Did you know that two factor authentication that uses text messages to send the code is inherently insecure? We have known for years that a hacker with equipment costing about $1k can easily intercept our text messages. We also know that a username/password combination by itself is generally not sufficient to secure a bank account. […]
Going back on a trip down memory lane… back when cyber criminals did short jail sentences followed by lucrative consulting gigs. Times have changed and now hackers that are caught generally get longer sentences and are banned from working with computers. In any event, Mr. Morris was convicted under the Computer Fraud and Abuse Act […]
Cyber attacks occur every second of every day. The frequency and sophistication of the attacks
continues to rise. With the increased sophistication and the proliferation of corporate espionage and nation-state actors, the days of curious teen hackers trying to prove their worth are behind us.
Now the threat is bigger and better financed, the stakes are higher, and government intervention changes the landscape. Cybersecurity
is now a top priority for businesses and government.
We start with a brief summary of some of the recent major cyber attacks. This list is purposely kept short as to show only the more “elite” type of attacks that are shaping the new cyber landscape.
Given their level of sophistication, these attacks frequently require in-depth analysis by computer forensics
experts. Here, we are focusing on the legal aspects only.
Advanced Cyber Attacks of 2010: One Word: STUXNET
Stuxnet makes clear that cyber attacks have escalated to new heights. The Stuxnet worm damaged Iranian uranium enrichment centrifuges. Stuxnet temporarily knocked out some of the
centrifuges at Iran’s Natanz nuclear facility. This caused a delay to Iran’s uranium enrichment program. This attack was very effective and stealthy, giving birth to the new cyber warfare.
Advanced Attacks of 2011
China: Its “Comment Group” penetrated the Diablo Canyon nuclear plant operated by Pacific Gas & Electric Co. The breach was reportedly facilitated through a breach of a senior nuclear
planner’s computer. There is no indication of intent to damage the target. Reconnaissance is …
Recently, we have encountered many instances of the following scenario… Often out of curiosity, an Internet website visitor may exceed his authorized access under his access login or
unauthorized access. Under cybercrime and computer laws, a conviction for computer hacking can carry 20 years to life in prison.
If you are accused of computer hacking or unauthorized access to a computer network a cyber crime and hacking our computer hacking defense attorneys understand …