Cisco Report Says Your Company’s Network Breach Is Coming

The question companies face today about the vulnerability of their data is not if their network will be comprised but rather when, the 2015 Cisco Annual Security Report finds. Security professionals say they are optimistic that they can hold back attackers, the report states. However, in the end “security is a numbers game: Even if […]
Continue Reading

Virginia Anti-Spam Statute Unconstitutional

The Virginia Supreme Court has reversed itself as well as the conviction of a spammer, finding the state’s anti-spam law overly-broad and therefore unconstitutional. In February, 2008, the Virginia Supreme Court upheld the conviction of Jeremy Jaynes for violating provisions of Virginia’s anti-spam statute that prohibited falsifying or forging electronic mail transmission information or other […]
Continue Reading

Californian’s Emails Gives Idaho Jurisdiction Over Can-Spam Case

A California resident who sent over 100 emails to Idaho to recruit executives from a competing marketing firm can be sued in Idaho for violating the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (Can-Spam Act). Daryl Hansen filed a motion to dismiss the case. He argued that he could not be […]
Continue Reading

Spamhaus Default Upheld But Not Injunction

The Spamhaus Project waived its right to contest a default judgment concerning its designation of e360 Insight as a spammer. Based on the evidence, however, the trial court went too far in awarding e360 over $11 million in damages and entering an injunction restricting Spamhaus from designating e360 as a spammer in the future. The […]
Continue Reading

No Surprise: Spammers Still Harvesting Email Addresses

Not surprisingly, spammers continue to harvest email addresses, a new study by the Federal Trade Commission found. However, the good news from the study is that internet service providers’ anti-spam technologies are capable of blocking spam, the report said. The report found that where consumers take a pro-active approach by “masking” their email addresses, the […]
Continue Reading