Source: National Cyber Security – Produced By Gregory Evans A U.S. investigation into a leak of hacking tools used by the National Security Agency is focusing on a theory that one of its operatives carelessly left them available on a remote computer and Russian hackers found them, four people The…
Experts Question Legality of Government Hacking
Source: National Cyber Security – Produced By Gregory Evans The emergence into the public consciousness of government hacking techniques and activities in recent years has sparked an increasingly loud debate over how and when law enforcement agencies should be allowed to employ these tactics. But that conversation ignores the The…
College Student Gets 15 Million Miles for Hacking United Airlines
Source: National Cyber Security – Produced By Gregory Evans University of Georgia Tech student Ryan Pickren used to get in trouble for hacking websites—in 2015, he hacked his college’s master calendar and almost spent 15 years in prison. But now he’s being rewarded for his skills. Pickren participated in The…
Facebook Opposes ACLU, Urges Court To Let Stand ‘Hacking’ Decision
Source: National Cyber Security – Produced By Gregory Evans Facebook is asking a federal appellate court to let stand its recent ruling that the defunct aggregation service Power Ventures violated a federal hacking law by “scraping” Facebook’s site. The social networking company wants the court to reject arguments by The…
Federal judge says Bitcoin counts as money during JPMorgan Chase hacking trial
Source: National Cyber Security – Produced By Gregory Evans Bitcoin qualifies as money, a federal judge ruled on Monday, in a decision linked to a criminal case over hacking attacks against JPMorgan Chase & Co and other companies. U.S. District Judge Alison Nathan in Manhattan rejected a bid by The…
Mimecast to perform live hacking at GITEX
Source: National Cyber Security – Produced By Gregory Evans Mimecast Limited has announced its participation at GITEX Technology Week 2016 along with its distributor Bulwark Technologies. The company plans to showcase its full-range of email and data security solutions and services, and demonstrate how it can protect customers against The…
Computer scientist says S.C.’s voting system makes hacking difficult
Source: National Cyber Security – Produced By Gregory Evans In this election season amid concerns of hacked election data and possibly “rigged” elections, an examination of the South Carolina elections system should give us assurance in the integrity of our elections. Although our system is not without The post Computer…
Law enforcement hacking declared search under Fourth Amendment
Source: National Cyber Security – Produced By Gregory Evans A new ruling in a Texas court declared law enforcement hacking to be search in the definition of the Fourth Amendment, but experts say further clarification is needed. A new federal court ruling has found the FBI’s investigative use of The…
Alibaba sacks 4 programmers for hacking mooncake sale
Source: National Cyber Security – Produced By Gregory Evans China’s e-commerce giant Alibaba Group said on Tuesday that four of its employees at the security department had been sacked for cheating during an internal sale of mooncakes, ecns.cn reported. On September 12, Alibaba put the company’s surplus mooncakes The post…
Here’s a List of Unknown Software Bugs a Hacking Contractor Claimed to Have
Source: National Cyber Security – Produced By Gregory Evans A surveillance contractor was advertising a series of unknown vulnerabilities, orzero-days, as part of a wide-ranging—and shady—catalog of hacking services offered to governments around the world. Aglaya, a small and little-known Indian contractor, was selling zero-days for Windows operating systems, The…