Search results
Results from the WOW.Com Content Network
Lopatka was tortured and strangled to death on October 16, 1996, by Robert "Bobby" Frederick Glass, a computer analyst from North Carolina. The apparent purpose was mutual sexual gratification. The case was reportedly the first in which a police department arrested a murder suspect with evidence gathered primarily from email messages. [1]
He was the subject writer on computer crime for the Encyclopædia Britannica, Groliers Encyclopedia, Microsoft Encarta Encyclopedia, and the Encyclopedia of Computer Science. Parker lectured for the Commonwealth Club of San Francisco, Churchill Club of Silicon Valley, many universities, and the World Organization of Detectives.
He was convicted of three counts of murder and sentenced to death in 2007, and was executed by hanging in 2009. [48] Garry Francis Newman, a 50-year-old man, was convicted of the murder of 15-year-old Carly Ryan in 2007. He posed as "Brandon", a 20-year-old musician, and began an online relationship through online platforms MySpace and ...
Hans Thomas Reiser (born December 19, 1963) is an American computer programmer, entrepreneur, and convicted murderer.In April 2008, Reiser was convicted of the first-degree murder of his wife, Nina Reiser, who disappeared in September 2006.
Richard Francis Cottingham (born November 25, 1946) is an American serial killer who was convicted in New York State of six murders committed between 1972 and 1980 and convicted in New Jersey of twelve murders committed between 1967 and 1978. [1]
March: Computer systems in the city of Atlanta, in the U.S. state of Georgia, are seized by hackers with ransomware. They did not pay the ransom, [119] and two Iranians were indicted by the FBI on cyber crime charges for the breach. [120] The town of Wasaga Beach in Ontario, Canada computer systems are seized by hackers with ransomware. [121]
A Richland man, a cybersecurity expert and the stepfather of an accused murder suspect, faces a minimum of 17 years in prison for grooming and raping a teen girl for years.
The book also mentions other hackers who had contacts with the protagonists, among them Erik Bloodaxe of the Legion of Doom and Corrupt of the Masters of Deception. The first chapter of Underground relates the diffusion and reactions of the computer security community to the WANK worm that attacked DEC VMS computers over the DECnet in 1989 and ...