Source: National Cyber Security – Produced By Gregory Evans While the government and private sector argue the toss over how the nation can create a secure digital identity for every citizen, Australian Privacy Commissioner Timothy Pilgrim shares the worry of many Australians as to what happens when something The post…
Hacker demonstrates how voting machines can be compromised
Source: National Cyber Security – Produced By Gregory Evans Concerns are growing over the possibility of a rigged presidential election. Experts believe a cyberattack this year could be a reality, especially following last month’s hack of Democratic National Committee emails. The ranking member of the Senate Homeland Security Committee The…
AP police recruitment website compromised by ‘hacking class’
Source: National Cyber Security – Produced By Gregory Evans HYDERABAD: The Andhra Pradesh State-Level Police Recruitment Board (APSLPRB), whose tag line is “transparency through technology”, has fallen prey to hackers. The portal is managed in Hyderabad. Three days ahead of accepting online applications (August 3) for filling Stipendiary Cadet Trainee…
Blockchain Social Media Steemit Compromised; Investigation Underway
Blockchain-based social media service Steemit today reported that its platform has faced a security breach. The cyber attack, according to CEO Ned Scott, affected over 260 user accounts. As he confirmed further, the platform have also incurred a small loss – worth around $85,000 – in the form of their…
Clinton Campaign Says No Hackers ?Compromised Its Computers
Source: National Cyber Security – Produced By Gregory Evans Hillary Clintons presidential campaign says theres no sign that hackers have broken into its computer systems, but its well aware that Russian cyber operatives may be trying. ?We continue to have no evidence that HFAs information systems have been compromised, Glen…
He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan. IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year.
Source: National Cyber Security – Produced By Gregory Evans He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums…
TalkTalk Customers Data Compromised By Recent, Massive Cyber Attack!
Source: National Cyber Security – Produced By Gregory Evans Telecommunications company TalkTalk has been hacked recently. Customer data seems to have been stolen, but the exact details have not yet been determined. The obvious step for the customers now is to login the account and to change their password. However,…
Do these 5 things immediately when your credit card is compromised
Source: National Cyber Security – Produced By Gregory Evans Finding out your financial information has fallen into the wrong hands can be unnerving. If your credit card has been lost, stolen, or otherwise compromised, your first reaction may be one of fear. But don’t let a scary situation take a…
Raptr Accounts Hacked, Accounts Compromised
Source: National Cyber Security – Produced By Gregory Evans Powered by Max Banner Ads It has emerged that gaming service Raptr has become the latest high profile hacking casualty. This follows the 2011 hack of Sony’s PlayStation Network, as well as the more recent DDOS cyber attacks against both PSN and…
New Hacker Tool iDict Exploits Simple Passwords: How To Find Out If Your Account Could Be Compromised
If your password is simple — like Password1 or Passw0rd — now’s the time to change it, as a new brute-force hacking tool called iDict made its way around the Internet Friday. iDict exploited a hole in Apple’s security system […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…