Trend Results : Computer Fraud


Blog Post Results (1-20 of 362)

FILTER RESULTS

EFF files Chelsea Manning appeal on hacking conviction

last weekHumor / odd : Boing Boing

Whistleblower Chelsea Manning is serving 35 years in prison, in part due to a conviction under the Computer Fraud and Abuse Act, the overbroad, antiquated statute made notorious by its role in the prosecution of Aaron Swartz. (more…...

Ukrainian Hacker Admits Role in $30Mln Securities Fraud Plot

A Ukrainian hacker has admitted his role in the largest known computer hacking and securities fraud scheme.

Tech Fix: In the Race to Pay, Mobile Wallets Win

To fight fraud, the retail industry has shifted away from traditional magnetic credit cards in favor of cards with embedded computer chips. They’re slow.

The most hated law on the Internet puts pranksters at risk of going to prison

last monthNews : The Raw Story

The Most Hated Law on the Internet and Its Problems The Computer Fraud and Abuse Act (CFAA) was the law that prosecutors deployed against Aaron Swartz, an internet activist who killed himself after a years-long legal battle centered around his decision to mass download academic journals. On April...

The Most Hated Law on the Internet and Its Many Problems

last monthNews : Newsweek: US

The Computer Fraud and Abuse Act (CFAA) was the law that prosecutors deployed against Aaron Swartz, an internet activist who killed himself after a years-long legal battle centered around his decision to mass download academic journals. Show More Summary

Tuesday links

The first shots of the Civil War were fired on April 12, 1861 at Fort Sumter These unlucky people have  names that break computers I keep hearing ads on the radio for this: The  McDonalds Monopoly Fraud : from 1995 to 2001, there was...Show More Summary

Computers don’t teach. Teachers do

Is anyone surprised? But how many went along with this expensive fraud? The headmaster…

iCloud hacker behind ‘The Fappening’ faces five years in prison

2 months agoTechnology / Apple : Cult Of Mac

Almost 19 months after the mass leaking of naked celeb photos known as “The Fappening,” a man has been arrested for violating the Computer Fraud and Abuse Act — and faces up to five years in prison as a result. Ryan Collins of Pennsylvania is...Show More Summary

Man Pleads Guilty to Celebrity "Fappening" Hacks

2 months agoPop Culture / Celebrity : Jezebel

Ryan Collins of Pennsylvania will plead guilty to violating the Computer Fraud and Abuse Act as part of the celebrity iCloud breach known as “The Fappening” or “Celebgate” by the brave men of Reddit and 4chan who masturbated throughout. He faces up to five years in prison. Read more...

(VIDEO) White Ops' Tiffany Fights $7.3bn Robot Army To Defeat Ad Fraud

A report being published by a team of hackers-turned-corporate warriors has estimated online advertising fraud is now netting $7.3bn per year for criminals who employ a team a worldwide network of "zombie" computers. White Ops, an anti-botnet...Show More Summary

Hacker Who Stole Nude Celebrity Pics & Put Them Online Pleads Guilty To Felony

A hacker who stole nude photos from celebrities' computers and then posted them online pleaded guilty today to a felony violation of the Computer Fraud and Abuse Act. He faces up to five years in federal prison. Andrew Helton had engaged in a two-year phishing scheme and obtained 448 usernames and passwords from 363 email accounts. Show More Summary

Here's What to Do Immediately After a Credit Card Breach

The new EMV credit cards (better known as "chip" or "chip and pin" cards) are supposed to significantly cut down on credit card fraud. But these new cards, embedded with computer chips, are far from foolproof. Most security experts say that criminals will now focus on online...

CEO Fraud: This Scam Will Get You Fired & Cost Your Boss Money

Email is a common attack vector used by fraudsters and computer criminals. But if you thought that it was only used to spread malware, phishing, and Nigerian advance fee scams, think again. There’s a new email-driven scam where an attacker...Show More Summary

EMV Credit Card Chips: No Silver Bullet, but a Significant Step Forward in Fraud Reduction

By Steven Myers Associate Professor of Computer Science and Informatics Indiana University With the New Year beginning, we have just come through another holiday shopping season, and for many of us, we await our credit card bills--the hangover to the cheer that is the giving season. Show More Summary

9th Cir. Debates Reach of Anti-Hacking Law in Facebook Suit

Last week, the Ninth Circuit heard oral arguments in Facebook v. Power Ventures. There's a $3M judgement at stake, but that's nothing compared to the impact the case could have on the reach of an anti-hacking law, the Computer Fraud and Abuse Act. That law, once intended to punish......

Court Rules That Breaking Your Employer's Computer Policy Isn't a Crime

6 months agoTechnology / Gadgets : Gizmodo

The United States Court of Appeals for the Second Circuit issued an opinion rejecting the government’s attempt to hold an employee criminally liable under the federal hacking statute—the Computer Fraud and Abuse Act (“CFAA”)—for violating his employer-imposed computer use restrictions. Read more...

Holiday Shopping Paranoia! Smart Chip Cards Prompting Jump in Online Credit Card Fraud

6 months agoTechnology : Yahoo: Tech

You know that computer chip that’s showing up on your new credit cards? The downside is that better security in stores is resulting in increased credit card fraud online. If you’re in the market for a little frothing paranoia to kick off the holidays, here are some more scary statistics from recent studies by the Federal Trade Commission and the U.S. Show More Summary

Warning over computer takeover fraud

Warning over computer takeover fraud 10 November 2015 From the section Business Image copyright PA A spate of scams in which criminals use technology to take over victims’ computers has been reported by an anti-fraud group. Financial Fraud Action, a body set up by the financial services industry, said that fraudsters were impersonating major companies […]

Copyright © 2015 Regator, LLC