FBI scam

As a long-time watcher of Nigerian 419 scams, I felt obliged to pass this beauty on. Enjoy. Anti-Terrorist And Monitory Crime Division.Federal Bureau Of Investigation.J.Edgar.Hoover Building Washington Dc Attn: Beneficiary, This is to Officially inform you that it has come to our notice and we have thoroughly Investigated with the Read more…

Smells like teen suicide

(via ORG-Discussion list and various other sources) A teenager in Florida has committed suicide while webcasting the event on video website Justin.tv. Reportedly, as many as 1,500 people were witnesing the event at one time, and some even encouraged the teenager with messages like this one: “Do it, do the Read more…

Twittering terrorists

From the same people who brought you The War on TerrorTM, comes the latest in terrorist tools: Twitter! Wired reports that an American intelligence outfit has been attempting to guess which tools might be used by terrorist to unleash death and destruction on an unsuspecting populace. GSM phones, chat software Read more…

Woman jailed for killing avatar

Internet news sites are abuzz with the report that a Japanese woman has been jailed after reportedly “killing” her virtual husband’s avatar after a virtual divorce. A 43-year-old Japanese piano teacher was virtually married to a 33-year-old office worker in the online game Maplestory – a cutesy Korean manga-style world. Read more…

Flame wars: defamation or assault?

(via Denis Magnusson) A Canadian court has issued an injunction against a stamp-dealer who posted threatening materials on the internet against Richard Warman, a human rights campaigner. The systematic hate campaign by one William Grosvenor included death threats, false accusations of sex with minors, photos of the victim’s home address, Read more…

The hackers strike back

Hacking is back in the news. The BBC reports that hackers in the U.S. infiltrated the computer networks of several companies and stole over forty million credit and debit card numbers. What is unusual about the case is that the hackers targeted their victim’s secure wireless access points, and therefore Read more…