blog trackingRealtime Web Statistics Hacker | Gregory D. Evans | Worlds No. 1 Security Consultant - Part 3

Posts Tagged ‘Hacker’

Hacker Who Crippled Xbox Live Convicted of 50,700 Counts, Dodges Prison

Source: National Cyber Security – Produced By Gregory Evans

The devious, brazen Finnish hacker who ruined Christmas ‘14 just got the book thrown at him in his homeland’s court: 17-year-old Julius Kivimaki was sentenced today to a two-year suspended sentence. Finland’s Kaleva.fi reports Kivimaki, who not only took responsibility for wrecking Sony and Microsoft’s online gaming networks with the briefly notorious “Lizard Squad” hackers but went on TV to brag about it, will probably avoid prison time altogether—assuming he stays out of trouble. Kivimaki was also found guilty of crimes related to credit card fraud and harassment. Source: Gawker

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker Who Crippled Xbox Live Convicted of 50,700 Counts, Dodges Prison appeared first on National Cyber Security.

View full post on National Cyber Security

Revenge porn hacker pleads guilty, faces 7 years

Source: National Cyber Security – Produced By Gregory Evans

Charlie Evens, 26, has pleaded guilty to hacking into the email accounts of hundreds of women to steal and resell their naked pictures. He faces up to seven years in prison. This act — posting non-consensual nude photos of a person on the web — is a growing form of online harassment known as “revenge porn.” Evens — who was the focus of a recent CNNMoney report — fessed up on Wednesday before United States District Judge Dolly M. Gee in California. When Evens was 23, he was hired by Hunter Moore, who is known as the “king of revenge porn” to steal naked photos of women. Moore would pay Evens for the pictures and post them on his now defunct site, IsAnybodyUp.com. In February, Moore pleaded guilty to the same two felony charges — federal computer crime and identity theft. “I did it for money, it makes me sound like a monster,” Evens told CNNMoney’s Laurie Segall earlier this year. Evens said he met Moore after hacking him — he didn’t even know who Moore was at that time. “He contacted me saying that he’d pay me to [hack] for him,” he said. So Evens began stealing photos to […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Revenge porn hacker pleads guilty, faces 7 years appeared first on National Cyber Security.

View full post on National Cyber Security

Catching ‘Hell’: Navalny Says Notorious Russian Hacker To Be Unmasked In Germany

Source: National Cyber Security – Produced By Gregory Evans

For years, a mysterious self-identified “hacker” has boasted about wreaking havoc against prominent Kremlin critics, claiming responsibility for stealing troves of their personal e-mails leaked online and hijacking their social-media accounts. To date, however, the true identity of the individual — known by the online pseudonym Hell and arguably the Russian-language Internet’s most notorious alleged hacker — has never been publicly confirmed. But that may soon change for the pseudonymous blogger, who once bragged that “they can’t catch me.” A Bonn court on June 24 is set to hear a criminal case against the online activist that opposition leader Aleksei Navalny claims is based on materials he provided to German prosecutors. “Anyone who wants to personally get to know the hacker can do so just one week from now,” Navalny wrote in a June 18 post on his website. Navalny declined to give the individual’s name, but identified the blogger as a 41-year-old man. Hell’s targets have included the famous novelist-turned-Kremlin-critic Boris Akunin; the fiery dissident Valeria Novodvorskaya, who died last year; and numerous journalists and political activists prominent in opposition circles. Going After Navalny But Hell’s greatest impact on Russian political life was his alleged hack of Navalny’s e-mails […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Catching ‘Hell’: Navalny Says Notorious Russian Hacker To Be Unmasked In Germany appeared first on National Cyber Security.

View full post on National Cyber Security

Terror expert: U.S. vulnerable to any ‘hacker or cracker’

Source: National Cyber Security – Produced By Gregory Evans

Terrorism expert Harvey Kushner says the most sensitive U.S. assets are at the mercy of any “hacker or cracker,” and the next major attack against the country will likely come through cyberspace, but he is also also cautiously optimistic that America’s best minds will be able to thwart the sinister intentions of its enemies. During a recent appearance on WNYW-TV Fox 5 in New York City, Kushner offered a blunt diagnosis of the cyber threat facing the American people and the nation’s most sensitive national data. “Any hacker or cracker from his or her basement can get into our national grid and get into our military hardware,” said Kushner in the Fox 5 interview. Kushner, who is also director of the Homeland Security and Terrorism Institute at Long Island University, said this level of vulnerability is the price of rapidly advancing technology. “The advances occur almost on a daily basis. So just when you have something up and you have it somewhat protected, somebody is able to compromise the system and get into whatever it is you’re trying to protect,” said Kushner, who fears the next major attack that succeeds against the U.S. will come from hackers. “I do think […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Terror expert: U.S. vulnerable to any ‘hacker or cracker’ appeared first on National Cyber Security.

View full post on National Cyber Security

Swatting accused an experienced hacker who abused powers, court hears

Source: National Cyber Security – Produced By Gregory Evans

The 17-year-old Barrhaven boy on trial for swatting crimes across North America was portrayed in court on Friday as an experienced hacker who abused his online powers. “I didn’t feel safe around him (on chats). He was too abusive with his power. He’d boot people off the Internet for no reason. He’d do it for fun,” an alleged victim told California police in an interview that was broadcast at trial. The boy, now 15, told police in Stockton, Calif., in April, 2014, that he only knew the accused’s ‎first name and had never seen his face on Skype. The boy said he met the accused on a Minecraft server and, after he said he was quitting his position as a permissions expert, someone first ordered $1,000 of pizza to his home and later sent in a fake 911 call to prompt a SWAT team to respond at the boy’s home. “I still to this day do not know why he snapped,” the boy told police. Testifying later in the day, the teen said he confronted the person he believed to be the accused in a call over Skype videoconferencing. “All he did was laugh maniacally. Like it didn’t matter to […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Swatting accused an experienced hacker who abused powers, court hears appeared first on National Cyber Security.

View full post on National Cyber Security

Infamous hacker Kevin Mitnick sniffs fiber, reads email

Source: National Cyber Security – Produced By Gregory Evans

Kevin Mitnick, famous former black hat hacker, demonstrates just how easy it is for a hacker to tap into your network and read your email. And he’s doing it with a fiber optic network connection, not a simple and very non-secure CAT5x or CAT6x network wire. And he doesn’t have to connect to the Internet, your network, or any outside resources to do this. He clamps onto a fiber optic “wire”, opens Wireshark, and sniffs away your most guarded secrets. Mitnick demonstrates in under five minutes how he could get near your network, set up a clandestine connection, sniff your network, grab your passwords, email, anything sent “over the wire” unencrypted, and disappear within minutes. And you’d never catch him doing it. Although it isn’t obvious from the video, the hardware item that they discuss is an optic fiber clip-on coupler. It’s not designed for the purpose that Mitnick uses it for, but it works and that’s the “beauty” of being a hacker: You use hardware and software in creative ways to get the information and the results you want. The video shows just how easy it is to eavesdrop on conversations on-the-wire, even if the wire is fiber optic […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Infamous hacker Kevin Mitnick sniffs fiber, reads email appeared first on National Cyber Security.

View full post on National Cyber Security

Polish Airline Cancels Flights After Hacker Attack

Source: National Cyber Security – Produced By Gregory Evans

Poland’s LOT airline has been forced to cancel around 10 foreign and domestic flights after hackers attacked its computers. Airline spokesman Adrian Kubicki said the hacker attack temporarily paralyzed LOT’s computers at Warsaw’s Frederic Chopin airport on Sunday, disrupting the processing of passengers for the flights. He said some 1,400 passengers, scheduled to fly to Hamburg, Dusseldorf, Copenhagen and domestic destinations, were affected by the cancellations. The problem was eventually solved and flights scheduled to depart later Sunday could leave as planned. A commission will investigate the source of the attack, Kubicki said. Source: ABC News

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Polish Airline Cancels Flights After Hacker Attack appeared first on National Cyber Security.

View full post on National Cyber Security

World-famous hacker Kevin Mitnick and KnowBe4 fight phishing with training

Source: National Cyber Security – Produced By Gregory Evans

The success of social engineering must frustrate those responsible for an organization’s digital security. There is no simple solution or device that will take social engineering off the bad-guys’ play list. And, if anyone knows that, it is Kevin Mitnick — one of the more, if not the most, successful social engineers. Mitnick, at one time the most wanted computer criminal in the US, paid his dues and started Mitnick Security Consulting. Mitnick now uses his undeniable talent to help corporations secure their networks. Calling some of the top organizations in the world his clients, he proudly states, “We maintain a 100-percent successful track record of being able to penetrate the security of any system we are paid to hack into using a combination of technical exploits and social engineering.” J. Peter Bruzzese, Office 365 MVP and well-respected writer, witnessed first-hand Mitnick’s capabilities. Bruzzese recently spoke at a secureCIO event in Dallas where Mitnick gave the keynote address. “Mitnick did a few demonstrations at the event that scared the bejeebers out of the audience,” writes Bruzzese in this InfoWorld blog post. “He showed how he could steal a person’s identity within two minutes by simply using his or her name. […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post World-famous hacker Kevin Mitnick and KnowBe4 fight phishing with training appeared first on National Cyber Security.

View full post on National Cyber Security

Hacker hunt intensifies in trenches of U.S.-China cyberwar

Source: National Cyber Security – Produced By Gregory Evans

SINGAPORE (Reuters) — Security researchers have many names for the hacking group that is one of the suspects for the cyber-attack on the U.S. government’s Office of Personnel Management: PinkPanther, KungFu Kittens, Group 72 and, most famously, Deep Panda. But to Jared Myers and colleagues at cybersecurity company RSA, it is called Shell Crew, and Myers’ team is one of the few who has watched it mid-assault — and eventually repulsed it. Myers’ account of a months-long battle with the group illustrates the challenges governments and companies face in defending against hackers that researchers believe are linked to the Chinese government — a charge Beijing denies. “The Shell Crew is an extremely efficient and talented group,” Myers said in an interview. Shell Crew, or Deep Panda, are one of several hacking groups that Western cybersecurity companies have accused of hacking into U.S. and other countries’ networks and stealing government, defense and industrial documents. The attack on the OPM computers, revealed this month, compromised the data of 4 million current and former federal employees, raising U.S. suspicions that Chinese hackers were building huge databases that could be used to recruit spies. China has denied any connection with such attacks and little […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker hunt intensifies in trenches of U.S.-China cyberwar appeared first on National Cyber Security.

View full post on National Cyber Security

‘Come at me Aussie police': Hacker behind posts of hundreds of pictures of naked Queensland women taunts authorities and vows to keep uploading them

Source: National Cyber Security – Produced By Gregory Evans

A hacker responsible for sharing nude images of up to 700 Brisbane women on a New Zealand-based file-sharing service online, has taunted police after they ordered for the photos to be removed. The freely available images, which showed ‘girls from Brisbane and surrounding areas’ in various states of undress, first emerged on a forum on Friday before being removed on Monday morning and reappearing again later that night, Fairfax reports. A police request led to their removal for a second time on Tuesday, which was followed by the hacker vowing to upload the photos again, posting: ‘come at me Aussie police’. The uploader allegedly named the women in the photos and even shared some of their locations. However, officers are limited in their ability to investigate the cybercrime due to a lack of complaints. ‘The thing is, we don’t have a complaint and the focus has to be on harm minimisation to try and get these things down so people’s lives aren’t ruined,’ Detective Superintendent Brian Hay told Faifax. ‘When you’ve got a complaint then you’ve got an offence.’ The news comes just days after hackers stole and posted scantily clad photos of up to 500 Adelaide women on a […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post ‘Come at me Aussie police': Hacker behind posts of hundreds of pictures of naked Queensland women taunts authorities and vows to keep uploading them appeared first on National Cyber Security.

View full post on National Cyber Security

Page 3 of 295«12345»102030...Last »

My Twitter

Gregory D. Evans On Facebook