#leaked-texts

[ follow ]
#data-privacy
fromZDNET
7 hours ago
Privacy professionals

A data removal service helped me reclaim my privacy - see if you need one, too

Personal data is collected and sold by brokers, making removal services essential for protecting sensitive information.
Privacy professionals
fromZDNET
7 hours ago

A data removal service helped me reclaim my privacy - see if you need one, too

Personal data is collected and sold by brokers, making removal services essential for protecting sensitive information.
US news
fromSecuritymagazine
5 days ago

Top Secret Clearance Holder Charged With Leaking Classified National Defense Information

Courtney Williams was arrested for allegedly sharing classified national defense information with unauthorized individuals, including a journalist, from 2022 to 2025.
#police-misconduct
fromwww.bbc.com
4 days ago
London politics

Officer sacked for 'appalling' remarks on Panorama

A police officer was dismissed for making inappropriate comments and using force against a detainee during an undercover investigation.
London politics
fromwww.bbc.com
4 days ago

Officer sacked for 'appalling' remarks on Panorama

A police officer was dismissed for making inappropriate comments and using force against a detainee during an undercover investigation.
#data-breach
Los Angeles
fromLos Angeles Times
4 days ago

How thousands of sensitive LAPD files got leaked online - and what happens next

A significant data breach exposed sensitive LAPD files and other records, attributed to the hacking group WorldLeaks.
Information security
fromSecuritymagazine
6 days ago

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

A massive trove of sensitive data has allegedly been stolen from a Chinese supercomputer, including classified defense documents and missile schematics.
Privacy professionals
fromTechCrunch
6 days ago

Hackers steal and leak sensitive LAPD police documents | TechCrunch

Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
Privacy professionals
fromTheregister
5 days ago

Capita's pension portal exposes civil servants' private data

Capita limited online functionality of the Civil Service Pensions Scheme member portal after a data breach exposed personal information of public sector workers.
Social media marketing
fromHer Campus
5 days ago

They Knew, They Didn't Care, & We Are All Paying For It

Social media platforms like Instagram have been found liable for mental health damage to young users, with internal documents revealing harmful strategies targeting teens.
SF politics
from48 hills
5 days ago

Why is the City Attorney's Office 'investigating' a leaked document? It's unprecedented and alarming - 48 hills

Confidential leaks are integral to democracy, despite attempts by politicians to control information.
Independent films
fromInverse
5 days ago

Behind The Unbelievable True Story Of A Forgotten Phone Hacker

Rachael Morrison created a documentary about Joybubbles, a pioneering phone hacker, to highlight his forgotten contributions to technology and culture.
Apple
fromTheregister
5 days ago

Security reserchers tricked Apple Intelligence into cursing

Apple Intelligence can be hijacked through prompt injection, exposing millions of users to risk, but a fix was implemented in iOS 26.4 and macOS 26.4.
Healthcare
fromArs Technica
6 days ago

Trump admin makes sweeping request for medical records of federal workers

The Trump administration plans to collect sensitive medical records from millions of federal workers and retirees, raising legal and health policy concerns.
#ice
fromEngadget
2 days ago
Privacy professionals

The US government wants Reddit to snitch on one of its users through a grand jury

#meta
EU data protection
fromTNW | Apps
6 days ago

Former Meta engineer probed over 30,000 private Facebook photos

A former Meta engineer is under investigation for extracting 30,000 private Facebook photos by bypassing security checks.
EU data protection
fromTNW | Apps
6 days ago

Former Meta engineer probed over 30,000 private Facebook photos

A former Meta engineer is under investigation for extracting 30,000 private Facebook photos by bypassing security checks.
#cybersecurity
Information security
fromThe Hacker News
2 weeks ago

Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

A critical Citrix vulnerability is actively exploited, and the FBI confirms a hack of Director Kash Patel's email account by an Iran-linked group.
Information security
fromThe Hacker News
5 days ago

Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region

A hack-for-hire campaign linked to the Indian government targeted journalists and activists in the MENA region through phishing attacks.
Information security
fromThe Hacker News
2 weeks ago

Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

A critical Citrix vulnerability is actively exploited, and the FBI confirms a hack of Director Kash Patel's email account by an Iran-linked group.
Privacy professionals
fromwww.bbc.com
13 hours ago

Palantir defends its record as MPs demand more scrutiny of data use

Palantir defends its NHS data contracts amid scrutiny, emphasizing its role in integrating fragmented healthcare systems and ensuring data security.
Remote teams
fromTheregister
2 weeks ago

Security contractor blew the whistle on shabby support crew

Brad, a security contractor, faced challenges with antivirus alerts while working in a labor hire company's office without proper IT support.
Venture
fromTechCrunch
2 weeks ago

Delve whistleblower strikes again, with alleged receipts about 'fake compliance' | TechCrunch

Delve's CEO denies allegations of faking compliance evidence amid accusations from an anonymous source presenting alleged proof.
US news
fromabc7ny.com
5 days ago

Former Army worker arrested after allegedly leaking classified information to journalist

A North Carolina woman is accused of sharing classified military information with a journalist for a book, raising legal and ethical concerns.
UK politics
fromwww.independent.co.uk
2 weeks ago

Peter Mandelson to be asked to hand over messages on personal phone

The Independent provides critical journalism on key issues without paywalls, relying on donations to support reporting efforts.
#peter-mandelson
UK politics
fromwww.theguardian.com
2 months ago

Where r u? I miss you': how vivid new Epstein emails sealed Mandelson's fate

Peter Mandelson had an intimate, intertwined relationship with Jeffrey Epstein that likely ends his political career amid calls for investigation.
UK politics
fromwww.theguardian.com
2 months ago

Mandelson could face police inquiry over alleged leak to Epstein

Peter Mandelson allegedly leaked confidential UK government market-sensitive information to Jeffrey Epstein during the financial crisis, prompting investigations and police reports.
UK politics
fromwww.theguardian.com
2 weeks ago

Cabinet Office to ask Mandelson to provide messages from personal phone

Peter Mandelson will be required to provide messages from his personal phone for an investigation into his appointment as ambassador to the US.
Media industry
fromAxios
3 weeks ago

Joe Kent under FBI investigation for alleged leaks

National Counterterrorism Center leader Joe Kent resigned while under FBI investigation for suspected classified information leaks to conservative media figures regarding Israel, Iran, and other sensitive matters.
UK politics
fromwww.theguardian.com
2 weeks ago

Would Morgan McSweeney's stolen mobile have Mandelson messages on it?

Morgan McSweeney's phone theft raises concerns due to its potential contents related to Peter Mandelson and implications for Keir Starmer's office.
fromSecuritymagazine
3 weeks ago

Trump's Former Counter-Terrorism Official Investigated Over Alleged Leaks

Joe Kent, President Trump's former top counter-terrorism official, is under investigation by the FBI's Criminal Division for allegedly improperly sharing classified information. The investigation began months before Kent's recent resignation, according to four individuals with direct knowledge of the probe who spoke to Semafor.
US politics
fromwww.theguardian.com
3 weeks ago

Police were too busy' to investigate theft of Morgan McSweeney's phone despite potentially sensitive contents

The theft of McSweeney's work phone means his WhatsApp messages and texts to Mandelson cannot be examined, raising concerns about the sensitivity of the information.
UK politics
Privacy professionals
fromThe Verge
1 week ago

Pinterest said he violated laid-off colleagues' privacy. Now he's going public

A former Pinterest engineer claims he was unjustly fired for sharing a tool that revealed employee layoffs.
Law
fromAbove the Law
1 month ago

Hate To Say I Told You So Again: Your Chats Ain't Private - Above the Law

Communications with GenAI platforms lack attorney-client privilege protection because they occur between a client and a machine, not a lawyer, and are not confidential under platform terms of service.
fromTechCrunch
2 weeks ago

Convicted spyware chief hints that Greece's government was behind dozens of phone hacks | TechCrunch

I believe a conviction without evidence is not ⁠justice, it could be part of a cover-up and even a crime. I am willing to share evidence with national and international regulators.
Privacy professionals
Information security
fromTheregister
1 month ago

Hackers: Democracy's last line of cyber defense

The hacker mindset—analytical curiosity combined with systemic thinking—can defend democracy by creating decentralized communication tools that resist censorship and empower oppressed communities.
#ai-security
World news
fromDataBreaches.Net
2 months ago

Under Pressure: Exploring the effect of legal and criminal threats on security researchers and journalists - DataBreaches.Net

Most surveyed journalists and security researchers face legal or criminal threats, yet most do not retract or change their work in response.
UK news
fromComputerWeekly.com
1 month ago

Police created 'intelligence profile' of BBC journalist subject to phone surveillance | Computer Weekly

The PSNI unlawfully created detailed intelligence profiles and conducted sustained surveillance of BBC journalist Vincent Kearney between 2006 and 2014 to identify his confidential journalistic sources.
fromQueerty
2 months ago

A leaked Barry's memo, ICE & a whole lot of outrage - Queerty

A portion of a memo that Barry's sent to instructors last year about how to handle ICE is being shared across Reddit and social media. The snippet lists seven instructions, including remaining calm, stopping the class and staying at the podium. "Do not take responsibility for anybody other than yourself," it directs. The document goes on to say the studio leader will handle communication with ICE and clients.
LGBT
fromComputerworld
1 month ago

FBI wiretap system tapped by hackers

The FBI identified and addressed suspicious activities on FBI networks, and we have leveraged all technical capabilities to respond.
Information security
US politics
fromEmptywheel
2 months ago

Quantum Leaps: The So-Called Whistleblower That Got NSA's Top Mathematician Fired

Tulsi Gabbard fired a top NSA mathematician based on a disorganized whistleblower complaint whose claims conflict with other officials' reviews.
Law
fromabovethelaw.com
2 months ago

Hacked Database To Match Their Hack Opinions - See Also

Repeated hacks of the Supreme Court, a former Biglaw partner accused of murdering his wife, an xAI deepfake investigation, and a citation-bias dispute.
Media industry
fromwww.mediaite.com
2 months ago

Leaked Emails Show Concern' in CBS Newsroom Over ICE Agent Internal Bleeding' Exclusive: Report

CBS newsroom debated publishing anonymously sourced claims that ICE agent Jonathan Ross suffered internal bleeding after shooting Renee Nicole Good.
Privacy professionals
fromenglish.elpais.com
1 month ago

How the CIA used a former Spanish soldier to keep tabs on Julian Assange

A Spanish security company owner conducted illegal surveillance of Julian Assange at Ecuador's London embassy on behalf of the CIA, placing hidden microphones and monitoring his communications.
#press-freedom
fromDataBreaches.Net
2 months ago
Privacy technologies

When the GDPR is weaponized to shut journalists up, don't go silently into that dark night - DataBreaches.Net

fromDataBreaches.Net
2 months ago
Privacy technologies

When the GDPR is weaponized to shut journalists up, don't go silently into that dark night - DataBreaches.Net

fromTechCrunch
1 month ago

Hacker broke into FBI and compromised Epstein files, report says | TechCrunch

An unidentified foreign hacker broke into the FBI's field office in New York in 2023 and compromised files related to the bureau's investigation into the sex offender Jeffrey Epstein, according to Reuters. The hack took advantage of a server at the Child Exploitation Forensic Lab in the FBI's New York Field Office that was left inadvertently vulnerable by an FBI special agent working on the case.
Privacy professionals
fromEmptywheel
2 months ago

NSA Probably Doesn't Have ALL of Hillary's Emails ... But Maybe Someone Should

I'm among those who believes Hillary Clinton's use of a privately run email server is an abuse of power. Doing so appears to have skirted laws ensuring good governance and it may well have exposed her communications to adversaries (including some who would have reason to use the contents of her email to help Republicans win the White House), even if her email would have been just as targeted at State, per reports about persistent hacking of it.
Privacy professionals
fromwww.mediaite.com
1 month ago

Whistleblower Alleges Frmr DOGE Employee Absconded With Americans' Private Data

A former DOGE staffer allegedly planned to share sensitive Social Security databases containing records of over 500 million Americans with his private employer, potentially constituting an unprecedented security breach.
Privacy technologies
fromWIRED
1 month ago

How to Organize Safely in the Age of Surveillance

Grassroots organizing requires careful tradeoffs between openness and security to protect participants from extensive government surveillance and corporate data cooperation.
fromwww.bbc.com
1 month ago

Mandelson referred to EU anti-fraud agency over Epstein emails

The emails published by the US government last month suggest the 72-year-old peer gave Epstein advance notice of an imminent 500bn (438bn) bailout to save the ailing euro in 2010. The European Commission spokeswoman told the BBC that, as a member of the Commission, Lord Mandelson had been subject to obligations under a code of conduct.
UK politics
Information security
fromEmptywheel
2 months ago

I Con the Record Admits All This Spying Also Serves Counterintelligence

The Intelligence Community uses online anonymity and networking tools to collect foreign intelligence, including counterintelligence and cybersecurity, while asserting legal limits on targeting US citizens.
fromwww.theguardian.com
2 months ago

Pentagon contractor indicted over alleged leak tied to raided Washington Post reporter

According to the justice department, Aurelio Luis Perez-Lugones illegally provided sensitive and secret information related to national defense to a reporter who it says then wrote and published at least five articles using it. The indictment was not immediately available, and a press release announcing five charges against Perez-Lugones of mishandling classified information did not identify the journalist or their employer.
US politics
Privacy professionals
fromTechRepublic
1 month ago

Hacktivists Claim DHS Breach, Leak 6,600+ ICE Contractor Records

A hacktivist group claimed to breach DHS systems and released thousands of ICE contractor records identifying major technology and defense companies involved in federal immigration enforcement.
fromDataBreaches.Net
1 month ago

Leaked Data Raises Questions About Hackers' Claims and Moldova's Prior Denial - DataBreaches.Net

The Compensatii platform enables residents to register and apply for compensation for energy bills, including heating, natural gas, and electricity, during the colder months. To register, applicants need to provide: The name, surname, and IDNP of all persons residing in the declared household; Data from energy consumption invoices; Mortgage loan amount and cadastral number (if applicable); The monthly income of each member for the months of April-September; Personal IBAN account for transferring the compensation.
US politics
fromTechCrunch
1 month ago

Homeland Security reportedly sent hundreds of subpoenas seeking to unmask anti-ICE accounts | TechCrunch

DHS increasingly uses administrative subpoenas to compel tech platforms to identify anonymous social media accounts that criticize ICE or reveal locations of ICE agents.
Privacy professionals
fromDataBreaches.Net
1 month ago

Hacktivists claim to have hacked Homeland Security to release ICE contract data - DataBreaches.Net

Hacktivists claiming to be 'Department of Peace' breached DHS and leaked contracts between the agency, ICE, and over 6,000 companies including defense and tech firms.
Information security
fromTechCrunch
2 months ago

Exclusive: Hacktivist scrapes over 500,000 stalkerware customers' payment records

More than 536,000 customer payment records from Struktura's stalkerware services were scraped, exposing emails, partial card details, and purchased surveillance app subscriptions.
fromWIRED
2 months ago

Jeffrey Epstein Had a 'Personal Hacker,' Informant Claims

As the standoff between the United States government and Minnesota continues this week over immigration enforcement operations that have essentially occupied the Twin Cities and other parts of the state, a federal judge delayed a decision this week and ordered a new briefing on whether the Department of Homeland Security is using armed raids to pressure Minnesota into abandoning its sanctuary policies for immigrants.
US politics
fromTechCrunch
1 month ago

Hacktivists claim to have hacked Homeland Security to release ICE contract data | TechCrunch

Why hack the DHS? I can think of a couple Pretti Good reasons! I'm releasing this because the DHS is killing us and people deserve to know which companies support them and what they're working on.
Privacy professionals
fromBusiness Insider
2 months ago

Researchers hacked Moltbook's database in under 3 minutes and accessed thousands of emails and private DMs

Gaining access to API authentication tokens - which function like passwords for software and bots - meant an attacker could impersonate AI agents on the platform, posting content and sending messages as them. Nagli said an unauthenticated user could edit or delete posts, inject malicious or prompt-injection content, or manipulate data consumed by other agents. Nagli said the incident highlights the risk of vibe coding. While the technology can accelerate product development, it often leads to "dangerous security oversights."
Information security
US politics
fromArs Technica
2 months ago

FBI fights leaks by seizing Washington Post reporter's phone, laptops, and watch

The FBI executed a search warrant at reporter Hannah Natanson's Virginia home, seizing multiple devices during an investigation into illegally leaked Pentagon contractor information.
fromTechCrunch
2 months ago

Supreme Court hacker posted stolen government data on Instagram | TechCrunch

Moore accessed those systems using stolen credentials of users who were authorized to access them. Once he gained access to those victims' accounts, Moore accessed and stole their personal data and posted some online to his Instagram account: @ihackthegovernment. In the case of the Supreme Court victim, identified as GS, Moore posted their name and "current and past electronic filing records."
Information security
fromAxios
2 months ago

How protesters are weaponizing data against ICE

The trove appears to be the largest known breach of Department of Homeland Security staff data. It follows the killing of Renee Good in Minneapolis. "It is a sign that people aren't happy within the U.S. government, clearly," ICE List founder Dominick Skinner told the Daily Beast. Homeland Security Secretary Kristi Noem and other officials have condemned the "doxing" of agents and threatened to prosecute offenders.
Information security
Information security
fromDataBreaches.Net
2 months ago

How a hacking campaign targeted high-profile Gmail and WhatsApp users across the Middle East - DataBreaches.Net

A WhatsApp phishing campaign targeted Iran-related activists during the country’s longest nationwide internet shutdown amid widespread protests.
Information security
fromNextgov.com
1 month ago

Chinese telecom hackers likely holding stolen data 'in perpetuity' for later attempts, FBI official says

Chinese state-backed Salt Typhoon likely retains stolen telecom data indefinitely for surveillance, future exploitation, and aggregation with other exfiltrated information.
Privacy professionals
fromSecuritymagazine
2 months ago

Epstein Files Leak Sensitive Data, Victim Information, and Credentials

Government-retracted Epstein records exposed PII of about 100 victims, leaked financial data, passwords, and account credentials, leading to threats and alleged account compromises.
Privacy professionals
fromWIRED
2 months ago

How Data Brokers Can Fuel Violence Against Public Servants

Comprehensive state consumer privacy laws fail to protect public servants, enabling a data-to-violence pipeline by allowing public-source personal data to be sold and exposed.
[ Load more ]