logo
Missing 81-year-old Overland Park woman's vehicle located in south central Kansas

Missing 81-year-old Overland Park woman's vehicle located in south central Kansas

Yahoo22-05-2025
KANSAS CITY, Mo. — Overland Park police announced on Wednesday that a vehicle has been located in south central Kansas that belongs to an 81-year-old woman who has been missing for a week.
On Saturday, May 17, , an 'at-risk' woman who reportedly disappeared while driving to her Overland Park home from Harrisonville, Missouri, on the afternoon of Wednesday, May 14.
McConnell was driving a grey 2009 Honda Accord with Texas license plate 'RFP836.' On Wednesday, police said the vehicle was located by the Cowley County Sheriff's Office unoccupied. Deputies are currently searching the area.
She is believed to have been spotted on Thursday, May 15, near Severy, Kansas — a small town located about 155 miles (or 2.5 hours) southwest of Overland Park.
Download the FOX4 News app on iPhone and Android
Police ask that if you or anyone you know sees McConnell, please contact OPPD at (913) 895-6300.
Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

FBI Warning To 10 Million Android Users — Disconnect Your Devices Now
FBI Warning To 10 Million Android Users — Disconnect Your Devices Now

Forbes

time8 hours ago

  • Forbes

FBI Warning To 10 Million Android Users — Disconnect Your Devices Now

Discconnect now, FBI warns 10 million Android users. Update, July 26, 2025: This story, originally published on July 25, has been updated with a statement from the researchers which initially disclosed and disrupted the BadBox 2.0 operation that the FBI and Google are tackling head-on. In March, I reported that one of the largest botnets of its kind ever detected had impacted over a million Android devices. That massive attack was known as BadBox, but it has now been eclipsed by BadBox 2.0, with at least 10 million Android devices infected. Google has taken action to protect users as best it can, as well as launching legal action against the attackers, and the FBI has urged impacted users to disconnect their devices from the internet. Here's what you need to know. The FBI, Google And Others Warn Of Android BadBox 2.0 Attacks The FBI cybersecurity alert, I-060525-PSA, could not have been clearer: ongoing attacks are targeting everything from streaming devices, digital picture frames, third-party aftermarket automobile infotainment systems and other assorted home smart devices. The devices, all low-cost and uncertified, mostly originating in China, allow attackers to access your home network and beyond by, the FBI warned, 'configuring the product with malicious software prior to the user's purchase.' It has also been noted, however, that mandatory 'software updates' during the installation process can also install a malicious backdoor. Point Wild's Threat Intelligence Lat61 Team reverse-engineered the BadBox 2 infection chain and, as a result, uncovered new indicators of compromise that have been shared with global Computer Emergency Response Teams, as well as law enforcement. 'This Android-based malware is pre-installed in the firmware of low-cost IoT devices, smart TVs, TV boxes, tablets, before they even leave the factory,' Kiran Gaikwad from the LAT61 team said, 'It silently turns them into residential proxy nodes for criminal operations like click fraud, credential stuffing, and covert command and control (C2) routing.' Google, meanwhile, confirmed in a July 17 statement that it had 'filed a lawsuit in New York federal court against the botnet's perpetrators.' Google also said that it has 'updated Google Play Protect, Android's built-in malware and unwanted software protection, to automatically block BadBox-associated apps.' Human Security Behind Initial BadBox 2.0 Disclosure And Disruption Human Security, whose Satori Threat Intelligence and Research Team originally both disclosed and disrupted the BadBox 2.0 threat campaign, said at the time that researchers believed 'several threat actor groups participated in BadBox 2.0, each contributing to parts of the underlying infrastructure or the fraud modules that monetize the infected devices, including programmatic ad fraud, click fraud, proxyjacking, and creating and operating a botnet across 222 countries and territories.' If nothing else, that provides some context to the scale of this campaign. Now, Stu Solomon, the Human Security CEO, has issued the following statement: 'We applaud Google's decisive action against the cybercriminals behind the BadBox 2.0 botnet our team uncovered. This takedown marks a significant step forward in the ongoing battle to secure the internet from sophisticated fraud operations that hijack devices, steal money, and exploit consumers without their knowledge. Human's mission is to protect the integrity of the digital ecosystem by disrupting cybercrime at scale, and this effort exemplifies the power of collective defense. We're proud to have been deeply involved in this operation, working in close partnership with Google, TrendMicro, and the Shadowserver Foundation. Their collaboration has been invaluable in helping us expose and dismantle this threat.' FBI Recommendations And Mitigations — Disconnect Your Devices Now The FBI has recommended that Android users should be on the lookout for a number of potential clues that your Chinese-manufactured smart device could be infected with BadBox 2.0 malware. When it comes to mitigation, the advice is straightforward: users should 'consider disconnecting suspicious devices from their networks,' the FBI said.

Judge rejects request to suppress Google search information from Cohasset man who allegedly killed, dismembered wife
Judge rejects request to suppress Google search information from Cohasset man who allegedly killed, dismembered wife

Boston Globe

timea day ago

  • Boston Globe

Judge rejects request to suppress Google search information from Cohasset man who allegedly killed, dismembered wife

Walshe pleaded not guilty to charges of murder, disinterring a body, and lying to investigators in connection with the Jan. 1, 2023 slaying of his wife, On New Year's Eve 2022, the couple hosted Ana Walshe's former employer at their house, who left around 1:30 a.m., officials have said. Advertisement The guest told investigators he had dinner with the couple and they shared champagne and wine, according to an affidavit. Brian and Ana Walshe were in a good mood and everyone enjoyed themselves, the guest said. By 4:50 a.m., authorities allege, Ana Walshe, 39, was dead, and the disturbing Google searches started. They included 'how to embalm a body,' '10 ways to dispose of a dead body if you really need to,' 'how to stop a body from decomposing,' and 'how long before a body starts to smell.' They were made between 4:55 a.m. and 5:47 a.m. on New Year's Day, prosecutors said. In court papers last month, Walshe's lawyers said he and his prior counsel, Tracy Miner, had reached an agreement on Jan. 6, 2023, allowing authorities to conduct 'a limited search' of Walshe's iPhone and his son's iPad. Advertisement Walshe's consent was necessary at the time because State Police hadn't obtained a warrant for the devices. Walshe's lawyers said the agreement covered 'all communications' between Dec. 25, 2022, and Jan. 6, 2023, the date the electronics were turned over. The sole exception was for communications between Walshe and his lawyer, the filing said. According to the memo, State Police began a forensic search of the devices on the night of Jan. 6, 2023, and continued into the early hours of Jan. 7. An investigator who conducted the work alerted colleagues on the evening of Jan. 7 to the Internet searches in question, which were later referenced in an affidavit for a search warrant, records show. But before a warrant was issued, the filing said, 'police willingly and knowingly violated the agreement by exceeding the agreed-upon scope by downloading and searching the entire content of' Walshe's phone, his son's laptop, and a third laptop with a cracked screen that he turned over. Prosecutors in court papers last month had urged a denial of Walshe's supression motion, arguing that 'discovery of the internet searches and location data from the iPhone and iPad was certain as a practical matter.' Over several days, prosecutors allege, Walshe dismembered his wife's body in the basement and discarded her clothes and other evidence in a dumpster at a liquor store near his mother's home in Swampscott. He also allegedly disposed her remains in dumpsters at apartment complexes in Abington and Brockton. Police also allegedly found blood in the basement of the couple's home. Advertisement Seven days after Ana Walshe's disappearance, police searched the dumpster near the home of Brian Walshe's mother. Inside, they found a COVID vaccination card for Ana Walshe, a Hermes watch, and clothing Ana Walshe was known to wear, according to prosecutors. Forensic testing showed her DNA on items found in the dumpster, prosecutors said. While Brian Walshe failed in his bid to get the Google searches suppressed, he did succeed in getting additional evidence tossed. On Friday, Freniere granted Walshe's request to suppress evidence gleaned from separate search warrants related to a 'GPS install on a 2013 Volkswagen Beetle' with Mass. plates, as well as 'Verizon Records of Cell Phone Number 617-939-8646 insofar it authorized ... location data obtained for December 30, 2022 and December 31, 2022,' records show. Walshe is currently held without bail, and his trial is scheduled to begin in October, records show. Travis Andersen can be reached at

FBI Warning To 10 Million Android Users — Disconnect From Internet Now
FBI Warning To 10 Million Android Users — Disconnect From Internet Now

Forbes

timea day ago

  • Forbes

FBI Warning To 10 Million Android Users — Disconnect From Internet Now

Discconnect now, FBI warns 10 million Android users. In March, I reported that one of the largest botnets of its kind ever detected had impacted over a million Android devices. That massive attack was known as BadBox, but it has now been eclipsed by BadBox 2.0, with at least 10 million Android devices infected. Google has taken action to protect users as best it can, as well as launching legal action against the attackers, and the FBI has urged impacted users to disconnect their devices from the internet. Here's what you need to know. The FBI, Google And Others Warn Of Android BadBox 2.0 Attacks The FBI cybersecurity alert, I-060525-PSA, could not have been clearer: ongoing attacks are targeting everything from streaming devices, digital picture frames, third-party aftermarket automobile infotainment systems and other assorted home smart devices. The devices, all low-cost and uncertified, mostly originating in China, allow attackers to access your home network and beyond by, the FBI warned, 'configuring the product with malicious software prior to the user's purchase.' It has also been noted, however, that mandatory 'software updates' during the installation process can also install a malicious backdoor. Point Wild's Threat Intelligence Lat61 Team reverse-engineered the BadBox 2 infection chain and, as a result, uncovered new indicators of compromise that have been shared with global Computer Emergency Response Teams, as well as law enforcement. 'This Android-based malware is pre-installed in the firmware of low-cost IoT devices, smart TVs, TV boxes, tablets, before they even leave the factory,' Kiran Gaikwad from the LAT61 team said, 'It silently turns them into residential proxy nodes for criminal operations like click fraud, credential stuffing, and covert command and control (C2) routing.' Google, meanwhile, confirmed in a July 17 statement that it had 'filed a lawsuit in New York federal court against the botnet's perpetrators.' Google also said that it has 'updated Google Play Protect, Android's built-in malware and unwanted software protection, to automatically block BadBox-associated apps.' FBI Recommendations And Mitigations — Disconnect Devices From The Internet Now The FBI has recommended that Android users should be on the lookout for a number of potential clues that your Chinese-manufactured smart device could be infected with BadBox 2.0 malware. When it comes to mitigation, the advice is straightforward: users should 'consider disconnecting suspicious devices from their networks,' the FBI said.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store