We’ve compiled a list of some of the most bizarre and controversial cases prosecuted under the Computer Fraud and Abuse Act.
Author: Kim Zetter
Hacking Wireless Printers With Phones on Drones
![Hacking Wireless Printers With Phones on Drones](http://www.wired.com/wp-content/uploads/2015/08/GettyImages-504079441-660x356.jpg)
Researchers have shown how attackers using a drone plus a mobile phone could intercept documents sent to Wi-Fi printers.
The post Hacking Wireless Printers With Phones on Drones appeared first on WIRED.
Scottrade Alerts 4.6 Million Brokerage Customers of Breach
![Scottrade Alerts 4.6 Million Brokerage Customers of Breach](http://www.wired.com/wp-content/uploads/2015/08/FEATURED-GettyImages-469257908-660x660.jpg)
The St. Louis-based brokerage firm Scottrade has been hit by a breach.
The post Scottrade Alerts 4.6 Million Brokerage Customers of Breach appeared first on WIRED.
When Security Experts Gather to Talk Consensus, Chaos Ensues
![When Security Experts Gather to Talk Consensus, Chaos Ensues](http://www.wired.com/wp-content/uploads/2015/09/GettyImages-482043092-story-660x440.jpg)
Tension between researchers and vendors over the disclosure of software security vulnerabilities has raged for two decades. A meeting to address that tension further highlighted the tension.
The post When Security Experts Gather to Talk Consensus, Chaos Ensues appeared first on WIRED.
That Big Security Fix for Credit Cards Won’t Stop Fraud
![That Big Security Fix for Credit Cards Won’t Stop Fraud](http://www.wired.com/wp-content/uploads/2015/09/GettyImages-89694078-660x446.jpg)
The new chip cards and readers won’t stop card fraud but will simply shift it to a different area.
The post That Big Security Fix for Credit Cards Won’t Stop Fraud appeared first on WIRED.
New Reports Describe More Mass Surveillance and Schemes to Undermine Encryption
![New Reports Describe More Mass Surveillance and Schemes to Undermine Encryption](http://www.wired.com/wp-content/uploads/2015/08/nsa-660x515.jpeg)
While a US government task was pondering ways to undermine encryption, British spies have been recording the browsing habits of Internet users.
The post New Reports Describe More Mass Surveillance and Schemes to Undermine Encryption appeared first on WIRED.
Hack Brief: Mobile Manager’s Security Hole Would Let Hackers Wipe Phones
![Hack Brief: Mobile Manager’s Security Hole Would Let Hackers Wipe Phones](http://www.wired.com/wp-content/uploads/2015/06/GettyImages-488632261-660x440.jpg)
The vulnerability in the SAP Afaria mobile management system affected all mobile phones used by 6,300 companies.
The post Hack Brief: Mobile Manager’s Security Hole Would Let Hackers Wipe Phones appeared first on WIRED.
A Bizarre Twist in the Debate Over Vulnerability Disclosures
![A Bizarre Twist in the Debate Over Vulnerability Disclosures](http://www.wired.com/wp-content/uploads/2015/09/GettyImages-481665916-660x660.jpg)
The FireEye vs. ERNW case, over disclosure of security vulnerabilities, is unique because it’s a face off between two security firms
The post A Bizarre Twist in the Debate Over Vulnerability Disclosures appeared first on WIRED.
The Feds Need a Warrant to Spy With Stingrays From Now On
![The Feds Need a Warrant to Spy With Stingrays From Now On](http://www.wired.com/wp-content/uploads/2015/09/GettyImages-143961079-660x451.jpg)
The federal government can no longer use controversial stingray devices to track mobile phone users without a warrant.
The post The Feds Need a Warrant to Spy With Stingrays From Now On appeared first on WIRED.
Snowden: Others Get Prosecuted for What Hillary Clinton Did
![Snowden: Others Get Prosecuted for What Hillary Clinton Did](http://www.wired.com/wp-content/uploads/2015/07/3724216419_6aeebc586e_o-660x504.jpg)
If anyone but Hillary Clinton had used a personal email server to send reportedly classified material, they would be prosecuted and lose their security clearance, Edward Snowden says.
The post Snowden: Others Get Prosecuted for What Hillary Clinton Did appeared first on WIRED.