Witnesses in southwestern Virginia say a car has driven into a crowd at a parade. Several people appear to be hurt, but the nature of their injuries wasn't immediately known.Full Story >
About 50 to 60 people were injured Saturday when a driver described by witnesses as an elderly man drove his car into a group of hikers marching in a parade in a small Virginia mountain town.Full Story >
Saturday, May 18 2013 6:15 PM EDT2013-05-18 22:15:38 GMT
Residents attending Maifest 2013 in Covington, Ky., will have the rare chance to touch a nearly 4-billion-year-old piece of moon rock at NASA's Driven to Explore traveling exhibit, a multimedia experienceFull Story >
Residents attending Maifest 2013 in Covington, Ky., will have the rare chance to touch a nearly 4-billion-year-old piece of moon rock at NASA's Driven to Explore traveling exhibit, a multimedia experience that immerses visitors in the story of NASA.Full Story >
CHARLOTTE, NC (WBTV) -
The BBB has a warning about the top five cyber threats in 2013.
The year ahead will feature new and increasingly sophisticated means to capture and exploit your personal information to steal your identity.
Computer hackers are already at work to find weaknesses in new and emerging technologies.
"People get very excited with new apps that expand their use of the Internet in ways that were previously not possible," said BBB President Tom Bartholomy. "However, the BBB urges you to proceed with caution when using new tech tools because they do not have a history of reliability and security."
The Better Business Bureau has the top five cyber threats expected in 2013:
Counterfeit QR Codes: A Quick Response Code is a barcode that you can scan with your smartphone and it directs you to websites or downloadable content. Similar to skimmers that fit over credit card machines to swipe your credit card, counterfeit QR Codes can be affixed over legitimate barcodes to download malware to your phone or lead you to unsecure websites.
Mobile Wallet Vulnerabilities: Near field communication (NFC) allows two devices to exchange data when they are in the proximity of each other. Smartphone manufacturers, retailers and airlines are beginning to use this information. The vulnerability of near field communication technology is that scammers may use scanners to capture stored credit card information when you are within range of their scanners without you even knowing it happened.
Cloud-Based Botnets: Cloud computing is a growing area of computer technology. The ‘cloud' offers you the ability to select the precise computing power you need. When you use cloud-computing technology, you are linked to other cloud users and this creates a massive virtual networks. Hackers exploit this linked network via phishing schemes which infect users' computers with viruses. The potential exists for hackers to infect this massive network with viruses that would steal credit card and personal information from the computers that are linked through the ‘cloud'.
Search History Poisoning: According to the Emerging Cyber Threats Report 2013 from Georgia Tech, compromised search histories can follow users from computer to computer which could increase the likelihood that you could visit malicious websites without knowing it.
Friday, May 17 2013 10:45 PM EDT2013-05-18 02:45:31 GMT
Continuing our exclusive coverage of the IRS scandal, FOX19 has obtained documents of a fifth Cincinnati IRS agent who reportedly came after a pro-life group in 2009. The group was asked about prayerFull Story >
Continuing our exclusive coverage of the IRS scandal, FOX19 has obtained documents of a fifth Cincinnati IRS agent who reportedly came after a pro-life group in 2009.Full Story >
Friday, May 17 2013 6:51 PM EDT2013-05-17 22:51:09 GMT
Transcribed interviews conducted by the House Committee on Oversight and Government Reform are set to begin Monday, May 20th for five IRS employees. Four of those IRS employees are based in Cincinnati.Full Story >
Transcribed interviews conducted by the House Committee on Oversight and Government Reform are set to begin Monday, May 20th for five IRS employees. Four of those IRS employees are based in Cincinnati. Full Story >
Friday, May 17 2013 7:16 PM EDT2013-05-17 23:16:53 GMT
One person has died in a crash near Harrisonville, MO, Thursday evening. The crash happened on Missouri Highway 7 and Walker Road. It involved a car and a tractor-trailer. Harrisonville is in Cass County.Full Story >
Savannah Nash celebrated her 16th birthday last week. She died Thursday when her car slammed into a semi while she was texting during her first time driving by herself.Full Story >
Saturday, May 18 2013 12:44 PM EDT2013-05-18 16:44:02 GMT
A bystander is in hot water after a late night crash in Middletown. Police say they were called to Verity Parkway to investigate a head on crash, An investigation revealed that a car driven by DanielFull Story >
An investigation revealed that a car driven by Daniel Guy Rich of Dallas, Texas had lost control and hit a PT Cruiser driven by a unnamed 17-year-old girl head on.
Wednesday, May 15 2013 9:50 PM EDT2013-05-16 01:50:03 GMT
The White House today released over 100 pages of emails regarding the attack in Benghazi. So what do those emails tell us? Members of congress and the President himself say it's all a side-show. WhileFull Story >
The White House today released over 100 pages of emails regarding the attack in Benghazi. So what do those emails tell us? Members of congress and the President himself say it's all a side-show. While others say the truth has still not been revealed. So what is true here? Full Story >
Saturday, May 18 2013 1:47 PM EDT2013-05-18 17:47:49 GMT
A fire badly damages an Anderson Township home. It happened early Saturday morning at a home in the 8000 block of Pine Terrace Drive. Fire officials say they got a call that smoke was coming from theFull Story >
Fire officials say there is significant damage to the home's first floor.Full Story >