Crime Ring Revelation Reveals Cybersecurity Conflict of Interest

A small cybersecurity firm claimed this summer to have uncovered a scam by Russian Internet thieves to amass a mountain of stolen information from 420,000 Web and FTP sites. The hacker network, dubbed “CyberVor,” possessed 1.2 billion unique credentials—a user […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more

Home Depot hack could lead to $3 billion in fake charges

A recent hacker attack on Home Depot (HD) could result in up to $3 billion in fraudulent charges, according to credit protection firm BillGuard. BillGuard said losses will be at least $2 billion, based on an analysis of what is […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more

8 Ways to Protect Your Identity While Online Shopping

The recent hacking of celebrity nude photos demonstrated that we are often more vulnerable to privacy breaches than we think. And as we move into the most frenzied shopping season of the year, scam artists will be on the prowl […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more

Computer security hole puts kids at risk

Two computer experts have discovered a way for strangers to get your personal information using a security hole that could leave you and your children vulnerable. Bryan Seely and Ben Caudill say they’ve discovered one of the biggest potential security […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more

Hacker puts Doom on a printer to highlight security vulnerabilities

In 1993, first-person shooter Doom was a groundbreaking game. In 2014, it’s being used by ethical hackers to demonstrate security vulnerabilities in connected devices. Specifically: printers. During his talk at the 44Con conference in London, Michael Jordon from Context Information […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more

Cloud Hackers Could Come for Your Health Data Next

The revelation that Community Health Systems (NYSE: CYH ) servers were hacked, resulting in the loss of 4.5 million patient records, and that a server for the Affordable Care Act’s healthcare.gov website was breached, puts the issue of healthcare privacy […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more

What Hackers Can Do With Your CRM Data

It is clear why malware writers target TGT -0.1% such retailers as Home Depot HD -0.43% and Target. It is obvious, if not pathetic, why hackers break into the cloud to find and publish private nude photos of celebrities. But […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more

NCS 5/17/11

Topping the news today is a story about how fast technology evolves.  If you are always buying the latest big technology item, you will want to hear what a recent report says about how technology changes and how that can help you keep some change in your pockets.  Plus, a…

read more

FBI Hunting UK ‘IsisGang’ Hackers Over US Terror Threats

The FBI is hunting three British computer hackers who claim to support Isis (Islamic State), amid a spate of hoax threats made against US institutions. The hackers, part of a group that calls itself “ISISGang”, are accused to waging an […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more

Ethical hacker makes it to top US conference

Himanshu Sharma, a 21-year-old student of Dronacharya College of Engineering, has been invited to the Institute of Electrical and Electronics Engineers (IEEE) conference in the US next month. An ethical hacker, Himanshu is going to give a presentation on a […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more