Deal with ransomware the way police deal with hostage situations
When faced with a ransomware attack, a person or company or government agency finds its digital data encrypted by an unknown person, and then gets a demand for…
When faced with a ransomware attack, a person or company or government agency finds its digital data encrypted by an unknown person, and then gets a demand for…
In recent weeks, Johannesburg’s computer network was held for ransom by a hacker group called Shadow Kill Hackers. This was the second time in three months a ra…
The people of Baltimore are beginning their fifth week under an electronic siege that has prevented residents from obtaining building permits and business licen…
"Brian Nussbaum is assistant professor at the College of Emergency Preparedness Homeland Security and Cybersecurity at the University at Albany. "Ra…
"Brian Nussbaum is an assistant professor at the College of Emergency Preparedness Homeland Security and Cybersecurity at the University at Albany. "…
As the “NotPetya” ransomware attack spreads around the world, it’s making clear how important it is for everyone – and particularly corporations – to take cyber…
"Cyber law professor Jennifer Granick of Stanford University suggests auto-industry style liability is not appropriate for software. "While it is tru…
"What happened this week won’t be lost on judges in the future should the government again try to get tech companies to build backdoor access into programs…
Computers around the world are suffering an attack from malicious software. The compromised computers have been hit by “ransomware” — software that encrypts the…
"Hackers’ favorite targets include health systems and local governments, said Scott Shackelford, a professor of business law and ethics in the Kelley Schoo…
UCLA Law Review Discourse, Vol. 64, Forthcoming UCLA School of Law, Public Law Research Paper No. 16-29 Abstract: Recent years have witnessed a dramatic incr…
"When a victim pays the ransom — typically in digital bitcoins — the thieves provide a digital key to unlock the system. Yet hackers who aren't motivat…