text
stringlengths 0
118
|
---|
See Krebs supra. |
9. |
Nicky Woolf, DDoS Attack that Disrupted Internet Was Largest of Its Kind In History, Experts |
Say, |
The |
Guardian, |
(Oct. |
26, |
2016), |
https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet. |
10. |
Scott Hilton, Dyn Analysis Summary Of Friday October 21 Attack, Dyn Blog, (Oct. 26, 2016), |
available athttp://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/. |
11. |
Berkeley Lovelace Jr., Friday’s Third Cyberattack on Dyn ‘Has Been Resolved,’ Company |
Says, CNBC, (Oct. 21, 2016), available athttp://www.cnbc.com/2016/10/21/major-websites- |
across-east-coast-knocked-out-in-apparent-ddos-attack.html. |
12. |
Woodrow Hartzog, Privacy’s Blueprint: The Battle to Control the Design of New Technologies |
(2018); Woodrow Hartzog & Evan Selinger, The Internet of Heirlooms and Disposable Things, |
17 N.C. J. of Law & Tech. 581 (2016). |
13. |
Bruce Schneier, Click Here to Kill Everybody: Security and Survival in a Hyper-Connected |
World 39 (2018). |
14. |
Schneier, Click Here, supra at 39. |
15. |
The Software Industry Delivers Appliances With Known Vulnerabilities, Cyber Security |
Intelligence, (Oct. 13, 2020), https://www.cybersecurityintelligence.com/blog/the-software- |
industry-delivers-appliances-with-known-vulnerabilities-5252.html |
16. |
See, e.g., Rebecca Crootof, The Internet of Torts: Expanding Civil Liability Standards to |
Address Corporate Remote Interference, 69 Duke L.J. 583 (2019); Stacy-Ann Elvy, Hybrid |
Transactions and the Internet of Things: Goods, Services, or Software?, 74 Wash. & Lee L. |
RevV. 77, 82–86 (2017) (discussing the difficulty of applying the Uniform Commercial Code to |
Internet of Things because the hardware and software service are interdependent); Michael D. |
Scott, Tort Liability for Vendors of Insecure Software: Has the Time Finally Come?, 67 Md. L. |
Rev. 425 (2008); see also Derek Bambauer & Oliver Day, The Hacker’s Aegis, 60 Emory L. J. |
1051 (2011). |
17. |
Id. |
18. |
18 U.S.C. § 1030(g). Michael D. Scott, Tort Liability for Vendors of Insecure Software: Has the |
Time Finally Come?, 67 Md. L. Rev. 425 (2008); see also Derek Bambauer & Oliver Day, The |
Hacker’s Aegis, 60 Emory L. J. 1051 (2011). |
19. |
See, e.g., Rebecca Crootof, The Internet of Torts: Expanding Civil Liability Standards to |
Address Corporate Remote Interference, 69 Duke L.J. 583 (2019). |
20. |
Bruce Schneier, Click Here to Kill Everybody: Security and Survival in a Hyper-connected |
World 36 (2018); see also Woodrow Hartzog, Privacy’s Blueprint: The Battle to Control the |
Design of New Technologies (2018). |
21. |
Schneier, Click Here, supra, at 37. |
22. |
Sophie C. Boerman, Sanne Kruikemeier & Frederik J. Zuiderveen Borgesius, Online |
Behavioral Advertising: A Literature Review and Research Agenda, 46 J. of Advertising 363, |
363 (2017). |
23. |
What |
is |
Malvertising, |
Imperva, |
https://www.imperva.com/learn/application- |
security/malvertising/ (last accessed May 6, 2021). |
24. |
Dilan |
Samarasinghe, |
Malvertising, |
Center |
for |
Internet |
Security, |
https://www.cisecurity.org/blog/malvertising/. |
25. |
Steven Melendez, A New Wave Of Bad Ads Is Hijacking Even Top-Tier Websites, Fast |
Company, (Jan. 18, 2018), https://www.fastcompany.com/40516897/a-new-wave-of-bad-ads-is- |
hijacking-even-top-tier-websites. |
26. |
Jonathan Crowl, The Rise of Malicious Ads: How They Hurt Brands and What Marketers Can |
Do, |
Content |
Standard, |
(Feb. |
21, |
2018), |
https://www.skyword.com/contentstandard/marketing/the-rise-of-malicious-ads-how-they-hurt- |
brands-and-what-marketers-can-do/. |
27. |
Catalin Cimpanu, Hong Kong Malvertiser Blamed for Malicious Ads that Invaded Microsoft |
Apps, ZD Net, (July 17, 2019), https://www.zdnet.com/article/hong-kong-malvertiser-blamed- |
for-malicious-ads-that-invaded-microsoft-apps/. |
28. |
Dan Goodin, Here’s Why the Epidemic of Malicious Ads Grew So Much Worse Last Year, Ars |
Technica, |
(Jan. |
23, |
2018), |
https://arstechnica.com/information- |
technology/2018/01/malvertising-factory-with-28-fake-agencies-delivered-1-billion-ads-in- |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.