Source: National Cyber Security – Produced By Gregory Evans Three hackers have found eight holes in Uber that could allow fake drivers to be created and user email addresses reveal, and found more than 1000 of valid coupon codes including one giving drivers $100 extra in fare rides. The flaws…
5 good reasons to try HERE Maps on your iPhone or Android device
Initially available only on Windows Phone devices, HERE Maps (formerly known as Ovi Maps and Nokia Maps) can now be downloaded on Android and iOS, thus being accessible to most smartphone users around the world. Android was the first major platform to get HERE Maps (in the second half of…
How to share your photos of places with the world in Google Maps
Google Maps is one of those services that everyone and their grandma knows about. It gives us reliable directions regardelss of whether we’re driving, riding the bus, or simply getting around on foot. It lets us explore foreign countries and exotic locations from a Street View perspective. It provides us…
Hacker puts giant cat on Google Maps
A hacker drew a picture of a giant cat on Google Maps, in Hobson Bay, Auckland in New Zealand. The anonymous hacker made the picture of a cat appear as part of the land. It was thought to be difficult […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Kashmir police asks Google to remove ‘objectionable’ maps
SRINAGAR — Global internet search engine Google was asked by Kashmir’s Cyber Crime Investigation Cell to take off current depictions of the disputed Kashmir in five Google Maps domains other than maps.google.co.in. The US-based company’s legal director Susan Infantino said it refused to oblige the demands of Indian authorities. Read More…. For more information go…
Researcher’s Tool Maps Malware In Beautiful 3D Models
Quist’s VERA visualization software showing a key section of the Koobface worm. Security researchers face a tough problem: Computer viruses, unlike their biological counterparts, can’t be seen under a microscope. Even common reverse engineering tools merely render malware as thousands of lines of garbled text more legible to machine than…