The hacker collective Anonymous is doxing (releasing persona information about) Missouri KKK leader Frank Ancona, and in a big way. They aren’t just giving the usual basics — email address, workplace, phone numbers, and other contact info. They’ve released a […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Here’s What Chinese Hackers Can Actually Do To The US Power Grid
Jonathan Pollet, founder of Red Tiger Security, is a 17-year veteran of the critical infrastructure industry. As an ‘ethical hacker,’ he consults for some of the world’s largest energy companies, as well as electric utilities, chemical plants, water treatment plants, etc. […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Hackers to probe cyber crime defences at British banks
(Reuters) – In the next few months hackers will try to penetrate the cyber defences of Britain’s major banks and steal information about millions of customers. Read More…. For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com View full post on National Cyber Security
Hackers Can Steal Data Wirelessly From PCs That Aren’t Even Online
When governments, utilities and corporations need to protect their most sensitive data, they create what’s called an air-gap network. It involves storing information on computers that are never connected to the Internet, an extreme method of isolation designed to prevent […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Hackers turning smartphones into slave armies
SAN FRANCISCO (AFP) – Mobile security firm Lookout on Wednesday warned that Android-powered smartphones or tablets are being targeted with malicious software that puts them at the mercy of hacker overlords. The persistence and sophistication of malware dubbed NotCompatible is […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
State Department email attack ‘fits pattern’ of Russian hackers, says expert
The State Department has shut down its email system after it was reportedly hacked. The department’s entire unclassified email system was closed down to repair possible damage. A senior US official said that the department detected “activity of concern” in […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Seven tips to secure your iPhone from hackers
1) Use a PIN or fingerprint security With all the things we now use our smartphone for: email; banking; browsing; shopping, it’s dangerous to leave them unguarded. Locking your screen will protect your sensitive data and apps from meddling. Read […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Ex-NSA hackers and their corporate clients are stretching legal boundaries and shaping the future of cyberwar.
Bright twenty- and thirtysomethings clad in polo shirts and jeans perch on red Herman Miller chairs in front of silver Apple laptops and sleek, flat-screen monitors. They might be munching on catered lunch—brought in once a week—or scrounging the fully […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Postal Service confirms security breach, Chinese government hackers reportedly suspected
Chinese government operatives reportedly are suspected of hacking the U.S. Postal Service, in a security breach that may have compromised personal information for more than 800,000 workers. The breach was announced Monday, as President Obama arrived in Beijing. The Postal […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Home Depot hackers used vendor log-on to steal data, e-mails
Hackers used a vendor’s stolen log-on credentials to penetrate Home Depot’s computer network and install custom-built malware that stole customer payment-card data and e-mail addresses, the retailer announced Thursday. The malware, which had not been seen in other data thefts, […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…