Abington Cole + Ellery

A boutique law firm specializing in complex class action litigation and intellectual property law.

Class Actions

Counsel continuously investigate and prosecute consumer protection and data breach class action lawsuits on behalf of consumers throughout the United States by attacking practices that defraud or take advantage of consumers. Class action successes include lawsuits resulting in hundreds of millions of dollars in settlements and recoveries for consumers.

Intellectual Property

Counsel can assist you with patent searches, preparing and filing provisional and non-provisional patent applications, and prosecuting utility and design patent applications. Other IP services include preparing, filing, and prosecuting trademark applications, counseling clients regarding the protection of trade secrets, and all types of intellectual property litigation.

What You Can Do If You've Been The Victim Of A Data Breach

If you've been the victim of a data breach, taking prompt action can help mitigate potential damages and protect your personal information. Being proactive and vigilant after a data breach can help minimize the risks and protect your personal and financial information from further exposure.

Data Breach Definition & Examples

This article provides a brief definition and examples of notable data breaches and how data breaches can be effectuated. These examples underscore the diverse nature of data breaches and the importance of robust cybersecurity practices to protect sensitive information from unauthorized access.


Enhancing Cybersecurity Frontiers: The Role of Artificial Intelligence

In the emerging Artificial Intelligence (AI) era, cybersecurity continues to be a pivotal concern for individuals, corporations, and governments alike. As cybersecurity threats evolve in complexity and volume, traditional security measures struggle to keep pace.

AI and Cybersecurity: Navigating the Double-Edged Sword

The integration of Artificial Intelligence (AI) into various sectors has brought about significant advancements, driving efficiency, innovation, and transforming traditional methodologies across industries. However, the rapid evolution and adoption of AI also present unique challenges, particularly in the realm of cybersecurity.


Data Breach: "Man-in-the-Middle Attacks"

Attackers intercept and possibly alter the communication between two parties (e.g., between a user and a web service) without their knowledge, potentially capturing sensitive information transmitted during the session.

Data Breach: "Malware Attacks"

Malicious software is used to infiltrate and damage or disable computers, systems, or networks, allowing attackers to steal or encrypt data. Ransomware, a type of malware, encrypts the victim's files, demanding payment for their release.


Data Breach: "SQL Injection"

Attackers exploit vulnerabilities in database-driven applications by injecting malicious SQL statements into input fields for execution.

Data Breach: "Credential Stuffing"

Attackers use automated tools to try large volumes of stolen username and password combinations across various websites to gain unauthorized access to user accounts.


Data Breach: "Phishing Attacks"

Cybercriminals send fraudulent emails or messages that appear to be from a trusted source, tricking individuals into providing sensitive information like passwords, credit card numbers, or social security numbers.

Data Breach: "Exploitation of Software Vulnerabilities"

Attackers exploit known or unknown flaws in software or operating systems to gain unauthorized access to systems or networks. These vulnerabilities can be the result of outdated software, unpatched systems, or inherent flaws in the software design.