The NSA failed to hack your phone

nsa

Source: National Cyber Security - Produced By Gregory Evans

Gemalto, the world’s largest manufacturer of SIM cards, said it believes it was jointly hacked by U.S. and U.K. spy agencies. At the time of the attacks in 2010 and 2011, Gemalto was unable to identify the perpetrator, “but we now think that they could be related to the NSA and GCHQ.” However, the attack “could not have resulted in a massive theft,” the company said in a statement. Gemalto released on Wednesday the results of an internal investigation after media reports last week claimed the NSA and its U.K. counterpart hacked into the company to get hold of encryption keys that allowed access to SIM cards around the globe. Related: Super-sneaky malware found in companies worldwide The attacks breached Gemalto’s office networks and attempted to intercept the encryption keys. But it ultimately failed, due to a secure transfer system Gemalto had in place. Plus, the company said that even if the encryption keys had been stolen, the spy agencies would only have the ability to spy on communications over 2G mobile networks, as 3G and 4G networks “are not vulnerable to this type of attack.” Based in the Netherlands, Gemalto reportedly makes two billion SIM cards per year. Clients […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post The NSA failed to hack your phone appeared first on National Cyber Security.

View full post on National Cyber Security

US wants to hack your phone because it doesn’t have real spies it needs

index

Source: National Cyber Security - Produced By Gregory Evans

 Powered by Max Banner Ads  As Google’s Android smartphone operating system was coming under attack in fall 2012 from malware with the colorful names of “Loozfon” and “FinFisher,” the FBI’s Internet Crime Complaint Center issued an alert to help defend against the threat. “Depending on the type of phone,” the FBI said, “the operating system may have encryption available. This can be used to protect the user’s personal data.” How times have changed. Last fall, when Apple and Google announced they were cleaning up their operating systems to ensure that their users’ information was encrypted to prevent hacking and potential data loss, FBI Director James Comey attacked both companies. He claimed the encryption would cause the users to “place themselves above the law.” The tech community fired back. “The only actions that have undermined the rule of law,” Ken Gude wrote in “Wired,” “are the government’s deceptive and secret mass-surveillance programs.” The battle resumed in February 2015. Michael Steinbach, FBI assistant director for counterterrorism, said it is “irresponsible” for companies like Google and Apple to use software that denies the FBI lawful means to intercept data. Yet the FBI does have a lawful means to intercept it: the Foreign Intelligence […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post US wants to hack your phone because it doesn’t have real spies it needs appeared first on National Cyber Security.

View full post on National Cyber Security

Small steps to organize your time

organize photoIn this day and age, time is everything. From the time we wake up, to the time we go to sleep, we are constantly moving. As a full-time college student and full-time employee, it can be difficult for me to juggle these responsibilities and find time for a personal life. It can definitely be tricky when trying to figure out what matters most between the two. In my case, both matter. Therefore, I have found a few simple tips to help you move around a tight schedule, easily and effectively.

Step 1-Organize your tasks

Write down the most important tasks on your schedule. Now this step can be problematic because often times we like to mix business with pleasure. Schoolwork, internships, and your job should be a priority as these are the things that bring you further in your career path and help you to excel. Now that you have listed what matters most within your schedule, you must assign time frames to get all of those tasks done throughout the day. I usually purchase three planners, one for school, one for work and one for both school and work. I list the date and times of when things are due or when I would like to have the assignment or goal accomplished.

Step 2-Write down your accomplishments

Write down everything you want to accomplish in your personal life (time with friends/family, party etc.) Since you have already organized your professional goals, assignments or other things you need to do, this step may be a little bit easier to accomplish.

Step 3-Relax

Many times we rush to cross things off of our to-do list and the outcomes are not as great as they could be; therefore relaxation is essential. Now by relaxing, I do not mean be lazy or procrastinate, but give yourself time to breathe. Whether it is a 5 minute walk, a 20-minute nap, or even a causal moment reading or writing, it is okay to engage in something that will take your mind off of your hectic schedule for a moment. This has helped me many times because it has allowed me to just “breathe”. As a result, I am able to gather my thoughts and get back on track with more passion and energy.

Step 4-Reflect

In order to ensure that you are on track with your daily schedule, you must reflect. After a week or two, I sit down and reflect on my actions and my schedule to figure out what is working and what is not working. Since there are only 24 hours in a day, reflecting can show you what you need to work on and what you may need to let go of or change.

I hope these steps have helped with your schedule, whether in school, at work or both. Remember, you only have so many hours in a day, so maximize your time to make the most out of it.

The post Small steps to organize your time appeared first on Atlanta Free Speech.

View full post on Atlanta Free Speech

Hacker in a day: why you should learn how to hack a system

images

Source: National Cyber Security - Produced By Gregory Evans

 Powered by Max Banner Ads  My name is third from the top on the dashboard. Next to it is a figure somewhere around 200,000 Hong Kong dollars — my bank balance — but I can’t quite keep track because the digits are repeatedly turning red and decreasing rapidly. My only way to combat the losses is to work faster than the eight other people on MacBooks at my table. In HK$15,000 increments, I’m stealing back the cash from their accounts and transferring it to mine. It’s a race to the top of the leaderboard, and every time my numbers turn crimson my face burns and my pulse races. I check the fitness tracker on my wrist. I’ve hit a cardio training heart rate of 139bpm. Hacking, it turns out, is quite a thrill. Monday saw the launch of a new course from London coding school Decoded. It’s called Hacker_in a day — the idea being that it will teach you some basic skills for cyber-attacking and thereby give you a sense of how easily your personal details could be accessed, your accounts infiltrated. After a quick lesson, we have each managed to experiment on an insecure online banking site until […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker in a day: why you should learn how to hack a system appeared first on National Cyber Security.

View full post on National Cyber Security

New technology helps Vancouver police predict future crimes

00_25_van_predictivepolicing_contributed

Source: National Cyber Security - Produced By Gregory Evans

Better think twice before committing a crime – the Vancouver Police Department might already be on its way to apprehend you. This year the force will finish implementing a “predictive policing” tool that uses data to forecast the movement of crime and allows officers to deploy to hot spots based on when crime will likely occur, police Chief Jim Chu told city council Tuesday. The idea is the presence of police will reduce the amount of crime that actually happens, Chu said. It may sound like a gimmick from Minority Report (the futuristic Tom Cruise movie where psychics helped police arrest murderers before they killed), but the mapping tool installed on mobile computers in patrol cruisers is apparently quite effective. The tool is 60 to 70 per cent accurate within a 150-metre radius at one-hour intervals, Chu said. It displays what will happen in the next eight to 12 hours. The VPD started incorporating the technology in 2014, according to police board reports. It is incorporated into GeoDash, the mobile information system that lets officers check out locations of recent crimes without leaving their cars. The data is updated on a daily basis so it’s easy to spot trends in […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post New technology helps Vancouver police predict future crimes appeared first on National Cyber Security.

View full post on National Cyber Security

Internet perverts on ‘borrowed time’ in crackdown on online crime

police

Source: National Cyber Security - Produced By Gregory Evans

POLICE have set up a crack cyber-crime unit to catch perverts, fraudsters and other criminals using the internet to target their victims. Almost 250 officers have been trained in how to investigate online crimes in Staffordshire. Now police warn there will be no hiding place for offenders who use the internet to commit their crimes. Assistant Chief Constable Jonathan Drake said: “The internet is sometimes thought of as a private, almost lawless space, but if you share indecent images of children, if you groom children online, or if you commit any other criminal offence then frankly you’re on borrowed time until we arrest you.” It is hoped the new cyber-crime team will reduce the number of victims being sexually abused by online predators. They have set up the Internet Investigation Team to better tackle online crimes. Hundreds of specially-trained officers are targeting cyber-enabled crimes – where computers are used to commit a range of offences – or cyber-dependent crime, which is often computer hacking. Other cyber-crimes dealt with by police include burglary, arson, robbery, fraud and criminal damage. Assistant Chief Constable Jonathan Drake said: “We have set up the internet investigation team, a team of dedicated officers with special skills in using […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Internet perverts on ‘borrowed time’ in crackdown on online crime appeared first on National Cyber Security.

View full post on National Cyber Security

Website/IP MarvelEntertainment.com may be hackable #amihackerproof, #kids,#MarvelEnterta

Source: National Cyber Security - Produced By Gregory Evans

 Powered by Max Banner Ads  Personal Notes – Marvel Entertainment site might be hackable find out if your site can be hacked #aihp#hackerproof#htcs AIHP Disclaimer: There are 5 stages to computer hacking, Reconnaissance, Scanning, Gaining Access, Maintaining Access and Covering Tracks. AmIHackerProof.com handles the first 2 stages, Reconnaissance and Scanning. When you see a computer hacker in the movies or on television, they never show you the reconnaissance or the scanning portion. 80% of computer hacking is research. AmIHackerproof.com also scans your website like a hacker to find vulnerabilities that might exploit the website. The following information is based on our vulnerability test, which may differ from other vulnerability scanners. Please note, websites are not hosted on the same server as the email server or the home/office network. What this scan does show, is the level of experience of the individuals hired by the company to protect their website. A persons level of education in website design or computer science, does not suggest they are computer hackers. Most computer hackers do not have college degrees. Some people believe that because they do not have any personal, financial or client information at their website, they are not vulnerable to being hacked. Here […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Website/IP MarvelEntertainment.com may be hackable #amihackerproof, #kids,#MarvelEnterta appeared first on National Cyber Security.

View full post on National Cyber Security

Hackers developed a new tool that can flood networks with spam phone calls

tnt-instant-up-phone-hacking-tool

Source: National Cyber Security - Produced By Gregory Evans

Hackers are selling a new tool that lets anyone flood a phone network with spam phone calls. The Register reports that Eastern-European hackers have developed a new piece of kit that is being sold online. The TNT Instant Up can be used to flood phone numbers with calls, stopping the phone from being used until the device is turned off. You can buy the device online, if you’re so inclined. The TNT Instant Up works by flooding a phone number with calls, crippling any phone system. It uses several connected modems and SIM cards to repeatedly dial numbers. IntelCrawler reports that hackers are selling the device for prices between $560 and $1,200. You might think that the Instant Up device is perfect for pranks, but it actually has a far more sinister use. Hackers can use TDoS (telephone denial of service) tools to take down crucial systems. IntelCrawler says that the FBI has identified TDoS attacks taking place last summer, and they were aimed at the healthcare sector. It also says that hackers have blocked a 911 emergency service in the US through the use of a similar device. source: http://www.businessinsider.com/tnt-instant-up-phone-hacking-tool-2015-2  

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hackers developed a new tool that can flood networks with spam phone calls appeared first on National Cyber Security.

View full post on National Cyber Security

Want to visit an inmate? Increasingly, you’ll have to log on

inmate

Source: National Cyber Security - Produced By Gregory Evans

Jennifer Walter walked into a portable room outside the Napa County Jail last week and had a brief conversation with her 21-year-old son. But despite being just 100 feet away, the inmate appeared from inside the jail on a computer screen for a video chat of the type hosted by Skype or Google Talk. The mother and son were on the front lines of a national trend that has jails around the country moving away from in-person visits, replacing them with digital ones. But while the shift has some clear advantages — for counties, inmates and their loved ones — prisoner advocates are raising alarm, saying video visitation is impersonal and that its emergence has frequently left jail policies in the hands of profit-driven technology companies. A consultant hired by the U.S. Department of Justice reported in December that video chats are best used as a supplement, but “should not be deemed as an invitation to discontinue in-person visiting.” The consultant added, “Traditional, in-person visiting is a best practice that should continue in all correctional settings when possible.” Counties shift to video However, in the Bay Area, Napa officials have allowed only video visitation for family and friends since premiering […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Want to visit an inmate? Increasingly, you’ll have to log on appeared first on National Cyber Security.

View full post on National Cyber Security

Website/IP ThenewBatman-SupermanAdventures.com may be hackable #amihackerproof, #kids,#ThenewBatman-

Source: National Cyber Security - Produced By Gregory Evans

 Powered by Max Banner Ads  Personal Notes – The new Batman-Superman site might be hackable find out if your site can be hacked #aihp#hackerproof#htcs AIHP Disclaimer: There are 5 stages to computer hacking, Reconnaissance, Scanning, Gaining Access, Maintaining Access and Covering Tracks. AmIHackerProof.com handles the first 2 stages, Reconnaissance and Scanning. When you see a computer hacker in the movies or on television, they never show you the reconnaissance or the scanning portion. 80% of computer hacking is research. AmIHackerproof.com also scans your website like a hacker to find vulnerabilities that might exploit the website. The following information is based on our vulnerability test, which may differ from other vulnerability scanners. Please note, websites are not hosted on the same server as the email server or the home/office network. What this scan does show, is the level of experience of the individuals hired by the company to protect their website. A persons level of education in website design or computer science, does not suggest they are computer hackers. Most computer hackers do not have college degrees. Some people believe that because they do not have any personal, financial or client information at their website, they are not vulnerable to being hacked. […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Website/IP ThenewBatman-SupermanAdventures.com may be hackable #amihackerproof, #kids,#ThenewBatman- appeared first on National Cyber Security.

View full post on National Cyber Security

Page 20 of 2,370« First...10«1819202122»304050...Last »

My Twitter

Gregory D. Evans On Facebook

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?
$15.95

Find Out More, Click Here!