Litigation/Liability Trends
U.S. Newspapers Struck by Cyber Attack Turned to ‘Workaround Systems’
Tribune Publishing Co used "workaround systems" to help print major U.S. newspapers including the Los Angeles Times on Sunday and Monday as the company recovers from a cyber attack, a source familiar ...
A New Way to Fight Cyber Attacks: Artificial Intelligence
Last year, Microsoft Corp.'s Azure security team detected suspicious activity in the cloud computing usage of a large retailer: One of the company's administrators, who usually logs on from New York, ...
Wells Fargo Will Fork Over $575M to Resolve Sales-Practices Scandal
Wells Fargo & Co will pay $575 million to settle claims made by U.S. states, the latest settlement as the bank works to resolve lingering investigations and legal battles stemming from its ...
Climate Change Fallout: Floods Pushing Homes Higher, Restricting Access for Disabled
When Superstorm Sandy flooded Liz Treston's home on the South Shore of Long Island, she worried her wheelchair would prevent first responders from rescuing her. So Treston, a quadriplegic, wrote her ...
J&J Can’t Persuade Judge to Set Aside $4.7B Talc Verdict; Appeal to Come
Johnson & Johnson failed to persuade a Missouri trial judge to set aside a July verdict awarding a record $4.69 billion to 22 women who blamed their ovarian cancer on asbestos in the company's ...
J&J Reportedly Moves to Settle Talc Case in Rethink of Legal Strategy
Johnson & Johnson may be sending a peace signal after two years of warring over allegations that its iconic baby powder causes cancer. In what appears to be a first-of-its-kind settlement while ...
U.S. Drivers Sue Hyundai, Kia, Alleging Engine Defect Caused Fires
Hyundai Motor Co. and Kia Motors Corp. were sued by U.S. drivers over an alleged defect that could cause certain engines to catch fire, adding pressure on the South Korean automakers being probed by ...
Cyber Attacks on Connected Cars See Substantial Increase
Hopping into an Uber or a Car2Go is a great way to get around. Unfortunately, hackers agree, exploiting weaknesses in apps to go on "phantom rides" with someone else's profile. From such trips—like ...

