Online Casinos Connected to Individuals Arrested in Pump-and-Dump Penny Stocks Scheme

Source: National Cyber Security – Produced By Gregory Evans

This past Tuesday, federal officials announced that four men had been arrested based on an investigation in to a pump and dump penny stock scheme as well as Bitcoin operation. After the announcement of the arrests, with the individuals being from Florida and Israel, the iGambling community has been able to connect two of the arrested men as the owners of as many as 13 online casinos. Included in the long list of casinos are Casino Titan and Loco Panda. The New York Times described the fake investment scheme as one that spanned across three continents and included operations in Florida and New York, along with Russia, Cyprus and Israel. Israeli authorities arrested Ziv Orenstein and Gerry Shalon, the two men connected to the online gaming websites. The FBI would like to extradite the two men to face charges in the US despite the fact the two are citizens of Israel. A fifth man is still wanted by police, Joshu S. Muel Aaron, as he is believed to be involved in the scheme as well. The individuals arrested now face charges that include: Securities Fraud Wire Fraud Aggravated Identity Theft Conspiracy to Commit Securities Fraud Conspiracy to Commit Wire Fraud […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Online Casinos Connected to Individuals Arrested in Pump-and-Dump Penny Stocks Scheme appeared first on National Cyber Security.

View full post on National Cyber Security

Hack of dating sites signals an end to promiscuous use of online identity

Source: National Cyber Security – Produced By Gregory Evans

If anybody is still labouring under the mistaken belief that anything online can remain private and secure, this week should have seen them finally admit defeat. In the US, UCLA Health reported) that 4.5 million health records had been compromised. UCLA Health runs four hospitals and 150 offices in Southern California, based at the University of California and Los Angeles. The security breech joins a long list of recent hacks of health insurance, and health services, companies, including that of health insurance company Anthem that had up to 80 million customer records illegally accessed earlier this year. More poignantly, and also this week, international dating site Ashley Madison admitted that hackers had accessed its systems and stolen details of its 37 million customers. The particular twist in this hack is that the site encouraged people in existing relationships to “cheat” on their partners and have casual affairs. Amongst information stolen by the hackers were details of customers’ sexual fantasies, which the hackers threatened to publish if demands to close down the site completely were not met. Companies that have been hacked normally follow up these events by announcing the increased security measures that they have taken, including hiring dedicated security […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hack of dating sites signals an end to promiscuous use of online identity appeared first on National Cyber Security.

View full post on National Cyber Security

Do auto manufacturers realise dangers of networked motors?

Source: National Cyber Security – Produced By Gregory Evans

While computers bring great benefits they come with drawbacks too – not least, as news stories reveal every day, the insecurity of often very private data connected to the public internet. Only now that computers are appearing in practically everything, the same insecurity also applies – as demonstrated by the drive-by hack of a speeding Jeep SUV, hijacked and shut down by security researchers as it sped past at 70mph. Vehicles are growing ever more sophisticated, with technological additions to newer models designed to increase safety, comfort and convenience while providing entertainment features and improving the car’s environmental impact. These innovations are more than just marketing ploys for manufacturers to sell their vehicles as cutting edge, they also help save money on materials and to comply with increasingly stringent safety and environmental laws. Consider the benefits of a fully-connected vehicle: computers are never distracted, never get tired. They may be able to learn from driver behaviour and, using technologies such as active lane assist, can even correct human errors of judgement to a certain degree. Human productivity can be boosted, allowing for example a hands-free phone call while behind the wheel. Concepts such as platooning – where cars follow each […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Do auto manufacturers realise dangers of networked motors? appeared first on National Cyber Security.

View full post on National Cyber Security

‘Showdown Year’ for Cyber-Attacks Has Hackers Demanding Ransom in Bitcoin

Source: National Cyber Security – Produced By Gregory Evans

(The Street) — Data breaches at eBay (EBAY), JPMorgan Chase (JPM) and Home Depot (HD) coupled with cyber-attacks on U.S. government agencies show the risks posed by hackers will only increase, regulators warn, and finance companies are finding themselves on the front lines. A case in point is the recent warning from the Financial Industry Regulatory Authority, or Finra, that a hacker group known as DD4BC has threatened denial-of-service attacks on its members unless they pay a ransom in the digital currency Bitcoin. The group typically gives the targeted firm a warning that sets a price to avoid the attack, Finra said. The next step is a “demonstration attack” accompanied by a demand for payment within 24 hours. Ransom demands for large firms have ranged from several thousand to several hundred thousand dollars, Finra said. Firms in New Zealand and Australia have been targeted, too, and the Swiss government sounded an alarm about DD4BC earlier this year. “In many ways, it is a showdown year,” said Kevin Petrasic, a partner in the banking and payment systems division at law firm Paul Hastings, which has offices in New York, Europe and Asia. “There are various reasons for this that have largely […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post ‘Showdown Year’ for Cyber-Attacks Has Hackers Demanding Ransom in Bitcoin appeared first on National Cyber Security.

View full post on National Cyber Security

Beating Cybercrime: The weakest link

Source: National Cyber Security – Produced By Gregory Evans

In an increasingly interconnected world, all banks have a stake in making it as hard as possible for cybercriminals to achieve their objectives, writes FX-MM’s Paul Golden. The revelation earlier this year that up to one billion dollars had been stolen from more than 100 banks across 30 countries over the last two years would have come as a shock only because of the scale of the losses. The Bank of England’s latest systemic risk survey found that during the first half of this year, 30% of respondents described a cyber attack as one of the five risks that would have the greatest impact on the UK financial system. That figure is three times higher than for the last six months of 2014 and at its highest ever level. On the other side of the Atlantic, cyber risk was identified as the number one concern by a panel of bank chief risk officers at an American Bankers Association risk management forum in May. There are particular concerns that smaller financial institutions will increasingly be targeted by cybercriminals. The US Office of the Comptroller of the Currency has called for vigilance, with a Federal Reserve Board meeting being told that cyberattacks against smaller banks are inevitable. In this context, it is concerning that a report […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Beating Cybercrime: The weakest link appeared first on National Cyber Security.

View full post on National Cyber Security

Patients Sue UCLA Hospitals for Hack Attack

Source: National Cyber Security – Produced By Gregory Evans

UCLA Health Systems’ failure to encrypt patients’ medical and financial information exposed 4.5 million of them to a hacker attack, which UCLA knew six months before it told them, a patient claims in a federal class action. Michael Allen claims UCLA Health Systems Auxiliaries violated its contractual obligation to protect the personal information of its patients. He sued the UCLA hospitals and the University of California Board of Regents on Monday, on behalf of “several millions of individuals.” Allen, of Casper, Wyo., was treated at a UCLA Health Center in February 2013. He claims that the personal information he gave the hospital “was left in an unencrypted state and stolen by cyber thieves.” “Due to defendants’ failure to take the basic steps of encrypting patients’ data, it was much easier for cyber thieves to interpret the information, use it to steal the identities of defendants’ patients or sell [it] to others,” Allen says in the complaint. A months-long hacker attack targeted UCLA Health Systems, which admitted it did not take steps to encrypt patients’ data, the Los Angeles Times reported. The unknown hackers got names, birth dates, Social Security numbers, medical information, ID numbers for Medicare and health insurance policies, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Patients Sue UCLA Hospitals for Hack Attack appeared first on National Cyber Security.

View full post on National Cyber Security

Smartwatches open new hacking risk: study

Source: National Cyber Security – Produced By Gregory Evans

The surging market for smartwatches opens up new ground for hackers, according to researchers who found vulnerabilities in all the devices they tested. A study by Hewlett-Packard’s HP Fortify found “that 100 percent of the tested smartwatches contain significant vulnerabilities, including insufficient authentication, lack of encryption and privacy concerns,” the company said in releasing the findings Wednesday. The researchers found “that smartwatches with network and communication functionality represent a new and open frontier for cyberattack,” the report said. The research highlights the cyber risks from the growing number of connected devices — such as refrigerators, cars, coffee makers and lightbulbs — sometimes referred to as the “Internet of Things.” Smartwatches could pose special risks because they may store sensitive information such as health data, and could connect to cars and homes to unlock them, HP said. “Smartwatches have only just started to become a part of our lives, but they deliver a new level of functionality that could potentially open the door to new threats to sensitive information and activities,” said Jason Schmitt, general manager at HP Security. “As the adoption of smartwatches accelerates, the platform will become vastly more attractive to those who would abuse that access, making it […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Smartwatches open new hacking risk: study appeared first on National Cyber Security.

View full post on National Cyber Security

Hacker: ‘Hundreds of thousands’ of vehicles are at risk of attack

Source: National Cyber Security – Produced By Gregory Evans

A security expert who recently demonstrated he could hack into a Jeep and control its most vital functions said the same could be done with hundreds of thousands of other vehicles on the road today. Security experts Charlie Miller and Chris Valasek collaborated with Wired magazine to demonstrate how they could remotely hack into and control the entertainment system as well as more vital functions of a 2015 Jeep Cherokee. Both hackers are experienced IT security researchers. Miller is a former NSA hacker and security researcher for Twitter and Valasek is the director of security research at IOActive, a consultancy. As the Wired reporter drove the vehicle on a highway, the hackers were able to manipulate its radio and windshield wipers and even shut the car down. The vehicle hack took place as Wired reporter Andy Greenberg drove the Jeep Cherokee on Rte. 40 in St. Louis. The hackers were 10 miles away at the time. The hackers said they were able to use the cellular connection to the Jeep’s entertainment system or head unit to gain access to other systems; a vehicle’s head unit is commonly connected to various electronic control units (ECUs) located throughout a modern vehicle. There […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker: ‘Hundreds of thousands’ of vehicles are at risk of attack appeared first on National Cyber Security.

View full post on National Cyber Security

Hacker profiling: who is attacking me?

Source: National Cyber Security – Produced By Gregory Evans

Sophisticated cyber attacks have evolved rapidly in the last year, crippling online networks and causing serious financial, operational and reputational damage on firms, regardless of industry or nationality. Many executives rank a large-scale attack as the most important risk facing their firm. The biggest concern generally isn’t the financial cost, but the reputational impact, especially when it comes to consumer data or sensitive internal information. An organisation’s reputation is fragile – once tarnished, it can be difficult to get back. The pressures on CISOs and their teams is clearly on the rise. Over 95% of CISOs say it is at least “moderately likely” that their company will face what they call an “advanced” attack in the next 12 months. Worse, nearly three-quarters of CISOs think their function won’t deal with it properly. >See also: Why you are probably an accidental hacker It should come as no surprise that if the team does not already have a detailed plan in place – a plan that has been rehearsed by the key players – the consequences of the breach will be much worse. Advanced threats are substantially different to traditional threats faced by CISOs and their teams. They differ because they are harder to […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker profiling: who is attacking me? appeared first on National Cyber Security.

View full post on National Cyber Security

SYMANTEC IS ALREADY PLANNING FOR A SAFER CYBER MONDAY

Source: National Cyber Security – Produced By Gregory Evans

While Cyber Monday is still months away, information protection company Symantec is challenging eCommerce retailers to make this year’s annual online shopping event, which takes place on the Monday following Thanksgiving and Black Friday, the safest on record. In preparation, Symantec announced yesterday (July 22) the release of an enhanced version of its Symantec SSL Assistant Plus encryption tool, which it said will allow online retailers and other sites to keep customers safe while they shop. “When it comes to SSL encryption, you get what you pay for,” Quentin Liu, VP of engineering at Symantec, said in a company release. “With Symantec SSL Assistant Plus, we’re delivering extreme value over free, basic SSL options by hiding complexity and helping to ensure that websites are properly secured. In addition, we make the entire process as simple and intuitive as installing an app on a phone. SSL Assistant Plus is also backed by our world class technical support organization and offers peace of mind because it’s created by security experts. Our goal is to create a safer web as less than 1 percent of online sites today are encrypted and use certificates,” Liu explained. According to a U.S. online consumer study conducted by Symantec, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post SYMANTEC IS ALREADY PLANNING FOR A SAFER CYBER MONDAY appeared first on National Cyber Security.

View full post on National Cyber Security

Page 2 of 2,395«12345»102030...Last »

My Twitter

Gregory D. Evans On Facebook