The FBI said that a NYPD officer was charged on Tuesday over a scheme to hack into a restricted NYPD computer and other sensitive law enforcement databases to enrich himself through fraud.
Apps, these tiny programs on Internet-connected mobile phones are increasingly becoming entryways for surveillance and fraud. Computer scientists have now developed a program that can show users whether the apps on their smartphone are accessing private information, and what they do with that data.
We've discussed for years how broken the CFAA (Computer Fraud and Abuse Act) is. The law, which was written many years ago, is problematically vague in certain areas, allowing prosecutors to claim that merely breaking a terms of service...Show More Summary
If you haven’t yet received a new credit card, the kind with a computer chip visibly embedded in it, you soon will. Card issuers are quickly distributing them to curb credit card fraud. The little integrated circuit on the front, whose encryption capability makes it nearly impossible to copy or...
The Computer Fraud and Abuse Act, or CFAA. The federal government's case against Barrett Brown creates a very real chilling effect for other journalists who, like Brown, produce work that deals with hacking and hacktivists. Read the rest
A proposed alteration to the Computer Fraud and Abuse Act (CFAA) from the Department of Justice would turn the dissemination of any information or passwords that could be used to compromise a protected computer into a crime—including those horrendous "worst password" lists. Show More Summary
Why New Credit Cards May Fall Short on Fraud Control This year, firms are expected to roll out more than a half-billion new credit cards embedded with computer chips that create a unique code for each transaction, making counterfeiting much more difficult. In a retreat for the industry, however, the new cards don’t use some […]
The Computer Fraud and Abuse Act is still a problem.
On her Fox News show this week, Megyn Kelly drew viewer attention to possible voter fraud in Colorado over a law that she said "literally allows residents to print ballots from their home computers, then encourages them to turn ballots over to collectors." This earned her a stern rebuke from one Colorado news anchor and Rachel Maddow.
Online ad fraud costs advertisers more than $7 million every month, as they pay for digital ads that were never actually seen by humans. Much of this online ad fraud is created by botnets: armies of PCs infected with malware that generates thousands of fake clicks on ads. Show More Summary
Computers with voice recognition are being used--sometimes discreetly--to add extra security during calls with customers.
Laws like the Computer Fraud and Abuse Act and the Digital Millennium Copyright Act put security researchers at risk of felony prosecution for telling you about bugs in the computers you put your trust in, turning the computers thatShow More Summary
A tutor who allegedly led a cheating ring at a top-performing Orange County high school is scheduled to be arraigned Wednesday on burglary and computer fraud charges, prosecutors said.
Two of the four indicted U.S. men have pleaded guilty to computer fraud and copyright infringement, and will be sentenced next January.
A group of top U.S. financial regulators urged banks to quickly fix their software to protect it against the “Shellshock” computer bug, saying it could expose them to fraud. Shellshock is a newly emerged major Internet threat that affects a common software tool found in many operating...
WASHINGTON (Reuters) - A group of top U.S. financial regulators urged banks to quickly fix their software to protect it against the "Shellshock" computer bug, saying it could expose them to fraud. Shellshock is a newly emerged majorShow More Summary
In 2010, Texas Attorney General Greg Abbott shut down the offices of Texas voter registration group Houston Votes with an armed raid that seized computers and other group equipment looking for "voter fraud". None was ever found, butShow More Summary
White Color Financial Crimes Terrorism Investigations Extortion Rackets Unsolved Murders Computer Crimes Wire Fraud Investigation Of Government Corruption Racketeering Domestic Human Trafficking (Young Girls And Boys Sold Into Prostitution) Training For Explosives Disposal
This is just a crazy level of fraud. A Taiwanese computer scientist has been caught creating more than 100 fake email accounts that allowed him to "peer" review his own research. Read the rest
The National Fraud Intelligence Bureau (NFIB) has received the first reports from victims of a new type of malware, known as “Cryptowall”. This is similar to older malware which can encrypt all files on infected machines. Awareness is being raised of this malware type in order to help people to stop themselves from becoming victims. […]