blog trackingRealtime Web Statistics Hacker Archives | Page 3 Of 305 | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant - Part 3

Posts Tagged ‘Hacker’

Microsoft and US Army Hacker flees overseas, says his case is going no where after 3 years

Source: National Cyber Security – Produced By Gregory Evans

Microsoft and US Army Hacker flees overseas, says his case is going no where after 3 years

Meet Dylan Wheeler. He is the hacker who allegedly hacked into Microsoft, Valve and US Army websites and has been in the Australian law enforcement agencies radar for past 3 years but they have not been able to arrest him. Wheeler, an Australian teenage hacker from Perth, was able to flee easily despite having been ordered to take his passport into custody. Mr. Wheeler, was only 17, when he and his hacker gang was accused of hacking and stealing at least $US100 million ($A108.2 million) worth of software and data from Microsoft, Valve and the US Army. He was under police radar following a joint international investigation into five suspected hackers, most of them US-based. Facing a possible sentence of ten years, Mr. Wheeler fled the country almost after three years later. He says that it was really scary how easily he made way and was able to flee the country. Currently, residing in the Czech Republic, Mr. Wheeler told 7.30, “I left Australia because my case went on for about two to three years and it was getting nowhere.” “What they really wanted to do was take away my freedom and keep me confined into a room and I was not prepared […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Microsoft and US Army Hacker flees overseas, says his case is going no where after 3 years appeared first on National Cyber Security.

View full post on National Cyber Security

Cyber security firm owner creates Hacker Academy

Source: National Cyber Security – Produced By Gregory Evans

Cyber security firm owner creates Hacker Academy

Steve Barone, the owner and CEO of CBI, got his start in business selling Atari and Commodore home computers in an East Detroit shop in the 1980s. The native Detroiter dropped out of Wayne State University, but found a job he enjoyed and paid the bills. He also sold PCs for ITT Courier, and later, decided to started his own firm, Creative Breakthroughs Inc., which now specializes in information technology and goes by the initials CBI. This year, the company moved its headquarters from Ferndale to Detroit. “Computer security is a very real issue today,” Barone, 51, said. “I got a text this morning from a third party that made it sound like my bank account had been actioned from somewhere. I isolated the link, put it on a separate laptop, opened it up in a protected browser, and found out it was a hacking attempt.” CBI — which has about 100 employees and expects sales of $52 million this year — also offers workers and companies opportunities to learn new information technology skills and test their security in what Barone has playfully named the Cyber Range and the Hacking Academy. In the next few years, he said, he aims to take the company public. Barone — whose name is pronounced with the long e at the […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cyber security firm owner creates Hacker Academy appeared first on National Cyber Security.

View full post on National Cyber Security

Brit hardware hacker turns Raspberry Pi Zeros into selfie slayers

Source: National Cyber Security – Produced By Gregory Evans

Brit hardware hacker turns Raspberry Pi Zeros into selfie slayers

Kiwicon Hipsters and selfie addicts beware: infosec man Steve Lord has crafted a tool designed to sever your line of addiction to Instagram by quietly blocking it over public Wi-Fi. The British security bod built the Raspberry Pi Zero-powered “hipster slayer” out of nothing more than off-the-shelf components and “questionable life choices.” The gizmo will continually deny people’s attempts to connect to Instagram and other social media vanity sites. It works by sniffing for DNS lookups on open wireless networks, and when it detects someone trying to access a hated website, special networking frames are sent to the person’s PC or handheld instructing it to immediately leave the network. The vast majority of devices comply with these orders. It is exceptionally effective at selfie-drenched “music” festivals and coffee shops. Lord (@stevelord) says the tool will feature in his presentation at the Kiwicon conference in Wellington, New Zealand, next week. The Wi-Fi-blocking gadget is among a bunch of gizmos he’s crafted and dubbed the Internet of Wrongs; they are designed “solely to antagonise people.” “It powers up from a battery and looks for DNS records on open wireless networks that meet target keywords and deauths the client when it finds a […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Brit hardware hacker turns Raspberry Pi Zeros into selfie slayers appeared first on National Cyber Security.

View full post on National Cyber Security

Hacker gets Windows RT 8.1 (WinPE) running on a Lumia 520

Source: National Cyber Security – Produced By Gregory Evans

Hacker gets Windows RT 8.1 (WinPE) running on a Lumia 520

Recently, we reported about Windows Phone Internals, a new tool from Heathcliff. The tool allows users to unlock the bootloader of a few Lumia devices and flash custom ROMs on their Lumia device. The tool currently supports a few Lumia devices, including the Lumia 520, 521, 525,  620, 625, 720, 820, 920, 925, 928,  1020 and 1320. Obviously, the tool is pretty risky, and may damage your device if you don’t have much knowledge about custom ROMs and bootloaders. With that being said, the tool can allow users to do some crazy things on their Lumia devices. It seems like XDA member Wack0Distractor was able to getWINDOWS 8.1 RT (6.3.9600 WinPE) running on their Lumia….520. For those unfamiliar with WinPE, it’s theWINDOWS Preinstallation Environment. Thanks to @Heathcliff74 and co. for WPinternals, without that, this wouldn’t have been possible! After patching signature checks out of winload, and adding the halexts andREGISTRY ENTRIES for those, I had to patch 1 byte in the kernel, without which a SECURITY_SYSTEM bugcheck happens during boot. I haven’t fully added any drivers yet, other than the halexts, i’ll be doing that soon. So right now touchscreen doesn’t work etc. I will probably try to get some driversWORKING in this WinPE then nothing more, this was […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker gets Windows RT 8.1 (WinPE) running on a Lumia 520 appeared first on National Cyber Security.

View full post on National Cyber Security

Federal Bureau of Investigation seeks hacker after 1.2 billion logins are stolen

Source: National Cyber Security – Produced By Gregory Evans

Federal Bureau of Investigation seeks hacker after 1.2 billion logins are stolen

That hacker, known as “mr.grey”, was identified based on data from a cybsecurity firm that announced in August 2014 that it had determined an alleged Russian crime ring was responsible for stealing information from more than 420,000 websites,THE DOCUMENTS said. Court documents made public last week, and seen by Reuters, name a mysterious force called “mr.grey” as the hacker, or group of hackers, behind last year’s attack, which is regarded as the biggest cyber heist to date. The FBI is now on the heels of a “mr.grey”, a Russian hacker who announced on hackers forums that he is selling users’ data hacked from thousands of websites, including Facebook and Twitter; the U.S.SECURITY AGENCY has linked the foreign hacker through a Russian email id to the breach of about 1.2 billion users’ data across the internet. Hold Security’s chief information security officer, Alex Holden, told Reuters that he believes the 2011 message proves the hacker, or group of hackers, has access to a large database of stolen data. Source: http://www.ledgergazette.com/federal-bureau-of-investigation-seeks-hacker-after-1-2-billion-logins-are-stolen/155356/

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Federal Bureau of Investigation seeks hacker after 1.2 billion logins are stolen appeared first on National Cyber Security.

View full post on National Cyber Security

FBI Snitch Regrets For Betraying His Hacker Friends By Co-operating With The FBI

Source: National Cyber Security – Produced By Gregory Evans

FBI Snitch Regrets For Betraying His Hacker Friends By Co-operating With The FBI

According to reports dated November 23 from Motherboard, a hacker known as “5hm00p” has confessed on Twitter that he served as a FBI informant and was involved in betraying some of his fellow hackers. He claims to have helped the US government nab the hacker turned ISIS fighterJunaid Hussain. “5hm00p,” a famous hacker and member of the hacker group Rustle League, identified himself over the weekend as an FBI “snitch,” as he put it. 5hm00p explains in a tweet dated November 20 that the FBI had approached him almost two years ago who made him believe that he was going to beRAIDED, if he did not cooperate in a terror investigation. Early Sunday morning, cryptically tweeted “What the f*** have I done”. According to an archived copy of 5hm00p’s now deleted tweets pointed at the FBI, “I lost a lot of good friendships and my f****** honor. I’m so embarrassed to show my face in public now because of this.” “Congratulations,” he wrote. “You got it. Congratulations, you got what you wanted on my friend @_DillonC all because you thought he was with some bullshit terrorist group.” Apparently, 5hm00p is the primary provider for his family. After the FBI threatened […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post FBI Snitch Regrets For Betraying His Hacker Friends By Co-operating With The FBI appeared first on National Cyber Security.

View full post on National Cyber Security

Hacker Cracks Lumia Bootloader, Releases Tool To Grant Root Access For Custom ROMs

Source: National Cyber Security – Produced By Gregory Evans

Hacker Cracks Lumia Bootloader, Releases Tool To Grant Root Access For Custom ROMs

Microsoft and Nokia have done a great job of making Lumia smartphones difficult to break into at a low-level, but software hacker Heathcliff has just proven that it’s not impossible. He’s just released a great-looking tool called Phone Internals, and it can do everything from unlocking the bootloader to replacing the phone’s ROM. Heathcliff welcomes donations by those who’ve found the tool useful. Based on the introduction video, it seems that a lot of effort went into this, and unlike most tools of this nature, detailed descriptions are found everywhere to ensure that you know exactly what’s going to happen once you click a button. According to the “Getting Started” section of the tool, supported models include Lumia 520, 521, 525, 620, 625, 720, 820, 920, 925, 928, 1020, and 1320. If your model is not on the list, don’t fret: Heathcliff has said that he hopes to add more models in the future. Even if you do have an appropriate PHONE ROM or run custom software, this tool could be used to root the device and give you the ability to back up the entire thing. Options are given to back up specific partitions, or everything en masse. Later, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker Cracks Lumia Bootloader, Releases Tool To Grant Root Access For Custom ROMs appeared first on National Cyber Security.

View full post on National Cyber Security

Hacker uses webcam to spy on Lee County man

Source: National Cyber Security – Produced By Gregory Evans

Hacker uses webcam to spy on Lee County man

A hacker terrified a Lee County man when he took over his computer and tried to extort him. Lee County sheriff’s investigators said they don’t know how the hacker got into the man’s laptop. The victim called LCSO’s fraud hotline to report the crime. He said he was talking with a relative on Skype one night last week, and after the conversation was over, he closed his laptop without logging off of Skype or turning off his computer. The next day, he went online. Within a minute, a number he didn’t recognize was calling his cell phone. He pick up, and a man who deputies said spoke with “a distinct foreign accent and claimed to be from Syria” called the man by name. He also had “very specific and private information about his finances, his family and friends that could have only been known by someone who had access to his computer,” deputies said. The hacker threatened to release the victim’s personal pictures and videos if he did not pay him $600.00. And that’s not all. “The hacker, who repeatedly threatened to ruin the victim’s life if he disconnected the call, was apparently able to see the victim in his home as he described the victim’s exact […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker uses webcam to spy on Lee County man appeared first on National Cyber Security.

View full post on National Cyber Security

Wanted teen hacker says it’s ‘scary’ how easily he was able to leave Australia

Source: National Cyber Security – Produced By Gregory Evans

Wanted teen hacker says it’s ‘scary’ how easily he was able to leave Australia

At a time of heightenedSECURITY fears, a teenage hacker has left authorities red-faced and raised serious questions about borderSECURITY. Dylan Wheeler was just 17 when police charged him with being part of a group that allegedly hacked into theCOMPUTERS ofMICROSOFT and the US Army. He ended up fleeing the country, facing a possible 10-year jail sentence, even though he’d been ordered to surrender his passport. Now he’s told Lauren Day he has no regrets and no plans to return. DYLAN WHEELER, HACKER: To be honest, I don’t see it as on the run. I mean, what’s coming out of Australia now, I don’t really want to be associated with the politics. All these draconian laws, I don’t feel comfortable calling myself Australian. Really, I feel a lot better being free. LAUREN DAY, REPORTER: Dylan Wheeler’s not your average opinionated 19-year-old on a gap year. He’s wanted by police and his name is on a Europol list. If found guilty, he faces up to 10 years in jail. DYLAN WHEELER: At this point in time, I don’t plan to return to Australia. This is on the advice of human rights lawyers I’ve spoken to. Basically because I am not guaranteed a […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Wanted teen hacker says it’s ‘scary’ how easily he was able to leave Australia appeared first on National Cyber Security.

View full post on National Cyber Security

New hacker plan: Don’t steal data, change it

Source: National Cyber Security – Produced By Gregory Evans

New hacker plan: Don’t steal data, change it

You know hackers around the world are working nonstop to steal yourPERSONAL information. But there’s a new, much bigger threat emerging right now. It has the power to cost you money, put your family at risk, or even open up America to a real-world attack. I’m looking at the newest hacker threat — experts are warning that instead of only stealing your data, hackers will start changing your data. But what if that hacker changed your records? Even something subtle, like turning all the 5’s into 4’s? Do that to a million more people, and that one hacker could destroy the trust in an entire bank’s records. Do it enough, and trust in the whole American economy is gone. That is the cybersecurity threat experts say is coming next. “Everything with cybersecurity is evolving. Every day, it’s something new. For example, six months ago, no one talked about the data being changed,” Sri Sridharan told me. He runs the Florida Center for Cybersecurity. From a secret location at University of South Florida in Tampa, they work with universities and others to spot, study, and stop the cyber attacks of the future. “It’s just a matter of time before somebody does […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post New hacker plan: Don’t steal data, change it appeared first on National Cyber Security.

View full post on National Cyber Security

Page 3 of 305«12345»102030...Last »

My Twitter

  • RT @GregoryDEvans: Judge dismisses teacher’s lawsuit against school district – Education Week https://t.co/gAQxy0ZG8t #security #hacker #HT…
    about 25 mins ago
  • RT @GregoryDEvans: Smart TV hackers are filming people having sex on their sofas – and putting it on porn sites https://t.co/zervrfrWtc #se…
    about 26 mins ago
  • RT @GregoryDEvans: Smart TV hackers are filming people having sex on their sofas – and putting it on porn sites https://t.co/zervrfrWtc #se…
    about 39 mins ago
  • RT @GregoryDEvans: Judge dismisses teacher’s lawsuit against school district – Education Week https://t.co/iA79UZ2ewT
    about 1 hour ago
  • RT @GregoryDEvans: Judge dismisses teacher’s lawsuit against school district – Education Week https://t.co/iA79UZ2ewT
    about 1 hour ago

AmIHackerProof.com By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans