blog trackingRealtime Web Statistics Miss. Archives - Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘Miss.’

Hacker arrested for Hacking into Miss USA 2013’s Computer

Abraham a California college student hve been arrested by law enforcement for hacking into 100s of girls computer and forcing them to come naked at webcam , the hacker also hacked into miss Teen USA 2013 and stolen her nude photos from her computer. hacker have been sentenced 18 months jail in federal prison. the news came in high light when young beauty queen Cassidy wolf (Miss teen USA2013) step forward and said Jared James Abrahams who was her ex class mate force her to come at webcam otherwise he will leak her photos.
Abrahams, 20, pleaded guilty for hacking into Cassidy Wolf’s computer user a
Eisner said Abrahams’ parents also spoke at the hearing, asking the judge to take into account their son’s age and struggles with Asperger’s syndrome.
“Certain people are motivated by different things, and Jare”RAT”

View full post on Who Got Hacked (WGH) – Latest Hacking News and Security Updates

Sextortion Photos Of Miss Teen USA Indicate Troubling Trend, Cyber Experts Say

  Sextortion photos of the Miss Teen USA winner point to what cybercrime experts say is a disturbing trend — even people who are careful to protect themselves and don’t keep incriminating photos or information are now at risk. FBI agents that uncovered the scheme against Miss Teen USA Cassidy Wolf said that the hacker
[continue reading…]

For more information go to, http://www., or

View full post on National Cyber Security

Playboy’s Playmate Miss February 2013 Shawn Dillon | Behind the Scenes

Browse Shows: Watch Now: Get to know Playboy’s Playmate Shawn Dillon behind the scenes only on Playboy TV.

________________________ – – –

7 Dating Tips from Little Miss

Singles dating site Singles Warehouse top 7 tips whilst dating. From one of our bloggers Little Miss. Read More….

View full post on Select From Our Menu

Miss. Supreme Court rules Barbour pardons valid

By Holbrook Mohr Associated Press JACKSON, Miss. — The Mississippi Supreme Court on Thursday upheld the pardons issued by former Gov. Haley Barbour during his final days in office, including those of four convicted killers who had worked at the Governor's Mansion.

Barbour, a Republican who once considered running for president, pardoned 198 people before finishing his second term Jan. 10. Of those pardoned, 10 were incarcerated at the time, including the four convicted killers and a robber who worked at the Governor's Mansion.

The five former Governor's Mansion trusties had already been released by the time Democratic Attorney General Jim Hood persuaded a lower court judge to issue a restraining order that kept the five other inmates in prison.

Mississippi Department of Corrections spokeswoman Tara Booth said those inmates will be released 48 hours after law enforcement and prosecutors are notified in the county where they were convicted.

"Once all the required notifications have been completed, the inmates will be released," she said.

Hood had challenged the pardons based on the argument that many of them didn't follow a requirement in the state Constitution to publish notices in newspapers.

In their 6-3 opinion, the Mississippi Supreme Court wrote "we are compelled to hold that _ in each of the cases before us _ it fell to the governor alone to decide whether the Constitution's publication requirement was met." The court also said it couldn't overturn the pardons because of the Constitution's separation of powers of the different branches of government.

Hood's temporary restraining order had required the trusties to check in with corrections officials every 24 hours and show up for court hearings. One of the trusties, however, Joseph Ozement moved to Laramie, Wyo., and refused to come back.

Ozement's attorney, Robert Moxley, said Thursday his client felt like "he wasn't really free until today."

"I asked him if he could do a cartwheel and he said he's too old. But he sure is pleased that it is all over. He has a very humanistic outlook on it. He said it was hard on the victims' families, it was hard on the offenders' families, but he hopes everyone can just go on with their lives," Moxley said.

Randy Walker was shot in the head in 1993 by one of the trusties who Barbour pardoned. That former inmate, David Gatlin, also fatally shot his own estranged wife as she held the couple's baby. Walker and the woman were friends.

Walker said the court's decision had been weighing heavily on his mind and now he's just trying to understand what happened.

"I just really haven't absorbed it yet," Walker said.

Hood had said the Governor's Mansion trusties and about 165 others didn't meet the requirements of the Mississippi Constitution, which says people seeking pardons must publish notices for 30 days in a newspaper.

Hood contended that if ads weren't run in daily papers every day for 30 days, or weekly newspapers once a week for five weeks, the pardons weren't valid.

Hood did not immediately respond to messages left Thursday with his spokeswoman.

In the end, the Supreme Court said it was up to the governor to decide if the pardoned inmates did what they were supposed to do. In addition to the pardons issued in his final days in office, Barbour also granted medical release and conditional clemency to some inmates, but they weren't required to give public notice of their release. Copyright 2012 Associated Press

View full post on PoliceOne Daily News

View full post on National Cyber Security

Big Data approach pinpoints malware that other solutions miss

Last month, in preparation for a panel, I was asked to put together a list of pros and cons with respect to using Big Data techniques in the context of information security technologies. While Big Data has benefits that span many security disciplines, it’s important to look at this from the perspective of what we call Advanced Malware Protection, which is the ability to discover, analyze and block advanced malware.

With that context in mind, let’s look at the “pros” of Big Data.

Pro #1: Security is often about detecting anomalies, and to do so, you need to have a full spectrum view that you typically can only get if you have enough data to know what constitutes “normal” versus “abnormal”.

Nowadays, you infrequently see the same piece of malware on a large number of machines. Furthermore, malware is highly ephemeral. In fact, about three quarters of the malware we see has a lifetime of zero — the first time we see it in the wild is the same as the last time we see it. From the perspective of these metrics, malware behaves aberrantly. A Big Data approach helps to better pinpoint malware that other solutions miss.

Pro #2: The goal with many information security solutions is to translate “back-office intelligence” into “customer-facing protection”. In recent years, the amount of back-office intelligence security firms are dealing with has grown tremendously (e.g., growth of malware samples, large volumes of sensor data, etc.). Big Data techniques lend themselves nicely to this domain.

When people talk about using big data in the context of information security, the emphasis is typically on correlating a plethora of information sources to provide more intelligent decision-making capabilities. However, being able to speed up existing operations is especially critical and is a place where big data techniques can also help. Given the highly ephemeral nature of modern malware, eliminating data flow bottlenecks is a necessity rather than a nicety.

Pro #3: To make the most accurate (security) decisions, we need to take advantage of all the intelligence available to us — from sensors, logs, user activity, etc. Big Data techniques can be used to extract the most value from this wealth of information.

The right kind of solution doesn’t just concern itself with processing samples like a typical security vendor tries to do. Rather, it looks at numerous data sources and provides useful intelligence back to our customers. It should look at which systems a given file has touched, what we know about those systems, when those systems encountered the file, how the file got on that system and so on.

Pro #4: Big Data techniques are also useful in doing more broad visualization of security-related metrics. Having a big picture understanding can help identify root causes to problems. In contrast, many “traditional” approaches only address symptoms.

Data visualization is an important part of data analytics. With visuals, it’s easy to spot larger trends. For example, in the case of an enterprise, just knowing that 1,000 systems have been infected is nice. But, this type of knowledge alone may not be sufficient for identifying what actions you need to take. With a visual, you may be able to spot underlying patterns. For example, suppose the majority of these infections come from a single remote office. Or perhaps a handful of users are responsible for the lion’s share. These patterns can indicate root causes that, if remedied, can mitigate the risks of future outbreaks.

Pro #5: Big Data techniques can lead to entirely new sets of security capabilities.

Ultimately, Big Data techniques are all about trying to extract the most useful knowledge from a large data set. The premise is that correlating data coming from different sources yields a more accurate view of the underlying threat landscape. With such a view in place, we may now be able to act on these new insights automatically. The result is a novel set of security capabilities that can significantly reduce risks enterprises face to their security assets.

With this marriage of Big Data and security, I believe we are only scratching the surface in terms of the benefits.

Photo Credit: almagami/Shutterstock

Zulfikar Ramzan is a chief scientist for Sourcefire, a world leader in intelligent cybersecurity solutions, focused on transforming the way global mid- to large-size organizations and government agencies manage and minimize network security risks.

Article source:

View full post on National Cyber Security » Virus/Malware/Worms

HTCS1: Weight Loss Product That Works Great, Don’t Miss Out!

HTCS1: Weight Loss Product That Works Great, Don’t Miss Out!

View full post on Twitter / HTCS1

HTCS1: Hackers try but can’t quite infiltrate U.S. infrastructure but miss the mark. Read more at

HTCS1: Hackers try but can’t quite infiltrate U.S. infrastructure but miss the mark. Read more at

View full post on Twitter / HTCS1

2 charged in death of Miss. officer

Author: PoliceOne Senior Editor Doug Wyllie

By Emily Wagster Pettus Associated Press

JACKSON, Miss. — Two men, including a convicted sex offender from Colorado, have been charged with capital murder in a high-speed crash that killed a Mississippi police officer.

Grenada County Sheriff Alton Strider said on Monday that authorities believe the driver was 20-year-old Kyle David Wendt, of Colorado Springs who has a record as a sex offender in that state. He said the passenger was 40-year-old Thomas Leland Lee, a New Orleans native whose last home address was in West Monroe, La.

Grenada Police Capt. John Wayne Haddock on Friday was hit when he was putting out spike strips to pop the tires of the car Wendt was driving. Lee and Wendt were wanted in a church burglary. Haddock died at the scene on Mississippi Highway 8 near the intersection of Interstate 55.

Haddock’s funeral is Tuesday in Grenada, a town of about 13,000 residents halfway between Jackson, Miss., and Memphis, Tenn.

The two suspects were injured and airlifted to a hospital in Memphis. Strider said they had cuts and bruises but no broken bones.

They were booked into the Grenada County Jail on Saturday and also charged with burglary and felony fleeing, Strider said. They made an initial court appearance Monday and were expected to get court-appointed attorneys, he said.

Strider said Wendt initially gave officers a false name, but they tracked his identity through his fingerprints and found his record.

The Colorado Bureau of Investigation website shows Wendt was convicted in 2010 of sex assault on a child. The site says he sometimes uses the names "Raider" or "Harry Potter."

Copyright 2011 Associated Press

View full post on PoliceOne Daily News

View full post on National Cyber Security

Gergory Evans

Gregory Evans | LinkedIn

Interview With Gregory Evans

Gregory Evans Security Expert

Gregory Evans on Cyber Crime

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?

Find Out More, Click Here!