blog trackingRealtime Web Statistics Millions Archives | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘millions’

Millions of LinkedIn passwords and email addresses published online

startup-photos-681x333Your ads will be inserted here byEasy Plugin for AdSense.Please go to the plugin admin page toPaste your ad code OR Suppress this ad slot. LinkedIn has revealed millions of its users’ email addresses and passwords have been published online from a security breach that occurred in 2012. The leak could affect more than 100 […]

View full post on AmIHackerProof.com | Can You Be Hacked?

. . . . .

View full post on Are You Hacker Proof

ISIS to unleash TENS OF MILLIONS of jihadi hackers on West in blitz worse than NUCLEAR WAR

Source: National Cyber Security – Produced By Gregory Evans

ISIS to unleash TENS OF MILLIONS of jihadi hackers on West in blitz worse than NUCLEAR WAR

The computer security expert, who invented the McAfee anti-virus software, claimed “fifteen to 25 percent” of the world’s 1.6 billion Muslims are extremists, meaning ISIS could have an army of 400 million fanatical followers ready to strike at any minute.  Computer boffins at the terrorists’ headquarters in Raqqa have developed a secret smartphone application designed to spread Islamist propaganda and help followers carry out terrorist attacks from the comfort of their own homes. A team which may have included British hacker Junaid Hussain invented a feature which allows even the most computer illiterate of jihadis to launch sophisticated Distributed Denial of Service (DDoS) attacks against websites. DDoS attacks work by flooding a site with fake traffic, causing it to grind to a halt, and have been successfully used against some of the world’s biggest companies and government departments. Experts now believe that ISIS hackers carried out a major test of the app’s capabilities last week by launching an audacious attempt to bring down the 13 root servers which keep the Internet running worldwide. Whilst the attack ultimately failed, it did temporarily slow down services across the globe and has been described as an unprecedented attempt to strike at the heart […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post ISIS to unleash TENS OF MILLIONS of jihadi hackers on West in blitz worse than NUCLEAR WAR appeared first on National Cyber Security.

View full post on National Cyber Security

Hacker Lexicon: Botnets, the Zombie Computer Armies That Earn Hackers Millions

Source: National Cyber Security – Produced By Gregory Evans

Hacker Lexicon: Botnets, the Zombie Computer Armies That Earn Hackers Millions

ZOMBIE ARMIES AREN’T just invading movie screens these days. They’re also taking over the Internet in the form of massive botnets. A botnet is an army of computers, all infected with the same malware, that gives a bot herder remote control of these computers in order to surreptitiously commandeer them without their owners’ knowledge. The bot herder can send instructions to the network of computers from a command-and-control server to siphon credit card numbers and banking credentials from them or use them to launch DDoS attacks against web sites, deliver spam and other malware to victims, or conduct advertising click fraud. Botnets came up this month in a Senate Judiciary hearing with FBI Director James Comey. Senator Sheldon Whitehouse, who has previously likened botnets to weeds that do “evil things,” asked Comey for his assessment of one of the Internet’s biggest scourges, and Comey replied that there was no such thing as a “good botnet.” “Whether they’re coming at you or whether they’re standing still, it’s bad,” Comey replied. “I don’t know of a good purpose for an army of zombies.” Botnets have been around for more than a decade and have become one of the most popular methods attackers […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker Lexicon: Botnets, the Zombie Computer Armies That Earn Hackers Millions appeared first on National Cyber Security.

View full post on National Cyber Security

Most Sophisticated Android Bootkit Malware ever Detected; Infected Millions of Devices

Source: National Cyber Security – Produced By Gregory Evans

Hardly two month ago we reported about the first widely spread Android Bootkit malware, dubbed as ‘Oldboot.A‘, which infected more than 500,000 Smartphone users worldwide with Android operating system in last eight months, especially in China.Oldboot is a piece of Android malware that’s designed to re-infect Mobile devices even after a thorough cleanup. It resides in the memory of infected devices;  It modify the devices’ boot partition and booting script file to launch system service and extract malicious application during the early stage of system’s booting.Yet another alarming report about Oldboot malware has been released by the Chinese Security Researchers from ‘360 Mobile Security’. They have discovered a new variant of the Oldboot family, dubbed as ‘Oldboot.B‘, designed exactly as Oldboot.A, but new variant has advance stealth techniques. Especially, the defense against with antivirus software, malware analyzer, and automatic analysis tools. “The Oldboot Trojan family is the most significant demonstration of this trend.” researchers said.Oldboot.B, Android Bootkit malware has following abilities:It can install malicious apps silently in the background.It can inject malicious modules into system process.Prevent malware apps from uninstalling.Oldboot.B can modify the browser’s homepage.It has ability to uninstall or disable installed Mobile Antivirus softwares.   INFECTION & INSTALLING MORE MALWARE APPSOnce an Android […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Most Sophisticated Android Bootkit Malware ever Detected; Infected Millions of Devices appeared first on National Cyber Security.

View full post on National Cyber Security

Millions of Vulnerable Routers aiding Massive DNS Amplification DDoS Attacks

Source: National Cyber Security – Produced By Gregory Evans

The Distributed Denial of Service (DDoS) attack is becoming more sophisticated and complex with the increase in the skills of attackers and so, has become one of favorite weapon for the cyber criminals to temporarily suspend or crash the services of a host connected to the Internet and till now nearly every big site had been a victim of this attack.Since 2013, Hackers have adopted new tactics to boost the sizes of Distributed Denial of Service (DDoS) attack known as ‘Amplification Attack’, leveraging the weakness in the UDP protocols. One of the commonly used by hacker is (Domain Name System) DNS Reflection Denial of Service (DrDoS).The DNS Reflection Denial of Service (DrDoS) technique exploits security weaknesses in the Domain Name System (DNS) Internet protocol. Using Internet protocol spoofing, the source address is set to that of the targeted victim, which means all the replies will go to the target and the target of the attack receives replies from all the DNS servers that are used. This type of attack makes it very difficult to identify the malicious sources.   MILLIONS OF HIJACKED-ROUTERS AIDING DrDoS ATTACKSThe new research carried out by DNS providers Nominum, provides ISPs with DNS based analytics and monetization […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Millions of Vulnerable Routers aiding Massive DNS Amplification DDoS Attacks appeared first on National Cyber Security.

View full post on National Cyber Security

The NSA Says It Will Finally Stop Spying On Millions of Americans at Midnight on Saturday

Source: National Cyber Security – Produced By Gregory Evans

The NSA Says It Will Finally Stop Spying On Millions of Americans at Midnight on Saturday

At midnight on Saturday, the federal government’s bulk data-gathering program for American phone conversations will come to an end at last. The move comes more than two years after former government contractor-turned whistleblower Edward Snowden released thousands of classified documents to Guardian journalists Glenn Greenwald, Laura Poitras and Ewen MacAskill. His disclosure triggering a movement that demanded the National Security Agency (NSA) stop spying on its own citizens. The story of the spying scandal was turned into the 2014 documentary Citizenfour, which won an Oscar the following year. According to NBC, after Saturday night the government must make a formal request to the telephone company any time it wants to examine a phone number that it suspects is linked to a terrorism case. The agency also cannot hold recorded phone calls without need. The move, granted by the passing of the USA Freedom Act last summer, was called “a first step but a modest one”by The Guardian’s MacAskill, adding that the NSA still has a huge capacity for surveillance: The problem – and it is a major one – is the reform applies only to phone records. The NSA can continue to harvest bulk communications from the internet and social […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post The NSA Says It Will Finally Stop Spying On Millions of Americans at Midnight on Saturday appeared first on National Cyber Security.

View full post on National Cyber Security

9 charged for stealing millions of dollars with Zeus Malware

Source: National Cyber Security – Produced By Gregory Evans

The Zeus malware is one of the most damaging pieces of financial malware that has helped the culprits to infect thousands of business computers and capture passwords, account numbers and other information necessary to log into online banking accounts. U.S. Department of Justice unsealed charges against nine alleged cyber criminals for distributing notorious Zeus malware to steal millions of dollars from bank accounts. Vyachesla V Igorevich Penchukov, Ivan Viktorvich Klepikov, Alexey Dmitrievich Bron, Alexey Tikonov, Yevhen Kulibaba, Yuriy Konov Alenko, And John Does are charged to devise and execute a scheme and artifice to defraud Bank Of America, First Federal Savings Bank, First National Bank Of Omaha, Key Bank, Salisbury Bank & Trust, Union Bank And Trust, And United Bankshares Corporation, all of which were depository institutions insured by the Federal Deposit Insurance Corporation. They are also accused to use Zeus, or Zbot, computer intrusion, malicious software, and fraud to steal or attempt to steal millions of dollars from several bank accounts in the United States, and elsewhere. It has also been reported that defendants and their co-conspirators infected thousands of business computers with software that captured passwords, account numbers, and other information necessary to log into online banking accounts, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post 9 charged for stealing millions of dollars with Zeus Malware appeared first on National Cyber Security.

View full post on National Cyber Security

Heartbleed – OpenSSL Zero-day Bug leaves Millions of websites Vulnerable

Source: National Cyber Security – Produced By Gregory Evans

It is advised to those who are running their web server with OpenSSL 1.0.1 through 1.0, then it is significantly important that you update to OpenSSL 1.0.1g immediately or as soon as possible. As this afternoon, an extremely critical programming flaw in the OpenSSL has been discovered that apparently exposed the cryptographic keys and private data from some of the most important sites and services on the Internet.The bug was independently discovered by security firm Codenomicon along with a Google Security engineer. The flaw is in the popular OpenSSL cryptographic software library and its weakness allows cyber criminals to steal the information protected, under normal conditions, by the SSL (Secure Sockets Layer) or TLS (Transport Security Layer) encryption used to secure the Internet.OpenSSL is an open-source implementation of the SSL and TLS protocols. The core library implements the basic cryptographic functions that enable SSL and TLS encryption. Mostly every websites use either SSL or TLS, even the Apache web server that powers almost half of the websites over internet utilizes OpenSSL.The discoverer of the vulnerability dubbed the bug as ‘Heartbleed bug’, as the exploit rests on a bug in the implementation of OpenSSL’s TLS/DTLS (transport layer security protocols) heartbeat extension (RFC6520).This […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Heartbleed – OpenSSL Zero-day Bug leaves Millions of websites Vulnerable appeared first on National Cyber Security.

View full post on National Cyber Security

POS made Michaels, Aaron Brothers risk millions of payment cards

Source: National Cyber Security – Produced By Gregory Evans

Two independent security firms that dates back to January, arts and crafts retailer Michaels Stores confirmed that, much like retail giant Target, its U.S. stores had experienced a payment card breach. The Michaels breach involved malware on point-of-sale systems that neither security firm had encountered before, Michaels CEO Chuck Rubin wrote in a Thursday statement, explaining the malware has been removed and the incident has been fully contained. About 2.6 million payment cards may have been compromised from Michaels outlets between May 8, 2013 and Jan. 27, Rubin said, adding that about 400,000 payment cards could have been compromised from Aarons Brothers stores, a Michaels subsidiary, between June 26, 2013 and Feb. 27. Rubin explained that the breach impacted a “varying number” of Michaels stores, as well as 54 Aaron Brothers locations. The crafts retailer posted online which Michaels and Aaron Brothers locations were affected. “While we have received limited reports of fraud, we are offering identity protection and credit monitoring services to affected Michaels and Aaron Brothers customers in the U.S. for 12 months at no cost to them,” Rubin said. “We also are offering these customers a fraud assistance service for 12 months at no cost to them.” […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post POS made Michaels, Aaron Brothers risk millions of payment cards appeared first on National Cyber Security.

View full post on National Cyber Security

Kid, 15, Is Prime Suspect in Talk Talk Data Hack Affecting Millions

48198386.cached

Source: National Cyber Security – Produced By Gregory Evans

There was utter panic when an unauthorized user broke into the website of the British telecoms and broadband company TalkTalk this week. The hacker stole the bank details of up to 4 million individual customers, past and present. A ransom demand was sent to the broadband provider by someone claiming to be responsible and seeking payment. The attack proved to be deeply embarrassing and financially painful for the company concerned. The response of the company to the attack, which exploited a weakness in the language, SQL, used to communicate with their databases, was a textbook how-not-to. When the BBC asked CEO Dido Harding if customers’ details had been encrypted(converted into code only crackable by those with the key), she was humiliated, replying, “The awful truth is, I don’t know.” Twenty-five percent has been wiped off the value of the company since the debacle began as traders dumped the stock. Speculation as to who could have been responsible was rife: Fingers were pointed at everybody from gangs of Russian criminals to Chinese government agencies, although the question of why the Chinese would make such a sally in the week that the president of China, Xi Jinping, had been treated to a glittering […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Kid, 15, Is Prime Suspect in Talk Talk Data Hack Affecting Millions appeared first on National Cyber Security.

View full post on National Cyber Security

Page 1 of 612345»...Last »

My Twitter

  • Cyber Security News Today is out! https://t.co/poG45LHzAB @gregorydevans #hacker
    about 5 hours ago
  • RT @GregoryDEvans: Another Case in Which a School District Is Found Not Liable for Student Bullying – The S https://t.co/5UluSvGpAz #securi…
    about 11 hours ago
  • RT @GregoryDEvans: Credit card skimmer found at another Butler County gas station https://t.co/jNAtDEg9IB https://t.co/81WRi2ilAd
    about 22 hours ago
  • RT @GregoryDEvans: #galaxylife #samsung4life Another hospital’s been hacked, this time in Kansas https://t.co/yp5ZdYYQwb
    about 22 hours ago
  • RT @GregoryDEvans: Cyber Security Takes Centre Stage in UK Government’s Strategy https://t.co/6EFGzftlQE #security #hacker #HTCS
    about 1 day ago

AmIHackerProof.com By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans