The Most Hated Law on the Internet and Its Problems The Computer Fraud and Abuse Act (CFAA) was the law that prosecutors deployed against Aaron Swartz, an internet activist who killed himself after a years-long legal battle centered around his decision to mass download academic journals. On April...
The Computer Fraud and Abuse Act (CFAA) was the law that prosecutors deployed against Aaron Swartz, an internet activist who killed himself after a years-long legal battle centered around his decision to mass download academic journals. Show More Summary
The first shots of the Civil War were fired on April 12, 1861 at Fort Sumter These unlucky people have names that break computers I keep hearing ads on the radio for this: The McDonalds Monopoly Fraud : from 1995 to 2001, there was...Show More Summary
Is anyone surprised? But how many went along with this expensive fraud? The headmaster…
Almost 19 months after the mass leaking of naked celeb photos known as “The Fappening,” a man has been arrested for violating the Computer Fraud and Abuse Act — and faces up to five years in prison as a result. Ryan Collins of Pennsylvania is...Show More Summary
Ryan Collins of Pennsylvania will plead guilty to violating the Computer Fraud and Abuse Act as part of the celebrity iCloud breach known as “The Fappening” or “Celebgate” by the brave men of Reddit and 4chan who masturbated throughout. He faces up to five years in prison. Read more...
A report being published by a team of hackers-turned-corporate warriors has estimated online advertising fraud is now netting $7.3bn per year for criminals who employ a team a worldwide network of "zombie" computers. White Ops, an anti-botnet...Show More Summary
A hacker who stole nude photos from celebrities' computers and then posted them online pleaded guilty today to a felony violation of the Computer Fraud and Abuse Act. He faces up to five years in federal prison. Andrew Helton had engaged in a two-year phishing scheme and obtained 448 usernames and passwords from 363 email accounts. Show More Summary
The new EMV credit cards (better known as "chip" or "chip and pin" cards) are supposed to significantly cut down on credit card fraud. But these new cards, embedded with computer chips, are far from foolproof. Most security experts say that criminals will now focus on online...
Email is a common attack vector used by fraudsters and computer criminals. But if you thought that it was only used to spread malware, phishing, and Nigerian advance fee scams, think again. There’s a new email-driven scam where an attacker...Show More Summary
By Steven Myers Associate Professor of Computer Science and Informatics Indiana University With the New Year beginning, we have just come through another holiday shopping season, and for many of us, we await our credit card bills--the hangover to the cheer that is the giving season. Show More Summary
Last week, the Ninth Circuit heard oral arguments in Facebook v. Power Ventures. There's a $3M judgement at stake, but that's nothing compared to the impact the case could have on the reach of an anti-hacking law, the Computer Fraud and Abuse Act. That law, once intended to punish......
WHITE PEOPLE ARE GETTING MORE LYRICAL
Judges also rule prosecutors abused the anti-hacking Computer Fraud and Abuse Act.
The United States Court of Appeals for the Second Circuit issued an opinion rejecting the government’s attempt to hold an employee criminally liable under the federal hacking statute—the Computer Fraud and Abuse Act (“CFAA”)—for violating his employer-imposed computer use restrictions. Read more...
You know that computer chip that’s showing up on your new credit cards? The downside is that better security in stores is resulting in increased credit card fraud online. If you’re in the market for a little frothing paranoia to kick off the holidays, here are some more scary statistics from recent studies by the Federal Trade Commission and the U.S. Show More Summary
Warning over computer takeover fraud 10 November 2015 From the section Business Image copyright PA A spate of scams in which criminals use technology to take over victims’ computers has been reported by an anti-fraud group. Financial Fraud Action, a body set up by the financial services industry, said that fraudsters were impersonating major companies […]
Government prosecutors agreed to drop felony obstruction of justice charges against former BP engineer Kurt Mix today. In exchange, Mix agreed to plead guilty to a misdemeanor charge of Computer Fraud and Abuse related to deletion of a text message string while working to stop the BP Gulf Oil spill [...]
By Jim Finkle BOSTON (Reuters) - Some big U.S. retailers are stepping up efforts to use personal identification numbers, or PINs, with new credit cards embedded with computer chips in a bid to prevent counterfeit card fraud. But they...Show More Summary
If you're a Techdirt regular, you probably know that there are some serious problems with the Computer Fraud and Abuse Act. Drafted in 1986 with extremely broad language, the CFAA has grown into an easily abused law that lets prosecutors go after people for minor activities that don't meet any reasonable definition of hacking or computer fraud. Show More Summary