Lego requests California police department stop using their toy heads to cover suspect mugshots on social media social media Article 267 words 31 votes
California judge rules lawsuit over Apple AirTag stalking claims can proceed apple.airtag Article 358 words 9 votes
On popular online platforms, predatory groups coerce children into self-harm social media Article 3726 words 15 votes
The FBI’s new tactic: Catching suspects with push alerts google apple Article 1646 words, published Feb 29 2024 32 votes
Journalist Tim Burke faces charges under the US Computer Fraud and Abuse Act Article 965 words, published Feb 23 2024 27 votes
‘Neural network’ fake ID site goes dark after 404 Media investigation - Site creator denies illegal applications after boasting of them Link 23 votes
An instant fake ID factory - An underground website called OnlyFake is claiming to use “neural networks” to generate realistic looking photos of fake IDs for just $15 Article 294 words 25 votes
Fujitsu bugs that sent innocent people to prison were known “from the start” but concealed from lawyers and judges Article 756 words 104 votes
Criminals are getting increasingly adept at crafting malicious AI prompts to get data out of ChatGPT Article 495 words 22 votes
History of country code top-level domains, with a map of the most popular ones in use | Map Men internet Video 11:14 14 votes
Prosecutors in Finland have charged a hacker accused of the theft of tens of thousands of records from psychotherapy patients privacy security Article 343 words 9 votes
Searching for Susy Thunder [a famous computer hacker of the 80s] Article 6980 words, published Jan 26 2022 39 votes
‘Flying aliens’ harassing village in Peru are actually illegal miners with jetpacks, cops say Article published Aug 14 2023 37 votes
Twitter accused of helping Saudi Arabia commit human rights abuses social media Article 1155 words 21 votes
Most of my Instagram ads are for drugs, stolen credit cards, hacked accounts, counterfeit money, and weapons social media Article 2660 words, published Aug 23 2023 41 votes
US Special Counsel got a search warrant for Twitter to turn over info on Donald Trump’s account social media Article 490 words 40 votes
The King of Jordan approved a cybercrime bill that will crack down on online speech deemed harmful to national unity internet Article 304 words 18 votes
The Court of the Hague orders Meta to unmask anonymous Dutch user accused of repeated defamatory posts social media facebook privacy Article 684 words 31 votes
Man found guilty in 2012 of supporting distribution of child porn, because he ran a Tor exit node – the story of William Weber Article 3005 words 18 votes
An anti-porn app put him in jail and his family under surveillance - A court used an app called Covenant Eyes to surveil the family of a man released on bond Article 635 words 42 votes
They posted porn on Twitter. German authorities called the cops internet social media Article 2018 words 7 votes
Once praised for its generous social safety net, Denmark now collects troves of data on welfare claimants Article 2339 words, published Mar 7 2023 10 votes
I built an artificial intelligence that not only calls scammers to waste their time, but can steal their account information to help get them shut down (and it's working) Video 16:22 8 votes
Facebook helped arrest a 17-year-old for having an abortion facebook social media privacy Link 13 votes
Mexican scam loan apps will edit your face onto X-rated photos and send them to your family Article 1290 words, published Jul 21 2022 8 votes
She was a notorious hacker in the '80s - then she disappeared: Searching for Susy Thunder Article 6980 words, published Jan 26 2022 19 votes
Winning the war on ransomware - The DOJ’s task force is changing the landscape around hackers, but will it be enough? security.cyber Article 1378 words 4 votes
Crime prediction software promised to be free of biases. New data shows it perpetuates them. Article 4775 words, published Dec 2 2021 15 votes
Former Ubiquiti employee charged for data theft and attemtping to extort his employer security Article 590 words 8 votes
After releasing full database of LGBTQ dating website, Black Shadow hackers leak medical records of 290,000 Israeli patients Article 791 words 9 votes
Fraudsters cloned company director’s voice in $35 million bank heist, police find security Article 821 words 8 votes
Billed as the most secure phone on the planet, An0m became a viral sensation in the underworld. There was just one problem for anyone using it for criminal means: it was run by the police security privacy Article 4002 words 14 votes
Former eBay security manager sentenced to eighteen months in prison for his role in cyber-stalking campaign against eBay critics Article 504 words 13 votes
18-year-old member of online harassment group sentenced to five years in prison after "swatting" the owner of a desirable Twitter handle, resulting in a fatal heart attack social media Article 1275 words 31 votes
Norway says cyber attack on parliament carried out from China – attack had utilised a security hole in Microsoft's Exchange software microsoft security.cyber Article 341 words 10 votes
US Department of Justice recovers $2.3 million worth of Bitcoin that Colonial Pipeline paid to ransomware extortionists security.cyber Article 883 words 17 votes