Sextortion happens when a predator online misrepresents themself and manipulates someone into sending inappropriate videos or pictures. PLAINFIELD, Ind. — The digital blackmail of children, also known as “sextortion,” has been an issue for more than a decade. In fact, there has been a significant increase in reports of financial sextortion. Tuesday, law enforcement and...
Read More
• Launch joint case team From Godwin Tsa Abuja The Federal Government of Nigeria and the United Kingdom have signed a multilateral Memorandum of Understanding (MoU) to combat cybercrime between the two countries. This MoU will allow for cooperative response to transnational crime, real-time information sharing and coordinated intelligence gathering, as well as prosecution between...
Read More
FIRST ON FOX: A group of parents is urging the Trump administration to “make the safety of America’s children a top priority” as the deadline to strike a deal to save TikTok looms. “TikTok is a breeding ground for harmful content, exposing our kids to videos promoting self-harm, eating disorders, and dangerous so-called viral challenges,”...
Read More
Roblox-Discord being sued after man allegedly posed as teen to groom minor Two online platforms, popular with children, are being sued on behalf of a 13-year-old boy who says he was taken advantage of by a man posing as a teenager. The lawsuit says the man allegedly paid the boy for explicit photos. He also...
Read More
LAS VEGAS, Nev. (FOX5) – Bad actors are now playing the role of FBI agents to rip off those who’ve already fallen victim to cybercrime. Often, scammers impersonate agents with the agency’s Internet Crime Complaint Center, or IC3. They may email or text scam victims and offer to help recover the money stolen from them....
Read More
Enhancing product security across industrial applications   Certified security: ASUS IoT achieves IEC 62443-4-1 certification, validating secure development processes for industrial automation systems Built-in resilience: Security embedded across the product lifecycle to safeguard operational technology from evolving cyber threats Trusted by industry: Independent validation from global body reinforces ASUS IoT’s commitment to industrial-grade reliability and...
Read More
2025 marks a turning point. Vulnerabilities have become one of the most dangerous access points into enterprise environments. Exploits are faster, attack surfaces are wider, and the cost of delay is rising – while cyber attackers are no longer waiting for the right moment to strike. The newly released Verizon 2025 Data Breach Investigations Report...
Read More
Get stories like this delivered straight to your inbox. Sign up for The 74 Newsletter Updated, Jan. 27 When a broad group of parents, educators and activists met in late October at a government office building in Arlington, Virginia, they gathered around a shared goal: Make America’s schools safer.  There, three parents whose children were...
Read More
DEQ staff warned of hackers prior to April cyberattack Published 3:34 pm Tuesday, April 29, 2025 DEQ Just one day before a cyberattack shut down Oregon’s Department of Environmental Quality for several days, the agency’s IT staff warned employees about the risk of hackers. A cyberattack forced the DEQ to close all its vehicle inspection...
Read More
Christian Garcia mugshot, courtesy of the Jefferson County Prison. BROOKVILLE, Pa. (EYT) – A New Jersey man faces criminal charges, including multiple felonies, after allegedly attempting to meet who he believed was a 15-year-old girl for sexual activity in Jefferson County. According to Brookville Borough Police, Cristian Garcia, 30, of Lincoln Park, N.J., was arrested...
Read More
1 350 351 352 353 354 368
National Cyber Security

FREE
VIEW