In my newsfeed are articles in prominent publications discussing the problems with the federal Computer Fraud and Abuse Act from very different perspectives. In the "the CFAA is dangerous for security researchers" corner we have White Hat Hackers and the Internet of Bodies, in Law360, discussing how precarious the CFAA (and presumably, the state hacking laws … Continue reading What do we in the United States really want from our cyber laws?
A federal judge sentenced David Kent to a year and a day in prison and ordered him to pay $3.3 million in restitution and pay a $20,000 fine for accessing the computer network of Rigzone.com, an industry-specific networking website. Kent founded Rigzone.com, sold it for $51 million, and after the sale accessed the company's network to obtain … Continue reading Hacking Into A Company You Sold Can Get You Jail Time
There has been a lot of buzz this past week about protesters indicating they plan to protest President-Elect Trump's inauguration by launching a DDoS attack on the White House website. This plan has received some high-profile publicity by articles in magazines such as Forbes and PC World. I initially learned of this discussion when I … Continue reading Trying to DDoS the White House Website to Protest Trump’s Inauguration Violates CFAA
A warning for law firms: Preet Bharara, the U.S. Attorney for the Southern District of New York, said the case should serve as a "wake-up call for law firms around the world." "You are and will be targets of cyber hacking, because you have information valuable to would-be criminals," Bharara said in a statement. But … Continue reading Feds: Chinese Traders Busted, Trading on Info “Hacked” from Law Firms via Email Compromise
My friend Paul Ferrillo (@PaulFerrillo) shared a cybersecurity version of the Night Before Christmas that I thought was brilliant. Wanting to be sure and properly credit this fine work, I asked Paul about attribution ... since we can never be too confident in attribution, after all, yet it is critically important. Paul then confessed that it … Continue reading A Cybersecurity Night Before Christmas