Russian hackers stole 1.2 billion passwords

Russian hackers stole 1.2 billion Internet credentials from major US companies and others around the world in what is likely the biggest data breach ever, security researchers said Tuesday.  The US firm Hold Security said the gang which it dubbed […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more

‘Anonymous’ Hackers take down Mossad site

The hacker group Anonymous has launched an attack on Israeli government’s websites following the war in Gaza. The group claimed it had brought down several sites including one belonging to Mossad, reports said. The site belonging to Israel’s vaunted secret […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more

Turkish Hackers Deface Arutz Sheva Hebrew Site

Muslim hackers temporarily downed Arutz Sheva’s Hebrew-language website Tuesday, and defaced it with anti-Israel slogans. The attack was claimed by Turkish hacking group Turkguvenligi, which claims to have previously hacked websites belonging to NATO, Interpol, Nasa and the Pentagon, among other […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more

Nigerian 419 Scammers: From Princes to Hackers

We’ve all received at least one email from a Nigerian prince or businessman, offering us a huge sum of money. However, we know it’s fake and the mail is a scam. Now that we’ve understood their game, they have leveled […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more

6 ways hackers are trying to steal your data

Your rising sense of panic is justified. Targeted attacks on valuable data – yours, your employees’, and your company’s – are only becoming more sophisticated and diverse. Yesteryear’s defences will not save you in 2014 and beyond. With every advance […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more

Hackers Could Build an iPhone Botnet

A reminder to Apple and smug iPhone owners: Just because iOS has never been the victim of a widespread malware outbreak doesn’t mean mass iPhone hacking isn’t still possible. Now one group of security researchers plans to show how to […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more

Hackers Set Sights on Video Games

If you thought cyber attacks were limited to critical websites, you’re in for a surprise. According to Dell Secureworks, the video games industry is the latest victim of cyber crime. A group of hackers, the Threat Group-3279 (TG-3279), is hunting […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more

the white hat hackers keeping you safe

It was May of 2012 at a security conference in Calgary, Alberta, when professor Ron Deibert heard a former high-ranking official suggest he should be prosecuted. This wasn’t too surprising. In Deibert’s world, these kinds of things occasionally get whispered […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more

How hackers could slam on your car’s brakes

Modern cars are increasingly controlled by computers. And where there are computers, there are hackers. A report shared exclusively with CNNMoney shows that the 2014 Jeep Cherokee, 2015 Cadillac Escalade and 2014 Toyota Prius were the most ‘hackable’ of 20 […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more

The FTC Is Looking For A Few Good Robocall Hackers

The FCC is not the only federal agency tasked with regulating telephone calls. The FTC also regulates telephone calls pursuant to the Telemarketing Sales Rule (“TSR”) (16 C.F.R. § 310 et seq.). And while the scope of the TCPA and the TSR […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more