Koh Samui mafia crackdown: More tourist centers next

Source: National Cyber Security - Produced By Gregory Evans

The success of crackdowns on criminal gangs operating on the resort island of Koh Samui last week has encouraged police to expand their list of targets to include more tourist destinations nationwide. Acting chief of the Central Investigation Bureau (CIB) Thitirat Nonghanpitak led about 300 police together with military forces in a dawn operation on the resort island on Friday. A combined team of 756 police and military raided 26 spots believed to be the hideouts of powerful people or criminals. They arrested five suspects and confiscated 20 guns and 835 rounds of ammunition as well as three kilogrammes of kratom, a narcotic plant. The decision to look into criminal cases on the island came after local businessman Panas Kao-uthai, 49, was gunned down in a restaurant early this month, apparently as a result of business conflicts among so-called influential figures on the island. His death frightened villagers and caused panic on the island, which is Thailand’s top tourist destination. There was a concern that the high level of crime on the island was tarnishing its reputation as a safe tourist destination. Authorities were urged to speed up their probe into the murder. During the operation, there was a search […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Koh Samui mafia crackdown: More tourist centers next appeared first on National Cyber Security.

View full post on National Cyber Security

Local police chiefs focus on accountability, technology

Source: National Cyber Security - Produced By Gregory Evans

The national debate over how police interact with the public hasn’t gone unnoticed by several chiefs in Lake County. It’s the paths they’re taking to increase police accountability that differ. Police chiefs in Hammond, East Chicago, Gary, Griffith and Schererville also face the never-ending challenge of finding funding to purchase a growing list of technologies. Hammond Police Chief John Doughty said his department is currently testing body cameras from four companies. All officers working on patrol, traffic and gang and narcotics units could begin wearing the cameras by this summer. The cameras often are held up as a way to reduce unfounded complaints and increase police accountability. Two controversies last year in which Hammond police were accused of racial profiling and excessive force have decreased initial resistance to the cameras among the rank and file, Doughty said. The department is looking to purchase 125 to 150 body cameras at a cost of about $80,000, he said. The Gary Police Department also is in the process of acquiring body cameras for testing, spokesman Thomas Decanter said. East Chicago police have “an open mind” and are researching the feasibility of body cameras, Police Chief Mark Becker said. One of the greatest challenges […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Local police chiefs focus on accountability, technology appeared first on National Cyber Security.

View full post on National Cyber Security

Importance of nutrition

broccoliNot only is March the beginning of spring and warmer weather, it also happens to be National Nutrition Month. Now, there are some of us who are ardent about keeping up with their nutrition intake and eating as healthy as possible. Some of us, though, are not as keen. We constantly hear from doctors and healthcare professionals regarding the importance of nutrition, but why is nutrition so important? What are the benefits? Well, in honor of March being National Nutrition Month, here is a little insight into the world of nutrition.

First off, what exactly is nutrition? According to the website, What is Nutrition?, “Nutrition is the study of food at work in our bodies, our source for energy, and the medium for which our nutrients can function. Think of nutrition as the building blocks of life.” The website goes on to add, “Good nutrition means getting the right amount of nutrients from healthy foods in the right combinations.” Nutrition and making health-conscious decisions is vital in maintaining our health and the well-being of bodies.
So many of us tend to skim over the nutrition charts on the back of food products and not really give much thought to what we consume. Not maintaining a healthy diet and eating all the necessary nutrients our bodies need, can lead to serious consequences. Unhealthy eating directly contributes to the high percentage of obesity in the United States. According to the President’s Council on Fitness, Sports & Nutrition, about 33.8% of U.S. adults are obese and approximately 17% or 12.5 million of children and adolescents aged 2-19 years are obese. Even for those of us who maintain a healthy weight, poor dieting is directly correlated with major health risks resulting in illness and even death.

Some of the more serious health problems involve various types of vascular issues: heart disease, hypertension or high blood pressure, type 2 diabetes, osteoporosis, and certain types of cancer. These statistics and health risks are truly staggering. The Centers of Disease Control and Prevention offer these eye-opening facts:

• A poor diet can lead to energy imbalance (e.g., eating more calories than one expends through physical activity) and can increase one’s risk for overweight and obesity.
• A poor diet can increase the risk for lung, esophageal, stomach, colorectal, and prostate cancers.
• Individuals who eat fast food one or more times per week are at increased risk for weight gain, overweight, and obesity.
• Drinking sugar-sweetened beverages can result in weight gain, overweight, and obesity

These health risks are truly serious, but the benefits of a healthy diet, balance nutrition consumption and a good amount of daily exercise certainly carry more weight. Being informed and knowing what is nutritional is pivotal in maintaining one’s health. This is why the campaign for National Nutrition Month is both helpful and insightful. As brought out in the National Nutrition Month website, “The campaign is designed to focus attention on the importance of making informed food choices and developing sound eating and physical activity habits.”

Yes, March is the beginning of spring, but it can also be the month that brings more than warmer weather; it can bring life-altering information on nutrition and how vital it is in our lives.

The post Importance of nutrition appeared first on Atlanta Free Speech.

View full post on Atlanta Free Speech

6 notorious hackers and their second careers

Source: National Cyber Security - Produced By Gregory Evans

The traditional hacker of yore, commonly thought of as a pimply adolescent with Cheetos-colored fingers, is all grown up now. But in the Clinton-era glory days, the hacker was seen as a technological terror, plying a trade few understood. Most of the infamous hackers of Internet past are all adults now, with mortgages, car payments and jobs — some very good ones, too. They’ve passed the torch to people like Julian Assange and the “hacktivist” group Anonymous, whose combined efforts have seen them target everyone from the Church of Scientology to the U.S. military to PayPal. Fortune decided to find out what happened to some of the most infamous hackers of the 1980s and 1990s. They made hacking famous in a hazy and distant past, when you couldn’t connect to the Internet without robust a dial tone, and when AOL discs were actually something that people were excited to find in their mailboxes. You may be surprised at what these 6 are doing now. Mark Abene Mark Abene was a kid from Queens, New York who became famous as the hacker known as “Phiber Optik.” In 1992, he went to Federal prison after pleading guilty to hacking into the computer […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post 6 notorious hackers and their second careers appeared first on National Cyber Security.

View full post on National Cyber Security

Uber delays criminal test case in Victoria

Source: National Cyber Security - Produced By Gregory Evans

Controversial ride sharing service Uber claims its drivers were entrapped into committing a crime, in a legal move that will frustrate regulators and further delay a closely watched test case. Victorian Taxi Services Commissioner Graeme Samuel is pushing ahead with criminal charges against a dozen drivers registered with UberX, in a test case on the legality of the popular service. But Uber’s legal challenge has again delayed the trial, which was expected to proceed on Monday, until at least July in a move that gives the transport app more time to gain a stranglehold in the market. “It’s really the defendant, who has more control over how long it takes than I do,” prosecutor Morgan McLay told a frustrated magistrate Peter Power, after the judge was informed the two days set aside would not be long enough to hear Uber’s objections. “I am in the dark as to the extent of the issues they take and what they claim is the illegality of the evidence,” Mr McLay said. Uber has shown a track record of frustrating regulators, including paying fines for drivers and it reportedly tracked Queensland transport inspectors’ mobile phones to block them from accessing the Uber service again. Uber is challenging […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Uber delays criminal test case in Victoria appeared first on National Cyber Security.

View full post on National Cyber Security

HCandroiddock: Android Phone Charger*

HCandroiddock: Android Phone Charger*

The new HCAndroidDock is the perfect accessory to for charging your phone while keeping an eye on an entire room. This simple, nondescript dock has a microUSB port that will fit most Android smartphones. While it’s charging you can record clear 720p video right to the MicroSD card (not included). Because it plugs in there is no need to worry about battery life. The motion-detection mode also means you don’t have to sift through hours of blank video. The included radio remote makes operation quick and easy.

Features

  • Designed for Samsung Galaxy smartphones*
  • Tiny pinhole camera hidden in phone dock – allows for continual power while remaining covert
  • Working charging station
  • Motion detection
  • Automatic overwrite
  • Remote control operation
  • Time/Date stamp

Technical Specs

  • Video Resolution: 1280 x 720 @ 30fps
  • Video Format: AVI (H.264)
  • Viewing Angle: 120° Wide Angle
  • Motion Detection Distance: Up to 6 meters
  • Storage: MicroSD card up to 32GB
  • Storage Consumption: ~1GB consumed every 20 minutes
  • Min Lux: 1.5 Lux
  • Working Voltage: 5V
  • PC Interface: USB 2.0
  • Main unit is 2.75″ X 2.75 ” x 1.25″ (tallest point)

Includes

  • 1 x Android phone adapter
  • 1 x microUSB cable
  • 1 x AC adapter
  • 1 x Radio Remote Control
  • 1 x instruction Manual
  • 1 x USB card reader for microSD

Compatible With

  • Windows up to Win8
  • Mac

 

*Please note the following:

  • While this dock works best with Samsung Galaxy smartphones, other phones are compatible provided they have a microUSB charging connection. Because of the variation in cellphone design, the orientation of other phones when connected to the dock may be awkward.
  • If power is interrupted, the time and date may need to be reset.

 

View full post on Become007.com

LMGSMSafe: Cell Phone Frequency Monitor

LMGSMSafe: Cell Phone Frequency Monitor

Cellphones are everywhere these days! A new, unfortunately common, kind of spying is quickly becoming easier to execute and harder to detect. Modern Smartphones are much closer to computers than phones and, just like computers, they can be compromised. This means that even if your phone is not in use or even completely turned off it is still possible to activate the microphone and transmit that data anywhere in the world.

 

That’s where the brand new LMGSMSafe works best. Simply place your cellphone in the box and the LMGSMSafe turns on and immediately starts monitoring all transmissions your phone makes and notifies you with the easy to understand LED. The LMGSMSafe will detect GSM CDMA850 3G (UMTS) and Bluetooth signals so you’ll know exactly when your phone uses any of these communication protocols.

 

In the event that a signal is detected the LED will flash the color associated with that protocol. You also have the option to create white noise and completely mask any sound the phone’s microphone may hear.

 

Features

  • Simple operation
  • White Noise Generation
  • 10 to 15 days of battery life with moderate use with 2 AAA batteries
  • Attractive wooden exterior perfect for desks

 

Technical Specs

  • Range: GSM 900/1800 CDMA850 WCDMA2100 (3G UMTS) Bluetooth
  • Battery Life: 5 – 15 days depending on use
  • Dimensions: 3.75″ x 2.875″ x 4.125″
  • Maximum internal width: 2.875″ (70 mm)

 

Includes

  • 1 x LMGSMSafe
  • 1 x Low profile screwdriver
  • 2 x AAA batteries
  • 1 x Instruction Booklet

View full post on Become007.com

TapTrap: On Site Wired Telephone Bug Detector

TapTrap: On Site Wired Telephone Bug Detector

The TapTrap is the newest device in our arsenal of counter-surveillance measures. While there is currently no way to determine if there is a phone tap further up the line or from the phone company, Using the Tap Trap, you can check your phone line for on-premises series and parallel bugs and wiretaps. You can also check your telephone for the most common types of hook switch bypasses.

A hook switch bypass is a modification to the telephone instrument so that the carbon microphone (transmitter) or dynamic earphone (receiver) will pick up room sounds and pass them down the phone line to a listening post, even with the phone hung up. This effectively turns the telephone into a room monitor.

Tap Trap detects series devices with a resistance of 61 ohms or more. (Most series taps have a resistance of over 100 ohms.) It also detects parallel devices with a resistance of 65 megaohms or less. (Most parallel taps are under 30 meg-ohms.) It can also detect certain capacitively coupled taps.

It weighs 7 oz. and is furnished in a high impact case that measures 4.25″ x 3.25″ x 1.5″. The unit comes complete with all the necessary plugs, cords, and adapters, as well as a battery and an informative, illustrated instruction manual, so you can start looking for taps immediately.

Technical Specifications

  • Size: 4.25″ x 3.25″ x 1.5″
  • Power: 9V battery
  • Weight: 7 oz (9 oz with battery installed)
  • Series Tap Sensitivity: 61 ohms or greater
  • Parellel Tap Sensitivity: 65 megaohms or less

Included

  • 1 x Tap Trap
  • 1 x 9V Battery
  • 1 x RJ12 male to male adapter
  • 1 x RJ12 to clip connector
  • 1 x Alligator clip

View full post on Become007.com

Your iPhone And iPad Just Got Easier Than Ever To Hack

Source: National Cyber Security - Produced By Gregory Evans

Devices that break into iPhones by brute-forcing passwords have been around since the iPhone was released, but iOS engineers developed countermeasures, including the latest: a nuclear option that wipes phone data if the wrong password is entered 10 times. But this clever (and insidious) $300 black-market IP Box has beaten that system by plugging directly into the phone, according to a post by security consultancy firm MDSec. The MDSec tinkerers believe that the IP Box gets around the auto-wipe by plugging into the lightning charging port and, if the password fails, instantly rebooting the phone before it can save that failed attempt into its flash memory. Perpetual rebooting extends the time it takes to find the right password to about 111 hours, but a wiped phone is far less useful to a potential hacker than one with user data intact. Below is the firm’s demonstration of the IP Box in action: MDSec used the IP Box to successfully crack phones running Apple iOS 8.1, and they will attempt to repeat the break-in on a phone running the latest iOS, 8.2, which was released weeks ago. MDSec theorizes that this method could be an automated exploit of a known issue, CVE-2014-4451, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Your iPhone And iPad Just Got Easier Than Ever To Hack appeared first on National Cyber Security.

View full post on National Cyber Security

Easier Conference Calls With ‘Talk’ by AnyMeeting

Source: National Cyber Security - Produced By Gregory Evans

AnyMeeting is a communication startup that offers free web conferencing tools for online meetings and general conferencing needs. More recently, though, it has reached a new niche with the release of Talk: a free and simple to use service that allows the creation of conference calls with an extreme ease. Currently, conference calls can be a bit hard to get going, as it can be difficult to get everyone on the same page. Carriers that offer conferencing services often will limit the number of participants allowed on each conference call. Talk is really very easy to use – for starters, it does not require any registration whatsoever, by any of the members involved in the conference call. It just requires one of them to send an email, from any email account, to each and every participant in the call, as well as Talk’s email: talk@anymeeting.com. In fact, Talk is so easy to use that it also works with any calendar app or service allowing the invitation of other users, using the same method. Anyone can use Talk, as no registration is required. If privacy is a concern, know that your contact emails are never shared with others. When a user is invited, they receive an […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Easier Conference Calls With ‘Talk’ by AnyMeeting appeared first on National Cyber Security.

View full post on National Cyber Security

Page 2 of 2,368«12345»102030...Last »

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?
$15.95

Find Out More, Click Here!