Source: National Cyber Security – Produced By Gregory Evans Hackers have managed to access the private information about members of the adult website PornHub – but have promised not to leak the data. The two ‘white hat hackers’ took part in a ‘bug bounty’ and received a $20,000 reward after…
School Absenteeism: What Do We Know About Students Who Aren’t There? – Inside School Research – Education Week
As the White House pushes new initiatives to combat school absenteeism, what does the research say about who misses class and why? View full post on Education Week: Bullying #pso #htcs #b4inc Read More The post School Absenteeism: What Do We Know About Students Who Aren’t There? – Inside School…
Criminals aren’t the only ones breaking in
Source: National Cyber Security – Produced By Gregory Evans At least that’s what lockpicker and network engineer Jeff Rosowski says. Rosowski learned to lockpick to prepare for Mystery Challenge, a contest of puzzles, ciphers, tricks and codes at the annual DefCon hacker conference. Since, he has maintained his skills at…
Meet the Notes that aren’t made by Samsung
Introduced by Samsung in September 2011, the original Galaxy Note was seen by some as a useless tablet-meets-phone device. With its 5.3-inch display, the first Galaxy Note was a giant device compared to the flagship handsets of 2011, most of which offered screens of around 4 inches. And yet the…
Cyber warfare: Capitol staffers aren’t ready
Source: National Cyber Security – Produced By Gregory Evans Congressional staffers are the gateway to all lawmaking on the Hill, but they also may be unwittingly opening the door to hackers. The Hill’s networks are under constant attack. In 2013 alone, the Senate Sergeant at Arms’ office said it investigated…
Hackers Can Steal Data Wirelessly From PCs That Aren’t Even Online
When governments, utilities and corporations need to protect their most sensitive data, they create what’s called an air-gap network. It involves storing information on computers that are never connected to the Internet, an extreme method of isolation designed to prevent […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Mike Brown Shooter: Anonymous Hackers Threaten Ferguson, Missouri, Police If Demands Aren’t Met
The Anonymous hackers have made good on their threats to disrupt the Ferguson, Missouri, police department, shutting down its website and phone lines for a time and threatening to name the officer who killed Mike Brown if the officials don’t […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Aren’t Drone Strikes Terrorism? Obama Admin Answers
“No military tactic has been more employed, and more controversial, in the “Global War on Terror” than the “air strike” — whether from drones, jets, or even … ________________________ https://gregorydevans.com – http://gregorydevans.wordpress.com – http://hackerforhire.com – http://hackerforhireusa.com
ASIS 2012: Cyber attacks aren’t the only danger for power infrastructure
Mark Rockwell Top Priority Sector: infrastructure_protection Although organized, deliberate Cyber attacks are one of the most potentially crippling threats out there for the North American power grid, other, less-high tech dangers still lurk that could hobble the electrical system, or even bring it to its knees. Those dangers are constantly…
ProtectMyID: Sites for kids aren’t permitted to request personal info without #parentalpermission. #Talktokids about PII and why not to give it out.
ProtectMyID: Sites for kids aren’t permitted to request personal info without #parentalpermission. #Talktokids about PII and why not to give it out. View full post on Twitter / ProtectMyID View full post on National Cyber Security