Local police department gets $400K in state funding for violent crime reduction
State leaders have given local police thousands in grant funding to help address violent crimes.
[DOWNLOAD: Free WHIO-TV News app for alerts as news breaks]
The Dayton Police Department was awarded $400,000 as part of the state's latest round of the Ohio Violent Crime Reduction Grant Program.
The City of Dayton has announced plans to implement a violence interruption program targeting crime hot spots.
TRENDING STORIES:
Apple to pay $95 in million in Siri eavesdropping settlement; Here's how to file your claim
Deputies: Wood thrown at officers in high-speed chase; ends in wrong-way crash on I-75
18-year-old injured after car slams into Miami Co. home
'We're looking at areas of the North Main area and also some areas over in Westwood. Those are two primary areas,' Dayton Mayor Jeffrey Mims previously told News Center 7.
Other local agencies that received funding include the Auglaize County Sheriff's Office, Greene County Sheriff's Office, Logan Sheriff's Office, and Montgomery County Sheriff's Office.
[SIGN UP: WHIO-TV Daily Headlines Newsletter]
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
2 days ago
- Yahoo
Sixteen billion passwords may have been stolen. Here's how to protect yourself
TORONTO — A Lithuanian cybersecurity news outlet says it uncovered a leak of 16 billion passwords that may grant access to Apple, Google, Facebook accounts and more. Cybernews warns the data is "a blueprint for mass exploitation" because it could give cybercriminals unprecedented access to information that can be used for account takeovers, identity theft and highly targeted attacks. Here's what we know about the leak so far and how people can protect themselves from its repercussions. What do we know about the leak? Cybersecurity experts are strongly speculating that the data was leaked through infostealers, said Robert Falzon, head of engineering at security software firm Check Point. Infostealers are pieces of malware users are duped into clicking on, which then install something on their computer, "which just kind of sits and listens to the computer while you're typing things from the keyboard." The malware can detect when you're logging into an account and can copy whatever you've input to send it to a database of credentials hackers compile. "As a result of that, we end up with these giant repositories on the dark net filled with lists and lists and lists of usernames and passwords and credentials that have been stolen from users all around the world and that are being bought and sold as commodities," Falzon said. Is all this leaked data new? That's up for debate. Cybernews says "the data is recent, not merely recycled from old breaches," but others disagree. "It's really hard to track the providence of all of it," Falzon said, because some hackers package data together from several leaks to resell. The only way to figure out how new it is would be to obtain other leaks and cross compare the data. Why is it worrisome? 'If hackers manage to get their hands on your password for Google, Apple, or Facebook, stealing your money and identity may be easier than taking candy from a three-year-old," Ignas Valancius, head of engineering at cybersecurity company NordPass, said in a press release. That's because hackers use the logins they obtain for credential stuffing — a practice where criminals get access to accounts by inputting stolen login information into websites. If you reuse your passwords across several websites or services, it may mean a hacker can get into your bank account and steal money, your favourite retailer accounts and drain you of your loyalty points or even find your address and birthday and use it for identity theft, Falzon said. How can I find out if my data was in the breach? Figuring out if you've been a victim of the breach would take obtaining the data and searching through it for your credentials. Because only an "extreme minority" of people have never been breached in general, Falzon said you're always best off assuming your info is part of the leak. What can Canadians do to protect themselves? Cybersecurity experts are unanimous in advising people to change their passwords regularly, especially after leaks to avoid becoming the victim of credential stuffing. But long before a breach happens, they say there are several things people can do to protect themselves. The most obvious is varying your passwords and avoiding reusing them. When you recycle passwords across several websites or services or make them easy to guess, it means hackers won't have much of a struggle accessing many of your accounts. Multifactor authentication can also offer a layer of security. When someone attempts to login to an account, it forces them to enter a code sent by email or text before they can get access. The process helps users thwart hacking attempts. I have so many accounts to keep track of and changing my passwords with every breach is making it hard to remember them all. What can I do? Some cybersecurity experts are fans of password managers. These services create strong, unique passwords for each account you have. Then, the manager stores them in an encrypted account you can quickly access anytime you need to enter a password. However, other experts argue password managers can have varying levels of encryption and warn that if the one you are using is breached, all of your passwords may be vulnerable. So what else can I do? Many experts advise people to use passkeys, when possible. Passkeys are digital credentials able to unlock accounts with a mere flash of your face or fingerprint scan on your phone. They are considered to be more secure than passwords because there is no string of characters, numbers and symbols to memorize, making them harder to hack. They don't need to be changed, can't be stolen by someone guessing or peeking over your shoulder and there's no way to accidentally use one on the wrong website. Not all websites and services accept passkeys but several big players like Apple, Shopify, Microsoft, DocuSign and PayPal do. This report by The Canadian Press was first published June 20, 2025. Tara Deschamps, The Canadian Press


Forbes
2 days ago
- Forbes
FBI Warning—All Smartphone Users Must Delete These Messages
The threat is worse than the headlines suggest. A raft of news stories this week (1,2,3) report on the FBI warning 150 million Apple users to delete texts on their iPhones. Unfortunately the reality is even worse than those headlines suggest. Here's what you need to know and what you should do. Right now, your cell phone is vulnerable to an ongoing attack that will come to you by way of text messages warning of dire consequences if you don't respond right away. Text messages that include links to pay outstanding bills or fines. All of this is made up, of course, but you pay nonetheless because you're worried — that's the idea. These messages include unpaid tolls and newer DMV traffic offenses, but will soon widen the net to mimic texts from your bank or credit card company. It's against this backdrop that we have seen headlines urging America's iPhone users specifically to delete the latest raft of DMV texts as soon as they're received. The malicious texts are sent courtesy of organized Chinese criminal gangs that operate beyond the reach of U.S. law enforcement. They harness countless phone numbers from multiple countries and domains from multiple providers. Despite network filtering and iOS and Android spam detection, the tidal wave of texts seemingly can't be stopped. Google has confirmed new AI-powered scam detection on its phones, and we await to see if this filters the threat or can be worked around. The FBI's warning to delete all these co-called smishing texts came in an advisory last year, issued in the wake of the original unpaid toll scam that has now swept across America from state to state. Any such texts, it said, should be deleted from phones. But that applies to iPhone and Android users — to all smartphone users. There are some iPhone specifics — the OCGs prefer iMessage to SMS, albeit they like RCS as well, and the texts often include instructions to 'Please reply with 'Y'' to get around iPhone's link blocking from unknown senders. But the the attack targets all users indiscriminately. As I reported a week ago, the FBI has confirmed it is now investigating the latest plague of DMV-themed texts, which is unsurprising. The volume of those texts in particular surged almost 800% in the first week of June alone, and has not slowed down since. A single bad actor armed with numbers and domains can send as many as '60,000,000 texts a per month, or 720,000,000 per year,' if that helps explain why there's almost no one in America who hasn't yet received these texts or knows someone who has. Whether it's an iPhone or an Android phone in your pocket, don't leave these texts undeleted and never ever click on any of these links.
Yahoo
5 days ago
- Yahoo
Coinbase victims speak out as breach, brazen hackers and a culture of silence collide
Over the past few weeks, I've spoken with dozens of victims of a stunningly sophisticated account-draining scam —exploiting trust, technology, and a massive data breach at Coinbase, the largest crypto exchange in the United States. Each victim tells a nearly identical story of loss, heartbreak, and feeling ghosted by the company that promises to be "the most trusted place for people and businesses to buy, sell, and use crypto …" Just reading that statement on the company's homepage now makes many of them feel physically ill. And the added banner across the top of the homepage warning about social-engineering scams? Far too little, too late for a nearly $63 billion company that recently made the Fortune 500 list and could have — should have — sounded much louder alarms months ago. Other journalists have done significant work documenting the breach itself—how it happened, who orchestrated it, what Coinbase knew, and when. This is not a story about the hackers. It's a story about the people who got hurt. People often stereotype crypto investors as reckless, young, or greedy. But the people I've interviewed are teachers, engineers, business owners, and parents. They are smart, cautious, and aware of how online scams work. They followed the rules. They double-checked URLs. They asked the right questions. And still, they lost everything: down payments for homes, retirement funds, and the belief that anyone was looking out for them. Many of the people I spoke with asked that we not use their full names due to concerns about reputational harm or possible retargeting. They agreed to be identified by their initials. DR started learning about investing when he was 13 with the goal of building something big. By 32, he had more than $100,000 in his Coinbase account. It was supposed to be his generation's Apple stock. Then, in early May, came a flurry of warnings — emails from spoofed addresses, suspicious activity alerts, and a barrage of phone calls. When he finally picked up, the man on the other end introduced himself as 'Jacob Williams,' a security employee at Coinbase. He sounded official. Still, DR said he cautiously 'grilled him,' and demanded extensive proof. 'Williams' sent a verification email that appeared to be from a address to DR's Coinbase-linked Gmail account (that DR did not give the hacker over the phone). He sent an official-looking email that even fooled anti-scam software. He also instructed DR to check his Gmail Sent folder. Sure enough, there were emails there to help@ that he did not write. DR thought this was the important 'proof' that someone had hacked his Coinbase account and maybe even his Gmail account. (How the hackers gained access to DR's gmail is still unclear.) 'I thought I was being very cautious,' DR told me. 'I asked all the right questions. This guy knew every detail of my account, inside and out.' The caller instructed DR to use a "whitelisted" account to protect his funds. That's an account that DR set up with additional security features within his Coinbase Wallet app. 'There's no way anyone could have seen all of that unless they had internal access,' DR said. The hacker watched and commented on it all in real-time, even though DR claims he never handed over passwords, seed phrases, or any other information that could have given the hackers direct access. 'They had my name, my driver's license, and the last four digits of my Social Security number. They even mimicked official Coinbase warnings. It was terrifying,' DR added. When DR finally hung up and called Coinbase support to confirm that he had now locked down his account, a customer service agent told him that he had fallen for a scam and there was nothing they could do. They advised him to file a police report with his local authorities. FK, an experienced tech entrepreneur in Silicon Valley, shared a similarly devastating story. 'They knew everything. My transaction history, my recent logins, even which tokens I'd moved and when,' he said over the phone. 'The shame is unbearable. I know the industry, the history of scams, and had all the security measures in place.' One moment from the call still haunts him: 'How do I tell my wife that we had hundreds of thousands of dollars stolen over the holidays?' Erin West, a former prosecutor and founder of Operation Shamrock, said the fears about reputational harm or re-targeting are valid. She's now working with more than 60 victims, including 39 who responded within minutes of an initial outreach to her network late last month. 'People have been plunged into incredibly dark places,' West said. 'They've lost life savings, identity security, and trust in digital systems. The damage isn't just financial—it's emotional and deeply personal.' One of the highest-profile victims is 67-year-old Los Angeles artist Ed Suman, who told Bloomberg he lost more than $2 million in crypto after a fake Coinbase support call. The attackers convinced him that even his 'cold wallet' was compromised. 'The most effective thing Coinbase could have done was email customers and say, 'There are scammers impersonating us,'' Suman said. 'Instead, they were woefully remiss.' A Coinbase spokesperson told me they have warned customers, most notably in blog posts on the company website under the topic 'Consumer Protection Tuesday.' There have been 20 of those articles posted since December 2024. He also pointed to warnings shared from its Coinbase Support account on X and YouTube accounts and said that anytime Coinbase learns of a breach, it files 'in accordance with all state and federal laws, and all are publicly available.' In addition, the spokesperson said that the company contacts anyone affected by the breach immediately. On May 15, Coinbase filed a notice with the Maine Attorney General: nearly 70,000 customers had been affected by a breach. The source? Bribed third-party contractors working for TaskUs, a customer support vendor in India. Using stolen data, such as government IDs, phone numbers, emails, and account histories, criminals launched targeted social engineering attacks. TaskUs later confirmed it had terminated at least two employees for illegal access and disclosed the activity to Coinbase. But a class-action lawsuit in the Southern District of New York filed late last month shows a different TaskUs breach and claims Coinbase executives knew about it as early as January. According to the complaint, TaskUs decided to fire 300 employees at its India call centers over allegations of fraud. Which begs the question, how many breaches have there been, and have any other third-party contractors aside from TaskUs been compromised? That suit is one of at least 13 class actions now pending. One investor alleges Coinbase delayed the breach disclosure to avoid a stock drop. Other litigation encompasses a wide range of issues, including biometric privacy violations, pig-butchering scams, and account lockouts. Bloomberg Law confirmed that even high-profile industry figures, like Sequoia Capital's Roelof Botha, had their data compromised. Coinbase told me they cannot comment on any pending litigation. Erin West is blunt: 'This didn't start in May. I had victims calling me last August.' She said Coinbase ignored numerous warning signs. 'Instead of alerting customers or locking down systems, they waited. They updated their terms of service — quietly — limiting customers' rights to participate in class-action lawsuits. And people, to this day, keep getting hit.' FK's attack happened in late December. Ed Suman's came in March. DR's hit in early May. When FK lost almost $400,000, he reported it immediately to Coinbase, the FBI, and local police. He followed up dozens of times. All he heard back was, 'all transactions confirmed on the blockchain are final.' Then, in late May, after he saw the news of the breach, he reached back out to Coinbase again. He said this time, a Coinbase customer service representative told him, 'more than a million accounts have possibly been affected going back to November 1 of 2024.' FK said the same support agent told him to 'be patient, that it might take a while for the company to alert all of the people possibly involved.' In the meantime, his crypto holdings would be worth nearly $625,000 today. A Coinbase spokesperson wrote to me in an email that 'all impacted customers have already received an email from no-reply@ all notifications went out at 7:20 a.m. ET on 5/15 to affected customers.' When I asked for further clarification and explained that none of the victims I spoke with received emails from Coinbase on May 15, he offered to escalate their cases to the support teams. Then he added, 'But important to note we will reimburse anyone who sent their funds to the attacker as a result of this incident. If a customer was not part of this incident and was socially engineered to send funds to a scammer, that would not fall into the refund.' On June 3, both DR and FK received notice that Coinbase will not reimburse them because their personal information 'was not exposed in the recent incident.' Neither victim understands how the scammers could have accessed their personal information without insider access. They followed security protocol. They didn't share private keys. But hackers still emptied their wallets. 'The hackers sucked the funds out of my wallet without my consent to Roobet, a crypto gambling site in Curaçao,' FK explained. 'I did not initiate that. They did. Because I never shared my private key or seed phrase with them. They had backdoor access to my actual Coinbase Wallet.' But here's something I just learned: Every transaction you make on public blockchains like Bitcoin or Ethereum is completely transparent, and anyone can look it up. If someone gains access to your wallet address, they can see what you've sent and received, when those transactions happened, and which platforms or smart contracts you've interacted with. They can't always see exact dollar amounts or what you 'bought' in the traditional sense — but they can trace your balance and behavior. In crypto, your wallet address is like your phone number, bank routing number, and purchase history — all rolled into one. And if it's ever linked to your real identity, your entire transaction history becomes searchable. DR and FK still maintain the only way anyone could have gotten their wallet addresses is through a Coinbase breach, but most people investing in crypto right now have no idea how exposed they really are. All of this comes at the same time the current administration is easing restrictions on cryptocurrency trading in the United States. 'This is their chance to do the right thing in a very public way,' DR said. 'It's like crisis communications 101. I've heard that they want people to sign NDA's and drop any future legal action in order to get reimbursed. I would do that in a heartbeat,' he added. FK agreed. 'That's all I want, for Coinbase to do the right thing.' 'Coinbase should have sounded the alarm immediately,' cybersecurity expert Richard Blech told me over the phone. He said other major crypto exchanges, like Binance and Kraken, faced the same kind of social-engineering attacks but blocked them before hackers could steal any customer data. 'That's the difference a real zero-trust system makes,' Blech said. 'In a setup like that, this kind of breach either doesn't happen — or it gets shut down fast.' He called Coinbase's failure a collapse of digital architecture. 'This wasn't just a breach,' he added. 'It was a betrayal of trust. And in crypto, trust is the product. Lose that, and you lose everything.' Everyone's asking the same questions now: Why didn't Coinbase send out a warning months ago? 'The only emails I have from them are promotions,' FK said. Why didn't they take out full-page ads on popular investor channels during the bull run, send in-app alerts, email mass notifications urging customers to be cautious, or go one step further than posting their own warnings on social media and engage with influencers on platforms like YouTube, X, and TikTok to get the word out? Coinbase estimates the most recent breach will cost up to $400 million in reimbursements, legal costs, and security upgrades. But no one knows how they're deciding who to 'make whole' again. Crypto scams aren't new. However, the scale and precision of this latest spate sets a new standard — and serves as a warning to everyone who banks online. The breach didn't unlock Coinbase's crypto vaults. It didn't have to. With enough stolen data, scammers created the illusion of safety and authority. They sounded American. They used Coinbase's scripts. They shared scam tactics over Discord and Telegram. They were organized and, at times, bragged about their exploits. And just as the breach became public, the Department of Justice shut down its National Cryptocurrency Enforcement Team — the only federal group built to stop scams like this. 'It's the Wild West all over again,' West said. 'And good people are paying the price.' Victims want answers. They want Coinbase to: Make the reimbursement process transparent Follow through and do what they claim on their website to harden security and track stolen funds Be much more vocal and prolific with scam warnings Reverse the Terms of Service updates that limit consumer rights And most of all, they want people in charge at Coinbase to realize they're just like them, not nameless, faceless 'users." Join a class action: Law firms like Milberg are pursuing cases. File a complaint: With the SEC, FTC, or your state attorney general. Talk to a tax professional: Some losses may qualify for deductions. Contact Operation Shamrock: For advocacy and support. Use app-based or hardware 2FA Don't give your wallet address to anyone, ever. This is critical. Never move funds based on a call or email Set withdrawal allowlists on exchange accounts Use a hardware wallet like Ledger or Trezor for long-term holdings Don't download remote-access apps unless absolutely necessary And finally: demand accountability. This story isn't over. But hopefully the people who refuse to slink away and remain silent will get a chance to rewrite it—for good. Jennifer Jolly is an Emmy Award-winning consumer tech columnist and on-air contributor for "The Today Show.' The views and opinions expressed in this column are the author's and do not necessarily reflect those of USA TODAY. Contact her via or @JennJolly on Instagram. This article originally appeared on USA TODAY: Coinbase victims speak out amid massive breach at crypto exchange