blog trackingRealtime Web Statistics Digital Archives | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘Digital’

Survey finds Two-thirds of German industry hit by digital crime

Source: National Cyber Security – Produced By Gregory Evans

Your ads will be inserted here by Easy Plugin for AdSense. Please go to the plugin admin page toPaste your ad code OR Suppress this ad slot. More than two-thirds of German industrial companies have been victims of digital crime in the past two years, according to a survey carried out by Bitkom, Germany’s IT, telecoms and new media industry association. The most common offence was the simple theft of equipment such as computers, smartphones or tablets, but a fifth of companies surveyed reported that sensitive documents, components or designs had been stolen, while 18 percent said their production had been sabotaged with the aim of damaging or paralyzing it. Such crimes cost German manufacturing industry more than 22 billion euros ($25 billion) a year, Bitkom estimated following its survey of 504 German manufacturing companies with at least 10 employees. “With the digitization of production and the networking of machines over the Internet, new contact points arise that are vulnerable to attack,” Winfried Holz, a Bitkom executive committee member, said in a statement issued at the Hannover Messe industry trade fair. “German industry, with its numerous hidden champions, is an attractive target for cybercriminals and foreign intelligence services,” he added. […]

The post Survey finds Two-thirds of German industry hit by digital crime appeared first on National Cyber Security.

View full post on National Cyber Security

Africa’s digital awards in Kampala graced by Huawei founder

Source: National Cyber Security – Produced By Gregory Evans

The founder of the global technology giant Huawei will be presented with a medal of honour at the 3rd Digital Impact Awards Africa (DIAA2016) in Kampala later this August. Ren Zhengfei, will receive “Africa’s Digital Inclusion Medal of Honor” at the Kampala Serena Hotel on August 18th 2016. The award according to organizers will be in appreciation of Zhengfei and Huawei’s contribution to digital Inclusion in Africa. “They have enabled the “mobile revolution,” Africa’s mobile technology would not be as far along as it is without Huawei and its well-priced products and services,” noted Innocent Kawooya, chief executive of HiPipo, the organizers of the awards. Kawooya said the DIAA2016 jury found it noble to award and honor Zhengfei whose strategic leadership of the global technology giant Huawei has been key to the benefits Africa has gained from Huawei products and services. The awards and lectures will run under the theme “Maximizing the Digital Dividend”. “We believe in the transformative capacity of technology-based solutions. The focus is on digital inclusion, financial inclusion and cybersecurity,” noted Kawooya adding that 21 awards categories will be competed for. The awards categories include applications, digital financial services awards. Under the financial services awards, service providers […]

The post Africa’s digital awards in Kampala graced by Huawei founder appeared first on National Cyber Security.

View full post on National Cyber Security

CSID Launches Social Media Monitoring to Combat Identity Theft, Safeguard Digital Reputations

Source: National Cyber Security – Produced By Gregory Evans

CSID Launches Social Media Monitoring to Combat Identity Theft, Safeguard Digital Reputations

AUSTIN, Texas–(BUSINESS WIRE)–CSID, the leading provider of global identity protection and fraud detection technologies for businesses, their employees, and consumers, today launched Social Media Monitoring, a new service that alerts social media users of privacy and reputational risks on any of the four major social media networks: Facebook, Twitter, LinkedIn and Instagram. CSID’s Social Media Monitoring alerts a subscriber of instances where they are sharing personal information via their social networks – profile info, comments, wall posts and more – which may expose PII and put them at risk for identity theft. It can also alert a subscriber of content that was found within their social network profiles that may damage their reputation, like foul language, sexual content, and drug and alcohol references. Subscribers may connect to the service easily with their social media account credentials. Seventy-three percent of online U.S. adults use social networking sites, and by 2020, social data is expected to reach 44 zetabytes (or 44 trillion GB’s) according to IDC. The information shared across these networks can often be the final puzzle piece hackers need to unlock fraud or identity theft. Even innocuous information, such as mother’s maiden name, high school mascot or hometown, can answer […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post CSID Launches Social Media Monitoring to Combat Identity Theft, Safeguard Digital Reputations appeared first on National Cyber Security.

View full post on National Cyber Security

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan. IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year.

Source: National Cyber Security – Produced By Gregory Evans

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium -- a group of ethical hackers.   “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.”   The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director )   “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said.   As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them.   The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan.  IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year.

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium — a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium — a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan. IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year. appeared first on National Cyber Security.

View full post on National Cyber Security

Callaway: Digital crime now a rule of thumb

Source: National Cyber Security – Produced By Gregory Evans

Callaway: Digital crime now a rule of thumb

A wave of digital financial crimes was traced to a shadowy ring of “thumb bandits” who gained access to corporate and high-end individual bank accounts around the world, unlocking hundreds of millions of dollars in treasure as well as cyber secrets that could compromise national security, federal authorities said this week. The ring, believed to operate out of Silicon Valley and which leaves a mysterious thumbs-up icon at the scene of many of its biggest crimes, uses biometric technology to gain access to well-protected mobile bank accounts, thumb-pad-activated deposit boxes, Bloomberg financial terminals and even the ubiquitous iPhone. A rash of illegal “thumb muggings” is at the heart of the scheme, with hundreds of people reporting being zapped unconscious by their mobile phones while in the hospital, only to wake up with a bloody stump where their right or left thumb used to be. Sound crazy? It certainly was in the late 1980s, when screenwriter Bob Galeenvisioned a futuristic world in 2015 for his Back to the Future series, inhabited by thumb bandits who committed crimes with stolen thumbs used to operate locks and appliances. Source: http://www.usatoday.com/story/money/business/2015/10/21/callaway-digital-crime-back-to-future/74295416/

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Callaway: Digital crime now a rule of thumb appeared first on National Cyber Security.

View full post on National Cyber Security

EU Digital Commish: Ja, we should have done more about NSA spying

Source: National Cyber Security – Produced By Gregory Evans

Europe’s outspoken digi Commissioner, Günther H-dot Oettinger has admitted that the European Commission did too little, too late in reaction to Edward Snowden’s NSA spying revelations. Following a landmark ruling by the European Court of Justice (ECJ) striking down the EU-US data sharing Safe Harbor agreement on Tuesday, Oetti told German daily Der Spiegel that “a mandatory government agreement would be the best solution” but that he didn’t believe it was likely to happen. The second-best option is a re-negotiated arrangement, said Oettinger, for once sticking to the Commission official line. He said clarity was urgently needed for “the many medium-sized companies that are now feeling insecure”. Safe Harbor is the workaround agreement between the EU and the US that allows international companies to transfer Europeans’ personal data to the US even though the US does not meet the adequacy standards for EU data protection law. Companies signed up to a voluntary code of conduct that was then enforced by the American Federal Trade Commission (FTC). But on Tuesday, the ECJ ruled that the pact was unsound, since it cannot protect EU personal data from snooping by the US National Security Agency and other American agencies. Oettinger acknowledged that the […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post EU Digital Commish: Ja, we should have done more about NSA spying appeared first on National Cyber Security.

View full post on National Cyber Security

RBS Experiments with In-House Digital Currency

Source: National Cyber Security – Produced By Gregory Evans

Even as many large banks are actively resisting the digital currency revolution, some – like the Royal Bank of Scotland (RBS) – are embracing it in unexpected ways. According to RBS subsidiary NatWest’s head of technology, Neil Bellamy, the bank has recently been working with outside cryptocurrency firms and has created its own digital currency that is being traded and settled between RBS’ various banks. The experiment is part of the banking giant’s broader strategy of embracing innovation by working with innovators, rather than viewing new technologies as threats. As part of that strategy, RBS has been operating innovation centers where businesses that create financial technology are able to test their products in an environment that is designed to simulate the real marketplace. That’s allowed the bank to test a variety of mobile pay systems and other financial innovations, as well as distributed ledger technologies. According to Bellamy, NatBank and RBS as a whole view these new innovations as opportunities to better serve their customers. At the same time, the RBS strategy of working with tech innovators rather than just co-opting their technologies is a boon to the nascent industry as well. Source: http://dcebrief.com/digital-currency-weekly-recap-10-11-2015/

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post RBS Experiments with In-House Digital Currency appeared first on National Cyber Security.

View full post on National Cyber Security

Chandigarh: Here comes Digital Cop to safeguard you against virtual crimes

Source: National Cyber Security – Produced By Gregory Evans

 0  0 Comments (0) Authors Sahil Baghla (left) and Arun Soni in Sector 17, Chandigarh, on Tuesday. IMAGINE you are a newlywed and on your honeymoon, or a single girl traveller who fears that the hotel room might have a hidden camera. What would one do in such a situation? What if, you still have your ATM card on you, yet a transaction has taken place with it elsewhere. Or what happens when someone creates your fake Facebook profile and hacks your email? Don’t worry, city’s renowned cyber crime experts Arun Soni and Sahil Baghla have answers to all such questions in their book Digital Cop, which was released on Tuesday. “There are parents who are worried about their children surfing too much Internet, tense whether their children will be back in time. We live in a digitally active world, surrounded by technology, yet we are the most clueless and vulnerable when it comes to securing and protecting ourselves from its vicious hackers. With Digital Cop, we are providing that security guard,” say Soni and Baghla. A one-of-a-kind book, it’s a layman’s guide to cyber security, and gives valuable tips to secure your virtual life and be a digital vigilante. […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Chandigarh: Here comes Digital Cop to safeguard you against virtual crimes appeared first on National Cyber Security.

View full post on National Cyber Security

Cyber War: a guide to state-sponsored digital assaults

Source: National Cyber Security – Produced By Gregory Evans

t a month goes by without reports of a new cyber attack. But while it’s no secret either that countries across the world are beefing up both their offensive and defensive cyber security capabilities — what often doesn’t get documented is how many of the major security breaches around the world are, in fact, the work of governments. Well, not directly. State-sponsored hacker groups have the ability to worm into media networks, major corporations, defence departments and — yes — other governments and wreak havoc. There’s even a sense of glamour now attached to the word hacker — popularised by groups like Anonymous, TV shows like Mr Robot and books such as Stieg Larsson’s Millennium trilogy. This overview is based on known attacks: there will, obviously, be others that governments have kept secret. Sadly, attribution is also tricky in several cases as most attacks that occur in the cyber sphere are anonymous. The international media and security agencies can only be left guessing in such cases. Here’s the breakdown on the world’s hacking superpowers. North Korea North Korean leader Kim Jong-un retains tight control over the country’s internet infrastructure; therefore all attacks originating from the country are almost certainly state-sponsored. […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cyber War: a guide to state-sponsored digital assaults appeared first on National Cyber Security.

View full post on National Cyber Security

Cyber crime: states use hackers to do digital dirty work

Source: National Cyber Security – Produced By Gregory Evans

A new breed of sophisticated hacker is emerging as one of the most worrisome digital adversaries for western intelligence chiefs: cyber privateers. Just as England’s Queen Elizabeth I officially licensed pirates to plunder the treasure ships of her rival Philip II of Spain in the 16th century, nations such as Russia and Iran are increasingly arming and encouraging criminal and activist groups with the cyber weaponry necessary to harm their adversaries, while keeping themselves at arms length, say senior security and defence officials in the US and Europe.   “A lot of the techniques that were the preserve of state-sponsored attackers are starting to make their way into broader communities of criminals,” said Simon Goldsmith of the defence contractor BAE System’s cyber unit, Applied Intelligence. “It’s proliferating in a massive way and the object of attacks by these groups is moving from large financial theft to using the same techniques to commit sabotage and for intelligence-gathering.” State use of proxy agents to carry out disguised attacks is not new. But a recent shift has been noted, with a significant increase in the sophistication and number of worrisome attacks from non-state groups, western security officials have told the Financial Times. They […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cyber crime: states use hackers to do digital dirty work appeared first on National Cyber Security.

View full post on National Cyber Security

Page 1 of 1112345»10...Last »

My Twitter

  • Cyber Security News Today is out! https://t.co/KutkdwoF4S @gregorydevans #hacker
    about 54 mins ago
  • RT @GregoryDEvans: Day of the Child – Age of Childing? https://t.co/qCkV1T9Bpz #security #hacker #HTCS
    about 6 hours ago
  • "Hey, @attritionorg! Hold down @GregoryDEvans while I jam a funnel in his earhole..." https://t.co/U8yoRciGWy
    about 22 hours ago
  • Cyber Security News Today is out! https://t.co/FAlKaf6gbn @gregorydevans #hacker
    about 1 day ago
  • RT @GregoryDEvans: I Didn’t Know I Loved — A Mother’s Day Poem https://t.co/iIxeI3T5Og #security #hacker #HTCS
    about 1 day ago

AmIHackerProof.com By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans