The US Air Force (USAF) temporarily lost all its data on their investigations into fraud, abuse, and everything else down to office disputes, collected since 2004, due to a computer glitch; its recent statement however says that it was able to restore access to the data “through extensive data recovery efforts over the weekend and this week.”
The U.S. Air Force Inspector General tracks all their investigations on fraud, abuse, and everything else down to office disputes in a database maintained by Lockheed Martin. Now it looks like somebody broke it, destroying data collected since 2004. Read more...
US Navy Rear Admiral Robert Gilbeau admitted to lying to federal investigators, destroying evidence, and deleting computer files in connection to a probe into a wide-ranging bribery and fraud scheme.
By Brendan Pierson NEW YORK (Reuters) - Two Israeli citizens pleaded not guilty on Thursday to orchestrating a massive computer hacking and fraud scheme that included an attack against JPMorgan Chase & Co and generated hundreds of millions of dollars of illegal profit. Show More Summary
Hackers can face lengthy prison sentences under the Computer Fraud and Abuse Act.
A sysadmin's hacking charges--for deleting files he had authorized access to--raise new questions for the controversial Computer Fraud and Abuse Act. The post IT Admin Faces Felony for Deleting Files Under Flawed Hacking Law appeared first on WIRED.
Whistleblower Chelsea Manning is serving 35 years in prison, in part due to a conviction under the Computer Fraud and Abuse Act, the overbroad, antiquated statute made notorious by its role in the prosecution of Aaron Swartz. (more…...
A Ukrainian hacker has admitted his role in the largest known computer hacking and securities fraud scheme.
To fight fraud, the retail industry has shifted away from traditional magnetic credit cards in favor of cards with embedded computer chips. They’re slow.
The Most Hated Law on the Internet and Its Problems The Computer Fraud and Abuse Act (CFAA) was the law that prosecutors deployed against Aaron Swartz, an internet activist who killed himself after a years-long legal battle centered around his decision to mass download academic journals. On April...
The Computer Fraud and Abuse Act (CFAA) was the law that prosecutors deployed against Aaron Swartz, an internet activist who killed himself after a years-long legal battle centered around his decision to mass download academic journals. Show More Summary
The first shots of the Civil War were fired on April 12, 1861 at Fort Sumter These unlucky people have names that break computers I keep hearing ads on the radio for this: The McDonalds Monopoly Fraud : from 1995 to 2001, there was...Show More Summary
Is anyone surprised? But how many went along with this expensive fraud? The headmaster…
Almost 19 months after the mass leaking of naked celeb photos known as “The Fappening,” a man has been arrested for violating the Computer Fraud and Abuse Act — and faces up to five years in prison as a result. Ryan Collins of Pennsylvania is...Show More Summary
Ryan Collins of Pennsylvania will plead guilty to violating the Computer Fraud and Abuse Act as part of the celebrity iCloud breach known as “The Fappening” or “Celebgate” by the brave men of Reddit and 4chan who masturbated throughout. He faces up to five years in prison. Read more...
A report being published by a team of hackers-turned-corporate warriors has estimated online advertising fraud is now netting $7.3bn per year for criminals who employ a team a worldwide network of "zombie" computers. White Ops, an anti-botnet...Show More Summary
A hacker who stole nude photos from celebrities' computers and then posted them online pleaded guilty today to a felony violation of the Computer Fraud and Abuse Act. He faces up to five years in federal prison. Andrew Helton had engaged in a two-year phishing scheme and obtained 448 usernames and passwords from 363 email accounts. Show More Summary
The new EMV credit cards (better known as "chip" or "chip and pin" cards) are supposed to significantly cut down on credit card fraud. But these new cards, embedded with computer chips, are far from foolproof. Most security experts say that criminals will now focus on online...
Email is a common attack vector used by fraudsters and computer criminals. But if you thought that it was only used to spread malware, phishing, and Nigerian advance fee scams, think again. There’s a new email-driven scam where an attacker...Show More Summary
By Steven Myers Associate Professor of Computer Science and Informatics Indiana University With the New Year beginning, we have just come through another holiday shopping season, and for many of us, we await our credit card bills--the hangover to the cheer that is the giving season. Show More Summary