News & Analysis as of

Mobile Devices Software Developers

Snell & Wilmer

Has Your Computer Been Hijacked For Illicit Cryptocurrency Mining?

Snell & Wilmer on

Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more

Bass, Berry & Sims PLC

Privacy Perils: Avoiding the Spectre of a Meltdown

Bass, Berry & Sims PLC on

You recently may have heard news reports regarding new security threats known as "Meltdown" and "Spectre." Not to be mistaken for the latest Hollywood box-office offering, these new threats allow attackers to exploit a design...more

Pillsbury Winthrop Shaw Pittman LLP

How to Fail in the Internet of Things

Innovation is prized in the growing space of the Internet of Things (IoT). But an innovative product design is not enough, and potential pitfalls abound. As demonstrated in a report published by the Federal Trade Commission...more

Buchalter

Legal Considerations for Web Based Start-Ups

Buchalter on

Mobile Internet usage is predicted to grow faster in the next few years, making online or web based businesses great opportunities. A leading forecaster found that global mobile internet usage leapt from 14 percent to 25...more

Latham & Watkins LLP

5 Compliance “Hot Spots” for Technology Companies Under Export Controls and Sanctions Laws

Latham & Watkins LLP on

Increasingly interconnected global businesses need to focus on how export controls and trade sanctions can affect their cross-border activities in unexpected ways. For decades, the US Government has used trade...more

5 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide