blog trackingRealtime Web Statistics Hacker Archives - Page 3 of 290 - Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘Hacker’

Hacker avoids conviction over university cyber-attack

IT-SecurityTS_300x200

Source: National Cyber Security - Produced By Gregory Evans

 Powered by Max Banner Ads A 20-year-old Auckland computer hacker has been discharged without conviction after launching a cyber-attack on the University of Melbourne in 2011. Neil McDonald appeared before Judge Pippa Sinclair at the North Shore District Court today facing one charge of intentionally accessing a computer system without authority. The charge faces a maximum penalty of two years’ imprisonment. Outlining the police summary of facts, Judge Sinclair said the attack occurred between November 12 and 15, 2011 when McDonald, then 17, launched a “SQL [structured query language] injection attack” through a redundant service database at the University of Melbourne. The court heard the type of attack used by McDonald was commonly used by hackers. McDonald gained the logins and passwords for four administrators and 275 staff members in the attack and then contacted the university and claimed responsibility, the court heard. He also boasted about the attack on social media and in a radio interview, Judge Sinclair said. The university then laid a complaint with Victoria Police’s e-crimes squad, and a search warrant was executed at McDonald’s Auckland home. Since his arrest, the court heard he had voluntarily completed 50 hours’ community service in his bid to obtain a […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker avoids conviction over university cyber-attack appeared first on National Cyber Security.

View full post on National Cyber Security

Anonymous-linked hacker admits to DDoS of public services

380

Source: National Cyber Security - Produced By Gregory Evans

A hacker with links to Anonymous has admitted conducting distributed-denial-of-service (DDoS) attacks against social services, crime prevention bodies and businesses. Ian Sullivan, a 51-year-old from Bootle in Merseyside, flooded more than 300 websites with bogus traffic in 2013, rendering them unusable for legitimate visitors, though the police said no data was stolen. Steven Pye, senior operations manager at the National Crime Agency’s (NCA) cybercrime unit, said: “Many DDoS attacks are little more than a temporary inconvenience, but in this case Sullivan’s actions are likely to have deprived vulnerable people of access to important information, ranging from where to get support on family breakup, to reporting crime anonymously.” “This multi-agency operation illustrates the commitment of the NCA and its partners to pursuing people who think they can criminally disrupt important public services or legitimate businesses.” Sullivan was arrested on July 29, 2013 by the Police Central e-Crime Unit after the DDoS attacks were referenced by a Twitter account. Investigators found software on his computer capable of taking websites offline, as well as documents linking him to other campaigns run by hacking collective Anonymous. He will be sentenced at Liverpool Crown Court on May 1. source: http://www.cbronline.com/news/security/anonymous-linked-hacker-admits-to-ddos-of-public-services-4507312

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Anonymous-linked hacker admits to DDoS of public services appeared first on National Cyber Security.

View full post on National Cyber Security

Website/IP katyperry.com may be hackable #amihackerproof #hacker

Source: National Cyber Security - Produced By Gregory Evans

Website/IP: katyperry.com Industry: Blog – Entertainment Description: N/A Scan Type: Web Site Scan Vulnerabilities: 11 Scan Date: Feb 03, 2015 Scan Time: 01:09:30 PM Free Scan: You can go to http://www.AmIHackerProof.com/Results and do a search for this scan. Purchase: If you would like the detailed report, you can click this link to purchase it for $15. About Am I Hacker Proof AmIHackerProof.com is an online vulnerability scanner that checks websites, computers and networks to see if they are vulnerable to hackers. Find Out On https://www.facebook.com/AmIHackerProofhttp://instagram.com/amihackerproof https://twitter.com/amihackerproof View full post on Am I Hacker Proof

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Website/IP katyperry.com may be hackable #amihackerproof #hacker appeared first on National Cyber Security.

View full post on National Cyber Security

Death threat hacker who fooled police is jailed

_80778783_161241005

Source: National Cyber Security - Produced By Gregory Evans

Yusuke Katayama played a game of cat and mouse with the authorities, leading them to make numerous wrongful arrests. He threatened a massacre at a comic book event, as well as to attack a school attended by the grandchildren of Japan’s Emperor Akihito. Katayama’s campaign highlighted the difficulties the country’s police force has had in dealing with cyber crime. “He committed the crime, and the purpose of it was [for police] to make wrongful arrests,” said presiding judge Katsunori Ohno at Tokyo District Court, adding that Katayama’s actions had been “vicious”. RiddlesThroughout 2012, the 32-year-old used a virus to gain control of strangers’ computers. He then issued threats – which appeared to come from the computer’s owner – and a series of riddles that captured the attention of the national media. Among the other threats made by Katayama – who went by the alias Demon Killer – was one to attack a plane. The case highlighted the Japanese police’s tendency to extract confessions from suspects, as four people owned up to crimes which the National Police Agency (NPA) later admitted they did not commit. Computers belonging to each had been infected with a Trojan Horse virus, introduced via a link […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Death threat hacker who fooled police is jailed appeared first on National Cyber Security.

View full post on National Cyber Security

Accused Russian Hacker Can Be Sent to U.S., Dutch Court Says

iQijc4Q2I8jw

Source: National Cyber Security - Produced By Gregory Evans

A Russian accused of taking part in the most prolific computer-hacking organization ever uncovered by American authorities can be extradited to the U.S. after a Dutch court rejected his bid to serve any sentence in the Netherlands. Vladimir Drinkman failed to plausibly show “that the U.S. won’t comply with treaty obligations,” The Hague-based court said in a statement on its website today. The U.S. was first to ask for Drinkman’s extradition and Justice Minister Ivo Opstelten was within his rights to ignore a separate extradition request from Russia, the court said. Drinkman will appeal the decision, his lawyer, Bart Stapert, said by phone. Drinkman has been at the center of a 2 ½-year legal tussle over whether he should be sent to the U.S. for prosecution. Stapert told the Dutch court on Jan. 13 that sending his client to the U.S. with no provision for his return would mean the end of his family life if he were convicted and sentenced. Drinkman, a 34-year-old Muscovite has been fighting extradition to the U.S. since he was arrested while vacationing in Amsterdam in June 2012. Federal prosecutors in New Jersey indicted him and four other men in July 2013 on charges of […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Accused Russian Hacker Can Be Sent to U.S., Dutch Court Says appeared first on National Cyber Security.

View full post on National Cyber Security

A Notorious Hacker Says There’s One High Tech Gadget He Absolutely Refuses to Use

tech-621x330

Source: National Cyber Security - Produced By Gregory Evans

dward Snowden’s Russian handler says the NSA contractor turned hacker refuses to use an iPhone… because the NSA can spy on it at will. Forbes reported in 2013 that documents dumped by Snowden showed the NSA had developed spyware for all smart phones. But now, according to Tech Times, Snowden’s attorney Anatoly Kucherena claims the iPhone is particularly vulnerable. Edward never uses an iPhone; he’s got a simple phone. The iPhone has special software that can activate itself without the owner having to press a button and gather information about him; that’s why on security grounds he refused to have this phone. Snowden is the first to reveal the NSA’s spyware tactics. Tech Times says the Snowden leaks revealed an entire panoply of things they could use to hack an iPhone: Succeeding leaks showed that the NSA developed spyware that would target iPhones, allowing intelligence agencies to access messages, live microphone feeds, data contained in the devices and location data. While it was not made clear whether the program was a success, Apple again denied being involved in the development of such a spyware. Apple says it has never worked with the NSA to come up with a back door to its […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post A Notorious Hacker Says There’s One High Tech Gadget He Absolutely Refuses to Use appeared first on National Cyber Security.

View full post on National Cyber Security

Revenge porn’ photos of Darlington ‘love-cheat’ woman sent to friends and family by phone hacker lover

imgID17229505.jpg-pwrt2

Source: National Cyber Security - Produced By Gregory Evans

 Powered by Max Banner Ads  A MARRIED man sent naked photographs of a woman he had been having an affair with to her friends and family after discovering she had been cheating on him, a court was told today (Wednesday, January 28). Kevin Howlett, 40, who sent the compromising images “in revenge” appeared before magistrates accused of hacking her contacts list. Paula Sanderson, prosecuting, said the victim had moved to Darlington from Nottingham, after meeting Howlett on Facebook. After initially staying in shared accommodation she moved in with Howlett and his wife and their two children. The victim and Howlett continued their affair while they all lived together in Darlington. Ms Sanderson said: “Following an incident the relationship between them ended and she packed her belongings, jumped on bus and returned home. “She thought she wouldn’t put it past the defendant to send photographs that displayed her naked to her family and friends – and that is effectively what has happened. “She said that she felt mortified that they, as well as work colleagues, had seen the photographs of her. “ Clive Booth, mitigating, told Peterlee magistrates it was an “unusual offence with a strange background.” He said: “I don’t […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Revenge porn’ photos of Darlington ‘love-cheat’ woman sent to friends and family by phone hacker lover appeared first on National Cyber Security.

View full post on National Cyber Security

Zajic researches coffee shop hacker

coffeeshophacker_online

Source: National Cyber Security - Produced By Gregory Evans

Two major issues within the last couple years greatly illustrate the growing presence of the hacking culture: the Snapchat incident of 2013, where users’ phone numbers and images were leaked, and the Sony hack, where North Korean hackers leaked emails from a key Sony executive to stop the release of the James Franco and Seth Rogan movie, The Interview. Although North Korea’s main objective was not entirely successful (the movie was released in selected theaters and can be purchased online), hacking is still a major global issue. For this reason, computer security experts have been focused on protecting cyber information by strengthening security for the internet and wireless communication. Technological devices, however, leak signals that were thought to be nearly undetectable. Dr. Alenka Zajic, an assistant professor in the School of Electrical and Computer Engineering, along with her husband and colleague Milos Prulovic, an associate professor in the School of Computer Science, prove that this is not the case. In an effort to work together and combine each other’s fields of expertise, Zajic and Prulovic decided to take on this ambitious project in 2009. Now, their group has made significant headway and the impact of their research could revolutionize the […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Zajic researches coffee shop hacker appeared first on National Cyber Security.

View full post on National Cyber Security

Hacker ‘Messiah’ pleads guilty to 39 computer misuse charges

21285811

Source: National Cyber Security - Produced By Gregory Evans

SINGAPORE — Hacker James Raj Arokiasamy, who goes by the moniker “Messiah”, has pleaded guilty to 39 charges of computer misuse for hacking into the web servers of Fuji Xerox, a fan site of popstar Sun Ho and government-related websites in 2013. The 36-year-old had faced a total of 162 charges, of which 39 computer misuse charges and one charge for drug consumption were proceeded with. Read More….

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker ‘Messiah’ pleads guilty to 39 computer misuse charges appeared first on National Cyber Security.

View full post on National Cyber Security

Ex Hacker Gregory Evans Show How Spyware

index

Source: National Cyber Security - Produced By Gregory Evans

Read More….

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Ex Hacker Gregory Evans Show How Spyware appeared first on National Cyber Security.

View full post on National Cyber Security

Page 3 of 290«12345»102030...Last »

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?
$15.95

Find Out More, Click Here!