Go to Top

Tag Archives

Tag Archives: Steal

Phishing Update: The Bad Guys Are Getting More Sophisticated – And Losses Are Way Up

More Bad News…Your Loss From Phishing Fraud May Not Be Covered By Insurance Phishing scams are not new, but losses from these social engineering ploys are increasing dramatically as the fraudsters become more convincing in their techniques.  Indeed, this was one of the primary themes of this year’s Net Diligence Cyber Insurance conference in Santa Monica, California. It’s Getting Ugly Out There… The FBI estimates phishing attacks have cost organizations …Read More

Hillary Clinton’s eMail Drama: Tips From the Trenches

I am in the digital forensics business.  That means that when something related to eMail or computer evidence is in the news, my friends and family ask me questions, like:  “are Tom Brady’s destroyed “DeflateGate” text messages recoverable?”, and “could you recover data from the submerged mobile phones from missing Malaysian Airlines Flight 370 if it was ever recovered?”  So, I get used to these questions.  It’s kind of fun. …Read More

Mobile Phone Porting Fraud: The Risk Goes Far Beyond Consumers

Businesses are increasingly targeted by phone porting scams Much has been written and reported about the risk of mobile phone “Porting” and related financial scams against consumers.  A 90 year old grandfather, for example, recently had his identity stolen by a fraudulent caller that advised the old man that she was conducting a “phone interview.”  When the grandfather gladly offered his personal information over the phone to the scammer, the …Read More

Apple Can Help the FBI Crack a Terrorist’s Phone, They Just Won’t Do It

When individual privacy rights and societal good collide Does a dead terrorist’s right to privacy trump our rights to exist in a safe world?  Lofty philosophical question indeed….but not quite as simple as it sounds.  Let’s put the moral debate aside for a moment and examine the technical challenge presented by today’s news that Apple has been ordered by a federal judge to help investigators break into the San Bernadino …Read More

For Sale: Your Stolen Pre-Released Press Releases!

Hackers Busted Selling Press Releases to Traders – How Secure is Your Vendor’s Info Security?    In light of the rash of data security events in the last few years, your company has invested heavily in upgraded security hardware and software.  In addition, you recently completed a comprehensive security awareness training program for all your employees, reinforcing the importance of data security (in particular, reminding them not to open those …Read More

Your Smart Phone is Spying on You!

Smart Phone Apps Can Steal Your Personal Data:  4Discovery’s Josh Fazio Interviewed on CBS News You just downloaded a fun looking app on your smart phone.  Minutes later this app sends your user name, email address, and banking passwords to a third party.  The app also notified a variety of advertisers of your exact GPS location.  And to make matters worse, you actually agreed to this! Yes, it’s true, apps …Read More

BYOD: The #1 eDiscovery Challenge for Inside Counsel

Jeffrey Hartman Partner, 4Discovery @Jeff4Discovery   Survey of inside counsel at Fortune 1,000 companies highlights growing BYOD fears The Scenario You are the general counsel of an investment firm, and have recently learned that your company has been accused of trade secret misappropriation by a competing firm.  It seems that the 9 traders your company has recently recruited from a competitor may have brought client lists and other trade secrets …Read More

The Computer Fraud and Abuse Act: Are Changes Necessary?

4Discovery’s Jeffrey Hartman featured in debate article in the October issue of SC Magazine Intellectual property theft and cyber breaches have a significant impact on our fragile economy, causing $250 billion in damages to countless artists, technology developers and companies last year. The CFAA is a necessary tool for combating these offenses. The law is a unique deterrent against those who trespass into a computer system to steal property or cause damage. …Read More

Do Employees Steal Trade Secrets? Yes! (Just Ask Them)

New survey confirms nearly half of employees would steal A recent survey concluded that nearly half of all employees would walk out with proprietary data(such as company database records and business plans) if they were fired tomorrow [1].  Other findings included… 45 percent said they have access to information on a system that is not relevant to their role. 42 percent indicated they have used passwords to access data that …Read More

It’s 2012, Do You Know Where Your Mobile Devices Are?

Smart Phones Can Leave Behind an Indisputable Digital Trail They are Ubiquitous Think about it…we are with our laptops or computers for 6 or 7 hours per day, but we are with our mobile devices nearly 24 hours per day.  Everywhere we look we see people pecking away at their smart phone keypads.  It is becoming clear that Electronically Stored Information (ESI) from these devices can be a goldmine for …Read More