Source: National Cyber Security – Produced By Gregory Evans I am currently reading Ryan Holiday’s book, Growth Hacker Marketing, alongside other growth hacking resources, about 33 of them in total. The reason I am on the growth hacking crash course is because I am no longer interested in doing The…
The Evolution of Hacking
Source: National Cyber Security – Produced By Gregory Evans Nowadays, the word “hacker” carries an overwhelmingly negative connotation, conjuring up images of digital thieves intent on stealing identities and letting disruptive viruses loose into cyberspace. It wasn’t always that way. In fact, computer hackers were originally viewed by society The…
Cybersecurity companies work to curb car hacking
Source: National Cyber Security – Produced By Gregory Evans In today’s world of super-connectivity, we secure personal data with firewalls, anti-virus protection, and encryption. But what about our cars? Autos are increasingly becoming computers on wheels. And as CCTV’s Stephanie Freid reports, they are vulnerable to hacks. Cars could The…
Russian man faces US trial in lucrative hacking scheme
Source: National Cyber Security – Produced By Gregory Evans Prosecutors describe Roman Seleznev, the son of a Russian lawmaker, as a master hacker who orchestrated an international scheme that resulted in about $170 million in fraudulent credit card purchases. In a federal jury trial that begins this week, The post…
China Medals in Hacking
Source: National Cyber Security – Produced By Gregory Evans Cross the Chinese competitors in Rio, or dare to question their competitive honesty amid allegations of doping — and you’ll become the target. That’s what happened to Australian Olympic swimmer Mack Horton. Horton won the gold medal in the 400-meter The…
US intelligence to help companies avert supply-chain hacking
Source: National Cyber Security – Produced By Gregory Evans U.S. intelligence officials are planning to provide information including classified threat reports to companies about the risks of hacking and other crimes tied to the supplies and services they buy. The effort is part of a new campaign by the The…
A Brain hacking Wearable to Synchronize your Mind & Body
Source: National Cyber Security – Produced By Gregory Evans Wearable tech has gotten better over the past few years. We have moved on from a time, where it is not just about smart watches anymore. Head mounted displays in the form of VR Headsets, AR headsets and what not. The…
Saratoga Springs man pleads guilty to hacking United Airlines website
Source: National Cyber Security – Produced By Gregory Evans A Saratoga Springs man accused of hacking into the United Airlines website and stealing travel vouchers has pleaded guilty. Ammon Cunningham pleaded guilty to a second-degree felony charge of a pattern of unlawful activity, while three additional felony charges of The…
New Global Study Reveals Majority of Visual Hacking Attempts Are Successful
Source: National Cyber Security – Produced By Gregory Evans ST. PAUL, Minn.–(Business Wire)–Organizations around the world are at risk of sharing highly sensitive information through visual hacking in business office environments. This risk was revealed in the 2016 Global Visual Hacking Experiment, an expansion of the 2015 Visual Hacking The…
Accused of hacking, blocked from hugging
Source: National Cyber Security – Produced By Gregory Evans Majd Oweida’s parents had to wait almost four months before they could visit their son in jail. “I cannot describe what it’s like to see your beloved son behind bars,” said Maha Oweida, Majd’s mother. “I could not hug him or…