blog trackingRealtime Web Statistics Hacker | Gregory D. Evans | Worlds No. 1 Security Consultant - Part 5

Posts Tagged ‘Hacker’

‘Lizard Squad’ hacker pleads guilty to 23 cyber crimes

Source: National Cyber Security – Produced By Gregory Evans

A teenage member of black hat hacker group Lizard Squad has pleaded guilty to numerous charges brought against him in his native Canada, all centred on illegal computer activities. The group notoriously launched DDoS attacks on both PlayStationNetwork and Xbox Live last Christmas, bringing both gaming services down for the holidays. Many of the defendant’s alleged crimes stemmed from abusing players of online games such as League of Legends. The boy was reportedly able to uncover his targets’ personal information and make real-world threats to them. His offences include swatting (falsely triggering a SWAT team to surround his targets’ homes) harassment, extortion, and public mischief. Canadian local news site Tri City News reports that the teen has plead guilty to 23 charges, from a total of 40. Although he cannot be named, Ars Technica tracked down a nearly nine-hour long video that the man, who used the online personae “obnoxious” and “internetjesusob”, had posted to YouTube as he carried out his cyber attacks apparently in real time. Crown prosecutor Michael Bauer outlined to Port Coquitlam provincial court how the teen had spent his online hours threatening predominantly young, female gamers and their parents, including those located in both Canada and the […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post ‘Lizard Squad’ hacker pleads guilty to 23 cyber crimes appeared first on National Cyber Security.

View full post on National Cyber Security

Plane safe? Hacker case points to deeper cyber issues

Source: National Cyber Security – Produced By Gregory Evans

BY JEREMY WAGSTAFF, Reuters Security researcher Chris Roberts made headlines last month when he was hauled off a plane in New York by the FBI and accused of hacking into flight controls via his underseat entertainment unit. Other security researchers say Roberts – who was quoted by the FBI as saying he once caused “a sideways movement of the plane during a flight” – has helped draw attention to a wider issue: that the aviation industry has not kept pace with the threat hackers pose to increasingly computer-connected airplanes. Through his lawyer, Roberts said his only interest had been to “improve aircraft security.” “This is going to drive change. It will force the hand of organizations (in the aviation industry),” says Jonathan Butts, a former US Air Force researcher who now runs a company working on IT security issues in aviation and other industries. As the aviation industry adopts communication protocols similar to those used on the Internet to connect cockpits, cabins and ground controls, it leaves itself open to the vulnerabilities bedevilling other industries – from finance to oil and gas to medicine. “There’s this huge issue staring us in the face,” says Brad Haines, a friend of Roberts […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Plane safe? Hacker case points to deeper cyber issues appeared first on National Cyber Security.

View full post on National Cyber Security

9-year-old CEO warns crowd of phone hacker dangers

Source: National Cyber Security – Produced By Gregory Evans

Meet Reuben Paul. The Harmony School of Science third-grader has accomplished more in nine years than some adults accomplish in a lifetime. “He’s pretty well known in the computer security industry, you know, I think if you track computer security in general, people are going to know about Reuben, he’s been a keynote at a number of other conferences, so he definitely has the chops, ” said Richard Stephens, Organizer of “Security B-sides” Conference. Friday, he was the keynote speaker at the conference at the Wingate in Round Rock. The conference aims to make everyone more aware of hackers. “We’re looking to promote cyber security, promote computer security, to a younger generation,” said Stephens. Reuben showed guests the few steps it takes to hack into an Android phone, from an effort to download what looks to be a “real” game. After taking a quick break he was right back at it. The crowd couldn’t believe how easy he made the task look simple. His parents say they knew at the tender age of five , his child was special. “He’d use the words like “firewall” and things like that and repeat them back to me. First I was totally surprised. […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post 9-year-old CEO warns crowd of phone hacker dangers appeared first on National Cyber Security.

View full post on National Cyber Security

The White Hat Hacker

Source: National Cyber Security – Produced By Gregory Evans

These days, it is hard to pick up a newspaper or go online and not see a story about a recent data breach. No other example highlights the severity of these types of hacks than the Sony breach late last year. While a lot of information, including creative materials, financials and even full feature-length movies were released – some of the most hurtful pieces of information were the personal emails of Sony executives. This information was truly personal. You have a right to privacy, but it’s not going to happen in cyberspace. Want total privacy? Stay offline. Of course, that’s not realistic today. So the next recourse, then, is to be careful with your information and that includes everything from downloading free things and clicking “I agree” without reading what you’re approving, to being aware of whom else is viewing your information. This takes me to the story of a white hat hacker—a good guy—who posed as a part-time or temporary employee for eight businesses in the U.S.. Note that the businesses were aware and approved this study. His experiment was to hack into sensitive data by blatantly snooping around computers and desks; grabbing piles of documents labeled confidential; and […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post The White Hat Hacker appeared first on National Cyber Security.

View full post on National Cyber Security

GS News – Sony Won’t Refund Hacker Victim; Titanfall 2 Coming to PS4!

Source: National Cyber Security – Produced By Gregory Evans

Multiplatform Titanfall sequel is coming, Sony announce features of new PS4 update, and a PS4 user loses $600 to a hacker, and Sony isn’t helping. source: http://www.gamespot.com/videos/gs-news-sony-won-t-refund-hacker-victim-titanfall-/2300-6423881/

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post GS News – Sony Won’t Refund Hacker Victim; Titanfall 2 Coming to PS4! appeared first on National Cyber Security.

View full post on National Cyber Security

Anonymous hates Kanye West: Rapper target of new video from hacker group

Source: National Cyber Security – Produced By Gregory Evans

Anonymous hates Kanye West now? It appears that is what the latest news from the hacker group says. According to a March 12 report from Popcrush, a new video posted to the Anonymous Twitter account seems to be targeting Kanye West. When did the hate for West begin? It looks like when he tried to intercept Beck as he accepted the best album award at the Grammys. West has been known to voice his opinions and it appears that the hacker group is going to teach him a lesson. Fans are wondering what Kim Kardashian thinks about her husband being targeted. Kanye West is hated by a lot of people across the globe. Because he often doesn’t think before he speaks, he has made a lot of enemies. Anonymous hating West could lead to a lot of issues not only for him, but also for the Kardashian family. The hacker group wouldn’t think twice before releasing financial information, phone numbers, or other sensitive documents. Fans are waiting for comments about this from the rapper or Kim Kardashian, but nothing has been said yet. There isn’t a long time in between the times Kaney West puts his foot in his mouth. […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Anonymous hates Kanye West: Rapper target of new video from hacker group appeared first on National Cyber Security.

View full post on National Cyber Security

Expert hacker: Hillary doesn’t know who read her personal email

Source: National Cyber Security – Produced By Gregory Evans

At a press conference on Tuesday, Hillary Clinton tried to assure the public that there were “no security breaches” on the private server she used to send and receive emails during her time as secretary of state. But cyber experts are saying that there is no way she could know whether her account was ever compromised by hackers, who constantly attempt to detect security holes in email servers and stealthily exploit them. “There have been times when I’ve hacked into a customer’s server, collected data, and gotten out, and the customer never had any indication that their system had been compromised,” ethical hacker David Chronister of Parameter Security told Business Insider. “There’s this misconception that if someone is attacked they’ll know right away, but unless the hacker really screws up, the target won’t know until it’s too late.” The 2016 Democratic presidential front-runner also said that the personal server “was on property guarded by the Secret Service.” However, the former secretary of state did not provide details about the technical team that oversaw the personal system, which would involve several experts constantly looking for hackers if it was a government system. “You can never lock down a network enough to fully avoid […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Expert hacker: Hillary doesn’t know who read her personal email appeared first on National Cyber Security.

View full post on National Cyber Security

Hacker cites police brutality against Texas State student in attack on San Marcos city, police sites

Source: National Cyber Security – Produced By Gregory Evans

A hacker named “Bitcoin Baron” has claimed responsibility for cyberattacking the City of San Marcos and San Marcos Police Department websites in retaliation against a police officer who allegedly assaulted a Texas State University student in 2013. The websites were down as of Tuesday morning. “I am here to say you’re out of line and I’m going to attack your site nonstop until I know Palermo is going to prison for a long time for what he’s done to this lady Alexis Alpha,” the supposed hacker claims in a video posted to YouTube on Monday. Ex-San Marcos Cpl. John A. Palermo pleaded guilty in January to one charge of aggravated assault by a public servant for attacking Alpha, then a 22-year-old Texas State University student, after she walked near his police car while Palermo was conducting a traffic stop in May 2013. The encounter left her with broken teeth, bruises and a concussion. Palermo received 10 years of probation and deferred adjudication in lieu of a conviction for the second degree felony, according to Hays County court records. RELATED: Arrest of San Marcos cops called rarity At around 1:10 am. on May 29, 2013, Alpha walked by a traffic stop made by Palermo […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker cites police brutality against Texas State student in attack on San Marcos city, police sites appeared first on National Cyber Security.

View full post on National Cyber Security

Matt DeHart, the alleged Anonymous hacker, deported to U.S. after Canada refused to grant him asylum

Matt DeHart, a former American soldier who sought asylum in Canada claiming torture by U.S. agents probing Anonymous hackers and WikiLeaks, was taken from his Ontario prison cell Sunday morning and delivered to U.S. agents at the border. Mr. DeHart, 30, was allowed to make a quick phone call en route to his parents, who are living in Toronto facing their own removal order, said his father, Paul. “He was peaceful and in good health,” Paul DeHart said in an interview but the family remains deeply worried. “We are concerned about Matt’s safety as he transits,” he said. “We said a prayer together on the phone and gave him into God’s hands for protection.” His claim for refugee protection in Canada, on the basis of his torture claim, was rejected last month by the Immigration and Refugee Board. “I cannot imagine any life in a country which has already tortured me,” he told the National Post last month. “Am I now to be given into the hands of my torturers?” His is a bizarre, high-profile case, featured in a large investigation by the Post in May. It has since been featured in international media, including recent pieces by Germany’s Der […]

View full post on National Cyber Security

Cookie? Spam? Hacker? 11 everyday tech terms and their surprising origins

index

Source: National Cyber Security – Produced By Gregory Evans

Many of the words we use in the modern-day tech lexicon have surprising origins. OK, so the mouse is obvious, because it looks like a mouse. But we bet a lot of you didn’t know that the Bluetooth you use to pair your phone with a wireless headset was named after a 10th century Danish monarch who enjoyed blueberries? Read on for a little tech etymology lesson. Spam What is it? Unwanted and persistent emails, messages and communications from content providers or advertisers. Where did it come from? While this sounds like an obvious one – the Spam meat product is as undesirable to many as all those annoying messages and emails – that’s not actually the case. The first usage of Spam in a tech sense originates from a classic Monty Python sketch. During the skit, every item on a café menu features the tinned spiced ham, complete with Spam-obsessed Vikings singing its praises. Spam, wonderful Spam! What is it? An internet or social media user who deliberately posts inflammatory content in order to elicit a response. Where did it come from: Although it can often seem like an apt description, the origin of troll – in the modern […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cookie? Spam? Hacker? 11 everyday tech terms and their surprising origins appeared first on National Cyber Security.

View full post on National Cyber Security

Page 5 of 295« First...«34567»102030...Last »

My Twitter

Gregory D. Evans On Facebook