blog trackingRealtime Web Statistics Continue Archives - Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘Continue’

Chinese Email Hackers Continue Spying on Top US Figures

Source: National Cyber Security – Produced By Gregory Evans

WASHINGTON (Sputnik)– The intelligence official and a top secret National Security Agency (NSA) briefing from 2014 reportedly said the cyberspies had accessed US government officials’ private email correspondences since at least April 2010, according to NBC News. The official told the broadcaster that the hack, dubbed by Washington “Legion Amethyst” after being changed from “Dancing Panda,” is still ongoing. The secret 2014 NSA briefing corroborates and expands on a 2011 announcement by the tech giant Google blaming Chinese hackers for stealing its email service passwords belonging to US government officials. It further reveals that hackers launched over 30 “intrusion sets” from China on targets in the United States as of last year. NBC News previously reported that at least 600 corporate, private and government targets have been successfully infiltrated. The broadcaster added that the period of exposed email access overlaps with the time when Hillary Clinton used a private server and email account for her official communications as Secretary of State in 2009-2013. Additionally, it cites a different NSA document leak by former contractor-turned-whistleblower Edward Snowden as saying Chinese cyberspies attempted to access four top US military officials’ emails in 2010. The targets, on whose computer hackers attempted to install malware, included former Joint Chiefs of Staff chairman Admiral Mike Mullen and chief of naval operations Admiral Gary Roughead. The NSA declined to comment to the broadcaster on the revelations. Source: http://sputniknews.com/world/20150810/1025597220.html

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Chinese Email Hackers Continue Spying on Top US Figures appeared first on National Cyber Security.

View full post on National Cyber Security

iCloud bypass scheme continue affecting Apple Inc: 2 Security Authentications added to iMessage, FaceTime

Source: National Cyber Security – Produced By Gregory Evans

he scheme of iCloud bypass has been a big threat for Apple Inc. for quite some time now. Many hackers around are enjoying the benefits of iCloud security flaws by fixing a locked iPhone, whatever the model, using activation code or software with payment. The company continues battling with this issue. Recently, they have added two-factor authentication to iMessage and FaceTime for better security. iCloud bypass is perhaps the biggest threat to Apple security. According to a report, hackers bypass the iCloud security system for locked iOS devices using some Activation Lock. With the use also of the hackers’ sites, a locked iOS device can be tricked into thinking it’s talking to Apple’s iCloud servers when connected to a computer. Last September, various celebrities were became victims of hacking incidents on iPhone backups. Hackers released private information and photos of celebrities that caused humiliation to the affected accounts and Apple Inc. itself. Previously, lawmakers are pushing legislation that requires all smartphones to have built-in kill switches, after the iPhone theft accounting for about half the crimes in San Francisco and New York. However, this move did not stop these schemes. Symantec has recently discovered an operation that aims to unlock […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post iCloud bypass scheme continue affecting Apple Inc: 2 Security Authentications added to iMessage, FaceTime appeared first on National Cyber Security.

View full post on National Cyber Security

eBay under pressure as hacks continue

eBay under pressure as hacks continue

Leading security researchers have called on eBay to take immediate action over dangerous listings, as the problem continues to put users at risk. The BBC has now identified more than 100 listings that had been exploited to trick customers into […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Aggressive, persistent Windows tech support scammers continue to stalk consumers

NCS_FBI11-145x150

Scammers pretending to be Microsoft support technicians continue to work the phones in search of victims and have grown bolder in their tactics. View full post on Computerworld Cybercrime and Hacking News ________________ Other Sites You May Like: http;//AmIHackerProof.com – http://hackerforhire.com – High Tech Crime Solutions Read More….

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Aggressive, persistent Windows tech support scammers continue to stalk consumers appeared first on National Cyber Security.

View full post on National Cyber Security

Secret Service will continue to use LexisNexis services

Top Priority Sector:  law_enforcement_first_responders The U.S. Secret Service has announced that it plans to procure on a sole source basis several legal and law enforcement databases from Reed Elsevier, Inc. Read More….

View full post on The Cyber Wars

Veterans Affairs will continue using Sonitrol’s physical access control system in and around Durham, NC

Jacob Goodwin Top Priority Sector:  access_control_identification

View full post on The Cyber Wars

ESP Group to continue supporting US-CERT’s info sharing

Jacob Goodwin Top Priority Sector:  cyber_security Read More….

View full post on The Cyber Wars

CBP to continue evaluating ‘aerostats’ in Rio Grande Valley

Top Priority Sector:  border_security Image Caption:  Read More….

View full post on The Cyber Wars

Rand Corp. will continue analyzing resource allocations in cyber arena at DHS

Jacob Goodwin Top Priority Sector:  cyber_security Read More….

View full post on The Cyber Wars

Page 1 of 41234»

My Twitter

Gregory D. Evans On Facebook