blog trackingRealtime Web Statistics Hackers Archives | Page 10 Of 82 | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant - Part 10

Posts Tagged ‘Hackers’

Cyber Security Threat 2015: Crowdfunding Site Patreon Targeted by Hackers; Large Amount of User Data Leaked Online

Source: National Cyber Security – Produced By Gregory Evans

Patreon, the crowdfunding site designed for artists and creators, was recently targeted in a massive cyber attack. The data breach led to around 15GB of users’ information being stolen by the hackers and leaked online. The attack on the site was confirmed by Patreon CEO Jack Conte on September 30. According to the executive, the site has already taken the necessary steps to ensure the security of its users. “Yesterday I learned that there was unauthorized access to a Patreon database containing user information,” he wrote. “Our engineering team has since blocked this access and taken immediate measures to prevent future breaches.” The Market Business reported that security researcher Troy Hunt said that details of Patreon users were then posted on various online forums. He was able to access these sites and confirmed that the leaked details are authentic. According to Hunt, the leak includes users’ names, email addresses, shipping addresses and messages sent to other users. After going to the released details, he found a total of 2.3 real email addresses including his own, Ars Technica has learned. Despite the data breach, Conte assured users that credit card details were not stolen during the cyber attack. He also noted that although […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cyber Security Threat 2015: Crowdfunding Site Patreon Targeted by Hackers; Large Amount of User Data Leaked Online appeared first on National Cyber Security.

View full post on National Cyber Security

Hackers mar mom’s memory of son

Source: National Cyber Security – Produced By Gregory Evans

Durban — A woman who has dedicated the past six years to helping mothers cope with the trauma of losing a child has had her reputation dragged through the mud by cyber-criminals who stole her identity. Bonita Suckling, who founded and runs the Durban-based non-governmental organisation, Rainbows and Smiles, said hackers took over her Gmail and Facebook accounts on Friday and sent messages to everyone on her extensive contact list appealing for help. On Saturday the hackers shut down her phone to prevent her alerting people. Suckling established Rainbows and Smiles in 2009. Her son, Jed, died of brain cancer in July 2011. “I want to die, my whole reputation, everything I worked for, is gone. For years I have run my NGO in memory of my son, giving up everything materialistically and exposing myself emotionally to the heartache of running an NGO that supports children who often pass away.” E-mails sent from her account by the hackers read: “I am in Limassol, Cyprus at the moment and I just misplaced my bag containing my phone, passport and money in a cab. I need your assistance, please let me know if you can be of any help.” Suckling, 41, said […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hackers mar mom’s memory of son appeared first on National Cyber Security.

View full post on National Cyber Security

Cyber attacks on Hong Kong universities increasing as state-backed hackers target city in the wake of Occupy Central

Source: National Cyber Security – Produced By Gregory Evans

Cyber attacks on Hong Kong universities are on the rise amid fresh fears that state-backed hackers are the main culprits, with one campus admitting that it is fighting an unprecedented number of daily intrusions. Top security experts have warned of a noticeable rise in the number of cyberattacks on the SAR that bore the hallmarks of state-sponsored hackers. There had been a 38 per cent rise of hacking incident reports this year, according to Hong Kong’s cybersecurity watchdog. The major increase comes from phishing incidents seeking names and data that have increased by 213 per cent over the same period last year. The trend comes amid a fierce debate over academic freedom at the city’s universities following the controversial rejection of Professor Johannes Chan Man-mun’s appointment as pro-vice chancellor at the University of Hong Kong. Bryce Boland, chief technology officer for Asia-Pacific at cybersecurity firm FireEye, observed “very high” and “actively targeted” attacks on local universities that he described as “quite interesting”. He said that before the student-led Occupy protests began last September, Hong Kong had not been a major target but in the past year, the situation had changed dramatically. “Ever since the ‘umbrella movement’ got under way, there […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cyber attacks on Hong Kong universities increasing as state-backed hackers target city in the wake of Occupy Central appeared first on National Cyber Security.

View full post on National Cyber Security

Can Hackers Take Control of Your Car?

Source: National Cyber Security – Produced By Gregory Evans

Would you like to play a game of global thermonuclear war? That was the question in the movie “WarGames,” in which Matthew Broderick hacks into a military supercomputer and (spoiler alert!) nearly triggers Armageddon. The movie debuted in 1983. Decades later, Broderick is older and paunchier, and the threat of hacking is no longer a fantastical conceit. As more of our lives are run by computers, new frontiers continue to open to hackers. So it should surprise virtually no one that cars, which are becoming more computerized every year, are turning into an ever juicier target. Automotive hacking is not a new phenomenon, but until recently it was primarily achieved through physically plugging into a car’s diagnostic port. As automakers breathlessly rush to add Internet connectivity and smartphone vehicle control apps to lure tech-savvy buyers, cars are becoming increasingly vulnerable. As many as 82.5 million vehicles are expected to be hooked up to the Internet by 2022, according to estimates by IHS Automotive. That’s a target-rich environment. It’s not like we haven’t been warned. “We find the existence of practically exploitable vulnerabilities that permit arbitrary automotive control without requiring direct physical access,” wrote researchers with the University of California, San […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Can Hackers Take Control of Your Car? appeared first on National Cyber Security.

View full post on National Cyber Security

The punk rocker widow from UK who wants to run ISIS hackers

British widow of deceased leader of ISIS campaign wants to run ISIS’s hackers

According to U.S. officials, a navel-baring British punk rocker turned Islamic State widow is now targeting for a leadership role in the terror group’s cadre of hackers and online recruiters.

If Sally Ann Jones, 45, goes on to succeed, then she would become ISIS’s most public European national to threaten the United States and UK’s networks openly. She would also probably become the most powerful woman in ISIS changing her into a key operational figure.

A U.S. military official told The Daily Beast that “She appears to have picked up the flag of her late husband and is actively working to incite attacks and recruit new members.”

However, some of the observers from the West are curious to know if Jones has the technical flare for such a role and whether ISIS would let a Western woman hold a high position in the organization.

The U.K.’s most infamous defector to ISIS once, Jones can now be a major target of the kind of U.S.-led coalition airstrikes that killed her husband, 21-year-old Junaid Hussein, who was leading ISIS’s hacking campaign until his death in August.

Jones, who now goes by the name Sakinah Hussain or Umm Hussain al-Britani, managed to grab the attention of Western officials after her ISIS’s September 11 online threats against Americans, said a U.S. military official.

It is believed that ISIS announced a hashtag campaign on Twitter #AmericaUnderHacks campaign to “celebrate” the anniversary under Jones’s leadership. The group released 100 names of law enforcement, military, and other government personnel as part of a kill list of the campaign.

The government websites were used to obtain the names. It was what a second U.S. military official called “lame.”

If Jones is actually able to create an operational role for herself, it could say something about the future of Western women in ISIS. While a few of Arab women have taken leadership roles in ISIS, especially, Umm Sayyaf, the wife of the terror group’s one-time financier, females from the West have not largely taken up that role. However, they have ended up as brides for ISIS fighting men, said Mia Bloom, professor of communication at Georgia State University who specializes in the role of women in terror organizations.

“She appears to have picked up the flag of her late husband and is actively working to incite attacks and recruit new members.”

“There are links to be made that suggest women are taking a more proactive role, given the role of [other prominent ISIS wives]in terms of soliciting and managing the marriage bureau and sex trade,” Bloom said. “But the fact is women don’t have a frontline, active, gun toting role regardless of how many photos ISIS posts of armed, veiled women splayed on Toyota trucks.”

She added, “What’s more likely is after the appropriate mourning period, Jones, like other emigrant brides, will go back to the dorm so she can be redistributed to the fighters. Women lose the house. They lose all the original benefits they had.”

Her ISIS husband, Hussain was believed to be behind some of ISIS’s highest-profile hacking attacks, including the release of personally identifying information of 1,300 U.S. government and military personnel earlier this year. He was also suspected to be behind the hacking of U.S. Central Command’s social media feeds this summer.

Besides, he was also considered by U.S. officials to be a leader within ISIS, a recruiter and a strategist.

At the time of announcing Hussain’s death, U.S. CENTCOM spokesman Air Force Col. Patrick Ryder said Hussain “was involved in recruiting [ISIS] sympathizers in the West to carry out lone-wolf style attacks. He had significant technical skills and expressed a strong desire to kill Americans.”

Before joining the ISIS, Hussain was accused in his native U.K. of releasing former Prime Minister Tony Blair’s address book and making crank calls to a counter terrorism hotline. At that time, he just 18 years old and was sentenced to a six-month jail term.

He left for Syria in 2013. Jones, who met Hussain online, converted to Islam and followed Hussain, reportedly to the ISIS capital of Raqqa, Syria. According to photos posted online, she took her 10-year-old son with her wearing dark clothing that only showed her eyes.

Her tweets regarding her movements with her husband and boasting of her place in the Islamic State quickly attracted a Twitter following of her own. She posted under her Twitter handle @UmmHussain102 until it was shut down in 2014. However, she would create new accounts and rapidly pick up followers, even though her accounts were always closed.

In August last year, she posted “Alhamdulillah me and my husband made it to the Islamic State after being stuck in Idlib [in northwestern Syria]for 7mths & are now living in the khilafah #isis.”

She wrote later that month: “My husband is away at training camp at the moment refreshing his ‘kaafir [infidel]killing skills’… Don’t cry though he’ll be back soon :)”
She hit at the Christians, Jews, and the West while speaking in favor of beheadings and promising to do the same.

“You Christians all need beheading with a nice blunt knife and stuck on the railings at raqqa[Syria]….. Come here and I will do it for you.”
She strongly recommended followers to join ISIS. She is also believed to have hired women to be sex slaves for ISIS fighters, according to two military officials. Further, she also made fun of the U.S.-led coalition effort.

She retweeted a tweet that her husband had posted last year, which read “How many more body bags are American families willing to receive?”

Speaking to potential Western recruits, she said that she is having a good time living under Sharia law, who is far different from her life in Kent, where at times she was unemployed, or small-time punk band lead singer and mother. Infact, she even quoted ISIS leader Abu Bakr al Baghdadi.

She wrote last year “‘So take up arms, take up arms, O soldiers of the Islamic State! And fight, fight’ – Amir Al Mumineen Abu Bakr al Bagdadi.”

While living in ISIS, she is said to have became a grandmother to a little boy last year. However, she has never confirmed this.

However, after Hussain’s death, she wrote: “I’m proud my husband was killed by the biggest enemy of Allah, may Allah be pleased with him, and I will never love anyone but him.” U.S. military and intelligence officials are observing her to see her next move.

A U.S. intelligence official explained to The Daily Beast “Those closest to Junaid Hussain will be challenged in filling his shoes. Junaid’s notoriety, connections, and experience—despite his age—offered a skill set not easily found among extremists. That said, [ISIS] continues to push out propaganda targeting a wide range of audiences, and there’s little doubt some members of the group will try to pick up where Junaid left of.”

The U.S. officials are not impressed until now. According to them, far from being a hacker, because of her ties to the West, she is a figurehead who is being promoted as its future hacker. The officials said, on her part, there is no proof of technically proficient hacking. While she has no training in code, she is also believed to not have a high school degree.

Infact, even the most sophisticated computer experts within ISIS have yet to pull off a major hack. Instead they have carried out bundled information and fruitful Internet searches. For instance, in March, ISIS claimed that they had hacked the U.S. military and acquired personal information of 100 service members for example. However, it turned out to be that the group had just searched the Defense Department’s many public websites, created to promote the department.

Until now, the most effective hack has been of CENTCOM’s Twitter accounts earlier this summer.

Despite everything, the group’s persistence along with its aggressive social media campaign helped its online charm. However, observers said that since Hussain’s death, there has been a deterioration in ISIS hacking effort.

However, it is too early to make a credible assessment of Jones or the ISIS hacking campaign, as it has only been only a month since Hussain’s death.

Daveed Gartenstein-Ross, a senior fellow at the Washington D.C.-based Foundation for Defense of Democracies said “She is a fanatic but as far as we know she has no hacking skills. It’s not clear what going beneath the surface.”

Resource: The Daily Beast

The post The punk rocker widow from UK who wants to run ISIS hackers appeared first on TechWorm.

View full post on TechWorm

Hackers intercept NZ taxidermy company’s invoices, trick clients

Source: National Cyber Security – Produced By Gregory Evans

A  South Canterbury business has been hit by hackers who intercepted its invoices and prompted clients to deposit money into foreign bank accounts. Kerry O’Rourke, a part-owner in  Pleasant Point’s O’Rourke Brothers Taxidermy, said far only one of O’Rourke’s clients has been sucked into the scam, losing “probably about €2000 ($3583) into an account”. “We first realised something was amiss with our emails when we got rung up by an English client who we were sending some mounts to. He had paid his money into an English Building Society account supposedly that we’d sent him, which we hadn’t sent him. “It probably wouldn’t be legal to do what I want to do to them. It’s a thing you can’t do anything about until its happened.” O’Rourke said his reaction was to immediately alert the rest of his overseas clients. “We got in contact with all our other foreign clients who we had invoices out to by email. Some of them have been approached (by the hackers). Our emails have been intercepted and reconstructed giving them Russian bank accounts. “So it’s a network that’s fairly global thievery,” O’Rourke said. O’Rourke said he was still to hear from some offshore clients who have […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hackers intercept NZ taxidermy company’s invoices, trick clients appeared first on National Cyber Security.

View full post on National Cyber Security

Middle East hackers extort $10 million from two Indian companies to hide information from government

Source: National Cyber Security – Produced By Gregory Evans

Two Indian conglomerates were forced to pay $5 million each in order to prevent hackers from disclosing information that could have implicated them in wrongdoing. The payoff was made in May, but people aware of the matter said the hackers would have obtained access to the IT systems of the companies two to three years before that, reflecting a widespread vulnerability that criminals are looking to exploit when the time is right. This is said to be the first known case of cyber criminals extorting money from large Indian companies. ET has pieced together the story by speaking to executives, private investigators and officials. The break-ins and threats weren’t reported to the authorities for fear that the information thus provided could have proven incriminating — hence the involvement of private detectives. The threat is said to have emanated from the Middle East although it’s not clear whether it goes back even further. The companies were told to pay up or face the consequences of the data being passed on to the Indian government, one person said. The blackmail demands came a few months after a scam involving thefts of documents from the petroleum and other minstries erupted earlier this year. […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Middle East hackers extort $10 million from two Indian companies to hide information from government appeared first on National Cyber Security.

View full post on National Cyber Security

Hack Brief: Mobile Manager’s Security Hole Would Let Hackers Wipe Phones

Source: National Cyber Security – Produced By Gregory Evans

REMOTE MANAGEMENT SYSTEMS for mobile phones are supposed to make it easy for companies to wipe a device clean if it gets lost or stolen. But a vulnerability discovered in a popular remote management system used by thousands of businesses to manage employee mobile phones would allow an attacker to wipe a CEO’s phone clean, steal the phone’s activity log, or determine the executive’s location, researchers say. The Hack The hack involves an authentication bypass vulnerability inSAP AG’s Afaria mobile management system used by more than 6,300 companies. Ordinarily, system administrators send a signed SMS from an Afaria server to lock or unlock a phone, wipe it, request an activity log, block the user, disable the Wi-Fi or obtain location data. But researchers atERPScan found that the signature is not secure. The signature uses a SHA256 hash composed from three different values: the mobile device ID, or IMEI; a transmitter ID, and a LastAdminSession value. An attacker can easily obtain the transmitter ID simply by sending a connection request to the Afaria server over the Internet, and the LastAdminSession—a timestamp indicating the last time the phone communicated with the Afaria server—can be a random timestamp. The only thing the hacker […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hack Brief: Mobile Manager’s Security Hole Would Let Hackers Wipe Phones appeared first on National Cyber Security.

View full post on National Cyber Security

Clark Howard: Hackers, cyber security need to work together

Source: National Cyber Security – Produced By Gregory Evans

to secure it. Channel 2 consumer adviser Clark Howard says companies and security researcher, more commonly known as hackers, need to work together to keep people safe. “The hackers are the ones finding flaws, finding cracks in the system before the criminals can find them and the hackers do the good thing, they alert the public the manufacturers they tell people about them so that those flaws can be fixed.” explained Beau Woods. Beau Woods, a security researcher and cyber security advocate, is part of a group called “I Am the Calvary. They work to bridge the gap between emerging technology and public safety. The recent Chrysler Fiat and Hospira medical pump hacks are perfect examples of hacker finding flaws in technology. In both cases researchers were able to remotely break into the operating systems. For Chrysler, it meant that hackers were able to remotely take control of a moving vehicle. In the case of the Hospira medical pump, they were able to control the dosage of medication given to a patient. Beau says there is no system that will never fail. “Every system has flaws, the earlier in the process you can find those flaws the less risk and […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Clark Howard: Hackers, cyber security need to work together appeared first on National Cyber Security.

View full post on National Cyber Security

Hackers for hire: The dangers of small time cyber-crime

Source: National Cyber Security – Produced By Gregory Evans

Black market websites have offered a wide array of services aimed at the aspiring cyber-criminal for some time. However, recent attention has been given to a new breed of websites that offer hacking services to a much broader market. Hacking, it would seem, is moving from the realms of the aspiring criminal on the dark web and becoming a mainstream service. Sites such as hackerslist.com, hackerforhire.org and neighbourhoodhacker.com have developed as anonymous meeting grounds for those seeking hacking services and those willing to provide them for a fee. Even the review site hackerforhirereview.com has sprung up, ostensibly rating such sites for veracity and effectiveness. As is to be expected in a technologically advanced market such as this, the free market has adapted to fill a perceived gap in the market before legislation can catch up. As such, the legality of these sites and practices remains in question, yet this has not prevented them from being populated with hundreds of listings. The services offered on these sites tend to be only a portion of those offered on the much larger and unambiguously illegal ‘underground’ market of the dark web. You won’t find advertising for malicious botnets of infected computers with which […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hackers for hire: The dangers of small time cyber-crime appeared first on National Cyber Security.

View full post on National Cyber Security

Page 10 of 82« First...«89101112»203040...Last »

My Twitter

  • Woman trashed ex-boyfriend’s South Austin home https://t.co/XUKxnjYEyR #dating @gregorydevans
    about 9 mins ago
  • Love is never lost. If not… https://t.co/RIeArGCYyR #dating @gregorydevans
    about 16 hours ago
  • Steve Grand and Davey Wavey Hook Up to Reveal Their Online Dating Rules. https://t.co/cqTGVh0WxJ #dating @gregorydevans
    about 16 hours ago
  • Shame hacking: attack on dating site for ‘beautiful people’ is actually pretty scary https://t.co/ddUamAts8h #dating @gregorydevans
    about 16 hours ago
  • Hackney wife’s ‘Isis-inspired’ murder plot thwarted https://t.co/E1AYP5HGjP #dating @gregorydevans
    about 17 hours ago

AmIHackerProof.com By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans