News & Analysis as of

Hackers Computer Fraud and Abuse Act (CFAA) Cyber Attacks

EDRM - Electronic Discovery Reference Model

[Flash Webinar] "Cyberwar and the ‘Iceberg Problem’ in Ukraine and Beyond. Can the USG Stop Cyberattacks Against the Private...

Russian intelligence agencies have hacked dozens of civilian organizations in the U.S. and other Ukraine-allied nations since February. While this activity has garnered a great deal of attention due to the conflict in...more

Wilson Sonsini Goodrich & Rosati

DOJ Acknowledges Limits to the CFAA, but Questions (and Possible Civil Liability) Remain for Security Researchers and Others

On May 19, 2022, the U.S. Department of Justice (DOJ) revised its policy regarding charging decisions under the Computer Fraud and Abuse Act (CFAA). The new policy makes clear, "for the first time," that the DOJ "should...more

Epiq

Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law

Epiq on

Professor, Attorney and Expert in Cybersecurity Policy & Governance, Kevin Powers joins Jerich Beason & Whitney McCollum to discuss where the law stands on “Hacking Back”. Everyone at some point wants to be Batman. During...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - June 2021 #2

Robinson & Cole LLP on

CYBERSECURITY - Another Win for Justice Department: Slilpp Marketplace Takedown - People always ask me if law enforcement is having any luck in combatting cyber criminals. Let me be clear: it is a very tough job to take...more

Eversheds Sutherland (US) LLP

Getting back when HACT: Congress’s idea to provide redress to recent cyberattacks

Amidst the ever-worsening onslaught of cyberattacks, companies are longing to go on the offensive, whether by “hacking-back” or by going after malicious actors in United States courts. While Congress has previously refused to...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - July 2018 #2

Robinson & Cole LLP on

We have previously reported on the ongoing cybersecurity issues with St. Jude defibrillators [view related posts here, here, and here]. On June 29, 2018, the Food and Drug Administration (FDA) classified the required firmware...more

Patterson Belknap Webb & Tyler LLP

Payment or Pillory: More Fallout from Uber’s Data Breach

With new developments regarding Uber Technologies Inc.’s 2016 data breach coming out almost daily, lawsuits against the company continue to pile-up. We previously reported that within days of Uber disclosing the data theft...more

Jackson Lewis P.C.

Companies May Soon Have a New Defense Against Cyber-Attacks

Jackson Lewis P.C. on

The Active Cyber Defense Certainty Act is a new bill that is gaining positive bipartisan support and significant interest from business communities, lawmakers and academics. The proposed bill amends the Computer Fraud and...more

King & Spalding

Another Cyber Coverage Gap? Some Carriers Resisting Coverage Of Commercial Cyber Fraud

King & Spalding on

In the fast-developing world of cyber threats and corresponding cyber coverage, at least two insurance carriers are pushing back against covering losses arising out the transfer of funds to cyber fraudsters after employees...more

Robinson+Cole Data Privacy + Security Insider

The FBI’s “Cyber Most Wanted”

We’ve all heard of the FBI’s “Most Wanted” list, but fewer people know that the FBI has a special most wanted list just for computer criminals. The FBI’s “Cyber’s Most Wanted” list features the FBI’s most wanted computer...more

Robinson+Cole Data Privacy + Security Insider

Feds continue to prosecute hackers

Sergey Vovnenko, a Ukrainian hacker, was charged in New Jersey federal court this week for wire fraud conspiracy, unauthorized computer access and aggravated identity theft for allegedly hacking into networks of financial...more

Robinson+Cole Data Privacy + Security Insider

Ashley Madison data breach update

Anonymous users of the almost 40 million users of the Ashley Madison website have filed suit against internet service providers (ISPs) GoDaddy and Amazon alleging that they have been damaged because the ISPs hosted the stolen...more

Orrick - Trade Secrets Group

Hacking Your Rivals – Corporate Espionage in Major League Baseball

As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it...more

Dorsey & Whitney LLP

A Weapon Against Hackers on the Home Front

Dorsey & Whitney LLP on

Although headlines have focused on foreign cyberattacks, plenty are U.S.-based—and can be remedied. Over the past year the national press has repeatedly reported on the vulner­ability of our intellectual property to...more

14 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide