blog trackingRealtime Web Statistics Hacker Archives | Page 5 Of 306 | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant - Part 5

Posts Tagged ‘Hacker’

Hacker Cracks Lumia Bootloader, Releases Tool To Grant Root Access For Custom ROMs

Source: National Cyber Security – Produced By Gregory Evans

Hacker Cracks Lumia Bootloader, Releases Tool To Grant Root Access For Custom ROMs

Microsoft and Nokia have done a great job of making Lumia smartphones difficult to break into at a low-level, but software hacker Heathcliff has just proven that it’s not impossible. He’s just released a great-looking tool called Phone Internals, and it can do everything from unlocking the bootloader to replacing the phone’s ROM. Heathcliff welcomes donations by those who’ve found the tool useful. Based on the introduction video, it seems that a lot of effort went into this, and unlike most tools of this nature, detailed descriptions are found everywhere to ensure that you know exactly what’s going to happen once you click a button. According to the “Getting Started” section of the tool, supported models include Lumia 520, 521, 525, 620, 625, 720, 820, 920, 925, 928, 1020, and 1320. If your model is not on the list, don’t fret: Heathcliff has said that he hopes to add more models in the future. Even if you do have an appropriate PHONE ROM or run custom software, this tool could be used to root the device and give you the ability to back up the entire thing. Options are given to back up specific partitions, or everything en masse. Later, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker Cracks Lumia Bootloader, Releases Tool To Grant Root Access For Custom ROMs appeared first on National Cyber Security.

View full post on National Cyber Security

Hacker uses webcam to spy on Lee County man

Source: National Cyber Security – Produced By Gregory Evans

Hacker uses webcam to spy on Lee County man

A hacker terrified a Lee County man when he took over his computer and tried to extort him. Lee County sheriff’s investigators said they don’t know how the hacker got into the man’s laptop. The victim called LCSO’s fraud hotline to report the crime. He said he was talking with a relative on Skype one night last week, and after the conversation was over, he closed his laptop without logging off of Skype or turning off his computer. The next day, he went online. Within a minute, a number he didn’t recognize was calling his cell phone. He pick up, and a man who deputies said spoke with “a distinct foreign accent and claimed to be from Syria” called the man by name. He also had “very specific and private information about his finances, his family and friends that could have only been known by someone who had access to his computer,” deputies said. The hacker threatened to release the victim’s personal pictures and videos if he did not pay him $600.00. And that’s not all. “The hacker, who repeatedly threatened to ruin the victim’s life if he disconnected the call, was apparently able to see the victim in his home as he described the victim’s exact […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker uses webcam to spy on Lee County man appeared first on National Cyber Security.

View full post on National Cyber Security

Wanted teen hacker says it’s ‘scary’ how easily he was able to leave Australia

Source: National Cyber Security – Produced By Gregory Evans

Wanted teen hacker says it’s ‘scary’ how easily he was able to leave Australia

At a time of heightenedSECURITY fears, a teenage hacker has left authorities red-faced and raised serious questions about borderSECURITY. Dylan Wheeler was just 17 when police charged him with being part of a group that allegedly hacked into theCOMPUTERS ofMICROSOFT and the US Army. He ended up fleeing the country, facing a possible 10-year jail sentence, even though he’d been ordered to surrender his passport. Now he’s told Lauren Day he has no regrets and no plans to return. DYLAN WHEELER, HACKER: To be honest, I don’t see it as on the run. I mean, what’s coming out of Australia now, I don’t really want to be associated with the politics. All these draconian laws, I don’t feel comfortable calling myself Australian. Really, I feel a lot better being free. LAUREN DAY, REPORTER: Dylan Wheeler’s not your average opinionated 19-year-old on a gap year. He’s wanted by police and his name is on a Europol list. If found guilty, he faces up to 10 years in jail. DYLAN WHEELER: At this point in time, I don’t plan to return to Australia. This is on the advice of human rights lawyers I’ve spoken to. Basically because I am not guaranteed a […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Wanted teen hacker says it’s ‘scary’ how easily he was able to leave Australia appeared first on National Cyber Security.

View full post on National Cyber Security

New hacker plan: Don’t steal data, change it

Source: National Cyber Security – Produced By Gregory Evans

New hacker plan: Don’t steal data, change it

You know hackers around the world are working nonstop to steal yourPERSONAL information. But there’s a new, much bigger threat emerging right now. It has the power to cost you money, put your family at risk, or even open up America to a real-world attack. I’m looking at the newest hacker threat — experts are warning that instead of only stealing your data, hackers will start changing your data. But what if that hacker changed your records? Even something subtle, like turning all the 5’s into 4’s? Do that to a million more people, and that one hacker could destroy the trust in an entire bank’s records. Do it enough, and trust in the whole American economy is gone. That is the cybersecurity threat experts say is coming next. “Everything with cybersecurity is evolving. Every day, it’s something new. For example, six months ago, no one talked about the data being changed,” Sri Sridharan told me. He runs the Florida Center for Cybersecurity. From a secret location at University of South Florida in Tampa, they work with universities and others to spot, study, and stop the cyber attacks of the future. “It’s just a matter of time before somebody does […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post New hacker plan: Don’t steal data, change it appeared first on National Cyber Security.

View full post on National Cyber Security

Hacker outs himself as FBI snitch who helped ‘murder’ ISIS target in Syria

Source: National Cyber Security – Produced By Gregory Evans

Hacker outs himself as FBI snitch who helped ‘murder’ ISIS target in Syria

In the aftermath of the Paris attacks, certain hacker groups have declared a digital war on ISIS, with mixed results. But it looks like a hacker had been helping the FBI track and hunt down hackers with alleged ISIS ties even before the Paris attack in mid-November. A former member of the Rustle League hacker collective confessed on Twitter that he recently assisted the FBI, with his actions resulting in a bombing that left one prominent ISIS hacker dead. “5hm00p” is the name of the hacker who helped the FBI track down and kill Junaid Hussain, a hacker turned ISIS fighter. 5hm00p was previously known for hacking the Anonymous Twitter accounts. “What the f*** have I done,” he said on Twitter on Sunday morning, as noted by Motherboard. More than 15 hours later, he launched a tirade of tweets at the FBI, which were soon deleted. “I lost a lot of good friendships and my f***ng honor,” 5hm00p tweeted “I’m so embarrassed to show my face in public now because of this.” “I f***ing helped you MURDER him. Do you know how I feel now when I sleep at night?” he added. “Regardless that he was a terrorist and an animal I sure as f*** felt betrayed.” Junaid “TriCk” […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker outs himself as FBI snitch who helped ‘murder’ ISIS target in Syria appeared first on National Cyber Security.

View full post on National Cyber Security

Anonymous hacker group uncovers Islamic State threat against WWE event in US

Source: National Cyber Security – Produced By Gregory Evans

Anonymous hacker group uncovers Islamic State threat against WWE event in US

Hacker group Anonymous which declared a cyber war on Islamic State following Paris attacks said this week that the militant group plans to attack a World Wrestling Entertainment (WWE) event in Georgia on Sunday. “The FBI is aware of reports of an alleged threat that includes an Atlanta, Georgia venue and event. While we take all threats seriously, we do not have specific or credible information of an attack at this time,” FBI toldChannel 2 news regarding the threat. “We have, however, made the proper notifications as we continue to work closely with our law enforcement and private sector partners to keep our community safe,” the government agency added. Source: http://tribune.com.pk/story/996227/anonymous-hacker-group-uncovers-islamic-state-threat-against-wwe-event-in-us/

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Anonymous hacker group uncovers Islamic State threat against WWE event in US appeared first on National Cyber Security.

View full post on National Cyber Security

Apple was actually inspired by a hacker – The untold story unfolds

Source: National Cyber Security – Produced By Gregory Evans

Apple was actually inspired by a hacker – The untold story unfolds

APPLE the world’s most valuable company has made a series of terrific products over the past couple of years, but there are some things that you do not know about the tech giant; like how John Draper, aCOMPUTER programmer and known hacker was working for Apple’s Steve Wozniak in the early days of the company. Draper was known for his morally dubiousACTIVITIES right from the start, and when he got located to Silicon Valley, that is when he really started to shine. Both Wozniak and Jobs were able to locate Draper through a friend of Wozniak. So what is Draper known for; phreaking. For those who are unaware of this term, phreaking is a term used to hack, but instead of hacking aCOMPUTER system, it involves hacking a phone line in order to make long distance and international calls absolutely free. Using his knowledge, Draper developed a blue box, which is an electronic device whose primary purpose was to make free calls. Before Apple existed, Wozniak and Jobs had formed a business that made and sold blue boxes. Both wunderkinds claimed that this is the product that was the foundation of Apple’s success. According to Steve Jobs, he states the […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Apple was actually inspired by a hacker – The untold story unfolds appeared first on National Cyber Security.

View full post on National Cyber Security

Hacker group waging cyber war on ISIS

Source: National Cyber Security – Produced By Gregory Evans

Hacker group waging cyber war on ISIS

Members of the hacking group “Anonymous” claim to be virtually terrorizing members of the Islamic State, hacking their social media accounts, crashing their websites, and dumping their personal information online. On Twitter, a variety of accounts affiliated with the group claim to have made progress in that campaign. One account, called “#OpParis,” claimed Tuesday to have taken down thousands of Twitter accounts belonging to ISIS. “We report that more than 5,500 Twitter account of #ISIS are now down!” the account tweeted. Source: http://www.washingtonexaminer.com/hacker-group-waging-cyber-war-on-isis/article/2576607

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker group waging cyber war on ISIS appeared first on National Cyber Security.

View full post on National Cyber Security

Which nation is the most prolific hacker?

Source: National Cyber Security – Produced By Gregory Evans

Which nation is the most prolific hacker?

State sponsored hacking is, truth be told, something of a mixed bag of motives, capability and success. It can be quite difficult, even for government agency and IT security professionals who spend much of their time engrossed in such things, to determine with any degree of certainty just who is hacking whom. In this article, I have a go at pointing the wagging finger of blame. The consensus within the IT security industry is that China is almost certainly the most prolific of the nation state hackers, closely followed by the United States. Odd then that these two should have recently reached an ‘accord’ which agreed that neither country would “conduct or knowingly support cyber-enabled theft of intellectual property”, but which stops short of saying that cyber-spying must stop entirely. Just as it’s pretty much a given that the US continues to hack Chinese concerns, as well as others across the world, so China does the same. Although not much is publicly known of the US state-sponsored spy activity, outside of the Snowden/Wikileaks revelations, much more is known when it comes to China and Unit 61398 of the People’s Liberation Army (PLA) 3rd Department. Obviously, those countries with plenty of […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Which nation is the most prolific hacker? appeared first on National Cyber Security.

View full post on National Cyber Security

This ex-military hacker has fought terrorists online since 2010, and he’s not impressed by Anonymous

Source: National Cyber Security – Produced By Gregory Evans

This ex-military hacker has fought terrorists online since 2010, and he’s not impressed by Anonymous

He’s defaced and shut down hundreds of terrorist websites, inserted false stories into Libyan newspapers, and unmasked fellow hackers who have crossed him. His name is “The Jester” and he has worked alone as an anonymous hacker vigilante since 2010. Though the international “hacktivist” group Anonymous declared cyber-war against ISIS on Monday, The Jester is not among them. In fact, he’s among the group’s sharpest critics. “All they will do is dump a random list of names from a previous hack and claim it’s ISIS members, and they will report ‘ISIS’ accounts to Twitter. Pretty standard BS from them,” The Jester, who goes by the @the3j35t3r handle and keeps his identity closely-guarded, told Tech Insider in an interview over Twitter. In a video released to YouTube following the terrorist attacks on Friday in Paris, France,Anonymous vowed “massive cyber attacks” while launching its “biggest operation ever against [ISIS].” The group then released a listing of nearly 10,000 Twitter accounts it said were linked to ISIS. This isn’t the first time ISIS has drawn the scorn of the hacker collective. In August 2014 the group also “declared war,” later revealing what it claimed were approximately 10,000 ISIS-linked social media accounts, according to […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post This ex-military hacker has fought terrorists online since 2010, and he’s not impressed by Anonymous appeared first on National Cyber Security.

View full post on National Cyber Security

Page 5 of 306« First...«34567»102030...Last »

My Twitter

  • RT @GregoryDEvans: #galaxylife #samsung4life Website/IP https://t.co/iVgwOLEWyw may be hackable #hacked, #WGH, #USA, #hackerproof https://t…
    about 10 mins ago
  • Cyber Security News Today is out! https://t.co/an4OfoTlvs @gregorydevans #hacker
    about 21 mins ago
  • RT @GregoryDEvans: Website/IP https://t.co/iVgwOLWxq4 may be hackable #hacked, #WGH, #USA, #hackerproof https://t.co/SACJx1MJoY
    about 40 mins ago
  • RT @GregoryDEvans: Website/IP https://t.co/iVgwOLWxq4 may be hackable #hacked, #WGH, #USA, #hackerproof https://t.co/SACJx1MJoY #security #…
    about 55 mins ago
  • RT @GregoryDEvans: Website/IP https://t.co/iVgwOLWxq4 may be hackable #hacked, #WGH, #USA, #hackerproof https://t.co/WhbT9nJeAS
    about 55 mins ago

AmIHackerProof.com By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans