[Podcast] Hosted Payload Episode 2
The Presumption of Innocence Podcast: Episode 3 - The Science of Modern Digital Forensics
Is the TCPA Unconstitutional? [More With McGlinchey, Ep. 18]
Podcast: Conductive Discussions: Recent FRAND & Trade Secret Enforcement Trends Affecting the Semiconductor Industry
E17: Carpenter Decision Builds Up Privacy from #SCOTUS
Won’t You Be My Neighbor?
A Valuable Discussion About Property Values
The TCPA: Basics, Targeted Industries, and Trends
New Jersey to consider allowing police to search cell phones to combat distracted driving
Instapundit: America's IP Laws Need to be "Pruned Back"
Editor's Note: In a significant study from MIT's CSAIL, researchers have unveiled vulnerabilities in smartphone ambient light sensors, highlighting them as potential channels for privacy breaches. This discovery underscores...more
Cellphones have become a necessity for many people throughout the world, allowing convenience and interconnectivity in the palm of our hands – but they’ve also opened the door to a new type of theft. On April 26, the...more
There has been a flurry of reporting in the past few days on the T-Mobile customer data compromise, with allegations that the compromise affected up to 100 million customers. ...more
The Electronic Frontier Foundation (EFF) (www.eff.org) is a wonderful resource for privacy-related issues and concerns. I check its website frequently to make sure I am aware of the latest issues and concerns around privacy....more
The Editors' Note - Welcome to the third issue of Decoded, Spilman's e-newsletter focusing on technology law, including data security, privacy standards, financing technologies, and digital-based means of conducting...more
Our previous Privacy Peril provided information on securing your private Wi-Fi network from public access. Here, we offer guidance on avoiding the opposite – inadvertently disclosing confidential private information through...more
A recent report by researchers at the Helmholz Center for Information Security (CISPA), Singapore University of Technology and Design, and the University of Oxford has revealed that Bluetooth technology is vulnerable to a new...more
Cybercriminals have launched a new campaign that not only requires the victim to pay a ransom to have their data decrypted, but when the victim is directed to a PayPal account to pay the ransom and get the decryption key to...more
Mark Eting is one of Duncey’s Caps top outside sales agents. Because the company is based in Texas, but Mark lives in Cleveland and sells for the company in the northeast, Mark purchased a personal computer and a laptop to...more
A new ransomware, dubbed “Ryuk,” has surfaced in the last few weeks and is said to be targeting large organizations in the United States. The attackers behind Ryuk have reportedly made more than $640,000 in just two weeks,...more
In February 2018, the Federal Trade Commission (FTC) released a report that explores the complexities of the mobile ecosystem and makes recommendations for industry to improve the mobile security update process for consumers....more
Here’s a great idea offered by the National Cyber Security Alliance and the Better Business Bureau: while you are doing your spring cleaning, don’t forget to do a digital spring cleaning too—that is, your computer, cellphone...more
There is a global malware campaign that is targeting mobile devices across the world. It is called Dark Caracal, which is believed to be sourced in Beirut by the Lebanese General Security Directorate. ...more
The U.S. Supreme Court heard oral arguments in what may become one of the defining consumer privacy cases of our generation. The central question in Carpenter v. United States asks whether the government violates the Fourth...more
On November 29, 2017, the U.S. Supreme Court heard oral argument in United States v. Carpenter, a case that could fundamentally change the way the government collects, uses, and tracks individuals’ location information...more
On Wednesday, November 29, 2017, the Supreme Court heard arguments in the appeal of Timothy Carpenter, a man convicted and sentenced to 116 years for his role in a series of armed robberies. In proving his guilt, prosecutors...more
In Carpenter v. United States, federal investigators sought cellphone location data for a set of persons suspected in a series of robberies. The Fourth Amendment prevents the government from conducting unreasonable searches...more
When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more
You drop your smartphone and now there are a million cracks and you can hardly read your texts. Getting the screen replaced by the manufacturer of the phone is usually expensive and sometimes it is so expensive that it makes...more
Chevron CEO John Watson is out in a move that leaves the energy giant without a board-confirmed successor and marks the “dramatic shift under way at big oil companies as they adapt to a prolonged period of lower prices...more
The American Institute of CPAs (AICPA), has released a risk management reporting framework intended to "establish a common, underlying language for Cybersecurity risk management reporting — almost akin to US GAAP or IFRS...more
University of Michigan researchers have discovered that hundreds of applications in Google Play turn Android phones into a server that allow the user to connect the phone directly to a PC and leave open insecure ports...more
In a letter dated March 28, 2017, Senator Ron Wyden, D-Ore., and Representative Ted Lieu, D-Calif., urged the Federal Communications Commission (“FCC”) to address cybersecurity vulnerabilities in the cell phone industry,...more
In this our second edition of Fenwick’s Securities Litigation and Enforcement Newsletter, we continue to provide you with short insights about timely securities litigation and enforcement developments. This edition’s topics...more
It is being reported that 95% of all Android smartphones are vulnerable to being hacked with a text message, which is being called the “heartbleed for mobile.” According to security experts, the vulnerability exploits the...more