blog trackingRealtime Web Statistics Users | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘users’

Hackers can track phone users’ location by looking at power supply

spying.si.si

Source: National Cyber Security – Produced By Gregory Evans

 Powered by Max Banner Ads Researchers have found out it is possible to track someone’s mobile phone by looking at how much battery has been used. The data does not need the users’ permission to be shared, while it can help track a phone with up to 90 percent accuracy. The findings were carried out by a group of researchers at Stanford University and the Israeli defense company Rafael. The created a technique, which they have named PowerSpy and can gather information concerning the location of Android phones. It does this by simply tracking how much power has been used over a certain time. How much power is used depends on a number of factors. For example, the further away the phone is from a transmitter, the more power is needed to get a signal. Physical objects such as mountains or buildings also have an impact on the amount of battery needed as these obstacles can block the phone’s signal, meaning there are temporary ‘power drains’ on the devices. “A sufficiently long power measurement (several minutes) enables the learning algorithm to ‘see’ through the noise,” the researchers said, which was reported by Wired. “We show that measuring the phone’s aggregate power […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hackers can track phone users’ location by looking at power supply appeared first on National Cyber Security.

View full post on National Cyber Security

Google Voices Concerns Regarding Government Warrants, Seeks to Protect Users

AH-GOOGLE-IO-2014-144

Source: National Cyber Security – Produced By Gregory Evans

 Powered by Max Banner Ads Google has joined advocacy organisations such as the ACLU in voicing their concerns about proposed Amendments to Federal Rule of Criminal Procedure 41 by sending a comment letter to The Judicial Conference Advisory Committee on Criminal Rules. This rule outlines how warrants are issued to obtain information. This rule places limitations on how and what types of warrants may be issued. More specifically it states that a judge may not issue a search and seizure warrant outside his or her jurisdiction though there are exceptions to this rule. The Advisory Committee on the Rules of Criminal Procedure wants to include new rules for conducting “remote access” searches of electronic storage media. It stipulates that the physical location of the media must be concealed through electronic means. It also includes provisions related to botnet investigations in some cases. What does all that mean? Well, Google claims that the new provisions that The Advisory Committee on the Rules of Criminal Procedure have proposed will have a huge impact concerning warrant power and that because it will give the Department of Justice (DoJ)  such far-reaching power, that this matter should be left to Congress to handle, and not an […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Google Voices Concerns Regarding Government Warrants, Seeks to Protect Users appeared first on National Cyber Security.

View full post on National Cyber Security

Google leaves most Android users exposed to hackers

index

Source: National Cyber Security – Produced By Gregory Evans

People with Android smartphones and tablets running older versions of the mobile operating system — around 60 percent of all Android users — are going to have to live with a security flaw Google has decided not to fix. A known security bug in the default, unbranded Web browser for Android 4.3 Jelly Bean and older versions of Google’s mobile OS will go unpatched, Google’s chief of security for Android wrote in a Google+ post on Friday. “Keeping software up to date is one of the greatest challenges in security,” Adrian Ludwig wrote. Because the browser app is based on a version of the WebKit browser engine that’s now more than two years old, fixing the vulnerability in Android Jelly Bean and earlier versions is “no longer practical to do safely,” he wrote. Google confirmed on Saturday that Ludwig’s post is the company’s official position on the matter. The company’s decision has upset security experts, who worry hackers will be able to easily target the hundreds of millions of people using phones and tablets that run older versions of Android. Ludwig contends the number of people potentially affected by the vulnerability is “shrinking every day.” But for security professionals, it’s […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Google leaves most Android users exposed to hackers appeared first on National Cyber Security.

View full post on National Cyber Security

U.S. Warns Apple Users About iOS ‘Masque Attack’

U.S. Warns Apple Users About iOS ‘Masque Attack’



Security weakness allows a hacker to replace an iOS app with malware The U.S. government warned Apple gadget owners Thursday to look out for hackers exploiting a newly revealed vulnerability in the mobile operating system iOS. The so-called “Masque Attack” […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Protecting online banking users

With banks providing more protection for its online clients, including making available insurance schemes that can cover for ATM robbery or even tampering and mechanical malfunctions of the ATM, cybercrime is training its guns big time on the banking institutions […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Tim Cook Says Apple to Add Security Alerts for iCloud Users

Source: National Cyber Security – Produced By Gregory Evans

Tim Cook Says Apple to Add Security Alerts for iCloud Users



In his first interview on the subject, Apple Chief Executive Tim Cook said celebrities’ iCloud accounts were compromised when hackers correctly answered security questions to obtain their passwords, or when they were victimized by a phishing scam to obtain user […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Tim Cook Says Apple to Add Security Alerts for iCloud Users appeared first on National Cyber Security.

View full post on National Cyber Security

Systems that can secretly track where cellphone users go around the globe

Source: National Cyber Security – Produced By Gregory Evans

Systems that can secretly track where cellphone users go around the globe



Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they are blocks away or on another continent. The technology works by exploiting an essential fact […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Systems that can secretly track where cellphone users go around the globe appeared first on National Cyber Security.

View full post on National Cyber Security

Seven Cell Phone Apps Your Professor Can Easily Hack—Android, Windows and iOS Users Beware

Source: National Cyber Security – Produced By Gregory Evans

Seven Cell Phone Apps Your Professor Can Easily Hack—Android, Windows and iOS Users Beware



Presenting their findings last Friday Aug. 22 at the 23rd annual USENIX Security Symposium held in San Diego, researchers from the University of California, Riverside found that by exploiting weaknesses in cell phone operating systems they were able to hack […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Seven Cell Phone Apps Your Professor Can Easily Hack—Android, Windows and iOS Users Beware appeared first on National Cyber Security.

View full post on National Cyber Security

Cyber Criminals Use Malaysia Airlines Flight MH17 Plane Crash News to Bait Users

Any occasion that captures public attention – regardless of how sensitive – comes out to be an opportunity for spammers and hackers to snatch users’ personal information and spread malware, and the tragedy of the crashed Malaysia Airlines flight MH17 is no exception. According to the U.S. intelligence officials, Malaysia Airline Flight MH17, a Boeing 777 aircraft carrying 283 passengers

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

90 Percent of the Information Intercepted by NSA Belongs to Ordinary Internet Users

If anybody says that NSA is watching you, nobody surprises. But, a large scale investigation published by Washington Post indicates that the scope of surveillance carried out by US National Security Agency was massive even than the expectation of you and me. Just because you are an ordinary person doesn’t mean that you are safe, as 90 percent of messages intercepted by the NSA were not foreign

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Page 1 of 1612345»10...Last »

My Twitter

Gregory D. Evans On Facebook