Source: National Cyber Security – Produced By Gregory Evans Corpus Christi Crime Stoppers has a cash reward for the first person to call 888-TIPS and provides information to lead law enforcement to locate 33-year-old Elisa Rangel (10/18/1992). Rangel is a fugitive wanted out of Nueces County for fraudulent use The…
A Behind-the-Scenes Look at Hackers Who Get Paid to Find Bugs
Source: National Cyber Security – Produced By Gregory Evans Earlier this month, Apple announced it would start offering up to $200,000 to hackers who can find software flaws in its products, joining the ranks of hundreds of companies who offer financial compensation for bug-busting. The first program of this The…
Fiat Chrysler offers hackers bounties to find tech bugs
Source: National Cyber Security – Produced By Gregory Evans Hackers participating in “bug bounty” programs are a little like bounty hunters in the Old West. Their guns have been replaced with computers (likely running Linux), and their targets are no longer cigar-chomping outlaws, but rather are potential software and security…
Hackers peer into Uber passenger privates, find and plot trips on maps
Source: National Cyber Security – Produced By Gregory Evans Three hackers have found eight holes in Uber that could allow fake drivers to be created and user email addresses reveal, and found more than 1000 of valid coupon codes including one giving drivers $100 extra in fare rides. The flaws…
Apple might not find out how the FBI hacked the San Bernardino iPhone
Source: National Cyber Security – Produced By Gregory Evans The strange tale of the San Bernardino iPhone seems like it’s almost over, although it touched off a national debate about encryption that’s just getting started. Apple probably won’t find out what method was used by the third-party firm that broke…
When filing taxes Layton man find identity thief already claimed his return
Source: National Cyber Security – Produced By Gregory Evans SALT LAKE CITY — It’s tax season, which means it’s also identity theft season. According to the IRS, filing tax returns under someone else’s name is one of the biggest crimes they look for. “I’ve never been in the victim category…
Hackers find a way into your computer through remote access program
Source: National Cyber Security – Produced By Gregory Evans What if having a password to log onto your computer couldn’t stop a hacker from getting in? What if the one thing you overlooked, is leaving the door to your personal or business files wide open? There’s a remote access program…
Card fraud: Why do fraudsters find plastic so fantastic?
Source: National Cyber Security – Produced By Gregory Evans Fraudsters like to obtain things that don’t belong to them, and their favourite way of doing this is by deceit. Sometimes they do it in their own name, sometimes they use someone else’s identity, other times they will just make an…