
Image by Mechislav Lavrinovich, from Unsplash
Toronto Mom Says Uber Did Nothing When Driver Left With Her 5-Year-Old
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Sarah Frazier Former Content Manager
A Toronto mother says Uber refused to assist police after a driver left with her sleeping 5-year-old, prompting a frantic hour-long search.
In a rush? Here are the quick facts:
- Police found the child 90 minutes later, 20 km from home.
- Uber allegedly refused to help police contact the driver.
- Company insisted the police file a form through their portal.
CBC reports that a Toronto mother revealed that her five-year-old daughter experienced an unexpected ride when an Uber driver unknowingly left the sleeping child behind in the backseat. The incident occurred during March Break when Julia and her family returned from watching the Raptors game by taking an Uber.
While unloading her other children and their belongings outside her boyfriend’s home, Julia momentarily stepped away to grab the garage opener. Before she could return, the Uber drove off — with her daughter still inside.
“I’m returning to the road and I realized the car, it’s gone,” Julia told CBC. “The three kids are already in hysterics. ‘Why did he leave with her? Where did he go?’ I’m trying to keep it together for my son.”
Panicked, Julia called 911. Police arrived quickly and reached out to Uber, requesting the driver’s contact details, as reported by CBC. But according to Julia, Uber flatly refused to help, insisting that officers would need to submit a formal emergency request through the company’s designated online portal.
“All we wanted was for them to contact the driver — that’s it — and they refused,” said Julia. “This was not a purse or a phone left behind. It was a five-year-old child on a winter night,” CBC reported her saying.
The Toronto police discovered the driver and child through their own investigation without receiving assistance from Uber. According to police spokesperson Stephanie Sayer, the driver cooperated with authorities after being discovered by police, and was not aware the child remained inside the vehicle, as reported by CBC.
The child was safe but distressed, and paramedics assessed her as a precaution. CBC reports that the family received a $10 credit from Uber which Julia described as an insult.
CBC reports that in a statement, Uber said the safety of all riders is a top priority and that their support team followed standard protocols. However, Julia says she’s now pushing for policy changes.
“You can offer me $1 million,” she said. “If there are no policy changes, I will not be accepting that.”

Image by rawpixel.com, from Freepik
Hackers Use Zoom’s Remote Control Feature To Steal Crypto
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Sarah Frazier Former Content Manager
Cybercriminals posing as journalists are exploiting Zoom’s remote control feature to hijack devices and steal cryptocurrency during staged interviews.
In a rush? Here are the quick facts:
- Attackers spoof Zoom prompts to gain full computer access.
- Group ELUSIVE COMET linked to $1.5B Bybit theft.
- Victims lured with fake “Bloomberg Crypto” Zoom interviews.
Hackers are exploiting Zoom’s remote control feature to steal cryptocurrency, according to cybersecurity firm Trail of Bits .
The group responsible for the attacks operates under the name ELUSIVE COMET and is suspected to be involved in the $1.5 billion Bybit theft that took place in February. The attackers are now targeting cryptocurrency professionals by pretending to be journalists and inviting them to fake interviews.
The scam typically begins on X , where victims receive a message inviting them to appear on a fraudulent “Bloomberg Crypto” segment. Instead of using official communication channels, the attackers rely on untrustworthy scheduling tools and spoofed Zoom invitations.
During the Zoom call, the attackers enable the platform’s remote control function, a legitimate feature that allows one user to control another’s screen if given permission. They disguise their identity by renaming themselves “Zoom,” making their request appear like a routine system message. If the victim approves the request, the attacker can immediately install malware or extract sensitive data.
Trail of Bits warned that users are often conditioned to click “Approve” on Zoom prompts without considering the consequences, making it easy for attackers to gain full access.
SEAL and Trail of Bits argue that this scam marks a shift in the cybercrime landscape. Instead of exploiting software flaws, attackers are manipulating user behavior and exploiting familiar interfaces. As the team stated, the blockchain industry is entering a new phase of security threats, where human habits pose more risk than technical vulnerabilities.