blog trackingRealtime Web Statistics Hacker Archives - Page 3 Of 297 - Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant - Part 3

Posts Tagged ‘Hacker’

Hacker summer camps crash Las Vegas this week

Source: National Cyber Security – Produced By Gregory Evans

It’s summer camp for hackers in Las Vegas this week. That’s how event organizers describe three tech conferences — Black Hat USA, DEF CON and B-Sides LV — that are scheduled concurrently each summer. When the hackers are in town, mischief is often close behind. Last year at the Mandalay Bay, where Black Hat is held, rumors began circulating that hackers at the convention were responsible for the reservations system failing at the hotel around the same time that the conference began. (The error turned out to be unrelated.) Attendees do not intend to be malicious, according to Meredith Corley, an event organizer. Rather, Corley describes the hackers as “white-hat hackers at heart.” In fact, the intent at the three conferences, which began this week, is for computer security experts to investigate security breaches — and how to prevent them. Here are some of the hacks that presenters will demonstrate this week. Here are some of the hacks that presenters will demonstrate this week. Cars: Two researchers will demonstrate the possibility of taking remote control of a car. The researchers, who will present at Black Hat on Wednesday, recently previewed their findings on a Jeep Cherokee. Credit Cards: Presenters on […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker summer camps crash Las Vegas this week appeared first on National Cyber Security.

View full post on National Cyber Security

The Martian author says Comcast let hacker take over his e-mail

Source: National Cyber Security – Produced By Gregory Evans

Andy Weir is the creator of Mark Watney, a fictional astronaut who can solve any problem the harsh environment of Mars throws his way. But Weir, author of The Martian, ran into a tricky problem on Earth this week when his e-mail and Twitter accounts were hacked. The culprit, he says, was a hacker who reset the password for his Comcast.net e-mail account by calling Comcast and pretending to be him. Comcast let the hacker take control of his e-mail account after asking “security questions” for which the answers were easy to find, according to Weir. “Well I got hacked,” Weir wrote on Facebook last night. “Someone compromised my e-mail account and twitter account. I don’t know how they got the password. My guess is they socially engineered a password reset on my e-mail account, and they used that to do a password reset on Twitter. They also set up an e-mail forward to an account they control, so even after I changed my e-mail password they were still getting my e-mails until I found that. Whee.” Today, Weir said he found out how his e-mail account was taken over. Here’s his latest update: So I found out how the hacker got control of my e-mail address. I wanted […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post The Martian author says Comcast let hacker take over his e-mail appeared first on National Cyber Security.

View full post on National Cyber Security

Hacker: ‘Hundreds of thousands’ of vehicles are at risk of attack

Source: National Cyber Security – Produced By Gregory Evans

A security expert who recently demonstrated he could hack into a Jeep and control its most vital functions said the same could be done with hundreds of thousands of other vehicles on the road today. Security experts Charlie Miller and Chris Valasek collaborated with Wired magazine to demonstrate how they could remotely hack into and control the entertainment system as well as more vital functions of a 2015 Jeep Cherokee. Both hackers are experienced IT security researchers. Miller is a former NSA hacker and security researcher for Twitter and Valasek is the director of security research at IOActive, a consultancy. As the Wired reporter drove the vehicle on a highway, the hackers were able to manipulate its radio and windshield wipers and even shut the car down. The vehicle hack took place as Wired reporter Andy Greenberg drove the Jeep Cherokee on Rte. 40 in St. Louis. The hackers were 10 miles away at the time. The hackers said they were able to use the cellular connection to the Jeep’s entertainment system or head unit to gain access to other systems; a vehicle’s head unit is commonly connected to various electronic control units (ECUs) located throughout a modern vehicle. There […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker: ‘Hundreds of thousands’ of vehicles are at risk of attack appeared first on National Cyber Security.

View full post on National Cyber Security

Hacker profiling: who is attacking me?

Source: National Cyber Security – Produced By Gregory Evans

Sophisticated cyber attacks have evolved rapidly in the last year, crippling online networks and causing serious financial, operational and reputational damage on firms, regardless of industry or nationality. Many executives rank a large-scale attack as the most important risk facing their firm. The biggest concern generally isn’t the financial cost, but the reputational impact, especially when it comes to consumer data or sensitive internal information. An organisation’s reputation is fragile – once tarnished, it can be difficult to get back. The pressures on CISOs and their teams is clearly on the rise. Over 95% of CISOs say it is at least “moderately likely” that their company will face what they call an “advanced” attack in the next 12 months. Worse, nearly three-quarters of CISOs think their function won’t deal with it properly. >See also: Why you are probably an accidental hacker It should come as no surprise that if the team does not already have a detailed plan in place – a plan that has been rehearsed by the key players – the consequences of the breach will be much worse. Advanced threats are substantially different to traditional threats faced by CISOs and their teams. They differ because they are harder to […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker profiling: who is attacking me? appeared first on National Cyber Security.

View full post on National Cyber Security

How to spot a hacker, and prevent employees turning rogue

Source: National Cyber Security – Produced By Gregory Evans

Hackers come in many shapes and forms. Many of them are located thousands of miles away working for criminal gangs, or even as part of some state-sponsored army bent on stealing your secrets. Those remote hackers will always be there, and you will never come into physical contact with them. But there are also the hackers who wheedle their way into your organisation and undermine your security from the inside. They are potentially the more dangerous, because they work inside your firewalls. However, they are also the people you have some chance of identifying and stopping – if you know what to look for. We collected a group of people whose job it is to do just this, and asked them to give their advice to our readers. This is a flavour of what they said….. Jenny Radcliff, who specialises in penetration testing, observed that many malicious insiders begin as normal employees, but slowly become disenchanted with the organisation and it treats them. “Organisations end up growing their own hackers,” she said. “They have employees who are not fans of the company itself, and even if these employees don’t become hackers themselves, they will feel no obligation to resist a hacker.” […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post How to spot a hacker, and prevent employees turning rogue appeared first on National Cyber Security.

View full post on National Cyber Security

It’s disturbingly easy to become a hacker millionaire

Source: National Cyber Security – Produced By Gregory Evans

All it takes to make over $900,000 a year is to learn some code, pick up some Russian, decide to become a criminal, and have no fear. That’s it. Put it all together, take a deep breath, and then even you can become a novice cybercriminal. That’s what Ziv Mador, VP of security from information-security company Trustwave, showed me. He gave me an exclusive look into his research about the criminal underbelly of the internet. And it turns out hackers stand to rake in quite a bit of money if they know how to operate and where to turn. In fact, according to his conservative estimates, even the most rudimentary of hackers stand to make as much as $80,000 a month. Doing so isn’t so hard. The world of hacking and selling exploits is replete with people looking to hawk their coded goods. But let’s not focus on what one must do to enter this world; it’s really the numbers that speak for themselves. Mador explained that the ecosystem of hacking consists of renting access to already-made exploits. These offerings are available on Craigslist-like sites, but for hacker eyes only. The security expert said that most people using these sites are Russian or Eastern […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post It’s disturbingly easy to become a hacker millionaire appeared first on National Cyber Security.

View full post on National Cyber Security

CVS Shuts Down Its Photo Site After Suspected Hacker Break-In

Source: National Cyber Security – Produced By Gregory Evans

CVS has shut down its online photo service, warning its customers that there may have been a data theft and to call their banks if they get suspicious credit card charges. The drugstore alerted people with a warning on its CVSPhoto.com website: We have been made aware that customer credit card information collected by the independent vendor who manages and hosts CVSPhoto.com may have been compromised. As a precaution, as our investigation is underway we are temporarily shutting down access to online and related mobile photo services. We apologize for the inconvenience. Customers who provided credit card information for transactions on CVSPhoto.com are advised to check their credit card statements for any fraudulent or suspicious activity and to call their bank or financial institution to report anything of concern. Customer registrations related to online photo processing and CVSPhoto.com are completely separate from CVS.com, optical.cvs.com, cvs.com/MinuteClinic on line bill pay and our pharmacies. Financial transactions on CVS.com, optical.cvs.com,cvs.com/MinuteClinic and in-store are not affected. When we reached out to a CVS spokesperson, they provided the same statement. CVS is joining Target and Home Depot in the pantheon of really popular American stores getting dicked over by digital thieves. The only silver lining […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post CVS Shuts Down Its Photo Site After Suspected Hacker Break-In appeared first on National Cyber Security.

View full post on National Cyber Security

Get A Lifetime Of Hacker Protection From VPN Land for 74% Off

Source: National Cyber Security – Produced By Gregory Evans

There’s no time like the present to start protecting your data from hackers and nosy advertisers. VPN Land is a private piece of Internet where you can browse freely and securely while utilizing over 400 reliable servers. Use VPN Land’s speedy service on desktop and mobile platforms all over the world, and you’ll never browse unprotected again. Avoid geo-location restrictions to watch media content like Hulu & Netflix anywhere Mask your IP address while you surf the Internet Browse the web without risking information or identity theft Access blocked websites Use VoIP applications like Skype Enjoy speedy connections wherever you are Utilize the service on mobile platforms Source: Boing Boing 

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Get A Lifetime Of Hacker Protection From VPN Land for 74% Off appeared first on National Cyber Security.

View full post on National Cyber Security

‘Real-Time Hacker’ Sends Vulgar Messages Through Tulsa Woman’s Facebook

Source: National Cyber Security – Produced By Gregory Evans

A scam artist takes over your computer and sends messages from your social media accounts; that’s what happened to a woman in Tulsa County, and deputies said it’s the first real-time scam like this they have seen. The victim said she was sitting at her computer, reading an article when the screen froze and a 1-800 number popped up on the screen telling her to call it for help. She thought it was from her Internet provider, she picked up the phone expecting help, but instead of fixing her problem they made it even worse. Online hackers usually get into an email or shopping account to steal person information, but this time a thief manipulated her computer to send out vulgar messages while she was on Facebook. She watched it all in front of her computer screen, helpless. “I was shocked, very shocked. It’s the last thing in the world I expect to see,” she said. She said the man on the other end of the line was helpful at first but then wanted her to buy firewall protection. “After he wanted to push the $199 deal on me and I said ‘Woah, back up, I’m not going to buy […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post ‘Real-Time Hacker’ Sends Vulgar Messages Through Tulsa Woman’s Facebook appeared first on National Cyber Security.

View full post on National Cyber Security

Here are all of the crazy illegal things for sale on the hacker forum the Feds just shut down

Source: National Cyber Security – Produced By Gregory Evans

On Wednesday, news broke the the Department of Justice dismantled the storied computer hacking forum Darkode and filed criminal charges against 12 people in the US who were allegedly associated with the website. Darkode, which has been around since 2007, was one of the few online marketplaces for English-speaking hackers (most others are in Russian). US attorney David J. Hickton described Darkode as “the most sophisticated English-speaking forum for criminal computer hackers in the world,” in the Department of Justice’s press release. Getting access to the website was a mini feat. Every user had to be vetted by another user, and also provide proof of their own hacking prowess. “Only those proposed for membership by an existing user could join, but not until they posted a resumé of the skills and achievements that could contribute to the criminal community. There was a hierarchical membership structure, and the status of users determined who they could communicate with, and their access to the commodities and services on offer,” wrote the UK’s National Crime Agency. But once users gained access to Darkode, they were given access to an insane cornucopia of hacking products. Journalist Brian Krebs was granted access, and kept a low profile for years on […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Here are all of the crazy illegal things for sale on the hacker forum the Feds just shut down appeared first on National Cyber Security.

View full post on National Cyber Security

Page 3 of 297«12345»102030...Last »

My Twitter

Gregory D. Evans On Facebook