Search for: "Hacker v State" Results 641 - 660 of 729
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
15 Oct 2021, 2:17 pm by Rachel Casper
For instance, there is phishing by phone, sometimes known as vishing with a V because it is voice phishing. [read post]
30 Mar 2012, 1:30 am by Monique Altheim
– After the Supreme Court ruled in U.S. v. [read post]
12 Jul 2017, 3:50 am by Kevin LaCroix
 One recent study found that 70 percent of business victims paid the hackers to get their data back. [read post]
2 Feb 2016, 1:39 pm by F. Paul Pittman
With the holiday season in the rear view, automobiles equipped with the newest technology connecting carmakers with their vehicles, vehicles with the world around them, and drivers with the consumer marketplace – Connected Cars – have moved from the lots to driveways. [read post]
25 Jan 2025, 6:29 pm by Nasseri Legal
Sixth is v., established a new brand name called Ricky Casino. [read post]
29 Nov 2017, 4:23 pm by Jeff Kern and Kate Ross*
The Enforcement Division will target individual hackers, as well as registered entities that fail to safeguard nonpublic information, and public companies that fail to disclose cyber-related risks. [read post]
1 Dec 2017, 2:55 pm by Jeff Kern and Kate Ross*
The Enforcement Division will target individual hackers, as well as registered entities that fail to safeguard nonpublic information, and public companies that fail to disclose cyber-related risks. [read post]
7 May 2025, 6:05 am by Hilary J. Allen
Individual software program developers affiliated with Tornado Cash and backed by the Coinbase crypto exchange challenged OFAC’s determination, arguing in Van Loon v. [read post]
26 May 2015, 9:51 am by Rebecca Tushnet
Security research continued, opponents Copyright Office: Jacqueline CharlesworthMichelle ChoeRegan Smith Cy DonnellySteve RuheJohn RileyStacy Cheney (NTIA) Opponents:Christian Troncoso, BSA | The Software Alliance: we support good faith security testing. [read post]
20 Jul 2022, 4:52 am by Emma Snell
The Marquette Law School poll, which was conducted just days after the court overturned Roe v. [read post]
8 Jun 2022, 7:00 am by Guest Blogger
  To mark this celebration of Sandy’s 40 years at the University of Texas, I want to argue that constitutional faith provides a path back to democracy in the United States. [read post]
9 Dec 2014, 10:38 am by Kevin LaCroix
Examples of incidents include denial of service attacks launched against a network, spear phishing attempts aimed at distributing malware within a network, nation-state hacks, or cyber extortion attempts. [read post]
13 Jan 2016, 5:05 pm by Kevin LaCroix
  Cyber-attacks involving the theft of intellectual property can result in a company’s immediate or even permanent loss of revenue and reputation; cyber-attacks involving denial of services (such as a website being shut down by nefarious hackers) can disrupt or forever diminish consumer or customer confidence; cyber-attacks involving exfiltration of private company emails can have a tumultuous impact upon senior management and create an international uproar; cyber-attacks… [read post]