Cyberlaw

What does a hacker look like?

2020 has been rife with cyberattacks, but who is behind these hacks? We dig into the details.

2 months ago

The Good and Not So Good of the IoT Cybersecurity Improvement Act of 2020

In September, the House of Representatives passed a bill requiring that all internet of things (IoT) devices purchased by the…

2 months ago

Coinbit Seizure: Why New Cryptocurrency Exchanges Conduct Wash Trading

On Aug. 26, the South Korean newspaper Seoul Shinmun published a report stating that 99% of transaction volume was faked…

2 months ago

How important is cybersecurity to mobile subscribers?

(This is a guest post by Ian Parkes, director at Coleman Parkes Research, a full-service, UK-based, end-to-end B2B market research…

2 months ago

Deepfake Voice Technology Iterates on Old Phishing Strategies

As the world of AI and deepfake technology grows more complex, the risk that deepfakes pose to firms and individuals…

2 months ago

Incident Response: Pay a Ransom, Go to Jail

Companies that find their files, data or networks locked by a malicious actor demanding an extortion payment now have a…

2 months ago