The latest in North Korea’s fake IT worker scheme: Extorting the employers Article 1032 words 17 votes
How a Canadian company's encrypted phones ended up in the hands of criminals worldwide Article 924 words 9 votes
Countering social media cybercrime using deep learning: Instagram fake accounts detection social media Article 7432 words 3 votes
Telegram: Why the app is allowed when other social media is censored in Russia social media Article 901 words 19 votes
Hackers take control of robot vacuums in multiple US cities, yell racial slurs security.cyber privacy Article 1155 words 37 votes
Italian court orders seizure of real estate and vehicles in pirate IPTV investigation Article 650 words 5 votes
Russian dark web marketplace admins indicted after arrest in Miami internet Article 540 words 8 votes
Telegram CEO charged in France for ‘allowing criminal activity’ on messaging app Article 699 words 26 votes
Google must destroy $5 billion worth of user data illegally collected in Incognito Mode google privacy browsers internet Article 1160 words 55 votes
Sweden and Denmark will summon tech companies over ads on their platforms that are posted by gangs to recruit young Swedes to commit violent crimes in the Nordics social media Article 525 words 17 votes
EFF’s concerns about the UN draft Cybercrime Convention security.cyber Article 1282 words, published Jul 29 2024 9 votes
Los Angeles police department warns residents after spike in burglaries using Wi-Fi jammers that disable security cameras, smart doorbells security.home Article 441 words, published Jul 20 2024 42 votes
AT&T says criminals stole phone records of ‘nearly all’ US customers in new data breach security.cyber privacy Article 709 words 26 votes
Court says Andrew Tate can leave Romania but remain in EU as he awaits trial social media Article 551 words 18 votes
OnlyFans vows it's a safe space. Predators are exploiting kids there. social media Article 5835 words 15 votes
Hundreds of thousands of US internet routers destroyed in newly discovered 2023 hack internet security.cyber Article 517 words 23 votes
All Santander staff and 'thirty million' customers in Spain, Chile and Uruguay hacked security.cyber Article 447 words 22 votes
Carpenter's AirTags help uncover 'massive' case of stolen tools in Maryland apple.airtags Article 743 words 16 votes
British Library on why it kept it real in communication about ransomware attack security.cyber Article 953 words 9 votes
Case before Norway's Supreme Court claims that depriving sex offender of a Snapchat account is unlawful under the European Convention on Human Rights social media Article 296 words 15 votes
Baltimore high school athletic director used AI to create fake racist audio of principal: Police Article 732 words 31 votes
To make sure grandmas like his don't get conned, he scams the scammers social media Article 1624 words 25 votes
Two popular Danish television presenters have reported Meta to the police after finding their images and words had been manipulated and misused in thousands of Facebook ads social media facebook Article 345 words 29 votes
Lessons learned from the Google trade secret theft indictment google security Article 1071 words 7 votes
‘Robot dog’ damaged by bullets during armed standoff in Barnstable, State Police say Article 512 words 21 votes
Lego requests California police department stop using their toy heads to cover suspect mugshots on social media social media Article 267 words 40 votes
California judge rules lawsuit over Apple AirTag stalking claims can proceed apple.airtag Article 358 words 10 votes
On popular online platforms, predatory groups coerce children into self-harm social media Article 3726 words 15 votes
The FBI’s new tactic: Catching American suspects with push alerts google apple Article 1646 words, published Feb 29 2024 32 votes
Journalist Tim Burke faces charges under the US Computer Fraud and Abuse Act Article 965 words, published Feb 23 2024 27 votes
‘Neural network’ fake ID site goes dark after 404 Media investigation - Site creator denies illegal applications after boasting of them Link 23 votes
An instant fake ID factory - An underground website called OnlyFake is claiming to use “neural networks” to generate realistic looking photos of fake IDs for just $15 Article 294 words 25 votes
Fujitsu bugs that sent innocent people to prison were known “from the start” but concealed from lawyers and judges Article 756 words 104 votes
Criminals are getting increasingly adept at crafting malicious AI prompts to get data out of ChatGPT Article 495 words 22 votes
History of country code top-level domains, with a map of the most popular ones in use | Map Men internet Video 11:14 14 votes
Prosecutors in Finland have charged a hacker accused of the theft of tens of thousands of records from psychotherapy patients privacy security.cyber Article 343 words 9 votes
Searching for Susy Thunder [a famous computer hacker of the 80s] Article 6980 words, published Jan 26 2022 39 votes
‘Flying aliens’ harassing village in Peru are actually illegal miners with jetpacks, cops say Article published Aug 14 2023 37 votes
Twitter accused of helping Saudi Arabia commit human rights abuses social media Article 1155 words 21 votes