text
stringlengths 0
118
|
---|
Nolan Feeney, Sony Asks Media to Stop Covering Hacked Emails, Time Tech, (Dec. 15 2014), |
http://time.com/3633385/sony-hack-emails-media/. |
79. |
See Vanity Fair supra. |
80. |
Mathew J. Schwartz, Ransomware: Is It Ever OK to Pay?, BankInfo Security, (Apr. 13, 2016), |
https://www.bankinfosecurity.com/ransomware-ever-okay- to-pay-a-9036. |
81. |
FBI Cyber Division Responses to Senator Wyden’s Questions on Ransomware, (Feb. 8, 2016), |
https://www.wyden.senate.gov/imo/media/doc/FBI%20Response%20on%20Ransomware.pdf. |
82. |
Cyber |
Extortion: |
Ransomware |
vs |
Extortionware, |
Alpine |
Security, |
https://alpinesecurity.com/blog/cyber-extortion-ransomware-vs-extortionware/. |
83. |
Darlene Storm, Delilah Malware Secretly Taps Webcam, Blackmails and Recruits Insider |
Threat |
Victims, |
ComputerWorld, |
(July |
18, |
2016), |
https://www.computerworld.com/article/3096250/delilah-malware-secretly-taps-webcam- |
blackmails-and-recruits-insider-threat-victims.html; Delilah Ransomware is a ‘Blackmailware’ |
That |
Blackmails |
You |
for |
Information, |
The |
Windows |
Club, |
(July |
22, |
2016), |
https://news.thewindowsclub.com/delilah-ransomware-blackmailware-blackmails-information- |
85034/; https://www.hotspotshield.com/blog/hackers-use-delilah-malware-blackmail/. |
84. |
Lawrence Abrams, BlackMailware Found on Porn Site Threatens to Report Users are |
Spreading |
Child |
Porn, |
BleepingComputer.com, |
(Jan. |
25, |
2018), |
https://www.bleepingcomputer.com/news/security/blackmailware-found-on-porn-site-threatens- |
to-report-users-are-spreading-child-porn/. |
85. |
Jessica Davis, Maze Ransomware Hackers Extorting Providers, Posting Stolen Health Data, |
HealthITSecurity, (Feb. 4, 2020), https://healthitsecurity.com/news/maze-ransomware-hackers- |
extorting-providers-posting-stolen-health-data. |
86. |
Dissent Doe, Law firm discloses ransomware attack, DataBreaches.net, (Oct. 12, 2020), |
https://www.databreaches.net/law-firm-discloses-ransomware-attack/. |
87. |
California Consumer Privacy Act, Cal. Civ. Code §§ 1798.100-1798.199 (2018). |
CHAPTER 8 |
1. |
Sheera Frenkel, A Brazen Online Attack Targets V.I.P. Twitter Uses in a Bitcoin Scan, New York |
Times, (last updated July 17, 2020), https://www.nytimes.com/2020/07/15/technology/twitter- |
hack-bill-gates-elon-musk.html. |
2. |
Kate Conger & Nathaniel Popper, Florida Teenager is Charged as ‘Mastermind’ of Twitter |
Attack, |
New |
York |
Times, |
(last |
updated |
Sept. |
1, |
2020), |
https://www.nytimes.com/2020/07/31/technology/twitter-hack-arrest.html. |
3. |
Catalin Cimpanu & Zero Day, How the FBI Tracked Down the Hackers, ZDNet, (Aug. 1, |
2020), https://www.zdnet.com/article/how-the-fbi-tracked-down-the-twitter-hackers/. |
4. |
See |
Jeff |
Hancock |
and |
Tessian, |
The |
Psychology |
of |
Human |
Error |
(2020), |
https://www.tessian.com/research/the-psychology-of-human-error/ (88 percent of breaches |
involved human error); Tony Pepper, Alarming Statistics Show Human Error Remains Primary |
Cause of Personal Data Breaches, Realwire, (Aug. 20, 2019) (60 percent of breaches involved |
human |
error), |
https://www.realwire.com/releases/alarming-statistics-show-human-error- |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.