text
stringlengths
0
118
See Krebs supra.
9.
Nicky Woolf, DDoS Attack that Disrupted Internet Was Largest of Its Kind In History, Experts
Say,
The
Guardian,
(Oct.
26,
2016),
https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet.
10.
Scott Hilton, Dyn Analysis Summary Of Friday October 21 Attack, Dyn Blog, (Oct. 26, 2016),
available athttp://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/.
11.
Berkeley Lovelace Jr., Friday’s Third Cyberattack on Dyn ‘Has Been Resolved,’ Company
Says, CNBC, (Oct. 21, 2016), available athttp://www.cnbc.com/2016/10/21/major-websites-
across-east-coast-knocked-out-in-apparent-ddos-attack.html.
12.
Woodrow Hartzog, Privacy’s Blueprint: The Battle to Control the Design of New Technologies
(2018); Woodrow Hartzog & Evan Selinger, The Internet of Heirlooms and Disposable Things,
17 N.C. J. of Law & Tech. 581 (2016).
13.
Bruce Schneier, Click Here to Kill Everybody: Security and Survival in a Hyper-Connected
World 39 (2018).
14.
Schneier, Click Here, supra at 39.
15.
The Software Industry Delivers Appliances With Known Vulnerabilities, Cyber Security
Intelligence, (Oct. 13, 2020), https://www.cybersecurityintelligence.com/blog/the-software-
industry-delivers-appliances-with-known-vulnerabilities-5252.html
16.
See, e.g., Rebecca Crootof, The Internet of Torts: Expanding Civil Liability Standards to
Address Corporate Remote Interference, 69 Duke L.J. 583 (2019); Stacy-Ann Elvy, Hybrid
Transactions and the Internet of Things: Goods, Services, or Software?, 74 Wash. & Lee L.
RevV. 77, 82–86 (2017) (discussing the difficulty of applying the Uniform Commercial Code to
Internet of Things because the hardware and software service are interdependent); Michael D.
Scott, Tort Liability for Vendors of Insecure Software: Has the Time Finally Come?, 67 Md. L.
Rev. 425 (2008); see also Derek Bambauer & Oliver Day, The Hacker’s Aegis, 60 Emory L. J.
1051 (2011).
17.
Id.
18.
18 U.S.C. § 1030(g). Michael D. Scott, Tort Liability for Vendors of Insecure Software: Has the
Time Finally Come?, 67 Md. L. Rev. 425 (2008); see also Derek Bambauer & Oliver Day, The
Hacker’s Aegis, 60 Emory L. J. 1051 (2011).
19.
See, e.g., Rebecca Crootof, The Internet of Torts: Expanding Civil Liability Standards to
Address Corporate Remote Interference, 69 Duke L.J. 583 (2019).
20.
Bruce Schneier, Click Here to Kill Everybody: Security and Survival in a Hyper-connected
World 36 (2018); see also Woodrow Hartzog, Privacy’s Blueprint: The Battle to Control the
Design of New Technologies (2018).
21.
Schneier, Click Here, supra, at 37.
22.
Sophie C. Boerman, Sanne Kruikemeier & Frederik J. Zuiderveen Borgesius, Online
Behavioral Advertising: A Literature Review and Research Agenda, 46 J. of Advertising 363,
363 (2017).
23.
What
is
Malvertising,
Imperva,
https://www.imperva.com/learn/application-
security/malvertising/ (last accessed May 6, 2021).
24.
Dilan
Samarasinghe,
Malvertising,
Center
for
Internet
Security,
https://www.cisecurity.org/blog/malvertising/.
25.
Steven Melendez, A New Wave Of Bad Ads Is Hijacking Even Top-Tier Websites, Fast
Company, (Jan. 18, 2018), https://www.fastcompany.com/40516897/a-new-wave-of-bad-ads-is-
hijacking-even-top-tier-websites.
26.
Jonathan Crowl, The Rise of Malicious Ads: How They Hurt Brands and What Marketers Can
Do,
Content
Standard,
(Feb.
21,
2018),
https://www.skyword.com/contentstandard/marketing/the-rise-of-malicious-ads-how-they-hurt-
brands-and-what-marketers-can-do/.
27.
Catalin Cimpanu, Hong Kong Malvertiser Blamed for Malicious Ads that Invaded Microsoft
Apps, ZD Net, (July 17, 2019), https://www.zdnet.com/article/hong-kong-malvertiser-blamed-
for-malicious-ads-that-invaded-microsoft-apps/.
28.
Dan Goodin, Here’s Why the Epidemic of Malicious Ads Grew So Much Worse Last Year, Ars
Technica,
(Jan.
23,
2018),
https://arstechnica.com/information-
technology/2018/01/malvertising-factory-with-28-fake-agencies-delivered-1-billion-ads-in-