Call Now

Hot Legal Issues. High-Tech Solutions.
Contact Us Today

Blog Archives

How to Turn Digital Video into a Star Witness

We live in a world in which video surveillance is omnipresent. Nowadays, we hardly bat an eye at finding ourselves reflected in a closed-circuit television (CCTV) screen in a supermarket, or realizing a friend took a video from last week’s brunch and posted it to social media. Video security footage, as well as footage from casual observers, exists in nearly every dimension of society, from law enforcement to the office to the privacy of our own home webcams. When it …

What The OPM Hack Means for Data Security and Privacy

Last month, reports flooded in that the Office of Personnel Management (OPM), a federal agency that (amongst other things) manages the data of millions of government workers, had been hacked sometime in May of this year. It was one of the largest reported government data breaches in history, though by no means the first for the federal government or even the OPM. More disturbing is the fact that the breach—suspected to be the work of hackers based in China—may have …

Top Four Incident Response Lessons Learned From The Anthem Hack

The magnitude of the Anthem computer network hack is still causing aftershock.  While the breach itself was uncovered in early February, a few weeks later it was determined that the data of millions of children covered by the health insurance giant has also been exposed.  Now, they too will be vulnerable to identity theft.  The numbers associated with this breach are staggering and continue to grow:  approximately eighty million Social Security numbers, addresses, phone numbers, dates of birth, names, employment …

The Rise of Ransomware and the Future of Cybercrime

On January 2, the New York Times published an opinion piece entitled, “How My Mom Got Hacked,” a review of one woman’s experience helping her mom traverse the complex, and unfortunately growing, landscape of ransomware.[1] Ransomware is a type of malware that encrypts a system’s data, thereby restricting access to that data until a certain amount of money – the ransom – is paid. At that point, the cybercriminal will (allegedly) provide the encryption key. Typically ransomware attacks are carried …