Spied on By My Cell

Just when you thought you were unplugged, little do you know you’re being stalked!

Even if you are sure you powered down your phone for the night, Android spyware can use your phone to record your voice, and your camera to take video or pictures without your knowledge.

According to research from AVG a well known app for scanning phones and computers for viruses and malware, uncovered this malware and named it Android/PowerOffHijack.A.

Brand Interaction: Take it from a Millennial

By Christina Severino | amdlawgroup.com
Although Baby Boomers still control roughly 70% the U.S.’s total disposable income, targeting “Gen Y” consumers is still a necessary evil for all brands. Generational gaps (both economically and socially) have turned the tables on brands, who are now struggling to keep up with the flighty and sometimes unpredictable behaviors of “Gen-Y”. A 2013 survey by Accenture.com claims that Millennials who use social media are 28% more likely to make a purchase because of a social media recommendation. It is not enough that they simply “like” the brand to make them loyal customers.

Mobile Marketing: Proceed with Caution

By Christina Severino | amdlawgroup.com
In addition to the soaring popularity of social media, the advances in technology have lead many fashion and beauty brands to target consumers through mobile technology. Companies such as Target offer an SMS service in which they send coupons to customers on a regular basis, right to their mobile device.

Price for Violating Social Media Ban

The serious risk of harm or death to people who are, correctly or incorrectly, identified as the two men was addressed on behalf of the public’s interest.

This decision demonstrates the far-reaching consequences of online actions, especially, for being in contempt of court. And Harkins and Liddle’s case illustrates enforcement of law in the Internet age.

Why Data Protection is an Important Issue for International Business

With this Internet and digital era, information travels remarkably fast across the globe. In an international business context, the way information travels can be problematic for large or small companies doing business in several geographic areas. The risk for companies of losing information to competitors is high. Now, schools are offering courses for cybersecurity. Companies invest large sum of money in order to preserve their data. Data protection is a critical in the development of a business especially in the pharmaceutical, biologic, defense, digital sectors.

Domain Names: Registration, Maintain and Monitor

Kathy Stewart | amdlawgroup.com

To introduce one to domain names and domain registration, one must begin with a basic understanding of the World Wide Web, in particular websites. Every computer on the Internet has an Internet protocol or IP address, which is a unique string of four numbers separated by periods, such as 165.166.0.2. Since remembering the IP address of Websites would be nearly impossible, a domain name system was created to replace the length of IP address thereby assigning a unique name to each numeric IP address. A domain name is therefore the unique name given to that particular website or IP address.

Alibaba: Protecting IP Rights in E-Commerce

As the e-commerce industry continues to thrive, the potential for infringing goods to seep into the e-commerce market is even greater, especially in countries like China, where the counterfeit products are more accessible and readily available. Alibaba is built on individual buyers and sellers—Alibaba doesn’t sell merchandise itself. What can you do if someone infringes on your intellectual property rights by doing things like selling counterfeit goods, fakes, or products with your trademark on this type of platform?