Swatting accused an experienced hacker who abused powers, court hears

Source: National Cyber Security – Produced By Gregory Evans

The 17-year-old Barrhaven boy on trial for swatting crimes across North America was portrayed in court on Friday as an experienced hacker who abused his online powers. “I didn’t feel safe around him (on chats). He was too abusive with his power. He’d boot people off the Internet for no reason. He’d do it for fun,” an alleged victim told California police in an interview that was broadcast at trial. The boy, now 15, told police in Stockton, Calif., in April, 2014, that he only knew the accused’s ‎first name and had never seen his face on Skype. The boy said he met the accused on a Minecraft server and, after he said he was quitting his position as a permissions expert, someone first ordered $1,000 of pizza to his home and later sent in a fake 911 call to prompt a SWAT team to respond at the boy’s home. “I still to this day do not know why he snapped,” the boy told police. Testifying later in the day, the teen said he confronted the person he believed to be the accused in a call over Skype videoconferencing. “All he did was laugh maniacally. Like it didn’t matter to […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Swatting accused an experienced hacker who abused powers, court hears appeared first on National Cyber Security.

View full post on National Cyber Security

Training the next generation of cyber warriors

Source: National Cyber Security – Produced By Gregory Evans

As the Defense Department fills out its ranks with troops that will operate in the digital domain, the military services are working ardently to train up and supply the U.S. Cyber Command with cyber operators. One key avenue for reaching a goal of 6,200 troops by the end of the next year is the Army Reserve’s program that is fostering cyber expertise that translates between the private sector and national security. In a recent interview with Senior Staff Writer Amber Corrin, Erin Thede with the Private Public Partnership Office for the U.S. Army Reserve outlined the Army Reserves’ efforts in building up the cyber forces that will defend the nation in cyberspace. Tell us a little about what you’re doing in building up Army cyber forces. We work with the private sector to come up with innovative ways to assist our soldiers, whether it be through training, deployment or leadership opportunities. Cyber being such a very large point of interest across both the public and private sectors, we felt this would be a good opportunity for us to work with our partnerships that we currently have. So, what we did was we started working with six core universities, which are […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Training the next generation of cyber warriors appeared first on National Cyber Security.

View full post on National Cyber Security

Infamous hacker Kevin Mitnick sniffs fiber, reads email

Source: National Cyber Security – Produced By Gregory Evans

Kevin Mitnick, famous former black hat hacker, demonstrates just how easy it is for a hacker to tap into your network and read your email. And he’s doing it with a fiber optic network connection, not a simple and very non-secure CAT5x or CAT6x network wire. And he doesn’t have to connect to the Internet, your network, or any outside resources to do this. He clamps onto a fiber optic “wire”, opens Wireshark, and sniffs away your most guarded secrets. Mitnick demonstrates in under five minutes how he could get near your network, set up a clandestine connection, sniff your network, grab your passwords, email, anything sent “over the wire” unencrypted, and disappear within minutes. And you’d never catch him doing it. Although it isn’t obvious from the video, the hardware item that they discuss is an optic fiber clip-on coupler. It’s not designed for the purpose that Mitnick uses it for, but it works and that’s the “beauty” of being a hacker: You use hardware and software in creative ways to get the information and the results you want. The video shows just how easy it is to eavesdrop on conversations on-the-wire, even if the wire is fiber optic […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Infamous hacker Kevin Mitnick sniffs fiber, reads email appeared first on National Cyber Security.

View full post on National Cyber Security

Polish Airline Cancels Flights After Hacker Attack

Source: National Cyber Security – Produced By Gregory Evans

Poland’s LOT airline has been forced to cancel around 10 foreign and domestic flights after hackers attacked its computers. Airline spokesman Adrian Kubicki said the hacker attack temporarily paralyzed LOT’s computers at Warsaw’s Frederic Chopin airport on Sunday, disrupting the processing of passengers for the flights. He said some 1,400 passengers, scheduled to fly to Hamburg, Dusseldorf, Copenhagen and domestic destinations, were affected by the cancellations. The problem was eventually solved and flights scheduled to depart later Sunday could leave as planned. A commission will investigate the source of the attack, Kubicki said. Source: ABC News

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Polish Airline Cancels Flights After Hacker Attack appeared first on National Cyber Security.

View full post on National Cyber Security

Google to remove revenge porn from search results

Source: National Cyber Security – Produced By Gregory Evans

Google said it would soon create a process for victims of revenge porn to request the removal of private photographs from the search engine’s results. Revenge porn is a digital phenomenon that entails the distribution of sexually explicit images without a person’s consent, typically as a form of retribution or blackmail. In a blog post Friday, Google’s senior vice president for search, Amit Singhal, said the tech company would post a web form in the coming weeks where requests can be submitted to remove images. “Our philosophy has always been that Search should reflect the whole web. But revenge porn images are intensely personal and emotionally damaging, and serve only to degrade the victims—predominantly women,” Singhal wrote. Of course, the images will still remain on the Internet, but they’ll be much harder to find without the help of the world’s biggest search engine. The new policy is not unlike existing rules that allow people to request the removal of sensitive personal information such as bank account numbers and signatures from Google’s search results, Singhal said. Reddit, an online bulletin, has also cracked down on revenge porn, largely because of the dissemination of nude celebrity photos obtained by hackers. Authorities have […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Google to remove revenge porn from search results appeared first on National Cyber Security.

View full post on National Cyber Security

7 things to do when your business is hacked

Source: National Cyber Security – Produced By Gregory Evans

The first thing an IT security executive should do after the corporate network has been breached is fall back on the incident response plan that was put in place well before attackers got through the carefully constructed defenses. That’s what should have happened, but even if it wasn’t there are certain steps that anyone running an incident response team should follow in order to accomplish the main goal of any such cleanup: getting the network back to supporting business as usual as quickly as possible. There are seven key things breach-repair leaders should do, according to Wade Woolwine, the manager of strategic services for Rapid7, who outlined the steps last week at his company’s United customer conference. “It’s all about recovering the business back to normal operations,” Woolwine says. Here are the seven steps: Each incident may call for a different set of players. For example, if the first notification of a breach comes from the FBI calling to say it’s found out the corporate network was breached, one of the first people to call is the company legal officer. Or if the breach involves loss of critical corporate data the trade secrets that represent the value of the company […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post 7 things to do when your business is hacked appeared first on National Cyber Security.

View full post on National Cyber Security

World-famous hacker Kevin Mitnick and KnowBe4 fight phishing with training

Source: National Cyber Security – Produced By Gregory Evans

The success of social engineering must frustrate those responsible for an organization’s digital security. There is no simple solution or device that will take social engineering off the bad-guys’ play list. And, if anyone knows that, it is Kevin Mitnick — one of the more, if not the most, successful social engineers. Mitnick, at one time the most wanted computer criminal in the US, paid his dues and started Mitnick Security Consulting. Mitnick now uses his undeniable talent to help corporations secure their networks. Calling some of the top organizations in the world his clients, he proudly states, “We maintain a 100-percent successful track record of being able to penetrate the security of any system we are paid to hack into using a combination of technical exploits and social engineering.” J. Peter Bruzzese, Office 365 MVP and well-respected writer, witnessed first-hand Mitnick’s capabilities. Bruzzese recently spoke at a secureCIO event in Dallas where Mitnick gave the keynote address. “Mitnick did a few demonstrations at the event that scared the bejeebers out of the audience,” writes Bruzzese in this InfoWorld blog post. “He showed how he could steal a person’s identity within two minutes by simply using his or her name. […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post World-famous hacker Kevin Mitnick and KnowBe4 fight phishing with training appeared first on National Cyber Security.

View full post on National Cyber Security

Hacker hunt intensifies in trenches of U.S.-China cyberwar

Source: National Cyber Security – Produced By Gregory Evans

SINGAPORE (Reuters) — Security researchers have many names for the hacking group that is one of the suspects for the cyber-attack on the U.S. government’s Office of Personnel Management: PinkPanther, KungFu Kittens, Group 72 and, most famously, Deep Panda. But to Jared Myers and colleagues at cybersecurity company RSA, it is called Shell Crew, and Myers’ team is one of the few who has watched it mid-assault — and eventually repulsed it. Myers’ account of a months-long battle with the group illustrates the challenges governments and companies face in defending against hackers that researchers believe are linked to the Chinese government — a charge Beijing denies. “The Shell Crew is an extremely efficient and talented group,” Myers said in an interview. Shell Crew, or Deep Panda, are one of several hacking groups that Western cybersecurity companies have accused of hacking into U.S. and other countries’ networks and stealing government, defense and industrial documents. The attack on the OPM computers, revealed this month, compromised the data of 4 million current and former federal employees, raising U.S. suspicions that Chinese hackers were building huge databases that could be used to recruit spies. China has denied any connection with such attacks and little […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker hunt intensifies in trenches of U.S.-China cyberwar appeared first on National Cyber Security.

View full post on National Cyber Security

Rio Rancho teens facing charges in planned cyberattack

Source: National Cyber Security – Produced By Gregory Evans

RIO RANCHO, N.M. (KRQE) – Several Rio Rancho students are getting national attention but for all the wrong reasons. After allegedly trying to cyberattack a large company using computers from school. According to the Albuquerque Journal three Cleveland High teens are facing felony charges. They’re accused of helping coordinate an attack to bring down the website for Enfamil baby formula while using school computers. The attack caught the attention of both the FBI and secret service. The district isn’t saying how it’s going to punish the teens involved. Source: KRQE News

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Rio Rancho teens facing charges in planned cyberattack appeared first on National Cyber Security.

View full post on National Cyber Security

Attack as the best form of defence – should we consider unleashing cyber security teams’ offensive talents?

Source: National Cyber Security – Produced By Gregory Evans

Cyber crime cost the world economy $400bn in 2014, according to a report by McAfee. Whilst this only represents a small percentage of the global GDP, it’s a significant number. Meanwhile, the continuing increase in attacks represents a fundamental risk to many companies, having a tangible impact on share prices and the global economy. At a national level, governments are coming under increasing attacks that threaten critical infrastructure. On the flipside, some governments are becoming far more active in conducting cyber attacks, seeking to disrupt rivals’ economic and military capabilities. But enough is enough. Cyber criminals have it easy – they can strike a corporation with very little risk of being caught and prosecuted, particularly when operating within multiple legal jurisdictions. National governments, and the international community have failed to provide a way in which these criminals can be identified and brought to justice, leaving corporations – some of which provide critical services – at the mercy of attackers and with few options for response. Indeed, thanks to current UK legislation, businesses are being prevented from even basic measures that could have a major impact on their ability to respond to cyber attacks, requiring them to defend with both arms […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Attack as the best form of defence – should we consider unleashing cyber security teams’ offensive talents? appeared first on National Cyber Security.

View full post on National Cyber Security

Page 1 of 2,37912345»102030...Last »

My Twitter

Gregory D. Evans On Facebook