blog trackingRealtime Web Statistics Hackers Archives | Page 10 Of 84 | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant - Part 10

Posts Tagged ‘Hackers’

Ukraine left battered by cyber war as hackers target election

Source: National Cyber Security – Produced By Gregory Evans

Ukraine left battered by cyber war as hackers target election

The night before, a shadowy pro-Moscow hacking collective called CyberBerkut attacked the premises. Its stated goal: to cripple the online system for distributing results and voter turnout throughout election day.SOFTWARE was ­destroyed. Hard drives were fried. Router settings were undone. Even the main backup was ruined. The carnage stunnedCOMPUTER specialists the next morning. “It was like taking a cold shower,” said Victor Zhora, director of the Ukrainian IT firm Infosafe, which helped set up the network for the elections. “It really was the first strike in the cyber war.” In just 72 hours, Ukraine would head to the polls in an election crucial to cementing the legitimacy of a new pro-Western government, desperate for a mandate as war exploded in the country’s east. If the commission didn’t offer its usual real-time online results, doubts about the vote’s legitimacy would further fracture an already divided nation. The attack ultimately failed to derail the vote. Ukrainian computer specialists mobilised toRESTORE operations in time for the elections. But the intrusion heralded a new era in Ukraine that showed how geopolitical confrontation with Russia could give rise to a nebulous new cabal of cyber foes, bent on undermining and embarrassing authorities trying to break […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Ukraine left battered by cyber war as hackers target election appeared first on National Cyber Security.

View full post on National Cyber Security

How Heartbleed Bug Exposes Your Passwords to Hackers

Source: National Cyber Security – Produced By Gregory Evans

Are you safe from the critical bug Heartbleed?? OpenSSL- the encryption technology used by millions of websites to encrypt the communication and is also used to protect our sensitive data such as e-mails, passwords or banking information. But a tiny, but most critical flaw called “Heartbleed” in the widely used OpenSSL opened doors for the cyber criminals to extract sensitive data from the system memory.SSL and TLS are known to provide communication security and privacy over the Internet for applications such as websites, email, instant messaging (IM), including some virtual private networks (VPNs).Heartbleed is a critical bug (CVE-2014-0160) is in the popular OpenSSL cryptographic software library, that actually resides in the OpenSSL’s implementation of the TLS (transport layer security protocols) and DTLS (Datagram TLS) heartbeat extension (RFC6520).This bug was independently discovered by a team of security engineers (Riku, Antti and Matti) at Codenomicon, while improving the SafeGuard feature in Codenomicon’s Defensics security testing tools, and Neel Mehta of Google Security, who first reported it to the OpenSSL team.Software vulnerabilities may come and go, but this bug is more critical as it has left the large number of private keys and other secrets exposed to the Internet. The heartbleed bug can reveal […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post How Heartbleed Bug Exposes Your Passwords to Hackers appeared first on National Cyber Security.

View full post on National Cyber Security

Security Researchers Breach Phishing Server Belonging to Iranian Hackers Rocket Kitten

Source: National Cyber Security – Produced By Gregory Evans

Security Researchers Breach Phishing Server Belonging to Iranian Hackers Rocket Kitten

Rocket Kitten is a hacking group that first appeared in April 2014 and was unmasked for the first time by FireEye researchers in May 2014. The most damning report on their activity was published this year by a joint effort betweenTREND MICRO & ClearSky. Since their first appearance, the group’s main targets were individuals and institutions that opposed or criticized the Iranian government. As both the original Trend Micro & ClearSky report and the latest Check Point findings show, the group’s MO included launching spear-phishing campaigns against its targets, using social engineering tactics, and then infecting the victims’ computers withMALWARE. Their tactics never evolved past this point, but only made small tweaks to their operations’ code to avoid detection bySECURITY TOOLS. In spite of the fact that Rocket Kitten was ousted this September, Check Point reveals that the state-sponsored hackers continued their operations regardless, making tiny changes to their malicious code and continuing to operate like nothing happened. Check Point researchers got their hands on a phishing server used by Rocket Kitten This was confirmed when Check Point researchers uncovered one of the group’s phishing servers left unprotected online. Siphoning information from the aforementioned server, security researchers managed to build […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Security Researchers Breach Phishing Server Belonging to Iranian Hackers Rocket Kitten appeared first on National Cyber Security.

View full post on National Cyber Security

Hackers and Sith Lords Roam Ukraine’s Cyber Badlands

Source: National Cyber Security – Produced By Gregory Evans

Hackers and Sith Lords Roam Ukraine’s Cyber Badlands

The taxi driver peers into the rain and shrugs. There’s nothing resembling a government building in this bleak industrial district on the edge of Kiev, just overgrown tram tracks and scrapyards patrolled by dogs. We’re here to meet Colonel Sergiy Demediuk, Ukraine’s top cybercop, to find out why this former Soviet state, known more for mining coal than data, spawns so many of the most-wanted digital crooks. If anyone can catch them, the colonel can, but he too is proving difficult to find. Finally, a guard emerges from a dingy cluster of peach-colored structures to wave us in. “The new breed of cybercriminals is out of control,” Demediuk, 38, says in a second-floor office adorned with a portrait of the 19th century poet Taras Shevchenko. Tieless and sporting a smartwatch, the colonel says hackers no longer respect the old code of targeting any country but your own. In the Internet age, bad guys can tap into your home or business from anywhere, giving them a reach national police forces can’t match alone. As a result, cops in hacking hot spots like Ukraine have become key players in the global effort to dent the estimated $400 billion trade in online crime. […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hackers and Sith Lords Roam Ukraine’s Cyber Badlands appeared first on National Cyber Security.

View full post on National Cyber Security

Teen hackers strike again, allegedly gain access to U.S. arrest records database

Source: National Cyber Security – Produced By Gregory Evans

Teen hackers strike again, allegedly gain access to U.S. arrest records database

A group of teenage hackers going by the name of “Crackas With Attitude” (CWA) are on a rampage, breaking into federal systems to embarrass the U.S. government. Network jobs are hot; salaries expected to rise in 2016 Wireless network engineers, network admins, and network security pros can expect above-average pay READ NOW After gaining access to the personal AOL email account of CIA Director John Brennan last month, the teenagers reportedly broke into the Comcast email account of FBI Deputy Director Mark Giuliana‘s wife, dumped personal details of thousands of government employees and then claimed to have gained access to the national Joint Automated Booking System, JABS, a database of arrest records, the FBI’s Internet Crime Complaint Center and the FBI’s Virtual Command Center. “Cracka,” one of the hackers who also claims to be a stoner, told Motherboard the CWA targeted FBI Deputy Director Mark Giuliana because the FBI is investigating the hacker group and plans to “make an example” out of them. CWA “hacked” into the email account of Giuliana’s wife, found Giuliana’s phone number and then called him. Giuliana allegedly told Cracka, “I don’t know you but you better watch your back.” The hacker tweeted that Comcast and […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Teen hackers strike again, allegedly gain access to U.S. arrest records database appeared first on National Cyber Security.

View full post on National Cyber Security

Mentor TalkTalk hackers, don’t criminalise them, says cyberpsychologist

Source: National Cyber Security – Produced By Gregory Evans

Mentor TalkTalk hackers, don’t criminalise them, says cyberpsychologist

Teenagers involved in online attacks such as the TalkTalk hack should be mentored rather than criminalised, to ensure society benefits from ‘their incredible skillset’, according to cyberpsychologist Mary Aiken. “As a society, do we really want to criminalise 13, 14 and 15 year olds? Or do we want to understand their behaviour, engage with their incredible skillset, mentor them and try to point them in the right direction,” she said at Web Summit this week. Police arrested a fourth individual in connection with the data breach this week: a 16-year-old boy in Norwich. It follows the arrests of three other individuals aged 15, 16 and 20 since the hack last month, which saw them steal thousands of TalkTalk customers’ personal details. Aiken suggested the focus should turn to the motivations behind such attacks, for example whether it was for profit or revenge. For example, she said, the hack on Sony last year was not motivated by the planned release of the film The Interview (which featured a plot to assassinate of Kim Jong-Un), which led many to conclude it had been orchestrated by North Korea. “If the motive was stopping the release of the movie, how come it got released […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Mentor TalkTalk hackers, don’t criminalise them, says cyberpsychologist appeared first on National Cyber Security.

View full post on National Cyber Security

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan. IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year.

Source: National Cyber Security – Produced By Gregory Evans

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium -- a group of ethical hackers.   “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.”   The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director )   “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said.   As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them.   The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan.  IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year.

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium — a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium — a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan. IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year. appeared first on National Cyber Security.

View full post on National Cyber Security

Russian hackers plan new attacks on Western military and civil infrastructure

Source: National Cyber Security – Produced By Gregory Evans

Russian hackers plan new attacks on Western military and civil infrastructure

A spokesman for the Russian Federal Security Service toldSCMagazineUK.com that Russian hacker groups Energetic Bear, Dragonfly and some others are considering engaging their activities against selected Western countries. The current financial crisis in Russia, seen locally as having been caused by Western sanctions, has resulted in massive job cuts in the Russian IT industry, which in turn has resulted in an increase in the number of hacker groups in Russia. In addition, there is reported to have been a significant growth in demand for hacker services in recent years from some entities affilated with the Russian government. Oleg Demidov, a senior consultant of PIR Center, an independent non-governmental organisation, which carries out research activities in the field of cyber-security, told SC that in recent year Russian hackers have started to pose a serious threat to critical elements of the military and civil infrastructure of Western countries, while their schemes of attack differ from those used by hacker groups from China and other countries. Source: http://www.scmagazineuk.com/russian-hackers-plan-new-attacks-on-western-military-and-civil-infrastructure/article/447819/

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Russian hackers plan new attacks on Western military and civil infrastructure appeared first on National Cyber Security.

View full post on National Cyber Security

Credit Card Hackers Figured Out How To Break Chip-And-PIN Security Years Ago

Source: National Cyber Security – Produced By Gregory Evans

Credit Card Hackers Figured Out How To Break Chip-And-PIN Security Years Ago

Cyber criminals have already figured out a way to hack the new chip-and-PIN credit card system currently being introduced at businesses throughout the United States. Five French citizens have been convicted of manipulating vulnerabilities in the system with a card-switching technique that included substituting the PIN on a stolen card with a cheap piece of plastic. French researchers from the École Normale Sperieure, a technology university, published a research paper revealing the case of five thieves who were arrested in 2011 and 2012 for spending 600,000 euros (roughly $680,000) with stolen credit cards. Using X-ray analysis and other microscopic scans, the researchers figured out that the criminals actually inserted a second chip onto stolen chip-and-PIN cards, enabling them to dupe the PIN verification on many registers’ point-of-sale (POS) terminal.  The fake chip, known as a FUNcard, enabled the thieves to carry out a Man In The Middle attack, which involves intercepting communications on the point-of-sale (POS) terminal. When a shopper inserts his or her card into a POS terminal, the terminal automatically tries to verify its authenticity. In this case, the FUNcard was waiting with its own, fake “yes” signal when the authenticity check arrived. “The attacker intercepts the PIN query and […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Credit Card Hackers Figured Out How To Break Chip-And-PIN Security Years Ago appeared first on National Cyber Security.

View full post on National Cyber Security

How the government scapegoats hackers to justify violating your privacy

Source: National Cyber Security – Produced By Gregory Evans

How the government scapegoats hackers to justify violating your privacy

The anonymous hacker is quickly replacing the terrorist as the go-to bogeyman in the American cultural imagination. Like Islamist radicals, the kinds of hackers that have brought down the servers of corporate giants and government agencies are mysterious and stealthy, spreading fear and paranoia from a faraway land. In April, President Obama made the ideological connection between the two official with an Executive Order declaring a national emergency due to “malicious cyber-enabled activities” which constitute “an unusual and extraordinary threat to the national security, foreign policy, and economy of the United States.” Both the Islamist radical and the Chinese, North Korean, or Russian hacker are frightening specters who deserve the attention of the American government. But as much as the federal government granted itself sweeping and invasive authority to violate the rights of millions of Americans in the name of fighting terror, today’s government once again steps over Constitutional boundaries in the name of keeping Americans safe from a new kind of threat. The Cybersecurity Information Sharing Act (CISA), part of Obama’s increased push for cybersecurity in response to last year’s Sony Pictures hack, represents such a step. The bill sounds innocuous enough: It encourages companies to share data about […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post How the government scapegoats hackers to justify violating your privacy appeared first on National Cyber Security.

View full post on National Cyber Security

Page 10 of 84« First...«89101112»203040...Last »

My Twitter

  • RT @GregoryDEvans: A Visit to String Theory Schools https://t.co/4YPeYEsHrT #security #hacker #HTCS
    about 20 mins ago
  • Cyber Security News Today is out! https://t.co/6dHQrS5bKe @gregorydevans #hacker
    about 1 hour ago
  • RT @GregoryDEvans: Graduating With a Diploma in Food Allergy Life https://t.co/C1gAm4KR2h #security #hacker #HTCS
    about 6 hours ago
  • RT @GregoryDEvans: Leadership needed when it comes to cyber security, report shows https://t.co/zoEoXp5bRj https://t.co/2GxV8kHQcl
    about 8 hours ago
  • RT @GregoryDEvans: #galaxylife #samsung4life Minn. Lawmakers Craft Controversial Bill Aimed at Protecting Teachers From Assault – ... https…
    about 16 hours ago

AmIHackerProof.com By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans