Trade Secrets Watch has been covering the escalating economic tension between China and the U.S., including the U.S. Trade Representative’s investigation on China’s alleged IP theft under Section 301 of the Trade Act of 1974,...more
No longer cut from the cloth of 007’s expensive suits, fast cars or well-mixed drinks, present-day espionage is carried out, to a great extent, through computer screens, proxy servers and spoofed e-mail addresses. Dubbed...more
We often talk to companies who believe they are an unlikely target for hackers because they do not have financial account information, Social Security numbers, or medical information. However, personal information is not the...more