When It Comes to Tech, Size Matters

Big, small or in-between? When dealing with tech, it seems that there are preferences, and fortunately there options currently.

Long, long ago and far away, back in the disco days of the 1970s, the only available computer to me was a massive, computer punchcard-eating behemoth that appeared to take up the entire basement of my college library. While it was a floor-to-ceiling piece of junk by today’s standards, size was not an issue — because if you wanted to work on a computer, that was the only game in town. I declined.

Continue reading “When It Comes to Tech, Size Matters”

When Does Cybercrime Become Internet Warfare?

Since the beginning of time, unfortunately, some people have been intent on causing harm to others for their own benefit. This, of course, has been true with respect to Internet conduct. Indeed, we now live in a world in which the “black hats” are actively hacking and causing other problems in cyberspace, while the “white hats” are trying to combat these efforts.

Cybercrime is not confined within the borders of sovereign states. What happens on the Internet goes beyond national borders. After all, we are dealing with the World Wide Web. Accordingly, cybercrime has international implications.

Continue reading “When Does Cybercrime Become Internet Warfare?”

It’s a Small World After All

It just is not realistically possible for countries to be isolationist in this current era. Indeed, the entire world is interconnected by the Internet and other technologies.

Consider this fact that shows how the world is becoming smaller as we group together even more closely: 3,000 years ago there were about 600,000 independent world communities; now there are fewer than 200 such communities.

And when a disease breaks out like Ebola in Africa, with our means of transportation, such a disease can show up and infect people in distant other places.

Continue reading “It’s a Small World After All”

Are U.S. Companies Violating European Union Privacy Rules?

Gone are the days when some companies may decide to take lightly the responsibility to safeguard private data. Indeed, many companies have been very earnest in complying with U.S. privacy rules when it comes to sensitive data such as health and financial information.

But how are U.S. companies doing when it comes to protecting European data? Not so well, according to a recent complaint filed with the Federal Trade Commission (FTC).

Continue reading “Are U.S. Companies Violating European Union Privacy Rules?”

Wait, Now USB Devices May Be Unsafe Too?

Thumb drives, keyboards, and mice, oh my! That’s right, these USB devices now may be the latest “lions, tigers, and bears” to fear in our high-tech world.

According to a recent Reuters article, such USB devices possibly can be compromised to hack into personal computers in a previously unknown form of attack that supposedly can side-step current security precautions.

As reported by Reuters, Karsten Nohl, a chief scientist at SR Labs in Berlin, has stated that hackers potentially can load software onto very small and inexpensive chips that control the functions of USB devices, but which presently do not have “built-in shields” that would prevent tampering with the devices’ operative code.

Continue reading “Wait, Now USB Devices May Be Unsafe Too?”

Police Banner ‘Ads’ Warn About Potentially Pirated Content

Internet ads can be annoying. At times, for example, you may be seeking to read an article or watch a video clip online, but first you have to click off an advertisement that is in the way, or you have to wait out a video ad before you can watch the video content of your choosing.

Perhaps these ads once in a while may be successful in gaining your interest to buy the advertised products, but certainly most of the time these ads simply are a nuisance and a waste of time.

Continue reading “Police Banner ‘Ads’ Warn About Potentially Pirated Content”

Hacking Continues: European Central Bank Is the Latest Victim

WHEN WILL IT stop? We have been hearing about cyberhacking for years, and rather than hack attacks dropping out of the news, we continue to be inundated with reports of successful hacks. This time the latest victim is the European Central Bank.

Perhaps you are thinking that because hacking is nothing new, methods and technology should have been developed to thwart hackers in their tracks. And it is true, there has been significant progress in this regard.

Continue reading “Hacking Continues: European Central Bank Is the Latest Victim”

Freedom of Anonymous Online Speech Has Potential Limits

It is very easy to communicate freely and anonymously on the Internet. And some people believe that if they do not use their real names and easily identifiable information, they can basically say whatever they want online, without needing to worry about the impact that their Internet speech may have on others.

Is this true? Read on, because the answer is not simple.

Continue reading “Freedom of Anonymous Online Speech Has Potential Limits”

Uber and Lyft Halted in Pittsburgh, for Now

More and more, people are migrating away from the traditional call-a-taxi model, and are instead searching on their smartphones for the closest Uber or Lyft vehicle. You might remember the Beatles’ lyric “Baby, you can drive my car,” and now Uber and Lyft drivers likely are singing to themselves, “Baby, you can ride in my car.” Copasetic, right? Well, maybe….

Just when this new business model has been taking the country by storm, along comes a cease and desist order commanding Uber Technologies and Lyft Inc. to immediately stop operations in Pittsburgh, according to the Pittsburgh Business Times. The two judges who issued the order have ruled that Uber and Lyft cannot operate in Pittsburgh until they obtain the proper authority from the Pennsylvania Public Utility Commission (PUC). And to top this off, the judges have taken the position that the order prohibiting operations will not be stayed while this matter is reviewed by the PUC.

Continue reading “Uber and Lyft Halted in Pittsburgh, for Now”

ABA: Lawyers Can Snoop on Jurors’ Social Media Sites

Jurors always are admonished by judges not to conduct any independent factual research with respect to the cases they are considering. In this way, the rules of evidence will be adhered to and jurors will only be permitted to evaluate evidence deemed admissible and relevant by the judge.

But what about lawyers? How much sleuthing can they do with respect to the potential and actual jurors for their cases? Can they, for example, snoop on social media sites to learn more? Read on.

Continue reading “ABA: Lawyers Can Snoop on Jurors’ Social Media Sites”

© 2009- Duane Morris LLP. Duane Morris is a registered service mark of Duane Morris LLP.

The opinions expressed on this blog are those of the author and are not to be construed as legal advice.

Proudly powered by WordPress