News & Analysis as of

Computer Fraud and Abuse Act (CFAA) Cyber Attacks

EDRM - Electronic Discovery Reference Model

[Flash Webinar] "Cyberwar and the ‘Iceberg Problem’ in Ukraine and Beyond. Can the USG Stop Cyberattacks Against the Private...

Russian intelligence agencies have hacked dozens of civilian organizations in the U.S. and other Ukraine-allied nations since February. While this activity has garnered a great deal of attention due to the conflict in...more

Wilson Sonsini Goodrich & Rosati

DOJ Acknowledges Limits to the CFAA, but Questions (and Possible Civil Liability) Remain for Security Researchers and Others

On May 19, 2022, the U.S. Department of Justice (DOJ) revised its policy regarding charging decisions under the Computer Fraud and Abuse Act (CFAA). The new policy makes clear, "for the first time," that the DOJ "should...more

ArentFox Schiff

Virginia Finalizes CDPA Text With the Addition of Three Amendment Bills

ArentFox Schiff on

Connecticut Passes the Fifth US State Consumer Privacy Law - The Connecticut governor has formally signed and passed An Act Concerning Personal Data Privacy and Online Monitoring (CPDA), making this law the fifth US state...more

Epiq

Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law

Epiq on

Professor, Attorney and Expert in Cybersecurity Policy & Governance, Kevin Powers joins Jerich Beason & Whitney McCollum to discuss where the law stands on “Hacking Back”. Everyone at some point wants to be Batman. During...more

Robinson+Cole Data Privacy + Security Insider

State Department Offers $10M Reward for Information on Russian Officers Involved in Malicious Cyber Activities

The U.S. Department of State has announced a $10 million reward for “information leading to the identification or location of any person who, while acting at the direction or under the control of a foreign government,...more

Eversheds Sutherland (US) LLP

US Cybersecurity and Data Privacy review and update: Looking back on our 2021 articles and planning ahead for 2022

The past year’s trends in privacy and cybersecurity are set to intensify in 2022, with heightened threats, increased regulations, and elevated expectations - as well as new opportunities. To navigate the year ahead, we lay...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - June 2021 #2

Robinson & Cole LLP on

CYBERSECURITY - Another Win for Justice Department: Slilpp Marketplace Takedown - People always ask me if law enforcement is having any luck in combatting cyber criminals. Let me be clear: it is a very tough job to take...more

Eversheds Sutherland (US) LLP

Getting back when HACT: Congress’s idea to provide redress to recent cyberattacks

Amidst the ever-worsening onslaught of cyberattacks, companies are longing to go on the offensive, whether by “hacking-back” or by going after malicious actors in United States courts. While Congress has previously refused to...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Fueling the Fire: How Extortion Has Changed the Face of Data Breaches

Ransomware attackers typically encrypt victims’ data and demand ransom in exchange for the decryption keys. Ransomware is not a new cybercriminal activity. In fact, ransomware attacks are over 30 years old. However, around...more

Perkins Coie

Blockchain Attacks and the Fight for Immutability

Perkins Coie on

The Ethereum Classic blockchain was the victim of a 51% attack (often called a majority or Sybil attack) on January 5, 2019 that reorganized portions of the blockchain and allowed the attackers to double-spend 219,500 ETC...more

Proskauer - New Media & Technology

“Cyberattack” Campaign That Purportedly Flooded YouTube Channel with “Dislikes” Not a CFAA Violation

A recent dispute between an advertiser AXTS Inc. (“AXTS”) and a video production company GY6vids (“GY6”) produced an interesting issue involving the federal Computer Fraud and Abuse Act (CFAA) – that is, whether an entity...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - July 2018 #2

Robinson & Cole LLP on

We have previously reported on the ongoing cybersecurity issues with St. Jude defibrillators [view related posts here, here, and here]. On June 29, 2018, the Food and Drug Administration (FDA) classified the required firmware...more

Robinson+Cole Data Privacy + Security Insider

Second Circuit Upholds Conviction Under the CFAA, Rejecting Argument That the Law Is Unconstitutional

In a recent decision, the federal Court of Appeals for the Second Circuit (which covers New York, Connecticut, and Vermont) affirmed the conviction of an Italian citizen for misdemeanor computer intrusion in violation of the...more

Patterson Belknap Webb & Tyler LLP

Payment or Pillory: More Fallout from Uber’s Data Breach

With new developments regarding Uber Technologies Inc.’s 2016 data breach coming out almost daily, lawsuits against the company continue to pile-up. We previously reported that within days of Uber disclosing the data theft...more

Jones Day

Global Privacy & Cybersecurity Update Vol. 15

Jones Day on

UNITED STATES - Regulatory—Policy, Best Practices, and Standards - FTC Comments on Improvements to IoT Device Security - On June 19, the Federal Trade Commission ("FTC") submitted comments to a working group organized by the...more

Jackson Lewis P.C.

Companies May Soon Have a New Defense Against Cyber-Attacks

Jackson Lewis P.C. on

The Active Cyber Defense Certainty Act is a new bill that is gaining positive bipartisan support and significant interest from business communities, lawmakers and academics. The proposed bill amends the Computer Fraud and...more

Foley Hoag LLP - Security, Privacy and the...

Cybersecurity, A-Z: A is for Active Cyber Defense

(First in a continuing series.) Active Cyber Defense, or ACD, is a broad category encompassing different kinds of actions that organizations can take to defend against breaches and cyberattacks. The operative word is...more

Foley Hoag LLP - Security, Privacy and the...

Cybersecurity 2017 – The Year In Preview: Trade Secret Theft Takes Center Stage

Editor’s Note: This is the first of an end-of-year series of posts examining coming trends in cybersecurity. Posts will examine trends in state regulations, federal regulatory authority, the changing nature of the threat...more

King & Spalding

Another Cyber Coverage Gap? Some Carriers Resisting Coverage Of Commercial Cyber Fraud

King & Spalding on

In the fast-developing world of cyber threats and corresponding cyber coverage, at least two insurance carriers are pushing back against covering losses arising out the transfer of funds to cyber fraudsters after employees...more

Robinson+Cole Data Privacy + Security Insider

The FBI’s “Cyber Most Wanted”

We’ve all heard of the FBI’s “Most Wanted” list, but fewer people know that the FBI has a special most wanted list just for computer criminals. The FBI’s “Cyber’s Most Wanted” list features the FBI’s most wanted computer...more

Robinson+Cole Data Privacy + Security Insider

Feds continue to prosecute hackers

Sergey Vovnenko, a Ukrainian hacker, was charged in New Jersey federal court this week for wire fraud conspiracy, unauthorized computer access and aggravated identity theft for allegedly hacking into networks of financial...more

Robinson+Cole Data Privacy + Security Insider

Ashley Madison data breach update

Anonymous users of the almost 40 million users of the Ashley Madison website have filed suit against internet service providers (ISPs) GoDaddy and Amazon alleging that they have been damaged because the ISPs hosted the stolen...more

Orrick - Trade Secrets Group

Hacking Your Rivals – Corporate Espionage in Major League Baseball

As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it...more

Carlton Fields

Florida Enacts Law Providing for Civil Remedy Against Cyber Fraud and Abuse

Carlton Fields on

On May 14, Florida Governor Rick Scott signed the Computer Abuse and Data Recovery Act (CADRA) into law. CADRA is intended to provide a remedy to businesses for harm or loss caused by unauthorized access to protected...more

Carlton Fields

A Modern Game of Hide and Go Seek? Some Lessons Learned Following Sony and Other Widely-Publicized Data Breaches

Carlton Fields on

While the recent hack of Sony was prominent news because of the celebrity ties and potential geo-political implications, other prominent cyber-attacks over the last few months are enough to give any company pause. The January...more

27 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide