Source: National Cyber Security – Produced By Gregory Evans In case you missed our coverage this week inThreatWatch, Nextgov’s regularly updated index of cyber breaches: University of Virginia Hacked in Suspected Chinese Espionage Case The data breach allegedly targeted the email accounts of two employees whose work is connected to…
Five Ways To Protect Yourself From Identity Theft And Hackers
Source: National Cyber Security – Produced By Gregory Evans Identity theft occurs on a daily basis and is everywhere. Doing a quick Google search about it, will yield millions of results on how to prevent it from happening. And there are even movies like Identity Thief, which paints the picture…
Def Con 23: Where PR stunts and hackers come together
Source: National Cyber Security – Produced By Gregory Evans Having outgrown the odiferous corridors of the Rio, hacker conference Def Con entered this year by relocating to Bally’s Hotel and Casino — a venue described to me, in turns, by a Mandalay Bay hairdresser as “a shithole,” a taxi driver…
‘Stagefright’ exploit allows hackers to take over Android phones
Source: National Cyber Security – Produced By Gregory Evans Relatively new, the ‘Stagefright’ exploit allows a hacker to take over a vulnerable Android phone just by sending you an MMS message with a video embedded – if you play the video – the hacker can access your phone. Back in…
Hackers And Its Mysterious Soundtrack’s 20th Anniversary
Source: National Cyber Security – Produced By Gregory Evans This week, Shout factory releases the 20th Anniversary edition of the film Hackers. You may remember this as the film starring a young Angelina Jolie and her real life future one-time husband Jonny Lee Miller as computer hackers, with a plot…
Meet these five child hackers who could become top cyber security researchers
Source: National Cyber Security – Produced By Gregory Evans Meet these 5 child geniuses who could be the future of cybersecurity Cybersecurity industry is hunting for new talent due to severe shortfall of skilled professionals in this field and it seems the industry has already got five child geniuses. In this…
Hackers turn off Tesla Model S at low speed: FT
Source: National Cyber Security – Produced By Gregory Evans A report in the Financial Times says cyber security researchers were able to hack into and gain control of a Tesla Model S and shut the vehicle down at a low speed. The researchers, Lookout Security CTO Kevin Mahaffey and Cloudflare…
Chinese Email Hackers Continue Spying on Top US Figures
Source: National Cyber Security – Produced By Gregory Evans WASHINGTON (Sputnik)– The intelligence official and a top secret National Security Agency (NSA) briefing from 2014 reportedly said the cyberspies had accessed US government officials’ private email correspondences since at least April 2010, according to NBC News. The official told the broadcaster that the…
Nine Charged in Insider Trading Case Tied to Hackers
Source: National Cyber Security – Produced By Gregory Evans It was a symbiotic relationship that brought together the underbelly of Wall Street and the dark reaches of the online world. From their suburban homes in the United States, dozens of rogue stock traders would send overseas hackers a shopping list…