Source: National Cyber Security – Produced By Gregory Evans Islamic State (IS) hackers have intercepted top secret British government emails in a major security breach, a media report said on Saturday. The breach was uncovered by the Government Communications Headquarters (GCHQ), Mirror online reported. An investigation by the intelligence organisation…
The government is hiring hackers to help bring Australia into the 21st Century
Source: National Cyber Security – Produced By Gregory Evans It’s fair to say that Hacker News is probably not at the top of the list of publications where you’d expect to see the Australian government advertising jobs. And an “ethical hacker” is probably not the type of job you would expect the…
Celebrate the 20th anniversary of Hackers at San Francisco’s DNA Lounge
Source: National Cyber Security – Produced By Gregory Evans JWZ, owner of San Francisco’s legendary DNA Lounge, writes, “Hey nerds, I think this might be up your alley. It’s the 20th anniversary of the movie HACKERS and we’re doing a movie screening, dance party, costume contest and Wipeout XL contest…
Hackers Turn Off The Pacemaker Of A Simulated Human And Kill It
Researchers Killed a Simulated Human By Turning Off Its Pacemaker With the increase in hacking these days, right from infecting a computer to remotely hacking a car in motion, one may wonder what would happen if a hacker decides to compromise your bionic arm, your pacemaker, or maybe your brain implant….
Police seeking help from hackers in Ashley Madison investigation
Source: National Cyber Security – Produced By Gregory Evans Police investigating the data breach that took place at infidelity website Ashley Madison are asking for hackers to assist them in tracking down those involved. The hackers are being offered a reward close to £250,000. The ‘Project Unicorn’ police taskforce, including…
Cyber crime: states use hackers to do digital dirty work
Source: National Cyber Security – Produced By Gregory Evans A new breed of sophisticated hacker is emerging as one of the most worrisome digital adversaries for western intelligence chiefs: cyber privateers. Just as England’s Queen Elizabeth I officially licensed pirates to plunder the treasure ships of her rival Philip II…
Ten fictional hackers, from the Matrix to Jonathan Franzen
Source: National Cyber Security – Produced By Gregory Evans Just published a few days apart, Stieg Larsson sequel The Girl in the Spider’s Web and Jonathan Franzen’s Purity show how far the hacker has come in fiction: a 30-year journey from cult SF, via world-conquering book and movie trilogies, to post-WikiLeaks literary novels…
How hackers work like a PAC
Source: National Cyber Security – Produced By Gregory Evans For many nation states, cyber warfare has become an attractive option because it can be conducted without making great efforts or consuming a lot of resources. And while most people think these attacks are conducted directly by a government, government-sponsored hacking…
Hackers strike UK National Crime Agency
Source: National Cyber Security – Produced By Gregory Evans The NCA is a national agency responsible for combating organized crime and cybercrime. The hackers used a Distributed Denial of Service (DDoS) attack on the NCA. DDoS attacks prompt Web sites to shut down by overloading them with fake traffic. “DDoS…
10 MOST NOTORIOUS HACKERS OF ALL TIME
Source: National Cyber Security – Produced By Gregory Evans 1. Jonathan James Known as “comrade” by many online, 15-year-old Jonathan James was the first juvenile convicted and jailed in the United States for hacking. James hacked into companies like Bell South, as well as the Miami-Dade school system and the…