blog trackingRealtime Web Statistics Digital Archives | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘Digital’

CSID Launches Social Media Monitoring to Combat Identity Theft, Safeguard Digital Reputations

Source: National Cyber Security – Produced By Gregory Evans

CSID Launches Social Media Monitoring to Combat Identity Theft, Safeguard Digital Reputations

AUSTIN, Texas–(BUSINESS WIRE)–CSID, the leading provider of global identity protection and fraud detection technologies for businesses, their employees, and consumers, today launched Social Media Monitoring, a new service that alerts social media users of privacy and reputational risks on any of the four major social media networks: Facebook, Twitter, LinkedIn and Instagram. CSID’s Social Media Monitoring alerts a subscriber of instances where they are sharing personal information via their social networks – profile info, comments, wall posts and more – which may expose PII and put them at risk for identity theft. It can also alert a subscriber of content that was found within their social network profiles that may damage their reputation, like foul language, sexual content, and drug and alcohol references. Subscribers may connect to the service easily with their social media account credentials. Seventy-three percent of online U.S. adults use social networking sites, and by 2020, social data is expected to reach 44 zetabytes (or 44 trillion GB’s) according to IDC. The information shared across these networks can often be the final puzzle piece hackers need to unlock fraud or identity theft. Even innocuous information, such as mother’s maiden name, high school mascot or hometown, can answer […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post CSID Launches Social Media Monitoring to Combat Identity Theft, Safeguard Digital Reputations appeared first on National Cyber Security.

View full post on National Cyber Security

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan. IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year.

Source: National Cyber Security – Produced By Gregory Evans

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium -- a group of ethical hackers.   “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.”   The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director )   “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said.   As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them.   The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan.  IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year.

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium — a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium — a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan. IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year. appeared first on National Cyber Security.

View full post on National Cyber Security

Callaway: Digital crime now a rule of thumb

Source: National Cyber Security – Produced By Gregory Evans

Callaway: Digital crime now a rule of thumb

A wave of digital financial crimes was traced to a shadowy ring of “thumb bandits” who gained access to corporate and high-end individual bank accounts around the world, unlocking hundreds of millions of dollars in treasure as well as cyber secrets that could compromise national security, federal authorities said this week. The ring, believed to operate out of Silicon Valley and which leaves a mysterious thumbs-up icon at the scene of many of its biggest crimes, uses biometric technology to gain access to well-protected mobile bank accounts, thumb-pad-activated deposit boxes, Bloomberg financial terminals and even the ubiquitous iPhone. A rash of illegal “thumb muggings” is at the heart of the scheme, with hundreds of people reporting being zapped unconscious by their mobile phones while in the hospital, only to wake up with a bloody stump where their right or left thumb used to be. Sound crazy? It certainly was in the late 1980s, when screenwriter Bob Galeenvisioned a futuristic world in 2015 for his Back to the Future series, inhabited by thumb bandits who committed crimes with stolen thumbs used to operate locks and appliances. Source: http://www.usatoday.com/story/money/business/2015/10/21/callaway-digital-crime-back-to-future/74295416/

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Callaway: Digital crime now a rule of thumb appeared first on National Cyber Security.

View full post on National Cyber Security

EU Digital Commish: Ja, we should have done more about NSA spying

Source: National Cyber Security – Produced By Gregory Evans

Europe’s outspoken digi Commissioner, Günther H-dot Oettinger has admitted that the European Commission did too little, too late in reaction to Edward Snowden’s NSA spying revelations. Following a landmark ruling by the European Court of Justice (ECJ) striking down the EU-US data sharing Safe Harbor agreement on Tuesday, Oetti told German daily Der Spiegel that “a mandatory government agreement would be the best solution” but that he didn’t believe it was likely to happen. The second-best option is a re-negotiated arrangement, said Oettinger, for once sticking to the Commission official line. He said clarity was urgently needed for “the many medium-sized companies that are now feeling insecure”. Safe Harbor is the workaround agreement between the EU and the US that allows international companies to transfer Europeans’ personal data to the US even though the US does not meet the adequacy standards for EU data protection law. Companies signed up to a voluntary code of conduct that was then enforced by the American Federal Trade Commission (FTC). But on Tuesday, the ECJ ruled that the pact was unsound, since it cannot protect EU personal data from snooping by the US National Security Agency and other American agencies. Oettinger acknowledged that the […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post EU Digital Commish: Ja, we should have done more about NSA spying appeared first on National Cyber Security.

View full post on National Cyber Security

RBS Experiments with In-House Digital Currency

Source: National Cyber Security – Produced By Gregory Evans

Even as many large banks are actively resisting the digital currency revolution, some – like the Royal Bank of Scotland (RBS) – are embracing it in unexpected ways. According to RBS subsidiary NatWest’s head of technology, Neil Bellamy, the bank has recently been working with outside cryptocurrency firms and has created its own digital currency that is being traded and settled between RBS’ various banks. The experiment is part of the banking giant’s broader strategy of embracing innovation by working with innovators, rather than viewing new technologies as threats. As part of that strategy, RBS has been operating innovation centers where businesses that create financial technology are able to test their products in an environment that is designed to simulate the real marketplace. That’s allowed the bank to test a variety of mobile pay systems and other financial innovations, as well as distributed ledger technologies. According to Bellamy, NatBank and RBS as a whole view these new innovations as opportunities to better serve their customers. At the same time, the RBS strategy of working with tech innovators rather than just co-opting their technologies is a boon to the nascent industry as well. Source: http://dcebrief.com/digital-currency-weekly-recap-10-11-2015/

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post RBS Experiments with In-House Digital Currency appeared first on National Cyber Security.

View full post on National Cyber Security

Chandigarh: Here comes Digital Cop to safeguard you against virtual crimes

Source: National Cyber Security – Produced By Gregory Evans

 0  0 Comments (0) Authors Sahil Baghla (left) and Arun Soni in Sector 17, Chandigarh, on Tuesday. IMAGINE you are a newlywed and on your honeymoon, or a single girl traveller who fears that the hotel room might have a hidden camera. What would one do in such a situation? What if, you still have your ATM card on you, yet a transaction has taken place with it elsewhere. Or what happens when someone creates your fake Facebook profile and hacks your email? Don’t worry, city’s renowned cyber crime experts Arun Soni and Sahil Baghla have answers to all such questions in their book Digital Cop, which was released on Tuesday. “There are parents who are worried about their children surfing too much Internet, tense whether their children will be back in time. We live in a digitally active world, surrounded by technology, yet we are the most clueless and vulnerable when it comes to securing and protecting ourselves from its vicious hackers. With Digital Cop, we are providing that security guard,” say Soni and Baghla. A one-of-a-kind book, it’s a layman’s guide to cyber security, and gives valuable tips to secure your virtual life and be a digital vigilante. […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Chandigarh: Here comes Digital Cop to safeguard you against virtual crimes appeared first on National Cyber Security.

View full post on National Cyber Security

Cyber War: a guide to state-sponsored digital assaults

Source: National Cyber Security – Produced By Gregory Evans

t a month goes by without reports of a new cyber attack. But while it’s no secret either that countries across the world are beefing up both their offensive and defensive cyber security capabilities — what often doesn’t get documented is how many of the major security breaches around the world are, in fact, the work of governments. Well, not directly. State-sponsored hacker groups have the ability to worm into media networks, major corporations, defence departments and — yes — other governments and wreak havoc. There’s even a sense of glamour now attached to the word hacker — popularised by groups like Anonymous, TV shows like Mr Robot and books such as Stieg Larsson’s Millennium trilogy. This overview is based on known attacks: there will, obviously, be others that governments have kept secret. Sadly, attribution is also tricky in several cases as most attacks that occur in the cyber sphere are anonymous. The international media and security agencies can only be left guessing in such cases. Here’s the breakdown on the world’s hacking superpowers. North Korea North Korean leader Kim Jong-un retains tight control over the country’s internet infrastructure; therefore all attacks originating from the country are almost certainly state-sponsored. […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cyber War: a guide to state-sponsored digital assaults appeared first on National Cyber Security.

View full post on National Cyber Security

Cyber crime: states use hackers to do digital dirty work

Source: National Cyber Security – Produced By Gregory Evans

A new breed of sophisticated hacker is emerging as one of the most worrisome digital adversaries for western intelligence chiefs: cyber privateers. Just as England’s Queen Elizabeth I officially licensed pirates to plunder the treasure ships of her rival Philip II of Spain in the 16th century, nations such as Russia and Iran are increasingly arming and encouraging criminal and activist groups with the cyber weaponry necessary to harm their adversaries, while keeping themselves at arms length, say senior security and defence officials in the US and Europe.   “A lot of the techniques that were the preserve of state-sponsored attackers are starting to make their way into broader communities of criminals,” said Simon Goldsmith of the defence contractor BAE System’s cyber unit, Applied Intelligence. “It’s proliferating in a massive way and the object of attacks by these groups is moving from large financial theft to using the same techniques to commit sabotage and for intelligence-gathering.” State use of proxy agents to carry out disguised attacks is not new. But a recent shift has been noted, with a significant increase in the sophistication and number of worrisome attacks from non-state groups, western security officials have told the Financial Times. They […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cyber crime: states use hackers to do digital dirty work appeared first on National Cyber Security.

View full post on National Cyber Security

Facebook’s new digital assistant “M” is like Siri, Cortana or Google Now, but with a human touch

You might recall that last month we told you about a virtual digital assistant being dreamed up by Facebook, with the code name Moneypenny. Today, the new assistant has been introduced by Facebook, and it is being tested on the Facebook Messenger app. Called Facebook M, the assistant can do the things that the other assistants do, such as gather information, and perform some tasks. And like the others, it is free. But unlike Siri, Cortana and Google Now, there is also a human component to Facebook M. 

Besides the AI that helps control how the other assistants respond to inquiries and …

View full post on PhoneArena

Black Hat 2015: Why digital security matters

Source: National Cyber Security – Produced By Gregory Evans

I recently attended the 2015 version of Black Hat at Mandalay Bay in Las Vegas. Black Hat is an annual conference dedicated to cyber and data security. It’s actually an international conference, with stops in Europe and the USA. The conference is always entertaining and most of the briefings are way over my head just based on the titles alone. There are seven unwritten rules for Black Hat attendees. I’ve attended six Black Hat conferences so far and I’ve only seen this list posted a couple of times, but I think it applies every year — at least I’m going to do my best to stick to these every year. The 7 unwritten rules for Black Hat attendees: Wireless: Stay away from all Wi-Fi and turn off your Bluetooth; hacks are happening Encryption: Try to encrypt any information you must send. Use a VPN; people are watching. Don’t put it down: Any device left alone is an invitation not just for theft but infection, etc. Don’t accept gifts: Someone friendly handing you a USB drive may be hoping to own your info. Anything can be hacked: ATMs, room keys, RFID cards, anything, so, be vigilant at all times. Try to […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Black Hat 2015: Why digital security matters appeared first on National Cyber Security.

View full post on National Cyber Security

Page 1 of 1112345»10...Last »

My Twitter

  • Time to Let Go? 14 Reasons Why Good Relationships End https://t.co/HwcoXf4eGt #dating @gregorydevans
    about 9 hours ago
  • Hinge User Survey https://t.co/WNA81qWivG #dating @gregorydevans
    about 10 hours ago
  • 12 Signs Your Partner is Ready to Settle but You’re Not https://t.co/Md1UdV8j6S #dating @gregorydevans
    about 21 hours ago
  • Cyber Security News Today is out! https://t.co/xEaxm4V4N5 @gregorydevans #hacker
    about 22 hours ago
  • Infatuation vs. Love: 14 Ways You Can Tell the Difference https://t.co/HeOIDWHK0H #dating @gregorydevans
    about 1 day ago

AmIHackerProof.com By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans