Electronics Giant Harman Building Anti-Hacking Wall

Source: National Cyber Security – Produced By Gregory Evans Electronics giant Harman says the prospect of cyberattacks on vehicles is becoming increasingly serious, with any form of wireless link, including a separate mobile phone or tablet, providing the conduit hackers need. Harman’s Asaf Atzmon, director of business development and The…

read more

‘Babyface hacker who paralysed a phone giant’: Son of a single mother, TalkTalk suspect, 15, is violent video game addict who rarely leaves his bedroom

Source: National Cyber Security – Produced By Gregory Evans The boy of 15 arrested over the TalkTalk cyber-attack is a baby-faced loner and gaming fanatic nicknamed ‘Vicious’ who rarely leaves his bedroom. The reclusive youngster is suspected of being behind the huge security breach that has put the banking details…

read more

Hacker puts giant cat on Google Maps

A hacker drew a picture of a giant cat on Google Maps, in Hobson Bay, Auckland in New Zealand. The anonymous hacker made the picture of a cat appear as part of the land. It was thought to be difficult […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more

Airstar’s remote-controlled helicopter supports Petrobras, Brazil’s government-owned oil giant

Top Priority Sector:  video_surveillance_cctv Image Caption:  CamCopter fromAirstar International Groupo JBL has announced the completion of its first annual flare stack inspection contract with Petroleum giant, Petrobras, using a specially-equipped industrial Airstar International remote-controlled helicopter. Homepage position:  10 read more View full post on Government Security News View full post…

read more

Giant weed said border security obstacle

LAWRENCE, Kan., Dec. 30 (UPI) — A giant invasive weed is threatening the ecosystem along southern U.S. rivers and could hamper security efforts on the U.S.-Mexico border, researchers say. View full post on could security – Yahoo! News Search Results View full post on National Cyber Security

read more

Computer tech law: like a giant Trojan worm

The political effect of such a broad approach is to splinter criticism, not allowing focus on a single point of attack. This places the politician and bureaucrat in a position to cherry pick which arguments to uphold, which to reject, while keeping the essence unchanged. The Peaceful Assembly Bill is…

read more