blog trackingRealtime Web Statistics Says Archives | Page 5 Of 39 | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant - Part 5

Posts Tagged ‘says’

Anonymous says to ISIS: ‘War is unleashed’

Source: National Cyber Security – Produced By Gregory Evans

Anonymous says to ISIS: ‘War is unleashed’

The hacking group Anonymous redoubled its cyberwar against the Islamic State (IS) “to defend our values and our freedom” after Friday’s terrorist attacks in Paris, which killed 129 civilians as they enjoyed a soccer match, dinner at a café or a rock concert. A number of videos from Anonymous-affiliated accounts appeared online this weekend in French, Italian, and English, with presenters wearing the hacking collective’s signature Guy Fawkes mask. “We are going to launch the most important operation ever carried out against you,” a robed figure warns in one video, as news footage of the attacks plays in the background. “War is unleashed. Prepare yourselves.” Source: http://www.csmonitor.com/World/Global-News/2015/1116/Anonymous-says-to-ISIS-War-is-unleashed

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Anonymous says to ISIS: ‘War is unleashed’ appeared first on National Cyber Security.

View full post on National Cyber Security

A ‘most private place’: Trust Google with your data above government bodies, says Alphabet’s Eric Schmidt

Source: National Cyber Security – Produced By Gregory Evans

A ‘most private place’: Trust Google with your data above government bodies, says Alphabet’s Eric Schmidt

Google is the “safest and most private place” to store data, Alphabet Inc. executive chairman Eric Schmidt said this week as he addressed privacy concerns over data collected by Google’s machine- learning mechanisms. Machine learning is a branch of computer science in which algorithms are constructed to learn from data and make more accurate predictions over time. Google uses such mechanisms in a variety of its services, including improving its search engine services, filtering spam in Gmail and classifying users’ photos in its Google Photos app. “We work very hard to keep people’s data private and to give [them] control over it,” Schmidt said during a live video conference with reporters in Tokyo on Tuesday. “You can control what Google keeps of you … and we keep your data protected using incredibly powerful encryption.” Schmidt also condemned government hacking of technology companies, adding that Google is a safer place to entrust your data than government agencies or bodies. “We are upset that it appears that the US government and the Chinese government … have attacked computer companies without permission,” said Schmidt. Source: http://www.scmp.com/tech/enterprises/article/1877771/most-private-place-trust-google-your-data-above-government-bodies

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post A ‘most private place’: Trust Google with your data above government bodies, says Alphabet’s Eric Schmidt appeared first on National Cyber Security.

View full post on National Cyber Security

U.S. credit card firms ought to adopt biometrics over PIN, says Michigan senator

Source: National Cyber Security – Produced By Gregory Evans

U.S. credit card firms ought to adopt biometrics over PIN, says Michigan senator

U.S. credit card firms ought to adopt biometrics in order to surpass the security standards of their European counterparts rather than simply catching up, according to a report by Fedscoop. Peters’ remarks come at a time when the chip-embedded credit cards rolling out in the U.S. fall short of the security features of credit cards in Europe. “Chip and signature [cards] … are actually behind where the Europeans and others [are], and we’ll probably leapfrog over that technology very rapidly to get into biometrics and other kinds of security measures,” said Michigan Senator Peters, who co-founded the Senate Payments Innovation Caucus earlier this year. Credit card firms in the U.S. have only recently been swapping out the old magnetic strip cards with new microchip-embedded cards, which creates a unique code for every transaction, ensuring that they are less susceptible to fraud. European credit card firms have been using this same chip technology for years. However, American chip cards simply require a signature for user verification, unlike European chip cards which opt for the more secure PIN system for authorization. Many retailers argue that chip and signature cards only partially protect consumers from fraud attacks and fail to offer any protection […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post U.S. credit card firms ought to adopt biometrics over PIN, says Michigan senator appeared first on National Cyber Security.

View full post on National Cyber Security

Mentor TalkTalk hackers, don’t criminalise them, says cyberpsychologist

Source: National Cyber Security – Produced By Gregory Evans

Mentor TalkTalk hackers, don’t criminalise them, says cyberpsychologist

Teenagers involved in online attacks such as the TalkTalk hack should be mentored rather than criminalised, to ensure society benefits from ‘their incredible skillset’, according to cyberpsychologist Mary Aiken. “As a society, do we really want to criminalise 13, 14 and 15 year olds? Or do we want to understand their behaviour, engage with their incredible skillset, mentor them and try to point them in the right direction,” she said at Web Summit this week. Police arrested a fourth individual in connection with the data breach this week: a 16-year-old boy in Norwich. It follows the arrests of three other individuals aged 15, 16 and 20 since the hack last month, which saw them steal thousands of TalkTalk customers’ personal details. Aiken suggested the focus should turn to the motivations behind such attacks, for example whether it was for profit or revenge. For example, she said, the hack on Sony last year was not motivated by the planned release of the film The Interview (which featured a plot to assassinate of Kim Jong-Un), which led many to conclude it had been orchestrated by North Korea. “If the motive was stopping the release of the movie, how come it got released […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Mentor TalkTalk hackers, don’t criminalise them, says cyberpsychologist appeared first on National Cyber Security.

View full post on National Cyber Security

Judge says evidence is strong enough to keep Daniel Heinrich in jail

An FBI special agent detailed in federal court on Wednesday why Daniel Heinrich has suddenly emerged as the “person of interest” in the disappearance of Jacob Wetterling 26 years ago.

After hearing agent Shane Ball’s testimony, U.S. Magistrate Judge Tony Leung ruled that there was sufficient evidence to continue to detain the 52-year-old Annandale, Minn., man on charges of possessing and receiving child pornography.

Leung said Ball’s distillation of the evidence “creates quite frankly a chilling context and a gravity of danger to the community.”

Ball offered no new information beyond what was contained in 57 pages of court documents released last week, but his focus on several key elements explains why Heinrich has become the prime focus of investigators in the 1989 Wetterling abduction.

Read More

The post Judge says evidence is strong enough to keep Daniel Heinrich in jail appeared first on Parent Security Online.

View full post on Parent Security Online

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan. IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year.

Source: National Cyber Security – Produced By Gregory Evans

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium -- a group of ethical hackers.   “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.”   The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director )   “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said.   As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them.   The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan.  IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year.

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium — a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium — a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan. IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year. appeared first on National Cyber Security.

View full post on National Cyber Security

Ukraine tensions could hurt international security efforts, Kaspersky says

Source: National Cyber Security – Produced By Gregory Evans

As governments all around the world are finding a peaceful solution for the political tension in Ukraine , the cyber-criminals could catch government with online attacks , warned Kaspersky Lab CEO Eugene Kaspersky. “It is good news for the local IT projects, but the international projects will have less budgeted,” says Kaspersky. “When the governments don’t talk to each other and cooperate, that damages traditional industry and economies, but also cyberspace”  They added. “It will damage global Internet projects,” he said. “Nations will be more focused on the national projects. That’s good news for the local IT companies, but … the evolution of cyberspace will slow down.” They continued. Anything that decreases trust among government can hurt such efforts, Kaspersky said. Source:http://whogothack.blogspot.co.uk/2014/04/ukraine-tensions-could-hurt.html#.VjacTfmqqko The post Ukraine tensions could hurt international security efforts, Kaspersky says appeared first on Am I Hacker Proof. View full post on Am I Hacker Proof

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Ukraine tensions could hurt international security efforts, Kaspersky says appeared first on National Cyber Security.

View full post on National Cyber Security

Impossible to kill RATs drain bank accounts dry, says BioCatch

Source: National Cyber Security – Produced By Gregory Evans

Impossible to kill RATs drain bank accounts dry, says BioCatch

Imagine a piece of malware that is practically impossible to detect and can suck a victim’s bank account dry – because it was installed by the user, and acts like any other legitimate piece of software. That is exactly what a new form of a socially-engineered RAT (Remote Access Tool) attack does – and according to Israeli financial security tech firm BioCatch, the company’s solution is the only one that can detect and prevent these attacks. The so-called RAT-in-the-Browser (RitB) attacks are relatively new, said BioCatch. They rely on social engineering to install malware such as Dyre and Dridex. Far more sophisticated than the usual scripts that monitor a user’s activities and upload data on passwords and other sensitive data to servers – activities that good cyber-defense systems can detect – the malware attacks usually include a human element, with victims instructed to call a phone number or install a remote support tool that lets fraudsters see exactly how much money a user has in their account, and monitor communications to the bank server in order to get their login data and suck their accounts dry. removed installation process ensures that cyber-security systems won’t detect the Dyre installation, since the […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Impossible to kill RATs drain bank accounts dry, says BioCatch appeared first on National Cyber Security.

View full post on National Cyber Security

‘Oversight’ causes an error HeartBleed; says it’s Developer

Source: National Cyber Security – Produced By Gregory Evans

Robin Seggelmann, a programmer based in Germany, submitted the code in an update submitted at 11:59pm on New Year’s Eve, 2011. It was supposed to enable a function called “Heartbeat” in OpenSSL, the software package used by nearly half of all web servers to enable secure connections. He says the “Heartbleed” vulnerability to the open-source code used by thousands of websites says it was an “oversight” – but that its discovery validates the methods used. His update did enable Heartbeat, but an “oversight” led to an error with major ramifications. But it accidentally created the “Heartbleed” vulnerability, which has been described as a “catastrophic” flaw which laid the contents of thousands of web servers open to hackers. Seggelmann worked on the OpenSSL project during his PhD studies, from 2008 to 2012, but isn’t involved with the project any more. It has also been discovered in Cisco and Juniper routing gear, which could mean that hackers could capture sensitive data such as passwords passing over the internet. He said that the mistake has nothing to do with its festive datestamp. “The code… was the work of several weeks. It’s only a coincidence that it was submitted during the holiday season. “I […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post ‘Oversight’ causes an error HeartBleed; says it’s Developer appeared first on National Cyber Security.

View full post on National Cyber Security

More child abuse survivors aged over 60 seeking help, support group says on Blue Knot Day

The figures have been released to mark Blue Knot Day, which aims to raise awareness of the estimated five million Australians who have suffered childhood trauma and abuse.

“We’re seeing more people in older age groups coming forward, and what we believe that relates to is the Royal Commission (into Institutional Responses to Child Sexual Abuse),” said Dr Cathy Kezelman, President of Adults Surviving Child Abuse.

“Older people who may have kept this secret their entire life are now ringing up and reaching and seeking help.

“We have people in their 80s ringing our line and saying they have never told a soul, but then hearing how it has profoundly affected their life.

Read More

The post More child abuse survivors aged over 60 seeking help, support group says on Blue Knot Day appeared first on Parent Security Online.

View full post on Parent Security Online

Page 5 of 39« First...«34567»102030...Last »

My Twitter

  • RT @GregoryDEvans: India – An Arts Education https://t.co/FvVyh47sRK
    about 16 mins ago
  • RT @GregoryDEvans: India – An Arts Education https://t.co/FvVyh47sRK
    about 17 mins ago
  • Privacy advocates rail against US Homeland Security’s Twitter, Facebook snooping https://t.co/G0N3vnJp6e #security... by @GregoryDEvans
    about 59 mins ago
  • RT @GregoryDEvans: Privacy advocates rail against US Homeland Security’s Twitter, Facebook snooping https://t.co/EH2pnBMGwB #security #hack…
    about 1 hour ago
  • RT @GregoryDEvans: Privacy advocates rail against US Homeland Security’s Twitter, Facebook snooping https://t.co/EH2pnBMGwB https://t.co/vZ…
    about 1 hour ago

AmIHackerProof.com By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans