Former

now browsing by tag

 
 

#sextrafficking | Former Florida county tax collector faces child sex-trafficking charge | #tinder | #pof | #match | romancescams | #scams

_________________________ A Florida county’s former tax collector allegedly paid for sex with an underage girl and tapped the state’s motor vehicle database for records on people with whom he was […] View full post on National Cyber Security

#sextrafficking | Juan Carlos, Spain’s Former King, Quits Country Amid Multiple Investigations | #tinder | #pof | #match | romancescams | #scams

_________________________ The former king of Spain, Juan Carlos, announced on Monday he was abandoning his country amid a Spanish court investigation into a lucrative business contract and a separate money […] View full post on National Cyber Security

Feds indict former Shreveport city employee in $400K fraud | #employeefraud | #recruitment | #corporatesecurity | #businesssecurity | #

SHREVEPORT, La. (AP) — A federal grand jury in Louisiana has accused a former city worker and a second man of using city credit cards more than 3,800 times over […] View full post on National Cyber Security

Former Chatsworth Teacher Arrested For Alleged Rape | #teacher | #children | #kids | #parenting | #parenting | #kids

CHATSWORTH, CA — A former Chatsworth teacher has been arrested for the alleged sexual assault of a child last year. Authorities are seeking additional victims. Steven Clark, 48, was arrested […] View full post on National Cyber Security

Former NY Hospital Employee Admits to Stealing …

Source: National Cyber Security – Produced By Gregory Evans

Richard Liriano pleads guilty to compromising hospital computers and co-workers’ email accounts, as well as stealing personal files and photos.

The former IT employee of a New York City-area hospital has pled guilty to stealing colleagues’ credentials and logging into various accounts to steal private and confidential files, the Department of Justice reports. He used this access to view photos, videos, and other data.

Between 2013 and 2018, the allegations state, Richard Liriano abused his administrative access to log into employee accounts and copy his colleagues’ personal documents, including tax records and personal photographs, onto his own machine. To do this, he installed malicious programs, including a keylogger, onto victims’ machines so he could capture their credentials.

Over the course of this time frame, Liriano stole the usernames and passwords of about 70 or more email accounts belonging to hospital employees or people associated with them. He then obtained unauthorized access to password-protected email, social media, photography, and other online accounts where the victims were registered.

“Liriano’s disturbing crimes not only invaded the privacy of his coworkers; he also intruded into computers housing vital healthcare and patient information, costing his former employer hundreds of thousands of dollars to remediate,” US Attorney Geoffrey Berman said in a statement. Liriano’s intrusions into the hospital networks caused more than $350,000 in losses.

Read more details here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

More Insights

Click here for the Source link

The post Former NY Hospital Employee Admits to Stealing … appeared first on National Cyber Security.

View full post on National Cyber Security

#cybersecurity | hacker | Former Twitter employees charged with using access to spy for Saudi Arabia

Source: National Cyber Security – Produced By Gregory Evans

A pair of former
Twitter employees – one an engineer and the other a media partnership manager –
were busted for accessing users’ account and personal data on behalf of Saudi
Arabia to ferret out opponents of the kingdom.

Engineer Ali Alzabarah and manager Ahmad Abouammo were charged with operating within the U.S. as agents of a foreign power, the Justice Department said Wednesday. In charges filed in a San Francisco court, the FBI noted the two defied Twitter policies and used their “access to proprietary and confidential Twitter information,” including the email addresses, phone numbers, birthdates and IP addresses of Twitter users, on behalf of the Saudi government. Abouammo is linked to Saudi Crown Prince Mohammad bin Salman (MbS), who U.S. intelligence officials say ordered the murder of journalist Jamal Khashoggi.

“The criminal complaint unsealed today alleges
that Saudi agents mined Twitter’s internal systems for personal information
about known Saudi critics and thousands of other Twitter users,” U.S. Attorney
David L. Anderson said in a statement. “U.S. law protects U.S. companies from
such an unlawful foreign intrusion. We will not allow U.S. companies or U.S.
technology to become tools of foreign repression in violation of U.S. law.”

The Justice
Department charges lay out a scheme in which Abouammo spied on three Twitter
accounts while Alzabarah accessed 6,000 accounts to suss out Saudi dissidents
and activists in the U.S. who opposed Saudi Arabia’s policies in exchange for
monetary compensation.

A third man,
Ahmed Almutairi, who worked for a social media firm associated with the Saudi
government, served as an intermediary and is being sought by authorities. Alzabarah
and Almutairi are both Saudi citizens while Abouammo is a citizen of the U.S.

“We
recognize the lengths bad actors will go to try and undermine our service,”
Twitter said in a statement. “Our company limits access to sensitive account
information to a limited group of trained and vetted employees.”

The charges
were first reported
by the Washington Post.

Original Source link

The post #cybersecurity | hacker | Former Twitter employees charged with using access to spy for Saudi Arabia appeared first on National Cyber Security.

View full post on National Cyber Security

#cyberfraud | #cybercriminals | PPC party discredits its former Kelowna-Lake Country president’s past accusations of racism – Lake Country Calendar

Source: National Cyber Security – Produced By Gregory Evans

Two days before the federal election The People’s Party of Canada Association fired back at its former president of the Kelowna-Lake Country district, who resigned while making accusations of racism within the party.

Daniel Joseph is running as an independent in the Kelowna-Lake Country riding after leaving the PCC party in March. Joseph announced his resignation in a video he posted to Facebook on March 29.

“Unfortunately, this party that shouted from the rooftops it was different, has proven to me that it isn’t different at all,” Joseph said in the post. “They are allowing racist, xenophobic, homophobic and downright hateful people into positions of authority and influence.”

Among those people Joseph was referring to was Glen Walushka, who was then the party’s provincial coordinator.

A release from the PPC Association on Saturday discredited Joseph’s accusations, saying the party has worked hard to “dispel any accusations that were directed at us and the party.”

The release pointed to an earlier response from Walushka: “The Kelowna-Lake Country PPC Association has always maintained that there was no basis for the allegations that were brought forth by Daniel Joseph only after he was removed from his position as the elected President of the Kelowna-Lake Country PPC Association.”

The PPC’s statement also referenced a Globe and Mail story published on Friday night, which reported that the Conservative Party of Canada paid Daisy Group – a consulting firm owned by Warren Kinsella – to discredit the party, in part by pushing messages of racism within the party on social media. Conservative leader Andrew Scheer has so far declined to comment on whether his party used the firm to spread disinformation.

The smear campaign is said to have taken place from April 16 through June 30.

“That is around the time that Daniel Joseph made his claims,” said Peter Neville, the PPC’s CEO of Kelowna-Lake Country.

Neville said the timeline of the Kinsella campaign coincided with Joseph’s comments and departure from the party, and was also around the time that Walushka’s email account appeared to have been hacked. In June it was reported that the PPC appeared to be the target of cyber fraud, spreading false emails from the PPC’s top organizers in an effort to make them appear racist.

“All we know is that according to the Globe, the plan was in place around about the time that Glen Walushka’s email was hacked and false emails were sent out – many of them mentioning racism. Whether Daniel had anything to do with this or not we don’t know,” said Neville.

“We can’t say that any of these are connected but we do have a lot of coincidental stuff going on,” he added.

On Saturday Joseph responded to the PPC’s disavowal of his past comments by saying he still stands by them “100 per cent.”

Joseph also rejected any implication that he was connected to the email hacking, or to yesterday’s revelations related to Kinsella.

“By bringing up my name and then bringing up Kinsella, that’s what it sounds like they’re trying to say,” he said.

“I don’t know the exact timeline of the Kinsella thing, but they are two completely separate events. They’ve got nothing to do with each other.”


Brendan Shykora

Source link

The post #cyberfraud | #cybercriminals | PPC party discredits its former Kelowna-Lake Country president’s past accusations of racism – Lake Country Calendar appeared first on National Cyber Security.

View full post on National Cyber Security

Former #Tennessee Gov. #Bredesen’s Senate #campaign fears it was #hacked

Source: National Cyber Security News

Former Tennessee Gov. Phil Bredesen’s Senate campaign told the FBI in a letter Thursday that it fears it was hacked.

The revelation comes as intelligence experts predict a widespread threat of cyberattacks on campaigns and election systems from both domestic and foreign hackers.
According to a copy of the letter obtained by CNN, Bredesen’s campaign “received multiple emails that appeared to be from the campaign’s media buyer” on February 28, which included specific details about a planned media buy and “urged the campaign to wire funds to an international bank account.”
    The letter, written by the campaign’s counsel Robert Cooper and sent to the FBI’s Memphis division, also detailed another email received on the same day which “purport(ed) to be from a principal in the media team that produced the TV commercial, urging transfer of the funds.”
    An FBI official confirmed that the Memphis field office received the letter but declined to comment further.
    Following the phishing attempt, the campaign hired a security firm “to determine the extent of any breaches and review security protocols,” according to the letter.

    Read More….

    advertisement:

    View full post on National Cyber Security Ventures

    Hackers #hired for #year-long #DDoS attack #against #man’s former #employer

    more information on sonyhack from leading cyber security expertsSource: National Cyber Security – Produced By Gregory Evans US federal prosecutors in Minnesota have charged a 46-year-old man with hiring a cyberhitman – well, technically, three hacking services – to launch a year-long campaign of distributed denial of service (DDoS) attacks on his former employer. Prosecutors say that John Kelsey Gammell, 46, contacted seven […] View full post on AmIHackerProof.com | Can You Be Hacked?