Social media influencer sentenced to fourteen years in federal prison after plotting to hijack internet domain at gunpoint Article 1011 words 19 votes
The citizen scientist who finds killers from her couch: How CeCe Moore is using her genetic knowledge to expose murderers privacy Link 8 votes
Virgil Griffith, research scientist at the Ethereum Foundation, has been arrested for advising North Korea on how to use cryptocurrency to evade sanctions Article 814 words 23 votes
Swedish police can use spyware to hunt criminal gangs – police to use the latest technology to access everyday encrypted apps used by criminals Link 8 votes
Thieves used voice-mimicking software to imitate a company executive’s speech and dupe his subordinate into sending $243,000 to a secret account Article 1453 words 20 votes
"Satori" Internet-of-Things botnet operator Kenneth Currin Schuchman pleads guilty security Article 849 words 5 votes
US Senator says Facebook’s Mark Zuckerberg should face ‘possibility of a prison term’ facebook social media Article 309 words 14 votes
The extortion economy: How insurance companies are fueling a rise in ransomware attacks security.cyber Article 3888 words 12 votes
The crowdfunded Dragonfly Futurefön scammed backers for over $725,000, but was only the last step in a decade-long multi-million dollar fraud Article 3976 words 13 votes
Ottawa city hall has been targeted by cyber attacks more than 8,000 times in the past year security.cyber Article 608 words 8 votes
In an apparent first, genetic genealogy aids a wrongful conviction case Article 1938 words, published Jul 16 2019 9 votes
Is it okay to laugh at Florida Man? What it’s like to go viral as one of the Internet’s biggest memes — and the moral complications of laughing along social media Article 6281 words, published Jul 15 2019 11 votes
Former Microsoft software engineer charged with mail fraud for using test Microsoft Store accounts to steal more than $10 million in digital currency microsoft Article 430 words 10 votes
Bianca Devins and how livestreamed murder may be replacing the archetype of the serial killer, enabling people to vault to celebrity on the strength of a single, viral attack social media Article 1567 words 23 votes
In response to mass shootings, some schools and hospitals are installing microphones equipped with algorithms Article 1964 words 12 votes
8chan is raided by the FBI regarding California synagogue shooter social media Tweet @swodinsky: lmaooooooo 8chan just got search warranted 13 votes
San Francisco says it will use AI to reduce bias when charging people with crimes Article 631 words 11 votes
Ring is using its customers’ doorbell camera video for ads. It says it's allowed to privacy amazon security.home Article 1420 words 18 votes
YouTuber in Barcelona receives fifteen-month prison sentence, 20,000 euro fine, and five-year ban from social media for toothpaste-filled Oreo prank social media Article 495 words 18 votes
How a carding kingpin got caught and dealt a death blow to Seattle's Broadway Grill Article 2921 words 6 votes
The rise of fear-based social media like Nextdoor, Citizen, and now Amazon’s Neighbors social media amazon.neighbors Article 2180 words 13 votes
The woman who plotted a Valentine's mass murder shares how the internet radicalized her internet social media Article 2274 words, published Feb 21 2019 17 votes
Marcus “MalwareTech” Hutchins pleads guilty to writing, selling banking malware security.cyber Article 588 words 6 votes
Anti-Muslim hate has been rampant on Reddit since the New Zealand shooting social media Article 1298 words 17 votes
How Facebook's hour of inaction enabled the Christchurch video to spread social media facebook Article 2330 words 8 votes
Why tech companies failed to keep the New Zealand shooter’s extremism from going viral social media Article 2305 words 9 votes
The eerie absence of viral fakes after the New Zealand mosque attacks social media Article 530 words 12 votes
Hated and hunted - The perilous life of the computer virus cracker making powerful enemies online security.cyber Article 3230 words 9 votes
Taxed, throttled or thrown in jail: Africa's new internet paradigm internet Article 1013 words 7 votes
Canada has formally commenced the process to extradite Meng Wanzhou, CFO of Huawei to the USA Article 251 words 9 votes
The Feds cracked El Chapo's encrypted comms network by flipping his system admin Article 734 words 10 votes
The FBI has seized the domains of fifteen DDoS-for-hire services, and filed criminal charges against three people associated with them security Article 1071 words 10 votes
Keyboardio was deceived and defrauded for over a year by the account manager handling their manufacturing in China Link 18 votes
Canada arrests Huawei CFO. She faces US extradition for allegedly violating Iran sanctions Article 14 votes
St. Louis was the first to use mug shots to capture the bad guys Article 673 words, published Jul 31 2017 8 votes
How an international hacker network turned stolen press releases into $100 million Article 6934 words 12 votes
The rise of the downloadable gun in America could have dark implications for Australia Article 748 words 4 votes
Digital Laundry: How credit card thieves use free-to-play apps to launder their ill-gotten gains Link 6 votes
Plant your flag, mark your territory - "If you don’t plant your flag online, fraudsters and identity thieves may do it for you" security internet Article 1381 words 14 votes
Reality Winner, liberty loser: NSA leaker faces sixty-three months in the cooler Article 489 words 9 votes
Inside a heist of American chip designs, as China bids for tech power Article 1611 words, published Jun 22 2018 7 votes
Joshua Schulte (of Vault 7 leaks) has been indicted for leaking CIA secrets privacy Article 928 words 8 votes