Quantcast
Channel: MicroHelp, Inc. » cfaa
Browsing all 14 articles
Browse latest View live

Senate Considers Using Mob Law To Go After Cybercriminals

Collaborators:  Brian Donohue Paul Roberts Members of the Senate Judiciary Committee listened as one of the nation's top cyber cops asked for expanded powers to go after cybercriminal groups,...

View Article



House GOP Task Force Favors Private Incentives, Fewer Regulations for...

A House GOP task force called on Congress this week to adopt voluntary incentives - rather than federal requirements - to get private companies to further develop their cyber security. read more

View Article

Stealing Corporate Data Doesn’t Violate Federal Computer Fraud Law

In a ruling that could be felt throughout the business world, the U.S. Court of Appeals for the Ninth Circuit in California ruled that a man did not violate the Computer Fraud and Abuse Act (CFAA)...

View Article

CFAA Loopholes and Gotchas Discussed at Black Hat

The Computer Fraud and Abuse Act (CFAA) can be unsettling even to the most stalwart security researcher. The law, enacted in 1986 and revisited several times since, is still littered with loopholes and...

View Article

Legal Divide Between Security Research and Cybercrime Remains Murky

The line between criminal hacking and well-meaning security research is a thin, hazy one according to a panel discussion at Black Hat.

View Article


Proposed CFAA Amendments Could Chill Security Research

Vague language in the White House's proposed amendments to the CFAA leave the door open to a chilling effect on legitimate security research.

View Article

Threatpost News Wrap, January 16, 2015

Dennis Fisher and Mike Mimoso discuss the security news of the past week, including the proposed changes to the CFAA, David Cameron's encryption comments, the NSA's quasi-apology regarding Dual EC and...

View Article

Researcher Tries to Get Ahead of CFAA Changes, Dumps 10M Sanitized Passwords

A dump of 10 million sanitized usernames and passwords was released online, sparking debate over its legality in light of proposed changes to the Computer Fraud and Abuse Act.

View Article


Security Researchers Wary of Proposed Wassenaar Rules

The Commerce Department’s Bureau of Industry and Security today made public its proposal to implement the controversial Wassenaar Arrangement.

View Article


Samy Kamkar’s ProxyGambit Picks Up for Defunct ProxyHam

Hardware hacker Samy Kamkar has developed an anonymization device called ProxyGambit that improves upon ProxyHam, the device that was supposed to be unveiled at DEF CON.

View Article

Ex-Cardinals Exec Sentenced Four Years for Astros Hack

A U.S. Federal Court sentenced Christopher Correa to almost four years in prison for hacking into a computer system that belongs to the Houston Astros.

View Article

Mirai Vulnerability Disclosed, But Exploits May Constitute Hacking Back

A buffer overflow found in the Mirai botnet could eliminate its ability to carry out HTTP flood attacks. But exploiting that vulnerability puts defenders in a gray area with regard to hacking back.

View Article

Revised Active Defense Bill Allows Victims to Recover or Destroy Stolen Data

Rep. Tom Graves has revised a draft of the Active Cyber Defense Certainty Act with new provisions that include mandatory notification and permission to recovery or destroy stolen data on the attacker’s...

View Article


Marcus Hutchins’ Only Certainty is Uncertainty

WannaCry hero Marcus Hutchins pleaded not guilty last week could be freed today on $30,000 bond before the case moves to Wisconsin.

View Article
Browsing all 14 articles
Browse latest View live




Latest Images