Hackers-for-hire played key role in JPMorgan, Fidelity breaches

Source: National Cyber Security – Produced By Gregory Evans New  YORK/SAN FRANCISCO: When US prosecutors this week charged two Israelis and an American fugitive with raking in hundreds of millions of dollars in one of the largest and most complex cases of cyberfraud ever exposed, they also provided an unusual…

read more

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan. IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year.

Source: National Cyber Security – Produced By Gregory Evans He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums…

read more

Russian hacker admits role in huge $300m data theft scheme

Source: National Cyber Security – Produced By Gregory Evans A Russian hacker called Vladimir Drinkman has pleaded guilty to his involvement in a data breach scheme that stole 160 million credit card details from US companies and resulted in losses estimated at $300m. The US Department of Justice (DoJ) said…

read more

Russian hacker admits role in massive data breach scheme

Source: National Cyber Security – Produced By Gregory Evans A Russian man has pleaded guilty to his role in a worldwide cyber crime scheme to breach payment processors, retailers and financial institutions, resulting in over 160 million stolen credit card numbers. Vladimir Drinkman admitted partaking in the global plot nearly…

read more

AT&T played key role in NSA spying

Source: National Cyber Security – Produced By Gregory Evans AT&T played a key role in helping the National Security Agency spy on U.S. internet traffic. That’s according to a report by the New York Times. The article cites documents provided by whistleblower and former NSA contractor Edward Snowden. The documents…

read more

Hacker Pleads Guilty To Role In Over 77,000 Cyber Break-Ins

Source: National Cyber Security – Produced By Gregory Evans PITTSBURGH (Reuters) – A hacker charged with helping to break into at least 77,000 computers through the online hacking forum Darkode pleaded guilty on Monday in U.S. District Court, prosecutors said. Eric Crocker, 39, of Binghamton, New York, was among 12…

read more

North Korea denies role in smartphone hacking in South

North Korea’s state media yesterday blasted South Korea’s spy agency for alleging Pyongyang hacked tens of thousands of smartphones in the South using malware disguised in mobile gaming apps. The South’s National Intelligence Service (NIS) said in a report to […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more