Podcast Episode 187: Will AI Kill SEO?
State AG Pulse | The Laboratories of Democracy
Interview With Ayesha Minhaj, Google - Digital Planning Podcast
Insurtech Briefly Podcast: Licensing, Google and Lead Gens
Podcast: The Briefing by the IP Law Blog - Andy Warhol's Prince Prints: Not Fair Use!? (Part Two)
The Briefing by the IP Law Blog - Andy Warhol's Prince Prints: Not Fair Use!? (Part Two)
Episode 169 -- DOJ Files Antitrust Case Against Google
Do I need permission to use images from Google on my website?
Data Privacy Trouble Surrounding Google Street View Cars Presents Lesson for Smaller Companies
Weekly Brief: New Round of Layoffs Hit Law Firms
FCC to Create Free National Super WiFi Network? Not Anytime Soon—Dana Frix
Google yourself. Why? You should know what is out there. You will find numerous companies selling personal information about you and your family to anyone who wants it. This is the same information that gets traded on the...more
In this week’s News of Note, ransomware attacks break records and wipe data for a majority of a cloud provider’s customers, while one RaaS case delivers useful details about cybercriminal techniques and tactics. Also, the...more
It used to be that one of the sure ways to identify a phishing email was to notice grammatical errors or broken English in the text of the communication. Thanks to new translation tools like Google Translate, that are...more
Complex, Customized CRISPR Combo Could Help Patients Cure Their Own Cancer - “In a small phase 1 clinical trial run by PACT Pharma, researchers edited the genes of 16 patients’ immune cells to work against their cancer,...more
If you think the Russians are only targeting U.S. companies and the defense industry, think again. The cyber war between Russia and the U.S. has escalated since the President threw down the gauntlet on Putin, and the...more
CYBERSECURITY - Cyber Criminals Focusing on Clinics + Business Associates - As hospital systems become more hardened to cyber-attacks, cyber criminals are focusing their efforts on smaller providers, such as outpatient...more
In the face of the ever-growing threat of cyberattacks disguised in emails from phishers, impostors and other increasingly sophisticated security scammers, Google has launched a tool to allow organizations to fight back by...more
U.S. Judge Halts Trump's TikTok Ban, Hours Before It was Set to Start - "John Hall, an attorney for TikTok, said that the app, with some 100 million American users, is a 'modern day version of the town square' and shutting...more
- Utah Pathology Services, based in Salt Lake City, has reported a data breach involving approximately 112,000 patients. According to the medical practice’s “Notice of Data Incident,” the practice learned June 30 that “an...more
The U.S. market is improving, with employers adding 2.5 million jobs. For some perspective, “[t]he economy shed 22.1 million jobs combined in March and April.” So, we have a ways to go before we’ve fully recovered. ...more
A new study by Check Point Research shows that cyber criminals are using well-known brands to lure victims into clicking on nefarious links, providing personal information or credentials, or getting users to transfer money....more
Volvo’s owner, Li Shufu, is mulling over a move to combine the carmaker with his publicly traded Geely Automobile Holdings—a play that would take Volvo public and “unify the bulk of billionaire Li’s growing stable of...more
As technology reshapes the banking industry, regulators are rising to the challenge. Digitalization is at the forefront of the challenges facing the banking industry as it undergoes a period of unprecedented upheaval....more
Fed Chair Powell was far from the main attraction on the Hill yesterday, but hey, let’s keep it on topic here and note his belief that the U.S. economy is performing well even as certain risks—including “sluggish growth...more
Although Amazon and Google respond to reports of vulnerabilities in popular home smart assistants Alexa and Google Home, hackers continually work hard to exploit any vulnerabilities in order to listen to users’ every word to...more
Although Amazon and Google respond to reports of vulnerabilities in popular home smart assistants Alexa and Google Home, hackers continually work hard to exploit any vulnerabilities to be able to listen to users’ every word...more
Consistent with our experience, security firm McAfee has confirmed in a report that ransomware attacks have doubled in 2019. Medical providers have been hit hard this year, and one provider, Wood Ranch Medical, located in...more
I am not a big fan of putting all of one’s passwords in one place, but many people use password managers. If you use Last Pass (see previous blog posts about Last Pass here and here), be aware that it was recently advised by...more
Matching Parent Emails with the Document Identifier In Relativity, if the Parent Document ID field does not match the Document Identifier (the control number with a link to a document), email threading will not have been...more
Cybersecurity experts have been warning users about a Google Chrome scam that targets Windows users in the US, UK, Canada and Australia. The scam, which began in December, uses a pop-up stating “The ‘HoeflerText’ font wasn’t...more
Updates on the EU: German DPA Publishes First Privacy Shield Guidelines, Requires German-Law Contracts for Transfers. On June 7, 2016, the European Commission adopted the EU-U.S. Privacy Shield. One question that many...more
More details have emerged from the February cyberheist that resulted in the theft of more than $81 million from Bangladesh’s account at the NY Fed, including a pretty significant lack of critical concern from the bank itself....more
On January 25, 2016, at the State of the Net Internet Policy Conference in Washington, D.C., Assistant Attorney General Leslie Caldwell from the Department of Justice and Commissioner Terrell McSweeny from the Federal Trade...more
On October 12, Nossaman and UC Irvine hosted their first annual cyber symposium at the Los Angeles City Club. The event brought experts together to discuss a variety of critical issues in the worlds of privacy and data...more
Personal data is a valuable corporate asset. At times, the personal information collected from customers (such as email address, mailing address, phone number, etc.) can be a company’s most valuable asset. Unfortunately,...more