blog trackingRealtime Web Statistics Online | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘Online’

Online Casinos Connected to Individuals Arrested in Pump-and-Dump Penny Stocks Scheme

Source: National Cyber Security – Produced By Gregory Evans

This past Tuesday, federal officials announced that four men had been arrested based on an investigation in to a pump and dump penny stock scheme as well as Bitcoin operation. After the announcement of the arrests, with the individuals being from Florida and Israel, the iGambling community has been able to connect two of the arrested men as the owners of as many as 13 online casinos. Included in the long list of casinos are Casino Titan and Loco Panda. The New York Times described the fake investment scheme as one that spanned across three continents and included operations in Florida and New York, along with Russia, Cyprus and Israel. Israeli authorities arrested Ziv Orenstein and Gerry Shalon, the two men connected to the online gaming websites. The FBI would like to extradite the two men to face charges in the US despite the fact the two are citizens of Israel. A fifth man is still wanted by police, Joshu S. Muel Aaron, as he is believed to be involved in the scheme as well. The individuals arrested now face charges that include: Securities Fraud Wire Fraud Aggravated Identity Theft Conspiracy to Commit Securities Fraud Conspiracy to Commit Wire Fraud […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Online Casinos Connected to Individuals Arrested in Pump-and-Dump Penny Stocks Scheme appeared first on National Cyber Security.

View full post on National Cyber Security

Hack of dating sites signals an end to promiscuous use of online identity

Source: National Cyber Security – Produced By Gregory Evans

If anybody is still labouring under the mistaken belief that anything online can remain private and secure, this week should have seen them finally admit defeat. In the US, UCLA Health reported) that 4.5 million health records had been compromised. UCLA Health runs four hospitals and 150 offices in Southern California, based at the University of California and Los Angeles. The security breech joins a long list of recent hacks of health insurance, and health services, companies, including that of health insurance company Anthem that had up to 80 million customer records illegally accessed earlier this year. More poignantly, and also this week, international dating site Ashley Madison admitted that hackers had accessed its systems and stolen details of its 37 million customers. The particular twist in this hack is that the site encouraged people in existing relationships to “cheat” on their partners and have casual affairs. Amongst information stolen by the hackers were details of customers’ sexual fantasies, which the hackers threatened to publish if demands to close down the site completely were not met. Companies that have been hacked normally follow up these events by announcing the increased security measures that they have taken, including hiring dedicated security […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hack of dating sites signals an end to promiscuous use of online identity appeared first on National Cyber Security.

View full post on National Cyber Security

THREE REAL ONLINE DANGERS YOU NEED TO WORRY ABOUT

Source: National Cyber Security – Produced By Gregory Evans

There’s no shortage of panic-inducing security news, such as flaws in web encryption that could allow attackers to slurp up your banking information. Then there are the proof-of-concept attacks. Security researchers seem to find hacks for every new Apple product within days, such as making a cast of someone’s fingerprint with glue to fool the iPhone’s Touch ID sensor. But sensational attacks require a lot of work, and luck. Hackers save them for giant corporations and governments, not individuals or small companies. “It’s interesting to read the stories, but you don’t really need to worry abut an elite squad of cyber soldiers going after your machine,” says Patrick Nielsen, senior security researcher at antivirus company Kaspersky, and one of four security experts I spoke with to sort the media hype from the real dangers out there. All four had similar answers when I asked them to name the main security threats. The biggest dangers I culled from their input are data breeches, unsafe Wi-Fi networks, and mass-distributed malware that takes over a computer. 1. PERSONAL INFORMATION BREECHES In December 2013, hackers stole credit and debit card numbers of about 40 million customers from Target. In February 2015, health insurer Anthem […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post THREE REAL ONLINE DANGERS YOU NEED TO WORRY ABOUT appeared first on National Cyber Security.

View full post on National Cyber Security

Hackers attack online dating site Ashley Madison

Source: National Cyber Security – Produced By Gregory Evans

Online dating site Ashley Madison, which specialises in adultery and has the tagline “Life is short. Have an affair”, has been the victim of a cyber attack. A group calling themselves The Impact Team claims it has complete access to Ashley Madison’s database of more than 37 million members, as well as financial records and other personal information that it is threatening to publish online unless the site closes. The group has also compromised two other dating sites; Cougar Life and Established Men, that are owned by the same parent company; Avid Life Media (ALM). The hackers said in a statement: “Avid Life Media has been instructed to take Ashley Madison and Established Men offline permanently in all forms, or we will release all customer records, including profiles with all the customers’ secret sexual fantasies and matching credit card transactions, real names and addresses, and employee documents and emails. The other websites may stay online.” The hackers’ main issue with the controversial site appears to be a leavers’ fee that Ashley Madison charges users. The site offers a “full delete” of data for £15 should a user choose to leave the service permanently. Although it is possible to be anonymous […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hackers attack online dating site Ashley Madison appeared first on National Cyber Security.

View full post on National Cyber Security

Online cyber crime forum taken down by FBI

Source: National Cyber Security – Produced By Gregory Evans

A prominent online forum dedicated to products and services used to commit cyber crime has been dismantled following an international law enforcement operation, the National Crime Agency (NCA) said. Darkode.com, a site open only to those deemed to have the right levels of cyber and criminal expertise, was taken offline yesterday by the FBI. At the same time, 28 arrests were made around the world, bringing the total number of people arrested for suspected offences linked to the site to 70, across 20 countries. A 26-year-old man from Coventry was arrested by the West Midlands Regional Organised Crime Unit. He was questioned and subsequently bailed pending further inquiries, the NCA said. Officers from Police Scotland searched an address in Paisley and removed material for examination. Five other people believed to have been members of Darkode have previously been arrested by officers from the NCA’s National Cyber Crime Unit, which has led and coordinated the UK element of the operation. They are a 26-year-old man from Biggin Hill, Kent, arrested in November 2013; a 25-year-old man from Caterham, Surrey, arrested in July 2014; a 20-year-old man from Barking, Essex, arrested in July 2014; a 23-year-old man from Marlborough, Wiltshire, arrested in […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Online cyber crime forum taken down by FBI appeared first on National Cyber Security.

View full post on National Cyber Security

Global hunt for cyber criminals behind online black market

Source: National Cyber Security – Produced By Gregory Evans

High quality global journalism requires investment. Please share this article with others using the link below, do not cut & paste the article. See our Ts&Cs and Copyright Policy for more detail. Email ftsales.support@ft.com to buy additional rights. Seventy people across the globe have been charged or face search warrants in connection to the online hacking marketplace Darkode, which has been shut down in an investigation that spanned 20 countries in the largest takedown of a cyber crime forum. Darkode was used by cyber criminals as a black market for credit card data, hacking tools, ransomware, email addresses and other information useful in targeting individuals, companies and governments. High quality global journalism requires investment. Please share this article with others using the link below, do not cut & paste the article. See our Ts&Cs and Copyright Policy for more detail. Email ftsales.support@ft.com to buy additional rights. h Of the 70 people wanted in relation to Darkode, 28 have been arrested and 12 are facing charges in the US. A notice on darkode.com on Wednesday said the domain and website had been seized by the FBI and the US attorney’s office in Pittsburgh. “Of the roughly 800 criminal internet forums worldwide, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Global hunt for cyber criminals behind online black market appeared first on National Cyber Security.

View full post on National Cyber Security

Unidentified Hacker Puts Digital Eavesdropping Software’s Client List Online

Source: National Cyber Security – Produced By Gregory Evans

HackingTeam, an Italian company that helps law enforcement hack into digital networks, has apparently been hacked itself. Client lists, emails and other documents purportedly belonging to HackingTeam were posted online Sunday by an anonymous hacker. HackingTeam technology extracts sensitive information off computers before the data can be encrypted. The company has claimed its software can log keystrokes and spy on a computer user’s actions. The Drug Enforcement Administration and the Pentagon are customers of HackingTeam’s digital eavesdropping technology, according to London-based Privacy International. The leaked documents say the United Arab Emirates, South Korea, Chile and several other governments are customers too. Law enforcement and spy agencies tend to be tight-lipped about the tools they acquire to track suspects and targets, but the lens into HackingTeam could confirm the suspicions of civil rights advocates, who’ve called for greater transparency and more restrictions related to the surveillance. HackingTeam did not immediately respond to requests for comment on the matter. Source: Government Technology

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Unidentified Hacker Puts Digital Eavesdropping Software’s Client List Online appeared first on National Cyber Security.

View full post on National Cyber Security

Low-tech ways you can protect your privacy online

Source: National Cyber Security – Produced By Gregory Evans

espite the seemingly endless hack attacks, and a recent Pew study showing that Americans feel powerless to protect themselves against intrusions on their online privacy, few Americans do much in the way of adopting privacy enhancing measures. But one privacy advocate has some advice: Do it. “Resistance is not futile if you are not aiming for 100-percent perfection,” says Nico Sell, co-founder of encrypted messaging service Wickr and organizer of hacker conference Def Con. Here are some low-tech tips to reduce your digital footprint and exposure. Self Censor: Search The problem: Search engines such as Google have built their business models on selling keywords from user searches to advertisers, so searches are never private. The solution: Don’t ask Google anything you would not be comfortable sharing publicly—with your boss, lover or worst enemy. By self-censoring, you limit the information Google can sell advertisers. For highly sensitive searches, for example, health queries, go offline and ask your doctor. Another option? Avoid searching on Google altogether, says Adi Kamdar, an activist with the non-profit Electronic Frontier Foundation. “You could also use search tools that don’t collect data about you, such as DuckDuckGo.” Looking for an alternative to Gmail? Protonmail is a freemium […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Low-tech ways you can protect your privacy online appeared first on National Cyber Security.

View full post on National Cyber Security

Nude Photos of Hundreds of Aussie Women Shared Online Without Consent

Source: National Cyber Security – Produced By Gregory Evans

Images of over 700 women from Brisbane and nearby areas, either scantily-clad or in the nude, have been shared online without owners’ consent by an individual who hosted the cache in a cloud storage service. The hacker made multiple attempts to keep the data online and first published them on Friday on a forum. On Monday morning, the photos were taken down but reappeared by the evening. Hacker is determined to share the photos For easy distribution, the cache was uploaded to a file sharing service whose name remains undisclosed. Brisbane Times reports that the business is based in New Zealand, which should make it easy to identify it. The police intervened on Tuesday to take the photos down a second time, but it looks like the individual is adamant on sharing them, promising that they would end up on websites on the Deep Web, a part of the Internet designed generally for anonymity, that is not indexed by search engines and it is not accessible via regular web browsers. Although the Deep Web was created with honorable intentions (protecting privacy of the users like political activists or journalists), it also functions as an online dark alley where illegal businesses […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Nude Photos of Hundreds of Aussie Women Shared Online Without Consent appeared first on National Cyber Security.

View full post on National Cyber Security

Beware cyber crooks as you post information online

Source: National Cyber Security – Produced By Gregory Evans

Did you know that by accepting Facebook requests from people you do not know and have no mutual friends with puts you and your loved ones at the risk of cyber crime? By including your personal information such as where you live, where you work and other personal information such as home and postal addresses and phone numbers, leaves you exposed to cyber crime? By definition, cyber crime is defined as crime conducted via the Internet or some other computer network. Global IT company, Cyber Roam, states that cyber criminals use social media not only to commit crime online, but also for carrying out real world crime owing to over-sharing across the different social platforms. For instance, if someone wanted to kidnap or attack you, they could simply go to your Facebook wall to fetch your information, including your photos. You, on the other hand, would have probably posted a status such as, ‘Leaving work in 10 minutes time,’ or ‘too tired…heading to a bar for a drink or two!’ and the post could also include your location. That makes you, and the millions of people around the world who update such statuses, an easy target of cyber crime. Norton […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Beware cyber crooks as you post information online appeared first on National Cyber Security.

View full post on National Cyber Security

Page 1 of 4512345»102030...Last »

My Twitter

Gregory D. Evans On Facebook