Source: National Cyber Security – Produced By Gregory Evans I’m sad to say that the first season of Mr. Robot has ended. We’ll have to wait a long six to nine months to get our next fix. We might as well have an “end of the world,” or at least…
Hacking for Good: The Not-So-Scary Side of the Hacking World
Source: National Cyber Security – Produced By Gregory Evans When you think of hacking, maybe you envision someone malicious in a dark room, breaking into government or corporate websites to expose private information to the world. You might think of common code-focused hacks, hacktivist groups like Anonymous (NSFW), or maybe…
Rocket Kitten Hacking Group Linked to Iranian Government by Security Researchers
Source: National Cyber Security – Produced By Gregory Evans Group targets individuals, private businesses, academic institutes, and state departments in equal measure Trend Micro and ClearSky security firms have put out a joint, detailed paper in which theyDOCUMENT the actions of an APT (Advanced Persistent Threat) group they believe is…
No Notification Given To Millions Of Federal Employees About Security Data Hacking
Source: National Cyber Security – Produced By Gregory Evans As many as 21.5 million federal employees’ security clearance data has been hacked. The United States government has so far not intimated any of the federal employees whose security clearance data were hacked and the hacking has taken place more than…
The biggest hacking threats for the future
Source: National Cyber Security – Produced By Gregory Evans QUESTION: What’s the biggest hacking threat you can see for the future? ANSWER: Most of the scariest “future” hacking threats are possible right now, from hacked cars and firearms to cloned NFC payment systems and SIM cards. Imagine your car going…
Barclays combating terrorism by hacking its own systems to find holes
Source: National Cyber Security – Produced By Gregory Evans Barclays has assembled a team to ‘attack’ its own computer systems to try and find holes before cyber criminals do. Barclays’ red team has been assembled by Troels Oerting, a former head of Europol’s European Crime Center, who joined the bank…
Hacker Activity Viruses Hacking
Source: National Cyber Security – Produced By Gregory Evans Computer crime in flat design concept. Criminal using computer to commit crime. Hacker activity viruses hacking and e-mail spam. Concepts are easy to customize and resize. Vector illustration. All design elements included in EPS file. You can render any resolution JPG…
TAMAULIPAS GOVERNMENT — USED HACKING SOFTWARE
Source: National Cyber Security – Produced By Gregory Evans REYNOSA, Tamaulipas — Emails made public by WikiLeaks revealed that the Tamaulipas government purchased software from the company Hacking Team in 2014. This is the year that played key tole in the government’s new security strategy. Recently WikiLeaks released multiple documents from Hacking…
UK Teenager Arrested for Hacking Important Government Websites
Source: National Cyber Security – Produced By Gregory Evans Theinquirer.net reported on 20th August, 2015 stating that Charlton Floate, a 19 year old UK teenager, has been arrested with some others for the cyber attacks who seemingly hacked the websites of FBI (Federal Bureau of Investigation) and Home Office. Floate…
Hacking endangers U.S. agents, cyber sanctions in the works, surveillance court battle continues
Source: National Cyber Security – Produced By Gregory Evans Chinese and Russian spy agencies are using hacked U.S. data to identify American intelligence officers and agents. “At least one clandestine network of American engineers and scientists who provide technical assistance to U.S. undercover operatives and agents overseas has been compromised…