blog trackingRealtime Web Statistics Private Archives - Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘private’

FBI BREAKS CYBERCRIME BARRIERS WITH PRIVATE PARTNERSHIPS

Source: National Cyber Security – Produced By Gregory Evans

When you think of the city making the most strides in the fight against cybercriminals, Pittsburgh, Pennsylvania, may not be the first place that comes to mind. But the city has fostered a unique collaboration between private companies and federal agencies, known as the National Cyber-Forensics & Training Alliance (NCFTA), which has helped to break down barriers and solve some landmark cybercrime cases, The Wall Street Journal reported late last week. Recently, federal agents operating out of Pittsburgh were responsible for taking down Darkode, which was said to be one of the most sophisticated cybercrime forums online. By tapping into the information and resources of private companies, the field agents and investigators can work alongside the employees of banks and other businesses to identify cyber threats. “You can’t build a wall between us and private industry…and expect them to open their books and doors to you,” Scott Smith, head of the FBI’s Pittsburgh division, told WSJ. The NCFTA collaboration, which was established in the early 2000s, has really become a win-win for both sides, especially for the private sector which has limits law enforcement does not, such as the ability to obtain court orders for prosecuting cybercrime suspects or seizing […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post FBI BREAKS CYBERCRIME BARRIERS WITH PRIVATE PARTNERSHIPS appeared first on National Cyber Security.

View full post on National Cyber Security

Good News: China Was Hacking and Reading U.S. Government Email When Hillary Was Using Unsecure, Private Server

Source: National Cyber Security – Produced By Gregory Evans

Good news, everyone. According to anew report from NBC, Chinese cyber attackers were hacking and reading email belonging to U.S. government officials between 2010 and 2014 (and that’s just what we know about) under the code name “dancing Panda.” Hillary Clinton, who was Secretary of State between 2009 and 2013, made their efforts really easy through her use of a private, unsecure email server at the time. Keep in mind, the FBI is currently conducting a criminal investigation into whether Clinton sent or received classified information on her private system. Clinton was certainly sending highly sensitive government information through her private account and the Chinese likely read it all. China’s cyber spies have accessed the private emails of “many” top Obama administration officials, according to a senior U.S. intelligence official and a top secret document obtained by NBC News, and have been doing so since at least April 2010. The email grab — first codenamed “Dancing Panda” by U.S. officials, and then “Legion Amethyst” — was detected in April 2010, according to a top secret NSA briefing from 2014. The intrusion into personal emails was still active at the time of the briefing and, according to the senior official, is […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Good News: China Was Hacking and Reading U.S. Government Email When Hillary Was Using Unsecure, Private Server appeared first on National Cyber Security.

View full post on National Cyber Security

Private Investigator faces Jail for Hacking

Source: National Cyber Security – Produced By Gregory Evans

What a disgrace: A private investigator, Eric Saldarriaga, 41, got nailed for hacking into peoples’ e-mails. He may get six months in the can. Is six months reasonable for this, though? A recent online New York Times article quotes a prosecutor who points out that hackers could be deterred by the threat of harsh penalties—because the mind of a hacker operates with a lot of thinking, vs. the mind of someone who impulsively pulls out a gun or knife. So what did Saldarriaga do exactly? He paid an overseas company to get the login information for e-mail accounts: a hacker-for-hire deal. His clients included lawyers and other private investigators. He was known for gaining access to e-mail accounts without the user’s knowledge, so this is why he got some of his cases in the first place. Breaking into e-mails is a serious crime because it can involve the accounts of big companies, revealing their trade secrets and other classified information. One of Saldarriaga’s victims was journalist Tony Ortega, who has spent about 20 years writing about Scientology. Ortega believes that this controversial church’s reps hired Saldarriaga to get information about Ortega. Ortega, as well as possibly most of the other […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Private Investigator faces Jail for Hacking appeared first on National Cyber Security.

View full post on National Cyber Security

Feds Violate Data Breach Reporting Requirements They Would Impose on Private Companies

Source: National Cyber Security – Produced By Gregory Evans

The federal government’s Office of Personnel Management apparently discovered in April amassive security breach of its systems in which the personally identifiable information at least 4 million government employees was rifled through by Chinese government hackers. The OPMwaited at least two months — that would be more than 60 days — to begin notifying current and former federal employees of the breach. Now, CNN is reporting that the hackers may have accessed personal information of 18 millioncurrent and former government employees. Earlier this year the Obama Admininstration proposed the Personal Data Notification & Protection Act which, among other things, would require any business … …that uses, accesses, transmits, stores, disposes of or collects sensitive personally identifiable information about more than 10,000 individuals during any 12-month period shall, following the discovery of a security breach of such information, notify any individual whose sensitive personally identifiable information has been, or is reasonably believed to have been, accessed or acquired, unless there is no reasonable risk of harm or fraud to such individual. Unless the business can demonstrate reasons for delay, they must inform customers about the security breach within 30 days of discovering the intrusion. To be fair, the data protection act does […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Feds Violate Data Breach Reporting Requirements They Would Impose on Private Companies appeared first on National Cyber Security.

View full post on National Cyber Security

Expert: People Need to Know their Data is Private

Source: National Cyber Security – Produced By Gregory Evans

Most people do not realize how much their data is being used for purposes they do not understand, internationally renowned security technologist Bruce Schneier told Arutz Sheva on the sidelines of the fifth annual International Cybersecurity Conference in Tel Aviv. “Largely, I think surveillance is bad,” Schneier said, adding that surveillance is leading to a world where people are losing their abilities to speak their mind without their thoughts being recorded, “and that’s very dangerous. I’m not convinced we really understand the implications”. At the same time, Schneier said, it is difficult to give up their cellphones or e-mail addresses because these are the “tools of modern life”. “What I want to see is more agitation for strong privacy laws,” he added. “People really need the ability to know their data is private.” Source: Israel National News

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Expert: People Need to Know their Data is Private appeared first on National Cyber Security.

View full post on National Cyber Security

Hillary Clinton’s use of private email address while secretary of state draws scrutiny

Source: National Cyber Security – Produced By Gregory Evans

Former Secretary of State Hillary Clinton used a personal email account to exclusively conduct official business during her time at the State Department, a move that raises questions about access to the full archive of her correspondence, as well as the possibility that she violated federal law requiring official messages to be retained for the record. The existence of the account was discovered by the House select committee investigating the deadly 2012 attacks on the U.S. Consulate in Benghazi, Libya, and was first reported by The New York Times. Clinton did not even have a government email address during her tenure as America’s top diplomat, which lasted from 2009 to 2013, and The Times reports that her aides took no action to preserve her emails on department servers, as required by the Federal Records Act. Instead, the paper reports, Clinton’s advisers selected which of her emails to turn over to the State Department for archival purposes after going through tens of thousands of pages of correspondence. The department said late Monday that it had received 55,000 pages of Clinton’s emails as part of a request made to previous secretaries of state to turn over any official documents they may have […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hillary Clinton’s use of private email address while secretary of state draws scrutiny appeared first on National Cyber Security.

View full post on National Cyber Security

Hacker busted for cracking private, government networks did so with ease

MANCHESTER, Ky. (AP) — Cocaine dealers, bank robbers and carjackers converge at Manchester Federal Prison in rural Kentucky — and then there is Jeremy Hammond, a tousle-haired and talented hacker whose nimble fingers have clicked and tapped their way into […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Singapore’s Kbox drops the ball on customers’ private data.

Singapore’s Kbox drops the ball on customers’ private data.

Are you a karaoke aficionado? More importantly, are you a member of karaoke entertainment operator K Box Singapore? If so, you might be one of the 317,000 members’ whose private information got leaked out publicly earlier today. According to a […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Google Drive Vulnerability Leaks Users’ Private Data

Another privacy issue has been discovered in Google Drive which could have led sensitive and personal information stored on the cloud service exposed to unauthorized parties. The security flaw has now patched by Google, but its discovery indicates that the vulnerability of cloud data when accessed via a link can allow “anyone who has the link” to access your private data without any

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Private Cloud Security: How Your Data Security Changes in The Cloud


Online Tech’s Jason Yaeger talks about data security in the cloud.

________________________

http://gregorydevans.com – http://gregorydevans.wordpress.com – http://hackerforhire.com – http://hackerforhireusa.com

Page 1 of 512345»

My Twitter

Gregory D. Evans On Facebook