blog trackingRealtime Web Statistics computer Archives - Page 5 of 25 - Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘computer’

SpywareLady: Question About Virus Protection | Fix It WizKid – Free computer …

SpywareLady: Question About Virus Protection | Fix It WizKid – Free computer …
View full post on Twitter / SpywareLady

View full post on <a rel="nofollow" href="”>National Cyber Security

Osama Bin Laden didn’t encrypt his computer files – not such a mastermind then..

Ooops. If you’re running a terrorist organisation, it might make sense to encrypt your files.
Clearly Osama Bin Laden didn’t realise that – as some of the documents seized during the raid on his hideout in …

View full post on National Cyber Security

Protect yourself from computer virus

You may be reading this on our newspaper's website – one of the modern advantages that come along with modern technology.

View full post on computer worm – Yahoo! News Search Results

View full post on National Cyber Security » Virus/Malware/Worms

Iran: Oil industry safe after hacker attack, computer virus target computer systems

Industry's computer systems working well despite attack from hackers, computer virus, government minister says

View full post on hacker – Yahoo! News Search Results

View full post on National Cyber Security » Computer Hacking

E Discovery Inc Video | Computer Forensics in Bellevue eDiscovery Inc. was founded by Allison Goodman in March 2006 to help attorneys and paralegals navigate the confusing world of digital data. Allison has more than 20 years of experience working with attorneys and understands the pressures of the law firm environment. She is a certified computer forensic examiner and previously worked for a pioneering computer forensics company and a national consulting firm. 12532759 Computer, Electronic, Case, Law, Litigation, Data, Mediation, Forensics, Media, Digital, Internet, Web, Website, Site, Firm, Bellevue, Seattle, Washington

Article source:

View full post on National Cyber Security » Announcements

Cyber Attack on The Iranian Oil Ministry’s Computer Network

Cyber Attack on The Iranian Oil Ministry’s Computer Network

The Iranian oil ministry’s computer network came under attack from hackers and a computer virus, prompting the Islamic Republic to disconnect the country’s main oil export terminal from the internet as a preventative measure, a semiofficial news agency reported on Monday.
The Mehr News Agency, which is a semi-official arm of the Iranian

Cyber Attack on The Iranian Oil Ministry’s Computer Network, Blog, Cyber, computer, network, attack, Iranian, Ministry’s

Cyber Attack on The Iranian Oil Ministry’s Computer Network, Blog, Cyber, computer, network, attack, Iranian, Ministry’s

Cyber Attack on The Iranian Oil Ministry’s Computer Network, Blog, Cyber, computer, network, attack, Iranian, Ministry’s

Cyber Attack on The Iranian Oil Ministry’s Computer Network, Blog, Cyber, computer, network, attack, Iranian, Ministry’s

View full post on The Hacker News [ THN ] – Security Blog

View full post on National Cyber Security » Computer Hacking

Norway killer sharpened aim on computer games

OSLO, Norway (AP) — Norwegians who lost loved ones on Utoya island relived the horror Friday as far-right fanatic Anders Behring Breivik described in harrowing detail how he gunned down teenagers as they fled in panic or froze before him, paralyzed with fear.

Survivors and victims’ relatives hugged and sobbed, trying to comfort each other during the graphic testimony.

“I’m going back to my hometown tonight. My husband, he’s going to drive me out to the sea, and I’m going to take a walk there and I’m going to scream my head off,” said Christin Bjelland, whose teenage son survived the attack.

Breivik’s defense lawyers had warned their client’s testimony would be difficult to hear. Still, the shock was palpable in the 200-seat courtroom as the self-styled anti-Islamic militant rolled out his gruesome account, without any sign of emotion.

A man who lost a son squeezed his eyes shut, his pain palpable. A man to his left put a comforting hand to his shoulder, while a woman to his right clutched onto him, resting her forehead against his arm.

Tore Sinding Bekkedal, a 24-year-old survivor of the massacre, left the courtroom during Breivik’s testimony.

“I could not care less about what he says or the way he says it,” Bekkedal said. “I do not care about him as a person.”

Breivik has confessed to the July 22 bombing-and-shooting rampage that killed 77 people — 69 on Utoya and eight in Oslo. But he rejects criminal guilt, saying the victims had betrayed Norway by embracing “Islamic colonization.”

Looking tense but focused, Breivik spoke calmly about the shooting rampage, beginning with a ferry ride to the island, where the governing Labor Party holds its annual summer youth camp. He was disguised as a policeman, carrying a rifle and a handgun. He also brought drinking water because he knew he would become parched from the stress of killing people.

Breivik’s first victims were Monica Boesei, a camp organizer, and Trond Bentsen, an off-duty police officer and camp security guard.

“My whole body tried to revolt when I took the weapon in my hand. There were 100 voices in may head saying ‘Don’t do it, don’t do it,’” Breivik said.

Nonetheless, he pointed his gun at Berntsen’s head and pulled the trigger. He shot Boesei as she tried to run away. Then as they lay on the ground, he shot them both twice in the head.

Breivik said the first shots pushed him into a “fight-and-flight” mode that made it easier to continue killing.

He couldn’t remember large chunks of the 90 minutes he spent on the island before surrendering to police commandos. But he recalled some shootings in great detail, including inside a cafe where he mowed down young victims as they pleaded for their lives.

Some teenagers were frozen in panic, unable to move even when Breivik ran out of ammunition. He changed clips. They didn’t move. He shot them in the head.

“They cannot run. They stand totally still. This is something they never show on TV,” Breivik said. “It was very strange.”

The main goal of the trial, now in its fifth day, is to determine whether Breivik was sane or insane — two medical evaluations have come to opposite conclusions.

“He’s completely emotionless,” said Paal Groendal, a psychologist who watched Friday’s hearing but was not among those who examined the confessed killer.

“He remembers details about smashed windows. But he doesn’t remember if it was a boy or girl he shot. …. It seems like he doesn’t remember people. To him they are details,” Groendal said.

Breivik hunted down victims, luring teens from their hiding places by telling them he was a police officer who was there to protect them. When they came out, he gunned them down.

He said his goal was to kill all of the nearly 600 people on the island. He said he had considered wearing a swastika to instill fear, but decided against it because he didn’t want people to think he was a Nazi.

“You will die today Marxists,” Breivik recalled shouting.

One man tried to attack him. “I push him away with one hand, and shoot him with the other,” Breivik said.

Another man tried to “dodge the bullets by moving in zigzag, so that I couldn’t shoot him in the head,” he said. “So I shot him in the body instead, quite a few times.”

Breivik said he deliberately used “technical” language in order to keep his composure.

“These are gruesome acts, barbaric acts,” he said. “If I had tried to use a more normal language I don’t think I would have been able to talk about it at all.”

Earlier, Breivik said he took to the Internet to glean information, studying attacks by al-Qaida militants, Oklahoma City bomber Timothy McVeigh and the 1993 bombing of the World Trade Center.

He paid particular attention to the World Trade Center bombing in New York and McVeigh’s 1995 attack on an Oklahoma City government building, which killed 168 people and injured over 600.

Breivik said he also read more than 600 bomb-making guides.

He called al-Qaida “the most successful revolutionary movement in the world” and said it should serve as an inspiration to far-right militants, even though their goals are different.

“I have studied each one of their actions, what they have done wrong, what they have done right,” Breivik said of al-Qaida. “We want to create a European version of al-Qaida.”

Breivik claims to belong to an anti-Muslim network called the “Knights Templar,” which prosecutors say they don’t believe exists.

If declared sane, Breivik could face a maximum 21-year prison sentence or an alternate custody arrangement that would keep him locked up as long as he is considered a menace to society. If found insane, he would be committed to psychiatric care for as long as he’s considered ill.


Associated Press reporter Bjoern Amland and APTN senior producer David MacDougall contributed to this report.

Article source:

View full post on National Cyber Security

Experts: Take computer forensics seriously

Businesses warned that "dusting for prints" after a security crisis is a must if threats are to be contained.

View full post on computer forensic – Yahoo! News Search Results

View full post on National Cyber Security

City Honors break-in yields computer to thieves

Thieves broke into City Honors School early Saturday and stole a computer, Buffalo police said. The theft happened at about 3:05 a.m. Saturday when burglars broke a side window and gained entrance into the school on East North Street, according to police reports.

View full post on computer theft – Yahoo! News Search Results

Other links you may like:

Gregory D Evans, LocatePC, Fake Emails go to SPOOFEM.COM, LIGATT Security, Hacker Gear OnlineStolen Computer Alert

View full post on National Cyber Security

Hacker’s Tiny Spy Computer Cracks Corporate Networks, Fits In An Altoid Tin

In its smallest version, Kevin Bong’s “Mini Pwner” spy router can fit inside an Altoids tin.

The next time an unexpected “repairman” cruises past your company’s security desk, you might want to check inside his tin of mints or pack of cigarettes. Especially if he’s also carrying an ethernet cable.

Kevin Bong, a Wisconsin-based security researcher and penetration tester, has developed what he calls the Mini Pwner, a spy computer smaller than a smartphone designed to be inconspicuously plugged into an ethernet port to gain access to a corporate network, feeding information back to a nearby hacker over its wifi signal. Bong sells a kit for the mini spy node for $99, but he also explains on his website how to put one together independently with just a TP-Link router running the open source OpenWRT software, a USB thumb drive, and a battery pack–components that add up to less than $40.

The result is a network cracking tool that’s just two inches square by one inch thick. Or with a bit more hardware fiddling, the Mini Pwner can even be removed from the TP-Link router’s plastic case and reassembled small enough to fit in an Altoids tin–a variant that Bong calls the “Minty Pwner.” (He admits the metal case might interfere with the router’s signal if it’s left inside.)

Bong says he built the Mini Pwner, whose name refers to the hacker lingo “to pwn” meaning to hack or gain control of a target, to aid in his day-to-day work sussing out clients’ security vulnerabilities as a penetration tester for the Brookfield, Wisconsin consultancy Synercomm. “The easiest way to get into a company is still to walk in looking professional and talk your way into a wiring closet,” says Bong. “Once this thing is configured, you can plug it in to the network you’re attacking and connect back to the router itself from the parking lot.”

Once it’s plugged into an open ethernet port on a wall, in a server closet or even into one of a company’s IP phones, the Mini Pwner is designed to run simple scanning tools including Nmap and dSniff that allow a hacker to map out a company’s network and passively collect information. More importantly, it can create a VPN connection so that a nearby hacker can connect to the tiny router’s wifi signal, tunnel into the target network, and run hacking tools like Metasploit to gain further access. The battery pack offers at least four hours of hacking time, Bong says, but a USB port on the Pwner can also be hooked up to power the device indefinitely.

The full “Mini Pwner” kit. The version inside the TP-Link router case is shown at top right, with an iPhone at bottom right for comparison.

The Mini Pwner is hardly the only small, cheap spy computer available to digital intruders: Other slightly larger devices like the Pwnie Express or the F-BOMB are designed to be plugged into wall sockets, or in the latter case even thrown or dropped onto a target from a flying drone, tunneling out of the target’s own wifi network to reconnect to the hacker. The Wifi Pineapple, by contrast, creates a “honeypot” wireless signal that’s designed to tempt unsuspecting users, stealing their data when they connect to its network. And some penetration testing applications such as the Android Network Toolkit run on Android phones, allowing a hacker to merely walk into a building with a phone and run exploits targeting vulnerable machines.

All of those devices are marketed as penetration testing devices rather than tools for illegal hacking. But as with any penetration test, Bong says the intrusion tricks are designed to make potential victims aware of methods that are available to less ethical hackers, too.

“Hacking doesn’t just mean someone sitting on a laptop somewhere,” says Bong. “You have to protect your ports, watch the people who come in the front door, and look at what’s plugged into your network. This stuff is out there.”





Article source:

View full post on National Cyber Security » Computer Hacking

Page 5 of 25« First...«34567»1020...Last »

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?

Find Out More, Click Here!