Source: National Cyber Security – Produced By Gregory Evans LAS VEGAS – Today’s world is a hacker’s paradise. As nearly all facets of life become more dependent on digital conveniences, the opportunities for gifted tech manipulators have become virtually endless. Cars, homes, safes, phones and guns have become routine fodder…
Surviving the Def Con hacker conference
Source: National Cyber Security – Produced By Gregory Evans The phrase I saw and heard over and over again while talking to other journalists and security researchers about the Def Con hacker convention was “hostile environment.” Not physically hostile; the attendees and staff were extremely nice. The hostility was digital….
China jails TV hacker for 12 years over anti-govt broadcast
Source: National Cyber Security – Produced By Gregory Evans SHANGHAI (AFP) – An engineer who hacked into a Chinese cable television system has been jailed for 12 years, state media reported, after he broadcast denunciations of the ruling Communist party — including showing the Tiananmen Square “Tank Man” image. Wang…
Hacker summer camps crash Las Vegas this week
Source: National Cyber Security – Produced By Gregory Evans It’s summer camp for hackers in Las Vegas this week. That’s how event organizers describe three tech conferences — Black Hat USA, DEF CON and B-Sides LV — that are scheduled concurrently each summer. When the hackers are in town, mischief…
The Martian author says Comcast let hacker take over his e-mail
Source: National Cyber Security – Produced By Gregory Evans Andy Weir is the creator of Mark Watney, a fictional astronaut who can solve any problem the harsh environment of Mars throws his way. But Weir, author of The Martian, ran into a tricky problem on Earth this week when his e-mail and Twitter…
Hacker: ‘Hundreds of thousands’ of vehicles are at risk of attack
Source: National Cyber Security – Produced By Gregory Evans A security expert who recently demonstrated he could hack into a Jeep and control its most vital functions said the same could be done with hundreds of thousands of other vehicles on the road today. Security experts Charlie Miller and Chris…
Hacker profiling: who is attacking me?
Source: National Cyber Security – Produced By Gregory Evans Sophisticated cyber attacks have evolved rapidly in the last year, crippling online networks and causing serious financial, operational and reputational damage on firms, regardless of industry or nationality. Many executives rank a large-scale attack as the most important risk facing their…
How to spot a hacker, and prevent employees turning rogue
Source: National Cyber Security – Produced By Gregory Evans Hackers come in many shapes and forms. Many of them are located thousands of miles away working for criminal gangs, or even as part of some state-sponsored army bent on stealing your secrets. Those remote hackers will always be there, and…
It’s disturbingly easy to become a hacker millionaire
Source: National Cyber Security – Produced By Gregory Evans All it takes to make over $900,000 a year is to learn some code, pick up some Russian, decide to become a criminal, and have no fear. That’s it. Put it all together, take a deep breath, and then even you…
CVS Shuts Down Its Photo Site After Suspected Hacker Break-In
Source: National Cyber Security – Produced By Gregory Evans CVS has shut down its online photo service, warning its customers that there may have been a data theft and to call their banks if they get suspicious credit card charges. The drugstore alerted people with a warning on its CVSPhoto.com…