blog trackingRealtime Web Statistics Continue Archives | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘Continue’

BlackBerry can’t stop bleeding money as smartphone sales continue to plummet

On Friday, BlackBerry announced its results for the second quarter of the 2016 financial year, and the numbers are anything but pretty.

In the three months period ending with August 29 2015, the company brought in revenues of $490 million, down 46.5% compared to the same time period a year ago. BlackBerry reported non-GAAP consolidated losses of $0.13 per share. Note that these are non-standardized measurements, ones that BlackBerry considers to best represent the financial performance of the company. You can compare these numbers with the GAAP measurements by heading over to the source …

View full post on PhoneArena

Chinese Email Hackers Continue Spying on Top US Figures

Source: National Cyber Security – Produced By Gregory Evans

WASHINGTON (Sputnik)– The intelligence official and a top secret National Security Agency (NSA) briefing from 2014 reportedly said the cyberspies had accessed US government officials’ private email correspondences since at least April 2010, according to NBC News. The official told the broadcaster that the hack, dubbed by Washington “Legion Amethyst” after being changed from “Dancing Panda,” is still ongoing. The secret 2014 NSA briefing corroborates and expands on a 2011 announcement by the tech giant Google blaming Chinese hackers for stealing its email service passwords belonging to US government officials. It further reveals that hackers launched over 30 “intrusion sets” from China on targets in the United States as of last year. NBC News previously reported that at least 600 corporate, private and government targets have been successfully infiltrated. The broadcaster added that the period of exposed email access overlaps with the time when Hillary Clinton used a private server and email account for her official communications as Secretary of State in 2009-2013. Additionally, it cites a different NSA document leak by former contractor-turned-whistleblower Edward Snowden as saying Chinese cyberspies attempted to access four top US military officials’ emails in 2010. The targets, on whose computer hackers attempted to install malware, included former Joint Chiefs of Staff chairman Admiral Mike Mullen and chief of naval operations Admiral Gary Roughead. The NSA declined to comment to the broadcaster on the revelations. Source: http://sputniknews.com/world/20150810/1025597220.html

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Chinese Email Hackers Continue Spying on Top US Figures appeared first on National Cyber Security.

View full post on National Cyber Security

iCloud bypass scheme continue affecting Apple Inc: 2 Security Authentications added to iMessage, FaceTime

Source: National Cyber Security – Produced By Gregory Evans

he scheme of iCloud bypass has been a big threat for Apple Inc. for quite some time now. Many hackers around are enjoying the benefits of iCloud security flaws by fixing a locked iPhone, whatever the model, using activation code or software with payment. The company continues battling with this issue. Recently, they have added two-factor authentication to iMessage and FaceTime for better security. iCloud bypass is perhaps the biggest threat to Apple security. According to a report, hackers bypass the iCloud security system for locked iOS devices using some Activation Lock. With the use also of the hackers’ sites, a locked iOS device can be tricked into thinking it’s talking to Apple’s iCloud servers when connected to a computer. Last September, various celebrities were became victims of hacking incidents on iPhone backups. Hackers released private information and photos of celebrities that caused humiliation to the affected accounts and Apple Inc. itself. Previously, lawmakers are pushing legislation that requires all smartphones to have built-in kill switches, after the iPhone theft accounting for about half the crimes in San Francisco and New York. However, this move did not stop these schemes. Symantec has recently discovered an operation that aims to unlock […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post iCloud bypass scheme continue affecting Apple Inc: 2 Security Authentications added to iMessage, FaceTime appeared first on National Cyber Security.

View full post on National Cyber Security

eBay under pressure as hacks continue

eBay under pressure as hacks continue

Leading security researchers have called on eBay to take immediate action over dangerous listings, as the problem continues to put users at risk. The BBC has now identified more than 100 listings that had been exploited to trick customers into […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Aggressive, persistent Windows tech support scammers continue to stalk consumers

NCS_FBI11-145x150

Scammers pretending to be Microsoft support technicians continue to work the phones in search of victims and have grown bolder in their tactics. View full post on Computerworld Cybercrime and Hacking News ________________ Other Sites You May Like: http;//AmIHackerProof.com – http://hackerforhire.com – High Tech Crime Solutions Read More….

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Aggressive, persistent Windows tech support scammers continue to stalk consumers appeared first on National Cyber Security.

View full post on National Cyber Security

Secret Service will continue to use LexisNexis services

Top Priority Sector:  law_enforcement_first_responders The U.S. Secret Service has announced that it plans to procure on a sole source basis several legal and law enforcement databases from Reed Elsevier, Inc. Read More….

View full post on The Cyber Wars

Veterans Affairs will continue using Sonitrol’s physical access control system in and around Durham, NC

Jacob Goodwin Top Priority Sector:  access_control_identification

View full post on The Cyber Wars

ESP Group to continue supporting US-CERT’s info sharing

Jacob Goodwin Top Priority Sector:  cyber_security Read More….

View full post on The Cyber Wars

CBP to continue evaluating ‘aerostats’ in Rio Grande Valley

Top Priority Sector:  border_security Image Caption:  Read More….

View full post on The Cyber Wars

Page 1 of 41234»

My Twitter

  • RT @GregoryDEvans: Website/IP https://t.co/iUBQGDxnhI may be hackable #USAGOV, #hackerproof https://t.co/d4Yq0ys2cI
    about 5 hours ago
  • RT @GregoryDEvans: Website/IP https://t.co/Oqy8JnXC2j may be hackable #USAGOV, #hackerproof https://t.co/plaJYzSAaI #security #hacker #HTCS
    about 15 hours ago
  • RT @GregoryDEvans: #galaxylife #samsung4life Website/IP https://t.co/MPoostCGdu may be hackable #hacked, #WGH, #UK, #hackerproof https://t.…
    about 16 hours ago
  • RT @GregoryDEvans: Website/IP https://t.co/MPoostUh52 may be hackable #hacked, #WGH, #UK, #hackerproof https://t.co/tJocE6Yzk3
    about 16 hours ago
  • RT @GregoryDEvans: Website/IP https://t.co/MPoostUh52 may be hackable #hacked, #WGH, #UK, #hackerproof https://t.co/tJocE6Yzk3 #security #h…
    about 16 hours ago

AmIHackerProof.com By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans