Customer shoots themself in the leg at Top Guns
TERRE HAUTE, Ind. (WTWO/WAWV) — Tuesday, Vigo County Sheriff's Office (VCSO) said they responded to Top Guns after a customer shot themselves in the leg while holstering a handgun.
According to a Facebook post from VCSO, the 70-year-old victim was holstering a personally owned 9mm handgun when it appeared to have caught on the victim's holster snap, causing the firearm to accidentally discharge.
The suspect that allegedly shot another man is in custody in Daviess County
The round entered through the victim's upper left thigh exiting through their lower left calf, said VCSO.
Two tourniquets were placed on the victim by employees of Top Guns and the victim was then transported to Regional Hospital.
Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Fox News
42 minutes ago
- Fox News
16 billion passwords leaked in massive data breach
Your personal data is collected by almost every site or app you visit. The world is more data hungry than ever because it's now the most important asset, even more valuable than oil. Your shopping history is logged, your search history is captured, and your phone number, email address, and IDs are all stored. But that doesn't mean all this data is safe. If you've ever received a spam call, phishing email, or a fake support call, your personal data is out there. And if you want proof of how poorly your data is treated, a newly uncovered database offers a stark reminder. More than 16 billion login credentials, collected from years of past data breaches, have been compiled into one of the largest aggregated archives of cybersecurity incidents ever seen, according to a report. Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide — free when you join. Cybernews describes the exposed database as a "blueprint for mass exploitation." The records include login credentials from popular platforms like Google, Facebook, and Apple. Security researchers emphasize that this isn't the result of a new, single breach. Instead, it's a massive collection of previously stolen credentials from various past leaks, phishing scams, and third-party data exposures, some of which were forgotten, underreported, or re-shared. BleepingComputer, a cybersecurity site that reviewed the archive, confirmed the data appears to be aggregated from older breaches rather than a fresh incident. This makes the scope of the exposure particularly dangerous because attackers can use this central trove for targeted attacks, including credential stuffing. Credential stuffing becomes much easier when attackers have access to such a vast pool of usernames and passwords. This technique involves using stolen login details across multiple sites, exploiting the fact that many users reuse the same credentials. So even if your account wasn't part of a recent breach, you could still be at risk if your old credentials are part of this newly indexed compilation. We reached out to Apple, Google and Meta for comment. A Google spokesperson stated that this issue did not stem from a Google data breach and that Google continues to strongly encourage users to adopt more secure, passwordless authentication methods, such as passkey. They also suggest using tools like Google Password Manager, which securely stores your passwords and notifies you when they've been involved in a breach, allowing you to take immediate action. A rep from Meta said, "We don't have a statement to share at this time as we're still looking into this," but did offer some tips to secure your account, a security check-up tool, and the introduction of passkeys on Facebook. We did not hear back from Apple before our deadline. In statements given to the media, a Google spokesperson clarified that the company was not the source of the leak. Instead of raising alarms, Google is encouraging users to adopt more secure practices. These include using passkeys, a newer form of authentication that relies on biometric data or a device PIN instead of a traditional password. Google is also promoting its Password Manager, which alerts users if any of their stored credentials have been exposed. This tool can automatically generate strong passwords and keep them encrypted across your devices. Meta has taken similar steps by rolling out support for passkeys on Facebook mobile apps. While adoption remains low, the company is signaling that passwordless logins are the future of secure access. These changes reflect a growing industry shift toward authentication methods that cannot be phished or reused. We reached out to Apple, Google, and Meta for comment but did not receive a response before our deadline. With credential leaks becoming a growing threat, protecting your data requires a mix of smart security habits and reliable tools. Here are five effective ways to keep your information safe. 1. Use a password manager: Infostealer malware often targets passwords saved directly in web browsers, making them easy targets. Instead of relying on your browser to store credentials, use a dedicated password manager that offers zero-knowledge architecture and military-grade encryption to keep your data safe. The best options work across all your devices and browsers, offer secure sharing, monitor for data breaches, and even generate health reports on your passwords. Get more details about my best expert-reviewed Password Managers of 2025 here. 2. Enable two-factor authentication (2FA): Even if your credentials are stolen, 2FA adds an extra layer of security by requiring a second form of verification, such as a code from an authentication app or biometric confirmation. Cybercriminals rely on stolen usernames and passwords to break into accounts, but with 2FA enabled, they cannot gain access without the additional security step. Make sure to enable 2FA on important accounts like email, banking, and work-related logins. 3. Use strong antivirus software and be cautious with downloads and links: Infostealer malware often spreads through malicious downloads, phishing emails, and fake websites. Avoid downloading software or files from untrusted sources, and always double-check links before clicking them. Attackers disguise malware as legitimate software, game cheats, or cracked applications, so it is best to stick to official websites and app stores for downloads. The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. 4. Keep software updated: Cybercriminals exploit outdated software to deliver malware. Keeping your operating system, browsers, and security software up to date ensures that known vulnerabilities are patched. Enable automatic updates whenever possible, and install reputable antivirus or endpoint protection software that can detect and block infostealer threats before they compromise your system. 5. Consider a personal data removal service: The massive leak of 16 billion credentials shows just how far your personal information can spread and how easily it can resurface years later in aggregated hacker databases. Even if your passwords were part of an old breach, data like your name, email, phone number, or address may still be available through data broker sites. Personal data removal services can help reduce your exposure by scrubbing this information from hundreds of these sites. While no service can guarantee total removal, they drastically reduce your digital footprint, making it harder for scammers to cross-reference leaked credentials with public data to impersonate or target you. These services monitor and automatically remove your personal info over time, which gives me peace of mind in today's threat landscape. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web Passwords are no longer enough. That is why I have always believed tech companies should phase them out entirely and require two-factor authentication across the board. Passwords, once the foundation of online identity, are now one of its weakest links. Companies like Google and Meta are already building systems that move beyond them. The tools are available. The message is clear. You do not need to wait for a breach to start taking security seriously. Do you think tech companies are investing enough in their cybersecurity infrastructure? Let us know by writing to us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Follow Kurt on his social channels Answers to the most asked CyberGuy questions: New from Kurt: Copyright 2025 All rights reserved.


Miami Herald
2 hours ago
- Miami Herald
Teens climb cliffs near Bible camp, then one falls hundreds of feet, WA cops say
A teen fell hundreds of feet after climbing cliffs with two other boys near a Bible camp in Washington, police said. The boys called 911 on June 21 from a mountainside west of Riverview Bible Camp, near Cusick, the Washington Department of Fish & Wildlife Police said in a Facebook post. They were about a mile from the camp when one teen fell hundreds of feet, police said in the June 23 post. The other two boys climbed down the cliff and found him unconscious and bleeding, police said. Authorities said they couldn't get an exact location, but they rushed to find the injured teen. 'The teens were wet, cold, and worried their friend would not make it if no one could find them soon,' police said. Officers and medical responders hiked the area for about an hour before finding the boys, police said. The injured boy appeared to have severe head trauma and a broken arm, police said. Police said he was 'extremely cold and experiencing early stages of shock and hypothermia.' An officer had to contact the U.S. Air Force because of the remote and steep area that a local medevac helicopter could not reach, police said. He was hoisted by the Air Force and taken by helicopter to an ambulance at the bottom of the mountain, police said. The boy's father said he had 'multiple fractures and broken bones.' Cusick is about a 55-mile drive north from Spokane.


Fox News
4 hours ago
- Fox News
Hiker disappears in wilderness after taking ‘shortcut' that leads to voice from the woods
Print Close By Julia Bonavita Published June 25, 2025 A Washington state hiker survived nearly a week in the woods after getting lost during a "shortcut" and falling from a tree. Authorities responded to a 911 caller who reported hearing a voice calling for help from the Suquamish woods around 12:30 a.m. Saturday, the Kitsap County Sheriff's Office (KCSO) said in a Facebook post . When a sheriff's deputy arrived, he heard "a faint, distressful voice coming from the woods saying he had fallen from a tree," the department said. HIKER DISAPPEARS FROM 'EDGE OF THE WORLD' CAMPGROUND ON TRIP WITH FATHER KCSO did not immediately respond to Fox News Digital's request for comment. First responders quickly deployed to the area, with teams from KCSO, Washington Explorer Search and Rescue, Olympic Mountain Rescue, Kitsap Search Dogs and Suquamish Tribal Police Department working to locate the hiker. MANHUNT FOR FATHER ACCUSED OF KILLING 3 DAUGHTERS TAKES GRIM TURN IN WILDERNESS Following a six-hour-long search, the man – who authorities have not identified – was located and subsequently carried out of the woods on a stretcher, police said. The lone hiker told first responders he hitched a ride to the end of a road before he became disoriented and wandered into the woods, the Suquamish Police Department said . HIKER, 33, DIES AFTER HIKING ARIZONA MOUNTAINS IN EXTREME HEAT, 4 OTHERS RESCUED The man also revealed he had been lost for four to five days after trying to take a shortcut through the woods, according to KCSO. CLICK HERE TO GET THE FOX NEWS APP Authorities transported the hiker to a local medical center for evaluation and treatment. An update regarding his condition as of Wednesday was not immediately available. Print Close URL