Source: National Cyber Security – Produced By Gregory Evans Microsoft is supposed to get back its desktop operating system reign after the immense success of Windows 10 operating system. The Windows 10 mobile is also looking quite promising but it still lacks the immense popularity and number of apps Android…
Tesla’s Response to Hacked Car Offers a Road Map for Fast Fixes
Source: National Cyber Security – Produced By Gregory Evans Cybersecurity researchers on Friday are publicizing software flaws in the Tesla Model S that could allow remote hackers to shut down a moving car’s engine. But owners of the high-tech luxury sedan have little need to worry. The electric-car maker quickly…
Can my phone be easily hacked?
Source: National Cyber Security – Produced By Gregory Evans Everyone has a smartphone — OK, except toddlers. So we take the convenience of being connected to everything at all times for granted. But are we risking big problems by storing and transmitting so much data to and from our trusted…
How to Combat Hacked Credit or Debit Accounts
Source: National Cyber Security – Produced By Gregory Evans The Problem A criminal who gets your credit or debit card number can rack up big charges. Scare Factor If your credit card number is used fraudulently, you will have to get a new card with a new number, but…
Cars can be hacked. What about a plane?
Source: National Cyber Security – Produced By Gregory Evans Yes, hackers can remotely cut the engine of your 2014 Jeep Cherokee. No, they can’t take down a plane. Here’s the thing about modern machines. They all operate on computer code. And when we hook them up to the Internet, we…
The hidden lab where bankcards are hacked
Source: National Cyber Security – Produced By Gregory Evans Decoding PIN numbers and credit cards can bring criminal groups vast wealth. Paul Marks visits a secret facility where one financial giant is fighting back – by trying to hack their own products. It couldn’t get any more steampunk if it…
Hacking Team falls prey to hack attack. Why hackers get hacked.
Source: National Cyber Security – Produced By Gregory Evans An Italian cybersecurity firm was hacked on a grand scale late on Sunday evening. While the full extent of the hack is not yet known, the company has seen over 400 gigabytes of company information shared online over the weekend. The…
Moorhead construction sign hacked to tout 9/11 conspiracy theory
Source: National Cyber Security – Produced By Gregory Evans MOORHEAD – A construction sign wasn’t alerting drivers about traffic; instead showing a different message. On Highway 75 just south of I-94 in Moorhead, the sign said “Bush did 9/11.” Minnesota DOT representatives said the the sign is part of a…
7 things to do when your business is hacked
Source: National Cyber Security – Produced By Gregory Evans The first thing an IT security executive should do after the corporate network has been breached is fall back on the incident response plan that was put in place well before attackers got through the carefully constructed defenses. That’s what should…