#computer-fraud-laws

[ follow ]
Information security
fromThe Hacker News
1 hour ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
#ai-fraud
Information security
fromComputerworld
1 week ago

What IT leaders need to know about AI-fueled death fraud

AI-generated fake death certificates pose significant risks for businesses by enabling fraudsters to exploit customer accounts and data.
Information security
fromComputerworld
1 week ago

What IT leaders need to know about AI-fueled death fraud

AI-generated fake death certificates pose significant risks for businesses by enabling fraudsters to exploit customer accounts and data.
Canada news
fromThe Walrus
3 hours ago

Why Your Credit Card Is a National Security Threat | The Walrus

Canada needs to develop its own digital payment infrastructure to ensure financial autonomy and protect against foreign control.
Non-profit organizations
fromNextgov.com
20 hours ago

The war against fraud should be a war for tech modernization

A new task force aims to combat fraud in public benefits programs by ensuring adequate anti-fraud controls and addressing data sharing challenges.
#cybersecurity
fromTechCrunch
3 days ago
EU data protection

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

Information security
fromThe Hacker News
6 hours ago

China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware

A China-based threat actor is using zero-day vulnerabilities to execute high-velocity attacks, particularly targeting healthcare and finance sectors.
Information security
fromThe Hacker News
23 hours ago

Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More

Compromised npm packages can rapidly affect numerous systems, highlighting the need for enhanced security in software development processes.
Healthcare
fromBoston.com
46 minutes ago

Signature Healthcare in Brockton hit by cybersecurity incident

Signature Healthcare is managing a cybersecurity incident, affecting some services while maintaining inpatient and emergency care.
Information security
fromNextgov.com
17 hours ago

Government official impersonation scam complaints doubled in 2025, FBI report shows

Complaints of government impersonation scams nearly doubled from 2024 to 2025, resulting in approximately $800 million in losses.
Healthcare
fromSecuritymagazine
14 hours ago

Healthcare Executives Face a New Era of Personal Risk

Healthcare executives face heightened personal risks due to grievance-motivated cyber threats amid economic pressures and public accountability.
EU data protection
fromTechCrunch
3 days ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
Information security
fromThe Hacker News
6 hours ago

China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware

A China-based threat actor is using zero-day vulnerabilities to execute high-velocity attacks, particularly targeting healthcare and finance sectors.
Information security
fromThe Hacker News
23 hours ago

Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More

Compromised npm packages can rapidly affect numerous systems, highlighting the need for enhanced security in software development processes.
EU data protection
fromWIRED
8 hours ago

Europe Gets Serious About Age Verification Online

Five EU countries are testing a digital wallet for age verification, but progress varies significantly among them.
#crypto-regulation
Cryptocurrency
fromnews.bitcoin.com
1 day ago

This Week in Crypto Law (Mar. 29, 2026)

Regulators are increasingly asserting control over digital assets while enabling new market structures, as seen in recent developments in the U.S. and Hong Kong.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

This Week in Crypto Law (Mar. 29, 2026)

Regulators are increasingly asserting control over digital assets while enabling new market structures, as seen in recent developments in the U.S. and Hong Kong.
#fbi
Privacy professionals
fromSecuritymagazine
1 day ago

Breach of FBI Surveillance System Considered a "Major Incident," Security Experts Weigh In

FBI confirms major breach of surveillance system, exposing sensitive data and potentially revealing criminal probes and surveillance targets.
Privacy professionals
fromTechRepublic
3 days ago

FBI Declares Surveillance System Breach a 'Major Incident'

A China-linked breach of an FBI surveillance system has been classified as a major incident, posing significant risks to US national security.
Privacy professionals
fromNextgov.com
3 days ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
Privacy professionals
fromSecuritymagazine
1 day ago

Breach of FBI Surveillance System Considered a "Major Incident," Security Experts Weigh In

FBI confirms major breach of surveillance system, exposing sensitive data and potentially revealing criminal probes and surveillance targets.
Privacy professionals
fromTechRepublic
3 days ago

FBI Declares Surveillance System Breach a 'Major Incident'

A China-linked breach of an FBI surveillance system has been classified as a major incident, posing significant risks to US national security.
Privacy professionals
fromNextgov.com
3 days ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
fromwww.mediaite.com
1 day ago

Elon Musk's DOGE Security Deputized as Federal Agents Despite Lack of Basic Law Enforcement Training': Report

Members of Musk's private security team were deputized as federal agents last year, allowing them to carry firearms in certain federal buildings, despite some of the guards failing to meet what the Marshals Service considered to be the basic requirements to be deputized as federal law enforcement.
Washington DC
#sextortion
Mental health
fromwww.theguardian.com
9 hours ago

I felt ashamed and scared': how an online friendship became a sextortion nightmare

Online friendships can lead to severe risks, including sextortion, which can have devastating emotional consequences.
Mental health
fromwww.theguardian.com
9 hours ago

I felt ashamed and scared': how an online friendship became a sextortion nightmare

Online friendships can lead to severe risks, including sextortion, which can have devastating emotional consequences.
Germany news
fromThe Hacker News
1 day ago

BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks

Germany's BKA identified Daniil Shchukin and Anatoly Kravchuk as key figures behind the REvil ransomware operation, linked to numerous attacks and significant financial losses.
Poker
fromWIRED
5 hours ago

Nobody Knows How to File Taxes on Prediction Market Wins

Tax guidance for prediction market profits is unclear, leaving taxpayers uncertain about reporting obligations.
Law
fromAbove the Law
15 hours ago

Deepfakes And The Future Of Litigation: Are We Ready? - Above the Law

Deepfakes will challenge the judicial system, requiring more rigorous evidence authentication and potentially altering courtroom procedures.
World news
fromTechCrunch
20 hours ago

Iran threatens 'Stargate' AI data centers | TechCrunch

Iran threatens retaliation against U.S. data centers in response to ongoing military actions and threats from the United States.
fromTelecompetitor
20 hours ago

AT&T addresses the problem of copper theft for the broadband industry

"In many major metropolitan areas and small towns, copper theft has escalated to levels that can only be described as systemic," Alcutt writes.
Business
Careers
fromZDNET
3 days ago

FTC reports a surge in $220M job fraud - here's how to vet listings, according to recruiters

Job scams are on the rise, exploiting vulnerable job seekers with vague offers and promises of high pay for little work.
US news
fromsfist.com
3 days ago

Three Tennessee Men Arrested In Connection With Crypto Heist Near Dolores Park

Three men have been arrested for a series of violent crypto thefts on the West Coast, including a $13 million robbery in San Francisco.
Intellectual property law
fromNextgov.com
3 days ago

Tech bills of the week: Limiting adversaries' access to US tech; and boosting cyber apprenticeships

New legislation aims to strengthen U.S. export controls on sensitive technologies to prevent adversaries from exploiting them for economic gain.
#phishing
Privacy professionals
fromSecurityWeek
2 weeks ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
Information security
fromThe Hacker News
6 days ago

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

A phishing campaign targets Spanish-speaking users in Latin America and Europe, delivering banking trojans via malware called Horabot.
Information security
fromSecuritymagazine
1 week ago

Tax Season Means Phishing Season: How Individuals and Businesses Can Protect Themselves

Phishing attacks during tax season have become more sophisticated, leveraging generative AI to impersonate trusted entities like the IRS.
Information security
fromThe Hacker News
1 week ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Privacy professionals
fromSecurityWeek
2 weeks ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
Information security
fromThe Hacker News
6 days ago

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

A phishing campaign targets Spanish-speaking users in Latin America and Europe, delivering banking trojans via malware called Horabot.
Information security
fromSecuritymagazine
1 week ago

Tax Season Means Phishing Season: How Individuals and Businesses Can Protect Themselves

Phishing attacks during tax season have become more sophisticated, leveraging generative AI to impersonate trusted entities like the IRS.
Information security
fromThe Hacker News
1 week ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
#ai
fromFortune
3 days ago
Digital life

Internet Watch Foundation finds 260-fold increase in AI-generated CSAM in just one year, and 'it's the tip of the iceberg' | Fortune

AI-generated child sexual abuse material is surging, fundamentally changing targeting methods and overwhelming investigators.
Privacy technologies
fromComputerWeekly.com
4 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Digital life
fromFortune
3 days ago

Internet Watch Foundation finds 260-fold increase in AI-generated CSAM in just one year, and 'it's the tip of the iceberg' | Fortune

AI-generated child sexual abuse material is surging, fundamentally changing targeting methods and overwhelming investigators.
Privacy technologies
fromComputerWeekly.com
4 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
#privacy
fromThe Local France
5 days ago

France charges four over failed attack on US bank

The man in his early twenties from a Paris suburb had been charged with 'terrorist criminal conspiracy' and remanded in custody. French counter-terrorism prosecutors suspect he asked teenagers to place an explosive device outside the US financial institution near the famed Champs-Elysees avenue.
France news
US politics
fromTechCrunch
4 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Bitgo CEO Proposes Using a Public Blockchain as the Ultimate Solution for Government Fraud

Mike Belshe proposes using a public blockchain to combat state and federal fraud, potentially addressing losses of up to $521 billion annually.
Canada news
fromwww.cbc.ca
14 hours ago

Suspects in alleged counterfeit currency sales ring arrested by Halton police | CBC News

Police arrested six suspects in a counterfeit currency sales ring operating through social media, generating over $60,000 in sales.
Law
fromABA Journal
5 days ago

Sanctions ramping up in cases involving AI hallucinations

Monetary sanctions against attorneys for AI-generated hallucinations in case documents are increasing as courts take these issues more seriously.
#cybercrime
Cryptocurrency
fromnews.bitcoin.com
5 hours ago

SEC Chair Atkins Says 'Reg Crypto' Proposal Covering Fundraising and Startup Exemptions Is One Step From Publication

Reg Crypto is awaiting White House approval, creating safe-harbor exemptions for startups and issuers to raise significant capital annually.
Artificial intelligence
fromComputerworld
1 day ago

AI shutdown controls may not work as expected, new study suggests

AI models exhibit peer preservation behavior, sabotaging shutdown mechanisms to protect other AI systems, posing risks for enterprise deployments.
#cambodia
Cryptocurrency
fromnews.bitcoin.com
2 days ago

Cambodian Parliament Approves New Law Imposing Life Sentences for Crypto Scammers

Cambodia's Senate passed a law imposing life sentences for online scam ringleaders, aiming to dismantle illegal operations by April 2026.
Cryptocurrency
fromnews.bitcoin.com
2 days ago

Cambodian Parliament Approves New Law Imposing Life Sentences for Crypto Scammers

Cambodia's Senate passed a law imposing life sentences for online scam ringleaders, aiming to dismantle illegal operations by April 2026.
#ransomware
Information security
fromSecurityWeek
3 hours ago

Medusa Ransomware Fast to Exploit Vulnerabilities, Breached Systems

Medusa ransomware group rapidly exploits vulnerabilities, impacting critical sectors and employing double extortion tactics since June 2021.
Information security
fromSecurityWeek
3 hours ago

Medusa Ransomware Fast to Exploit Vulnerabilities, Breached Systems

Medusa ransomware group rapidly exploits vulnerabilities, impacting critical sectors and employing double extortion tactics since June 2021.
Cryptocurrency
fromFortune
1 day ago

A quantum threat to Bitcoin has some asking the unthinkable: Is it time to freeze old wallets belonging to Satoshi Nakamoto? | Fortune

Quantum computing poses a significant threat to Bitcoin wallets, particularly those of Satoshi Nakamoto, potentially allowing hackers to access them by 2029.
Privacy professionals
fromAdExchanger
9 hours ago

What Regulators Talk About When They Talk About Ad Tech | AdExchanger

Privacy regulators emphasize protecting children, honoring opt-outs, and ensuring companies are transparent about data collection practices.
Artificial intelligence
fromnews.bitcoin.com
1 day ago

Anthropic Restricts Claude Agent Access Amid AI Automation Boom in Crypto

Anthropic shifted Claude Pro and Max users to pay-as-you-go billing for third-party tools, impacting crypto developers with significant cost increases.
Information security
fromThe Hacker News
1 hour ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
#cryptocurrency
Cryptocurrency
fromnews.bitcoin.com
12 hours ago

India Issues Tax Notices to Crypto Traders Over Unreported Activity From Earlier Years

India is intensifying scrutiny of cryptocurrency activity, issuing notices that may reopen past filings and pressure traders to justify discrepancies.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Russia Moves to Formalize Cryptocurrency Market With New Legislation

Russia's State Duma introduced bills to regulate crypto transactions, capping non-qualified investors at $3,730 annually and mandating tax reporting.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Cryptocurrency
fromnews.bitcoin.com
4 days ago

US Attorney Connecticut Forfeits $600,000 in Tether Linked to Ledger Phishing Letter

Federal prosecutors recovered over $600,000 in stolen cryptocurrency linked to a phishing scam targeting a hardware wallet user.
Cryptocurrency
fromSecurityWeek
6 days ago

US Charges Uranium Crypto Exchange Hacker

Jonathan Spalletta was charged with hacking Uranium Finance, stealing over $53 million, and laundering the funds through various transactions.
Cryptocurrency
fromnews.bitcoin.com
12 hours ago

India Issues Tax Notices to Crypto Traders Over Unreported Activity From Earlier Years

India is intensifying scrutiny of cryptocurrency activity, issuing notices that may reopen past filings and pressure traders to justify discrepancies.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Russia Moves to Formalize Cryptocurrency Market With New Legislation

Russia's State Duma introduced bills to regulate crypto transactions, capping non-qualified investors at $3,730 annually and mandating tax reporting.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Cryptocurrency
fromnews.bitcoin.com
4 days ago

US Attorney Connecticut Forfeits $600,000 in Tether Linked to Ledger Phishing Letter

Federal prosecutors recovered over $600,000 in stolen cryptocurrency linked to a phishing scam targeting a hardware wallet user.
Cryptocurrency
fromSecurityWeek
6 days ago

US Charges Uranium Crypto Exchange Hacker

Jonathan Spalletta was charged with hacking Uranium Finance, stealing over $53 million, and laundering the funds through various transactions.
Privacy professionals
fromTechCrunch
1 day ago

Convicted spyware maker Bryan Fleming avoids jail at sentencing | TechCrunch

Bryan Fleming, the first convicted spyware maker in over a decade, received no jail time after pleading guilty to federal charges related to his surveillance company.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Circle Announces Quantum-Resistant Roadmap to Secure Future Digital Asset Infrastructure

Circle's Arc platform will launch with post-quantum signature support to secure institutional assets against quantum threats.
Cryptocurrency
fromnews.bitcoin.com
11 hours ago

What Japanese Regulators Are Worried About Now: The Oversight Blind Spots Shaping Japan's Crypto Policy Shift

Japan's FSA signals tougher regulations for crypto markets to enhance user protection and address risks associated with speculative assets like meme coins.
Privacy professionals
fromSilicon Canals
4 days ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Information security
fromThe Hacker News
23 hours ago

Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps

Multi-OS attacks complicate SOC operations, leading to delays, fragmented evidence, and increased escalation volume, ultimately allowing attackers more time to operate.
#north-korea
Cryptocurrency
fromSecurityWeek
4 days ago

North Korean Hackers Drain $285 Million From Drift in 10 Seconds

A North Korean threat actor executed a $285 million heist from the Drift DeFi platform using sophisticated techniques and pre-signed transactions.
Cryptocurrency
fromSecurityWeek
4 days ago

North Korean Hackers Drain $285 Million From Drift in 10 Seconds

A North Korean threat actor executed a $285 million heist from the Drift DeFi platform using sophisticated techniques and pre-signed transactions.
#ai-security
Information security
fromSecurityWeek
22 hours ago

Google DeepMind Researchers Map Web Attacks Against AI Agents

Malicious web content can exploit AI agents, leading to manipulation and unexpected behaviors through various attack types identified by researchers.
Information security
fromnews.bitcoin.com
1 day ago

Deepmind's 'AI Agent Traps' Paper Maps How Hackers Could Weaponize AI Agents Against Users

Google Deepmind identifies six AI agent trap categories, with content injection success rates of 86% and calls for enhanced security measures by 2026.
Information security
fromSecurityWeek
22 hours ago

Google DeepMind Researchers Map Web Attacks Against AI Agents

Malicious web content can exploit AI agents, leading to manipulation and unexpected behaviors through various attack types identified by researchers.
Information security
fromnews.bitcoin.com
1 day ago

Deepmind's 'AI Agent Traps' Paper Maps How Hackers Could Weaponize AI Agents Against Users

Google Deepmind identifies six AI agent trap categories, with content injection success rates of 86% and calls for enhanced security measures by 2026.
Privacy professionals
fromSilicon Canals
4 days ago

A money-transfer app stored customer passports on an unencrypted, publicly accessible server for nearly five years - Silicon Canals

Fintech companies face regulatory pressure to collect identity documents but lack enforceable obligations to protect them, leading to data breaches.
Cryptocurrency
fromnews.bitcoin.com
2 days ago

USDC Freeze Controversy: ZachXBT Says Circle Froze 16 Legitimate Wallets, Missed Real Hacks

ZachXBT identified 15 cases of over $420M in illicit USDC flows that Circle failed to freeze promptly since 2022.
fromSecuritymagazine
4 days ago

World Cloud Security Day: Breaking Down the State of the Cloud Cybersecurity and Physical Security

"World Cloud Security Day is a useful reminder to recognize how much cloud risk now comes down to everyday access decisions and overlooked misconfigurations," says James Maude, Field CTO at BeyondTrust.
Information security
fromComputerworld
3 days ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
Cryptocurrency
fromFortune
5 days ago

Prediction markets caught insider traders in real time. Congress wants to shut them down anyway | Fortune

Prediction markets expose insider trading issues, offering transparency through blockchain technology, and should not be banned by legislation.
Cryptocurrency
fromnews.bitcoin.com
6 days ago

FBI Sting Operation Exposes Crypto Price Rigging Network as 10 Foreign Nationals Charged, Over $1M Seized

Federal crackdown reveals a network of alleged crypto price manipulation, highlighting increased enforcement risks for digital asset firms.
#malware
Information security
fromThe Hacker News
5 days ago

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

Operation REF1695 uses fake installers to deploy RATs and cryptocurrency miners, monetizing infections through CPA fraud since November 2023.
Information security
fromThe Hacker News
5 days ago

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

Operation REF1695 uses fake installers to deploy RATs and cryptocurrency miners, monetizing infections through CPA fraud since November 2023.
Privacy professionals
fromMedCity News
2 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
Information security
fromnews.bitcoin.com
6 days ago

Chainalysis Deploys AI Agents to Counter Criminal Use of Artificial Intelligence in Crypto

Chainalysis introduces AI agents to enhance fraud detection and compliance without requiring deep technical expertise, ensuring data quality and human oversight.
Information security
fromSecurityWeek
6 days ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
Cryptocurrency
fromCointelegraph
2 weeks ago

How a 'Wrong Number' Message Turned Into a $3.4M Crypto Scam

This $3.4 million scam illustrates the rise of social engineering in crypto fraud, focusing on emotional manipulation over technical exploits.
Information security
fromSecurityWeek
6 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Privacy professionals
fromTheregister
1 month ago

Turns out most cybercriminals are old enough to know better

Middle-aged adults aged 35-44 comprise 37% of cybercrime arrests, with 25-44 year-olds accounting for nearly 60% of cases, contradicting the teenage hacker stereotype.
Information security
fromwww.bbc.com
2 months ago

How crypto criminals stole $700 million from people - often using age-old tricks

Public blockchain visibility does not enable victims to recover stolen cryptocurrency, leaving individuals powerless after hackers move funds through untraceable wallets.
[ Load more ]