Trend Results : Computer Fraud


Blog Post Results (1-20 of 368)

FILTER RESULTS

Expedia Worker Snooped on Emails for Stock Deals

A former IT worker at Expedia Inc. pleaded guilty Monday to securities fraud after authorities said he used his access to the computers of top executives to rummage through their email, then made lucrative, illegal stock trades based on the inside information he discovered. Prosecutors said Jonathan Ly, 28, made...

Worker pleads guilty to snooping on emails for stock deals

SEATTLE (AP) — A former information technology worker at Expedia Inc. pleaded guilty Monday to securities fraud after authorities said he used his access to the computers of top executives to rummage through their email, then made lucrative,...Show More Summary

How Americans Feel About Election Fraud [Infographic]

Discussion about possible election fraud in the Unites States has been amplified by several computer hacks at major federal institutions and corporations over the past few months. Throughout his election campaign, Donald Trump has consistently suggested that voter fraud is rampant. As recently as Saturday, Trump alleged that Democratic polling [...]

Hacker behind 'celebgate' jailed for 18 months

The individual behind the 2014 iCloud image leaks -- more commonly known as the Fappenning -- has been sentenced. Ryan Collins, 36, will serve an 18 month jail term for one count of violating the Computer Fraud and Misuse Act and another of illegally obtaining access to a computer. Show More Summary

When erased data come back to haunt you

Everyone knows about cybercrime and how owning networked computers and mobile devices makes you a potential victim of bank fraud, identity theft, extortion, theft of confidential information, etc. Data stored on your computer is never...Show More Summary

Happy 30th Birthday to the Awful Computer Fraud and Abuse Act: A Future Tense Event Recap

In 1986, back in the days of briefcase-sized cellphones and book-sized Walkman Personal Stereos, Congress passed the Computer Fraud and Abuse Act to protect privacy and infrastructure in a new technological age. The legislation was intended to target computer crimes—like unauthorized access to networks, theft of computer software, and internet fraud. Show More Summary

Man convicted of hacking Gmail and iCloud accounts of at least 30 celebrities in L.A.

A man who hacked the Apple iCloud and Gmail accounts of hundreds of people, including celebrities in Los Angeles, from his computer in Chicago has pleaded guilty to computer fraud in federal court, authorities said. Edward Majerczyk, 28, pleaded guilty Tuesday to violating the Computer Fraud and...

Hacking Democracy: Election Fraud With A Memory Card And A Few Lines Of Computer Code

Hacking democracy is apparently very easy for people hell-bent on perpetrating election fraud and winning a race for their candidate, and the key to overriding an actual vote and stealing a win is apparently a memory card with a few lines of computer code, according to the Emmy-nominated documentary Hacking Democracy. Show More Summary

Happy 30th Birthday to the Computer Fraud and Abuse Act—Perhaps the Worst Law in Technology

The 1986 Computer Fraud and Abuse Act remains one of the most controversial federal tech-regulating laws on the books. The “anti-hacking” measure was meant to protect against a range of online crimes, but 30 years later there is still little consensus about what a computer crime is, and what the law actually covers. Show More Summary

MSNBC: Republicans Purging Minorities to Steal Election, Hack Results

MSNBC’s Joy Reid, who was swift to condemn Republican concerns of voter fraud, was equally as fast at accusing them of plotting to steal the election. Reid’s concern centered on a computer system called CrossCheck which was developed to find duplicate names on the voter rolls so they can be removed. Show More Summary

US Jury Finds Son Of Russian Lawmaker Guilty Of 38 Hacking And Identity Theft Charges

The son of a prominent Russian politician has been convicted in Seattle of 38 charges related to stolen credit card information, including 10 counts of wire fraud and nine counts of obtaining information from a protected computer, the US Justice Department announced on Thursday. More »      

US Jury Finds Son of Russian Lawmaker Guilty of 38 Hacking and Identity Theft Charges

3 months agoTechnology / Gadgets : Gizmodo

The son of a prominent Russian politician has been convicted in Seattle of 38 charges related to stolen credit card information, including 10 counts of wire fraud and nine counts of obtaining information from a protected computer, the Justice Department announced on Thursday. Read more...

Russian Cyber Hacker Convicted in Seattle of Massive Credit Card Fraud Involving Pizza Parlors

3 months agoUnited States / Seattle : Slog

by Jennifer Campbell Oh, there's the Russian hack button! David Carillet In last night's episode of CSI: Cyber: Seattle, a Russian computer hacker named Track 2 (Roman Seleznev) is finally convicted, two years after being arrested on his way to a luxury resort in the Maldives, an act Seleznev's politician father tried to frame as a kidnapping. Show More Summary

Is the Internet's Favorite Robot a Fraud?

Promobot. (Photo: Promobot) For a viral-aspiring Youtube video, this one starts off pretty boring. Three people, two men and one woman, are gathered around a table, which holds a computer broadcasting the 2016 Río Opening Ceremonies....Show More Summary

Patt Morrison Asks: Elections expert Andrew Gumbel on Donald Trump, Edgar Allan Poe and rigging the vote

Sorry to disappoint the conspiracy theorists, but when it comes to sinister suspicions about election fraud, the best test is a piece of computer programmers’ lingo that comes down to: Don’t look for evil plots to explain an anomaly when simple incompetence is probably the cause. Donald J. Trump, the...

Targeted for Journalism

4 months agoNews : Reason

Matthew Keys, a 29-year-old journalist, was sentenced to two years in prison this April after being convicted on three felony counts related to the Computer Fraud and Abuse Act (CFAA). Calling Keys a disgruntled ex-employee of the Tribune...Show More Summary

“…a federal crime to visit a website after being told not to visit it”

5 months agoIndustries / Law : Overlawyered

Last week’s Ninth Circuit case of Facebook v. Vachani is making many observers uneasy. Orin Kerr writes: For those of us worried about broad readings of the Computer Fraud and Abuse Act, the decision is quite troubling. Its reasoning appears to be very broad. Show More Summary

Could Donald Trump Block Hillary Clinton's Campaign From Visiting His Website Via The CFAA?

5 months agoIndustries / Law : Techdirt

In the past few weeks, we've written about two troubling rulings in the 9th Circuit appeals court concerning the CFAA, the Computer Fraud and Abuse Act. That law, that was literally written in response to Ronald Reagan being freakedShow More Summary

Ninth Circuit Vastly Expands Reach of Federal Anti-Hacking Law

Using the internet just got a bit riskier, thanks to the Ninth Circuit. In two recent rulings, separated by only one week, the Ninth Circuit has greatly expanded the reach of the Computer Fraud and Abuse Act, a federal anti-hacking law from 1989. Under the Ninth Circuit's new interpretation......

Appeals Court: It Violates CFAA For Service To Access Facebook On Behalf Of Users, Because Facebook Sent Cease & Desist

5 months agoIndustries / Law : Techdirt

Another week, another CFAA (Computer Fraud & Abuse Act) ruling out of the 9th Circuit Appeals Court. This time it's the infamous Facebook v. Power.com case that's been going on since 2008. When we first came across the case, in early 2009, we insisted that it made no sense. Show More Summary

Copyright © 2015 Regator, LLC