Search for: "Long v. Hacker" Results 61 - 80 of 412
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
1 Apr 2021, 3:18 am by Greg Lambert and Marlene Gebauer
Véronique Goy Veenhuys on EQUAL-SALARY and Gender Equalit‪y‬ Stolen: The Search for Jermain   Listen, Subscribe, Comment Please take the time to rate and review us on Apple Podcast. [read post]
30 Dec 2020, 2:19 pm by Bruce Zagaris
Zagaris covered the U.S. indictment of four members of Chinese military for hacking into Equifax, the indictments against Chinese hackers and ordering the closure of the Chinese consulate in Houston. [read post]
30 Dec 2020, 2:19 pm by Bruce Zagaris
Zagaris covered the U.S. indictment of four members of Chinese military for hacking into Equifax, the indictments against Chinese hackers and ordering the closure of the Chinese consulate in Houston. [read post]
7 Dec 2020, 5:01 am by Susan Landau
Hackers in China used data from the devices to commit identity theft. [read post]
24 Oct 2020, 3:42 pm by Chuck Cosson
., that they are too long, too hard to read, and/or don’t convey useful information.[22]  In other cases, though, criticism captures that we are not always rational actors, prone to acceptance of illusions or misinterpretations of privacy disclosures,[23] or given to trade off our own well-being for immediate gratification.[24] Technology and the Virtues notes, to this point, that virtue requires cultivation.[25] To that, then, we can add a sense that virtue is not necessarily… [read post]
7 Oct 2020, 5:30 am by Geoff Schweller
The right of federal employees to criticize their agencies in the media was established in the 1995 Supreme Court Case Sanjour v. [read post]
14 Sep 2020, 9:38 am by Riana Pfefferkorn
For too long, a law aimed at malicious hackers has instead chilled researchers' important work. [read post]
8 Sep 2020, 11:18 am by David Kris
Finally, Naksone writes that “[v]iolent extremist organizations have used the Internet to recruit terrorists, raise funds, direct violent attacks, and disseminate gruesome propaganda. [read post]
20 Aug 2020, 7:56 am by Paul Rosenzweig
In recent years, two unfortunate trends have converged in cybersecurity—the growth of child pornography distributed online and the proliferation of encryption systems that enable the distribution of all forms of content (both lawful and illicit) in a manner that is inaccessible to service providers and secure from observation and interception by law enforcement. [read post]
1 Jul 2020, 12:24 pm by rainey Reitman
We’ve long argued that working with sources to obtain classified documents of public importance is a well-established and integral part of investigative journalism and protected by the First Amendment. [read post]
18 Jun 2020, 4:00 am by Karim Benyekhlef and Nicolas Vermeys
Our goal here is obviously not to single out Zoom, as other videoconferencing tools have also shown to have security flaws, but simply to demonstrate that a lack of adequate protection could be problematic in the context of virtual hearings should they, for example, be subjected to interruptions caused by hackers or other malicious users. [read post]
16 Jun 2020, 2:18 pm by Kevin LaCroix
Judge Anderson found that Capital One failed to meet its burden of establishing that the Mandiant report was entitled to protection under the work product doctrine, because, among other things, Mandiant had a long-standing and pre-existing relationship with Capital One, dating back to at least 2015, to perform essentially the same services. [read post]
6 May 2020, 10:53 am by Brian G. Cesaratto
Consider and address the risks of allowing employees to access organizational resources using company computers/devices v. personal (BYOD) computers/devices. [read post]
8 Apr 2020, 11:48 am by Kevin LaCroix
  Long time readers also undoubtedly quickly recognized that this lawsuit also represents an example of the recent event-driven litigation phenomenon. [read post]
10 Mar 2020, 8:43 pm by Chris Castle
  It is thus striking that the Subcommittee is to hear from Julia Reda, the long-time representative of the Pirate Party in the European Parliament, as well as so many other beneficiaries of Google’s support. [read post]