Source: National Cyber Security – Produced By Gregory Evans After Russian 800-meter runner Yulia Stepanova and her husband exposed the systematic state-sponsored doping regimen pervasive in Russian athletics, the couple and their young son fled to the United States, fearing for their safety. Now it seems that their fears The…
20 students suspended in Long Island sexting scandal
Fifteen-year-olds AJ Fenton and Kiran Phelan say they were suspended from school for opening a sex video on their smartphones, sent to them on a group text message. “When I got the video, I didn’t know what it was,” said AJ. In all, about 20 Long Island students were suspended…
U.S. Card Thief Jailed for a Long Haul
Source: National Cyber Security – Produced By Gregory Evans Today we got to know that a U.S card thief have to face lengthy jail terms because of credit card fraud. Cameron Harrison of Georgia was a part of credit card fraud on a website Carder.su. About $50m has been charged to…
Hacking an Android phone can be as simple as typing in a really long password
Source: National Cyber Security – Produced By Gregory Evans Android 5.0 “Lollipop,” the latest version of the Android phone operating system, is vulnerable to a simple hack that involves typing in a password so long that it causes the phone to crash before then booting to the unlocked home screen….
Fraud-resistant credit cards are a long time coming
Source: National Cyber Security – Produced By Gregory Evans Powered by Max Banner Ads The major credit card companies—Mastercard, Visa, Discover and American Express—along with the major banks that issue their cards, have set a deadline of October 2015 for widespread adoption of new, more financially secure credit cards in…
Morgan Stanley data theft is latest in long list of cyber crimes
Source: National Cyber Security – Produced By Gregory Evans Before the days of information technology, crime was a simple matter. Some men in masks would run into a bank with an empty duffel bag and have the teller fill it up before jumping into the getaway car waiting outside. And…
Weaknesses in the Adobe Shockwave since long
Adobe Shockwave software had the security vulnerabilities since 2010 and unfortunately, the company have not taken any necessary steps to cure it. Carneigie Mellon researcher told that when the attack would happen, it would take every other Flash software too. With this, the attack on Shockwave is also possible. The…
Is God Satisfied As Long As We’re Doing Our Best?
Greg Koukl of Stand to Reason answers the question, “How do you respond to someone who thinks God will be satisfied as long as we’re doing our best?” For mor… ________________________ https://gregorydevans.com – http://gregorydevans.wordpress.com – http://hackerforhire.com – http://hackerforhireusa.com
Vendors unveil new technologies at port security expo in Long Beach, CA
Troy Anderson Top Priority Sector: maritime_port_security Image Caption: Read More…. View full post on The Cyber Wars