Cyber Insurance Applications and Claims on the Rise in the UK

Cyber insurance applications and claims have soared in view of attacks and fears about fines under the General Data Protection Regulation, with Lloyds offering over 15 different types of cyber insurance policies. A 78 percent increase in claims on cyber policies between 2015 and 2016 means there is a growing amount of exposure for cyber threats […]

Wi-Fi Routers: A New Avenue for Hackers To Attack

Wi-Fi routers appear to be another avenue for hackers to strike. As Sequel has said before, often times it is the office hardware people overlook that can pose real danger to a company. Computerworld has reported the popular Belkin N600 DB router has several vulnerabilities unauthenticated hackers could exploit. The CERT Coordination Center at Carnegie […]

Verbal Confirmation: Protecting Yourself Against Sophisticated Cyberattacks

Small businesses and law firms are not immune to cyberattacks, which is why regularly evaluating network security and internal processes is critically important. Hackers now have the ability to pull together disparate pieces of information about you using computerized brute force attacks, which are essentially massive computers with pre-programmed algorithms trying every possible logical password. […]

If You’re Using Automatically Renewing Subscriptions, You Need to Follow These Cases

Companies that use automatically renewing subscription plans are coming under increasing scrutiny as a growing number of class action lawsuits is filed by consumers who claim they did not explicitly authorize the renewals. These cases are, for the moment at least, popping up primarily in California and Oregon which have particularly stringent laws governing such […]

Federal Circuit Rules, Erroneously, That Programming APIs are Copyright, Compares Them to Dickens

The Federal Circuit Court once again revealed its lack of understanding about the intersection of copyright and tech by overturning a lower court verdict and declaring that programming language application program interfaces (APIs) are subject to copyright. These APIs are intentionally short pieces of text such as “java.lang.ref” and “js.object.name” whose only purpose is to […]