By Commentary by Walter J. Andrews and Katherine E. Miller | August 2, 2017
A ransomware attack, like the Petya and WannaCry attacks, disables the user's computer system and all its data. A note in a text file then appears stating that in order to unlock the computer and access its data, a ransom must be paid, typically in the form of Bitcoin. The hackers threaten to delete all data on the computer system if payment is not sent, write Walter J. Andrews and Katherine E. Miller.
By LTN Staff | August 2, 2017
Data security is of the utmost importance. Leading legal technology marketers share their tips on how firms can convince clients they care about security.
By John Council | August 1, 2017
Andy Rakhshan emailed the website in late 2014 complaining a link to a court opinion he was the plaintiff in was 'tarnishing his reputation' and violated his privacy.
By Commentary by Michael D. Ford | July 31, 2017
Cybercrimes have been dominating our politics, our finances and our national security. Not a day goes by without news of another cyberattack, hacking scheme or massive data breach. They range in scale from simple identity theft of credit card numbers or online passwords to the recent WannaCry attack by North Korean hackers that disrupted computer systems in English hospitals, Chinese universities and German railways. According to the Identity Theft Resource Center, U.S. companies and government agencies suffered a record 1,093 data breaches last year, a 40-percent increase from 2015, writes attorney Michael D. Ford.
By Robert M. Projansky and Miriam S. Dubin, Proskauer Rose | July 31, 2017
Often containing a wealth of personal information, employee benefit plans can become more secure with a few simple steps.
By Rhys Dipshan | July 31, 2017
Law enforcement's move to shutdown dark web marketplace Alphabay helps shore up some cyberthreats, but it's benefits are likely only temporary.
By R. Robin McDonald | July 28, 2017
Unclaimed funds from Home Depot's $27 million data breach settlement fund will be split among nonprofits including two Georgia legal aid groups.
By W. Todd Hicks | July 28, 2017
W. Todd Hicks writes: New York's groundbreaking cybersecurity rules offer a viable model for other jurisdictions to adopt, particularly as global cyberattacks make cyber defense an urgent matter.
By Ed Silverstein | July 28, 2017
So far, there is no reason to believe the information ever got into the hands of nefarious actors, yet the incident provides a stark reminder for business and government officials.
By Ed Silverstein | July 27, 2017
In this case, it appears to have taken a freedom of information request to get the most basic information, law professor says.
Presented by BigVoodoo
This conference aims to help insurers and litigators better manage complex claims and litigation.
Recognizing innovation in the legal technology sector for working on precedent-setting, game-changing projects and initiatives.
Legalweek New York explores Business and Regulatory Trends, Technology and Talent drivers impacting law firms.
McCarter & English is actively seeking a 5th-6th year trademark associate who has trademark prosecution, licensing and litigation experi...
**PLEASE READ THE COMPLETE AD BEFORE APPLYING***Established 25-year boutique Plaintiff's Personal Injury Law Firm in the Dadeland area seeki...
Our client, a multi-state full-service boutique, is seeking to add a senior construction litigation associate to their Florida team. Qualif...