blog trackingRealtime Web Statistics Hackers Archives - Page 10 Of 70 - Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant - Part 10

Posts Tagged ‘Hackers’

Here’s What Chinese Hackers Can Actually Do To The US Power Grid

Jonathan Pollet, founder of Red Tiger Security, is a 17-year veteran of the critical infrastructure industry. As an ‘ethical hacker,’ he consults for some of the world’s largest energy companies, as well as electric utilities, chemical plants, water treatment plants, etc. […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Hackers to probe cyber crime defences at British banks

Hackers to probe cyber crime defences at British banks

(Reuters) — In the next few months hackers will try to penetrate the cyber defences of Britain’s major banks and steal information about millions of customers. Read More….

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Hackers Can Steal Data Wirelessly From PCs That Aren’t Even Online

Hackers Can Steal Data Wirelessly From PCs That Aren’t Even Online

When governments, utilities and corporations need to protect their most sensitive data, they create what’s called an air-gap network. It involves storing information on computers that are never connected to the Internet, an extreme method of isolation designed to prevent […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Hackers turning smartphones into slave armies

Hackers turning smartphones into slave armies

SAN FRANCISCO (AFP) — Mobile security firm Lookout on Wednesday warned that Android-powered smartphones or tablets are being targeted with malicious software that puts them at the mercy of hacker overlords. The persistence and sophistication of malware dubbed NotCompatible is […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

State Department email attack ‘fits pattern’ of Russian hackers, says expert

The State Department has shut down its email system after it was reportedly hacked. The department’s entire unclassified email system was closed down to repair possible damage. A senior US official said that the department detected “activity of concern” in […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Seven tips to secure your iPhone from hackers

Seven tips to secure your iPhone from hackers

1) Use a PIN or fingerprint security With all the things we now use our smartphone for: email; banking; browsing; shopping, it’s dangerous to leave them unguarded. Locking your screen will protect your sensitive data and apps from meddling. Read […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Ex-NSA hackers and their corporate clients are stretching legal boundaries and shaping the future of cyberwar.

Ex-NSA hackers and their corporate clients are stretching legal boundaries and shaping the future of cyberwar.

Bright twenty- and thirtysomethings clad in polo shirts and jeans perch on red Herman Miller chairs in front of silver Apple laptops and sleek, flat-screen monitors. They might be munching on catered lunch—brought in once a week—or scrounging the fully […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Postal Service confirms security breach, Chinese government hackers reportedly suspected

Postal Service confirms security breach, Chinese government hackers reportedly suspected

Chinese government operatives reportedly are suspected of hacking the U.S. Postal Service, in a security breach that may have compromised personal information for more than 800,000 workers. The breach was announced Monday, as President Obama arrived in Beijing. The Postal […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Home Depot hackers used vendor log-on to steal data, e-mails

Hackers used a vendor’s stolen log-on credentials to penetrate Home Depot’s computer network and install custom-built malware that stole customer payment-card data and e-mail addresses, the retailer announced Thursday. The malware, which had not been seen in other data thefts, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Home Depot: Hackers also stole 53M email addresses

Home Depot: Hackers also stole 53M email addresses

NEW YORK (AP) — Hackers stole 53 million email addresses in addition to customers’ card data, Home Depot said Thursday. The nation’s largest home improvement chain had disclosed the massive, months-long breach of 56 million debit and credit cards in […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Page 10 of 70« First...«89101112»203040...Last »

My Twitter

Gregory D. Evans On Facebook