Blogs

Nov
01

In the past year, it seems like the rate of cybersecurity incidents has been increasing. It is irrelevant whether these breaches are old or new; the issue is that they are occurring. On October 16, 2017, Chubb Ltd. (“Chubb”) released the results of a survey it conducted on businesses cybersecurity preparedness. The survey found that

Nov
01

A new bill introduced in the U.S. Senate by Senators Mark Warner, Amy Klobuchar and John McCain aims to put online political advertising on a level playing field with the traditional mediums of television, radio, and print. House Resolution 4077, also known as the “Honest Ads Act,” comes as a direct response to the investigation

Nov
01

Market forces govern almost all commodities subject to shortage. Exceptions to this rule include public utilities (although this is slowly changing with the application of deregulated electric grids). This change developed as a response to shortage and inefficiencies of monopolized service providers. In the Southwest United States, a similar shortage and inefficient use governs water

Oct
30

In the quest for data on anti-administration activists, the Department of Justice requested the “names of an estimated 6,000 people who ‘liked’ a Facebook page about an Inauguration Day protest.” The DOJ has since dropped that specific request, but at a hearing, Assistant U.S. Attorney John Borchert revealed a persisting interest in “likes” of another

Oct
30

In recent months, some websites have commandeered users’ computer processors to “mine” cryptocurrency. This new form of computer user abuse is called “Cryptojacking.” Cryptojacking is possible because of new “mining” technology that allows websites to run JavaScripts that use an individual’s computer processing power to mine cryptocurrency without the individual’s knowledge or permission. This allows

Oct
22

U.S. intelligence operatives residing in Cuba have been reporting “sonic-like” attacks, affecting at least 21 American operatives so far. Despite attacks beginning roughly a year ago, the story initially failed to pick up significant momentum. Now, almost a year after first reports, continued attacks have prompted significant action from the United States. Despite the hazy

Oct
22

Last week, news broke that hackers working for the Russian government acquired American intelligence programs by exploiting weaknesses in Kaspersky Lab, a software security program used by several agencies in the United States government. According to the Wall Street Journal, the hackers successfully acquired “details of how the U.S. penetrates foreign computer networks and defends

Categories