News & Analysis as of

TRO LLC – GET IT? Sprung From Prison, Hacker Creates Hedge Fund That Shorts Stocks Of Companies With Security Vulnerabilities

Self-proclaimed Internet troll and hacker Andrew “weev” Auernheimer has big plans now that he’s been sprung from prison. We identified Auernheimer’s imprisonment and appeal as one of the top trade secret stories of...more

Access Of Computer System With Log-In Credentials Is Not Unlawful “Hacking”

A California federal court in Enki Corporation v. Freedman held that a former employee’s access of the employer’s computer systems through his log-in credentials did not amount to unlawful hacking under either the Computer...more

Can Violating Social Media Terms of Use Make You Guilty of Violating the CFAA?

LinkedIn has filed a suit against John Does in response to a spate of “data scraping” perpetrated by unknown individuals, in violation of the website’s terms and conditions.This is the latest federal case in the Northern...more

A Weapon Against Hackers on the Home Front

Although headlines have focused on foreign cyberattacks, plenty are U.S.-based—and can be remedied. Over the past year the national press has repeatedly reported on the vulner­ability of our intellectual property to...more

A Weapon Against Hackers on Home Front

Over the past year the national press has repeatedly reported on the vulner­ability of our intellectual property to nation-state hackers like China, which have reportedly accessed and stolen highly con­fidential data by...more

Hacking Back: For Now, Be Vigilant Rather Than a Vigilante

In the cyber-security world, "hacking back" – using hacker-like techniques to defend a company's IT systems by going on the offensive and instituting countermeasures to cyberattacks -- is generating much buzz. For example,...more

Website Operator Permitted to Revoke Access of Previously Authorized User Under the Computer Fraud and Abuse Act

The Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030) levies penalties on a person who "intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains... information from any...more

Andrew Auernheimer Appeals Hacking Conviction

Earlier this week, attorneys for convicted computer hacker Andrew “Weev” Auernheimer filed their opening brief in their appeal to the U.S. Court of Appeals for the Third Circuit to have his conviction overturned....more

8 Results
|
View per page
Page: of 1