#electronic-evidence

[ follow ]
fromNature
1 day ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
#cybercrime
Information security
fromSecurityWeek
13 hours ago

Triad Nexus Evades Sanctions to Fuel Cybercrime

Triad Nexus is a cybercrime network responsible for over $200 million in losses through scams and money laundering, using various techniques to evade sanctions.
Information security
fromSecurityWeek
13 hours ago

Triad Nexus Evades Sanctions to Fuel Cybercrime

Triad Nexus is a cybercrime network responsible for over $200 million in losses through scams and money laundering, using various techniques to evade sanctions.
Digital life
fromwww.dw.com
11 hours ago

Dangerous Apps In the Web of Data Brokers

Smartphone apps collect detailed location data, often shared with data brokers, posing security risks to users, including soldiers and government officials.
#bitcoin
Cryptocurrency
fromBitcoin Magazine
2 hours ago

Presidio Bitcoin Releases Quantum Readiness Paper

Presidio Bitcoin launched a GitHub repository to track research on Bitcoin's quantum vulnerability and potential mitigation strategies.
Cryptocurrency
fromBitcoin Magazine
4 days ago

Bitcoin Policy Institute Warns Quantum Advances Are Compressing Timeline For Network Upgrades

Recent quantum computing advancements may threaten Bitcoin's cryptography sooner than expected, but developers are actively preparing solutions.
Cryptocurrency
fromBitcoin Magazine
5 days ago

Bitcoin Could Be Quantum-Safe Without Protocol Changes

A new proposal introduces Quantum Safe Bitcoin to protect transactions from quantum attacks without altering Bitcoin's core rules.
Cryptocurrency
fromBitcoin Magazine
2 hours ago

Presidio Bitcoin Releases Quantum Readiness Paper

Presidio Bitcoin launched a GitHub repository to track research on Bitcoin's quantum vulnerability and potential mitigation strategies.
Cryptocurrency
fromBitcoin Magazine
4 days ago

Bitcoin Policy Institute Warns Quantum Advances Are Compressing Timeline For Network Upgrades

Recent quantum computing advancements may threaten Bitcoin's cryptography sooner than expected, but developers are actively preparing solutions.
Cryptocurrency
fromBitcoin Magazine
5 days ago

Bitcoin Could Be Quantum-Safe Without Protocol Changes

A new proposal introduces Quantum Safe Bitcoin to protect transactions from quantum attacks without altering Bitcoin's core rules.
#cybersecurity
Information security
fromTechzine Global
1 day ago

How AI could drive cyber investigation tools from niche to core stack

The rise of AI presents new cybersecurity risks, necessitating a shift from traditional defensive strategies to proactive measures against sophisticated threats.
Information security
fromZDNET
4 days ago

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

FBI and NSA warn of Russian hackers targeting vulnerable routers, urging users to update firmware and strengthen passwords.
Information security
fromTechzine Global
1 day ago

How AI could drive cyber investigation tools from niche to core stack

The rise of AI presents new cybersecurity risks, necessitating a shift from traditional defensive strategies to proactive measures against sophisticated threats.
Privacy technologies
fromYahoo Tech
4 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Information security
fromThe Hacker News
1 day ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

Treasury Launches Cybersecurity Initiative Expanding Threat Intelligence Access for Digital Asset Firms

U.S. Treasury expands cybersecurity coordination with digital asset firms to enhance protections and integrate with traditional finance.
Information security
fromZDNET
4 days ago

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

FBI and NSA warn of Russian hackers targeting vulnerable routers, urging users to update firmware and strengthen passwords.
#data-privacy
Privacy technologies
fromArs Technica
6 days ago

How our digital devices are putting our right to privacy at risk

Digital convenience comes at the cost of personal data privacy, raising concerns about its potential use against individuals by law enforcement.
Privacy technologies
fromArs Technica
6 days ago

How our digital devices are putting our right to privacy at risk

Digital convenience comes at the cost of personal data privacy, raising concerns about its potential use against individuals by law enforcement.
Marketing tech
fromBloomberglaw
15 hours ago

Meta Cases Put Social Media Platforms at Securities Fraud Risk

Social media platforms face new legal challenges regarding their role in facilitating fraudulent securities schemes.
#ai-in-law
Law
fromCommunity
2 weeks ago

How AI Improves Docket Research with Protege in CourtLink

AI integration in docket research enhances efficiency and decision-making for legal professionals.
Law
fromAbove the Law
4 days ago

What The Legal Industry Can Learn About AI Hallucinations From Auditors - Above the Law

AI-generated legal documents can contain convincing errors, necessitating stronger governance and review processes in law firms.
Law
fromCommunity
2 weeks ago

How AI Improves Docket Research with Protege in CourtLink

AI integration in docket research enhances efficiency and decision-making for legal professionals.
Law
fromAbove the Law
4 days ago

What The Legal Industry Can Learn About AI Hallucinations From Auditors - Above the Law

AI-generated legal documents can contain convincing errors, necessitating stronger governance and review processes in law firms.
SOMA, SF
fromKqed
8 hours ago

DOJ: Man Who Attacked Sam Altman's House Threatened to Kill Other Tech CEOs | KQED

A Texas man faces charges for attempted murder of OpenAI CEO Sam Altman after violent attacks at his home and company headquarters.
fromElectronic Frontier Foundation
1 day ago

Hot Off the Press: EFF's Updated Guide to Tech at the US-Mexico Border

"The Battalion Search and Rescue always carries the Electronic Frontier Foundation's zine in our desert rig. We're finding new surveillance all the time, and without a resource like that, we wouldn't know what the hell we're looking at."
Roam Research
#digital-sovereignty
fromFortune
5 days ago
DevOps

The digital sovereignty dilemma is a false choice - here's how enterprises can have both | Fortune

Europe politics
fromTheregister
1 day ago

Digital sovereignty isn't just a buzzword - it's the future

European governments and companies are prioritizing digital sovereignty due to concerns over US control and dependency.
DevOps
fromFortune
5 days ago

The digital sovereignty dilemma is a false choice - here's how enterprises can have both | Fortune

Organizations must ensure digital sovereignty by balancing local control with global technology access to remain resilient and competitive.
fromElectronic Frontier Foundation
1 day ago

EFF HOPE: Join Us This August!

Conferences like HOPE are where that community comes together to learn, connect, and push these ideals forward. EFF is proud to be at HOPE 26.
Privacy technologies
#ai-governance
EU data protection
fromComputerWeekly.com
1 day ago

UK reliance on US big tech companies is 'national security risk', claims report | Computer Weekly

The UK is at risk due to over-reliance on US tech companies for critical infrastructure, impacting national security.
#artificial-intelligence
Law
fromAbove the Law
5 days ago

On-Demand Webinar: The Path To AI Maturity In The Legal Industry - Above the Law

Artificial intelligence is essential for legal professionals, requiring a strategic approach to transition from experimentation to full business transformation.
Law
fromAbove the Law
5 days ago

On-Demand Webinar: The Path To AI Maturity In The Legal Industry - Above the Law

Artificial intelligence is essential for legal professionals, requiring a strategic approach to transition from experimentation to full business transformation.
UK news
fromwww.independent.co.uk
1 day ago

Phone firms should use technology to stop children taking nudes, police chief says

Tech firms must enhance children's online safety by preventing the creation of nude images on their devices, according to law enforcement officials.
London startup
fromComputerWeekly.com
1 day ago

Datacentre developers tout benefits to local communities, but do they deliver? | Computer Weekly

Datacentre developments are causing challenges for local businesses, raising concerns about energy consumption and community impact despite potential local benefits.
SF politics
fromNextgov.com
4 days ago

Appeals court removes limits on DOGE access to SSA data despite 'alarming' revelations

A federal appeals court reversed restrictions on the Department of Government Efficiency's access to sensitive Social Security Administration data.
Apple
fromTheregister
5 days ago

Security reserchers tricked Apple Intelligence into cursing

Apple Intelligence can be hijacked through prompt injection, exposing millions of users to risk, but a fix was implemented in iOS 26.4 and macOS 26.4.
#social-media
Social media marketing
fromHer Campus
5 days ago

They Knew, They Didn't Care, & We Are All Paying For It

Social media platforms like Instagram have been found liable for mental health damage to young users, with internal documents revealing harmful strategies targeting teens.
Digital life
fromwww.dw.com
2 days ago

Does age verification for social media help protect kids?

Governments are implementing age limits on social media to protect minors, but experts question the effectiveness of such measures.
Social media marketing
fromHer Campus
5 days ago

They Knew, They Didn't Care, & We Are All Paying For It

Social media platforms like Instagram have been found liable for mental health damage to young users, with internal documents revealing harmful strategies targeting teens.
Digital life
fromwww.dw.com
2 days ago

Does age verification for social media help protect kids?

Governments are implementing age limits on social media to protect minors, but experts question the effectiveness of such measures.
Information security
fromArs Technica
4 hours ago

UK gov's Mythos AI tests help separate cybersecurity threat from hype

Mythos outperformed previous models in TLO tests, showing capability in attacking vulnerable systems but still facing limitations in complex scenarios.
#fraud-prevention
Non-profit organizations
fromNextgov.com
1 week ago

The war against fraud should be a war for tech modernization

A new task force aims to combat fraud in public benefits programs by ensuring adequate anti-fraud controls and addressing data sharing challenges.
Non-profit organizations
fromNextgov.com
1 week ago

The war against fraud should be a war for tech modernization

A new task force aims to combat fraud in public benefits programs by ensuring adequate anti-fraud controls and addressing data sharing challenges.
Marketing tech
fromThe Cool Down
17 hours ago

AI chatbots are subtly trying to make you buy more stuff - here's how to protect yourself

AI can influence consumer purchasing decisions without their awareness, often through subtle persuasion methods.
Privacy professionals
fromThe Verge
5 hours ago

Privacy advocates want Google to stop handing consumer data over to ICE

Google is being investigated for allegedly failing to notify users before disclosing their data to law enforcement.
#ai
Law
fromTheregister
1 day ago

AI spread through law. Here's what happened next

AI's rapid advancements in coding are overshadowed by significant downsides, particularly in legal systems where hallucinations lead to unreliable outputs.
Information security
fromFortune
4 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Law
fromTheregister
1 day ago

AI spread through law. Here's what happened next

AI's rapid advancements in coding are overshadowed by significant downsides, particularly in legal systems where hallucinations lead to unreliable outputs.
Artificial intelligence
fromFast Company
3 days ago

Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask

Claude Mythos AI model may enhance cybersecurity defenses but also poses risks for hackers due to its ability to identify vulnerabilities and create exploits.
Information security
fromTechzine Global
1 day ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Information security
fromFortune
4 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
#cryptocurrency
Cryptocurrency
fromSecurityWeek
1 day ago

International Operation Targets Multimillion-Dollar Crypto Theft Schemes

Operation Atlantic targets multimillion-dollar cryptocurrency theft, freezing $12 million in stolen assets and identifying over $45 million in stolen funds.
Cryptocurrency
fromTheregister
5 days ago

US, UK, Canadian cops disrupt $45M global crypto scam

A global cryptocurrency scam was disrupted, recovering $12 million and identifying over 20,000 fraud-linked wallet addresses across 30 countries.
Cryptocurrency
fromSecurityWeek
1 day ago

International Operation Targets Multimillion-Dollar Crypto Theft Schemes

Operation Atlantic targets multimillion-dollar cryptocurrency theft, freezing $12 million in stolen assets and identifying over $45 million in stolen funds.
Cryptocurrency
fromTheregister
5 days ago

US, UK, Canadian cops disrupt $45M global crypto scam

A global cryptocurrency scam was disrupted, recovering $12 million and identifying over 20,000 fraud-linked wallet addresses across 30 countries.
Roam Research
fromThe Hacker News
3 days ago

Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data

Webloc is a global geolocation surveillance system used by various law enforcement agencies, providing access to data from millions of mobile devices.
Privacy professionals
from404 Media
10 hours ago

Google, Microsoft, Meta All Tracking You Even When You Opt Out, According to an Independent Audit

Microsoft, Meta, and Google may be violating California privacy laws by failing to honor user opt-out requests for ad cookies.
#data-integrity
Marketing tech
fromAdExchanger
1 day ago

AI Is Nothing Without Data Fidelity. Here's A Four-Step Approach to Protect It | AdExchanger

Data integrity is crucial for effective AI in advertising, as flawed data leads to poor outcomes.
Marketing tech
fromAdExchanger
1 day ago

AI Is Nothing Without Data Fidelity. Here's A Four-Step Approach to Protect It | AdExchanger

Data integrity is crucial for effective AI in advertising, as flawed data leads to poor outcomes.
fromPopular Science
3 days ago

How to stop your smart TV from tracking you

Smart TVs are capable of tracking user data, including viewing habits and app usage, which can lead to personalized advertising and content recommendations. Users may prefer to limit this tracking to protect their privacy.
Privacy technologies
Privacy professionals
fromSecurityWeek
1 day ago

BrowserGate: Claims of LinkedIn 'Spying' Clash With Security Research Findings

LinkedIn allegedly scans users' computers to collect data on browser extensions, raising concerns about corporate espionage.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

SEC and CFTC Fast-Track US Crypto Oversight Using Interpretive Rules to Bypass Lengthy Rulemaking

U.S. regulators are using interpretive rules for faster crypto oversight, prioritizing clarity and reducing barriers for digital asset expansion.
Law
fromIndependent
4 days ago

Computer engineer claims he was penalised for flagging Israeli links of firm given 'bananas' server access at top Irish cybersecurity company

A cyber-security firm reprimanded an engineer for discriminatory comments regarding an Israeli company's access to its servers amid concerns about Palestinian genocide.
#kraken
Information security
fromFinbold
11 hours ago

Kraken insider extortion reveals remote work security blind spot

Kraken experienced an insider security breach affecting 2,000 client accounts, highlighting vulnerabilities in remote-first working models.
Information security
fromBitcoin Magazine
1 day ago

Crypto Exchange Kraken Faces Extortion Attempt After Insider Access Incidents Involving Support Staff

Kraken experienced two insider-related security incidents but confirmed no systems were breached and no client funds were at risk.
Information security
fromFinbold
11 hours ago

Kraken insider extortion reveals remote work security blind spot

Kraken experienced an insider security breach affecting 2,000 client accounts, highlighting vulnerabilities in remote-first working models.
Information security
fromBitcoin Magazine
1 day ago

Crypto Exchange Kraken Faces Extortion Attempt After Insider Access Incidents Involving Support Staff

Kraken experienced two insider-related security incidents but confirmed no systems were breached and no client funds were at risk.
fromArs Technica
1 day ago

Your tech support company runs scams. Stop-or disguise with more fraud?

Tech Live Connect processed fraudulent charges using real customer data, including names and addresses, to make the charges appear legitimate and maintain a low chargeback ratio.
Privacy professionals
#quantum-computing
Cryptocurrency
from24/7 Wall St.
3 days ago

Is Ripple (XRP) Quantum-Safe? A Top XRPL Validator Just Published a Full Audit

Quantum computing poses a significant risk to cryptocurrency encryption, with Bitcoin being more vulnerable than XRP.
Cryptocurrency
fromBitcoin Magazine
6 days ago

Adam Back Says Quantum Threat To Bitcoin Is Decades Away

Quantum computing poses no immediate threat to Bitcoin's cryptographic security, but preparation for future risks is essential.
Law
fromAbove the Law
4 days ago

Understanding AI Hallucinations: Making Sure You Don't End Up At The Wrong Stop - Above the Law

Understanding GenAI's predictable failures is crucial for legal professionals to avoid hallucinations and inaccuracies in legal outputs.
Information security
fromThe Hacker News
13 hours ago

Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)

Critical risk findings surged by nearly 400% amid a 52% increase in raw alert volume, driven by AI-assisted development.
Privacy professionals
fromRoute Fifty
1 day ago

Getting privacy policy right in a competitive digital economy

State and local leaders aim to balance privacy protection with economic competitiveness, as inconsistent privacy laws can hinder business operations and consumer trust.
Media industry
fromPsychology Today
3 weeks ago

Build Your Digital Detective Kit

Digital and media literacy skills are essential for all online users to navigate AI-generated content, partisan framing, and viral misinformation in today's information landscape.
Cryptocurrency
fromnews.bitcoin.com
4 days ago

CFTC Names Key Innovation Task Force Team Focusing on Crypto, AI and Prediction Markets

CFTC establishes an Innovation Task Force to enhance regulatory clarity for crypto, AI, and prediction markets.
Privacy professionals
fromFuturism
1 day ago

Huge Group of Experts Warns Meta That Its Pervert Glasses Will Enable Terrible Crimes

Meta's Ray-Ban AI glasses face backlash for privacy violations and plans for facial recognition technology, prompting outrage from civil rights groups.
Privacy professionals
fromBloomberglaw
4 days ago

Splintered Video Privacy Rulings Won't Be Fixed by Supreme Court

The Supreme Court's review of the VPPA may clarify the definition of 'consumer' but won't resolve circuit splits on personally identifiable information.
#data-breach
Information security
fromTechCrunch
1 day ago

Hack at Anodot leaves over a dozen breached companies facing extortion | TechCrunch

Hackers stole data from multiple companies after breaching Anodot, exposing customers to extortion and potential data publication.
Privacy professionals
fromTechCrunch
6 days ago

Hackers steal and leak sensitive LAPD police documents | TechCrunch

Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
Information security
fromTechCrunch
1 day ago

Hack at Anodot leaves over a dozen breached companies facing extortion | TechCrunch

Hackers stole data from multiple companies after breaching Anodot, exposing customers to extortion and potential data publication.
Privacy professionals
fromTechCrunch
6 days ago

Hackers steal and leak sensitive LAPD police documents | TechCrunch

Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
Information security
fromTechCrunch
1 day ago

FBI announces takedown of phishing operation that targeted thousands of victims | TechCrunch

The FBI dismantled a global phishing operation, W3LL, targeting over 17,000 victims and facilitating over $20 million in fraud.
Privacy professionals
fromSecurityWeek
5 days ago

The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security

Visibility through security measures can deter undesirable behavior and enhance safety in challenging situations.
Privacy professionals
fromWIRED
6 days ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
Business intelligence
fromSecuritymagazine
1 month ago

AI Security and Forensic Accounting: Protecting Financial Systems in an Automated World

AI-enhanced forensic accounting is essential for detecting financial fraud and payment manipulation in automated financial systems vulnerable to sophisticated, AI-driven attacks.
Privacy technologies
fromNextgov.com
3 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
#data-security
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Circle Announces Quantum-Resistant Roadmap to Secure Future Digital Asset Infrastructure

Circle's Arc platform will launch with post-quantum signature support to secure institutional assets against quantum threats.
Information security
fromThe Hacker News
1 week ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Privacy professionals
fromMedCity News
3 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
Mental health
fromSecuritymagazine
1 month ago

Security Insights Delivered Through Podcasts

Security professionals face significant mental-health risks and team burnout, requiring leaders to integrate empathetic practices and psychological safety into security operations.
Information security
fromSecuritymagazine
1 week ago

Ransomware Response: How Businesses Regain Control Under Pressure

Ransomware attacks create urgent pressure, forcing quick decisions and impacting operations, legal obligations, and overall enterprise strategy.
Information security
fromThe Hacker News
6 days ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
fromComputerworld
1 week ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
#digital-forensics
Privacy professionals
fromTechRepublic
1 month ago

FBI Investigates Suspicious Activity in Surveillance Platform

The FBI is investigating suspicious cyber activity on systems managing surveillance and wiretap warrants, highlighting critical vulnerabilities in sensitive law enforcement infrastructure.
Privacy professionals
fromTheregister
1 month ago

Turns out most cybercriminals are old enough to know better

Middle-aged adults aged 35-44 comprise 37% of cybercrime arrests, with 25-44 year-olds accounting for nearly 60% of cases, contradicting the teenage hacker stereotype.
[ Load more ]