Sunken silver and state immunity – Law Gazette – Features
Public international law. – Read More
Public international law. – Read More
Civil litigation. – Read More
Decisions filed recently with the Law Society (which may be subject to appeal) – Read More
AT&T Corp. disclosed today that a new data breach has exposed phone call and text message records for roughly 110 million people — nearly all of its customers. AT&T said…
People involved in the Internet Regulation area have a recurring joke that the field is like being stuck in some form of digital Groundhog Day, in which we are re-living…
The Russia-based cybercrime group dubbed “Fin7,” known for phishing and malware attacks that have cost victim organizations an estimated $3 billion in losses since 2013, was declared dead last year…
Key Takeaways: Hotel event agreements can seem like low-risk arrangements, but they can have severe financial consequences if they are not negotiated correctly. The top three most important clauses to…
The NCSC’s Chief Engineer has been named as one of the top 50 Women in Engineering at a prestigious awards ceremony. – Read More
Mae’r hawl sylfaenol i holi awdurdodau cyhoeddus a’u dwyn i gyfrif yn un o gonglfeini’n democratiaeth. – Read More
The fundamental right to ask questions of and hold public authorities to account is a cornerstone of our democracy. – Read More
Microsoft Corp. today issued software updates to plug at least 139 security holes in various flavors of Windows and other Microsoft products. Redmond says attackers are already exploiting at least…
APT40 is one of the cyber actors that has embraced the trend of using SoHo devices to launch attacks – Read More
At the Information Commissioner’s Office (ICO), we are encouraging people to check how an app plans to use their personal information before they sign up. – Read More
The Information Commissioner’s Office (ICO) will hold its annual Data Protection Practitioners’ Conference (DPPC) online on Tuesday 8 October. – Read More
Most accomplished cybercriminals go out of their way to separate their real names from their hacker handles. But among certain old-school Russian hackers it is not uncommon to find major…