#1 Trusted Cybersecurity News Platform
Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cybersecurity

Child Protection | Breaking Cybersecurity News | The Hacker News

Category — Child Protection
Husband Faces Prison for Accessing Wife's Private Emails

Husband Faces Prison for Accessing Wife's Private Emails

Dec 27, 2011
A Michigan man faces prison time for accessing a laptop at his home and reading his wife's email. Leon Walker, 33, was charged with a felony after accessing his wife Clara Walker's email account and discovering she was having an affair, reported the Detroit Free Press. Upon discovering that his wife was communicating with her second husband, who had previously been arrested for beating her in front of her son, Leon Walker turned the emails over to Clara Walker's first husband, the child's father. This led to Leon Walker being charged with hacking—a law typically used for breaking into highly sensitive government or business computers or systems, the newspaper reported. "I have to ask," Walker's attorney Leon Weiss told the paper, "Don't the prosecutors have more important things to do with their time?" Apparently not. Oakland County prosecutor Jessica Cooper described Walker as a "hacker" who used his skills as a computer technic
South Carolina Bill Targets Cybercrimes with Up to 10-Year Prison Terms

South Carolina Bill Targets Cybercrimes with Up to 10-Year Prison Terms

Dec 21, 2010
Computer hackers and unauthorized informants could face up to 10 years in prison under a proposed state law designed to protect South Carolina military installations from WikiLeaks-type scandals. Charleston Republican Rep. Chip Limehouse announced on Monday that his bill, which will be considered when the legislature reconvenes next month, aims to strengthen the state's laws against computer crimes. The bill also seeks to complement federal laws by imposing additional penalties if classified or confidential information from Shaw Air Force Base, the Marine Corps' Parris Island, or other South Carolina military sites is disclosed. "It will essentially give South Carolina the means to pursue computer criminals," Limehouse said. "Our laws need to keep pace with the evolving digital landscape." Limehouse's bill builds on existing legislation that makes online fraud a felony, punishable by up to a $50,000 fine and five years in prison. Unauthorized public r
Shining a Light on Shadow Apps: The Invisible Gateway to SaaS Data Breaches

Shining a Light on Shadow Apps: The Invisible Gateway to SaaS Data Breaches

Sep 10, 2024SaaS Security / Risk Management
Shadow apps, a segment of Shadow IT, are SaaS applications purchased without the knowledge of the security team. While these applications may be legitimate, they operate within the blind spots of the corporate security team and expose the company to attackers.  Shadow apps may include instances of software that the company is already using. For example, a dev team may onboard their own instance of GitHub to keep their work separate from other developers. They might justify the purchase by noting that GitHub is an approved application, as it is already in use by other teams. However, since the new instance is used outside of the security team's view, it lacks governance. It may store sensitive corporate data and not have essential protections like MFA enabled, SSO enforced, or it could suffer from weak access controls. These misconfigurations can easily lead to risks like stolen source code and other issues. Types of Shadow Apps  Shadow apps can be categorized based on their interac
Expert Insights / Articles Videos
Cybersecurity Resources