On Demand Insurance is Here But Will it Stay?
The Ever-Expanding Scope of Social Media Discovery
Is the Patent Litigation Boom Coming to an End?
Apple Loses First 'Big' Case to MobileMedia, Lawyer Says
A recent report by researchers at the Helmholz Center for Information Security (CISPA), Singapore University of Technology and Design, and the University of Oxford has revealed that Bluetooth technology is vulnerable to a new...more
New malicious malware dubbed “Gustuff” targets big banks, fintech companies and cryptocurrency apps, according to the security firm Group IB....more
I am speaking at a conference in one of my favorite cities (okay, it’s Chicago) and I was having dinner at the bar when the patron next to me asked me what I do for a living. ...more
Verizon's Protected Health Information Data Breach Report Concludes that Insiders Are Greatest Threat to Health Care Entities - Verizon recently issued its Protected Health Information Data Breach Report, which is always...more
Researchers at cybersecurity firm AlienVault have discovered a computer virus of North Korean origin which infects and hijacks computers in order to mine Monero, a private digital currency which styles itself as “secure,...more
The New York Times reported last week that “hundreds of fake retail and product apps have popped up in Apple’s App Store in recent weeks”—just in time to deceive holiday shoppers....more
Last week, Brian Krebs reported that hackers using a malware dubbed “Marai” have identified hundreds of thousands of home and office devices that have weak security. Then the hackers released the malware publicly so anyone...more
I travel a lot and frequently rent cars in cities all over the country. Those of you who know me, (and my husband and children will attest), know that I will not ask for directions. I am definitely more like a man than a...more
It is being reported that 95% of all Android smartphones are vulnerable to being hacked with a text message, which is being called the “heartbleed for mobile.” According to security experts, the vulnerability exploits the...more