blog trackingRealtime Web Statistics Hackers Archives | Page 10 Of 87 | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant - Part 10

Posts Tagged ‘Hackers’

Hackers Are Determined To Ruin Your Christmas – Again!

Source: National Cyber Security – Produced By Gregory Evans

Hackers Are Determined To Ruin Your Christmas -- Again!

My childhood Christmases were magical times, and still hold dear in my memory for reuniting disparate families, facilitating mass eating and, most importantly, ensuring the arrival of the rarest of treats: the latest, freshly shrink-wrapped video game. Since a brand new $60 title swiftly wiped out half my year’s allowance, Christmas was a godsend for cash-strapped gamers like me. I could barely wait ’til breakfast to pop my new acquisition in the console and play all day, which is why this news is so disheartening. A hacker group calling themselves Phantom Squad have stated their intent to cancel Christmas, resolving to bring down Playstation Network and Xbox Live over the holidays.   Phantom Squad recently took credit for Reddit’s temporary blackout earlier in the week. The site’s takedown could have been the result of a denial of service (DDoS) attack, though this has not yet been confirmed. The hacker group could conceivably use the same method to target online gaming services, thereby denying gamers the pleasure of playing with their friends this Christmas. As disgruntled gamers will no doubt recall, last year saw the blackout of both the PlayStation and Xbox networks, taking both consoles offline for an extended period. […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hackers Are Determined To Ruin Your Christmas — Again! appeared first on National Cyber Security.

View full post on National Cyber Security

ISIS Twitter Accounts Traced Back to UK Government by Hackers

Source: National Cyber Security – Produced By Gregory Evans

ISIS Twitter Accounts Traced Back to UK Government by Hackers

Every computer and mobile phone logs onto the internet using an IP address, which is a type of identification number. The hacking collective showed Mirror Online details of the IP addresses used by a trio of separate digital jihadis to access Twitter accounts, which were then used to carry out online recruitment and propaganda campaigns. At first glance, the IP addresses seem to be based in Saudi Arabia, but upon further inspection using specialist tools they appeared to link back to the DWP. So, has the DWP been engaging in a little jihad after hours? The hackers believed so, saying: Don’t you think that’s strange? We traced these accounts back to London, the home of the British intelligence services. It is indeed strange. However, this appears to be more cock-up than conspiracy. The DWP claims they actually sold a swathe of IP addresses to Saudi Arabia in an unannounced deal that completed in October of this year. That is, the UK government sold IP addresses to an extremist group who used them to disseminate hate speech and potentially promote terrorism. Despite the astronomic proportions of this cock-up, a Cabinet spokesman remarked: The government owns millions of unused IP addresses which we are […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post ISIS Twitter Accounts Traced Back to UK Government by Hackers appeared first on National Cyber Security.

View full post on National Cyber Security

Cybersecurity bill to thwart hackers added to big 2016 spending deal

Source: National Cyber Security – Produced By Gregory Evans

Cybersecurity bill to thwart hackers added to big 2016 spending deal

A cybersecurity bill aimed at thwarting huge hack attacks was slipped at the last minute into a massive $1.1 trillion federal spending bill that Congress is poised to pass this week. Supporters said Wednesday the bill will increase the sharing of cyber threat information between U.S. companies and the government to help keep thieves and foreign spies from stealing Americans’ personal data. But critics said lawmakers have stripped the bill of strong privacy protections and warn that it will lead to more government surveillance of U.S. citizens. “It’s a disingenuous attempt to quietly expand the U.S. government’s surveillance programs,” said Evan Greer, campaign director of Fight for the Future, a non-profit group that advocates for the rights of Internet users.”It will inevitably lead to law enforcement agencies using the data they collect from companies through this program to investigate, prosecute, and incarcerate more people, deepening injustices in our society while failing to improve security.” The Financial Services Roundtable said the cybersecurity bill, which Congress has been trying to pass for three years, is a crucial step forward in protecting American consumers and businesses from devastating cyber attacks. “This cyber bill is a ‘team America’ approach that will significantly improve efforts to fight cyber criminals and better protect consumer data and intellectual property,” said FSR President and CEO Tim Pawlenty. […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cybersecurity bill to thwart hackers added to big 2016 spending deal appeared first on National Cyber Security.

View full post on National Cyber Security

Hacker Lexicon: Botnets, the Zombie Computer Armies That Earn Hackers Millions

Source: National Cyber Security – Produced By Gregory Evans

Hacker Lexicon: Botnets, the Zombie Computer Armies That Earn Hackers Millions

ZOMBIE ARMIES AREN’T just invading movie screens these days. They’re also taking over the Internet in the form of massive botnets. A botnet is an army of computers, all infected with the same malware, that gives a bot herder remote control of these computers in order to surreptitiously commandeer them without their owners’ knowledge. The bot herder can send instructions to the network of computers from a command-and-control server to siphon credit card numbers and banking credentials from them or use them to launch DDoS attacks against web sites, deliver spam and other malware to victims, or conduct advertising click fraud. Botnets came up this month in a Senate Judiciary hearing with FBI Director James Comey. Senator Sheldon Whitehouse, who has previously likened botnets to weeds that do “evil things,” asked Comey for his assessment of one of the Internet’s biggest scourges, and Comey replied that there was no such thing as a “good botnet.” “Whether they’re coming at you or whether they’re standing still, it’s bad,” Comey replied. “I don’t know of a good purpose for an army of zombies.” Botnets have been around for more than a decade and have become one of the most popular methods attackers […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker Lexicon: Botnets, the Zombie Computer Armies That Earn Hackers Millions appeared first on National Cyber Security.

View full post on National Cyber Security

ISIS Twitter Accounts, IP Addresses Connected To British Government, Hackers Claim

Source: National Cyber Security – Produced By Gregory Evans

ISIS Twitter Accounts, IP Addresses Connected To British Government, Hackers Claim

At least three social media accounts belonging to supporters of the Islamic State group have been traced back to the British government, according to the hacking group VandaSec. The group, which is comprised of four male teenagers, says it discovered that the United Kingdom’s Department for Work and Pensions (DWP) owns Internet protocol (IP) addresses used by at least three jihadists to access Twitter accounts and conduct online recruitment and propaganda campaigns, reported the Mirror. The IP addresses, a type of unique identification number that is associated with every computer and mobile phone that logs onto the Internet, appeared to be based in Saudi Arabia, but upon further inspection, the hackers were able to trace them back to DWP’s London offices. The IP addresses, a type of unique identification number that is associated with every computer and mobile phone that logs onto the Internet, appeared to be based in Saudi Arabia, but upon further inspection, the hackers were able to trace them back to DWP’s London offices. “Don’t you think that’s strange?” one of the hackers asked the Mirror. “We traced these accounts back to London, the home of the British intelligence services.” Some have suggested that British officials could […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post ISIS Twitter Accounts, IP Addresses Connected To British Government, Hackers Claim appeared first on National Cyber Security.

View full post on National Cyber Security

Hackers in ‘white hats’ join effort to thwart the bad guys

Source: National Cyber Security – Produced By Gregory Evans

Hackers in ‘white hats’ join effort to thwart the bad guys

High quality global journalism requires investment. Please share this article with others using the link below, do not cut & paste the article. See our Ts&Cs and Copyright Policy for more detail. Email ftsales.support@ft.com to buy additional rights. Commuters in the Israeli port city of Haifa fumed during a particularly tedious traffic jam two years ago, never guessing that the logjam was caused not by an accident or some other relatively customary event — but reportedly by cyber attack. It shut the city’s Carmel tunnel for eight hours, with the Associated Press later reporting a cyber attack, although the authorities never confirmed this. A hacker used a “Trojan horse” — a malicious computer programme — to shut down the security cameras monitoring the tunnel, the report said. High quality global journalism requires investment. Please share this article with others using the link below, do not cut & paste the article. See our Ts&Cs and Copyright Policy for more detail. Email ftsales.support@ft.com to buy additional rights. As transport networks — from cars to planes to trains — connect to the internet in hundreds of ways, hackers have found ways to disrupt the arteries of major cities. A single flaw in one […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hackers in ‘white hats’ join effort to thwart the bad guys appeared first on National Cyber Security.

View full post on National Cyber Security

Shark Tank Star On How Hackers Became The New Mafia

Source: National Cyber Security – Produced By Gregory Evans

Shark Tank Star On How Hackers Became The New Mafia

Robert Herjavec is best known as a star on ABC’s Emmy Award-winning hit show Shark Tank. But that only requires 17 days a year of filming, according to Herjavec – who spends most of his time as founder and CEO running his namesake cybersecurity firm. Toronto-based Herjavec Group is Canada’s largest pure-play information security services company. Over the past couple of years they have expanded in to the U.S., Europe, and Asia-Pacific, through organic growth and a few small but strategic acquisitions of MSSPs (managed security service providers). Herjavec’s firm recently did some of its own filming — “Hackers are the New Mafia: Breakfast and Security Roundtable with DarkMarket author Misha Glenny” — a video broadcast which discusses cyber crime with one of the top minds on the topic. Misha Glenny is an international bestselling author who has written several books including his 2012 paperback “DarkMarket: How Hackers Became the New Mafia”. In this book, he exposes our governments’ multi-billion-dollar war against an ever-morphing, super smart new breed of criminal: the hacker. Herjavec Group’s video was shot at their corporate headquarters and features Glenny recounting his experiences across 200 plus hours of research & interviews with the key players in […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Shark Tank Star On How Hackers Became The New Mafia appeared first on National Cyber Security.

View full post on National Cyber Security

Hackers double their attacks against South Africans

Source: National Cyber Security – Produced By Gregory Evans

Hackers double their attacks against South Africans

Hackers have doubled the number of cyber attacks against South Africans as the expansion of internet access brings more people online. This is according to cyber security firm Kaspersky Lab which has been tracking the number of attacks through its antivirus network. “These statistics state that the number of attacks on South Africa increased from 25 million in all 2014 to 81.6 million in 2015, until mid-November,” Mohammad Amin Hasbini, senior security researcher of the Global Research and Analysis team at Kaspersky Lab, told Fin24. He said that the increase could be attributed to increasing numbers of people gaining access to the internet. “Such numbers are extreme compared to other regions, while this could be considered as a result of accelerated IT and internet adoption growth in the market, it is also an alert to users and companies about the increased interest of cyber criminals in South African assets.” Hacker categories Security company Fortinet found that hackers had increased their targeting of local companies by utilising ransomware hidden in legitimate-looking emails. However, few South African companies are willing to make public the nature and scale of attacks. “There is no specific number for the organisations that were hacked in South […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hackers double their attacks against South Africans appeared first on National Cyber Security.

View full post on National Cyber Security

Pakistani hackers deface Vizag traffic police website

Source: National Cyber Security – Produced By Gregory Evans

Pakistani hackers deface Vizag traffic police website

Suspected hackers from Pakistan have defaced the website of city traffic police. The hackers blocked the site and posted some malicious and anti-national content under the web name ‘team Pakistan cyber attackers’ alleging atrocities against Muslims in Kashmir. The website www.vizagtrafficpolice was hacked around 2 PM in Sunday and subsequently restored on the same day. Police said the IP address of hackers has been traced to Istanbul and they were probably radical Is .. Source: http://economictimes.indiatimes.com/news/defence/pakistani-hackers-deface-vizag-traffic-police-website/articleshow/50015853.cms

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Pakistani hackers deface Vizag traffic police website appeared first on National Cyber Security.

View full post on National Cyber Security

Chinese Hackers Used Dropbox To Monitor Hong Kong Activists, Journalists: FireEye

Source: National Cyber Security – Produced By Gregory Evans

Chinese Hackers Used Dropbox To Monitor Hong Kong Activists, Journalists: FireEye

Chinese hackers used malicious software to monitor journalists and activist groups involved in the Hong Kong protests this year, according to new research from the cybersecurity company FireEye. Attackers used Dropbox and other cloud storage providers to communicate malware after targeting users with a phishing message. The hackers launched a spearphishing campaign, which involves targeting a specific person with an email that appears to be from a known source, against Hong Kong-based media organizations and protest leaders in August 2015. There is evidence of Beijing’s concern with Hong Kong, where 79 days of pro-democracy demonstrations brought the semi-autonomous city to a halt in 2014. FireEye stopped short of directly linking the Chinese government to the hack but stipulated the attack had the sophistication level of a nation state. “The media organizations targeted with the threat group’s well-crafted Chinese-language lure documents are precisely those whose networks Beijing would seek to monitor,” FireEye said in a blog post published Tuesday. “Cyberthreat groups’ access to the media organization’s networks could potentially provide the government advance warning on upcoming protests, information on pro-democracy group leaders, and insights needed to disrupt activity on the Internet, such as what occurred in mid-2014 when several websites were brought down in […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Chinese Hackers Used Dropbox To Monitor Hong Kong Activists, Journalists: FireEye appeared first on National Cyber Security.

View full post on National Cyber Security

Page 10 of 87« First...«89101112»203040...Last »

My Twitter

  • Cyber Security News Today is out! https://t.co/a5wGLPDtJl @gregorydevans #hacker
    about 10 hours ago
  • Cyber Security News Today is out! https://t.co/kEtP9uHiZW @gregorydevans #hacker
    about 1 day ago

AmIHackerProof.com By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans