blog trackingRealtime Web Statistics About Archives - Page 2 Of 28 - Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant - Part 2

Posts Tagged ‘about’

Samsung releases the first Galaxy Note5 TV commercial: it’s all about the new design and new S Pen

Samsung today released the very first Galaxy Note5 TV commercial. Unlike this official Note5 promo video, which is too long to show up on TV, the commercial is a 30-second lively clip that showcases some of the new handset’s highlights, including its new metal-and-glass design, its multitasking capabilities, and the mighty S Pen stylus.

As you may have heard, Samsung improved the S Pen with features like auto-eject, the ability to write while the Note5’s screen is off, Air Command on an screen, and the ability to write on PDF files.

Since earlier this week, when it was announced, …

View full post on PhoneArena

How this hacker can virtually ‘kill’ you, and what to do about it

Source: National Cyber Security – Produced By Gregory Evans

LAS VEGAS — Anyone with a keyboard and a cause can have a living person declared legally dead by taking advantage of security weaknesses in the online death registration process, says Chris Rock, chief executive officer of Australian-based security company Kustodian. Mr. Rock used online databases to pose as a doctor – and even registered as a funeral director – to prove he could game the system and issue death certificates for friends or enemies. Despite concerns his research may inspire a wave of fraud, Rock detailed a how-to guide to the process to a packed room at the famous DEF CON conference in Las Vegas last Friday. “I have not contacted any vendor for fixes. Here is the definition of irresponsible disclosure,” Rock told an overflowing room of hackers. Why go this route? Because, he says, “it’s not so much a vulnerability – it’s a [mistake.] And it’s a global [mistake].” Recommended: How well do you know hacker movies? Rock also uncovered vulnerabilities in countries’ birth registration processes, which could allow people to create a totally new virtual baby – and use its identity as a cover for illegal activity such as drug trading. Rock says it’s a lot more […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post How this hacker can virtually ‘kill’ you, and what to do about it appeared first on National Cyber Security.

View full post on National Cyber Security

Apple’s latest iPhone ad is all about the camera

Apple has added a new video to its “if it’s not an iPhone, it’s not an iPhone” campaign, highlighting the camera on the iPhone 6 and iPhone 6 Plus. The ad shows off crisp pictures and videos spread out across the screens of several iPhones over 30 seconds.

This new ad joins several others in Apple’s latest iPhone advertising campaign. In July, the campaign kicked off with two videos that talk up the hardware and software integration of the iPhone and the love people have for it. Apple later debuted another ad that focused on all of the cool things you can do with the App Store’s robust catalog.

Source: Apple (YouTube)

View full post on MobileNations

Why we should all care about cyber crime: the risk to you and me

Source: National Cyber Security – Produced By Gregory Evans

In today’s world, the reality is that all individuals and organisations connected to the internet are vulnerable to cyber attack. The number, type and sophistication of attacks continues to grow, as the threat reportpublished last month by the Australian Cyber Security Centre (ACSC) points out. It isn’t only large organisations that are under threat. Even individuals or organisations that don’t believe they have much to offer hackers can be targeted. So even if you think you’re a small target, you might still be at risk. Illusion of trust Malicious individuals and groups thrive on gathering information that can be used to enhance their attack strategies. Hackers are becoming more focused on spear-phishing attacks, which are tailored to individual people, and any bit of information about you can be of help. Key to the hacker is the issue of trust. The information gathered is used to build a profile of the target with the aim to have enough data that allows the hacker to appear trustworthy to you. In most cases, the hacker will attempt to impersonate an entity that is trusted by you. The more information the hacker has on you, the more likely they will be able to maintain […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Why we should all care about cyber crime: the risk to you and me appeared first on National Cyber Security.

View full post on National Cyber Security

Cars can be hacked. What about a plane?

Source: National Cyber Security – Produced By Gregory Evans

Yes, hackers can remotely cut the engine of your 2014 Jeep Cherokee. No, they can’t take down a plane. Here’s the thing about modern machines. They all operate on computer code. And when we hook them up to the Internet, we can send them code from a computer 1,000 miles away. It’s why we’ve reached the point where Chryslers can be hacked over the Internet. Planes, trains, boats — they’re just next in line. Remotely hijacking or sabotaging a vehicle isn’t new. It’s just getting easier every day. Why you can hack a car Automobiles have always been “hackable.” Here’s a little-known fact: Since at least the 1960s, you could zap a car with radio waves, overloading coils and tinkering with some of the electronics. Eventually, cars got loaded with a bunch of tiny computers scattered around the vehicle — with partial control of the brakes, steering wheel and accelerator. In the 1980s, cars got a backbone that connected all those computers together on a single network. By the 1990s, you could tap into that network by physically connecting a computer to the wires in the car. But it wasn’t until 2013 that we saw someone pull it off. Two […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cars can be hacked. What about a plane? appeared first on National Cyber Security.

View full post on National Cyber Security

THREE REAL ONLINE DANGERS YOU NEED TO WORRY ABOUT

Source: National Cyber Security – Produced By Gregory Evans

There’s no shortage of panic-inducing security news, such as flaws in web encryption that could allow attackers to slurp up your banking information. Then there are the proof-of-concept attacks. Security researchers seem to find hacks for every new Apple product within days, such as making a cast of someone’s fingerprint with glue to fool the iPhone’s Touch ID sensor. But sensational attacks require a lot of work, and luck. Hackers save them for giant corporations and governments, not individuals or small companies. “It’s interesting to read the stories, but you don’t really need to worry abut an elite squad of cyber soldiers going after your machine,” says Patrick Nielsen, senior security researcher at antivirus company Kaspersky, and one of four security experts I spoke with to sort the media hype from the real dangers out there. All four had similar answers when I asked them to name the main security threats. The biggest dangers I culled from their input are data breeches, unsafe Wi-Fi networks, and mass-distributed malware that takes over a computer. 1. PERSONAL INFORMATION BREECHES In December 2013, hackers stole credit and debit card numbers of about 40 million customers from Target. In February 2015, health insurer Anthem […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post THREE REAL ONLINE DANGERS YOU NEED TO WORRY ABOUT appeared first on National Cyber Security.

View full post on National Cyber Security

THE TOP 10 WOMEN CYBER GUARDIANS YOU SHOULD KNOW ABOUT

Source: National Cyber Security – Produced By Gregory Evans

The paucity of women in math and science extends to the data security realm. Women make up 14 percent of federal government cyber personnel, according to a May (ISC)2 global information security workforce study. The number was even lower in the private sector as recently as 2013: 11 percent. But quantity does not equal quality. And there is top-notch talent gracing the field across government, academia and industry. Here is an unempirical roundup of 10 influential leaders in information security, who happen to be women. Ann Barron-DiCamillo, director, Department of Homeland Security, U.S. Computer Emergency Readiness Team Susan Walsh/AP Oversees a round-the-clock watch center that collects, processes and shares information on cyberthreats with agencies and industry sectors. The disclosure of a theft of Office of Personnel Management files on 21.5 million national security-sensitive personnel and their families thrust her into the national spotlight — a position she was uncomfortable with as an evangelist of confidentiality. Testifying at a House hearing in June on U.S. CERT’s role in the response, she acknowledged, “Like many Americans, I too am a victim of these incidents . . . Although I am appearing today ready to provide information to this committee, I do so with […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post THE TOP 10 WOMEN CYBER GUARDIANS YOU SHOULD KNOW ABOUT appeared first on National Cyber Security.

View full post on National Cyber Security

Americans most anxious about financial data theft

Source: National Cyber Security – Produced By Gregory Evans

According to a new study, US consumers would rather be robbed or have their email account hijacked than see their financial information and social security details stolen or compromised. More than three in four (77%) Americans say that having their financial details compromised is their greatest anxiety. The study of 1,000 adults by Braun Research on behalf of MasterCard found that even the thought of naked photos leaking online doesn’t come close — only 55% cited it as a greater fear. The overwhelming majority of respondents (92%) believe that they take precautions when it comes to financial information, yet when asked, 46% said that they rarely or never change online passwords for financial accounts; 44% recycle the same password for multiple online services and 39% have checked their financial data while using a public network. Source: Yahoo Mail 

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Americans most anxious about financial data theft appeared first on National Cyber Security.

View full post on National Cyber Security

Being proactive about security is the best defense against cyber attacks

Source: National Cyber Security – Produced By Gregory Evans

Edinburgh council was the target of a cyberattack this week, and the details of more than 13,000 email addresses were stolen. The council was quick to issue a warning to all those who have an account with the authority, saying they might experience an increase in spam and phishing. It said: “We are taking this incident very seriously. We have made sure that our service providers have reinforced the security of our website and we will continue to monitor security regularly”. “Vulnerabilities in websites are incredibly common, even amongst the largest brands, and cyber-attacks like these have become an everyday occurrence. Many businesses are still unaware of online business risks, or have delayed taking appropriate action, which is unfortunate for them and their users”, said Matt Johansen, director Security Services and Research at WhiteHat Security. “According to our 2015 website security statistics report 86 percent of 30,000 websites have at least one serious vulnerability where an attacker could compromise the system and cause serious commercial or reputation damage. And to add insult to injury, it takes an average of 193 days to remediate the vulnerabilities that are fixed ­ not to mention the 39 percent of flaws that are never […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Being proactive about security is the best defense against cyber attacks appeared first on National Cyber Security.

View full post on National Cyber Security

Everything You Need to Know About Cyber Insurance

Source: National Cyber Security – Produced By Gregory Evans

Q: Do I need cyber insurance for my business? A: You must be asking because you think your business is too small to attract criminals. In fact, when it comes to cyber theft, size doesn’t matter, according to Christine Marciano, president of insurance brokerage Cyber Data Risk Managers in Princeton, N.J. She says hackers are looking for businesses of any size with valuable customer data they can steal and sell on the black market. Hence the need for cyber insurance—coverage that can include data theft or loss, network intrusions, information-security breaches and lost income due to system downtime. It’s available for first- and third-party losses, which means that if your business has customer or vendor relationships and processes customer-sensitive (nonpublic) information, you need it. We asked Marciano to give us the lowdown. Doesn’t my current insurance cover cyber breaches? Review your policies—especially the exclusions—and you’ll likely find that your traditional commercial general liability won’t respond to a cyber or data breach claim. And the last thing you want to do is handle a cyber attack or data breach alone. Cyber insurance can provide coverage for regulatory defense, penalties and fines. Penalties? Fines? How does that happen?  Most states have laws requiring companies to notify individuals of […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Everything You Need to Know About Cyber Insurance appeared first on National Cyber Security.

View full post on National Cyber Security

Page 2 of 28«12345»1020...Last »

My Twitter

Gregory D. Evans On Facebook