Court: General Liability Policy Must Cover Online Advertising Theft
A Wisconsin appeals court has issued a ruling that could affect the types of intellectual property claims your insurance provider defends you against in the event of a legal challenge. Here's an...
View ArticleUse a Coworking Space? Make Sure You Know the Risks
In recent years, coworking - the practice of freelancers and small-business owners working in communal spaces designed for that purpose - has risen precipitously in popularity. A survey of independent...
View ArticleEmail E&O Disclaimers: Do They Mean Anything?
You've probably received countless emails that have a disclaimer at the bottom saying something along the lines of "this email and contents are intended only for the recipient" or "contents of this...
View ArticleCourts Slowly Build Tech Case Law: App Thieves Punished
Political news site The Hill reports good news for mobile app developers: the Justice Department has officially convicted its first mobile app pirates. These criminals set up app piracy sites called...
View ArticleThe Next Generation of Business Data Breach: IP Theft
What is IP theft? It's the stealing of intellectual property, designs, patents, code, and other intangible assets. IT theft is becoming more and more common and costly – and even small IT firms can end...
View ArticleJava Update Reveals Why Business Software Is More Vulnerable than Consumer...
Security researcher Brian Krebs reports on the Java 7 and Java 8 updates that Oracle pushed out last earlier this month to fix 37 bugs and some major security issues in the Java SE platform.Among the...
View ArticleApple Award for IP Patents Carves Out More IT Case Law
Lawsuits are something no one likes talking about. They can happen to any business and are hard to plan for. But because people don't talk much about them, there's a lot of confusion about what a...
View Articlehttp://www.techinsurance.com/blog/cloud-security/banking-trojans-not-just-for...
Innovation is the name of the game in IT, but the same holds true in the seedy world of cyber crime, where hackers are always changing their strategies and finding new ways to use old malware. Let's...
View Article