Source: National Cyber Security – Produced By Gregory Evans ISIS social media accounts are buzzing with a spreadsheet of personal data on employees of the American, British, and Australian governments, including military personnel. The Islamic State claims this list was compiled using data stolen from government systems by its “hacking…
Samsung releases the first Galaxy Note5 TV commercial: it’s all about the new design and new S Pen
Samsung today released the very first Galaxy Note5 TV commercial. Unlike this official Note5 promo video, which is too long to show up on TV, the commercial is a 30-second lively clip that showcases some of the new handset’s highlights, including its new metal-and-glass design, its multitasking capabilities, and the…
How this hacker can virtually ‘kill’ you, and what to do about it
Source: National Cyber Security – Produced By Gregory Evans LAS VEGAS — Anyone with a keyboard and a cause can have a living person declared legally dead by taking advantage of security weaknesses in the online death registration process, says Chris Rock, chief executive officer of Australian-based security company Kustodian. Mr….
Apple’s latest iPhone ad is all about the camera
Apple has added a new video to its “if it’s not an iPhone, it’s not an iPhone” campaign, highlighting the camera on the iPhone 6 and iPhone 6 Plus. The ad shows off crisp pictures and videos spread out across the screens of several iPhones over 30 seconds. This new…
Why we should all care about cyber crime: the risk to you and me
Source: National Cyber Security – Produced By Gregory Evans In today’s world, the reality is that all individuals and organisations connected to the internet are vulnerable to cyber attack. The number, type and sophistication of attacks continues to grow, as the threat reportpublished last month by the Australian Cyber Security…
Cars can be hacked. What about a plane?
Source: National Cyber Security – Produced By Gregory Evans Yes, hackers can remotely cut the engine of your 2014 Jeep Cherokee. No, they can’t take down a plane. Here’s the thing about modern machines. They all operate on computer code. And when we hook them up to the Internet, we…
THREE REAL ONLINE DANGERS YOU NEED TO WORRY ABOUT
Source: National Cyber Security – Produced By Gregory Evans There’s no shortage of panic-inducing security news, such as flaws in web encryption that could allow attackers to slurp up your banking information. Then there are the proof-of-concept attacks. Security researchers seem to find hacks for every new Apple product within…
THE TOP 10 WOMEN CYBER GUARDIANS YOU SHOULD KNOW ABOUT
Source: National Cyber Security – Produced By Gregory Evans The paucity of women in math and science extends to the data security realm. Women make up 14 percent of federal government cyber personnel, according to a May (ISC)2 global information security workforce study. The number was even lower in the…
Americans most anxious about financial data theft
Source: National Cyber Security – Produced By Gregory Evans According to a new study, US consumers would rather be robbed or have their email account hijacked than see their financial information and social security details stolen or compromised. More than three in four (77%) Americans say that having their financial…
Being proactive about security is the best defense against cyber attacks
Source: National Cyber Security – Produced By Gregory Evans Edinburgh council was the target of a cyberattack this week, and the details of more than 13,000 email addresses were stolen. The council was quick to issue a warning to all those who have an account with the authority, saying they…