recommended reading

Hackers Threaten a Texas Baby, Hit Miss Teen USA with Sextortion, Target an Indian Telecom

Even babies aren't safe from hackers.

Even babies aren't safe from hackers. // greggsphoto/

In case you missed our coverage this week in ThreatWatchNextgov’s regularly updated index of cyber breaches:

Stranger swears at sleeping toddler though hacked baby monitor

Two-year-old Allyson is deaf, so she did not wake up when a man began harassing her through the baby monitor in her room. Marc Gilbert and his wife entered the child’s room after hearing a man cursing and making lewd comments in the bedroom.  They heard the voice calling the daughter an “effing moron,” and telling her, “wake up you little slut.” Then, the hacker shouted expletives at them. The voice began calling Gilbert a stupid moron and his wife a b****.

Bitcoin robbers pocket $5,800 through Android wallet app glitch

Crooks have figured out how to steal the virtual currency by exploiting major vulnerabilities in Google’s mobile operating system, members of a user forum report.  

Dalai Lama’s site infected with spyware

Hackers have snuck malicious code into the website of the Central Tibetan Administration, a site belonging to the Dalai Lama’s government-in-exile, that can spy into the computers of site visitors.

New Miss Teen USA hit by sextortion scam before winning

Miss California Teen USA, Cassidy Wolf, who earned the title of Miss Teen USA on Aug. 10 was a victim of “a serious cybercrime” that has triggered a federal investigation. Four months earlier, a hacker took photos of her in her bedroom via the webcam on her computer, then began an extortion campaign.  

Pakistani agent suspected of impersonating Indian Army official to infect India’s telecom system

The Indian government alleges Pakistan’s Inter-Services Intelligence, or ISI, tricked the state-owned Bharat Sanchar Nigam Ltd. into installing malicious software on the company’s communications pipelines.

ThreatWatch is a regularly updated catalog of data breaches successfully striking every sector of the globe, as reported by journalists, researchers and the victims themselves. 

Threatwatch Alert

User accounts compromised

1 Million Online Gaming Accounts Exposed

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.