‘Sobriety tag’ scheme for people who commit booze-linked crimes extended

Source: National Cyber Security – Produced By Gregory Evans

South London scheme tackling binge drinkers who commit minor crimes to be rolled out across capital and could eventually operate nationwide A scheme targeting binge drinkers who commit minor crimes by fitting them with ankle tags that monitor alcohol consumption could be extended nationwide after a small-scale pilot was hailed as a success. The trial run, which saw 111 offenders in four south London boroughs fitted with the so-called sobriety tags, saw just over 90% of them reach the mandated 120-day period without drinking, according to the office of the city’s mayor, Boris Johnson. The mayor’s office said this was significantly better than the compliance rate for traditional community orders. The scheme will now be extended throughout the capital, with proposals for it to eventually operate nationwide. The year-long test was the first in which offenders were compulsorily fitted with the tags, which measure alcohol levels in perspiration and transmit the readings to a base station at the person’s home. If alcohol is detected or the tag is tampered with, it sends an alert to probation officers. Repeated breaches can bring prison sentences. Northamptonshire police previously ran a voluntary scheme with the same tags, made by an American company whose […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post ‘Sobriety tag’ scheme for people who commit booze-linked crimes extended appeared first on National Cyber Security.

View full post on National Cyber Security

Mayor extends sobriety tag pilot, following 91 per cent success rate

Source: National Cyber Security – Produced By Gregory Evans

A scheme to tackle alcohol-related crime through the use of compulsory electronic ankle tags has proved such a success it is being extended, the Mayor of London Boris Johnson has announced.  The one year ‘sobriety tag’ trial kept 91 per cent of offenders sober and is to be continued, with proposals for a capital-wide roll-out. In the first scheme of its kind in the UK, the compulsory, round the clock ankle tags monitor alcohol in an offenders’ perspiration. They have been used in Croydon, Lambeth, Southwark and Sutton, for offences such as drink driving, assault, and drunk and disorderly conduct for the last year. 111 ‘alcohol abstinence monitoring requirement’ orders have been issued to date and more than 100 offenders have complied with their order and through wearing the tag remained sober for up to 120 days. The average compliance rate for other similar community based orders is 61 per cent. Alcohol-related crime is estimated to cost the UK between £8bn and £13bn every year, placing a heavy burden on public services – 40 per cent of all A&E attendances are related to alcohol misuse. According to Public Health England, alcohol-related crime is significantly higher in London than all other […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Mayor extends sobriety tag pilot, following 91 per cent success rate appeared first on National Cyber Security.

View full post on National Cyber Security

Legislature asked to adopt Cyber Crime Act

Source: National Cyber Security – Produced By Gregory Evans

ISLAMABAD – Former provincial minister Mian Zahid Hussain – who head Pakistan Businessmen and Intellectuals Forum (PBIF) – has said that the number of internet users in the world has surpassed three billion while another one billion mobile internet would be added to it soon.   Presently, 192 countries are providing 3G services catering for half of the global population, while 102 countries have 4G networks, he said. A recent study suggests that 71 percent of the world’s population would be using mobile internet by 2019, while per capita usage would be three times higher by then.   Hussain said that the available material, programmes, websites and other services of the internet were multiplied every day, revolutionizing the technology being used. So far, one million applications have been developed by manufacturers of different operating systems and usage of apps has exceeded browsing on PCs in many countries.   He said that the mobile apps were of great help to governments, masses, business community, farmers, and students. He said that the internet has played basic role in making world a global village. He said that the internet revolution came to Pakistan after privatisation of PTCL which introduced high-speed internet, new technologies […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Legislature asked to adopt Cyber Crime Act appeared first on National Cyber Security.

View full post on National Cyber Security

In no area are we more vulnerable

Source: National Cyber Security – Produced By Gregory Evans

As a member of the House Select Committee on Intelligence, I am reminded every day that we live in a dangerous world. It is violent and chaotic, and it’s becoming more so all the time. But among the many national security threats that we face, in no area are we more vulnerable, and do we face so great a destructive potential, than the cyber realm. Our power grid, banking system, energy pipelines, air traffic control and other critical systems all are at risk. The recent cyberattack on the Office of Personnel Management is a clear demonstration of our vulnerabilities. It’s no coincidence that our adversaries chose to strike the OPM. Not only did they gain access to the personal information of 22 million current and former federal employees, but they also stole highly sensitive information collected in the security-clearance process. As a former Air Force pilot, I know how extensive and intensely personal these files are. The fact that the attackers were so brazen shows they knew that the benefits of gaining this information far outweighed the risks of getting caught. Because most cyberattacks do not produce the physical devastation of conventional aggression, it’s easy to ignore the destruction that […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post In no area are we more vulnerable appeared first on National Cyber Security.

View full post on National Cyber Security

BlackBerry Ltd Prepares For More Cyber-Threats With Medical Hack

Source: National Cyber Security – Produced By Gregory Evans

BlackBerry Ltd (NASDAQ:BBRY) (TSE:BB) took the stage to demonstrate the way in which a terrorist could access an infusion pump inside a hospital and give patients a lethal morphine dose. The demonstration was held in New York City, during the global security forum conducted by the Canadian firm, which is keen to establish itself as a major provider of security for all kinds of equipment that connect to the internet. BlackBerry QNX, a security expert In the demonstration, the Canadian company showed how a would-be-terrorist got access to the wirelessly connected pump, which is a standard hospital item, hacked its password and issued remote commands on a computer to change the way it dispensed morphine. BlackBerry QNX is largely seen as an operating system that could apparently prevent such attacks on infusion pumps. BlackBerry bought QNX after buying QNX Software Systems in 2010. QNX is also one of the major features in BlackBerry’s latest handset operating system, BlackBerry 10. QNX has become the major platform across every walk of life from power generation systems to wind turbines, nuclear stations and hydroelectricity plans. QNX is in 50 million cars to drive computing and fuel infotainment systems, BlackBerry informed those who attended the […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post BlackBerry Ltd Prepares For More Cyber-Threats With Medical Hack appeared first on National Cyber Security.

View full post on National Cyber Security

Five Men Charged in Connection with JPMorgan Hack

Source: National Cyber Security – Produced By Gregory Evans

Four men in Florida and Israel were recently arrested in connection with last year’s massive data breach at JPMorgan Chase, and a fifth man was charged but remains at large, The New York Times reports. According to the Times, the breach appears to have been aimed specifically at fueling a series of fraudulent investment schemes involving penny stocks and Bitcoin. An unidentified source told the Times the defendants had planned to use email addresses stolen from JPMorgan to target potential investors in penny stocks. Anthony Murgio and Yuri Lebedev were charged in Florida in connection with an operation converting Bitcoin into cash; and Israeli residents Gery Shalon, Ziv Orenstein and Joshua Samuel Aaron were charged with running a pump-and-dump stock scheme. Aaron remains at large. “As alleged, the defendants manipulated trading in U.S. securities from overseas, using fake identities to funnel millions of dollars in unlawful proceeds through a web of international shell companies,” Manhattan U.S. Attorney Preet Bharara said in a statement. “Using false and misleading spam e-mails sent to millions of people, these defendants allegedly directed their pump-and-dump scheme from their computers halfway around the world.” Despite the bank’s statements to the contrary, FBI agents determined that the […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Five Men Charged in Connection with JPMorgan Hack appeared first on National Cyber Security.

View full post on National Cyber Security

Anonymous claims responsibility for Census Bureau hack

Source: National Cyber Security – Produced By Gregory Evans

Online hacking group Anonymous is taking responsibility for breaching U.S. Census Bureau databases and posting what looks like personally identifiable information on various federal and state government employees. In a tweet Wednesday, the collective posted a link to a website that houses four large text documents that appear to include the names, email addresses, work addresses and office phone numbers for thousands of current and former federal employees. One of the documents also appears to list information on employees in a number of different states, as well as information on employees of private accounting and auditing firms across the country. Another document also seems to show password hashes of database users, along with a library of various Oracle database utilities and files. In a statement to FedScoop, Census spokesman Michael Cook said the bureau is investigating “unauthorized access to non-confidential information on an external system that is not part of the Census Bureau internal network.” Access to that system has been restricted as part of the bureau’s investigation. The breach was first reported by the U.K. edition of the International Business Times. The bureau did not comment on whether they discovered the hack themselves or were alerted by another agency. […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Anonymous claims responsibility for Census Bureau hack appeared first on National Cyber Security.

View full post on National Cyber Security

Vehicle hack could have military implications

Source: National Cyber Security – Produced By Gregory Evans

As military vehicles become increasingly dependent on electronics and computers, much as are commercial cars and trucks, program managers must take cybersecurity needs into account. A recent experience documented in Wired makes the potential risks chillingly clear. Vehicle electronics, or vetronics, are a vital aspect of today’s military transport. In 2010, the Army initiated the Vehicle Integration for C4ISR/EW Interoperability (VICTORY) standard in an attempt to increase vetronics interoperability. Contractors responded with open standards architecture, data bus-centric designs and comprehensive kits for new vehicles and retrofits.   Andy Greenberg, a senior writer for Wired, allowed hackers —  security engineer Charlie Miller of Twitter and Chris Valasek director of vehicle safety research at Ioactive — to take over his Jeep Cherokee just to show what they could do. At first, the attackers took over systems that allowed them to annoy him without causing real danger. They blasted cold air from the vents, tuned the radio to a hip-hop station at high volume and turned on the windshield wipers. And then, the attackers killed the Jeep’s transmission. “Immediately my accelerator stopped working. As I frantically pressed the pedal and watched the RPMs climb, the Jeep lost half its speed, then slowed to […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Vehicle hack could have military implications appeared first on National Cyber Security.

View full post on National Cyber Security

‘Chip and pin’ credit cards are vulnerable, too

Source: National Cyber Security – Produced By Gregory Evans

Have you received your new or reissued credit card with a chip that stores your credit-card data? The cards have a square, gold or silver metallic-like image. If we believe recent news reports, these “smart” chip embedded cards will help stop the growing cascade of ID theft victims. Unfortunately, it doesn’t appear to be working. Contrary to those reports, the roll-out of the new EMV (Europay MasterCard Visa) chip card actually will increase “new account fraud” and “account takeover” by 90 percent over the next four years, according to Javelin Strategy & Research. The new cards will help reduce in-person card fraud, but online transactions will disturbingly more than make up for this as ID-theft criminals take advantage of EMVs web weaknesses. However, if you’re a business, look out for the coming “liability shift.” More on this later in the column. Javelin Strategy said that card-not-present fraud losses totaled $10 billion in 2014 but will jump to $19 billion in 2018, according to its 2015 Data Breach Fraud Impact Report. For years, the traditional credit card with a magnetic-stripe has been the target for ID-theft criminals. Those cards store data in the stripes that does not change and is easy to […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post ‘Chip and pin’ credit cards are vulnerable, too appeared first on National Cyber Security.

View full post on National Cyber Security

Fiat-Chrysler recalls 1.4 million vehicles in wake of hack

Source: National Cyber Security – Produced By Gregory Evans

We were waiting for the other shoe to drop, and here it is: Fiat Chrysler Automobiles (FCA) has announced it is voluntarily recalling 1.4 million vehicles across its various brands and model lines, in the wake of the discovery of a zero-day exploit that lets hackers remotely force late-model Jeep Cherokees off the road. All someone needs is the IP address of a car armed with Chrysler’s UConnect infotainment system, and they can infiltrate the car’s network via its Wi-Fi hotspot feature, rewrite the OS firmware, and then control all of the major systems of the car: accelerator, brakes, steering, air conditioning, and more. Here’s the main text of the FCA recall press release: “The recall aligns with an ongoing software distribution that insulates connected vehicles from remote manipulation, which, if unauthorized, constitutes criminal action… Further, FCA US has applied network-level security measures to prevent the type of remote manipulation demonstrated in a recent media report. These measures – which required no customer or dealer actions – block remote access to certain vehicle systems and were fully tested and implemented within the cellular network on July 23, 2015.” The hack also lets someone remotely monitor the car’s location via GPS tracking, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Fiat-Chrysler recalls 1.4 million vehicles in wake of hack appeared first on National Cyber Security.

View full post on National Cyber Security

Page 1 of 2,39512345»102030...Last »

My Twitter

Gregory D. Evans On Facebook