Source: National Cyber Security – Produced By Gregory Evans Barclays has assembled a team to ‘attack’ its own computer systems to try and find holes before cyber criminals do. Barclays’ red team has been assembled by Troels Oerting, a former head of Europol’s European Crime Center, who joined the bank…
Here’s where you’ll find the microSD card slot on the Moto X Play
Many of you will see the headline and think, “what on Earth is this guy talking about?” But you know what, the Moto X Play is the first phone in some time I’ve actually opened up the in-box documentation to figure something out. Because it’s not obvious where the microSD…
Ashley Madison hack suggests British government workers used official email accounts to find sex
Source: National Cyber Security – Produced By Gregory Evans British government staff and council workers used their official email accounts to sign up to affairs website Ashley Madison, it has been claimed. Dozens of email addresses linked to top Westminster departments and some of the nation’s biggest local authorities have…
Find out if your Android device is exposed to MMS attacks using Zimperium’s Stagefright Detector App
Last week, security researchers from Zimperium have reported on a vulnerability in Android’s Stagefright media playback library, one that is thought to affect about 950 million active Android devices. In a nutshell, potential hackers can take control of the affected smartphones by sending a malicious SMS. For more details on…
Hackers score 1 million miles for helping United find security bugs
Source: National Cyber Security – Produced By Gregory Evans Two hackers scored an unusual bounty of one million frequent flyer miles for identifying holes in United Airlines’ security system. That’s enough for each of them to circle the globe five times. Such awards, known as a “bug bounties” are paid…
How to find the best cyber security insurance for your firm
Source: National Cyber Security – Produced By Gregory Evans A robust cyber security insurance policy can be tricky to procure, even for the most meticulous wealth management firms. Interest in cyber insurance has surged over the past year following a number of high-profile hackings, including one announced earlier this month involving…
New Hacker Tool iDict Exploits Simple Passwords: How To Find Out If Your Account Could Be Compromised
If your password is simple — like Password1 or Passw0rd — now’s the time to change it, as a new brute-force hacking tool called iDict made its way around the Internet Friday. iDict exploited a hole in Apple’s security system […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Bay Area Security Firm Hires ‘White Hat Hackers’ To Find Vulnerabilities In Digital Systems
REDWOOD CITY (KPIX 5) — Cyber-crime is big business in the digital age, so a Bay Area security firm has hired a sophisticated group of hackers to break into computer systems. Read More…. For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com View full post on National Cyber…
U of M researchers find traffic lights can be hacked
Have you ever watched a movie where a snarky young computer hacker wreaks havoc with civic infrastructure, and wondered if it could happen in real life? Read More…. For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com View full post on National Cyber Security