When thinking of HIPAA data breaches, most of us tend to think of situations where the hackers engage in malicious activities against hospitals and steal troves of patients’ protected health information (PHI). There are, however, other much simpler kinds of HIPAA privacy breaches that are easily avoidable and can be quite costly to the healthcare…
Search Results for: hack a car
Is #ShameHacking Coming Next? Hackers Breach Search Engine for Japanese Sex Hotels
Shame hacking — the use, or threatened use, of purportedly hacked data for embarrassing or extorting people by threatening to expose such compromising data if they do not comply with the demands made of them — is a thing. A search engine for Japanese sex hotels just announced a breach whereby hackers may have accessed…
Guide to Using Computer Hacking Laws in Texas: Federal Computer Fraud and Abuse Act and Texas Computer Crimes Laws
Guide to Using Computer Hacking Laws in Texas: Federal Computer Fraud and Abuse Act and Texas Computer Crimes Laws
WHAT DOES CFAA MEAN AND WHY SHOULD I CARE? A PRIMER ON THE COMPUTER FRAUD AND ABUSE ACT FOR CIVIL LITIGATORS
[Originally published in Volume 63, No. 1, Autumn 2011 issue of the South Carolina Law Review] “Every battle is won before it is ever fought.”[1] I…. Introduction II… Litigation Attorneys Must Understand the Need to be Prepared for the Computer Fraud Issues Their Clients Will Face “Everything has a computer in it nowadays.” Fraud—What is…
WikiLeaks and CIA’s Russian Hacking Tools & Techniques: Was it really the Russians?
In the wake of WikiLeaks’ Vault7 release of documents revealing the CIA’s hacking tools, I must revisit a key section of a post from September 2016. The section was about the convenience of blaming “the Russians” given the craze of attributing everything wrong in the cyber world to the seemingly omnipresent “Russians.” See: “SHAME HACKING”…
Brazzers porn hack: more than just account holders exposed–what does this mean for your company?
We have been observing an evolution in hackers’ tactics from going after data that could be directly monetized, such as payment card data, to going after data that can be monetized indirectly through extortion, such as the Ashley Madison data. The hack of Brazzers porn site is similar to the Ashley Madison hack in that the…
Will Changes to the CFAA Deter Hackers?
Note: this article was previously posted on Norse’s DarkMatters. The problem with laws is that they are usually written by lawyers. The same could be said for proposed amendments to laws, such as those to the Computer Fraud and Abuse Act that President Obama proposed leading up to the 2015 State of the Union Address. The…
#SonyHack: Will Executives’ Embarrassing Emails Better Motivate Cybersecurity Change?
Sitting in the Miami airport at 5:00 am I am reading news updates on the #SonyHack and a thought just occurred to me: Previously, many of us preaching the “you better take your company’s security seriously” message to the C-Suites have been wondering if it would take a court decision finding C-Levels or Board members…
#SonyHack shows there are no “safe secrets” in the corporate world – what do you do?
The #sonyhack will change the way the corporate world operates in many ways that we cannot even yet imagine. Yes, there are obvious data security implications that I usually drone on about, but there is another change that we may see come about. The now outdated idea that internal corporate secrets will remain corporate secrets. You know,…
Expect the Celebrity Nude Photo Hacker to be Prosecuted Under CFAA–Just Like Revenge-Porn King Hunter Moore
How will the “hacker” who stole celebrity nude photos be prosecuted? Hacking is nothing new, scores of American businesses face it everyday. People could care less unless it is their own data that has been breached. But, when celebrities are involved — and nude photos of celebrities at that — it is a much different…
You must be logged in to post a comment.