blog trackingRealtime Web Statistics Hackers Archives | Page 10 Of 79 | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant - Part 10

Posts Tagged ‘Hackers’

10 MOST NOTORIOUS HACKERS OF ALL TIME

Source: National Cyber Security – Produced By Gregory Evans

1. Jonathan James Known as “comrade” by many online, 15-year-old Jonathan James was the first juvenile convicted and jailed in the United States for hacking. James hacked into companies like Bell South, as well as the Miami-Dade school system and the Department of Defense in 1999. He gained access to information like the source code responsible for operating the International Space Station. Once NASA detected the breach, the space agency shut down their computers for three weeks, apparently losing an estimated $41,000. Arrested on January 26, 2000, James plea-bargained and was sentenced to house arrest and probation. He later served six months in an Alabama prison after failing a drug test and thus violating his probation. Boston Market, Barnes & Noble, Office Max and other companies were victims of a 2007 massive hack. James was investigated by law enforcement for the crimes despite his denying any involvement. James was found dead from a self-inflicted gunshot wound on May 18, 2008. In his suicide note he wrote he was troubled by the justice system and believed he would be prosecuted for newer crimes with which he had nothing to do. 2. Vladimir Levin Russian hacker Vladimir Levin accessed Citibank computers in 1995 […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post 10 MOST NOTORIOUS HACKERS OF ALL TIME appeared first on National Cyber Security.

View full post on National Cyber Security

“Hackers” was ahead of its time

Source: National Cyber Security – Produced By Gregory Evans

SINCE “Hackers” was released more than 20 years ago, the number of Internet users has grown from 25 million in 1994 to more than 3 billion in 2014. Do the math. The term also is more engrained in our brains because of people like Edward Snowden, who leaked information about the National Security Administration accessing information about millions of Americans without their knowledge. And because of retailers like Target, which had information on 40 million credit card users stolen by hackers. But, 20 years ago, computers remained a mystery to many in the general public, and the information on the Information Super Highway was sporadic and mediocre at best. That’s why Rafael Moreu’s screenplay for “Hackers” and subsequently Iain Softley’s (“Backbeat,” “Inkheart”) direction gave this movie its time-capsule stamp for years to come. A lot of that has to do with Moreu’s extensive research, hours and hours of interviews with the hackers of the day. They included Emmanuel Goldstein, editor-in-chief of 2600, a hacker quarterly, and one of the film’s consultants. Unfortunately, Moreu was not interviewed for the hour-long, high-def bonus feature. But he gets credit from Goldstein and Softley. “Rafael asked a lot of questions,” Goldstein remembered. “He wanted […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post “Hackers” was ahead of its time appeared first on National Cyber Security.

View full post on National Cyber Security

UBER HIRES HACKERS: UBER RESEARCHING SELF-DRIVING CARS BY HIRING THEIR OWN HACKERS TO TEST THINGS OUT

Source: National Cyber Security – Produced By Gregory Evans

Uber has hired hackers in order for them to conduct well-rounded research on their self-driving cars. According to the Wall Street Journal, Uber Technologies Inc. hired security researchers Charlie Miller and Chris Valasek, who will work in the company’s Pittsburgh lab. They will be testing out some programs in hopes of making these potential self-driving cars successful — and safe. “Miller and Valasek caused a stir earlier this summer when they brought a Jeep Cherokee to a halt on a St. Louis highway by wirelessly hacking into its entertainment system. The stunt angered executives of Fiat Chrysler Automobiles NV and the automobile industry’s trade group. But it played differently in Silicon Valley, where such security research is common. Tesla Motors Inc., for instance, worked closely with two other researchers who hacked one of its Model S sedans for a presentation at a hacker conference last month.” News that Uber hired the hackers to work for their company is getting mixed reviews. Naturally, as mentioned in the quote above, some car companies aren’t too happy with the idea of hacking tests. However, some consumers think it is important research that needs to be done, and that Uber has quite a remarkable […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post UBER HIRES HACKERS: UBER RESEARCHING SELF-DRIVING CARS BY HIRING THEIR OWN HACKERS TO TEST THINGS OUT appeared first on National Cyber Security.

View full post on National Cyber Security

Uber hires hackers: Semi-famous duo keeps driverless vehicles safe from hackers

Source: National Cyber Security – Produced By Gregory Evans

Uber has hired hackers and why not, who better than skilled hackers to ward off unsolicited hackers in the future for their driverless cars? The Uber folks have confirmed that they did indeed hire security researchers who are known for their talents of hacking into the system of a Jeep Cherokee. According to The Wall Street Journal on August 29, Charlie Miller and Chris Valasek are the two hackers now employed by the Uber Advanced Technologies Center in Pittsburgh, Pennsylvania. Unlike most folks, their job interview was more like an audition as they were sought after following the hacking job that brought a Jeep Cherokee to a standstill on a St. Louis Highway earlier this summer. The duo probably had no idea they’d be starting a new career after hacking the Jeep through its entertainment center. While this stunt peeved the folks at Fiat Chrysler Automobiles and the automobile industries trade group, these two fellows fascinated the Silicon Valley dwellers. This is the place were security research is of great interest. According to The Hoops News today, “the two genius minds demonstrated an easy way to launch a hack attack on moving Jeep Cherokee.” Even with the vehicle several miles […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Uber hires hackers: Semi-famous duo keeps driverless vehicles safe from hackers appeared first on National Cyber Security.

View full post on National Cyber Security

Uber hires two Jeep hackers to strengthen security of its Autonomous Car Project

Source: National Cyber Security – Produced By Gregory Evans

San Francisco – Uber Technologies Inc., the taxi giant, is looking forward to making self-driving cars. To prevent their cars from being hacked, the company has hired two of the top vehicle security researchers. The two geeks, namely Charlie Miller and Chris Valasek, are security researchers who earlier showed the safety flaws in autonomous cars. Miller, a Twitter Inc. employee, and Valasek worked at a security firm, IOActive, will both quit their jobs and start working for Uber Technologies Inc. starting next week. The company plans to post them at their Pittsburgh facility, where they undergo research on self-driving cars and robotics. The company stated that these two people will report directly to Joe Sullivan, Uber’s chief security officer, and John Flynn, chief information security officer, to bring forward an extremely secure model of autonomous cars. The Miller and Valasek duo came into the limelight this month after they were able to hack into a self-driving Jeep Cherokee and brought it to a halt on St. Louis highway by wirelessly hacking through its entertainment system. They proved it to the world that how unsafe it would be to rely on the self-driving cars, and also the risks they possess for […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Uber hires two Jeep hackers to strengthen security of its Autonomous Car Project appeared first on National Cyber Security.

View full post on National Cyber Security

San Antonio’s NSA facility includes ‘elite hackers’

Source: National Cyber Security – Produced By Gregory Evans

WASHINGTON — Documents from fugitive former government contractor Edward Snowden spell out new details of AT&T’s cooperation with National Security Agency spying and an NSA operation with teams of elite hackers in San Antonio breaking into computers around the world. NSA Texas hackers aimed at Mexico, Cuba, Columbia, Venezuela and unspecified targets in the Middle East, documents showed. An offensive targeting Mexican leaders — called “WhiteTamale” — proved especially productive. Documents from Snowden’s archive disclosed this month by the New York Times and ProPublica detailed AT&T’s involvement in NSA’s interception of email traffic at a time when AT&T made its headquarters in San Antonio. AT&T moved its corporate offices to Dallas in 2008. Among those documents, a slide presentation shows San Antonio among the hubs of fiber-optic circuitry used in data interception under an NSA program called Fairview. Together, the disclosures underscore San Antonio’s central role in intelligence gathering over the years. The Snowden documents related to hacking started trickling out 20 months ago. They confirm one of the missions of NSA Texas in San Antonio — a growing role in Tailored Access Operations, the program of gathering intelligence by penetrating computers of foreign targets. A slide presentation labeled top […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post San Antonio’s NSA facility includes ‘elite hackers’ appeared first on National Cyber Security.

View full post on National Cyber Security

Hackers – 20th Anniversary Edition (Blu-ray)

Source: National Cyber Security – Produced By Gregory Evans

Since hacking became a thing, Hollywood has wanted to make movies about it. The worst of these movies regard hacking as some sort of magic, such as 2008’s Eagle Eye, in which a supercomputer hacks into a power line and somehow makes it physically fall on someone. Hackers was not only one of the first movies to tackle the subject, way back in 1995, but also one of the silliest, with director Iain Softley’s camera roving through the inside of a computer as if it were the Death Star trench and depicting a virus as a weird organism of keyboard characters that forms something resembling the tail of a peacock. Yet, 20 years later, Hackers endures in a way that Swordfish (Password Accepted) and Firewall don’t, because while Softley took visual license with hacking’s dullest aspect (people sitting at terminals and typing), he and screenwriter Rafael Moreu put effort into getting the culture correct. As a child, Dade Murphy (Jonny Lee Miller), handle “Zero Cool”, hacks into a Wall Street computer and causes a massive crash, which earns his parents a hefty fine and gets him banned from computers until he turns 18. When that day arrives, he’s just moved […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hackers — 20th Anniversary Edition (Blu-ray) appeared first on National Cyber Security.

View full post on National Cyber Security

Ashley Madison cheaters, hackers get little sympathy: #tellusatoday

Source: National Cyber Security – Produced By Gregory Evans

Who made this hacking group the morality police? At least the company didn’t cower to the demands of hackers, unlike what Sony did by pulling “The Interview” from movie theaters. Hackers are nothing more than bullies who think they can use their computer skills to get people to do only the things the hackers like. The hackers are on such a moral high ground that they broke one of the Ten Commandments and stole information to expose people who may or may not have broken another commandment. — Bruce Leroy Why do married people pay for Ashley Madison and think it is OK? If you’re not happy in your marriage, get out. Don’t embarrass or humiliate someone you loved enough to marry. That says a lot about someone’s character. The first time I heard of this site, I wondered who would have the nerve to join it. I guess more than 30 million people! It’s a sad society we live in. — Tammy Smith Hackers expose the evil underbelly of our society and government, and corporate malfeasance. If they don’t expose it, who will? — J Thomas Gaffney The hackers are obviously criminals, and the site owner and customers have done nothing illegal. […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Ashley Madison cheaters, hackers get little sympathy: #tellusatoday appeared first on National Cyber Security.

View full post on National Cyber Security

Counting on government to protect cars from hackers isn’t our best option

Source: National Cyber Security – Produced By Gregory Evans

Recently, a number of media outlets, including Wired magazine and theWashington Post, reported how two hackers wirelessly took over a Jeep Cherokee, including at one point on a Missouri highway. The culprits — who staged the “hijacking” for reporters — forced the SUV to slow down, played with the windshield wipers and stereo, and then interfered with the vehicle’s brakes. The hackers are actually researchers studying the hacking vulnerability of two dozen makes of vehicles, based on readily available Web information about various car systems that allow the vehicles to receive information electronically. Their goal is to prompt carmakers to defend against remote attacks by securing remote endpoints, using cryptography to verify messages and isolating data access points from those systems that control critical safety features. They also recommended adding attack detection and prevention technology to critical networks. While many of these recommendations seem reasonable,their implementation should be left to the experts and system designers. A couple of senators introduced legislation within hours of the story breaking. Sens. Edward Markey (D-Mass.) and Richard Blumenthal (D-Conn.)proposed new rules for automakers, including a requirement that automakers follow a government-mandated set of security standards for vehicles. The bill would also require the establishment […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Counting on government to protect cars from hackers isn’t our best option appeared first on National Cyber Security.

View full post on National Cyber Security

Police bust wig-wearing counterfeit ATM card scammers, bank hackers still out there

Source: National Cyber Security – Produced By Gregory Evans

If you have a BCA, HSBC, Bank Danamon, Citibank, OCBC NISP, Panin, BII, Bank Standard Chartered or CIMB Niaga bank account, you’d best check your account activity for anything unusual. The Jakarta Police recently announced they had busted a criminal enterprise in which scammers bought data from a hacker who had acquired ATM card information and PIN numbers for customers of the nine above banks. The scammers then used that data to create fake but usable ATM cards. The police are still looking for the hacker or hackers that got the data, although authorities suspect the computer criminals were operating outside of Indonesia. The customer data was sold through several shady websites includingwww.kanxxxx.com, www.valxxxxxx.sul and www.tonyxxxxxxx.cc. However police were able to arrest some of the scammers using the stolen data in Jakarta. Authorities said one of the suspects arrested in the case, a 32-year-old identified as W, was caught despite the precautions he took while using the fake ATM cards. “W withdrew money from several ATMS while using a wig and false mustache to obscure his identity,” said Police Assistant Commissioner Didik Sugiarto on Sunday, as quoted by Tempo. In addition to the disguise, W also used forged documents to […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Police bust wig-wearing counterfeit ATM card scammers, bank hackers still out there appeared first on National Cyber Security.

View full post on National Cyber Security

Page 10 of 79« First...«89101112»203040...Last »

My Twitter

  • Aphrodisiacs and Food Hell: A Lover’s Guide to Eating Well https://t.co/kVzt5scugh #dating @gregorydevans
    about 4 hours ago
  • Cyber Security News Today is out! https://t.co/xEaxm4V4N5 @gregorydevans #hacker
    about 5 hours ago
  • RT @GregoryDEvans: North Korea Launches Another Large Rocket: Consequences and Options https://t.co/RF5id460JS #security #hacker #HTCS
    about 10 hours ago
  • Dating App The League Will Now Let Users Buy Someone A Gift https://t.co/UbIMWFgSXu #dating @gregorydevans
    about 15 hours ago
  • Fun Girls’ Night In: 8 Amazing Ideas for a Night Together https://t.co/HGzDEpjFpo #dating @gregorydevans
    about 16 hours ago

AmIHackerProof.com By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans