Two Factor Authentication Using SMS Read more

Two Factor Authentication Using SMS

Did you know that two factor authentication that uses text messages to send the code is inherently insecure?  We have known for years that a hacker with equipment costing about $1k can easily intercept our text messages.  We also know that a username/password combination by itself is generally not sufficient to secure a bank account. […]

A Cybercrime Flashback: The Morris Worm Case Read more

A Cybercrime Flashback: The Morris Worm Case

Going back on a trip down memory lane… back when cyber criminals did short jail sentences followed by lucrative consulting gigs.  Times have changed and now hackers that are caught generally get longer sentences and are banned from working with computers.  In any event, Mr. Morris was convicted under the Computer Fraud and Abuse Act […]

Cybersecurity: Stuck Between Advanced Hackers, Government  Regulators, and Liability Read more

Cybersecurity: Stuck Between Advanced Hackers, Government Regulators, and Liability

Cyber attacks occur every second of every day. The frequency and sophistication of the attacks
continues to rise. With the increased sophistication and the proliferation of corporate espionage and nation-state actors, the days of curious teen hackers trying to prove their worth are behind us.
Now the threat is bigger and better financed, the stakes are higher, and government intervention changes the landscape. Cybersecurity
is now a top priority for businesses and government.

We start with a brief summary of some of the recent major cyber attacks. This list is purposely kept short as to show only the more “elite” type of attacks that are shaping the new cyber landscape.
Given their level of sophistication, these attacks frequently require in-depth analysis by computer forensics
experts
. Here, we are focusing on the legal aspects only.

Timeline of Advanced Cyber Attacks

Advanced Cyber Attacks of 2010: One Word: STUXNET

Stuxnet makes clear that cyber attacks have escalated to new heights. The Stuxnet worm damaged Iranian uranium enrichment centrifuges. Stuxnet temporarily knocked out some of the
centrifuges at Iran’s Natanz nuclear facility. This caused a delay to Iran’s uranium enrichment program. This attack was very effective and stealthy, giving birth to the new cyber warfare.

Advanced Attacks of 2011

China: Its “Comment Group” penetrated the Diablo Canyon nuclear plant operated by Pacific Gas & Electric Co. The breach was reportedly facilitated through a breach of a senior nuclear
planner’s computer. There is no indication of intent to damage the target. Reconnaissance is …

Computer Hacking and Unauthorized Access to Computer Networks: Curiosity Can Kill the Cat Read more

Computer Hacking and Unauthorized Access to Computer Networks: Curiosity Can Kill the Cat

Recently, we have encountered many instances of the following scenario… Often out of curiosity, an Internet website visitor may exceed his authorized access under his access login or
under the website’s terms of use.  Website access scripts are easily available online. Their use, however, may generate serious accusations of computer crime, specifically hacking and
unauthorized access.  Under cybercrime and computer laws, a conviction for computer hacking can carry 20 years to life in prison.

If you are accused of computer hacking or unauthorized access to a computer network a cyber crime and hacking  our computer hacking defense attorneys understand …