Skip to main content

Computer virus tricks man into turning himself in for child pornography

Jay Riley turns himself in for child pornography
Image used with permission by copyright holder

Detailed by ABC affiliate WJLA, police were likely surprised when 21-year-old Jay Matthew Riley of Woodbridge, Virginia strolled into a Prince William police station in order to inquire about any warrants issued for him on child pornography charges. Prior to his visit to the police station, Riley was apparently using his laptop when a “ransomware” window appeared on his screen likely from some form of computer virus on his computer.

fbi-child-pornographyWithin the window, a message warned Riley that child pornography had been located on his hard drive and he needed to pay a fine or face prosecution from the FBI. This a common scam that attempts to extort money from anyone using the computer, specifically amounts between $200 and $500. Basically, the user is tricked into believing that their computer is unusable unless they enter payment information. 

Recommended Videos

Riley was nice enough to bring his laptop into the police station with him while inquiring about law enforcement’s interest in his online activities. After voluntarily handing over the laptop to authorities, police officers searched the computer and located photos of underage girls in addition to inappropriate conversations with underage girls. After determining that one of the girls was in fact thirteen and located within the United States, the police executed a search of Riley’s home in order to take possession of all computers and electronic devices.

At this point, police arrested Riley and charged him with “three counts of possession of child pornography, one count of using a communication device to solicit certain offenses involving children, and one count of indecent liberties with a minor.” Riley is being held without bond at this time. When asked about the unusual incident, Prince William County Police spokesman Officer Jonathan Perok said “We’ve never had a case like this, I’m safe to say that, But the nature of what we have here is quite significant and severe.”

Mike Flacy
By day, I'm the content and social media manager for High-Def Digest, Steve's Digicams and The CheckOut on Ben's Bargains…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more