer’s Network

The “trusted insider” remains the most significant threat to company networks The United States Attorney’s Office for the Middle District of Pennsylvania announced last week that Dariusz J. Prugar, age 32, of Syracuse, New York, was convicted after a week-long trial before a federal jury in Harrisburg, Pennsylvania, of computer fraud and wire fraud. Prugar was the network administrator for Pa Online, an internet service provider in Enola, Pennsylvania.  Kruger …Read More

Mobile Phone Porting Fraud: The Risk Goes Far Beyond Consumers

Businesses are increasingly targeted by phone porting scams Much has been written and reported about the risk of mobile phone “Porting” and related financial scams against consumers.  A 90 year old grandfather, for example, recently had his identity stolen by a fraudulent caller that advised the old man that she was conducting a “phone interview.”  When the grandfather gladly offered his personal information over the phone to the scammer, the …Read More

The FBI vs. Apple Update: Did an “IT Guy” Botch the Initial Attempts to Recover Critical Information from the Terrorist’s iPhone?

A case for not letting your client’s “IT Guy” do forensics… We are now learning that the initial attempts to recover critical evidence from the San Bernardino County terrorist, Syed Rizwan Farook’s iPhone may have been hampered by the ill-advised response of the individuals that initially took custody of the now famous iPhone.  You may recall that the terrorist’s phone was owned by his employer, San Bernardino County.  Apparently his …Read More