text
stringlengths
0
118
Nolan Feeney, Sony Asks Media to Stop Covering Hacked Emails, Time Tech, (Dec. 15 2014),
http://time.com/3633385/sony-hack-emails-media/.
79.
See Vanity Fair supra.
80.
Mathew J. Schwartz, Ransomware: Is It Ever OK to Pay?, BankInfo Security, (Apr. 13, 2016),
https://www.bankinfosecurity.com/ransomware-ever-okay- to-pay-a-9036.
81.
FBI Cyber Division Responses to Senator Wyden’s Questions on Ransomware, (Feb. 8, 2016),
https://www.wyden.senate.gov/imo/media/doc/FBI%20Response%20on%20Ransomware.pdf.
82.
Cyber
Extortion:
Ransomware
vs
Extortionware,
Alpine
Security,
https://alpinesecurity.com/blog/cyber-extortion-ransomware-vs-extortionware/.
83.
Darlene Storm, Delilah Malware Secretly Taps Webcam, Blackmails and Recruits Insider
Threat
Victims,
ComputerWorld,
(July
18,
2016),
https://www.computerworld.com/article/3096250/delilah-malware-secretly-taps-webcam-
blackmails-and-recruits-insider-threat-victims.html; Delilah Ransomware is a ‘Blackmailware’
That
Blackmails
You
for
Information,
The
Windows
Club,
(July
22,
2016),
https://news.thewindowsclub.com/delilah-ransomware-blackmailware-blackmails-information-
85034/; https://www.hotspotshield.com/blog/hackers-use-delilah-malware-blackmail/.
84.
Lawrence Abrams, BlackMailware Found on Porn Site Threatens to Report Users are
Spreading
Child
Porn,
BleepingComputer.com,
(Jan.
25,
2018),
https://www.bleepingcomputer.com/news/security/blackmailware-found-on-porn-site-threatens-
to-report-users-are-spreading-child-porn/.
85.
Jessica Davis, Maze Ransomware Hackers Extorting Providers, Posting Stolen Health Data,
HealthITSecurity, (Feb. 4, 2020), https://healthitsecurity.com/news/maze-ransomware-hackers-
extorting-providers-posting-stolen-health-data.
86.
Dissent Doe, Law firm discloses ransomware attack, DataBreaches.net, (Oct. 12, 2020),
https://www.databreaches.net/law-firm-discloses-ransomware-attack/.
87.
California Consumer Privacy Act, Cal. Civ. Code §§ 1798.100-1798.199 (2018).
CHAPTER 8
1.
Sheera Frenkel, A Brazen Online Attack Targets V.I.P. Twitter Uses in a Bitcoin Scan, New York
Times, (last updated July 17, 2020), https://www.nytimes.com/2020/07/15/technology/twitter-
hack-bill-gates-elon-musk.html.
2.
Kate Conger & Nathaniel Popper, Florida Teenager is Charged as ‘Mastermind’ of Twitter
Attack,
New
York
Times,
(last
updated
Sept.
1,
2020),
https://www.nytimes.com/2020/07/31/technology/twitter-hack-arrest.html.
3.
Catalin Cimpanu & Zero Day, How the FBI Tracked Down the Hackers, ZDNet, (Aug. 1,
2020), https://www.zdnet.com/article/how-the-fbi-tracked-down-the-twitter-hackers/.
4.
See
Jeff
Hancock
and
Tessian,
The
Psychology
of
Human
Error
(2020),
https://www.tessian.com/research/the-psychology-of-human-error/ (88 percent of breaches
involved human error); Tony Pepper, Alarming Statistics Show Human Error Remains Primary
Cause of Personal Data Breaches, Realwire, (Aug. 20, 2019) (60 percent of breaches involved
human
error),
https://www.realwire.com/releases/alarming-statistics-show-human-error-