blog trackingRealtime Web Statistics Sensitive Archives - Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘Sensitive’

A hacker cartel is using a mysterious Flash vulnerability to steal sensitive business data

Source: National Cyber Security – Produced By Gregory Evans

Hackers are using a mysterious, as yet undiscovered, Flash vulnerability, to steal sensetive business data from Macbook and Windows users, according to researchers at Kaspersky Lab. Kaspersky Lab revealed the campaign in a threat advisory, warning a hacker group, known as Wild Neutron is using the “unknown Flash Player exploit” to infect companies and private web users with a data siphoning malware. “The initial infection vector from the 2014-2015 attacks is still unknown, although there are clear indications that the victims are exploited by a kit that leverages an unknown Flash Player exploit,” read the advisory. The attacks have reportedly targeted businesses involved in law, the Bitcoin cryptocurrency, investment, IT, healthcare, and real estate. Known targets have been detected in France, Russia, Switzerland, Germany, Austria, Palestine, Slovenia, Kazakhstan, UAE, Algeria, and the United States. Kaspersky Lab director of global research and analysis team Costin Raiu said Wild Neutron’s wide range of targets is atypical and indicates the attackers are significantly more advanced than most cyber crime groups. “The group’s targeting of major IT companies, spyware developers (FlexiSPY), jihadist forums (the ‘Ansar Al-Mujahideen English Forum’) and Bitcoin companies indicate a flexible yet unusual mindset and interests,” he said. The Kaspersky researchers said […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post A hacker cartel is using a mysterious Flash vulnerability to steal sensitive business data appeared first on National Cyber Security.

View full post on National Cyber Security

How to protect sensitive business data and mitigate the risk of mobile malware


Halifax, Nova Scotia – Information technology supervisor explains cell phone restrictions in secure areas. Episode 333 For more information on the Canadian A…

________________________

http://gregorydevans.com – http://gregorydevans.wordpress.com – http://hackerforhire.com – http://hackerforhireusa.com

Two Colombian government employees arrested for selling sensitive information

Mark Rockwell Top Priority Sector:  border_security A former prosecutor and a clerk in Colombia’s office of attorney general have been arrested for selling sensitive information about U.S. narcotics prosecutions in New York. The two Colombian nationals were arrested on Nov. 16 in Bogotá and charged with obstruction of justice, said U.S. Immigration and Customs Enforcement’s […]

View full post on The Cyber Wars

NASA says no sensitive information breached in Unknowns hack

NASA acknowledged an attack on one of its websites by “The Unknowns,” a group that has been publicly trickling information on websites it has hacked over the last few weeks.

View full post on Techworld.com security

View full post on National Cyber Security » Computer Hacking

ProtectMyID: Beyond #buttdials, your #smartphone has a big mouth. Take steps to ensure you don’t leave a trail of sensitive info. http://t.co/wI796BBU

ProtectMyID: Beyond #buttdials, your #smartphone has a big mouth. Take steps to ensure you don’t leave a trail of sensitive info. http://t.co/wI796BBU

View full post on Twitter / ProtectMyID

View full post on National Cyber Security

Syria Blocks Protesters’ Text Messages Containing Sensitive Terms

Like us on Facebook

By narrowing down modes of communications with filters, the government has effectively minimized protesters’ ability to organize and fuel dissent.

However, AdaptiveMobile has denied any involvement in the human rights violations carried out using its equipments.

In a statement to TheJournal.ie, AdaptiveMobile refuted the Bloomberg report and said that it never had a relationship, provided services or engaged with the Syrian government or associated organizations.

The Irish company, distancing itself from the controversy, said that it “does not condone the unlawful use or abuse of any software and/or technology and condemns any abuse of telecommunications networks to abridge human rights.”

Cellusys, meanwhile, said it is unaware of how its equipments are put to use by the Syrian government.

“Once they have the systems, they control it,” Cellusys CEO Dawood Ghalaieny told Bloomberg. “If it is used for something else, there is not much that can be done,” he said.

To report problems or to leave feedback about this article, e-mail:
To contact the editor, e-mail:

Article source: http://www.ibtimes.com/articles/299588/20120216/syria-blocks-protesters-text-messages-containing-sensitive.htm

View full post on National Cyber Security » Spyware/ Cyber Snooping

ProtectMyID: Is your WiFi secure? If not, an #identitythief could slip into your network and poach sensitive info. http://t.co/khxRjQHJ #cybersecurity

ProtectMyID: Is your WiFi secure? If not, an #identitythief could slip into your network and poach sensitive info. http://t.co/khxRjQHJ #cybersecurity

View full post on Twitter / ProtectMyID

View full post on National Cyber Security

ProtectMyID: Is your WiFi secure? If not, an #identitythief could slip into your network and poach sensitive info. http://t.co/khxRjQHJ #cybersecurity

ProtectMyID: Is your WiFi secure? If not, an #identitythief could slip into your network and poach sensitive info. http://t.co/khxRjQHJ #cybersecurity

View full post on Twitter / ProtectMyID

View full post on National Cyber Security

ProtectMyID: Need a last-minute gift? Give the gift of protection – a cross-cut shredder. @ITRCSD says it’s perfect for destroying sensitive documents.

ProtectMyID: Need a last-minute gift? Give the gift of protection — a cross-cut shredder. @ITRCSD says it’s perfect for destroying sensitive documents.

View full post on Twitter / ProtectMyID

View full post on National Cyber Security

Lax security blamed for 100,000+ sensitive files found on Manning’s PC

The fourth pretrial hearing for Army Pfc. Bradley Manningday put the spotlight on more than 100,000 sensitive documents and conversation logs between Manning. This case raises the question of how organisations can contain the considerable risk presented by rogue employees? Lax security blamed for 100,000+ sensitive files found on Manning’s PC, Blog, Security, Found, files, Sensitive, blamed, Manning’s, 100000+

View full post on Naked Security — Sophos

View full post on National Cyber Security

Page 1 of 212»

My Twitter

Gregory D. Evans On Facebook