blog trackingRealtime Web Statistics Digital | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘Digital’

Unidentified Hacker Puts Digital Eavesdropping Software’s Client List Online

Source: National Cyber Security – Produced By Gregory Evans

HackingTeam, an Italian company that helps law enforcement hack into digital networks, has apparently been hacked itself. Client lists, emails and other documents purportedly belonging to HackingTeam were posted online Sunday by an anonymous hacker. HackingTeam technology extracts sensitive information off computers before the data can be encrypted. The company has claimed its software can log keystrokes and spy on a computer user’s actions. The Drug Enforcement Administration and the Pentagon are customers of HackingTeam’s digital eavesdropping technology, according to London-based Privacy International. The leaked documents say the United Arab Emirates, South Korea, Chile and several other governments are customers too. Law enforcement and spy agencies tend to be tight-lipped about the tools they acquire to track suspects and targets, but the lens into HackingTeam could confirm the suspicions of civil rights advocates, who’ve called for greater transparency and more restrictions related to the surveillance. HackingTeam did not immediately respond to requests for comment on the matter. Source: Government Technology

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Unidentified Hacker Puts Digital Eavesdropping Software’s Client List Online appeared first on National Cyber Security.

View full post on National Cyber Security

Staffordshire Police hire digital experts to fight cyber crime

Source: National Cyber Security – Produced By Gregory Evans

DIGITAL experts have been recruited to help police catch cyber criminals. They have joined a dedicated digital intelligence team (DIT) within Staffordshire Police, set up to carry out covert investigations into crime committed online. The new specialists could be helping to tackle offences such as fraud, drug dealing and child sexual exploitation. It comes after The Sentinel revealed in February that the force had established a crack cyber crime unit to catch perverts, fraudsters and other criminals using the internet to target their victims. The new DIT replaces this unit and signals a different approach in Staffordshire to addressing cyber crime. Chief Constable Jane Sawyers said: “These are all people with significant skills, backgrounds, training and levels of qualifications in digital investigation. “We have changed the way we think about investigating crime because society has changed the way that crime is committed.” More than 250 police staff have been trained in how to gather evidence and intelligence from the internet. It is hoped a further 250 will have the training by the end of next year. Assistant Chief Constable Jon Drake said: “The DIT have got really sophisticated technological techniques to help catch offenders who think the internet is a […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Staffordshire Police hire digital experts to fight cyber crime appeared first on National Cyber Security.

View full post on National Cyber Security

Cyberattack tied to Hezbollah ups the ante for Israel’s digital defenses

Source: National Cyber Security – Produced By Gregory Evans

TEL AVIV — Israel is familiar with defending itself against cyberattacks from small hacker groups and armed militants alike. Last year, it claims to have fended off a large-scale strike from Iran during the war with Hamas. But recently, security researchers in Israel uncovered something different – a widespread cyberespionage campaign carried out by skilled hackers that targeted military suppliers, telecom companies, media outlets, and universities with malicious software meant to steal sensitive data and monitor its victims. The campaign appears to have been ongoing since 2012 and has been found in networks in roughly a dozen other countries, too. The hackers penetrated sensitive systems with custom-built malicious software that has been named “Explosive” by Check Point, the Israeli security firm that discovered it attacking a Web server on a private network. Recommended: How well do you know hacker movies? While Check Point did not specifically attribute the malware to a particular group or organization, other technical experts say the attack has all the markings of a campaign orchestrated by the Lebanese Shiite militant group Hezbollah, which maintains close ties to Iran and its Revolutionary Guard. Check Point named the campaign “Volatile Cedar” for its suspected Lebanese origins – the Cedar tree is Lebanon’s national emblem. But researchers also say that it appears […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cyberattack tied to Hezbollah ups the ante for Israel’s digital defenses appeared first on National Cyber Security.

View full post on National Cyber Security

How Will The Next President Protect Our Digital Lives?

Source: National Cyber Security – Produced By Gregory Evans

As candidates hit the campaign trail, NPR looks at four major issues the next president will face from Day 1 in office. When President Obama took office back in 2009, “cybersecurity” was not a word that everyday people used. It wasn’t debated. Then, mega-breaches against consumers, businesses, and the federal government changed that. The latest came Tuesday, when the Internal Revenue Service said criminals used an online service provided by the agency to access the information of more than 100,000 taxpayers. Now, the 45th president will have to come into office with a game plan for how to protect us online. The plan could shape up any number of ways because our digital lives — and the attacks against our digital lives — are pretty new. But it’s something people care a lot about. With Edward Snowden, American citizens learned we’re the target of a mass surveillance program we didn’t know about, and that the National Security Agency, a military agency, is porous, vulnerable to insiders hacking and stealing. With the Sony attack we saw how security breaches can bring big companies to a screeching, embarrassing halt. And let’s not forget the new era of garden-variety crime. Credit card fraud, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post How Will The Next President Protect Our Digital Lives? appeared first on National Cyber Security.

View full post on National Cyber Security

Stephen Greenhalgh: Get ready for 5,000 Digital Dixons of Dock Green

greenhalghpic-300x300

Source: National Cyber Security – Produced By Gregory Evans

Last week I accompanied the Mayor and Bill Bratton, the New York Police Commissioner, on a visit to a high-tech intelligence hub that protects Wall Street from criminal and terrorist attacks. The visit underlined a shared commitment to invest in technology to strengthen frontline policing. The NYPD and Microsoft worked together to develop a Domain Awareness System that aggregates and analyses huge amounts of public safety data in real time. Analysts are notified of any suspicious packages or vehicles and the police can then search for suspects using CCTV images and licence plate readers. Both London and New York are great, global cities that have become much safer in the last twenty years. In 2014 both cities had their best year on homicides since the 1960s. London’s murder total was just 92 in 2014 – half of what it was in 1991, when London had 2 million fewer residents. New York has seen even more dramatic reductions in homicide – down from 2,245 in 1992 to 333 last year. Both cities face similar public safety challenges. The challenge for a future Mayor of London must be to keep crime coming down on dramatically reduced policing budgets, as well as to protect Londoners […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Stephen Greenhalgh: Get ready for 5,000 Digital Dixons of Dock Green appeared first on National Cyber Security.

View full post on National Cyber Security

INTERPOL and the fast-paced digital threat landscape

mm_oberoi

Source: National Cyber Security – Produced By Gregory Evans

 Powered by Max Banner Ads Dr. Madan Oberoi is the Director of Cyber Innovation and Outreach Directorate at the INTERPOL Global Complex for Innovation in Singapore. In this interview he talks about the key developments that allow law enforcement to stay on top the fast-paced digital threat landscape, offers insight on the challenges involved in managing international cyber innovation and research within INTERPOL, and introduces INTERPOL World 2015. What are the challenges of managing international cyber innovation and research within INTERPOL? With rapid technological advancement and effortless access to cyberspace, the world faces a range of new crime threats that are increasingly complex and intertwined. In the last few decades, we have witnessed a growing integration and interconnectedness of systems that were previously divergent, resulting in a ‘system-of-systems’. Crimes in cyberspace are not contained by national boundaries or within countries, making them a truly global threat. For example, in the cybercrime arena, the offence may have been committed in one jurisdiction or country, but the victims may be in a different jurisdiction, and regulations may differ. It is therefore extremely important that all stakeholders such as governments, police organizations, academia and private industry work together to combat these crimes. To help […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post INTERPOL and the fast-paced digital threat landscape appeared first on National Cyber Security.

View full post on National Cyber Security

Digital life hack: Turn your old phone into a security camera

smartphonepic1

Source: National Cyber Security – Produced By Gregory Evans

n these days of nonstop hacking, phishing and data breaches, it’s easy to forget that regular old burglars are still lurking around to steal from your home. That’s why I’m a big fan of home security systems, especially ones that let you watch your home from a distance and alert you when someone breaks in. Of course, you don’t always need a security system that covers an entire house. Maybe you want to watch a specific drawer or jewelry box, your cubicle at work, the door to your room (if you have roommates or a snooping contractor) or what’s happening in your hotel room while you’re out. In those and similar cases, you might be able to set up a quick security system for free with the right tools. Getting started The main thing you need is a smartphone (a tablet with a rear camera can work, too), a stand to keep the gadget upright and a monitoring app. Set up your gadget on the stand and point the camera in the direction you want to watch. Then start the app. If the app detects movement, it will alert you via email or text, take pictures of the thieves and even […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Digital life hack: Turn your old phone into a security camera appeared first on National Cyber Security.

View full post on National Cyber Security

Bay Area Security Firm Hires ‘White Hat Hackers’ To Find Vulnerabilities In Digital Systems

Bay Area Security Firm Hires ‘White Hat Hackers’ To Find Vulnerabilities In Digital Systems



REDWOOD CITY (KPIX 5) — Cyber-crime is big business in the digital age, so a Bay Area security firm has hired a sophisticated group of hackers to break into computer systems. Read More….

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Hacking scandal celebrities were ‘dumb’ to keep naked selfies on their computers and phones, says EU digital commissioner

Hacking scandal celebrities were ‘dumb’ to keep naked selfies on their computers and phones, says EU digital commissioner



The European Union’s new digital head has accused celebrities whose naked photos have been leaked online of being ‘dumb’ for having taken them in the first place. Images of more than 80 stars including Oscar winner Jennifer Lawrence, singer Rihanna […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Detectives use digital forensics to find crime hidden in technology

Source: National Cyber Security – Produced By Gregory Evans

Detectives use digital forensics to find crime hidden in technology



The digital video recorder was charred from the heat and drenched from the high-powered hoses used to extinguish the blaze at Emory’s Restaurant at Silver Lake. ——————————————————————————– The Everett police detectives brought the soggy mess back to the lab. It […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Detectives use digital forensics to find crime hidden in technology appeared first on National Cyber Security.

View full post on National Cyber Security

Page 1 of 912345»...Last »

My Twitter

Gregory D. Evans On Facebook