University of Phoenix Data Breach Affects 3.5 Million Individuals

Nearly 3.5 million individuals associated with the University of Phoenix were impacted by a significant data breach that exposed sensitive personal and financial information.

The University of Phoenix has confirmed a substantial data breach affecting approximately 3.5 million students and staff. The incident originated in August when cyber attackers infiltrated the university’s network and accessed sensitive information without detection.

The breach was discovered on November 21, after the attackers listed the university on a public leak site. In early December, the university publicly disclosed the incident, and its parent company filed an 8-K form with regulators to report the breach.

According to notification letters submitted to Maine’s Attorney General, a total of 3,489,274 individuals were affected by the breach. This group includes current and former students, faculty, staff, and suppliers.

The university reported that hackers exploited a zero-day vulnerability in the Oracle E-Business Suite, an application that manages financial operations and contains highly sensitive data. Security researchers have indicated that the attack bears similarities to tactics employed by the Clop ransomware gang, which has a history of stealing data through zero-day vulnerabilities rather than encrypting systems.

The specific vulnerability associated with this breach is identified as CVE-2025-61882 and has reportedly been exploited since early August. The attackers accessed a range of sensitive personal and financial information, raising significant concerns about identity theft, financial fraud, and targeted phishing scams.

In letters sent to those affected, the university confirmed the breach’s impact on 3,489,274 individuals. Current and former students and employees are advised to monitor their mail closely, as notification letters are typically sent via postal mail rather than email. These letters detail the exposed data and provide instructions for accessing protective services.

A representative from the University of Phoenix provided a statement regarding the incident: “We recently experienced a cybersecurity incident involving the Oracle E-Business Suite software platform. Upon detecting the incident on November 21, 2025, we promptly took steps to investigate and respond with the assistance of leading third-party cybersecurity firms. We are reviewing the impacted data and will provide the required notifications to affected individuals and regulatory entities.”

To assist those affected, the University of Phoenix is offering free identity protection services. Individuals must use the redemption code provided in their notification letter to enroll in these services. Without this code, activation is not possible.

This breach is not an isolated incident; Clop has employed similar tactics in previous attacks involving various platforms, including GoAnywhere MFT, Accellion FTA, MOVEit Transfer, Cleo, and Gladinet CentreStack. Other universities, such as Harvard University and the University of Pennsylvania, have also reported incidents related to Oracle EBS vulnerabilities.

The U.S. government has taken notice of the situation, with the Department of State offering a reward of up to $10 million for information linking Clop’s attacks to foreign government involvement.

Universities are known to store vast amounts of personal data, including student records, financial aid files, payroll systems, and donor databases. This makes them high-value targets for cybercriminals, as a single breach can expose years of data tied to millions of individuals.

If you believe you may be affected by this breach, it is crucial to act quickly. Carefully read the notification letter you receive, as it will explain what data was exposed and how to enroll in protective services. Using the redemption code provided is essential, especially given the involvement of Social Security and banking data.

Even if you do not qualify for the free identity protection service, investing in an identity theft protection service is a wise decision. These services actively monitor sensitive information, such as your Social Security number, phone number, and email address. If your information appears on the dark web or if someone attempts to open a new account in your name, you will receive immediate alerts.

Additionally, these services can assist you in quickly freezing bank and credit card accounts to limit further fraud. It is also advisable to check bank statements and credit card activity for any unfamiliar charges and report anything suspicious immediately.

Implementing a credit freeze can prevent criminals from opening new accounts in your name, and this process is both free and reversible. To learn more about how to freeze your credit, visit relevant resources online.

As the fallout from this breach continues, individuals should remain vigilant for increased scam emails and phone calls, as criminals may reference the breach to appear legitimate. Strong antivirus software is essential for safeguarding against malicious links that could compromise your private information.

Keeping operating systems and applications up to date is also critical, as attackers often exploit outdated software to gain access. Enabling automatic updates and reviewing app permissions can help prevent further data breaches.

The University of Phoenix data breach underscores a growing concern in higher education regarding cybersecurity. When attackers exploit trusted enterprise software, the consequences can be widespread and severe. While the university’s offer of free identity protection is a positive step, long-term vigilance is essential to mitigate risks.

As discussions about cybersecurity standards in educational institutions continue, students may want to consider demanding stronger protections before enrolling. For further information and resources, visit CyberGuy.com.

700Credit Data Breach Exposes Social Security Numbers of 5.8 Million Consumers

A data breach at fintech company 700Credit has compromised the personal information of over 5.8 million consumers, raising concerns about identity theft and financial fraud.

A significant data breach at fintech company 700Credit has exposed the personal information of more than 5.8 million individuals. This incident, which originated from a third-party integration partner rather than a direct compromise of 700Credit’s internal systems, highlights the ongoing risks associated with data security in the financial services sector.

The breach traces back to July 2025, when a threat actor compromised one of 700Credit’s third-party partners. During this intrusion, the attacker discovered an exposed application programming interface (API) that allowed access to sensitive customer information linked to auto dealerships using 700Credit’s services. Alarmingly, the integration partner failed to notify 700Credit about the breach, enabling unauthorized access to continue for several months.

It was not until October 25 that 700Credit detected suspicious activity within its systems, prompting an internal investigation. The company subsequently engaged third-party forensic specialists to assess the breach’s scope and identify the affected data. Their findings revealed that unauthorized copies of certain records had been made, specifically those related to customers of auto dealerships utilizing 700Credit’s platform.

Ken Hill, Managing Director of 700Credit, confirmed that approximately 20% of the consumer data accessible through the compromised system was stolen between May and October. While the company has not released a comprehensive list of the data fields involved, it has acknowledged that highly sensitive information, including Social Security numbers (SSNs), was exposed. The exposure of SSNs significantly heightens the risk of identity theft and financial fraud, as these numbers cannot be easily changed like a password.

In response to the breach, 700Credit has established a dedicated webpage detailing the incident and the types of information compromised. The company is also offering affected individuals 12 months of free identity protection and credit monitoring services through TransUnion. Those impacted have a 90-day window to enroll in this service after receiving notification of the breach.

This incident is not isolated; other platforms, including audio streaming service SoundCloud and adult video sharing site Pornhub, have also experienced data breaches linked to third-party vendors. While there is no evidence to suggest that the same vendor was involved in all three cases, these incidents underscore the risks associated with third-party access to sensitive consumer data.

When data breaches occur, the repercussions are not always immediate. Compromised data can linger in underground markets for months before being exploited. Therefore, it is crucial for individuals to take proactive measures to protect themselves. Strong antivirus software can help block malicious downloads and phishing attempts that often follow large data leaks. Additionally, using a password manager to generate unique passwords for each service can safeguard against further breaches.

Individuals should also check if their email addresses have been exposed in previous breaches. Many password managers now include built-in breach scanners that alert users if their information has appeared in known leaks. If a match is found, it is essential to change any reused passwords and secure those accounts with new, unique credentials.

Implementing two-factor authentication (2FA) for email, banking, social media, and cloud accounts can add an extra layer of security. Even if a password is compromised, 2FA requires a second verification step, making unauthorized access more difficult.

Monitoring services can alert individuals to new accounts, loans, or credit checks opened in their name, providing an opportunity to act before significant financial damage occurs. Identity theft protection services can also monitor personal information, such as SSNs, and alert users if their data is being sold on the dark web or used to open accounts fraudulently.

Furthermore, individuals should consider utilizing data removal services to reduce their digital footprint. While no service can guarantee complete removal of personal information from the internet, these services actively monitor and erase data from various websites, making it harder for attackers to profile and target individuals after a breach.

For those whose Social Security numbers are involved, a credit freeze is one of the most effective defenses. This measure prevents new credit accounts from being opened without the individual’s approval and can be temporarily lifted when necessary.

The incident at 700Credit serves as a stark reminder of the vulnerabilities associated with third-party APIs and integrations. When these partners fail to disclose breaches promptly, the downstream impact can be extensive. Individuals receiving notifications from 700Credit should take them seriously, enroll in the offered credit monitoring service, and review their credit reports for any suspicious activity.

As the digital landscape continues to evolve, the question remains: should companies be held accountable when a third-party vendor exposes customer information? This ongoing debate highlights the need for robust security measures and transparency in the handling of sensitive consumer data.

For further information on protecting yourself from identity theft and data breaches, visit CyberGuy.com.

Pornhub Experiences Major Data Leak Exposing 200 Million User Records

Pornhub is facing a significant data breach, with the hacking group ShinyHunters claiming to have stolen 94GB of user data affecting over 200 million records and demanding a Bitcoin ransom.

Pornhub is grappling with the aftermath of a massive data leak, as the hacking group ShinyHunters has claimed responsibility for stealing 94GB of user data. This breach reportedly affects more than 200 million records, and the group is now attempting to extort the company for a ransom in Bitcoin.

According to reports from BleepingComputer, ShinyHunters has threatened to publish the stolen data if their demands are not met. Pornhub has acknowledged the situation but insists that its core systems were not compromised during the breach.

The exposed data primarily pertains to Pornhub Premium users. While no financial information was included, the dataset contains sensitive activity details that raise serious privacy concerns. The hackers claim that the stolen records include activity logs that indicate whether users watched or downloaded videos or viewed specific channels. Additionally, search histories are part of the compromised data, heightening the potential privacy risks if this information is made public.

This breach appears to be linked to a previous security incident involving Mixpanel, a data analytics vendor that had worked with Pornhub. That earlier incident occurred in November 2025, following a smishing attack that allowed threat actors access to Mixpanel’s systems. However, Mixpanel has stated that it does not believe the data stolen from Pornhub originated from that incident. The company has found no evidence that Pornhub data was taken during its November breach. Furthermore, Pornhub clarified that it ceased its relationship with Mixpanel in 2021, suggesting that the stolen data may be several years old.

To verify the claims, Reuters reached out to some Pornhub users, who confirmed that the data associated with their accounts was accurate but outdated, consistent with the timeline provided by Mixpanel.

In response to the reports, Pornhub has moved quickly to reassure its users. In a security notice, the company stated, “This was not a breach of Pornhub Premium’s systems. Passwords, payment details, and financial information remain secure and were not exposed.” This clarification helps to mitigate the immediate risk of financial fraud; however, the exposure of viewing habits and search activity still poses long-term privacy risks.

ShinyHunters has been linked to several high-profile data breaches this year, employing social engineering tactics such as phishing and smishing to infiltrate corporate systems. Once inside, the group typically steals large datasets and uses extortion threats to coerce companies into paying ransoms. This strategy has impacted businesses and users globally.

Pornhub has updated its online statement to alert Premium members about potential direct contact from cybercriminals. In cases involving adult platforms, such outreach often escalates into sextortion attempts, where criminals threaten to expose private activities unless victims comply with their demands. The company advised users, “We are aware that the individuals responsible for this incident have threatened to contact impacted Pornhub Premium users directly. You may therefore receive emails claiming they have your personal information. As a reminder, we will never ask for your password or payment information by email.”

As one of the world’s most visited adult video platforms, Pornhub allows users to view content anonymously or create accounts to upload and interact with videos. Even though the stolen data is several years old, users are encouraged to take this opportunity to enhance their digital security.

To bolster security, users should start by updating their Pornhub passwords. It is also advisable to change the passwords for any email or payment accounts linked to Pornhub. Utilizing a password manager can simplify the process of creating and storing strong, unique passwords.

Additionally, users should check if their email addresses have been exposed in previous breaches. A reliable password manager often includes a built-in breach scanner that alerts users if their email addresses or passwords have appeared in known leaks. If a match is found, it is crucial to change any reused passwords and secure those accounts with new, unique credentials.

Data breaches frequently lead to follow-up scams. Users should remain cautious of emails, texts, or phone calls referencing Pornhub or account issues. It is essential to avoid clicking on links, downloading attachments, or sharing personal information unless the source can be verified. Installing robust antivirus software adds another layer of protection against malicious links and downloads.

Data removal services can assist in removing personal information from data broker websites that collect and sell details such as email addresses, locations, and online identifiers. If leaked data from this breach is shared or resold, removing personal information can make it more challenging for scammers to connect it to individuals.

Identity theft protection companies can monitor personal information, such as Social Security Numbers, phone numbers, and email addresses, alerting users if their data is being sold on the dark web or used to open accounts. Early warnings can help mitigate damage if personal data surfaces.

Using a VPN can help protect browsing activity by masking IP addresses and encrypting internet traffic, which is particularly relevant in cases like this, where exposed activity data may include location signals or usage patterns. While a VPN cannot erase past exposure, it reduces the visibility of new information and complicates the linking of future activity to individuals.

The recent data leak at Pornhub underscores the risks associated with long-stored user information. Although passwords and payment details were not compromised, the exposure of activity data can still have damaging consequences. ShinyHunters has demonstrated a willingness to exert pressure through public threats, highlighting the importance of remaining vigilant and proactive about online security.

Should companies be allowed to retain years of user activity data once it is no longer necessary? This question remains open for discussion as the implications of such data storage continue to unfold. For further insights, readers can visit CyberGuy.com.

Lawsuit Filed Against TiE New York Ahead of Gala Event

A lawsuit against TiE New York, alleging governance failures and misconduct, was filed just weeks before the organization’s annual gala, with many defendants served during the event.

A lawsuit alleging governance failures, fiduciary breaches, and misconduct within TiE New York was filed in Queens County Supreme Court more than a month prior to the organization’s annual gala. This legal action has intensified scrutiny over the nonprofit’s governance practices.

The lawsuit, initiated by charter member Kesav Dama both individually and derivatively on behalf of TiE New York, was formally filed on November 11, 2025, and entered into the court system by November 14, 2025. This timing has raised questions about what the leadership of TiE New York knew regarding the internal disputes that have now escalated into a judicial matter.

According to court documents and service records, 10 of the 12 named defendants were served with legal papers during the TiE New York Gala. The defendants include current and former board members and officers, such as then-President Jignesh Patel and Secretary Vaibhav Parikh. TiE New York itself is named as both a nominal and direct defendant in the case.

Typically a celebratory fundraising and networking event, the gala became the backdrop for the formal notification of litigation. The allegations claim that TiE New York’s board failed to act on repeated warnings about misconduct and governance violations.

Legal experts note that while serving legal papers at a public event is unusual, it is not improper if defendants are otherwise difficult to reach or regularly attend scheduled functions together.

The verified complaint outlines multiple causes of action, including breach of fiduciary duty, breach of contract, defamation, tortious interference with business relationships, and intentional infliction of emotional distress. The claims assert that TiE New York leadership failed to investigate or discipline alleged misconduct by its president despite numerous written complaints. Additionally, the plaintiff alleges that an improper demand for evidence was issued as a delaying tactic, and that internal communications containing defamatory statements about a charter member remained uncorrected.

Furthermore, the lawsuit contends that the board continued governance and election activities while litigation was imminent or already underway. The legal action is partly based on New York Not-for-Profit Corporation Law §720, which governs the fiduciary duties of directors and officers.

Alongside the complaint, the plaintiff filed an Order to Show Cause, seeking immediate court intervention. The requested relief includes prohibiting TiE New York from using organizational funds to defend the lawsuit, halting board elections or changes to election rules, preserving and producing board minutes and governing documents, and staying major governance actions pending judicial review.

Justice Karina E. Alomar of the Queens County Supreme Court signed the Order to Show Cause, initially setting a hearing for December 18, 2025. However, court records indicate that Jignesh Patel requested an adjournment of this hearing, which was subsequently delayed to December 22, 2025. The reason cited for the adjournment was the need for additional time to prepare a response to the requested emergency relief following the service of the lawsuit.

This adjournment has raised further questions about whether TiE New York leadership continued its routine operations, including board activity and event planning, after the lawsuit was filed and served.

The litigation marks a significant escalation from what began as an internal governance dispute. Previously, the complainant had submitted formal written complaints and demand letters weeks earlier, urging the immediate suspension of the president and warning of potential legal exposure if the board failed to act.

Newly reviewed records indicate that the complainant, through counsel, complied with requests for evidence within a compressed timeframe. However, the board allegedly declined to take any disciplinary action prior to the lawsuit being filed. By the time defendants were served at the gala, the dispute had already shifted from an internal review to judicial oversight.

Nonprofit governance specialists note that derivative lawsuits, particularly those seeking to halt elections and restrict the use of organizational funds, represent some of the most serious legal challenges a nonprofit board can face. “Once an Order to Show Cause is granted, the court is signaling that the allegations merit immediate attention,” said one nonprofit governance attorney not involved in the case. “It also raises legitimate questions about whether directors are acting independently or protecting incumbents.”

The timing of the service at the gala, combined with the delayed hearing request, may now become part of a broader factual record examined by the court.

As the case unfolds, it places renewed focus on transparency, accountability, and fiduciary responsibility within one of the region’s most prominent entrepreneurial nonprofit organizations. TiE New York and the individual defendants have not publicly commented on the litigation, and requests for comment were not returned by press time.

As this situation develops, it will be crucial to observe how TiE New York addresses the allegations and what implications this legal action may have for its governance practices moving forward, according to The American Bazaar.

Sikh Coalition Files Lawsuit Against California DMV Over License Cancellations

The Sikh Coalition has filed a class action lawsuit against the California DMV, challenging the cancellation of over 20,000 commercial driver licenses held by immigrant truck drivers.

OAKLAND, CA – On December 22, the Sikh Coalition, in collaboration with co-counsel from the Asian Law Caucus and the law firm Weil, Gotshal & Manges, filed a class action lawsuit against the California Department of Motor Vehicles (DMV). The lawsuit accuses the agency of unlawfully canceling more than 20,000 commercial driver licenses held by non-domiciled immigrant truck drivers.

The legal action challenges the DMV’s decision to revoke these licenses, which the plaintiffs argue was based on minor clerical discrepancies. The case is brought on behalf of five affected commercial drivers, along with the Jakara Movement, and seeks relief for thousands of drivers who claim they have been abruptly forced out of work without a meaningful opportunity to rectify their paperwork issues.

According to the complaint, the California DMV began issuing cancellation notices in November to drivers whose documentation contained minor inconsistencies. These discrepancies included mismatched expiration dates between their commercial driver licenses and federal work permits.

The lawsuit follows pressure from the federal government, but it contends that the state agency failed to provide a clear process for drivers to correct these discrepancies before losing their licenses.

“The state of California must help these 20,000 drivers because, at the end of the day, the clerical errors threatening their livelihoods are of the CA DMV’s own making,” said Munmeeth Kaur, legal director of the Sikh Coalition. “If the court does not issue a stay, we will see a devastating wave of unemployment that harms individual families, as well as the destabilization of supply chains on which we all rely.”

Kaur emphasized that many of the affected drivers have dedicated years to building their careers in trucking, only to face sudden economic hardship through no fault of their own.

The plaintiffs argue that the mass cancellations not only harm immigrant families but also pose a significant risk to supply chains that rely heavily on commercial trucking.

This lawsuit highlights the challenges faced by immigrant workers in the trucking industry and raises questions about the responsibilities of state agencies in ensuring fair treatment and due process.

As the case unfolds, the Sikh Coalition and its co-counsel are advocating for a resolution that would allow affected drivers to retain their licenses and continue their work in the industry.

According to India West, the outcome of this lawsuit could have far-reaching implications for thousands of immigrant truck drivers in California.

Cognizant in Court as FedEx Cuts U.S. Jobs While Hiring H-1B Workers

Cognizant Technology Solutions and a whistleblower are appealing to a U.S. court to reconsider a ruling in a visa fraud case, while FedEx faces scrutiny for cutting American jobs amid increased H-1B hiring.

Cognizant Technology Solutions, alongside a former senior executive who has turned whistleblower, is urging a U.S. appeals court to reconsider a lower court ruling that allows a significant visa fraud case to proceed to trial. This unusual request aims to avert a lengthy and costly legal battle, potentially paving the way for a negotiated settlement.

The case traces back to 2023, when Jean-Claude Franchitti, then an assistant vice president at Cognizant, filed a complaint on behalf of the U.S. government. Franchitti alleged that the IT services giant intentionally misused visa categories to bring employees into the United States at a lower cost than what is mandated under the H-1B program.

According to the complaint, Cognizant utilized L-1 intracompany transfer visas and B-1 business visitor visas for roles typically filled by H-1B skilled workers. This strategy reportedly allowed the company to reduce its visa filing expenses while depriving the U.S. government of the higher filing fees and payroll tax revenue associated with H-1B workers.

In 2024, a New Jersey district court determined that Franchitti’s claims warranted a full trial, describing the alleged actions as a deliberate business strategy to circumvent immigration regulations and minimize payments to the government. Cognizant has contested this assertion, arguing that it cannot be held liable for visa fees related to applications it did not submit.

Both parties are now seeking an interlocutory appeal, which would involve a mid-case review by a higher court to overturn the 2023 ruling, according to reports from Mint.

The financial implications at the core of this case are substantial. Under current regulations, the total cost of filing an H-1B petition can reach several thousand dollars for employers, especially when mandatory U.S. Citizenship and Immigration Services (USCIS) fees are included. This is often significantly higher than the costs associated with L-1 petitions. In contrast, a B-1 business visa typically incurs a modest State Department application fee, generally under $200.

In a separate but related development, FedEx has been making headlines for its hiring practices. Following the acquisition of a federal delivery contract worth over $2 billion in late 2022, the logistics company’s hiring trends have shifted dramatically.

Public records cited by The Dallas Express indicate that FedEx has significantly increased its reliance on foreign workers under the H-1B visa program during this same period. Concurrently, the company has cut hundreds of positions held by American workers across various locations in the United States, revealing a troubling disconnect between federal contracting, domestic job losses, and a growing dependence on temporary foreign labor.

FedEx has responded to these claims, asserting that its hiring decisions are based on business needs and the specific skills required for certain roles. A spokesperson for the company stated that FedEx is committed to employee development and aims to build a workforce that aligns with its operational requirements. “FedEx is committed to offering employees the opportunity to grow and advance in their careers. Doing so helps our team members thrive, and FedEx prosper. Our strategy is centered around recruiting a skilled workforce that meets our unique business needs and hiring the most qualified candidates,” the spokesperson said.

This situation has drawn heightened criticism, particularly in the current political climate under the Trump administration, where many companies have become wary of hiring H-1B workers due to the steep $100,000 fee now associated with the program. Amid this backdrop, FedEx CEO Rajesh Subramaniam, who is of Indian American descent, has faced backlash from critics accusing the company of laying off American workers while increasing its use of foreign labor.

The layoffs at FedEx have continued into 2025. In November, the company announced it would eliminate 856 positions at one of its warehouse facilities. Earlier in the year, FedEx cut 305 jobs in Fort Worth and later disclosed another 131 layoffs across its operations in Garland and Plano.

The unfolding situations at Cognizant and FedEx highlight ongoing tensions in the U.S. labor market, particularly regarding the use of foreign labor amid domestic job cuts. As both cases develop, they will likely continue to attract attention from policymakers and the public alike.

For further details, refer to The Dallas Express.

Data Breach Exposes Personal Information of 400,000 Bank Customers

A significant data breach involving fintech firm Marquis has compromised the personal information of over 400,000 bank customers, with Texas being the most affected state.

A major data breach linked to the U.S. fintech firm Marquis has exposed the sensitive information of more than 400,000 individuals across multiple states. The breach was facilitated by hackers who exploited an unpatched vulnerability in a SonicWall firewall, leading to unauthorized access to consumer data. Texas has been particularly hard hit, with over 354,000 residents affected, and this number may continue to rise as additional notifications are issued.

Marquis serves as a marketing and compliance provider for financial institutions, working with over 700 banks and credit unions nationwide. This role grants the company access to centralized pools of customer data, making it a prime target for cybercriminals.

According to legally mandated disclosures filed in Texas, Maine, Iowa, Massachusetts, and New Hampshire, the hackers accessed a wide array of personal and financial information. The stolen data includes customer names, dates of birth, postal addresses, Social Security numbers, and bank account, debit, and credit card numbers. The breach reportedly dates back to August 14, when the attackers gained access through the SonicWall vulnerability. Marquis later confirmed that the incident was a ransomware attack.

While Marquis has not publicly identified the attackers, the breach has been widely associated with the Akira ransomware gang, known for targeting organizations using SonicWall appliances during large-scale exploitation waves. This incident is not merely a routine credential leak; it poses significant risks to affected individuals.

In a statement to CyberGuy, a spokesperson for Marquis said, “In August, Marquis Marketing Services experienced a data security incident. Upon discovery, we immediately enacted our response protocols and proactively took the affected systems offline to protect our data and our customers’ information. We engaged leading third-party cybersecurity experts to conduct a comprehensive investigation and notified law enforcement.” The spokesperson emphasized that while unauthorized access occurred, there is currently no evidence suggesting that personal information has been used for identity theft or financial fraud.

Ricardo Amper, CEO and Founder of Incode Technologies, a digital identity verification company, highlighted the long-term dangers of identity breaches. Unlike a stolen password, core identity data such as Social Security numbers and birth dates cannot be changed, meaning the risk of misuse can persist for years. “With a typical credential leak, you reset passwords, rotate tokens and move on,” Amper explained. “But core identity data is static. Once exposed, it can circulate on criminal markets for years.” This makes identity breaches particularly hazardous, as criminals can reuse stolen data to open new accounts, create fake identities, or execute targeted scams.

The breach also raises concerns about account takeover and new account fraud. With sufficient personal details, attackers can bypass security checks, reset passwords, and change account information, often in ways that appear legitimate. Synthetic identity fraud is another growing threat, where real data is combined with fabricated details to create new identities that can later be exploited.

Ransomware groups like Akira are increasingly targeting widely deployed infrastructure to maximize their impact. When a firewall is compromised, everything behind it becomes vulnerable. “What we’re seeing with groups like Akira is a focus on maximizing impact by targeting widely used infrastructure,” Amper noted. This strategy exposes a significant blind spot in traditional cybersecurity practices, as many organizations still assume that traffic passing through a firewall is safe.

Identity data does not expire; Social Security numbers and birth dates remain constant throughout a person’s life. Amper emphasized that when such data reaches criminal markets, the associated risks do not diminish quickly. “Fraud rings treat stolen identity data like inventory. They hold it, bundle it, resell it, and combine it with information from new breaches,” he said.

Victims of identity breaches often experience a lasting erosion of trust. Amper pointed out that the psychological toll of knowing that one can no longer trust who is contacting them can be significant. “The most damaging fraud often starts long after the breach is no longer in the news,” he added.

In light of the Marquis breach, experts recommend several protective measures. A credit freeze can prevent criminals from opening new accounts in your name using stolen identity data. This is particularly crucial after a breach where full identity profiles have been exposed. A fraud alert can also be placed to instruct lenders to take extra steps to verify your identity before approving credit.

Additionally, turning on alerts for withdrawals, purchases, login attempts, and password changes across all financial accounts can help catch unauthorized activity early. Regularly checking statements and credit reports is essential, as identity data from breaches can be reused for delayed fraud.

Implementing strong two-factor authentication methods, such as app-based or hardware-backed options, can further enhance security. Biometric authentication tied to physical devices also adds a layer of protection against account takeovers driven by stolen identity data.

As data brokers continue to collect and resell personal information, utilizing a data removal service can help reduce the amount of personal information publicly available, thereby lowering exposure to potential fraud. While no service can guarantee complete removal of data from the internet, these services actively monitor and erase personal information from numerous websites.

In summary, the Marquis data breach underscores the critical need for robust cybersecurity measures, particularly in the financial sector. As the fallout from this incident continues, individuals must remain vigilant in protecting their identities and personal information.

For further information on protecting your identity after a major data breach, you can refer to CyberGuy.

Ex-Harvard Morgue Manager Sentenced to Eight Years for Body Parts Theft

A former Harvard Medical School morgue manager has been sentenced to eight years in federal prison for stealing and selling human body parts donated for medical research, causing emotional distress for affected families.

Cedric Lodge, the former manager of the Harvard Medical School morgue, has been sentenced to eight years in federal prison for orchestrating a scheme that involved the theft and sale of human body parts donated for medical research. Prosecutors described his actions as deeply disturbing and emotionally devastating for families who had entrusted the institution with their loved ones’ remains.

At 58 years old, Lodge received his sentence from U.S. District Judge Matthew Brann in Williamsport, Pennsylvania, on Tuesday. His arrest came in 2023 following a federal investigation that revealed the illicit trafficking of human remains across state lines.

In a sentencing memorandum, federal prosecutors stated, “The defendant caused deep emotional harm to an untold number of family members left to wonder about the mistreatment of their loved ones’ bodies.”

A Betrayal of Trust

Court records indicate that Lodge exploited his position at one of the world’s most prestigious medical institutions to remove body parts from cadavers that had been voluntarily donated for scientific research and education. He transported heads, faces, brains, skin, and hands from the Harvard morgue to his residence in Goffstown, New Hampshire, where he stored and sold them to buyers across multiple states.

In May, Lodge pleaded guilty to transporting stolen goods across state lines, a federal offense that carries a maximum sentence of 10 years. Prosecutors urged the court to impose the full penalty, arguing that the crime “shocks the conscience” and was motivated not by necessity, but by profit and participation in what they described as the disturbing “oddities” market.

Prosecutors emphasized, “This was not a momentary lapse in judgment. It was a sustained, calculated exploitation of human remains for personal gain.”

Family Members Left Devastated

The emotional toll of the case has been profound. Families who donated the bodies of their loved ones—often motivated by altruism and a desire to contribute to medical advancement—are now grappling with the realization that those remains had been desecrated.

Legal experts have noted that this case highlights a significant breach of ethical safeguards in academic institutions. A bioethics scholar familiar with the case stated, “This strikes at the heart of trust between the public and medical research institutions. Body donation is built on dignity and consent. Violations of that trust have long-lasting consequences.”

Wife Also Sentenced

Lodge’s wife, Denise Lodge, was also implicated in the scheme. Prosecutors indicated that she assisted in facilitating the sale of stolen body parts to buyers, including two individuals in Pennsylvania who then resold the remains to others. She was sentenced to one year in prison for her role in the operation.

Defense Seeks Leniency

During sentencing, Lodge’s attorney, Patrick Casey, requested leniency, acknowledging the seriousness of the crimes while emphasizing Lodge’s acceptance of responsibility. He stated, “There is no dispute about the harm his actions have inflicted on both the deceased persons whose bodies he callously degraded and their grieving families.” However, he argued that an eight-year sentence would still represent severe punishment for a man with no prior criminal record.

Judge Brann ultimately imposed a sentence below the maximum sought by prosecutors but emphasized the gravity of the offense and its moral implications.

Harvard’s Response and Legal Fallout

Harvard Medical School has not issued a public comment following Lodge’s sentencing. However, in earlier statements, the institution condemned his actions in strong terms. “What happened was abhorrent and inconsistent with the standards and values that Harvard, our anatomical donors, and their loved ones expect and deserve,” the medical school stated previously.

The legal consequences for Harvard may not end there. In October, a U.S. court ruled that Harvard Medical School can be sued by family members of donors whose bodies were mishandled. Chief Justice Scott L. Kafker described the affair as a “macabre scheme spanning several years.”

Legal analysts suggest that the ruling could open the door to substantial civil liability and renewed scrutiny of oversight mechanisms in medical schools nationwide.

A Broader Ethical Reckoning

This case has reignited debate surrounding regulation and accountability in anatomical donation programs. While such programs are critical to medical education and research, they often operate with limited public visibility.

A former federal prosecutor commented, “This case exposes gaps in oversight that institutions can no longer afford to ignore. Safeguards must be strengthened to ensure that donated bodies are treated with the dignity donors were promised.”

Conclusion

The sentencing of Cedric Lodge marks a significant moment of accountability, but it also raises uncomfortable questions about institutional responsibility, ethical oversight, and the protection of donor trust. For the affected families, the prison sentence may offer a measure of justice, but it cannot undo the emotional damage inflicted by years of betrayal.

As civil lawsuits move forward and institutions reassess internal controls, this case stands as a stark reminder that even the most respected academic establishments are not immune to abuse when trust goes unchecked, according to Global Net News.

Petco Confirms Major Data Breach Affecting Customer Information

Petco has confirmed a significant data breach that exposed sensitive customer information, including Social Security numbers and financial details, due to a software configuration error.

Petco has disclosed a major data breach that has compromised sensitive customer information. The company revealed the breach in state filings after discovering a configuration issue in one of its software applications that inadvertently made certain files accessible online. While the issue has since been corrected, the implications for affected customers are serious.

According to reports filed with the Texas attorney general’s office, the exposed data includes names, Social Security numbers, driver’s license numbers, financial account details, credit or debit card numbers, and dates of birth. Additional filings in California, Massachusetts, and Montana confirm that residents from these states were also affected.

In California, companies are required to report data breaches involving at least 500 state residents. Although Petco did not disclose the exact number of individuals affected, the lack of a specific figure suggests that the total may be higher. For context, Petco reported serving more than 24 million customers in 2022.

Petco has stated that it has sent notifications to individuals whose information was compromised. A sample notice released by the California attorney general explains that a software setting allowed certain files to be accessible online. The company has since removed those files, corrected the configuration error, and implemented additional security measures.

To assist victims in California, Massachusetts, and Montana, Petco is offering free credit and identity theft monitoring services. However, it remains unclear if similar support is available for affected residents in Texas.

A Petco representative provided a statement indicating that the company took immediate action upon identifying the issue. “We recently identified a setting in one of our applications which inadvertently made certain Petco files accessible online. Upon identifying the issue, we took immediate steps to correct the error and began an investigation. We notified individuals whose information was involved and continue to monitor for further issues. We take this incident seriously. To help prevent something like this from happening again, we have taken and will continue to take steps to enhance the security of our network,” the representative said.

The breach has raised concerns about the long-term risks associated with exposing sensitive information such as government IDs, financial numbers, and birth dates. Criminals can use this combination of data to open new accounts, take over existing ones, or attempt to pass identity checks. Even if immediate fraud does not occur, the exposed data can remain in criminal markets for years, posing ongoing risks to affected individuals.

In light of this incident, experts recommend several steps that individuals can take to mitigate their risk and protect their identities moving forward. One effective measure is to freeze credit, which prevents new credit accounts from being opened in one’s name. This can stop criminals from using stolen information to open loans or credit cards. Individuals can freeze their credit for free at major credit bureaus, including Equifax, Experian, and TransUnion.

Additionally, individuals may consider freezing ChexSystems to prevent criminals from opening checking or savings accounts in their names and freezing NCTUE to block fraudulent utility accounts.

Setting up account alerts for banking, credit cards, and online shopping accounts can also help individuals quickly identify suspicious activity. Strong passwords are essential for protecting against credential stuffing attacks, where criminals use stolen passwords from one breach to access other accounts. Utilizing a password manager can help create unique passwords for every account, reducing the risk of such attacks.

Individuals should also check if their email addresses have been exposed in past breaches. Many password managers include built-in breach scanners that can alert users if their information appears in known leaks. If a match is found, it is crucial to change any reused passwords and secure those accounts with new, unique credentials.

If Petco has offered free identity theft monitoring, it is advisable for affected individuals to enroll as soon as possible. These services can help monitor personal information, such as Social Security numbers and email addresses, alerting users if their data is being sold on the dark web or used to open accounts fraudulently. They can also assist in freezing bank and credit card accounts to prevent further unauthorized use.

While no service can guarantee complete removal of personal data from the internet, data removal services can actively monitor and erase personal information from various websites, providing an additional layer of protection against identity theft.

As data breaches continue to occur, this incident underscores the importance of vigilance in protecting personal information. Individuals are encouraged to take proactive measures to reduce their risk of fraud and limit the potential impact of such breaches on their lives. The trust placed in companies to safeguard personal information is a critical issue that continues to resonate with consumers.

For further information on how to protect yourself from identity theft and to stay updated on security measures, visit CyberGuy.com.

Fake Windows Update Delivers Malware in New ClickFix Attack

The ClickFix campaign is a sophisticated cyberattack that disguises malware as legitimate Windows updates, employing steganography to evade security systems and compromise user data.

Cybercriminals are increasingly adept at blending malicious activities into the everyday software users rely on. Over recent years, we have witnessed a rise in phishing pages mimicking banking portals, deceptive browser alerts claiming infections, and “human verification” screens urging users to execute harmful commands. The latest iteration of this trend is the ClickFix campaign, which disguises itself as a Windows update.

Instead of prompting users to verify their humanity, attackers now present a full-screen Windows update screen that closely resembles the genuine article. This tactic is designed to deceive users into following the instructions without a second thought, precisely as the attackers intend.

Researchers have observed that ClickFix has evolved from its earlier methods. Previously reliant on human verification pages, the campaign now employs a convincing update interface that features fake progress bars, familiar update messages, and prompts urging users to complete a critical security update.

For Windows users, the site instructs them to open the Run box and paste a command copied from their clipboard. This command initiates the silent download of a malware dropper, typically an infostealer that pilfers passwords, cookies, and other sensitive data from the infected machine.

Once the command is executed, the infection chain is set in motion. A file named mshta.exe connects to a remote server to retrieve a script. To evade detection, these URLs often utilize hex encoding and frequently change their paths. The script executes obfuscated PowerShell code filled with nonsensical instructions to mislead researchers. Ultimately, this process decrypts a hidden .NET assembly that acts as the loader.

The loader conceals its next stage within what appears to be a standard PNG file. ClickFix employs custom steganography, a technique that embeds secret data within normal-looking content. In this case, the malware is hidden within the pixel data of the image. Attackers manipulate color values in specific pixels, particularly in the red channel, to embed pieces of shellcode. When viewed, the image appears entirely normal.

The script knows the precise location of the concealed data, extracting the pixel values, decrypting them, and reconstructing the malware directly in memory. This method ensures that nothing conspicuous is written to disk, allowing security tools that rely on file scanning to overlook it, as the shellcode never exists as a standalone file.

Once reconstructed, the shellcode is injected into a trusted Windows process, such as explorer.exe. The attack employs familiar in-memory techniques, including VirtualAllocEx, WriteProcessMemory, and CreateRemoteThread. Recent activities associated with ClickFix have delivered infostealers like LummaC2 and updated versions of Rhadamanthys, designed to harvest credentials and transmit them back to the attacker with minimal noise.

To protect against such threats, users are advised to exercise caution and adhere to several preventive measures. If any website instructs you to paste a command into Run, PowerShell, or Terminal, consider it a red flag. Genuine operating system updates never require users to execute commands from a webpage. Executing such commands grants full control to the attacker. If something seems amiss, close the page and refrain from further interaction.

Updates should only originate from the Windows Settings app or through official system notifications. Any browser tab or pop-up purporting to be a Windows update is likely a scam. If you encounter anything outside the standard update process requesting your action, ignore it and verify the real Windows Update page directly.

Choosing a robust security suite capable of detecting both file-based and in-memory threats is essential. Stealthy attacks like ClickFix evade detection by not leaving obvious files for scanners to identify. Tools that incorporate behavioral detection, sandboxing, and script monitoring significantly enhance the chances of identifying unusual activity early.

To safeguard against malicious links that could install malware and potentially compromise personal information, it is crucial to have reliable antivirus software installed on all devices. This protection can also alert users to phishing emails and ransomware scams, ensuring the safety of personal information and digital assets.

Using a password manager can also enhance security by generating strong, unique passwords for every account and autofilling credentials only on legitimate websites, which helps users identify fake login pages. If a password manager refuses to autofill credentials, it is advisable to scrutinize the URL before entering any information manually.

Additionally, users should check if their email addresses have been exposed in past data breaches. Many top password managers feature built-in breach scanners that alert users if their email addresses or passwords have appeared in known leaks. If a match is found, it is crucial to change any reused passwords and secure those accounts with new, unique credentials.

Many attacks begin by targeting emails and personal details already exposed online. Data removal services can assist in reducing your digital footprint by requesting takedowns from data broker sites that collect and sell personal information. While no service can guarantee complete removal of data from the internet, utilizing a data removal service is a prudent choice. These services actively monitor and systematically erase personal information from numerous websites, providing peace of mind and effectively reducing the risk of scammers accessing your details.

When evaluating the legitimacy of a webpage, always inspect the domain name first. If it does not match the official site or contains unusual spelling or extra characters, close the page immediately. Attackers often exploit the fact that users recognize a page’s design but overlook the address bar.

Fake update pages frequently operate in full-screen mode to obscure the browser interface and create the illusion of being part of the operating system. If a site unexpectedly enters full-screen mode, exit using the Esc key or Alt+Tab. Once you have exited, scan your system and refrain from returning to that page.

The ClickFix campaign thrives on user interaction. Nothing occurs unless users follow the on-screen instructions, making the fake Windows update page particularly dangerous as it exploits a trusted process. Cybercriminals understand that users accustomed to Windows updates freezing their screens may not question a prompt that appears during this process. They replicate trusted interfaces to lower users’ defenses and rely on them to execute the final command.

As cyber threats continue to evolve, it is essential for users to remain vigilant and informed. If you have ever copied commands from a website without considering their implications, it may be time to reassess your online habits. For further insights and updates on cybersecurity, visit CyberGuy.com.

Malicious Browser Extensions Compromise 4.3 Million Users Worldwide

Malicious browser extensions have compromised the data of 4.3 million users, collecting sensitive information before being removed by Google and Microsoft.

Malicious Chrome and Edge extensions have been implicated in a significant data breach affecting 4.3 million users, according to a report from Koi Security. These extensions, which initially appeared harmless, evolved into spyware through a long-running malware campaign known as ShadyPanda.

The ShadyPanda operation involved 20 malicious Chrome extensions and 125 extensions on the Microsoft Edge Add-ons store. Many of these extensions first appeared in 2018, presenting no obvious warning signs. Over the years, they underwent silent updates that transformed their functionality, enabling them to collect sensitive user data.

Users who downloaded these extensions unknowingly installed surveillance tools that harvested browsing history, keystrokes, and personal data. The updates were rolled out through each browser’s trusted auto-update system, meaning users did not need to click on anything or fall for phishing attempts; the changes occurred quietly in the background.

Once activated, the malicious extensions injected tracking code into legitimate links, earning revenue from users’ purchases. They hijacked search queries, redirected users, and logged data for sale and manipulation. ShadyPanda gathered a wide range of personal information, including browsing history, search terms, cookies, keystrokes, fingerprint data, local storage, and even mouse movement coordinates.

As these extensions gained credibility in the stores, attackers pushed a backdoor update that allowed for hourly remote code execution. This gave them full control over users’ browsers, enabling them to monitor visited websites and exfiltrate persistent identifiers.

Researchers also found that the extensions could launch adversary-in-the-middle attacks, leading to credential theft, session hijacking, and code injection on any website. Notably, if users opened developer tools, the extensions would switch to a harmless mode to avoid detection.

In response to the findings, Google removed the malicious extensions from the Chrome Web Store. A spokesperson confirmed that none of the identified extensions are currently active on the platform. Similarly, a Microsoft spokesperson stated, “We have removed all the extensions identified as malicious on the Edge Add-on store. When we become aware of instances that violate our policies, we take appropriate action that includes, but is not limited to, the removal of prohibited content or termination of our publishing agreement.”

For users concerned about their installed extensions, it is crucial to verify whether any malicious extension IDs are present. Users can check their installed extensions by following a few simple steps in both Chrome and Edge. If any matches are found, it is recommended to remove those extensions immediately and restart the browser.

In addition to removing suspicious extensions, users should consider taking further steps to protect their data. Resetting passwords can help safeguard against potential misuse, and using a password manager can simplify the process of creating strong, unique passwords for each account.

ShadyPanda’s operation highlights the risks associated with browser extensions, especially those that may seem innocuous at first glance. Users are advised to be vigilant about the permissions requested by extensions and to regularly review their installed extensions for any that appear unfamiliar or behave unusually.

While antivirus software may not have caught this specific threat due to its stealthy operation, it remains essential for blocking other forms of malware and protecting against phishing attempts. Users should ensure they have robust antivirus protection on all devices to safeguard their personal information and digital assets.

As the ShadyPanda campaign demonstrates, even trusted extensions can become dangerous through silent updates. Staying alert to changes in browser behavior and limiting the number of installed extensions can help reduce exposure to such threats.

For further information on the ShadyPanda campaign and to review the full list of affected extensions, users can visit Koi Security’s website. It is essential to remain proactive in monitoring and managing browser extensions to protect personal data from potential breaches.

For more insights on cybersecurity and best practices, visit CyberGuy.com.

HUD Investigates Boston’s DEI Housing Policies for Racial Discrimination

HUD has launched a civil rights investigation into Boston’s housing policies, alleging that the city’s DEI initiatives violate federal anti-discrimination laws.

The U.S. Department of Housing and Urban Development (HUD) announced on Thursday that it is investigating the city of Boston, Massachusetts, over allegations that its Diversity, Equity, and Inclusion (DEI) housing practices violate federal anti-discrimination laws.

HUD claims to have evidence indicating that Boston has utilized federal grant assistance to implement “race-based preferences,” which it argues contravene the Fair Housing Act and Title VI. The agency characterized these initiatives as a “social engineering project.”

“We believe the City of Boston has engaged in a social engineering project that intentionally advances discriminatory housing policies driven by an ideological commitment to DEI rather than merit or need,” HUD Secretary Scott Turner stated in a press release. “HUD is committed to protecting every American’s civil rights and will thoroughly investigate the City’s stated goal of ‘integrating racial equity into every layer of city government.’”

Turner emphasized that this “warped mentality” would be fully scrutinized, asserting that Boston must come into compliance with federal anti-discrimination laws.

The investigation follows a letter sent by HUD to the Mayor’s Office of Housing, in which the agency expressed “reason to believe” that Boston was improperly utilizing its federal grant assistance.

According to HUD, Boston’s Fair Housing Assessment outlines plans to “target homebuyer outreach” specifically at “Black and Latinx families.” The assessment also mandates that city departments collect racial and ethnic data to evaluate their work through a racial equity and social justice framework.

Furthermore, Boston’s Housing Strategy 2025 states that “at least 65%” of homeownership opportunities through city initiatives should be allocated to BIPOC (Black, Indigenous, and people of color) households, as noted by HUD.

“The policy is clear,” the agency remarked. “Financial housing assistance is not just for all low-income persons but instead ‘particularly BIPOC residents.’”

On social media platform X, Turner commented on the investigation, stating that HUD is “Breaking Up Biden’s Boston BIPOC Bash.” He criticized Boston for promoting discriminatory housing policies under the guise of DEI, asserting that this mentality would be exposed and that the city would ultimately comply with federal law.

Earlier this week, Turner also criticized the Biden administration, attributing the current housing market challenges to policies from the former president that he claims have exacerbated illegal immigration and refugee crises.

HUD publishes its “Worst Case Housing Needs Report” biennially, which evaluates the housing market’s condition for low-income Americans and the number of individuals lacking both affordable and adequate housing. Turner indicated that this year’s report contains troubling findings, which he attributes to the immigration policies of the Biden administration.

“The unchecked illegal immigration and open borders policies allowed by the Biden administration continue to put significant strain on housing, pricing out American families,” Turner stated.

As of now, Fox News Digital has reached out to the City of Boston for a comment regarding the investigation.

According to Fox News Digital, the implications of this investigation could have significant consequences for Boston’s housing policies and practices moving forward.

FTC Upholds Ban on Stalkerware Founder Scott Zuckerman

The Federal Trade Commission has upheld a ban on Scott Zuckerman, founder of the consumer spyware company Support King, following a data breach that compromised customer information.

The Federal Trade Commission (FTC) has denied a request from Scott Zuckerman, the founder of the consumer spyware company Support King and its subsidiaries, SpyFone and OneClickMonitor, to lift a ban preventing him from participating in the surveillance industry. This ban was instituted after a significant data breach exposed sensitive personal information of both customers and those being monitored.

In a press release detailing its decision, the FTC stated that Zuckerman failed to demonstrate any changed circumstances that would warrant reconsideration of the Consent Order issued against him. The Commission voted 2-0 to deny Zuckerman’s petition after reviewing 27 comments submitted regarding the matter.

The FTC’s original order, finalized in late 2021, alleged that Zuckerman and Support King, LLC, which operated under the name SpyFone.com, marketed applications that enabled users to secretly track devices without the knowledge of the device owners. The Commission noted that these applications posed risks by requiring users to disable essential security features and by secretly collecting and disseminating data, including photos, text messages, web histories, and location information.

Samuel Levine, the acting director of the FTC’s Bureau of Consumer Protection at the time, criticized the operations of SpyFone, stating, “SpyFone is a brazen brand name for a surveillance business that helped stalkers steal private information. The stalkerware was hidden from device owners, but was fully exposed to hackers who exploited the company’s slipshod security.”

In his petition, Zuckerman argued that the security requirements imposed by the FTC made it increasingly difficult for him to manage his other business ventures due to the associated financial burdens. He noted that Support King is no longer operational and that he is currently focused on running a restaurant and exploring tourism opportunities in Puerto Rico.

The controversy surrounding Zuckerman and his companies escalated in 2018 when a security researcher uncovered an Amazon S3 bucket belonging to SpyFone that had left highly sensitive data exposed online. This breach included personal information such as selfies, text messages, audio recordings, and hashed passwords, affecting over 44,000 unique email addresses and revealing data from approximately 3,666 devices that had the SpyFone stalkerware installed.

In 2022, reports surfaced indicating that Zuckerman might have been involved in another stalkerware operation. TechCrunch obtained a cache of breached data from a stalkerware app named SpyTrac, which appeared to be operated by freelance developers with connections to Support King, suggesting an attempt to circumvent the existing ban.

Eva Galperin, a noted expert on stalkerware, expressed her approval of the FTC’s decision to uphold the ban. She remarked, “Mr. Zuckerman was clearly hoping that if he laid low for a few years, everyone would forget about the reasons why the FTC issued a ban not only against the company, but against him specifically.”

The FTC’s actions underscore its commitment to protecting consumers from invasive surveillance practices and holding accountable those who exploit personal data for profit.

For further information, please refer to The American Bazaar.

Why Scammers Open Bank Accounts in Your Name: Understanding the Risks

Criminals are increasingly using stolen identities to open deposit accounts, posing significant risks to victims and complicating responses to identity theft.

Identity theft is evolving, with criminals now employing more sophisticated methods to exploit stolen personal data. One alarming trend is the application for deposit accounts in victims’ names, a tactic that leaves many individuals confused and unsure of how to respond.

Brian, a resident of Clinton, Pennsylvania, recently faced this unsettling reality. He received notifications from two different banks informing him that someone had attempted to open deposit accounts using his identity. Both banks denied the applications and communicated the denials through email and letter, but neither provided any details about the information submitted or the reasons for the denials.

In his correspondence, Brian expressed his frustration: “I understand why fraudsters try to open credit accounts, but why would they try to open deposit accounts? One bank told me they could not share any information with me about the failed application due to privacy policy, and the other bank said they do not save any information from declined applications from non-customers.” He questioned the lack of transparency from banking institutions regarding declined applications and sought guidance on how to respond to these fraudulent attempts.

Deposit account fraud is on the rise as criminals increasingly build synthetic identities and test stolen data. When thieves apply for checking or savings accounts in a victim’s name, they are essentially experimenting to see which identities pass initial verification steps. This information can be critical for planning more damaging attacks in the future.

Criminals often prefer deposit accounts for several strategic reasons. The approval process for these accounts can be less stringent than that for credit accounts, allowing fraudsters to test stolen data without the same level of scrutiny. Additionally, a new deposit account can serve as a means for laundering funds or receiving payments linked to scams, unemployment fraud, or tax refund theft.

Once criminals confirm that a victim’s identity can be successfully used, they may proceed to open credit lines or create a synthetic profile that combines real and fabricated information. Unfortunately, banks are bound by strict privacy regulations under federal law, which limit the information they can disclose about applications, even when identity theft is involved. For instance, while an IP address could potentially help identify a fraudster, banks typically will not share this information without a legal request tied to an active investigation.

To combat the risks associated with deposit account fraud, individuals can take proactive steps to protect their identities. Traditional credit monitoring services may not cover deposit account activity, so it is advisable to utilize services that monitor bank accounts and dark web activity for added protection. Identity theft protection companies can track personal information, such as Social Security numbers, phone numbers, and email addresses, alerting users if their data is being sold on the dark web or used to open unauthorized accounts.

In Brian’s case, he has already placed a one-year fraud alert with the credit bureaus, but he may want to consider upgrading to a seven-year alert. Additionally, freezing his credit with Equifax, Experian, and TransUnion can prevent new credit lines from being opened in his name.

Another effective measure is to utilize a data removal service, which can help scrub personal details from people search sites that criminals often exploit to build synthetic identities. While no service can guarantee complete removal of personal data from the internet, these companies actively monitor and erase information from numerous websites, significantly reducing the risk of future identity theft.

Individuals should also monitor deposit account activity by requesting reports from services like ChexSystems and Early Warning Services. It is essential to look for unauthorized entries and consider adding security alerts or freezes to these accounts as well.

Even if banks cannot share specific details about fraudulent attempts, it is advisable to request documentation of these incidents to flag future attempts. Victims should remain vigilant for unexpected debit cards, 1099 forms, or bank statements, as these may indicate that criminals have succeeded elsewhere.

In summary, deposit account fraud operates outside traditional credit systems, making it particularly confusing for victims. However, understanding the motivations behind these fraudulent activities and taking swift action can help individuals regain control of their identities and mitigate the risks associated with identity theft.

For further information and tips on protecting yourself from identity theft, visit CyberGuy.com.

Real Apple Support Emails Exploited in Latest Phishing Scam

Scammers are leveraging real Apple Support tickets in a sophisticated phishing scheme, prompting users to take extra precautions to safeguard their accounts.

A new phishing scam has emerged that utilizes authentic Apple Support tickets to deceive users into relinquishing their account information. Eric Moret, a representative from Broadcom, recently shared his harrowing experience of nearly losing his Apple account due to this scheme. He detailed the incident in a comprehensive post on Medium, outlining the steps the scammers took to create a convincing facade.

This particular scam is notable for its use of Apple’s own support system, which the scammers exploited to craft messages that appeared legitimate. From the initial alert to the final phone call, the entire experience felt polished and professional, making it difficult for victims to discern the truth.

Moret first received a barrage of alerts, including two-factor authentication notifications indicating that someone was attempting to access his iCloud account. Almost immediately, he received phone calls from individuals posing as Apple agents, who assured him they were there to help resolve the issue.

The scammers’ strategy was particularly cunning. They took advantage of a vulnerability in Apple’s Support system that allows anyone to generate a genuine support ticket without any verification. By opening a real Apple Support case in Moret’s name, they triggered official emails from an Apple domain, which helped to build trust and lower his defenses.

One of the emails contained a link that directed him to a fraudulent website, appealingapple.com. The site was designed to look official and claimed that his account was being secured. It prompted him to enter a six-digit code that had been sent to his phone to complete the process.

When Moret entered the code, the scammers gained access to his account. Shortly thereafter, he received an alert indicating that his Apple ID had been used to sign into a Mac mini that he did not own. This confirmed his worst fears: a takeover attempt was underway. Despite the scammer’s assurances that this was a normal occurrence, Moret trusted his instincts and reset his password, successfully kicking the intruders out and halting the attack.

This type of scam thrives on its realism. The messages appear official, and the callers sound trained and knowledgeable. However, there are several steps users can take to protect themselves from falling victim to such schemes.

First, individuals should verify any support tickets directly with Apple. Users can log in at appleid.apple.com or use the Apple Support app to check their recent cases. If the case number does not appear there, the message is likely fraudulent, regardless of the email’s origin.

Moreover, it is crucial never to remain on a call that was not initiated by the user. Scammers often rely on prolonged conversations to build trust and pressure victims into making hasty decisions. If something feels off, it is advisable to hang up and contact Apple Support directly at 1-800-275-2273 or through the Support app. A legitimate agent can quickly confirm whether there is an issue.

Users should also monitor the devices linked to their Apple ID. By navigating to Settings, tapping their name, and scrolling to see all associated devices, they can remove any that appear unfamiliar. This action can quickly thwart attackers who may have gained access.

It is important to note that no legitimate support agent will ever request two-factor authentication codes. Any such request should be treated as a significant warning sign.

Additionally, users should scrutinize URLs carefully. Fraudulent websites often incorporate extra words or alter formatting to appear authentic. Apple will never direct users to a site like appealingapple.com.

Employing strong antivirus software can also help identify dangerous links, unsafe sites, and counterfeit support messages before users engage with them. Anti-phishing tools are particularly vital in scenarios like this, where attackers utilize fake sites and real ticket emails to deceive victims.

Furthermore, individuals should consider using data removal services to limit the amount of personal information available online. Scammers often exploit data from brokers to personalize their attacks, making it essential to reduce the information that can be used against you.

While no service can guarantee complete data removal from the internet, a reputable data removal service can significantly mitigate the risks associated with social engineering attempts. By actively monitoring and erasing personal information from various websites, users can enhance their privacy and security.

Maintaining two-factor authentication (2FA) on all major accounts provides an additional layer of protection against unauthorized access. Scammers thrive on creating a sense of urgency; therefore, it is crucial to pause and assess any situation that feels rushed or suspicious. A brief moment of hesitation could safeguard an entire account.

This phishing scam illustrates the lengths to which criminals will go to exploit real systems. Even the most cautious users can find themselves ensnared by messages that seem legitimate and calls that sound professional. The best defense is to remain vigilant, take a moment to verify unexpected communications, and never share verification codes. By adopting these simple practices, individuals can significantly reduce their vulnerability to even the most sophisticated scams.

Source: Original article

What To Do If Your Visitor Insurance Claim Is Denied

Understanding the reasons behind visitor insurance claim denials can help families navigate the appeal process and ensure their loved ones receive necessary medical care while visiting the United States.

Visitor insurance provides essential peace of mind for families hosting loved ones from abroad, particularly parents, elders, and first-time travelers to the United States. However, like any insurance product, claims can sometimes be denied due to various factors, including documentation issues, policy exclusions, or misunderstandings regarding coverage.

When a visitor insurance claim is denied, it can be confusing and stressful for the policyholder. Understanding the reasons for the denial and the subsequent steps can help ease the process and improve the chances of getting the claim approved upon reconsideration.

This article outlines common reasons for claim denials, the steps to take afterward, and answers to frequently asked questions, empowering families to navigate these situations with confidence.

Common Reasons for Visitor Insurance Claim Denials

A denial does not necessarily mean the case is closed. Most denials occur due to issues that can be corrected. Here are some common reasons:

One of the primary reasons for claim denials is related to pre-existing conditions. Visitor insurance typically excludes coverage for pre-existing conditions unless it involves acute onset benefits. If the insurer determines that the condition existed before the policy’s effective date or if it was not classified as an acute onset according to the policy terms, the claim may be denied.

Another frequent cause of denial is insufficient or missing documentation. Claims often require specific documents, such as medical reports, diagnostic tests, itemized bills, and proof of payment. If any required document is incomplete or missing, the claim may be delayed or denied. In such cases, the claims department will communicate with the policyholder to request the missing information.

Policy exclusions can also lead to denied claims. Each visitor insurance plan has its own exclusions, which may include routine check-ups, preventive care, immunizations, maternity care, or ongoing treatments. If the treatment received falls under an exclusion specified in the policy, the claim may not be eligible for coverage.

Errors in the claim form can result in denials as well. Incorrect personal details, travel dates, or medical history can lead to complications in processing the claim. Even minor discrepancies can have significant impacts.

Additionally, if the treatment received is deemed not medically necessary by the insurer, it may not be covered. Insurers often assess whether the care was an emergency or required based on medical necessity.

Finally, late claim filing can result in denial. Many plans stipulate that claims must be filed within a specific time frame, typically ranging from 30 to 90 days. Missing this deadline can lead to a permanent denial of the claim.

Steps to Take If Your Visitor Insurance Claim Is Denied

A denial is not the end of the road. Policyholders can request a review or appeal the decision. Here are steps to follow:

First, carefully read the Explanation of Benefits (EOB) provided by the insurer. The EOB will detail why the claim was denied, what documents were missing, and instructions for the appeal process. Understanding the reason for the denial is crucial for addressing the issue.

Next, contact the insurance company or claims department for clarification. Inquire whether the denial was due to missing paperwork, what additional documents are required, and whether you can resubmit or appeal the claim. Sometimes, a simple correction can resolve the issue.

Gather all required documents to support your appeal. Depending on the situation, this may include updated medical records, itemized bills, proof of a new diagnosis, or physician statements explaining the medical necessity of the treatment. Providing complete and organized documentation significantly enhances the chances of a successful appeal.

If you disagree with the denial, file a formal appeal. Submit a written appeal along with supporting evidence and a letter from the treating physician. Most insurers offer multiple levels of review for appeals.

It is also important to keep copies of all documentation related to the claim, including emails, forms, receipts, and medical reports. This helps track the claim’s progress and supports follow-up communication.

Lastly, be mindful of deadlines. Appeals typically have strict timelines, and submitting your appeal on time increases the likelihood of success.

Preventing Future Claim Denials

To avoid denied claims in the future, consider the following proactive steps:

Purchase the insurance plan before traveling to ensure coverage starts prior to arrival in the U.S. Delaying the purchase can increase the risk of issues being classified as pre-existing conditions.

Understand the specifics of your plan, including coverage limits, exclusions, deductibles, and coinsurance. Always review the Certificate Wordings of the policy for complete clarity.

Keep all medical bills and reports, as even small urgent-care visits require proper documentation.

File claims early to reduce the chance of missing deadlines.

Frequently Asked Questions (FAQs)

Can a denied visitor insurance claim be appealed? Yes, most insurers have a multi-step appeal process. If you provide the required documents or clarify the medical necessity, claims may be approved upon reconsideration.

How long does the appeal process take? Typically, it takes 30 to 60 days, depending on the insurer and the speed at which you submit supporting documents.

What if I do not have all the medical documents? You can request them from hospitals, clinics, urgent care centers, or doctors. U.S. medical providers are required to furnish medical records upon request, and insurance companies may ask for records from up to five years prior to the claim.

Will the insurer pay directly to the hospital after an appeal? This depends on whether the provider is in-network, the plan’s direct billing options, and the claim type. In many cases, reimbursement is issued directly to the policyholder.

What is my responsibility during a claim? You must submit accurate information, provide complete documentation, and respond promptly to insurer queries to help expedite the review process.

Can visitor insurance claims be denied due to age? Age itself does not cause denial, but older travelers may face higher premiums, more exclusions, and stricter rules related to pre-existing conditions.

What happens if I miss the claim filing deadline? Unfortunately, late claims are often permanently denied. Always submit your claims early to avoid this issue.

In conclusion, a denied visitor insurance claim can be a stressful experience, especially when it involves elderly parents or family members visiting the U.S. However, in most cases, denials are fixable with the right documentation, timely submission, and a clear appeal process. Being proactive—understanding your policy, keeping detailed records, and filing claims early—can help avoid issues and ensure your loved ones receive the necessary care without financial stress.

For families planning travel in the coming months, carefully reviewing policy benefits and choosing a reputable provider can make a significant difference.

Source: Original article

Bondi Pursues Legal Action Against Comey and James for Unlawful Conduct

U.S. Attorney General Pam Bondi announced plans for legal action against James Comey and Letitia James following the dismissal of their criminal cases by a federal judge.

U.S. Attorney General Pam Bondi has called for legal action against former FBI Director James Comey and New York Attorney General Letitia James. Her remarks came during an event in Memphis, where she was highlighting the efforts of the city’s “Safe Task Force.”

Bondi’s comments followed a ruling by U.S. District Judge Cameron Currie, who dismissed the criminal indictments against both Comey and James. The judge determined that the prosecutor responsible for the cases, Lindsey Halligan, had not been lawfully appointed. This ruling aligned with Comey’s defense, which argued that Halligan’s appointment as interim U.S. Attorney for the Eastern District of Virginia was invalid, thereby rendering the indictments defective.

“We’ll be taking all available legal action, including an immediate appeal, to hold Letitia James and James Comey accountable for their unlawful conduct,” Bondi stated to reporters. “I’m not worried about someone who has been charged with a very serious crime,” she continued, referring to Comey. “His alleged actions were a betrayal of public trust,” Bondi added.

Comey was indicted in September 2025 on charges of making false statements to Congress and obstructing a congressional inquiry. These charges stemmed from his testimony in 2018 regarding the origins of the FBI’s Crossfire Hurricane investigation, which looked into potential ties between the 2016 Trump campaign and Russia.

In response to the indictment, Comey has denied any wrongdoing, asserting that his statements were “truthful to the best of my recollection” and labeling the case as “a political hit job, not a pursuit of justice.”

Letitia James faced separate legal troubles, having been indicted in October 2025 on charges related to mortgage and bank fraud. She is accused of misrepresenting a Virginia home purchase as a secondary residence in 2020 to secure more favorable loan terms, allegedly benefiting by nearly $19,000 over the life of the loan.

Defense teams for both Comey and James have argued that the prosecutions were flawed, citing procedural irregularities and questioning Halligan’s appointment. Halligan, who previously served as a legal aide under former President Trump, was the sole federal prosecutor to sign Comey’s indictment, acting as the U.S. Attorney for the Eastern District of Virginia.

During her remarks in Memphis, Bondi defended Halligan’s credentials and her role in the case. “We have made Lindsay Halligan a special U.S. attorney so she is in court, she can fight in court just like she was, and we believe we will be successful on appeal,” Bondi stated. “And I’ll tell you, Lindsay Halligan, I talked to all of our U.S. attorneys, the majority of them around the country, and Lindsay Halligan is an excellent U.S. attorney. And shame on them for not wanting her in office,” she concluded.

Source: Original article

DoorDash Data Breach Exposes Personal Information of Customers and Workers

DoorDash has confirmed a data breach that exposed personal information of customers, delivery workers, and merchants, raising concerns about potential scams and identity theft.

DoorDash has confirmed a significant data breach that has compromised the personal information of customers, delivery workers, and merchants. The breach, attributed to a social engineering attack, has raised alarms about the potential for scams targeting affected individuals.

The exposed information includes names, email addresses, phone numbers, and physical addresses. While DoorDash has stated that there is no evidence of fraud linked to the breach at this time, the incident underscores the risks associated with data security in the digital age.

According to DoorDash, the breach occurred when an employee fell victim to a social engineering scheme, granting hackers unauthorized access to the company’s systems. Once the breach was detected, DoorDash promptly shut down access, initiated an investigation, and notified law enforcement. The company also reached out directly to users whose information may have been compromised.

A representative from DoorDash provided a statement detailing the breach: “DoorDash recently identified and shut down a cybersecurity incident in which an unauthorized third party gained access to and took basic contact information for some users whose data is maintained by DoorDash. No sensitive information, such as Social Security numbers or other government-issued identification numbers, driver’s license information, or bank or payment card information, was accessed. The information accessed varied by individual and was limited to names, phone numbers, email addresses, and physical addresses. We have deployed enhanced security measures, implemented additional employee training, and engaged an external cybersecurity firm to support our ongoing investigation. For more information, please visit our Help Center.”

Despite the company’s assurances that sensitive financial information remains secure, the exposure of contact details poses a risk for scams. Users who received an alert from DoorDash are advised to take immediate steps to protect their information. However, even those who did not receive a notice should remain vigilant, as exposed contact information can lead to scams long after a breach has occurred.

Scammers often act quickly following a data breach, sending fake alerts that appear to be legitimate communications from DoorDash. These emails or texts may request users to verify their accounts or update payment details. It is crucial to delete any messages that ask for personal information or prompt users to click on links. When in doubt, users should access their accounts directly through the official app rather than responding to suspicious messages.

To further safeguard personal information, individuals may consider using a data removal service. Such services work to remove personal details from data broker sites, reducing exposure and making it more difficult for criminals to target users. While no service can guarantee complete data removal from the internet, utilizing a data removal service can be an effective long-term strategy for protecting privacy.

In addition to data removal services, users should adopt stronger password practices. Creating unique passwords for each account is essential to prevent a single breach from compromising multiple accounts. Password managers can simplify this process by generating secure passwords and storing them safely.

Checking whether an email address has been involved in past breaches is also advisable. Many password managers now include built-in breach scanners that alert users if their information has appeared in known leaks. If a match is found, it is crucial to change any reused passwords and secure those accounts with new, unique credentials.

Implementing multi-factor authentication (MFA) adds an additional layer of security by requiring users to confirm logins with a code or app prompt. This measure helps protect accounts even if someone learns a user’s password. Most major applications allow users to enable MFA in the security settings.

Moreover, installing robust antivirus software can protect devices from malicious links and downloads. Such software scans files in real time and alerts users to potential threats, providing an extra layer of defense against phishing attempts that could compromise personal information.

Users should regularly check their DoorDash accounts for any unusual activity, including reviewing order history, saved addresses, and payment methods. If anything appears suspicious, it is advisable to update passwords and contact DoorDash support immediately. Taking swift action can prevent minor issues from escalating into more significant problems.

This breach serves as a reminder of how quickly cybercriminals can exploit a single mistake. While DoorDash acted swiftly to mitigate the damage, the exposure of contact information still poses risks. Remaining alert and practicing basic security habits can help users avoid potential scams and protect their personal information.

What concerns you most about companies holding your personal information, and how would you like them to handle incidents like this? Share your thoughts with us at Cyberguy.com.

Source: Original article

Federal Judge Permits Texas AG to Challenge Harris County Bail Reforms

Texas Attorney General Ken Paxton has received court approval to challenge Harris County’s bail reforms, asserting that the policies compromise public safety.

Texas Attorney General Ken Paxton has secured a significant legal victory, as a federal judge has permitted him to intervene in a lawsuit concerning the 2019 Harris County misdemeanor bail reform consent decree.

In a statement released on Wednesday, Paxton emphasized the importance of a justice system that prioritizes the punishment of offenders and the protection of innocent citizens. He criticized what he described as the influence of “leftist judicial activists” and “liberal anti-prison organizations” that he claims have contributed to a less safe Texas by facilitating the release of criminals back onto the streets.

“I will do everything in my power to reverse this disastrous policy and uphold the law,” Paxton stated, underscoring his commitment to addressing the bail reform measures that he believes are detrimental to public safety.

The O’Donnell Consent Decree originated from a 2016 class-action lawsuit that contended Harris County’s previous bail practices were unconstitutional. The lawsuit argued that individuals charged with misdemeanors were being detained solely due to their inability to pay cash bail.

A judge approved the consent decree in 2019, which effectively eliminated most cash bail for misdemeanor offenses. It mandated the release of individuals on unsecured bonds and established an independent monitor to ensure compliance with the new regulations.

With the recent ruling, Paxton’s office is now positioned to seek the termination of the consent decree. They argue that the decree not only contravenes Texas law but also poses a threat to public safety.

According to Paxton’s office, the consent decree has allowed “radical judges” to release criminals more easily into Harris County communities. They further contend that liberal activists have attempted to broaden the decree’s application, despite existing state laws that enforce stricter bail standards.

“General Paxton seeks to vacate the decree and ensure that the rights of Harris County citizens are represented in court,” the statement from his office concluded.

This legal battle highlights the ongoing tensions surrounding bail reform in Texas, as advocates for reform argue for a more equitable system, while opponents like Paxton assert that such reforms compromise public safety.

As the case progresses, it will likely draw attention from various stakeholders, including law enforcement, civil rights advocates, and the general public, all of whom are invested in the implications of bail reform on community safety and justice.

Source: Original article

Hyundai AutoEver America Data Breach: Understanding Potential Risks

Hyundai AutoEver America has reported a data breach affecting 2,000 employees, exposing sensitive personal information, including Social Security numbers and driver’s license details.

Hyundai AutoEver America (HAEA) has confirmed a data breach that has impacted approximately 2,000 current and former employees. The breach, which exposed sensitive information such as names, Social Security numbers, and driver’s license details, was discovered on March 1, 2025. Investigators traced the intrusion back to February 22, with the breach continuing until March 2.

HAEA, which provides IT services for Hyundai Motor America, supports employee operations and certain connected-vehicle technologies. While the breach involved employment-related data, the company clarified that no customer or driver data was compromised. According to a statement provided to CyberGuy, the breach was limited to information associated with Hyundai AutoEver America and Hyundai Motor America.

The company notified affected employees in late October and has since alerted law enforcement. Additionally, HAEA has engaged external cybersecurity experts to assess the situation and mitigate any potential damage.

The exposed data is particularly concerning because it includes Social Security numbers, which are difficult to change. Experts warn that such information can lead to long-term identity theft and financial fraud. Criminals can exploit these details to create fake identities, open fraudulent accounts, and conduct targeted phishing attacks long after the breach has occurred.

Hyundai AutoEver America manages select IT systems related to Hyundai Motor America’s employee operations, as well as broader technology functions for Hyundai and Genesis across North America. The company emphasized that the breach primarily affected employment-related data and did not involve customer information or the millions of connected vehicles it supports.

Earlier reports mistakenly suggested that 2.7 million individuals were affected by the breach. However, Hyundai clarified that this figure is unrelated to the security incident. Instead, it represents the estimated number of connected vehicles supported by Hyundai AutoEver America across North America. None of this consumer or vehicle data was accessed during the breach.

In a statement to CyberGuy, a representative from HAEA said, “Hyundai AutoEver America, an IT vendor that manages certain Hyundai Motor America employee data systems, experienced an incident to that area of business that impacted employment-related data and primarily affected current and former employees of Hyundai AutoEver America and Hyundai Motor America. Approximately 2,000 primarily current and former employees were notified of the incident. The 2.7 million figure that is cited in many media articles has no relation to the actual security incident. No Hyundai consumer data was exposed, and no Hyundai Motor America customer information or Bluelink driver data was compromised.”

This incident serves as a reminder of the importance of safeguarding personal information. Individuals, whether directly affected or not, should take proactive steps to protect their data and reduce the risk of identity theft or scams.

To enhance security, individuals are advised to contact major credit bureaus—Experian, TransUnion, and Equifax—to set up a fraud alert or freeze. This can help block new accounts from being opened in their name. Additionally, those using apps linked to their vehicles should update passwords and enable multi-factor authentication. Avoiding the storage of login details in unsecured locations is also recommended, and using a password manager can help generate and securely store complex passwords.

It is also wise to check if personal email addresses have been exposed in past breaches. Certain password managers include built-in breach scanners that can alert users if their information has appeared in known leaks. If a match is found, changing reused passwords and securing those accounts with new credentials is crucial.

Scammers may attempt to exploit the Hyundai AutoEver America breach by posing as customer support representatives from Hyundai, Kia, or Genesis. They may claim to assist in verifying accounts, updating information, or fixing security issues. Individuals are advised not to share personal details or click on links in unsolicited messages. Instead, they should navigate to the brand’s official website directly to confirm any requests.

Using strong antivirus software can help block phishing links, malware downloads, and fraudulent websites that may emerge following a data breach. Such software can also scan devices for hidden threats that could compromise personal information.

For those concerned about their personal data being available online, data removal tools can help find and delete personal information from people-search and data-broker sites. While no service can guarantee complete removal of data from the internet, these tools can significantly reduce the chances of being targeted by scammers.

Identity monitoring services can also be beneficial, as they track personal information and alert users to potential misuse. These services can monitor Social Security numbers, phone numbers, and email addresses, notifying users if their information is being sold on the dark web or used to open accounts fraudulently.

Regularly installing security updates on devices, including smartphones, laptops, and smart car systems, can help reduce the risk of future attacks. If unusual account activity, fraudulent charges, or suspicious messages related to this breach are detected, individuals should report them immediately. This includes contacting banks or credit card providers to freeze or dispute unauthorized transactions and filing a report with the Federal Trade Commission (FTC) at IdentityTheft.gov.

This incident highlights the interconnectedness of personal data and modern vehicles, underscoring the importance of protecting sensitive information. Staying vigilant, utilizing available tools, and promptly reporting suspicious activity are essential steps in safeguarding personal data.

Source: Original article

Lawmakers Push for End to H-1B Visas Amid Concerns

A growing number of lawmakers are advocating for the termination of the H-1B visa program, citing concerns over its impact on American workers and the job market.

The backlash against the H-1B visa program is gaining momentum, particularly among Republican lawmakers. Recent political statements, stricter enforcement measures, and rising online hostility are reshaping the environment for H-1B visa holders.

On Thursday, Representative Marjorie Taylor Greene, a Republican from Georgia, introduced a bill aimed at abolishing the H-1B program. In her social media announcement, she stated, “I am introducing a bill to end the mass replacement of American workers by aggressively phasing out the H-1B program. Big Tech, AI giants, hospitals, and industries across the board have abused the H-1B system to cut out our own people.”

Greene emphasized her commitment to prioritizing American workers, asserting, “My bill eliminates the corrupt H-1B program and puts Americans First again in tech, healthcare, engineering, manufacturing, and every industry that keeps this country running! If we want the next generation to have the American Dream, we must stop replacing them and start investing in them.”

Adding to the chorus of criticism, Oklahoma State Senator Dusty Deevers, who has been in office since 2023, took to X (formerly Twitter) to express his opposition. In a video, he declared, “Oklahomans, it’s time to end the H-1B visa scam. Companies exploit it to skip American workers for cheap, captive foreign labor. Congress must abolish it, but Oklahoma can lead like Florida: Ban H-1B for state jobs.”

The post garnered a wide range of reactions online. While some supporters of the H-1B program acknowledged the need for reform, they cautioned that outright abolition could have detrimental effects on the U.S. economy. One user responded to Deevers’ video, stating, “H-1B visas need reforms — that’s 100% true. But if you abolish them, most companies will offshore tech jobs overseas. America will lose by abolishing H-1B visas, not because it lacks an understanding of what needs to be reformed to address some core issues.”

On the same day, Representative Andy Ogles, who represents Tennessee’s 5th Congressional District, also voiced his opposition to the H-1B program, stating, “No more H-1Bs is a no-brainer. Let’s get it done.”

As political rhetoric continues to shift public perception of H-1B visa holders, new policies and agency actions are tightening regulations around the program in unprecedented ways. Immigration attorney Poonam Gupta of Summit Legal PLLC noted, “The H-1B crackdown is quietly shifting the U.S. job market. A new policy push by the U.S. Department of Labor (DOL), dubbed Project Firewall, is marking a turning point in how high-skill employment visa programs are enforced. For employers and visa candidates alike, the ripple effects are already showing.”

Gupta explained that Project Firewall empowers the DOL to initiate investigations into the H-1B visa program without requiring a worker complaint. “Penalties for violations can include up to $51,500 per violation, multi-year bans on sponsoring H-1Bs, and recovery of back wages. Firms that rely heavily on foreign-skill hiring, especially in IT outsourcing and staffing models, are under the most scrutiny,” she added.

Last week, Representative Chip Roy, a Republican from Texas, announced plans to introduce legislation known as the Pause Act, which would freeze all immigration, including the H-1B program. “I’ve got a bill that I’m going to be introducing that is a freeze on all immigration,” he said. “Freeze it until we achieve certain objectives — reforming chain migration, ending H-1B visas, getting birthright citizenship dealt with, and vetting people for their adherence to Sharia law.”

In a related development, the Young Republicans of Texas, an official youth auxiliary of the Texas GOP, issued a statement declaring that they would not endorse any candidate seeking national office unless that candidate supported ending the H-1B visa program.

While the rhetoric against the H-1B program intensifies, President Trump’s recent comments have raised eyebrows among some far-right supporters. In an interview with Fox News anchor Laura Ingraham, Trump suggested that the United States lacks enough domestic talent to fill certain specialized jobs, a stance that contradicts the calls from some in his base to abolish the visa program entirely.

The ongoing debate surrounding the H-1B visa program highlights a significant shift in political attitudes and policies, with potential implications for the future of high-skill employment in the United States.

Source: Original article

South Asian Bar Association of Orange County Holds Board Installation Ceremony

The South Asian Bar Association of Orange County officially launched on November 4, marking a significant milestone for South Asian legal professionals in the region.

IRVINE, CA – A gathering of over a hundred attorneys, judges, law students, and community leaders took place at The Boardwalk on November 4 to celebrate the official launch of the South Asian Bar Association of Orange County (SABA-OC) and the installation of its inaugural Board of Directors.

This evening reception, hosted by Rutan & Tucker LLP, marked SABA-OC’s entry as the newest and 32nd chapter of the South Asian Bar Association of North America (SABA-NA). This national network represents thousands of South Asian legal professionals across the continent.

In its launch announcement, SABA-OC expressed its commitment to serving as a hub for connection, mentorship, advocacy, and professional growth for attorneys, law students, judges, and legal professionals of South Asian descent. “Whether you’re a seasoned practitioner, a new lawyer finding your path, or a student exploring the profession, we are here to celebrate your journey, create space for your voice, and amplify your impact,” the organization stated.

SABA-OC also acknowledged the South Asian Bar Association of Southern California (SABA-SC) for its decades of leadership and representation. “We are deeply indebted to SABA-SC for representing our community and, with their support, have the resources necessary to launch an independent South Asian legal bar organization serving Orange County exclusively,” organizers shared. They expressed enthusiasm for building stronger relationships with neighboring chapters in Los Angeles and San Diego as they establish their independent presence.

The program featured remarks from several respected legal leaders in the region. Hon. Shashi Kewalramani, a mediator and arbitrator with JAMS and a retired U.S. Magistrate Judge for the Central District of California, praised the chapter’s formation and emphasized the importance of ongoing engagement. “Forming SABA-OC is a tremendous first step. The next challenge is to stay relevant. I call upon big law firm partners, general counsel, and judicial officers to actively support this organization and ensure it thrives long after tonight,” he stated.

Mei Tsang, President of the Orange County Bar Association and an intellectual property lawyer at Umberg Zipser, reflected on her own immigrant journey and the significance of community. “Community is what shapes careers and gives life meaning,” Tsang said, extending a warm welcome to SABA-OC as part of the OCBA family.

Navneet S. Chugh, an attorney and CPA who is the founding president of SABA National, inspired attendees with his vision for global excellence. “Orange County is smart, wealthy, successful, educated, spacious yet intimate — paradise perfected,” Chugh remarked. “There’s no reason SABA-OC can’t become the number one Indian Bar Association in the world. Let’s dream big and then even bigger.”

Hon. Vibhav Mittal, the first South Asian judge on the Orange County Superior Court, presided over the installation of the inaugural Board of Directors. He shared a heartfelt story about family, connection, and the strength of community.

The newly installed Board of Directors includes Janani S. Rana as President, Fred Thiagarajah as Vice President, Simon Khinda as Secretary, Jehan Jayakumar as Treasurer, and Directors Amanat Singh, Yatika Chaudhri, Sabina Chopra, Ashley Daniel, Aditi Murillo, Cameron Patel, Rajal Patel, Swati Paul Khetani, Taline Ratanjee, Anand Sambhwani, Ricky Shah, Shaheen Sheik-Sadhal, and Akhil Sheth.

“This is a momentous day for the South Asian legal community in Orange County,” said Janani S. Rana, a partner at Minyard Morris and SABA-OC’s first President. “Our board represents a new generation of leadership committed to service, professionalism, and inclusion.”

Fred Thiagarajah, a prominent criminal defense attorney and longtime advocate for diversity in law, added, “SABA-OC will not only elevate South Asian lawyers in Orange County but also build bridges across all communities.” Thiagarajah will serve as the chapter’s first Vice President.

For more information or to become a member, visit www.sabaoc.org.

Source: Original article

Google Files Lawsuit Against China-Based Lighthouse Group for Online Scam

Google has filed a lawsuit against a China-based criminal organization known as “Lighthouse,” alleging it operates a sophisticated online scam network targeting victims globally.

Google has taken decisive action against online scammers by filing a lawsuit in the U.S. District Court for the Southern District of New York. The lawsuit targets a sprawling criminal organization based in China, referred to as “Lighthouse,” which allegedly provides software and support to fraudsters engaged in various cybercrimes.

The Lighthouse operation is characterized as a large-scale, organized cybercrime network that reportedly operates on a global scale. According to the lawsuit, Lighthouse offers a phishing toolkit that enables extensive SMS, RCS, and iMessage campaigns, equipping its customers with ready-made templates designed for mass fraud.

While the identities and locations of the defendants remain largely unknown, the case highlights the increasing sophistication of cybercrime in 2025. This operation exemplifies a blend of automation, social engineering, and global distribution, raising concerns about the evolving landscape of online fraud. Legal proceedings are currently ongoing, and the final outcomes, including potential convictions or restitution, are yet to be determined.

The lawsuit alleges that the Lighthouse network operates a “Phishing-as-a-Service” (PhaaS) model, selling a software kit that includes hundreds of fake website templates aimed at would-be scammers. Google’s complaint indicates that nearly 200 of these templates have been designed to mimic legitimate U.S.-based sites, including the official website of New York City, the U.S. Postal Service, and the West Virginia Department of Motor Vehicles.

PhaaS is a criminal business model where cybercriminals provide tools, templates, and infrastructure to facilitate phishing attacks, even for those lacking technical expertise. Subscribers gain access to pre-made fake websites, email or SMS templates, and automated systems designed to steal login credentials, banking information, or personal data.

Some PhaaS platforms also offer ongoing support, updates to evade security filters, and various profit-sharing or subscription models. By industrializing phishing, PhaaS significantly lowers the barrier to entry, enabling large-scale, organized scams that can target millions of victims worldwide.

The Lighthouse network has allegedly targeted victims in over 120 countries, swindling millions of dollars annually. Screenshots included in the complaint reveal that the network has misused logos from several well-known payment, credit card, and social media companies to enhance the credibility of its fraudulent schemes.

Interestingly, Google does not know the actual identities of the individuals it is suing. The lawsuit refers to the defendants as “Does 1-25,” a legal strategy that allows the case to proceed without named defendants. This approach is common when the actual perpetrators are unknown, enabling legal action to commence while investigators work to uncover the identities of the alleged criminals.

Through the discovery process, Google can request records from third parties, including domain registrars, hosting providers, and messaging platforms, to trace IP addresses, account activity, and other evidence that may lead to the identification of those behind the Lighthouse operation.

Courts typically allow this method if the plaintiff demonstrates that the unknown defendants have caused harm and that their identities are likely discoverable. In cases of cybercrime like phishing-as-a-service, where operators often utilize pseudonyms, encrypted communications, and offshore infrastructure, the use of John Doe designations enables legal action to begin without waiting for the perpetrators to be identified. This expedites efforts to disrupt the criminal operation.

Halimah DeLaine Prado, Google’s general counsel, noted that over 100 of the templates used to create fake websites have included the company’s logos in areas where users are directed to sign in or make payments, thereby creating a false sense of legitimacy. “We are a global company. This hits all of our users,” she stated. “We’re concerned about the damage to user trust and not knowing what websites are safe.”

DeLaine Prado refrained from providing a specific dollar figure regarding the damage to Google, describing it as “a bit immeasurable.” However, she emphasized the extensive reach of the organization, highlighting that Lighthouse’s operations encompass fake websites, email and SMS campaigns, and automated systems that impersonate trusted organizations, including U.S.-based entities like the Postal Service, New York City government, and the DMV, as well as banks, payment platforms, and social media companies.

The scale and automation of the Lighthouse network—comprising tens of thousands of fraudulent websites and campaigns—illustrate the industrialization of phishing, allowing organized criminals to efficiently reach millions of potential victims. Legal actions, such as Google’s 2025 lawsuit, aim to disrupt the Lighthouse operation, although many of the individuals behind it remain unidentified.

Source: Original article

Legal Groups Seek Emergency Motion to Halt ICE Detention of Immigrant Teens

Advocacy groups have filed an emergency motion to enforce a court ruling that prohibits ICE from detaining immigrant teens in adult facilities, highlighting the need for safer alternatives.

Washington, D.C. — The American Immigration Council and the National Immigrant Justice Center (NIJC) have filed an emergency motion aimed at enforcing a 2021 court ruling from the Garcia Ramirez v. ICE case. This ruling prevents the U.S. Immigration and Customs Enforcement (ICE) from unlawfully detaining unaccompanied immigrant children in adult detention centers once they reach the age of 18.

The motion was filed after reports surfaced indicating that ICE had resumed transferring immigrant children who entered the United States alone into adult detention facilities upon their 18th birthday, a practice that violates the permanent injunction established in the Garcia Ramirez case.

“The permanent injunction made clear that ICE cannot automatically transfer young people to adult detention centers simply because they have turned 18,” stated Michelle Lapointe, legal director at the American Immigration Council. “Locking up these young people in ICE jails rife with overcrowding and hazardous conditions, and far from their support systems, does nothing to make our communities safer; it only inflicts more harm on vulnerable youth.”

When children under 18 enter the United States unaccompanied, they are typically placed in shelters operated by the Office of Refugee Resettlement (ORR). These children are generally released to family members or other vetted sponsors in the U.S., rather than being sent to ICE detention centers. This approach acknowledges that children require care and support, not punitive measures.

According to the Garcia Ramirez ruling, which resulted from extensive litigation by the NIJC and the Council, ICE must consider placing these youths in the least restrictive settings, such as alternative-to-detention programs, rather than resorting to immigration detention.

“ICE’s attempt to expand the detention of immigrant youth is a direct violation of the courts, which explicitly requires the agency to consider safe, less restrictive alternatives to detention,” remarked Mark Fleming, associate director of litigation at the National Immigrant Justice Center. “We will not allow the government to turn back the clock and return to a practice that the courts have already found unlawful.”

The number of individuals in immigration detention has reached unprecedented levels, leading to overcrowding and abusive conditions. Critics argue that the previous administration weaponized the threat of prolonged confinement in these dangerous facilities to coerce individuals into relinquishing their legal rights and accepting deportation. This pressure is further exacerbated by new policies, including a program that offers financial incentives to unaccompanied youths who agree to leave the country.

“The law is clear: ICE must use safe, less restrictive alternatives, not default to jailing young people indefinitely,” emphasized Marie Silver, managing attorney for NIJC’s Immigrant Children’s Protection Project. “These kids came here seeking safety and hope. They deserve a chance to be free, reunite with family and community members, attend school, and work with their lawyers to have their day in court. Trapping them in dangerous and degrading conditions in immigration detention only compounds their trauma in a cruel and unnecessary way.”

The court has granted the emergency motion, reinforcing the need for compliance with the established legal framework regarding the treatment of unaccompanied immigrant minors.

Source: Original article

Over 3,000 YouTube Videos Distribute Malware Masquerading as Free Software

YouTube’s Ghost Network is distributing information-stealing malware through over 3,000 fake videos that promise free software, exploiting compromised accounts and deceptive engagement tactics.

YouTube has long been a go-to platform for entertainment, education, and tutorials, offering a video for nearly every interest. However, recent research from Check Point has unveiled a troubling aspect of the platform: a vast malware distribution network operating under the radar. This network, dubbed the Ghost Network, is using compromised accounts, fake engagement, and social engineering to spread information-stealing malware disguised as software cracks and game hacks.

Many victims fall prey to this scheme while searching for free or cracked software, cheat tools, or game hacks. This quest for “free” software serves as the entry point for the Ghost Network’s malicious traps.

According to Check Point Research, the Ghost Network has been active since 2021, with its operations surging threefold in 2025. The network employs a straightforward yet effective strategy that combines social manipulation with technical stealth. Its primary targets include individuals searching for “Game Hacks/Cheats” and “Software Cracks/Piracy.”

Researchers found that the videos associated with this network often feature positive comments, likes, and community posts from compromised or fake accounts. This orchestrated engagement creates a false sense of security for potential victims, leading them to believe the content is legitimate and widely trusted. Even when YouTube removes specific videos or channels, the network’s modular structure and the rapid replacement of banned accounts allow it to persist.

Once a user clicks on the provided links, they are typically directed to file-sharing services or phishing sites hosted on platforms like Google Sites, MediaFire, or Dropbox. The linked files are frequently password-protected archives, complicating antivirus scans. Victims are often prompted to disable Windows Defender before installation, effectively disarming their own protection before executing the malware.

Check Point’s investigation identified that the majority of these attacks deliver information-stealing malware such as Lumma Stealer, Rhadamanthys, StealC, and RedLine. These malicious programs are designed to harvest passwords, browser data, and other sensitive information, which is then sent back to the attackers’ command and control servers.

The resilience of the Ghost Network can be attributed to its role-based structure. Each compromised YouTube account serves a specific function: some upload malicious videos, others post download links, and a third group enhances credibility by engaging with the content through comments and likes. When an account is banned, it is quickly replaced, allowing the operation to continue largely uninterrupted.

Two significant campaigns were highlighted in Check Point’s findings. The first involved the Rhadamanthys infostealer, disseminated through a compromised YouTube channel named @Sound_Writer, which boasted nearly 10,000 subscribers. Attackers uploaded fake cryptocurrency-related videos and utilized phishing pages on Google Sites to distribute malicious archives. These pages instructed viewers to “turn off Windows Defender temporarily,” assuring them that any alerts were false. The archives contained executable files that silently installed the Rhadamanthys malware, which then connected to multiple control servers to exfiltrate stolen data.

The second campaign leveraged a larger channel, @Afonesio1, which had approximately 129,000 subscribers. Attackers uploaded videos claiming to offer cracked versions of popular software such as Adobe Photoshop, Premiere Pro, and FL Studio. One of these videos garnered over 291,000 views and featured numerous positive comments claiming the software functioned flawlessly. The malware was concealed within a password-protected archive linked through a community post. The installer employed HijackLoader to drop the Rhadamanthys payload, which connected to rotating control servers every few days to evade detection.

Even if users do not complete the installation, they may still be at risk. Simply visiting the phishing or file-hosting sites can expose them to malicious scripts or prompts for credential theft disguised as “verification” steps. Clicking the wrong link can compromise login data before any software is even installed.

The Ghost Network thrives on exploiting curiosity and trust. By disguising malware as “free software” or “game hacks,” it relies on users to act before thinking. To protect oneself, adopting habits that make it more difficult for attackers to succeed is crucial.

Most infections begin with individuals attempting to download pirated or modified programs. These files are often hosted on unregulated file-sharing websites where malicious content can easily be uploaded. Even if a YouTube video appears polished or is filled with positive comments, it does not guarantee safety. Official software developers and gaming studios never distribute downloads through YouTube links or third-party sites.

In addition to the dangers posed by malware, downloading cracked software also carries legal risks. Piracy violates copyright law and can lead to serious consequences, while simultaneously providing cybercriminals with an effective delivery channel for malware.

It is essential to have a trusted antivirus solution installed and running at all times. Real-time protection can detect suspicious downloads and block harmful files before they cause damage. Regular system scans and keeping antivirus software updated are vital to recognizing the latest threats.

To safeguard against malicious links that could install malware and potentially access private information, strong antivirus software should be installed on all devices. This protection can also alert users to phishing emails and ransomware scams, helping to keep personal information and digital assets secure.

If a tutorial or installer instructs users to disable their security software, it should raise immediate red flags. Malware creators often use this tactic to bypass detection. There is no legitimate reason to turn off protection, even temporarily; any file requesting such action should be deleted immediately.

Always inspect links before clicking. Hover over them to verify the destination and avoid shortened or redirected URLs that may conceal their true targets. Downloads hosted on unfamiliar domains or file-sharing sites should be treated with caution. When seeking software, it is best to obtain it directly from the official website or trusted open-source communities.

Enabling two-factor authentication (2FA) for important accounts adds an extra layer of security, ensuring that even if someone obtains a password, they cannot access the account. Malware often aims to steal saved passwords and browser data. Using a password manager can help securely store and generate complex passwords, reducing the risk of password reuse.

Software updates not only introduce new features but also fix security vulnerabilities that malware can exploit. Enabling automatic updates for systems, browsers, and commonly used applications is one of the simplest ways to prevent infections.

Even after securing a system, personal information may still be circulating online due to past breaches. A reliable data removal service can continuously scan and request the deletion of personal data from people-search and broker sites, making it more challenging for cybercriminals to exploit exposed information.

Cybercriminals have advanced beyond traditional phishing and email scams. By leveraging a platform built on trust and engagement, they have created a scalable, self-sustaining system for malware distribution. Frequent file updates, password-protected payloads, and shifting control servers make these campaigns difficult for both YouTube and security vendors to detect and dismantle.

Do you believe YouTube is doing enough to combat malware distribution on its platform? Share your thoughts with us at CyberGuy.com.

Source: Original article

Cruise Ship Leaves 80-Year-Old Woman Behind, Daughter Seeks Answers

Family members are calling for a coronial inquest after an 80-year-old woman was allegedly left behind by her cruise ship on a remote Australian island, leading to her death.

The family of an 80-year-old woman who was found dead after allegedly being abandoned by her cruise ship is demanding a coronial inquest into her death. They describe the incident as “a failure of care and common sense.” Suzanne Rees was on a luxury 60-day cruise in Australia when she was reported missing on Saturday night. Her body was discovered the following day.

Rees was last seen participating in a group hiking tour on Lizard Island, located approximately 200 miles north of Cairns. According to reports, she did not return to the Coral Adventurer cruise ship, which departed the island around 6 p.m. on Saturday. Witnesses indicated that they heard radio commotion and observed the ship returning to the island via a vessel tracker.

The Australian Maritime Safety Authority (AMSA), which serves as the national maritime safety regulator, confirmed it was notified of the incident by the cruise ship around 10 p.m. local time on Saturday. Following this notification, AMSA initiated a response and began assisting Queensland Police in the search for Rees.

An AMSA spokesperson stated that they are working closely with Queensland authorities, including Queensland Police and WorkSafe Queensland. “AMSA will make an assessment as to whether there was any non-compliance associated with the passenger not being counted onto the ship and, if necessary, will take action to address them,” the spokesperson said. “AMSA intends to conduct inquiries on board the vessel when it arrives in Darwin. We are currently investigating the circumstances surrounding why the passenger may not have been accounted for during boarding. AMSA offers its condolences to the family and loved ones of the person who has passed. Our thoughts are with them during this difficult time.”

Katherine, Rees’ daughter, expressed her frustration in an interview with ABC Australia, stating, “From the little we have been told, it seems that there was a failure of care and common sense.” She added that, according to police, it was a particularly hot day, and her mother felt unwell during the hike. Rees was reportedly advised to descend the hill without an escort, after which the ship left the island without conducting a passenger count.

The family is seeking answers regarding whether Rees’ death could have been prevented. The Coroner’s Court of Queensland has confirmed that her death has been referred for investigation. Once the coroner’s investigation is complete, a decision will be made regarding the potential for a formal inquest into the circumstances surrounding her death.

AMSA has not provided specific details about the timing of the vessel’s arrival or the next steps in the investigation, as it remains active. Mark Fifield, CEO of Coral Expeditions, expressed condolences to Rees’ family, stating, “The Coral team have been in contact with the woman’s family, and we will continue to offer support to them through this difficult process. While investigations into the incident are continuing, we are deeply sorry that this has occurred and are offering our full support to the woman’s family.”

The operation of the cruise ship is regulated under the Australian Navigation Act 2012 and relevant workplace laws, according to AMSA. The tragic incident has raised serious questions about passenger safety and the protocols in place to ensure that all individuals are accounted for during excursions.

Source: Original article

Major leap in Indian crypto market – Madras high court verdict

In a significant advancement for India’s cryptocurrency sector, the Madras High Court acknowledged cryptocurrency as a “property” under Indian law while dismissing a plea filed by a crypto investor whose holdings on the WazirX exchange were frozen following a cyberattack in 2024.
The recent judgment delivered by the Madras High Court in Rhutikumari v. Zanmai Labs marks a pivotal judicial intervention and provides an important pronouncement on the nature of cryptocurrencies and the rights of Indian investors. It influences the ongoing discourse in a domain where legislative measures have been notably absent. Although the decision primarily aims to provide interim relief to a single investor, its implications extend to the millions of Indian Virtual Digital Asset (VDA) users operating within a market that the government taxes but does not formally regulate. Beyond its immediate scope, the judgment exemplifies the judiciary’s role as a constitutional check in shaping rights within the digital age. It exemplifies a scenario where persistent legislative inertia has compelled the courts to step in to uphold constitutional balance.

Proposed legislations, including the ‘Banning of Cryptocurrency and Regulation of Official Digital Currency Bill, 2019’ and the ‘Cryptocurrency and Regulation of Official Digital Currency Bill, 2021,’ have not advanced beyond the draft stage. Conversely, the government has enacted a rigorous tax regime, imposing a 30% tax on gains and a 1% tax deducted at source on all trades. This creates a paradoxical situation wherein the industry bears a substantial tax burden while lacking formal legal protections. Such legislative inaction exposes millions of Indian users to risks including fraud, cyberattacks, and insolvency of international exchanges.

What precisely constitutes a cryptocurrency? Mirroring the Supreme Court’s observation in Internet and Mobile Association of India v. Reserve Bank of India, the High Court referenced the Vedic concept of “neti, neti” (“not this, not that”) to illustrate the challenge of defining this modern digital phenomenon. The court recognized that the term “currency” is misleading, as its valuation is not determined by a sovereign authority but by the consensus between willing buyers and sellers. Equally, categorizing it as a digital “asset’ remains complex. The High Court’s ruling carefully differentiated crypto as property, not currency, thereby resolving an interpretive deadlock faced by regulators and courts worldwide.

Key conclusions of the judgment includes Recognition of Cryptocurrency as “Property”. The court, for purposes of granting interim relief, classified the user’s holdings as an “asset.” This approach aligns with the perspectives adopted by courts in the United Kingdom, Singapore, and New Zealand, which have acknowledged cryptocurrencies as a form of intangible property capable of ownership and trust. This judicial recognition constitutes a crucial initial step towards establishing a legal framework for remedies. Furthermore, the court endorsed the legitimacy of cryptocurrencies by noting that, under Indian law, they are treated as VDA and not as speculative transactions as delineated and recognized by statutes.

Beware of Fake Settlement Sites That Compromise Your Data Security

Fraudulent settlement sites are targeting consumers with deceptive practices, including requests for personal information and processing fees, as scammers exploit recent class action payouts.

In the wake of significant class action settlements, such as Facebook’s $725 million payout and AT&T’s $177 million distribution, scammers are increasingly targeting consumers with fraudulent settlement claims. These scams often manifest as convincing emails and websites designed to steal personal information, including Social Security numbers and banking details.

As legitimate settlement claims are processed, the rise of fake settlement sites has become a pressing concern for consumers. These sites typically feature generic layouts and long URLs, making them easy for scammers to replicate. A recent demonstration revealed how quickly a fake settlement site can be created using AI tools, underscoring the ease with which criminals can exploit these shortcuts.

Facebook has been a prime target for such scams. In the past, a fraudulent site emerged around the Equifax settlement, deceiving thousands of individuals before it was taken down. This incident serves as a reminder that while some sites may appear unusual, it is crucial to verify their legitimacy before providing any personal information.

To avoid falling victim to these scams, consumers should be vigilant and look for common warning signs. If a site requests your full Social Security number or sensitive personal information, it is a red flag. For instance, the official Equifax settlement only required the last six digits of Social Security numbers. Genuine settlement sites typically ask for limited information, such as the last four digits of your SSN, and rarely demand complete details.

Another indicator of a fraudulent site is the urgency they create. Scammers often pressure individuals to act quickly, whereas legitimate settlement sites do not impose strict deadlines for claims. Additionally, real settlement administrators will never require payment to file a claim or receive a payout. If a site requests “administrative fees” or “processing charges,” it is advisable to close it immediately.

Scammers also utilize fake security seals to create a false sense of trust. Consumers should ensure that any security seals on a site are recognizable, clickable, and verifiable. Furthermore, legitimate settlement sites will provide multiple, verifiable contact methods. If the email or phone number associated with a site appears suspicious or matches an unusual domain, it is a significant warning sign.

Before filing any claims, consumers can take several steps to ensure they are dealing with a legitimate settlement site. The Federal Trade Commission (FTC) maintains updated lists of approved class action settlements on its website, which always ends in .gov. If a claim notice directs you to a different URL, it is wise to approach it with caution. Trusted news outlets often report on large settlements and provide safe links for consumers.

For those who prefer to avoid digital phishing altogether, sending a paper claim form can be a safer option. Additionally, strong antivirus software can help block malicious links and alert users to potential threats, safeguarding personal information and digital assets.

Data removal services can also assist in protecting personal information by scrubbing it from broker lists, making it more challenging for criminals to target individuals. While no service can guarantee complete data removal from the internet, these services actively monitor and erase personal information from various websites, providing peace of mind to users.

Consumers should remain skeptical when encountering settlement notices. It is essential to check URLs, avoid clicking on direct links, and refrain from providing details that do not align with the claim’s purpose. The goal of a settlement payout is to aid recovery, not to expose individuals to further risk.

As class action settlements can feel like rare victories for consumers, it is crucial to remain vigilant against the tactics employed by scammers. By following these guidelines and exercising caution, individuals can protect themselves from falling victim to fraudulent settlement sites.

For more information on how to spot phishing scams and protect your personal information, visit CyberGuy.com.

Source: Original article

Malicious Party Invitations: How They Target Your Inbox

Cybercriminals are increasingly using fake invitation emails to deceive recipients into downloading malware and compromising their personal information.

In a concerning trend, cybercriminals are employing deceptive tactics by sending fake invitation emails that appear to originate from legitimate services. These emails often promise an “exclusive invite” or prompt recipients to download software to access event details. A single click on these links can lead to malware installation on your device.

Recently, I encountered one of these fraudulent emails. It came from a Gmail address, which initially lent it an air of authenticity. However, the language used raised a red flag: “Save the invite and install to join the list.” No reputable service would ever request that you install software merely to view an invitation.

These emails are designed to look polished and often mimic well-known event platforms. When users click on the provided link, they are directed to a site that pretends to host the invitation. Instead of displaying event details, the site prompts users to download an “invitation” file, which is likely to contain malware.

In my case, the link led to a suspicious domain ending in “.ru.com.” While it superficially resembled a legitimate brand name, the unusual suffix served as a warning sign that it was not an official site. Cybercriminals frequently utilize look-alike domains to mislead users into believing they are visiting a legitimate website.

There are several warning signs that should prompt caution before clicking on any links in these emails. If you notice any of these indicators, it is advisable to close the email and delete it immediately.

To protect yourself from these malicious invitation emails, it is essential to remain vigilant. Before clicking on any “Download Invitation” button, hover your mouse over the link to check its destination. Authentic invitations will originate from the company’s official domain. Scams often employ unusual endings, such as “.ru.com,” instead of the standard “.ru” or “.com.” Recognizing these subtle clues can help you avoid significant problems.

If you accidentally click on a malicious link, having robust antivirus protection can help detect and block malware before it spreads. This serves as a crucial line of defense against fake invites that may infiltrate your inbox.

To further safeguard yourself from malicious links that could install malware and potentially compromise your private information, it is advisable to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, ensuring the safety of your personal information and digital assets.

Cybercriminals often distribute these emails by stealing contact lists from infected accounts. Utilizing a personal data removal service can help minimize the amount of your personal information circulating online, making it more challenging for cybercriminals to target you. While no service can guarantee the complete removal of your data from the internet, employing a data removal service is a prudent choice. These services actively monitor and systematically erase your personal information from numerous websites, providing peace of mind and reducing the risk of being targeted.

Additionally, hackers tend to exploit outdated systems, as they are easier to compromise. Regularly updating your operating system and applications can patch vulnerabilities, making it significantly more difficult for malware to take hold.

It is also important not only to delete suspicious invites but to report them to your email provider. This action can enhance their filtering systems, protecting you and others from future fraudulent emails.

Even if hackers manage to obtain your password through a phishing attack, implementing multi-factor authentication (MFA) adds an extra layer of security to your accounts. This measure makes unauthorized access nearly impossible without your phone or a secondary code.

In the unfortunate event that malware damages your computer, maintaining backups ensures that you do not lose critical data. Utilizing an external hard drive or a trusted cloud service can provide peace of mind in such situations.

Fake invitation emails are crafted to catch recipients off guard. Cybercriminals rely on individuals acting quickly and clicking without due consideration. Taking a moment to scrutinize an unexpected email could save you from inadvertently installing dangerous malware.

Have you ever received a fake invitation email that seemed convincing? How did you respond? Share your experiences with us at Cyberguy.com/Contact.

Source: Original article

Arizona Sheriff’s Office Implements AI Program for Case Report Writing

The Pima County Sheriff’s Department is utilizing Axon’s AI program, Draft One, to streamline the report-writing process for deputies, saving valuable time in the field.

As artificial intelligence (AI) continues to gain traction across various sectors, the Pima County Sheriff’s Department in Arizona is exploring its potential applications in law enforcement. At the beginning of this year, deputies began a trial of Axon’s Draft One, an innovative program designed to assist in writing incident reports using AI technology.

Draft One operates by recording interactions through body cameras. The program then processes the audio along with any additional information provided by the deputy to generate a first draft of the report. This initial draft is not submitted as the final report; instead, deputies review and verify its completeness and accuracy before finalizing it.

“They’re able to verify the completeness, the accuracy, and all of that,” said Captain Derek Ogden. “But the initial first draft, they can’t submit as their case report.”

During a demonstration of the program, Deputy Dylan Lane illustrated how Draft One can significantly reduce the time required to complete a case report. What would typically take him around 30 minutes to finish can now be accomplished in just five minutes.

“Most of that time is just the quick changes, making sure that all the information is still accurate and then just adding in those little details,” Lane explained.

Captain Ogden emphasized that Draft One is particularly beneficial during shifts when deputies are responding to multiple incidents in quick succession. He noted that this program is one of several AI tools the department is investigating to enhance productivity and efficiency.

“Recently, we saw a detective from our criminal investigative division use AI to identify a deceased unidentified person,” Ogden said. “We’re also looking for ways to increase the productivity and efficiency of our patrol deputies and some of our corrections officers.”

Law enforcement agencies nationwide are increasingly evaluating how AI can assist in addressing resource shortages. Max Isaacs from The Policing Project, a non-profit organization affiliated with NYU School of Law that focuses on public safety and police accountability, highlighted the appeal of AI tools for budget-constrained policing agencies.

“A lot of policing agencies are budget constrained. It is very attractive to them to have a tool that could allow them to do more with less,” Isaacs stated. However, he also pointed out that while AI presents opportunities for resource savings, there is limited data available on the actual effectiveness of these programs.

“You have a lot of examples of crimes being solved or efficiencies being realized,” Isaacs noted. “But in terms of large-scale studies that rigorously show us the amount of benefit, we don’t have those yet.”

Concerns regarding the accuracy of AI systems were also raised. Isaacs cautioned that AI is not infallible and can rely on flawed data, which may lead to serious consequences such as false arrests or misdirected investigations.

“AI is not perfect. It can rely on data that is flawed. The system itself could be flawed. When you have errors in AI systems, that can lead to some pretty serious consequences,” he said.

In response to these concerns, Captain Ogden acknowledged the potential for inaccuracies in AI-generated reports. He reiterated the importance of human oversight, emphasizing that every report produced with Draft One must be reviewed by a deputy before submission.

Following a successful trial involving 20 deputies, the Pima County Sheriff’s Department plans to expand the use of Draft One to corrections officers, further integrating AI into their operations.

Source: Original article

Jury Awards $966 Million in Johnson & Johnson Talc Cancer Case

Johnson & Johnson has been ordered to pay $966 million to the family of a woman who died from mesothelioma, following a jury’s finding that the company’s talc products caused her cancer.

Johnson & Johnson (J&J) faces a significant financial blow after a Los Angeles jury ordered the company to pay $966 million to the family of Mae Moore, a California resident who died from mesothelioma in 2021. The jury’s decision marks a pivotal moment in ongoing litigation concerning the safety of J&J’s talc products, which have been linked to cancer allegations.

The lawsuit was initiated by Moore’s family in the same year she passed away, asserting that J&J’s talc baby powder contained asbestos fibers that contributed to her rare cancer. The jury awarded $16 million in compensatory damages and an additional $950 million in punitive damages, according to court documents.

In response to the verdict, Erik Haas, J&J’s worldwide vice president of litigation, criticized the plaintiff’s case, claiming it relied on “junk science” that should not have been presented to the jury.

While the jury’s ruling is substantial, it may be subject to reduction upon appeal. The U.S. Supreme Court has previously established that punitive damages should typically not exceed nine times the amount of compensatory damages awarded.

Founded in 1886 by Robert Wood Johnson and his brothers, Johnson & Johnson has grown into a multinational healthcare giant headquartered in New Brunswick, New Jersey. Originally focused on producing sterile surgical dressings, the company has diversified its offerings to include pharmaceuticals, medical devices, and consumer health products.

As of October 2023, J&J reported annual revenues of $90.63 billion, with a market capitalization of approximately $453.15 billion, underscoring its significant role in the healthcare industry. In 2024, the company achieved adjusted earnings per share (EPS) of $9.98, reflecting a modest increase of 0.6% from the previous year. J&J continues to invest heavily in research and development, allocating over $17 billion in 2024, which represents 19.4% of its total sales.

J&J’s diverse portfolio includes notable products such as the cancer treatment Darzalex, the immunology drug Tremfya, and the cardiovascular device company Abiomed. Despite its strong global presence and extensive healthcare offerings, the company faces ongoing legal challenges that threaten its reputation and financial stability.

In the past year, J&J has encountered several significant verdicts in mesothelioma cases, with Moore’s case being one of the largest. The jury’s decision underscores the heightened scrutiny surrounding the safety of J&J’s talc products and may lead to further litigation. Although the company disputes the scientific basis of the claims and intends to appeal, the substantial punitive damages awarded indicate increasing pressures for accountability.

This case serves as a reminder of how longstanding product liabilities can impact even the most established industry leaders, highlighting the critical importance of regulatory compliance and transparent communication with consumers.

Source: Original article

Legal Challenge Emerges Against $100,000 Fee on H-1B Visas

The first legal challenge against President Trump’s $100,000 fee on H-1B visas has been filed, with critics arguing it could devastate key sectors and exceed presidential authority.

A coalition of unions, employers, religious organizations, and healthcare providers has initiated the first federal lawsuit against President Donald Trump’s controversial $100,000 fee on new H-1B visa petitions. The lawsuit, filed in San Francisco, asserts that the Trump administration has overstepped its constitutional authority, as only Congress has the power to impose taxes or fees.

Trump announced the unprecedented policy on September 19, claiming that the H-1B program, which allows tens of thousands of high-skilled foreign workers to enter the United States each year, had been “deliberately exploited” to replace American workers with lower-paid labor. The new fee is set to take effect just 36 hours after the announcement, prompting panic among employers who rushed to secure workers before the rules changed.

The proclamation mandates that employers pay an additional $100,000 for each new H-1B hire, in addition to existing fees that typically range from $2,000 to $5,000. Notably, this fee does not apply to current H-1B holders or to petitions filed before September 21.

The plaintiffs in the lawsuit include the United Auto Workers union, the American Association of University Professors (AAUP), healthcare providers, and various religious groups. They argue that Trump’s actions have effectively disrupted a program established by Congress, creating chaos for employers, workers, and federal agencies alike. They contend that the proclamation must be blocked to prevent widespread harm.

“Without relief, hospitals will lose medical staff, churches will lose pastors, classrooms will lose teachers, and industries across the country risk losing key innovators,” stated the Democracy Forward Foundation and Justice Action Center, which are representing the plaintiffs in a joint press release.

The H-1B visa program, introduced by Congress in 1992, permits U.S. employers to hire temporary foreign workers in specialized fields such as technology, medicine, engineering, and education. Each year, the program issues 65,000 visas, with an additional 20,000 reserved for applicants holding advanced degrees. Due to high demand, visas are typically allocated by lottery.

This lawsuit highlights the extensive impact of the H-1B program beyond the technology sector. According to the plaintiffs, approximately one-third of H-1B visa holders are employed as nurses, physicians, teachers, scholars, and clergy. Hospitals and universities have expressed concerns that the new fee could severely hinder their staffing capabilities, while religious organizations fear it may impede their ability to recruit clergy.

“The $100,000 fee will discourage the best and brightest minds from bringing life-saving research to the U.S.,” remarked Todd Wolfson, president of the AAUP, in comments reported by the Associated Press.

Business leaders have echoed these sentiments. Amazon, which received over 10,000 H-1B visas this year, is among the largest beneficiaries, followed by Tata Consultancy, Microsoft, Apple, and Google. California, home to many of these companies, employs the highest number of H-1B workers in the nation. For these businesses, the new fee could translate into tens of millions of dollars in additional costs, not to mention the potential chilling effect on talent mobility.

The Trump administration defends the fee as a necessary measure to curb abuse of the H-1B program and to protect American jobs. Trump has argued that the influx of lower-wage workers has undermined the program’s integrity and poses a threat to national security by discouraging Americans from pursuing careers in science and technology.

Supporters of the fee assert that some outsourcing firms exploit the H-1B program to import workers at salaries as low as $60,000, which is significantly below the typical six-figure compensation for U.S. tech jobs.

The lawsuit raises a critical constitutional question: Can a president unilaterally impose new fees on a visa program established by Congress? The plaintiffs assert that the answer is no, emphasizing that the Constitution reserves the authority to levy taxes or fees for Congress alone.

The proclamation effectively transforms the H-1B program into one where employers must either “pay to play” or seek a “national interest” exemption, which would be granted at the discretion of the Secretary of Homeland Security. This system raises concerns about selective enforcement and potential corruption, according to the lawsuit.

Skye Perryman, president and CEO of Democracy Forward, described the “exorbitant fee” as illegal and a potential invitation for corruption. “Congress created the program, and Trump cannot rewrite it overnight or impose new taxes by executive order,” she stated, as reported by the Associated Press.

The lawsuit also critiques the administration for failing to adhere to the required rulemaking process, alleging that agencies such as USCIS and the State Department implemented policies without proper notice or consideration of their impact on employers and innovation.

India is the largest beneficiary of the H-1B program, with Indian nationals accounting for 71 percent of approved visas last year, while China received 11.7 percent, according to government data. The steep new fee is expected to disproportionately affect Indian professionals, potentially straining U.S.-India relations at a time when Washington seeks to strengthen ties with New Delhi.

The plaintiffs are seeking an immediate injunction to halt the enforcement of the fee. A federal judge in San Francisco is expected to hear arguments in the coming weeks. Meanwhile, uncertainty looms as employers remain unsure whether to proceed with petitions and workers find themselves in limbo.

If the court rules against the administration, it would represent a significant rebuke of Trump’s expansive claims of executive authority over immigration. Conversely, if the order is upheld, it could permanently alter one of America’s most vital pathways for high-skilled immigration, with far-reaching implications for the economy, education, healthcare, and international diplomacy.

For now, this lawsuit marks the first but likely not the last challenge to a policy that critics argue threatens to close America’s doors to global talent while entangling employers and workers in costly and confusing regulations.

Source: Original article

Legal Groups Seek Emergency Order to Prevent ICE from Detaining Immigrant Teens

Advocacy groups have filed an emergency motion to enforce a court ruling preventing the detention of unaccompanied immigrant teens in adult facilities, citing recent violations by ICE.

Washington, D.C., October 4 — The American Immigration Council and the National Immigrant Justice Center (NIJC) have filed an emergency motion today, aiming to enforce a 2021 court ruling from the Garcia Ramirez v. ICE case. This ruling prohibits U.S. Immigration and Customs Enforcement (ICE) from unlawfully detaining unaccompanied immigrant children in adult detention centers once they reach the age of 18.

The motion comes in response to multiple documented instances where ICE has resumed transferring immigrant children who entered the U.S. alone into adult detention facilities upon turning 18, a practice that violates the permanent injunction established in the Garcia Ramirez case.

“The permanent injunction made clear that ICE cannot automatically transfer young people to adult detention centers simply because they have turned 18,” said Michelle Lapointe, legal director at the American Immigration Council. “Locking up these young people in ICE jails rife with overcrowding and hazardous conditions, and far from their support systems, does nothing to make our communities safer; it only inflicts more harm on vulnerable youth.”

When children under 18 enter the United States unaccompanied, they are typically placed in shelters managed by the Office of Refugee Resettlement (ORR). These children are generally released to family members or other vetted sponsors in the U.S., rather than being sent to ICE detention centers. This policy is designed to prioritize care and support for children instead of punishment.

According to the Garcia Ramirez ruling, which resulted from years of litigation by the NIJC and the Council, ICE is required to consider placement in the least restrictive setting once these youths turn 18. This includes exploring alternatives to detention rather than resorting to immigration detention.

“ICE’s attempt to expand the detention of immigrant youth is a direct violation of the courts, which explicitly requires the agency to consider safe, less restrictive alternatives to detention,” stated Mark Fleming, associate director of litigation at the National Immigrant Justice Center. “We will not allow the government to turn back the clock and return to a practice that the courts have already found unlawful.”

The number of individuals in immigration detention has reached unprecedented levels, leading to overcrowding and abusive conditions. Critics argue that the previous administration weaponized the threat of prolonged confinement in these dangerous facilities to coerce individuals into relinquishing their legal rights and accepting deportation. This pressure is further exacerbated by new policies, including financial incentives for unaccompanied youths who agree to leave the country.

“The law is clear: ICE must use safe, less restrictive alternatives, not default to jailing young people indefinitely,” emphasized Marie Silver, managing attorney for NIJC’s Immigrant Children’s Protection Project. “These kids came here seeking safety and hope. They deserve a chance to be free, reunify with family and community members, attend school, and work with their lawyers to have their day in court. Trapping them in dangerous and degrading conditions in immigration detention is compounding their trauma in a cruel and unnecessary way.”

The emergency motion filed today underscores the urgent need to uphold the rights of immigrant youth and ensure compliance with established legal rulings.

Source: Original article

Federal Judge Sentences Man Who Attempted to Assassinate Justice Kavanaugh

A federal judge is set to sentence Nicholas Roske for his attempted assassination of Supreme Court Justice Brett Kavanaugh, with prosecutors seeking a 30-year prison term.

A federal judge is scheduled to sentence Nicholas Roske on Friday for his attempt to assassinate Supreme Court Justice Brett Kavanaugh. This incident occurred in the weeks leading up to the Supreme Court’s landmark Dobbs decision, which significantly impacted abortion rights in the United States.

The Department of Justice is advocating for a 30-year prison sentence for Roske, while his defense attorneys have requested a significantly shorter term of eight years. In a sentencing memorandum, prosecutors detailed how Roske arrived at Kavanaugh’s residence on June 8, 2022, armed with a pistol, ammunition, a knife, a crowbar, and tactical gear, with the intention of killing Kavanaugh and three other justices.

Prosecutors emphasized the potential consequences of Roske’s actions, describing them as “immeasurable and staggering.” They noted that by targeting at least one justice and aiming to kill three, Roske sought to alter an entire branch of the U.S. government through violence.

In contrast, Roske’s attorneys argued that a 30-year sentence, which includes enhancements for terrorism, is disproportionate to the crime. Roske pleaded guilty in April to one count of attempting to murder a Supreme Court justice, a charge that carries a maximum penalty of life in prison.

The defense highlighted that Roske called 911 shortly after arriving at Kavanaugh’s home, effectively self-reporting his intentions and plans rather than proceeding with the attack. They also pointed out that Roske suffers from severe depression, arguing that his online searches related to mass shootings and various justices should not be interpreted as evidence of intent to murder multiple justices.

Roske’s attorneys stated, “As any internet user knows, Googling and doom-scrolling, even in dark corners of the internet, does not equate to criminal intent.” They further argued that a person’s online content is often voluminous, intensely personal, and can easily be misinterpreted.

In a notable development, Roske’s attorneys informed the court that although his name had not formally changed, he wishes to be referred to as “Sophie” and to use female pronouns. A footnote in their memorandum stated that the remainder of the document and the in-court arguments would respect this preference.

Roske’s sentencing comes amid growing concerns among judges regarding threats from ideologically motivated individuals across the political spectrum. The attempted assassination occurred just two weeks before the Supreme Court’s decision to overturn Roe v. Wade, a ruling that had sparked widespread protests outside the Supreme Court building and the homes of conservative justices.

In a related case, an Alaska man named Panos Anastasiou was indicted last year for sending hundreds of threatening messages to Supreme Court justices, including explicit threats of murder. Anastasiou faces accusations of making specific threats against six justices, including shooting, strangling, “lynching,” and beheading them.

This story is still developing, and updates will be provided as more information becomes available.

Source: Original article

Inside a Scammer’s Day: Targeting Victims in the Digital Age

Scammers utilize personal data from public records and data brokers to create convincing narratives, enhancing their chances of successfully targeting potential victims through calls and emails.

Imagine sipping your morning coffee when your phone rings. A number you don’t recognize appears on the screen. On the other end, a voice claims to be from your bank, asking you to “confirm a recent charge.” This scenario is all too familiar for many.

Scammers do not rely on luck. They do not randomly select numbers from a phone book in hopes of finding a target. Instead, their calls, texts, and emails are meticulously planned. They often possess a wealth of information about you before they ever reach out, making their pitches sound credible and tailored.

So, what does a typical day look like for a scammer? Let’s take a closer look.

Scammers begin their day not by hacking into secure databases but by accessing data broker sites—dubious online directories that trade personal information like collectibles. These platforms provide a comprehensive profile of individuals, including details such as addresses, email addresses, voter registrations, and even criminal histories, whether accurate or not.

With this information at their fingertips, scammers can construct narratives that seem custom-made for their targets. They do not fabricate details; rather, they borrow from your life, which is why their communications can feel so believable.

Even without social media, scammers can effectively target individuals. Once they have crafted their story, they deploy auto-dialing software to send out thousands of calls daily. By acquiring personal and contact details from various data brokers, they can repeatedly target the same individuals. If you hang up or ignore the call, scammers log your number as “active,” ensuring you remain on their list for future attempts.

Scammers do not need every target to fall for their tricks; they only require a small percentage to succeed. This is a numbers game, and the abundance of personal data significantly increases their odds. At the end of the day, scammers continue their operations by feeding the information they have gathered back into the data cycle, perpetuating the cycle of victimization.

Now, consider a scenario where scammers cannot find your data online. Without access to personal information, they would lack storylines, details to exploit, and the means to personalize their attacks. Removing your data from people-search sites and data broker databases not only cleans up your online presence but also effectively shuts the door on scammers’ tactics.

However, the process of removing your data can be tedious. You could spend hours navigating various sites, filling out opt-out forms, and sending emails while trying to track compliance. The challenge is that data brokers do not cease their operations; new ones emerge weekly, and old ones often reintroduce your data.

This is where data removal services come into play. While no service can guarantee complete removal of your data from the internet, utilizing a data removal service is a wise choice. Although these services may come at a cost, they provide peace of mind by actively monitoring and systematically erasing your personal information from numerous websites.

By limiting the information available about you, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it more challenging for them to target you.

Scammers do not accidentally stumble upon your phone number. They meticulously map out your life, one data point at a time. Therefore, protecting your information online is the most effective step you can take to reduce the likelihood of scam calls, phishing emails, and identity theft.

Remember, every piece of personal data you remove is one less tool in a scammer’s arsenal. What’s the most convincing scam attempt you’ve ever received? Share your experiences with us.

Source: Original article

DOJ Closes Investigation into BAPS Akshardham Temple Labor Allegations

The U.S. Department of Justice has closed its investigation into forced labor allegations at the BAPS Swaminarayan Akshardham temple in New Jersey, while a civil lawsuit continues in federal court.

The U.S. Department of Justice (DOJ) has officially concluded its investigation into allegations of forced labor at the BAPS Swaminarayan Akshardham temple in Robbinsville, New Jersey. This temple is recognized as the largest Hindu temple in the Western Hemisphere. The investigation was launched following a raid in 2021, which was prompted by claims made by Indian workers who were brought to the United States on R-1 religious worker visas.

In May 2021, six workers filed a civil lawsuit, alleging they were coerced into performing strenuous construction tasks under poor working conditions. The lawsuit claimed that their passports were confiscated and that they were inadequately compensated for their labor. An amended complaint later introduced 15 additional plaintiffs; however, 12 of these individuals withdrew their claims, stating they had been misled by their legal counsel.

The leadership of the temple has consistently maintained that the workers were volunteers, referred to as “sevaks,” who regarded their participation as a form of spiritual service. They emphasized that the construction of the temple was a collective effort, involving over 12,500 individuals from diverse backgrounds and countries.

The DOJ’s decision to close the criminal investigation has been welcomed by officials at BAPS. They expressed relief and reaffirmed their commitment to transparency and community service. Lenin Joshi, a volunteer at the temple, described the community as “shaken” by the initial allegations but confident in the integrity of their efforts.

Despite the closure of the criminal investigation, the civil lawsuit remains active in federal court. Leaders at BAPS are optimistic about a favorable outcome, citing the DOJ’s findings as supportive of their position. The civil case is set to resume at an undetermined date, with both sides preparing for further proceedings.

Source: Original article

Expanding Surveillance of Immigrants Raises Concerns Over Privacy Rights

Expanding surveillance measures targeting immigrants in the U.S. raise significant concerns about privacy rights, as government agencies increasingly share sensitive data and employ advanced monitoring techniques.

Since the Trump administration took office, the United States has witnessed a significant crackdown on immigrants. Immigration authorities, including Immigration and Customs Enforcement (ICE), the Department of Homeland Security (DHS), and U.S. Citizenship and Immigration Services (USCIS), have intensified efforts to question, detain, and deport undocumented immigrants, student visa holders, and green card holders.

To facilitate this crackdown, the administration has directed non-immigration-related government agencies, such as the Internal Revenue Service (IRS) and Medicaid, to share sensitive information with immigration authorities. During an American Community Media briefing on September 5, data privacy and policy experts expressed concerns that this development sets a dangerous precedent for privacy rights.

Nicole Alvarez, a Senior Policy Analyst for Technology Policy at the Center for American Progress (CAP), described the administration’s use of sensitive records for immigration enforcement as a “digital watchtower.” In a report published last month, Alvarez outlined how the administration is constructing an infrastructure for an expanding surveillance system that poses threats to both immigrants and citizens.

Alvarez noted that the Privacy Act of 1974, enacted in the wake of the Watergate scandal, was designed to ensure that the federal government could only use an individual’s private information for the purpose for which it was collected. However, she argued that the Privacy Act “has simply not kept up with the times.” It was established before the advent of the internet, mass data storage, and the ability to link extensive databases, resulting in limited accountability when data is reused or shared across agencies in unexpected ways.

The administration’s use of sensitive information for purposes other than its original intent—such as IRS or Medicaid data being utilized for immigration raids—can be classified as secondary data abuse. A 2022 report by the Center for Privacy and Technology at Georgetown Law revealed that ICE has access to personal information through various sources, including Department of Motor Vehicles (DMV) driver’s license records and utility providers’ client records.

Another initiative underway is the consolidation of data from different agencies into a centralized repository, which simplifies the federal government’s ability to surveil both immigrants and citizens. Over time, Alvarez believes that secondary data abuse and the centralization of information will deter individuals from enrolling in or utilizing services offered by government agencies. Immigrants may become hesitant to pay taxes, enroll in healthcare programs, or seek other benefits to which they are entitled.

“When people disengage from public systems, those systems inherently become weaker; they become more unfair and less democratic,” Alvarez explained. “It becomes harder for agencies to serve communities effectively, and ironically, it undermines long-term goals like fraud prevention and civic participation.”

Emerald Tse, from the Center on Privacy and Technology at Georgetown Law, echoed Alvarez’s findings regarding the government’s digital watchtower and emphasized that the surveillance extends beyond data collected through federal agencies. The Center’s 2024 report, “Raiding The Genome,” provides a detailed analysis of a DHS program that collects DNA samples from thousands of individuals daily. In 2020, a Department of Justice rule granted DHS the authority to collect DNA from any individual they detain. These samples are then used to create profiles added to a federal policing database accessible to all levels of law enforcement.

“We found that the federal government has been collecting DNA on the assumption that people will commit crimes in the future,” Tse stated. “Profiles were added regardless of whether a person committed a crime or had been charged with one, and this included individuals of all ages, even children as young as four years old.” The report indicates that the DHS has added over 2.5 million profiles to the national policing database through this program, marking a staggering 5000% increase in the number of profiles added over the past three years.

The current administration is also leveraging social media to screen and, in some cases, target immigrants. Earlier this year, student visa interviews were paused for three weeks. Upon resuming, consular officers were instructed to vet applicants based on their social media profiles and online presence. This directive included screening candidates who demonstrated support for Hamas or exhibited a history of political activism. The government has also announced the use of an AI-based application called “Catch and Revoke,” which scours social media profiles of thousands of international students and revokes their visas if their sympathies align with Hamas.

Sophia Cope, Senior Staff Attorney at the Electronic Frontier Foundation, views this social media surveillance as a direct challenge to individuals’ First Amendment rights. She highlighted a troubling trend in which the government is increasingly limiting what immigrants can express on social media.

“First it was pro-terrorism and pro-Palestine content, then it became anti-Semitism, and now it has broadened to include a general hostility toward American values and culture,” Cope explained. “This is absurd because all of that speech— even pro-terrorism speech—is protected under the First Amendment, as long as it does not incite imminent violence.”

As the U.S. government continues to expand its surveillance capabilities, the implications for privacy rights and civil liberties remain a pressing concern.

Source: Original article

ED Discovers Major Gold Smuggling Operation in Ladakh, Over 1,000 Kg Seized

The Enforcement Directorate has uncovered a significant gold smuggling operation that allegedly funneled over 1,000 kilograms of gold into India, valued at nearly ₹800 crore.

LEH: The Enforcement Directorate (ED) has revealed a large-scale cross-border gold smuggling operation that is believed to have brought more than 1,000 kilograms of foreign-origin gold into India during 2023 and 2024, with an estimated value of nearly ₹800 crore.

This discovery is linked to the seizure of 108 gold bars, each weighing one kilogram, near the Line of Actual Control (LAC) in eastern Ladakh. The bars were intercepted on July 9 by an Indo-Tibetan Border Police (ITBP) patrol at Sirigaple in the Changthang sub-sector, resulting in the arrest of two individuals, Tsering Chamba and Stanzin Dorgyal.

According to the ED, the operation was orchestrated by Tendu Tashi in India, who collaborated closely with a Chinese national identified as Bhu-Chum-Chum. The gold, which originated from Tibet, was transported across the border using porters. Investigators have identified Tenzin Khandap of Tibet as the designated receiver and transporter of the gold, while his uncle, Tenzin Samphel, was responsible for arranging the porters to carry the shipments.

Once the gold entered India, it was moved from Ladakh to Delhi, where it was distributed to various jewellers and dealers. Payments to the Chinese supplier were reportedly made through cryptocurrency, specifically using USDT (Tether), to evade detection by authorities.

The ED has indicated that between 2023 and 2024, the smuggling network successfully brought in 1,064 kilograms of gold into the country. As part of its investigation into money laundering, the agency has conducted searches at five locations in the National Capital Region, including Delhi, as well as one site in Ladakh.

Officials noted that the syndicate had established a sophisticated logistics and payment system to facilitate the cross-border movement and sale of the smuggled gold while evading law enforcement agencies.

The ED has stated that further investigations are ongoing to trace the proceeds of crime and to identify all individuals and entities involved in this extensive smuggling operation.

Source: Original article

Columbia University Data Breach Affects 870,000 Individuals

Columbia University has confirmed a significant data breach affecting nearly 869,000 individuals, exposing sensitive personal information, including Social Security numbers and academic records.

Columbia University has recently disclosed a major cyberattack that has compromised the personal, financial, and health-related information of approximately 869,000 individuals, including current and former students, employees, and applicants. Notifications to those affected began on August 7 and are ongoing.

The breach was discovered following a network outage in June, which Columbia attributed to unauthorized access by an external party. Investigators are currently assessing the full extent of the data theft, which reportedly includes about 460 gigabytes of sensitive information.

According to a breach notification filed with the Maine Attorney General’s office, the compromised data encompasses admissions, enrollment, and financial aid records, as well as certain employee information. However, Columbia has confirmed that patient records from the Columbia University Irving Medical Center were not affected by this breach.

The university has taken steps to report the incident to law enforcement and is collaborating with cybersecurity experts to address the situation. In response to the breach, Columbia has implemented new safeguards and enhanced protocols to prevent similar incidents in the future.

As part of its response, Columbia began mailing letters to affected individuals, offering two years of complimentary credit monitoring, fraud consultation, and identity theft restoration services. While the university has stated that there is currently no evidence of misuse of the stolen data, the risk of identity theft and fraud remains a significant concern, as criminals often exploit stolen information months after a breach.

Individuals affected by the breach are encouraged to take proactive measures to safeguard their personal information. Regularly checking credit reports through AnnualCreditReport.com can help identify unauthorized accounts or changes. Additionally, using personal data removal services can assist in scrubbing information from data brokers and people search sites, making it more difficult for criminals to exploit exposed details.

While no service can guarantee complete removal of personal data from the internet, utilizing a data removal service can be a prudent choice. These services actively monitor and systematically erase personal information from various websites, reducing the risk of identity theft.

In addition to these measures, placing a fraud alert on credit reports can make it more challenging for identity thieves to open accounts in an individual’s name. A credit freeze offers even stronger protection by blocking new credit applications altogether.

Creating long, complex passwords for each account is another essential step in protecting personal information. A password manager can assist in generating and securely storing these passwords. Furthermore, individuals should check if their email addresses have been exposed in past breaches, as many password managers include breach scanners to alert users of potential vulnerabilities.

Turning on two-factor authentication (2FA) wherever possible adds an extra layer of security to accounts, helping to protect them even if a password is compromised. It is also crucial to be vigilant against potential scams that may arise in the wake of the breach, as criminals often exploit fear to target victims with fraudulent emails or texts.

To protect against malicious links that could install malware, individuals should ensure they have strong antivirus software installed on all devices. This software can help detect phishing emails and ransomware scams, safeguarding personal information and digital assets.

Beyond the free credit monitoring services offered by Columbia, additional paid services can help track personal data across the dark web and provide extra safeguards. Identity theft protection companies can monitor sensitive information, such as Social Security numbers and email addresses, alerting users if their information is being sold or used fraudulently.

The breach at Columbia University underscores the vulnerability of even trusted institutions to cyberattacks. As the investigation continues and notifications are expected to roll out through the fall, individuals are advised to remain vigilant and proactive in protecting their personal information.

As discussions around data security continue, questions arise regarding what further measures universities and large institutions should implement to safeguard the personal data of those who place their trust in them.

Source: Original article

Notorious People Search Site Resurfaces Following Major Data Breach

The notorious people search site National Public Data has relaunched under new ownership after a massive data breach that exposed the personal information of 3 billion individuals, raising significant privacy concerns.

National Public Data (NPD), a controversial people search site, has made its return to the internet despite a previous breach that affected the personal information of 3 billion individuals. The site’s relaunch has reignited concerns about privacy and data security.

More than a year ago, NPD gained notoriety for one of the largest data breaches in history, which led to the exposure of sensitive information belonging to billions. Following its disappearance from the web, the site has resurfaced under new ownership, specifically Perfect Privacy LLC. It is important to note that this company is not affiliated with the VPN service of the same name.

Despite the change in ownership, the business model of NPD remains unchanged. The site continues to allow users to search for personal data about friends, relatives, or even strangers using just a name. This functionality raises ongoing concerns about how such data can be misused, particularly in contexts like employment, housing, or credit decisions.

NPD claims that the information it provides comes from various sources, including public records, property ownership databases, social media, and government agencies. The company asserts that it verifies and filters this data to ensure accuracy and currency. However, users may still encounter inaccuracies, as a quick test search revealed a mix of outdated and correct information. The site appeared to struggle with hyphenated names but successfully retrieved accurate details in other instances.

Attempts to reach NPD for comment went unanswered before the deadline for this article.

For individuals who prefer not to have their information accessible on NPD’s platform, there is an option to request removal. However, each profile requires a separate request and confirmation email. After submitting a request, users should follow up in a few days to ensure their data has been removed. A helpful tip is to use an alias or disposable email address for these requests, making it easier to track confirmations and keep the main inbox uncluttered.

Removing personal information from NPD is just the beginning of the privacy battle. Numerous other people search sites may still display personal details, as many of these platforms draw from the same public databases. Consequently, addresses, phone numbers, and relatives’ names can continue to resurface online.

The return of NPD serves as a stark reminder of how quickly data can reappear on the internet. While a breach may fade from public attention, the exposed information often remains accessible. To safeguard privacy, individuals need a comprehensive strategy. Regularly searching for one’s name on various people search engines is advisable, as it helps identify new profiles before they proliferate.

In addition to NPD, other sites such as Whitepages, Spokeo, and Radaris often host similar data. Conducting periodic checks can help users stay informed about their online presence.

For those seeking a more efficient approach, data removal services can scan multiple databases simultaneously. These services request opt-outs on behalf of users and monitor for new listings. While no service can guarantee complete removal of personal data from the internet, employing a data removal service can be a prudent choice. Such services actively work to erase personal information from numerous websites, providing peace of mind and reducing the risk of scammers accessing data from breaches.

In addition to removing profiles, individuals should remain vigilant about monitoring their bank statements, credit reports, and online accounts. Exposed data can be exploited for phishing attempts, fraudulent loan applications, or identity theft. Staying alert to suspicious activity can provide early warnings of potential issues.

To further protect against malicious links that could install malware and compromise personal information, it is essential to have robust antivirus software installed on all devices. This software can also alert users to phishing emails and ransomware scams, safeguarding personal information and digital assets.

Setting up alerts for identity theft is another proactive measure. Many banks and credit monitoring services allow users to create alerts for suspicious activity. Additionally, individuals can establish free fraud alerts with credit bureaus, prompting lenders to take extra steps to verify identity before issuing new credit.

People search sites frequently pull records from government databases. Therefore, reviewing local county property, court, or voter registration records can be beneficial. Some jurisdictions permit requests for redactions or limitations on what is displayed online. Furthermore, tightening privacy settings on social media platforms can help limit what strangers can see, reducing the amount of public information available for collection.

The resurgence of National Public Data highlights the ongoing challenge of protecting personal information in an increasingly digital world. Even if individuals successfully remove their data from one site, numerous others may still retain their details. Consequently, safeguarding privacy requires more than a simple opt-out; it necessitates regular monitoring, credit freezes, and enhanced account vigilance to stay ahead of potential threats.

As the conversation around data privacy continues, individuals are left to ponder whether stronger laws should be enacted to prevent companies from collecting and selling personal data or if the responsibility lies solely with individuals to protect themselves.

Source: Original article

Jury Duty Phone Scams Surge as Fraudsters Impersonate Officials

Fraudsters are increasingly impersonating local officials in jury duty scams, threatening victims with arrest to extract payments, prompting warnings from law enforcement agencies.

Fraudsters are finding new ways to deceive individuals, with one of the latest schemes involving impersonation of local officials. This tactic exploits the fear of arrest by claiming that victims have missed jury duty and now face legal consequences.

Scammers often initiate these fraud attempts with calls from blocked or unknown numbers. During these calls, they assert that the recipient has failed to appear for jury duty and is now subject to an arrest warrant. The scammers typically demand payment, which is often requested through wire transfers or gift cards.

A key warning sign of this scam is any demand for money to avoid arrest or legal trouble. It is crucial never to provide personal information or make payments to unknown callers.

While these scams frequently target older or more vulnerable individuals, younger people have also reported close encounters. For instance, one individual received repeated calls from an unidentified number before finally answering. The caller, claiming to be from a local sheriff’s department, had the person’s full name and address and insisted that they had failed to appear for jury duty, threatening multiple citations.

Legitimate jury summonses are always delivered by mail, not through threatening phone calls. If you receive a suspicious call regarding missed jury duty, it is essential to remain calm and take steps to protect your personal information.

First and foremost, do not trust any unknown caller, especially if they demand immediate payment. Legitimate authorities will never request payment over the phone, particularly not through gift cards, wire transfers, or cryptocurrency. If someone threatens you with arrest or legal action unless you pay immediately, it is almost certainly a scam. Hang up and contact your local court or police department using an official number.

It is also advisable to fact-check any suspicious calls. Court summonses are always sent via mail, not over the phone. Even if the caller possesses personal information such as your name or address, that does not lend them credibility. Scammers often utilize leaked or publicly available data to appear convincing.

Exercise caution even if the scam is delivered through text messages or emails. Avoid clicking on any suspicious links, as they can install malware on your device and compromise your personal data. The best way to protect yourself from malicious links is to have robust antivirus software installed on all your devices. This software can alert you to phishing emails and ransomware scams, safeguarding your personal information and digital assets.

It is important to recognize that your data is already accessible online, often due to old social media profiles or past data breaches. This is how scammers gather enough personal details to sound legitimate. Investing in a data removal service can help minimize your digital footprint by removing your information from people-search sites and data brokers.

While no service can guarantee complete removal of your data from the internet, a data removal service is a wise investment. These services actively monitor and systematically erase your personal information from numerous websites, providing peace of mind and reducing the risk of scammers cross-referencing data from breaches with information they might find on the dark web.

If you receive a scam call, it is crucial to report it to local law enforcement or your country’s fraud reporting agency. After hanging up, block the number on your phone and report it. Many carriers allow you to forward scam texts to 7726 (SPAM). Additionally, apps like Truecaller and Hiya, as well as built-in features like Google Call Screen or Silence Unknown Callers on iPhones, can help detect and block fraudulent calls automatically.

Older adults are frequent targets of these scams, so it is essential to sit down with parents, grandparents, or neighbors to explain how these scams work and what to watch for. A simple conversation could prevent a costly mistake.

As scammers become bolder and more convincing, staying informed about the signs of a jury duty phone scam is crucial. Utilizing smart tools like antivirus software and call blockers, along with limiting your digital footprint, can significantly reduce your risk. Empowering yourself and your loved ones with this knowledge is vital in combating these fraudulent schemes.

Scammers are increasingly using hyper-personalized and emotionally charged phone calls instead of relying solely on faceless phishing emails. By impersonating local authorities and referencing civic duties like jury duty, they exploit both fear and a sense of responsibility. This tactic is particularly dangerous because it sounds plausible, drawing on real processes that many individuals may not fully understand.

Do you believe that law enforcement and government agencies are doing enough to educate the public about these scams? Share your thoughts by reaching out to us.

Source: Original article

Landslide in Central Darfur Claims Over 1,000 Lives, Destroys Village

A devastating landslide in Tarasin Village, Central Darfur, has resulted in over 1,000 fatalities, with only one survivor reported, according to local rebel sources.

A catastrophic landslide struck Tarasin Village in Sudan’s Central Darfur on Sunday, August 31, resulting in the deaths of at least 1,000 individuals, as reported by a local rebel group. The Sudan Liberation Movement/Army (SLM-A) indicated that the disaster was triggered by several days of torrential rainfall that occurred in late August, leading to the complete destruction of the village.

The SLM-A stated, “Initial information indicates the death of all village residents, estimated to be more than one thousand people. Only one person survived.” This tragic event highlights the severe impact of natural disasters in a region already grappling with conflict and instability.

While the figures reported by the SLM-A cannot be independently verified due to restricted access to the affected area, if confirmed, this incident would rank among the deadliest natural disasters in Sudan’s recent history.

In response to the tragedy, Darfur’s governor, Minni Minnawi, described the landslide as a “humanitarian tragedy.” The SLM-A has called for urgent assistance from the United Nations and international aid organizations to aid in body recovery and provide necessary support to those affected by the disaster.

Earlier reports from the BBC indicated that many residents from North Darfur had sought refuge in Tarasin Village after being displaced by the paramilitary Rapid Support Forces, further complicating the humanitarian situation in the region.

This developing story underscores the ongoing challenges faced by communities in Sudan, where natural disasters intersect with ongoing conflict and displacement issues.

Source: Original article

Texas Businessman Charged with Federal Tax Evasion in Texas

A Texas businessman has been indicted for federal tax evasion, accused of diverting company funds for personal use and failing to report significant income.

TYLER, TX – A federal grand jury in the Eastern District of Texas has indicted Anil Surabhi, a 43-year-old Indian citizen residing in McKinney, on charges of attempting to evade taxes.

The indictment alleges that Surabhi, who managed an IT services company based in Georgia, misappropriated substantial company funds for his personal gain.

According to the legal document, Surabhi’s misuse of funds included financing private investments, covering personal expenses, and making real estate purchases. Notably, he is accused of failing to report these significant disbursements as income on his individual income tax returns.

If convicted of the federal charge, Surabhi could face a maximum sentence of five years in federal prison.

Source: Original article

Inside Training Facility for Recruits Addressing Trump’s Deportation Policies

The Federal Law Enforcement Training Center in Brunswick, Georgia, serves as the primary training hub for federal law enforcement officers, including those in Immigration and Customs Enforcement.

The Federal Law Enforcement Training Center (FLETC) in Brunswick, Georgia, stands as a pivotal institution for the training of nearly all federal law enforcement officers in the United States. This facility plays a crucial role in preparing officers from various agencies, including Immigration and Customs Enforcement (ICE), which has been at the forefront of immigration enforcement and mass deportation initiatives during the Trump administration.

Established to enhance the quality of law enforcement training, FLETC provides a comprehensive curriculum that covers a wide array of topics essential for effective law enforcement. The center’s programs are designed to equip recruits with the skills necessary to navigate the complexities of federal law enforcement, particularly in areas such as immigration enforcement.

As the demand for immigration enforcement has increased, particularly under the policies implemented during the Trump era, the training provided at FLETC has become even more significant. Recruits undergo rigorous training that prepares them to handle the challenges associated with immigration enforcement, including the legal and ethical implications of their actions.

FLETC’s training programs emphasize not only the technical skills required for law enforcement but also the importance of understanding the communities they serve. This dual focus aims to foster a sense of responsibility and accountability among officers, particularly in sensitive areas such as immigration enforcement.

The facility’s role in shaping the future of federal law enforcement cannot be overstated. As ICE continues to play a central role in the enforcement of immigration laws, the training provided at FLETC will likely have lasting implications for both the officers and the communities they interact with.

In conclusion, the Federal Law Enforcement Training Center in Brunswick, Georgia, remains a critical institution in the training of federal law enforcement officers, particularly those involved in immigration enforcement. Its programs are essential in preparing recruits to meet the demands of their roles in an increasingly complex legal and social landscape, especially in the context of the Trump administration’s immigration policies.

Source: Original article

North Korea Constructs Secret Long-Range Missile Base Near China

North Korea has constructed a secret long-range missile base near the Chinese border, showcasing its commitment to enhancing its nuclear strike capabilities.

North Korea has reportedly established and is operating a significant long-range missile base close to its border with China. This facility is believed to house some of Kim Jong Un’s most advanced strategic weapons.

The existence of this missile base underscores the regime’s continued focus on advancing its nuclear capabilities. As tensions in the region persist, North Korea’s military developments remain a point of concern for neighboring countries and the international community.

Analysts suggest that the construction of this base reflects North Korea’s strategic priorities and its desire to bolster its deterrent capabilities in the face of perceived threats. The facility’s location near the Chinese border may also indicate a calculated move to leverage its relationship with China while enhancing its military posture.

The ongoing development of missile technology and infrastructure by North Korea has raised alarms among global powers, prompting discussions about security and stability in the region. As the country continues to refine its missile systems, the implications for regional security dynamics are significant.

In light of these developments, the international community remains vigilant, monitoring North Korea’s actions closely. The establishment of this missile base serves as a reminder of the challenges that lie ahead in addressing the complexities of North Korea’s military ambitions.

According to NDTV, the regime’s efforts to enhance its nuclear strike capabilities are evident in the construction and operation of this facility.

Source: Original article

Trump Sues WSJ for Libel Over Epstein Birthday Letters Report

President Donald Trump has initiated a $20 billion libel lawsuit against the Wall Street Journal over reports he allegedly gifted Jeffrey Epstein a note bearing his name and an image of a naked woman.

President Donald Trump has launched legal action against the Wall Street Journal and its reporters, seeking at least $20 billion in damages. The lawsuit, filed in a Miami federal court, accuses the publication of failing to adhere to journalistic standards in a story about a collection of letters allegedly gifted to Jeffrey Epstein, which included a note purportedly from Trump featuring an outline of a naked woman. Trump firmly denies authorship of the letter.

The 18-page lawsuit describes the Wall Street Journal’s alleged lapses, highlighting that the publication did not produce the drawing or the letter in their report, claiming their absence because “no authentic letter or drawing exists,” according to Trump’s attorney.

Trump expressed his intention to initiate legal proceedings promptly after the Journal’s article surfaced on Thursday, naming reporters Khadeeja Safdar and Joe Palazzolo as defendants. Trump also singled out Rupert Murdoch, owner of News Corp, during a Truth Social post, suggesting Murdoch had assured Trump he would manage the situation.

In response, Dow Jones, the Journal’s parent company, released a statement expressing confidence in the report’s accuracy and pledging to defend against the lawsuit vigorously.

Scrutiny has intensified lately concerning Trump’s past association with Epstein, the deceased convicted sex offender who died in a Manhattan jail in 2019 awaiting trial for federal sex trafficking charges. Amid his 2024 campaign, Trump spoke about potentially releasing more files on Epstein, responding to right-wing voices demanding further transparency around Epstein’s controversial case.

A Justice Department memo published earlier this month dismissed the existence of any “client list” maintained by Epstein implicating influential men in illegal activities. However, the absence of such a list has disappointed many of Trump’s supporters, creating a rift within his MAGA base.

The president’s relationship with media mogul Rupert Murdoch, who also owns Fox News, has been characterized by fluctuating dynamics over the years. Trump has repeatedly been a focal point in Murdoch’s media outlets, including Fox News, which prominently features Trump’s daughter-in-law, Lara Trump.

Facing ongoing legal battles with media entities, Trump seems undeterred, continuing to challenge stories he deems defamatory. Legal scholars note his presidency is one of the rare administrations seeing direct lawsuits from the president against media organizations.

First Amendment attorney Ted Boutrous mentioned that it is notably uncommon for a sitting president to sue a reporter or publication for defamation, emphasizing that the presidential “bully pulpit” often suffices in addressing grievances over alleged misrepresentations.

In 2024, Trump initiated legal actions against multiple media outlets during his reelection campaign. A notable instance involved ABC and claims from George Stephanopoulos regarding a jury’s findings in E. Jean Carroll’s case. ABC’s parent company, Disney, settled with Trump, setting a precedent for future settlements linked to Trump’s presidential library funding.

Trump recently withdrew a lawsuit against CBS News related to a “60 Minutes” segment, with Paramount agreeing to a payment as part of the settlement. Further settlements with Meta and X highlight Trump’s sustained focus on countering adversarial coverage.

Carl Tobias, a University of Richmond law professor, points to Trump’s approach as a tactical maneuver designed to instill caution among media outlets in their coverage of Trump and government matters, citing ongoing litigation as efforts that challenge First Amendment freedoms.

Following the lawsuit’s filing, Trump noted on Truth Social his anticipation of Murdoch and his associates undergoing extensive depositions and testimonies as part of the proceedings.

Source: Original article

Human Rights Group Petitions Against Minority Harassment in Bangladesh

The Human Rights Congress for Bangladesh Minorities has filed a Public Interest Litigation with the High Court, claiming pervasive misuse of legal processes to target and disenfranchise religious minorities in Bangladesh.

The Human Rights Congress for Bangladesh Minorities (HRCBM) has initiated a Public Interest Litigation (PIL) in the High Court of Bangladesh, asserting that the legal system is being exploited to harass and dispossess Hindus and other religious minorities in the country.

In a statement issued on Monday, HRCBM described the PIL filed at the High Court Division of the Bangladesh Supreme Court as not merely a legal maneuver but a profound appeal for justice. The group highlighted a backdrop where over 3.9 million criminal cases languish unresolved, with frequent misuse of prosecutorial powers.

A pointed example cited by HRCBM is the case of Chinmoy Krishna Brahmachari, a respected monk and social reformer. He remains detained on charges of sedition unlawfully initiated by a private individual—an action permissible only by the state under Section 196 of the Bangladeshi Code of Criminal Procedure.

Despite widespread agreement on the baselessness of these charges and rising public outcry, Brahmachari, also known as Chinmoy Prabhu, remains incarcerated. His bail application has been pending in the Appellate Division of the Supreme Court for several months while he has been implicated in additional alleged cases, including false murder accusations.

The organization questioned whether his sole offense was speaking truth to power and advocating for the marginalized communities in Bangladesh. According to HRCBM, his ongoing legal troubles exemplify the broader state inaction and adoption of a legal system that fails in its mission to deliver justice.

The HRCBM’s thorough investigation covered 15 criminal cases filed between October 31 and December 19, 2024. These cases reportedly implicated 5,701 individuals, many charged without specific allegations, listed under vague First Information Reports (FIRs). The organization stated that such broad accusations, especially against unnamed suspects, are often used by police and local actors to unjustly target minority community members, with this tendency notably prevalent in Chittagong and other urban centers.

The group argued that these actions not only contravene constitutional rights but further isolate already marginalized populations. The HRCBM stressed that religious minorities in Bangladesh have historically endured cycles of violence, displacement, and legal persecution. The current misuse of criminal charges, they contend, represents a novel form of systemic oppression—silent yet extensive in its impact.

Through its PIL, the HRCBM is urging the judiciary to cease arbitrary applications of FIRs, enforce initial inquiries in susceptible cases, take disciplinary measures against officers engaged in malicious prosecutions, and establish a judicial inquiry or commission to scrutinize and document the misuse of criminal charges against minorities, according to IANS.

Source: Original article

Ex-White House Doctor Refuses to Testify in Biden Investigation

Dr. Kevin O’Connor, former President Joe Biden’s longtime physician, has declined to testify in a Republican-led investigation into Biden’s health, citing physician-patient confidentiality and his Fifth Amendment rights.

Dr. Kevin O’Connor, who was former President Joe Biden’s physician throughout his presidency, has refused to testify in a Republican-led congressional inquiry regarding Biden’s health while in office. The deposition was scheduled before the House Committee on Oversight and Government to investigate what some Republicans label as “the cover-up of President Joe Biden’s cognitive decline.”

O’Connor declined to take the stand at the deposition scheduled for Wednesday, invoking physician-patient privilege and his Fifth Amendment rights. His legal team asserted that the decision was essential given “the unique circumstances of this deposition.”

Speculation about Biden’s health, particularly his cognitive state, persisted during his presidency. New reports following his departure from office claim that his staff may have concealed his health issues, a situation further complicated by Biden’s recent announcement of a cancer diagnosis. These developments have intensified calls for clarity from GOP lawmakers.

In a statement to the committee, O’Connor emphasized that participating in the investigation would contravene his professional duty to maintain confidentiality and could lead to the revocation of his medical license. “Dr. O’Connor will not violate his oath of confidentiality to any of his patients, including President Biden,” the statement read.

Chair of the committee, Rep. James Comer, R-Ky., criticized O’Connor for resorting to the Fifth Amendment, insisting that “the American people demand transparency.” He expressed intentions to gather further testimony from former Biden officials, such as ex-White House Press Secretary Karine Jean-Pierre, and former senior advisers Anita Dunn and Michael Donilon. Interviews with Ronald Klain and Jeff Zients, who both served as Biden’s chief of staff at different times, have also been requested.

Despite criticism, O’Connor’s attorneys highlighted that President Trump had previously invoked his Fifth Amendment right in a 2022 deposition during a New York State Attorney General investigation. Trump had noted, “anyone in my position not taking the Fifth Amendment would be a fool, an absolute fool.”

Biden publicly addressed and refuted the claims of cognitive decline in the last year of his presidency during a May appearance on ABC’s The View.

Original article

Trump Faces Prospect of Rikers Island Imprisonment Amid Trial: Experts Weigh In

In the event that Donald Trump continues to test the patience of the judge overseeing his hush money trial, there’s a possibility he might find himself back in his native New York City borough of Queens – more precisely, within the confines of the prison on Rikers Island, as indicated by experts on Monday.

Judge Juan Merchan, in response to Trump’s repeated breaches of a gag order prohibiting him from disparaging witnesses or the jury, cautioned the former president about the potential for imprisonment “if necessary” for further infractions.

While Merchan did not specify the exact facility, inquiries regarding Trump’s possible detention at Rikers prompted Frank Dwyer, the jail’s chief spokesperson, to assert that suitable accommodations would be arranged by the department.

Trump has persistently argued that he is a victim of a skewed justice system, claiming unfair treatment compared to others. Conversely, critics argue the opposite, suggesting that Trump’s public statements would have led any other defendant to incarceration by now.

The notion of Trump facing imprisonment while under trial is bound to evoke intense reactions from both his supporters and detractors. Trump’s repeated attempts to leverage the specter of imprisonment for fundraising underscore the potent emotional response it elicits from his base.

Mike Lawlor, an expert in criminal justice at the University of New Haven, outlined Rikers as the probable destination should Merchan pursue this course of action. Lawlor, a Democrat and former Connecticut House member, emphasized Merchan’s aim to curb contempt and prevent Trump from intimidating witnesses and jurors.

Lawlor elaborated on the objective of isolating Trump from his social media platform through incarceration, suggesting that imprisonment would achieve this end. He mentioned that Trump would be placed in protective custody, precluding interaction with other inmates, and limiting contact to corrections officers and his Secret Service detail.

Although Trump’s potential detention would mark an unprecedented occurrence at Rikers, Lawlor noted that the facility has experience housing high-profile individuals, including the elderly like Trump.

The former president’s former chief financial officer, Allen Weisselberg, currently serves time at Rikers, having been sentenced last month for perjury during Trump’s civil fraud trial.

Moreover, Trump would undergo standard intake procedures, including physical measurements publicly recorded, Lawlor explained.

Regarding the Secret Service’s role, Lawlor emphasized their primary duty of protecting Trump from harm, suggesting that a prison setting might streamline their responsibilities.

Martin F. Horn, a professor emeritus at John Jay College of Criminal Justice, echoed Lawlor’s sentiments, envisioning Trump’s confinement in a facility separate from other inmates to accommodate his security detail.

Nonetheless, ensuring a former president’s safety behind bars presents an unprecedented challenge for the Secret Service, according to a spokesperson for the agency.

Merchan may hesitate to incarcerate Trump for another reason, suggested Dave Aronberg, a state attorney for Palm Beach County. Aronberg implied that imprisonment might align with Trump’s narrative of victimhood, potentially bolstering his support base.

An alternative to imprisonment, proposed by former federal prosecutor Michael Zeldin, involves confining Trump to a cell near the New York City courtroom where his trial unfolds, serving as a symbolic reminder of the consequences of breaching court orders.

House arrest remains a feasible option, though Merchan retains considerable discretion in determining Trump’s confinement location, Horn remarked.

Lawlor dismissed the possibility of Trump being confined to his opulent Manhattan residence, citing concerns about continued access to electronics and aides, thus facilitating defiance of court orders.

Ultimately, Merchan faces a weighty decision regarding Trump’s punishment for his repeated violations, with potential implications for both the trial’s proceedings and the broader political landscape.

Supreme Court Emphasizes Life and Liberty in Kejriwal Arrest Case Amidst Election Timing Concerns

The Supreme Court emphasized the paramount importance of life and liberty during a hearing regarding Delhi Chief Minister Arvind Kejriwal’s challenge against his arrest by the Enforcement Directorate (ED) in a money laundering case related to the alleged Delhi excise policy scam. Justices Sanjiv Khanna and Dipankar Datta directed the central agency to delve into the timing of Kejriwal’s arrest, particularly concerning the ongoing Lok Sabha elections. The bench adjourned the matter till May 3.

Senior advocate Abhishek Manu Singhvi argued during the proceedings that the ED had not recovered any “proceeds of crime” and emphasized the high threshold for arrest under the Prevention of Money Laundering Act, 2002 (PMLA). He asserted that mere non-cooperation should not warrant Kejriwal’s incarceration.

In response, the ED contended in its affidavit before the Supreme Court that arresting politicians who are involved in criminal activities does not impede free and fair elections.

Meanwhile, the Delhi High Court stated on Monday that Kejriwal’s decision to continue as Chief Minister despite his arrest was his personal choice. However, the court emphasized that this should not obstruct the provision of free textbooks, writing material, and uniforms to underprivileged school children.

The Delhi High Court had previously ruled on April 9 that there was no illegality in Kejriwal’s arrest by the ED, citing sufficient evidence including statements from approvers, involvement of middlemen, and indications of cash exchanges for the 2022 Goa elections.

Currently, Kejriwal is in judicial custody at Tihar jail in New Delhi, with his detention extended until May 7 by a Delhi court on April 23.

During the hearing, the Supreme Court delved into various aspects of the case. Justice Khanna raised concerns about the timing of Kejriwal’s arrest, particularly in the context of ongoing elections, highlighting the significance of life and liberty. Singhvi, representing Kejriwal, referred to safeguards outlined in the PMLA against vexatious arrests and the lack of proceeds of crime recovered by the ED.

Singhvi also highlighted discrepancies in the statements of approvers and witnesses, arguing that they were hearsay and lacked direct evidence against Kejriwal. He pointed out instances where bail was granted to co-accused after they made incriminating statements against Kejriwal, suggesting coercion.

Additionally, Singhvi emphasized the subjective evaluation criteria for arrest under Section 19 of the PMLA, asserting that it requires the probe officer to have a reason to believe in the accused’s guilt, not just suspicion.

The Supreme Court will resume hearing the matter on May 3, as the legal battle surrounding Kejriwal’s arrest continues amidst political and legal intricacies.

-+=