Website/IP evestigate.com may be hackable , #hackerproof

evestigate_com_am_i_hacker_proof.png

Personal Notes: No Personal Notes
Industry: Technology
Vulnerabilities: 2156
Scan Date/Time: Fri, 15 Apr 2016 16:36:27
Purchase: Click here to
Purchase the Report for $25

Follow us on Social Media to receive a 50% to 100% discount code we post every week.
https://www.facebook.com/AmIHackerProof
http://instagram.com/amihackerproof
https://twitter.com/amihackerproof

If This Is Not Your Website:

  • You should cautious before giving this website any personal information.
  • Make sure you do not use the same password on this website (or any website) that you may use for your email address, bank account, social media accounts or any other accounts you may have.
  • Before entering any personal information like credit cards, social security number or even your personal address, make sure you see https in the URL. It should have a lock next to the https://TheWebsite.com.

AIHP Disclaimer:

There are 5 stages to computer hacking, Reconnaissance, Scanning, Gaining Access, Maintaining Access and Covering Tracks. AmIHackerProof.com handles the first 2 stages, Reconnaissance and Scanning. When you see a computer hacker in the movies or on television, they never show you the reconnaissance or the scanning portion. 80% of computer hacking is research. AmIHackerproof.com also scans your website like a hacker to find vulnerabilities that might exploit the website.

The following information is based on our vulnerability test, which may differ from other vulnerability scanners. Please note, websites are not hosted on the same server as the email server or the home/office network. What this scan does show, is the level of experience of the individuals hired by the company to protect their website. A persons level of education in website design or computer science, does not suggest they are computer hackers. Most computer hackers do not have college degrees.

Some people believe that because they do not have any personal, financial or client information at their website, they are not vulnerable to being hacked. Here are some reasons that disprove this idea:

  • A hacker can redirect your website to your competitors website.
  • A hacker can change or delete your SEO information. SEO is how search engines like Google and Bing rank your website. This can make a difference in your website being number 1 in a search or number 1million.
  • If you collect email addresses at your website, so you can send out news letters, press releases or information about product or services, a hacker can add 2 lines of code that will forward all email addresses to another site.
  • A hacker can add malicious code to your website so that anyone who clicks on any link at your site could get marleware, spyware or even a virus downloaded to their computer.
  • If a website allows visitors to register, a hacker could download your entire user database including their names, emails addresses as well as the users passwords.
  • You can have your website defaced. A hacker can deface it by posting your competitions products or services on your home page.
  • A hacker could change your phone number or address on your websites so that your customers cannot call or find your business.

The post Website/IP evestigate.com may be hackable , #hackerproof appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com | Can You Be Hacked?

. . . . .

View full post on Are You Hacker Proof

An ethical hacker at one of the world’s biggest tech companies

Source: National Cyber Security – Produced By Gregory Evans

Charles Henderson gets paid to think like a bad guy. As an ethical hacker for IBM, Henderson’s job is to break into networks, applications, or physical locations to figure out how a real attacker would go about their work, exposing flaws and the impact those flaws might have on an organization’s security. Given the increase in cyber attacks and the need to bolster cyber security, there’s been a steady shift in corporations hiring their own hackers to “pen-test” (penetration test) online systems, networks, and physical locations, IBM says. In fact, Henderson is just one of the 1,000 security specialists the tech giant hired in 2015. We recently spoke to Henderson, 40, about what it’s really like to be a hacker for IBM. Here’s what he had to say: “Let me start by saying, I was a curious kid” “I grew up and still live in Austin, Texas, which has become a haven for young technologists with its vibrant computer security scene. I attended the University of Texas and studied Computer Science. “When I was 11, my father brought home our first computer. Within a week, I had become an active participant on the Bulletin Board Systems (BBS). Using these bulletin […]

The post An ethical hacker at one of the world’s biggest tech companies appeared first on National Cyber Security.

View full post on National Cyber Security

Website/IP tgvallesusa.it may be hackable , #hackerproof

tgvallesusa_it_am_i_hacker_proof.png

Personal Notes: No Personal Notes
Industry: News
Vulnerabilities: 7
Scan Date/Time: Fri, 15 Apr 2016 13:54:35
Purchase: Click here to
Purchase the Report for $25

Follow us on Social Media to receive a 50% to 100% discount code we post every week.
https://www.facebook.com/AmIHackerProof
http://instagram.com/amihackerproof
https://twitter.com/amihackerproof

If This Is Not Your Website:

  • You should cautious before giving this website any personal information.
  • Make sure you do not use the same password on this website (or any website) that you may use for your email address, bank account, social media accounts or any other accounts you may have.
  • Before entering any personal information like credit cards, social security number or even your personal address, make sure you see https in the URL. It should have a lock next to the https://TheWebsite.com.

AIHP Disclaimer:

There are 5 stages to computer hacking, Reconnaissance, Scanning, Gaining Access, Maintaining Access and Covering Tracks. AmIHackerProof.com handles the first 2 stages, Reconnaissance and Scanning. When you see a computer hacker in the movies or on television, they never show you the reconnaissance or the scanning portion. 80% of computer hacking is research. AmIHackerproof.com also scans your website like a hacker to find vulnerabilities that might exploit the website.

The following information is based on our vulnerability test, which may differ from other vulnerability scanners. Please note, websites are not hosted on the same server as the email server or the home/office network. What this scan does show, is the level of experience of the individuals hired by the company to protect their website. A persons level of education in website design or computer science, does not suggest they are computer hackers. Most computer hackers do not have college degrees.

Some people believe that because they do not have any personal, financial or client information at their website, they are not vulnerable to being hacked. Here are some reasons that disprove this idea:

  • A hacker can redirect your website to your competitors website.
  • A hacker can change or delete your SEO information. SEO is how search engines like Google and Bing rank your website. This can make a difference in your website being number 1 in a search or number 1million.
  • If you collect email addresses at your website, so you can send out news letters, press releases or information about product or services, a hacker can add 2 lines of code that will forward all email addresses to another site.
  • A hacker can add malicious code to your website so that anyone who clicks on any link at your site could get marleware, spyware or even a virus downloaded to their computer.
  • If a website allows visitors to register, a hacker could download your entire user database including their names, emails addresses as well as the users passwords.
  • You can have your website defaced. A hacker can deface it by posting your competitions products or services on your home page.
  • A hacker could change your phone number or address on your websites so that your customers cannot call or find your business.

The post Website/IP tgvallesusa.it may be hackable , #hackerproof appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com | Can You Be Hacked?

. . . . .

View full post on Are You Hacker Proof

Homeland Security Wants You to Uninstall QuickTime for Windows

trojan-horse-viruses-the-computer-equivalent-of-having-a-usc-frat-bro-as-a-roommate

On Thursday, the U.S. Department of Homeland Security issued a strange warning to Windows users: please uninstall QuickTime. Apple announced that they wouldn’t be upgrading the old QuickTime media player software for Windows users (like iTunes, QuickTime has a non-Mac version for Windows users) anymore.

Without regular updates, the program quickly became vulnerable to security exploits. As John Oliver explained last month, digital security is a constant war of attrition between software companies and malicious hackers. Discontinuing security updates for a program is a bit like pulling out your goalie, and then letting the whole team walk off the field — there’s nothing to stop the opposing team from scoring goals (in this case, program exploits).

Shortly after the announcement, the TrendMicro blog’s ZeroDay initiative discovered two vulnerabilities in the QuickTime software — while the technical details are pretty complicated, both bugs give hackers an easy way into a computer’s data, allowing “remote attackers” to “execute arbitrary code.” Basically, if someone that is not you can force your computer to run code, you have a problem. A similar “trojan horse” virus was even responsible for Anonymous hacking a NASA drone and trying to crash it into the ocean, which fortunately failed but was equal parts scary and hilarious.
The bugs do require “user input,” meaning the computer’s owner still has to download a dodgy file or visit an unsafe website — but that’s extremely common. According to Google their safe browsing software turns up as many as 90,000 new unsafe websites every week, so there’s no real way to protect yourself if your computer has a security flaw like the ones in QuickTime. On the map on the right side of this page, you can click on your country to see a “heat map” of how many of its websites Google classifies as unsafe (in the U.S., it’s less than one percent, but since there are almost 42 million registered web pages, that’s still a big-ass number).

As The Verge noted, Homeland Security’s Computer Emergency Readiness Team puts out warnings like this pretty often, but they’re rarely this explicit:

“…Using unsupported software may increase the risks from viruses and other security threats,” the statement reads. “Potential negative consequences include loss of confidentiality, integrity, or availability of data, as well as damage to system resources or business assets. The only mitigation available is to uninstall QuickTime for Windows.”

So, yeah. If you’re a PC user, it’s time to say goodbye to QuickTime (click here for help uninstalling!) If you’re like me, you’d completely forgotten you even had it on your computer, so it’s not like you’ll be missing much. Mac users, your QuickTime is fine. You probably don’t use it either, but if you do, no need to uninstall.
Source:https://www.inverse.com/article/14330-here-s-why-homeland-security-wants-you-to-uninstall-quicktime-for-windows

Related Post

The post Homeland Security Wants You to Uninstall QuickTime for Windows appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com | Can You Be Hacked?

. . . . .

View full post on Are You Hacker Proof

More Evidence of Possible Reprocessing Campaign at Yongbyon; Progress at Experimental Light Water Reactor

Source: National Cyber Security – Produced By Gregory Evans

A 38 North exclusive with analysis by Joseph S. Bermudez, Jr. Summary Recent commercial satellite imagery shows new developments at the Yongbyon Nuclear Scientific Research Center indicating that North Korea has already begun or plans to commence a reprocessing campaign to separate additional plutonium for nuclear weapons. This activity consists of the presence of a […] More Evidence of Possible Reprocessing Campaign at Yongbyon; Progress at Experimental Light Water Reactor is an article from 38 North: Informed Analysis of North Korea, published by the US-Korea Institute at SAIS. View full post on 38 North: Informed Analysis of North Korea

The post More Evidence of Possible Reprocessing Campaign at Yongbyon; Progress at Experimental Light Water Reactor appeared first on National Cyber Security.

View full post on National Cyber Security

CIA is investing in firms that specialize in sifting through social media posts

57102a2bc46188fc418b45de

The Central Intelligence Agency’s venture capital arm is investing in companies that develop artificial intelligence to sift through enormous numbers of social media postings and decipher patterns, according to a report.
A document obtained by The Intercept indicates that In-Q-Tel, the CIA’s venture capital firm, has made unpublicized investments in 38 companies, many of which are startups specializing in analyzing and extracting useful patterns from large amounts of data from social media.
Social media offers a trove of valuable information for intelligence agencies, but separating the signal from the noise is a monumental task.

“ISIL’s tweets and other social media messages publicizing their activities often produce information that, especially in the aggregate, provides real intelligence value,” CIA second-in-command David Cohen said in a speech at Cornell University in September.

Dataminr, PATHAR and Geofeedia and are among the startups listed in the report, and the products that all three of the companies provide are tools that help peer through an otherwise unwieldy volume of data.

Dataminr’s specialty is picking out trends on Twitter by using a stream of data it gets from the social media platform’s API, or application program interface. News organizations, law enforcement agencies and hedge funds are examples of clients who use the service to stay in the loop about relevant events in real time.

PATHAR’s flagship service, Dunami, is used to by clients, including the FBI, to map out networks of relations between people on social media such as Facebook, Twitter and Instagram to find centers of influence.

Geofeedia automatically monitors geotagged social media posts for the purpose of monitoring breaking news events, and even markets its services to help law enforcement predict violent protests.

“During the Baltimore riots, or Ferguson, you could see a drop [in sentiment],” Lee Guthman, head of business development at Geofeedia, told Inverse, adding that a drop in sentiment on social media could reliably predict the violent riots those events.

All of these firms already have deals with the federal government, and the contracts are publicly viewable, thanks to transparency laws. Dataminr’s $254,990 contract was awarded by the Department of Homeland Security, Geofeedia has earned $126,800 from the Department of Justice, and PATHAR has deals totaling $410,118 from both of those agencies.
Source:https://www.rt.com/usa/339671-cia-investing-social-analytics/

Related Post

The post CIA is investing in firms that specialize in sifting through social media posts appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com | Can You Be Hacked?

. . . . .

View full post on Are You Hacker Proof

5 Conversations to Have with Your Kids After The Jungle Book

View full post on Common Sense Blog — Parenting, media, and everything in between — No name







#pso #htcs #b4inc

Read More

The post 5 Conversations to Have with Your Kids After The Jungle Book appeared first on Parent Security Online.

View full post on Parent Security Online

Bringing the IRS out of the Kennedy era

Source: National Cyber Security – Produced By Gregory Evans

Welcome to Bloomberg Government’s Analyst Picks, our expertly curated briefing of top stories affecting the federal market. Bloomberg Government clients have access to Washington’s best government contracting data and analysis. Get introduced to one of our product experts –> What you should know today: IRS lacking in IT modernization; tracking social media for security clearances; Bulgaria seeks to sell arms manufacturers. A Taxing IT Problem With tax day quickly approaching, you can count on one thing the IRS is definitely not about to do: update its central data hub, which went online in the 1960s. According to FCW: “The agency still relies on the Individual Master File, which started operating in the early 1960s, for its central data processing needs. The Customer Account Data Engine was supposed to swap current database technology for IMF’s magnetic tape, but the push to replace IMF has slowed to a crawl.” Until the system is upgraded, the IRS will continue teaching employees the outdatedCOBOL programming language, and will rely on workarounds to link the IMF to other systems. The IRS has had success in other IT areas, such as electronic tax filing and refund tracking. According to Bloomberg Government’s Budget Request dashboard, the IRS […]

The post Bringing the IRS out of the Kennedy era appeared first on National Cyber Security.

View full post on National Cyber Security

Olympia schools have explaining to do

jill

A data breach involving Olympia School District employees showed us again this week that even educated people get spoofed in our Internet age.

Olympia police and district officials say that a school staffer provided lists of all 2,164 district employees to a third party who requested them by email on Tuesday.

The information included names, Social Security numbers, salary information and addresses.

The email requesting the data was made to look like that of Superintendent Dick Cvitanich. The data was sent to the requester about noon and the spoof — known as phishing — was discovered late in the afternoon.

Once the fraud was understood, the school district took good steps to control the damage.

Officials notified police, the Federal Trade Commission and the Internal Revenue Service in the early evening hours. They also sent an explanatory email to all employees at about 7:15 p.m. and pledged to give free credit monitoring and services to help resolve identity theft, if these are needed.

“We understand the severity of this issue and will deploy a privacy expert to advise employees on protective measures,” the email stated. “We will deploy a system for employees to monitor their finances.”

District spokeswoman Susan Gifford said the district “is re-examining its procedures and training.”

That also is a good move, if not a bit of understatement.

We can imagine the school employee hoodwinked by the scammers feels terrible — and embarrassed.

But how this error came to pass should be explained to the public.

Regrettably, data breaches are becoming a fact of life in our era and a boon for identity thieves. Also benefiting are credit monitoring companies that offer services to protect against the damage that a theft of personal data — in the worst case, identity theft — can inflict.

Businesses have had their share of losing financial data of customers to hackers. And governments at all levels are vulnerable.

Only last week, lawmakers in the U.S. House blasted the Obama administration over its slow response to questions about the theft of a laptop from a federal child-support office in Olympia. For reasons not yet explained, the personal laptop was used for child-support audits; it along with hard drives containing personal information for potentially 5 million people were taken.

Two men were taken into custody in connection with the laptop theft. We can hope for as much in the school theft, but the more important outcome is better prevention.

In that regard we can all learn from our local school house.

Source:http://www.theolympian.com/opinion/editorials/article71897342.html

Related Post

The post Olympia schools have explaining to do appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com | Can You Be Hacked?

. . . . .

View full post on Are You Hacker Proof

Sandy Hook lawsuit against gun maker can move forward

bbbccc

The families of the Sandy Hook shooting victims have won a small legal victory after a judge ruled their lawsuit against a gun maker could continue.
The suit argues that the semi-automatic rifle used in the school shooting is a military weapon and should not have been sold to civilians.
In December 2012, Adam Lanza killed 26 people with a Bushmaster XM15-E2S.
Remington Arms, the parent company of Bushmaster Firearms, sought to have the lawsuit dismissed.
The company argued that federal law protects gun manufactures from most lawsuits over the criminal use of their products.
Joshua Koskoff, a lawyer for the families, said an exception to the law applies to the case. Litigation is permitted if the company know or should know their products are likely to be used in a way that risks injury to others, he said.
However, Superior Court Judge Barbara Bellis did not rule on that point, saying the debate on the federal shield law should be argued later in the legal process.
“We are thrilled that the gun companies’ motion to dismiss was denied,” Mr Koskoff told the Associated Press. “The families look forward to continuing their fight in court.”
Source:http://www.bbc.com/news/world-us-canada-36050659

Related Post

The post Sandy Hook lawsuit against gun maker can move forward appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com | Can You Be Hacked?

. . . . .

View full post on Are You Hacker Proof

Page 21 of 2,770« First...10«1920212223»304050...Last »

My Twitter

  • RT @NCSbyHTCS: Cyber Security News Today is out! https://t.co/KutkdwoF4S @gregorydevans #hacker
    about 16 hours ago
  • RT @GregoryDEvans: 100-Year-Old Granny Crushes Bridesmaid Duty At Granddaughter’s Wedding https://t.co/NutrXV6Kx8 #security #hacker #HTCS
    about 16 hours ago
  • Cyber Security News Today is out! https://t.co/KutkdwoF4S @gregorydevans #hacker
    about 17 hours ago
  • RT @GregoryDEvans: Day of the Child – Age of Childing? https://t.co/qCkV1T9Bpz #security #hacker #HTCS
    about 22 hours ago
  • "Hey, @attritionorg! Hold down @GregoryDEvans while I jam a funnel in his earhole..." https://t.co/U8yoRciGWy
    about 2 days ago

AmIHackerProof.com By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans