So, despite your best efforts, you may have been cat-fished, doxed or otherwise victim to an online scam. Your information is probably now out into the Internet and a stranger that you may have trusted now has personally identifying information. So, your next question may be “well, what comes next?”…
Articles Posted in Internet Law
What Are Catfishing Motives?
Now that we’ve discussed Catfishing as a scam, let’s go into further detail regarding the motives. Like any scam, there must be some benefit to the scammer. This benefit is the primary motive for anyone to commit a catfishing scam. Previously, we mentioned that among other things, the perpetrator may…
Catfishing Scams
If you have been online, it is possible that a person has attempted to “catfish” you. However, you may not have been able to adequately understand it because you were not looking for the telltale signs. It is a type of an online scam, like phishing, meant to take advantage…
The Petya Ransomware
In March 2017, the WannaCry ransomware attack occurred which was believed to be one of the largest ransomware attacks in history. Discussions of this past attack and who should take the blame has been previously discussed in our blog and newsletter. Now, just a few months later there has been…
Current Status of Net Neutrality
Net Neutrality is the principle that Internet Service Providers (ISP) and the government should treat all web-related traffic equally regardless of the source. If there was no net neutrality, companies would have the ability to purchase priority access to the ISP customers. Larger and wealthier companies (e.g., Google) would be…
The Growing Problem of Identity Theft
Identity theft is an epidemic impacting people across America. During 2016, an estimated 15.4 million consumers experienced some kind of identity theft. This is an increase from 13.1 million in 2015. Another staggering statistic is that 1 in every 16 adults in the United States is a victim of identity…
OneLogin Security Breach
OneLogin recently suffered from a major security breach. This breach has compromised private and confidential information, which is managed by its datacenter. OneLogin provides a service that is used by organizations to secure their data. It is basically a password manager for corporations. It allows employees, customers, and partners to…
President’s Executive Order on Cybersecurity
President Donald Trump has signed an executive order on cybersecurity as a response to the WannaCry ransomware attack. This executive order is entitled as “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.” The executive order contains three main sections and a fourth category that includes some definitions of terms…
Who Is Responsible for the WannaCry Attack?
On May 12, 2017, what is believed to be the largest ransomware attack in history occurred on the internet. A global search is heating up trying to locate those who are responsible for the attack. While this search is occurring, there is also a question of how much blame for…
Copyright Preemption Laws
For example, you have a lawsuit against another party for infringing on your personal rights of privacy. The other party takes a photograph they had taken of you, and then licenses it to other individuals without your consent. Those individuals use it as a basis for a character in another…