Enlarge (credit: Aurich Lawson | Getty Images) Home offices have gotten a lot of attention over the last couple of years. When offices all over the world shut down at the beginning of the pandemic, we were all reminded how important it is to have a consistent, comfortable workspace with all the tools and tech…
Monthly Archives: July 2022
Enlarge / Drowning in a sea of data. (credit: Getty Images) Internet services in Lithuania came under “intense” distributed denial of service attacks on Monday as the pro-Russia threat-actor group Killnet took credit. Killnet said its attacks were in retaliation regarding Lithuania’s recent banning of shipments sanctioned by the European Union to the Russian exclave…
Another light summer week in the patent world saw just 19 new petitions (all inter partes reviews [IPRs]), with 65 new district court cases (roughly average), including 75 newly terminated cases. Five petitions were denied, with six granted; Peloton appears to have settled their dispute with Ifit (and dismissed the five related IPRs and district…
Enlarge (credit: Getty Images) An unusually advanced hacking group has spent almost two years infecting a wide range of routers in North America and Europe with malware that takes full control of connected devices running Windows, macOS, and Linux, researchers reported on Tuesday. So far, researchers from Lumen Technologies’ Black Lotus Labs say they’ve identified…
This week in Other Barks & Bites: the Eleventh Circuit overturns a summary judgment ruling against Wreal while clarifying the application of the likelihood of confusion factors in reverse infringement cases; the Supreme Court denies the petition for writ of certiorari in American Axle v. Neapco; the European Union creates its first regulatory framework for…
Enlarge (credit: Getty Images) In online crime forums, specialization is everything. Enter YTStealer, a new piece of malware that steals authentication credentials belonging to YouTube content creators. “What sets YTStealer aside from other stealers sold on the Dark Web market is that it is solely focused on harvesting credentials for one single service instead of…
Can something called a “Bored Ape” be embodied in a non-fungible token (NFT) and be associated with smart contracts? How could this present unique and challenging issues regarding copyright law? Over the course of the last two months, the general public has tracked what started out as a phishing scam involving actor Seth Green’s NFT…
Clark+Elbing LLP is seeking scientists in either chemistry or biology fields for the full-time position of Technology Specialist. Clark+Elbing principally builds its professional staff by hiring strong Ph.D. scientists as Technology Specialists, who are trained, encouraged to pass the patent bar, and supported through law school. Clark+Elbing offers flexible working conditions including on-site in Boston,…
Enlarge (credit: Getty Images) Researchers have identified stealthy new malware that threat actors have been using for the past 15 months to backdoor Microsoft Exchange servers after they have been hacked. Dubbed SessionManager, the malicious software poses as a legitimate module for Internet Information Services (IIS), the web server installed by default on Exchange servers….
In the latest episode of IP Practice Vlogs, we will explore design patents, which protect the ornamental features of a functional item. Apple’s AirPods are functional but have a distinctive look that is identifying of its brand and maker, making them a great subject. The first thing you do when patenting anything, including a design,…
