Posted

Bird-singingTweet nicely to the Twitter bot, “LnH: The Band”—a newcomer in artificial intelligence music generation—and the bot will automatically compose melodies for you. The AI-based band is “currently working on their first album,” according to LnH Music, but who will own the rights and royalties to the album? Or what about Mubert, which is touted by its creators as the world’s first online music composer, and which “continuously produces music in real-time … based on the laws of musical theory, mathematics and creative experience?” In other words, if a computer program generates a creative work—be it a song, book or other creation—is there a copyright to be owned? If so, who owns and gets to collect on the copyright?

Continue Reading →

Posted

iStock_76948859_MEDIUM-map-pin-300x200

In this political season, much has been made about late-night Twitter rants targeting women and other social media attacks on individuals and celebrities. Although these harsh online critiques create a more hostile cyber community, more imminent danger may arise from the safety risks that accompany online activity in general. Law-enforcement officials have long warned users against disclosing travel plans on social media to would-be thieves by, for example, posting pictures of a boarding pass from that long-awaited trip to Barcelona. But what about apps and services like Find My Friends, where users can share their location with up to 50 friends, or Snapchat, which shows a user’s location when posting an image or video? With a culture focused on sharing and instant access to information via social media feeds, it bears considering if location-revealing apps engender some inherent danger, whether the app developers disclose potential risks, and what steps can be taken to protect personal safety.

Continue Reading →

Posted

Political campaigns have increasingly turned to social media as a channel to reach voters. Social media not only has the power to reach audiences numbering in the billions, but it also has the power to change the behavior of its users. This far-reaching influence is nothing new—advertisers pay lots of money to use these channels to sell and market their products to targeted audiences. But, could this power be used to sway voters, and is there anything that prevents social media companies from getting into the game of politics?

Continue Reading →

Posted

Today’s online world is all about engaging and staying connected with others via social media. For businesses, establishing a presence on various social media platforms is an enticing way to connect with current customers as well as foster new business.

Yet the immense popularity of social media sites can also draw unwanted attention to its users. Just as businesses are drawn to popular social medial sites to market their brands and products, so, too, are potential cybercriminals interested in targeting those who engage with these sites. On many of these platforms, user engagement is public. In other words, when a user chooses to “follow” a company or leave a comment, not only does the business take notice of the user, but everyone else on the platform can, as well, including those who are not themselves following the business. This provides a would-be cybercriminal a target-rich group upon whom to practice new (and old) scams.

Continue Reading →

Posted

Since my last post on the subject (“LinkedIn Grapples with the Ripples of a 2012 Data Breach”), there have been several developments related to LinkedIn’s 2012 data breach. First, in May, LinkedIn announced it has finished the process of invalidating passwords at risk, specifically LinkedIn accounts that had not reset their passwords since the 2012 breach:

Continue Reading →

Posted

NewsofNoteMain

Even as the initial furor surrounding the release of developer Niantic’s Pokémon-themed ap has subsided, the issues raised by the mass embrace of the augmented reality-flavored game continue to merit attention from lawmakers, games makers and players alike. Here are a few of the recent stories involving Pikachu, Charizard and company.

Continue Reading →

Posted

A robust cybersecurity strategy involves sophisticated, overlapping protections. Along with up-to-date technology, well-trained employees and vigilant IT professionals, comprehensive insurance coverage is an often necessary ingredient of any protective “moat” shielding a company from damaging cyberattacks. Yet does a company’s cyber insurance package actually protect it from one of the most common forms of cyberattack—when a hacker goes phishing? In her post “Phishing for Insurance Coverage” on Pillsbury’s Policyholder Plus insurance blog, our colleague Peri Mahaley examines a variety of surprising phishing-related exclusions one might discover in a company’s cyber coverage.

 

Posted

According to the official Pokémon website, “kids all over the world have been discovering the enchanting world of Pokémon [for over 15 years].” Not surprisingly, many of us who used to be kids in the 15+ years are playing Pokémon Go, but who would have expected nearly 4 of every 5 Pokémon Go players (almost 80%) to be adults. Put into perspective—at Pokémon Go’s peak of 25 million daily active users, close to 20 million adults may have been playing the location-based augmented reality mobile game every day! Still, that also means at least one out of every five players are children, which in turn represents millions of daily active users against whom one or more provisions of Pokémon Go’s Terms of Service (TOS) might be unenforceable.

Continue Reading →

Posted

matrixOn Saturday, July 23, Facebook acknowledged its anti-spam systems had briefly and accidentally blocked links to WikiLeaks files containing internal Democratic National Committee (DNC) emails. WikiLeaks had released 19,000 leaked documents from the DNC containing communication between Democratic Party officials on Friday, July 22. The following day, people tweeted screenshots of an error message they received when attempting to post links to the leaked documents: “The content you’re trying to share includes a link that our security systems detected to be unsafe.”

Continue Reading →

Posted

Transformative technologies do not just change their own industries—they cause a ripple effect throughout adjacent, more mature sectors. Just as the sudden, mass embrace of augmented reality in Pokémon Go opens up a number of liability concerns, so, too, will the advent of autonomous vehicles (the embrace of which is markedly more measured, but just as inevitable) necessitate changes in the insurance industry and the products it provides. In their post, “Robot Take the Wheel: Insurance Implications of Autonomous Vehicles,” colleagues Peter Gillon and Bryan Coffey examine some of the likely paths these changes may take.