logo
Florida A&M athletic director arrested after allegedly stealing more than $24,000 from former employer

Florida A&M athletic director arrested after allegedly stealing more than $24,000 from former employer

Yahooa day ago

Florida A&M athletic director Angela Suggs was arrested on Monday after she allegedly stole thousands of dollars from her former job with a corporate credit card.
Suggs turned herself in to the Leon County Jail on Monday, though she was later released on bond, according to The Associated Press . She is facing several charges, including felony grand theft and felony scheme to defraud. She was also charged with four counts of false claims on travel vouchers, which are misdemeanors in the state of Florida.
Advertisement
Officials said that Suggs used a corporate credit card for personal use and stole more than $24,000 at her previous job. Suggs allegedly made wire transfers, cash withdrawals and personal purchases at casinos during business trips while she was the CEO of the Florida Sports Foundation. An investigation was launched last fall, and an audit also revealed that Suggs allegedly falsified travel vouchers by filing the unauthorized charges as meals or claimed they were accidents. She also reportedly failed to completely repay the Florida Sports Foundation for her personal expenses.
Suggs, a Florida A&M graduate, was hired officially as the university's athletic director last fall after a nearly seven-year run with the Florida Sports Foundation. Among other things, Suggs hired former NBA player and Heisman Trophy winner Charlie Ward as the program's next men's basketball coach in April. The Rattlers went 14-17 last season in the SWAC, and they've not been to the NCAA tournament in nearly two decades.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Five common mistakes that let criminals hack your online accounts
Five common mistakes that let criminals hack your online accounts

Yahoo

timean hour ago

  • Yahoo

Five common mistakes that let criminals hack your online accounts

Attacks on British retailers like Marks & Spencer have highlighted how mistakes can let cybercriminals into online accounts with devastating consequences. M&S announced on Tuesday it had finally reopened its website weeks after a cyberattack in April that the company blamed on 'human error' and it said it would cost around £300m. The government's cybersecurity breaches survey, published earlier this year, found 43% of businesses had suffered a security breach in the last 12 months. But even for ordinary people, it's still very possible to make mistakes that can lead to criminals gaining access to your account - and then using your details for identity theft or stealing money. Research by the Global Anti-Scam Alliance found that 10% of Brits had lost money to scams or identity theft in 2023. Yahoo News spoke to security expert Truman Kain, a security researcher at cybersecurity firm Huntress, about the common mistakes people make - including one which almost all of us have never even thought about. In security questions on online accounts such as banking, people often put their real mother's maiden name or the name of a first pet. But this is a mistake, Kain explains - and instead you should make up a fake name, because hackers can potentially use a security question to reset accounts and gain access, and such information is often easy to find out. Kain said: 'Security questions are a relic. When used as originally intended, they aren't security, they're trivia that hackers already know. "Think of it this way: if you had to, could you answer your friend's security questions? Yes? Well, so could a hacker. Attackers can typically guess or find your answers to common security questions on your social media or elsewhere online. 'This is how accounts can get taken over even if you do have a strong password. So, treat security questions like passwords… lie! Generate and save fake answers to security questions with a password manager. Never assume that your real answers to security questions are private.' Browsers such as Chrome commonly offer the option to save passwords, which can be highly convenient for users - but using this is a mistake. So are other common ways of storing passwords like notes apps, Word documents or spreadsheets, says Kain. 'Lots of people store passwords in places they shouldn't: these are a problem, because they can all be quickly scraped by malware or someone with access to your device," Kain says. For example, if your PC gets a virus, it can be easy for criminals to find passwords stored in this way. Instead, Kain advises, you should use a separate password manager app on your PC or smartphone, and generate strong passwords using the app. Kain said: 'If you care about your accounts, use a dedicated password manager. It's the simplest way to keep your accounts secure. Storing passwords anywhere else is like locking your front door and then leaving the key under the doormat. Reusing passwords offers an easy way to log in, for example, when forced to create a password to order on a pub's menu. But if you use one password across a lot of accounts, it's only a matter of time before it leaks online, says Kain, due to the frequency of data breaches. Kain said: 'By reusing passwords, you're basically playing Russian roulette. A breach at some random site, at any point in the future, can hand attackers the keys to your most important accounts. 'They'll turn right around and plug those credentials into every major service they can think of… and if you reused, they're in.' Kain said: 'Today's phishing attacks aren't poorly worded emails. They're polished, look just like the real thing and sometimes even come from real providers like DocuSign or Canva.' To deal with such attacks, it's best to be ultra-cautious around links in emails, particularly when they relate to banking or anything similar. Instead of following the email, use your banking app or navigate to your bank's website - or if you're really worried, call. Kain said: "Today, fake login pages are pixel-perfect and often use legitimate-looking domains. All it takes is one moment of distraction or misplaced trust, and your credentials or sensitive information are compromised. 'Attackers love evoking senses of fear or urgency because those emotions often cause you to act without thinking. So, always take a minute to stop and think: is this legit? Just because a site looks real doesn't mean it is. Check the URL before entering credentials and navigate to sites directly instead of clicking links in emails or text messages.' Multi-factor authentication (MFA) bolsters passwords by insisting on a second check (often via text or through a dedicated app) to prove people are who they say they are. This means that if a criminal finds your password in an online data breach, they still cannot access your account. Kain said: 'MFA is one of the most effective defences you have against account takeovers. However, it's often ignored because 'it's annoying', or put off with 'I'll do it later'. 'The reality is that passwords get breached. Phishing works. MFA adds a backstop that makes it much harder for attackers to get in when they inevitably get a hold of your credentials. App-based MFA is ideal, but any form of MFA is better than none.'

Federal immigration raid at Omaha meat production plant sparks protests
Federal immigration raid at Omaha meat production plant sparks protests

Boston Globe

time2 hours ago

  • Boston Globe

Federal immigration raid at Omaha meat production plant sparks protests

Advertisement In Omaha, a small group of people came out to protest the raids, and some of them even jumped on the front bumper of a vehicle to try to stop officers in one location while others threw rocks at officials' vehicles as a white bus carrying workers pulled away from a plant. Get Starting Point A guide through the most important stories of the morning, delivered Monday through Friday. Enter Email Sign Up Glenn Valley Foods officials didn't immediately respond to an inquiry from The Associated Press, but WOWT reported that CEO and owner Gary Rohwer said he wasn't made aware of the operation ahead of time and that there was no warrant. 'Of course not. It's a raid,' said Rohwer, whose company makes the Gary's QuickSteak brand of ready-to-grill steak. Sara Schulte-Bukowinski, a faith leader in Omaha, held a sign protesting the immigration raid at Glenn Valley Foods on Tuesday. Margery A. Beck/Associated Press Federal agents entered the plant around 9 a.m. Tuesday with a list of 97 people they wanted to screen, Rohwer said. He said the company regularly checks the immigration status of employees with the federal E-Verify database. Advertisement ICE officials didn't immediately respond to questions from The Associated Press, but the agency confirmed the raid at Glenn Valley Foods to the Omaha World-Herald. 'U.S. Immigration and Customs Enforcement, and federal law enforcement partners, executed a federal search warrant at Glenn Valley Foods, today, based on an ongoing criminal investigation into the large-scale employment of aliens without authorization to work in the United States,' ICE said in a statement. 'The worksite enforcement operation is likely the largest to take place in Nebraska since the start of the current presidential administration, which has prioritized immigration enforcement efforts and strengthened focus on border security.' The raid prompted one Douglas County Commissioner to walk out in the middle of a meeting Tuesday to head down to the area he represents in southeast Omaha where the plants are located. Commissioner Roger Garcia and City Councilman Ron Hug both expressed concern about the impact on families. 'These actions are deeply harmful to the South Omaha community,' Hug said in a statement. 'Not only are they unjust and disruptive, but they also directly undermine the economic stability and growth of District 4 and the broader community.' Douglas County Sheriff Aaron Hanson said his agency is 'not privy to the exact nature of the ICE operation' but that his agency is there to assist with assuring 'peace and safety' of everyone in the area. Asked when he learned of the operation, he said his department received 'respectful and ample notification.' He says he got the notification about a week ago.

FACT FOCUS: A Craigslist ad is not proof of paid protesters in LA. It was posted as a prank
FACT FOCUS: A Craigslist ad is not proof of paid protesters in LA. It was posted as a prank

San Francisco Chronicle​

time3 hours ago

  • San Francisco Chronicle​

FACT FOCUS: A Craigslist ad is not proof of paid protesters in LA. It was posted as a prank

As demonstrations in Los Angeles over immigration raids unfolded in recent days, social media users falsely cited a Craigslist ad as evidence that protesters had been paid to participate. 'We are forming a select team of THE TOUGHEST dudes in the area,' the ad, which is no longer live, read. 'This unit will be activated only when the situation demands it — BUT YOU GET PAID EVERY WEEK NO MATTER WHAT. high-pressure, high-risk, no room for hesitation. We need individuals who do not break, panic, or fold under stress and are basically kickass dudes.' It offered $6,500-$12,500 in compensation per week. Here's a closer look at the facts. CLAIM: A Craigslist ad seeking 'the toughest badasses in the city' is proof that Los Angeles demonstrations over immigration raids are made up of paid protesters. THE FACTS: This is false. The ad, which appeared in Craigslist's Los Angeles section for general labor jobs, was bait for a prank show and had nothing to do with the protests in Los Angeles, the ad's creator told The Associated Press. It was posted on Thursday, the day before the protests began. In a livestreamed episode on Friday, the show's hosts called and spoke with people who responded to the ad. 'I literally had no idea it was ever going to be connected to the riots. It was a really weird coincidence,' said Joey LaFleur, who posted the ad on Craigslist. The ad was developed as part of a new prank show called 'Goofcon1,' said LaFleur, who hosts the podcast with Logan Quiroz. On their show Friday, the day protests began, they spoke live on the phone with people who responded during Goofcon1's third episode. LaFleur noted during the episode that he also posted a more 'militaristic' version of the ad in Craigslist's Austin section, but didn't get many responses. Screenshots of the ad were used in social media posts on multiple platforms, cited as proof that those involved in the Los Angeles protests had been paid. The posts gained tens of thousands of likes, shares, and views. 'CALIFORNIA RIOT IS A FUNDED OPERATION,' reads one X post sharing the ad. 'Destabilizing the Trump administration and the United States in general is the goal. Then, they receive billions of federal funding to 'fix' the damage and pocket the money.' A TikTok video sharing the ad viewed approximately 14,100 times called protesters 'paid agitators' who are turning 'what was initially a peaceful protest of just marching into a full-blown riot.' Others pointed to the ad as evidence that the protests 'aren't organic' or have been faked by Democrats. 'Accidentally goofed the entire nation on the latest @goofcon1,' one post reads. In another, he muses: 'I don't really know what to do with any of this. I guess get on Newsmax, or something. If I get on Newsmax, that could be funny.' False claims about paid protesters regularly spread around demonstrations, especially those that attract national or international attention. Similar false claims spread widely in 2020 during demonstrations over George Floyd's death at the hands of Minneapolis police.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store