A former IT worker at Expedia Inc. pleaded guilty Monday to securities fraud after authorities said he used his access to the computers of top executives to rummage through their email, then made lucrative, illegal stock trades based on the inside information he discovered. Prosecutors said Jonathan Ly, 28, made...
SEATTLE (AP) — A former information technology worker at Expedia Inc. pleaded guilty Monday to securities fraud after authorities said he used his access to the computers of top executives to rummage through their email, then made lucrative,...Show More Summary
Discussion about possible election fraud in the Unites States has been amplified by several computer hacks at major federal institutions and corporations over the past few months. Throughout his election campaign, Donald Trump has consistently suggested that voter fraud is rampant. As recently as Saturday, Trump alleged that Democratic polling [...]
The individual behind the 2014 iCloud image leaks -- more commonly known as the Fappenning -- has been sentenced. Ryan Collins, 36, will serve an 18 month jail term for one count of violating the Computer Fraud and Misuse Act and another of illegally obtaining access to a computer. Show More Summary
Everyone knows about cybercrime and how owning networked computers and mobile devices makes you a potential victim of bank fraud, identity theft, extortion, theft of confidential information, etc. Data stored on your computer is never...Show More Summary
In 1986, back in the days of briefcase-sized cellphones and book-sized Walkman Personal Stereos, Congress passed the Computer Fraud and Abuse Act to protect privacy and infrastructure in a new technological age. The legislation was intended to target computer crimes—like unauthorized access to networks, theft of computer software, and internet fraud. Show More Summary
A man who hacked the Apple iCloud and Gmail accounts of hundreds of people, including celebrities in Los Angeles, from his computer in Chicago has pleaded guilty to computer fraud in federal court, authorities said. Edward Majerczyk, 28, pleaded guilty Tuesday to violating the Computer Fraud and...
Hacking democracy is apparently very easy for people hell-bent on perpetrating election fraud and winning a race for their candidate, and the key to overriding an actual vote and stealing a win is apparently a memory card with a few lines of computer code, according to the Emmy-nominated documentary Hacking Democracy. Show More Summary
The 1986 Computer Fraud and Abuse Act remains one of the most controversial federal tech-regulating laws on the books. The “anti-hacking” measure was meant to protect against a range of online crimes, but 30 years later there is still little consensus about what a computer crime is, and what the law actually covers. Show More Summary
MSNBC’s Joy Reid, who was swift to condemn Republican concerns of voter fraud, was equally as fast at accusing them of plotting to steal the election. Reid’s concern centered on a computer system called CrossCheck which was developed to find duplicate names on the voter rolls so they can be removed. Show More Summary
The son of a prominent Russian politician has been convicted in Seattle of 38 charges related to stolen credit card information, including 10 counts of wire fraud and nine counts of obtaining information from a protected computer, the US Justice Department announced on Thursday. More »
The son of a prominent Russian politician has been convicted in Seattle of 38 charges related to stolen credit card information, including 10 counts of wire fraud and nine counts of obtaining information from a protected computer, the Justice Department announced on Thursday. Read more...
by Jennifer Campbell Oh, there's the Russian hack button! David Carillet In last night's episode of CSI: Cyber: Seattle, a Russian computer hacker named Track 2 (Roman Seleznev) is finally convicted, two years after being arrested on his way to a luxury resort in the Maldives, an act Seleznev's politician father tried to frame as a kidnapping. Show More Summary
Promobot. (Photo: Promobot) For a viral-aspiring Youtube video, this one starts off pretty boring. Three people, two men and one woman, are gathered around a table, which holds a computer broadcasting the 2016 Río Opening Ceremonies....Show More Summary
Sorry to disappoint the conspiracy theorists, but when it comes to sinister suspicions about election fraud, the best test is a piece of computer programmers’ lingo that comes down to: Don’t look for evil plots to explain an anomaly when simple incompetence is probably the cause. Donald J. Trump, the...
Matthew Keys, a 29-year-old journalist, was sentenced to two years in prison this April after being convicted on three felony counts related to the Computer Fraud and Abuse Act (CFAA). Calling Keys a disgruntled ex-employee of the Tribune...Show More Summary
Last week’s Ninth Circuit case of Facebook v. Vachani is making many observers uneasy. Orin Kerr writes: For those of us worried about broad readings of the Computer Fraud and Abuse Act, the decision is quite troubling. Its reasoning appears to be very broad. Show More Summary
In the past few weeks, we've written about two troubling rulings in the 9th Circuit appeals court concerning the CFAA, the Computer Fraud and Abuse Act. That law, that was literally written in response to Ronald Reagan being freakedShow More Summary
Using the internet just got a bit riskier, thanks to the Ninth Circuit. In two recent rulings, separated by only one week, the Ninth Circuit has greatly expanded the reach of the Computer Fraud and Abuse Act, a federal anti-hacking law from 1989. Under the Ninth Circuit's new interpretation......
Another week, another CFAA (Computer Fraud & Abuse Act) ruling out of the 9th Circuit Appeals Court. This time it's the infamous Facebook v. Power.com case that's been going on since 2008. When we first came across the case, in early 2009, we insisted that it made no sense. Show More Summary