The new EMV credit cards (better known as "chip" or "chip and pin" cards) are supposed to significantly cut down on credit card fraud. But these new cards, embedded with computer chips, are far from foolproof. Most security experts say that criminals will now focus on online...
Email is a common attack vector used by fraudsters and computer criminals. But if you thought that it was only used to spread malware, phishing, and Nigerian advance fee scams, think again. There’s a new email-driven scam where an attacker...Show More Summary
By Steven Myers Associate Professor of Computer Science and Informatics Indiana University With the New Year beginning, we have just come through another holiday shopping season, and for many of us, we await our credit card bills--the hangover to the cheer that is the giving season. Show More Summary
Last week, the Ninth Circuit heard oral arguments in Facebook v. Power Ventures. There's a $3M judgement at stake, but that's nothing compared to the impact the case could have on the reach of an anti-hacking law, the Computer Fraud and Abuse Act. That law, once intended to punish......
WHITE PEOPLE ARE GETTING MORE LYRICAL
Judges also rule prosecutors abused the anti-hacking Computer Fraud and Abuse Act.
The United States Court of Appeals for the Second Circuit issued an opinion rejecting the government’s attempt to hold an employee criminally liable under the federal hacking statute—the Computer Fraud and Abuse Act (“CFAA”)—for violating his employer-imposed computer use restrictions. Read more...
You know that computer chip that’s showing up on your new credit cards? The downside is that better security in stores is resulting in increased credit card fraud online. If you’re in the market for a little frothing paranoia to kick off the holidays, here are some more scary statistics from recent studies by the Federal Trade Commission and the U.S. Show More Summary
Warning over computer takeover fraud 10 November 2015 From the section Business Image copyright PA A spate of scams in which criminals use technology to take over victims’ computers has been reported by an anti-fraud group. Financial Fraud Action, a body set up by the financial services industry, said that fraudsters were impersonating major companies […]
Government prosecutors agreed to drop felony obstruction of justice charges against former BP engineer Kurt Mix today. In exchange, Mix agreed to plead guilty to a misdemeanor charge of Computer Fraud and Abuse related to deletion of a text message string while working to stop the BP Gulf Oil spill [...]
By Jim Finkle BOSTON (Reuters) - Some big U.S. retailers are stepping up efforts to use personal identification numbers, or PINs, with new credit cards embedded with computer chips in a bid to prevent counterfeit card fraud. But they...Show More Summary
If you're a Techdirt regular, you probably know that there are some serious problems with the Computer Fraud and Abuse Act. Drafted in 1986 with extremely broad language, the CFAA has grown into an easily abused law that lets prosecutors go after people for minor activities that don't meet any reasonable definition of hacking or computer fraud. Show More Summary
The Computer Fraud and Abuse Act, also known as the federal anti-hacking statute, has been used to prosecute a growing list of non-hacking behavior. The post The Most Controversial Hacking Cases of the Past Decade appeared first on WIRED.
By Christian Bieck and Craig Bedell, IBM The insurance industry is facing a broad range of disruptive forces: changing demographics, volatile economies, sophisticated fraud attacks and rapid digitization of the industry. At the same time, empowered consumers are demanding more from their insurance providers. Yet the traditionally conservative insurance industry has been [...]
The House Study Committee on Welfare Fraud had its second meeting this morning, and heard from witnesses who talked about how using modern computer data technology can identify cases of fraud in the state’s assistance programs for the needy. Reducing fraud can help the state save money, or in the case of provider fraud, help […]
Matthew Keys, an ex-employee with KTXL Fox 40 in Sacramento, has been convicted under the Computer Fraud and Abuse Act (CFAA) on three hacking charges. The actual hacking was purported to be carried out by members of the “Anonymous” Internet vigilante group. Show More Summary
That was bullshit. — Matthew Keys (@MatthewKeysLive) October 7, 2015 A jury in Sacramento, California, today found former Reuters deputy social media editor Matthew Keys guilty of computer hacking under the Computer Fraud & Abuse Act (CFAA). (more…)
People attempting to commit fraud online buy card numbers and other information from hackers who invaded computers systems at companies such as Target Corp. and Home Depot Corp. Then they use the stolen card numbers to make online purchases. Technology...Show More Summary
The move is part of a drive by the banks and payment companies to get people to use the new, more secure cards embedded with computer chips. Roughly half of all global credit card fraud occurs in the U.S. even though the country makes...Show More Summary
Federal authorities have raided the offices of Gemcoin, a digital currency company based in Arcadia that's accused of bilking about $32 million from Chinese and U.S. investors, removing computers and boxes of evidence and locking the doors. The raid comes on the heels of a U.S. Securities and...