The biggest hacking threats for the future

Source: National Cyber Security – Produced By Gregory Evans QUESTION: What’s the biggest hacking threat you can see for the future? ANSWER: Most of the scariest “future” hacking threats are possible right now, from hacked cars and firearms to cloned NFC payment systems and SIM cards. Imagine your car going…

read more

Hacker Activity Viruses Hacking

Source: National Cyber Security – Produced By Gregory Evans Computer crime in flat design concept. Criminal using computer to commit crime. Hacker activity viruses hacking and e-mail spam. Concepts are easy to customize and resize. Vector illustration. All design elements included in EPS file. You can render any resolution JPG…

read more

TAMAULIPAS GOVERNMENT — USED HACKING SOFTWARE

Source: National Cyber Security – Produced By Gregory Evans REYNOSA, Tamaulipas — Emails made public by WikiLeaks revealed that the Tamaulipas government purchased software from the company Hacking Team in 2014. This is the year that played key tole in the government’s new security strategy. Recently WikiLeaks released multiple documents from Hacking…

read more

Hacking endangers U.S. agents, cyber sanctions in the works, surveillance court battle continues

Source: National Cyber Security – Produced By Gregory Evans Chinese and Russian spy agencies are using hacked U.S. data to identify American intelligence officers and agents. “At least one clandestine network of American engineers and scientists who provide technical assistance to U.S. undercover operatives and agents overseas has been compromised…

read more