Source: National Cyber Security – Produced By Gregory Evans Last month, when the Michigan State University Police Department approached professor Anil Jain to see if he could access a fingerprint-locked deceased man’s smart phone to aid in a police investigation, Jain accepted the scientific challenge. On Monday, July 25, it…
Shellshock: Romanian hackers are accessing Yahoo servers, claims security expert
Yahoo servers have been infiltrated by Romanian hackers exploiting the Shellshock bug discovered last month, according to cyber security expert Jonathan Hall. In a blog post on his website Future South, Hall detailed the process by which he discovered Yahoo, […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
How to Prevent Hackers from Accessing Your Online Accounts
Jennifer Lawrence. Arianna Grande. Kate Upton. These are just a few of the known celebrities who recently had their private photos leaked online after a hacker had allegedly compromised their iCloud accounts. The hacker went on to claim they have […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Two-Step Verification Might Still Not Stop Hackers from Accessing iCloud Data
Intimate and private photos of well-known celebrities were leaked on the Internet. These nude images were copied from Apple’s iCloud data service. Apple’s iCloud was hacked and hackers posted the photos online. With the security concern over Apple’s iCloud, the […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Google denies accessing journalist’s email to spy on leakers
Google was accused of spying by TechCrunch founder Michael Arrington, a journalist, who accused the technology giant of breaking into his email account to know who was sending Arrington the emails of Google’s internal affairs. However Google denies the charge calling it “serious and unimaginable”. In a statement to Recode…
Did the CIA Violate the Computer Fraud and Abuse Act by Accessing Intelligence Committee Computers?
by Orin Kerr | @lawfareblog Senator Feinstein recently claimed that the CIA may have violated the federal computer hacking statute, the Computer Fraud and Abuse Act, by searching computers used by the Intelligence Committee to conduct CIA oversight. Based on the facts we know so far, I’m skeptical of the…
ProtectMyID: Firewalls keep other computers from accessing your computer information while connected to the Internet. Do you have firewall protection?
ProtectMyID: Firewalls keep other computers from accessing your computer information while connected to the Internet. Do you have firewall protection? View full post on Twitter / ProtectMyID View full post on National Cyber Security