What to do if your Mac is stolen
If your Mac is lost or stolen, there are a number of things you should do to help retrieve it — or protect the information stored on it.Picture of a MacBook Air on a tableA Mac is an expensive piece of equipment, but sometimes, accidents or theft h.....»»
How to find AirPods that have been lost or stolen
Apple's Find My network can help users locate their lost or stolen AirPods. Here's how.Find My AirPodsAlmost every Apple product connects together to create a mesh network over Bluetooth, Wi-Fi, or Ultra Wideband. This crowdsourced network is called.....»»
Crime Blotter: "Mardi Gras bandits" arrested for stealing iPhones in New Orleans
In the latest Apple Crime Blotter, an Apple Store theft in New Jersey, a carjacker forces victim to drive home for Apple ID, and Nigerian celebrities fight over a stolen iPhone.The Apple Store in Short Hills, NJ The latest in an occasional AppleInsid.....»»
If both your iPhone and passcode get stolen, you"re in deep trouble
A new report highlights that when a thief has both an iPhone and the corresponding passcode, a user's entire digital life is at risk. While this is in no way new, there are some simple steps to mitigate the risk.iPhone passcodeThe "hack" involves the.....»»
As livestock theft becomes a growing problem in rural Australia, new technologies offer hope
Last week, it was reported that 700 sheep with an estimated value of $140,000, including nearly 200 valuable merino ewes, were stolen from a Victorian property in a highly sophisticated rural crime operation. Such large-scale rural theft is increasin.....»»
Hyundai and Kia cars could be stolen with just a USB cable
Millions of Hyundai vehicles in the US could be vulnerable to USB hotwiring, with Kia cars also affected......»»
Health info for 1 million patients stolen using critical GoAnywhere vulnerability
With exploit code in the wild and devastating results, organizations should patch pronto. Enlarge (credit: Getty Images) One of the biggest hospital chains in the US said hackers obtained protected health information for.....»»
Crime blotter: Man accused of using Siri in cop car to set up alibi
In the latest Apple Crime Blotter, the bust of Apple Store theft ring in California wasn't the first, iPads are stolen from a car near Graceland, and a real estate scam was centered on Apple products.The Palo Alto Apple Store The latest in an occasio.....»»
AirTag tracks car thieves, but vehicle wrecked during police chase
Police quickly tracked down a stolen car with the owner's AirTag inside, but the thieves then crashed it during a high-speed chase.Apple's AirTags have now been used countless times to help track down a stolen vehicle, and lead to thieves being arres.....»»
Clop ransomware had a rather handy flaw for Linux users to exploit
Linux users could easily retrieve data stolen by ransomware as its encryptor had some crucial flaws.....»»
A wave of tool theft spurs hi-tech security systems
Desperate to protect their tools from being stolen, tradespeople are considering sophisticated security systems......»»
Record $3.8 billion stolen in crypto hacks last year, report says
A record $3.8 billion worth of cryptocurrency was stolen from various services last year, with much of those thefts driven by North Korean-linked hackers, according to a report Wednesday from blockchain analytics firm Chainalysis......»»
Congress reintroduces bill to stop surge of catalytic converter thefts
The legislation aims to reduce catalytic converter thefts by requiring new vehicles to have the VIN stamped onto the converter, allowing law enforcement officers to link stolen parts to the originating vehicles......»»
Stolen League of Legends source code being ransomed, and Riot Games won’t pay
No player information or credentials were leaked in the attack, Riot Games says. Enlarge / The theft of Riot Games' source code for League of Legends, TeamFight Tactics, and an anti-cheat platform could have implications for futu.....»»
Millions of T-Mobile customers have data stolen in breach
T-Mobile said "basic" customer data was taken, but payment details remain secure......»»
Apple account recovery needs an overhaul: Here’s a simple suggestion
There have been numerous examples of people losing a lifetime’s worth of photos after being locked out of their iCloud account. The Apple account recovery process often proves impossible, especially in cases where an iPhone has been stolen and its.....»»
CircleCI confirms customer data was stolen in malware-powered hack
CircleCI employee with high privileges had their laptop compromised with token-stealing malware......»»
Crime blotter: Stolen iPhone flies to China, Alabama Apple Store theft, iPhone searches
In the latest Apple Crime Blotter, a stolen iPhone heads to China, a blind reporter grabs his iPhone back, and a man hit with child porn charges after an iPhone search.Apple Store in Birmingham, AL The latest in an occasional AppleInsider series, loo.....»»
Crime blotter: An Apple Store theft in Alabama and iPhone searches
In the latest Apple Crime Blotter, a stolen iPhone heads to China, a blind reporter grabs his iPhone back, and a man hit with child porn charges after an iPhone search.Apple Store in Birmingham, AL The latest in an occasional AppleInsider series, loo.....»»
6 oversights that enable data breaches
Personal employee or customer data accounted for nearly 45% of all data stolen between July 2021 and June 2022, while companies’ source code and proprietary information accounted for a further 6.7% and 5.6% respectively, according to Imperva. More.....»»
What Twitter’s 200 million email leak really means
Exposure of email addresses puts pseudonymous users of the social network at risk. Enlarge (credit: Rosie Struve; Getty Images) After reports at the end of 2022 that hackers were selling data stolen from 400 million Twit.....»»