A legal question for the AI age: Is tricking a robot the same thing as hacking it?
"Their paper considers a broad view of the legal definition of hacking under the CFAA, applying it even to previous work done by one of the co-authors, Yos…
"Their paper considers a broad view of the legal definition of hacking under the CFAA, applying it even to previous work done by one of the co-authors, Yos…
"Even Hutchins’s defenders say if he’s guilty some punishment is in order, but his prosecution also sends a mixed message. Hutchins had been a model of pub…
"The level of computer security is such that it would be “kind of shocking” if at least some government data weren’t accessible to hackers, said Brian Nuss…
"According to Andrea Matwyshyn, professor of law and computer science at Northeastern University, if companies help cyber criminals make money off hacks, t…
Rep. Tom Graves (R-GA) and Rep. Kyrsten Sinema (D-AZ) introduced the Active Cyber Defense Certainty Act (H.R. 4036) in the House of Representatives on Oct. 13.…
"Professor Brett Frischmann at Villanova University states, "the problem some companies face with self-dealing by IT professionals is complex because…
"When it comes to fighting cyber crimes in Hollywood, it’s a case of pay now or pay later. Matwyshyn said the entertainment industry is a prime target for…
The last two days have seen two major developments regarding Russian hacking. First, Russian President Vladimir Putin tacitly admitted that Russian hackers migh…
A group of hackers called the Shadow Brokers has just released a new dump of data from the National Security Agency. This is plausibly the most extensive and im…
"In United States v. Jay Michaud the indictment will be dismissed without prejudice, meaning that the DoJ can pick the case up again within the statute of…
The House recently passed legislation that would update the Stored Communications Act, a measure that dictates how law enforcement can gain access to electronic…
"Riana Pfefferkorn -- who helped write an amicus brief on Apple's behalf (along with several other security researchers and professors) -- pointed out…