Source: National Cyber Security – Produced By Gregory Evans Protect your PC/laptops with these 10 best anti-hacking software for Windows 10 Hacking is a well-known method of remotely taking over or “crashing” your PC/laptop. Hackers are a constant threat for all Internet users. In today’s computer-dependent society, hacking has The…
Hackers Trick Facial-Recognition Logins With Photos From Facebook (What Else?)
Source: National Cyber Security – Produced By Gregory Evans FACIAL RECOGNITION MAKES sense as a method for your computer to recognize you. After all, humans already use a powerful version of it to tell each other apart. But people can be fooled (disguises! twins!), so it’s no surprise that The…
Cerber ransomware decryption tool was available for 1 day before hackers rendered it useless
Source: National Cyber Security – Produced By Gregory Evans Cerber ransomware decryption tool, recently made available by cybersecurity firm Check Point for current and potential victims, was available for just a day before the authors of the ransomware hit back, fixing a flaw and essentially rendering the decryption tool The…
Hackers reveal Soros funds research on critics of Islam
Source: National Cyber Security – Produced By Gregory Evans Billionaire activist and major Hillary Clinton donor George Soros used his nonprofits to fund opposition research on critics of radical Islam and to discredit the Israeli government, according to more than 2,500 documents hackers put online. Soros’ Open Society Foundations The…
‘Monsoon’ Hackers Reportedly Attacking Innumerable Computers Globally with Spear-Phishing Schemes
Source: National Cyber Security – Produced By Gregory Evans Suspected hackers seemingly from India, ever since 2013, have been hijacking innumerable PCs, it is being reported. Understandably, three security agencies have rumbled the gang for the entire range of time; however, the gang until now was regarded as a The…
Android Phone Users in Iran Face New Threat by Hackers
Source: National Cyber Security – Produced By Gregory Evans Hackers posing as friends are using phone numbers based in the UK to contact civil rights and political activists in Iran to gain access to their email and social media accounts, the International Campaign for Human Rights in Iran has The…
Hackers Use Google’s Ad Network To Spread “Fake Login” Malware
Source: National Cyber Security – Produced By Gregory Evans For years, security firms have warned of keystroke logging malware that surreptitiously steals usernames and passwords on desktop and laptop computers. In the past year, a similar threat has begun to emerge on mobile devices: So-called overlay malware that impersonates The…
Hackers hit Westin Snowmass
Source: National Cyber Security – Produced By Gregory Evans People staying at the Westin Snowmass Resort last winter may have had their credit cards compromised as a result of a hack of its parent company’s payment systems. The local hotel was hacked along with 20 Hyatt, Sheraton, Marriott, Westin The…
Cerber ransomware rakes in cash by recruiting unskilled hackers
Source: National Cyber Security – Produced By Gregory Evans Cerber’s creators take 35 percent of the profit, and the rest goes to partners A ransomware strain has been making a pretty penny by opening its doors to unskilled hackers. Security firm Check Point gained a rare look at The post…
Hackers target major hotel chains including Marriott, Sheraton, Hyatt & Westin
Source: National Cyber Security – Produced By Gregory Evans Hyatt, Sheraton, Marriott and Westin hotels in 10 states and the District of Columbia may have been targeted by hackers for months. The states where the hacking happened include locations in California, Colorado, Illinois, Minnesota, Pennsylvania, Tennessee, Vermont, Virginia, and The…