Most of my Instagram ads are for drugs, stolen credit cards, hacked accounts, counterfeit money, and weapons social media Article 2660 words, published Aug 23 2023 41 votes
US Special Counsel got a search warrant for Twitter to turn over info on Donald Trump’s account social media Article 490 words 40 votes
The King of Jordan approved a cybercrime bill that will crack down on online speech deemed harmful to national unity internet Article 304 words 18 votes
The Court of the Hague orders Meta to unmask anonymous Dutch user accused of repeated defamatory posts social media facebook privacy Article 684 words 31 votes
Man found guilty in 2012 of supporting distribution of child porn, because he ran a Tor exit node – the story of William Weber Article 3005 words 18 votes
An anti-porn app put him in jail and his family under surveillance - A court used an app called Covenant Eyes to surveil the family of a man released on bond Article 635 words 42 votes
They posted porn on Twitter. German authorities called the cops internet social media Article 2018 words 7 votes
Once praised for its generous social safety net, Denmark now collects troves of data on welfare claimants Article 2339 words, published Mar 7 2023 10 votes
I built an artificial intelligence that not only calls scammers to waste their time, but can steal their account information to help get them shut down (and it's working) Video 16:22 8 votes
Facebook helped arrest a 17-year-old for having an abortion facebook social media privacy Link 13 votes
Mexican scam loan apps will edit your face onto X-rated photos and send them to your family Article 1290 words, published Jul 21 2022 8 votes
She was a notorious hacker in the '80s - then she disappeared: Searching for Susy Thunder Article 6980 words, published Jan 26 2022 19 votes
Winning the war on ransomware - The DOJ’s task force is changing the landscape around hackers, but will it be enough? security.cyber Article 1378 words 4 votes
Crime prediction software promised to be free of biases. New data shows it perpetuates them. Article 4775 words, published Dec 2 2021 15 votes
Former Ubiquiti employee charged for data theft and attemtping to extort his employer security Article 590 words 8 votes
After releasing full database of LGBTQ dating website, Black Shadow hackers leak medical records of 290,000 Israeli patients security.cyber Article 791 words 9 votes
Fraudsters cloned company director’s voice in $35 million bank heist, police find security Article 821 words 8 votes
Billed as the most secure phone on the planet, An0m became a viral sensation in the underworld. There was just one problem for anyone using it for criminal means: it was run by the police security privacy Article 4002 words 14 votes
Former eBay security manager sentenced to eighteen months in prison for his role in cyber-stalking campaign against eBay critics Article 504 words 13 votes
18-year-old member of online harassment group sentenced to five years in prison after "swatting" the owner of a desirable Twitter handle, resulting in a fatal heart attack social media Article 1275 words 31 votes
Norway says cyber attack on parliament carried out from China – attack had utilised a security hole in Microsoft's Exchange software microsoft security.cyber Article 341 words 10 votes
US Department of Justice recovers $2.3 million worth of Bitcoin that Colonial Pipeline paid to ransomware extortionists security.cyber Article 883 words 17 votes
US FBI secretly ran the An0m encrypted messaging platform, yields hundreds of arrests in global sting Article 249 words 7 votes
Supreme Court reins in definition of crime under controversial hacking law Article 1725 words 12 votes
Heat List - Chicago PD automated policing program got this man shot twice Article 5235 words 10 votes
DarkSide ransomware gang quits after servers, Bitcoin stash seized security.cyber Article 577 words 17 votes
Ransomware gang threatens release of DC police records privacy security.cyber Article 447 words 10 votes
A closer look at the DarkSide ransomware gang, which was responsible for the recent attack on Colonial Pipeline security.cyber Article 1381 words 15 votes
Australian Criminal Intelligence Agency looking to expand it's intelligence gathering powers by claiming that criminals use encrypted platforms 'almost exclusively' privacy Link 19 votes
Midnight Sun K-Pop ‘pirates’ being reported to INTERPOL, streaming platform warns Article 891 words 6 votes
New York Attorney General issues report detailing millions of fake comments, revealing secret campaign to influence FCC’s 2017 repeal of net neutrality rules Article 1035 words 28 votes
Bad software sent postal workers to jail, because no one wanted to admit it could be wrong Article 665 words 20 votes
Drug cartel now assassinates its enemies with bomb-toting drones Article 872 words, published Aug 28 2020 17 votes
A twenty-year-old man was fatally shot while filming a YouTube "prank" robbery social media Article 193 words 16 votes
ADT employee covertly accessed about 200 security cameras he installed to spy on people having sex privacy security.home Article 472 words 9 votes
Sweeping new copyright measures poised to pass in spending bill - The CASE Act and a felony streaming proposal are included Article 448 words 36 votes
Why the extortion of Vastaamo matters far beyond Finland – and how cyber pros are responding privacy security.cyber Article 968 words 4 votes
FBI, DHS, HHS warn of imminent, credible ransomware threat against US hospitals Article 678 words 13 votes
Norway has blamed Russia for a cyberattack on the email system in the parliament in August – Moscow has rejected the claim, calling it a serious and wilful provocation security.cyber Article 39 words 6 votes
Telegrass and the next generation of digital black markets - Telegram-based services are facilitating much of the drug sales in Ukraine, Israel, and other countries Article 2676 words 13 votes