I’m going to start this week’s column with a bit of an aside. First, my big news: I’ve left the Westman Journal as its full-time editor to further my education. But don’t worry, the Journal is now in the […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Government’s own ‘white-hat’ hackers give HealthCare.gov mixed review on security
The government’s own watchdogs tried to hack into HealthCare.gov earlier this year and found what they termed a critical vulnerability — but also came away with respect for some of the health insurance site’s security features. Those are among the […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Israel to Create Cyber Security Authority after Alleged Iranian Hacker Attack
Israel is planning to create a new cyber defense body in order to protect itself against increasingly sophisticated cyber-attacks targeting the state’s networks, as announced by Israeli Prime Minister Benjamin Netanyahu on Sunday. “I decided last week to develop a […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Webcam Hackers Are Spying On You And Your Kids Through Your Computer, Security Cam
Is your webcam spying on you? Not likely, but the “home hackers” on the other end could be snooping on your activities using your computer’s camera, baby monitor, and security cam, among other things. In light of the recent nude […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Israeli hackers ‘scary talented,’ says security expert
Israeli hackers are young and scary — scary talented, that is. That’s the observation of a man who knows what hacking is all about. Antonio Forzieri. EMEA Cyber Security head for security firm Symantec. “I’ve seen hackers at work all […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Security risks found in half of China’s government websites
As an increasing number of government organizations embrace the digital age by going online, website security for their domains are at high risk for cyber attacks, a survey by the National Computer Virus Emergency Response Center has discovered. The center […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Hacker breach raises further healthcare data security concerns
A successful cyber-attack on Community Health Systems (CHS), one of the USA’s largest hospital groups, attributed to the Chinese hacking group APT 18 on August 18 led to details including names, addresses, dates of birth, telephone and social security numbers […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Kindle security flaw could let hackers take over your Amazon account with a malicious ebook
Most internet users know that illegally downloading movies and music can be a quick way to get viruses on your computer, but now hackers can also exploit a relatively new type of digital contraband: pirated ebooks. www.trilastin.com/Official-SiteGerman security researcher Benjamin […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Computer security hole puts kids at risk
Two computer experts have discovered a way for strangers to get your personal information using a security hole that could leave you and your children vulnerable. Bryan Seely and Ben Caudill say they’ve discovered one of the biggest potential security […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Hacker puts Doom on a printer to highlight security vulnerabilities
In 1993, first-person shooter Doom was a groundbreaking game. In 2014, it’s being used by ethical hackers to demonstrate security vulnerabilities in connected devices. Specifically: printers. During his talk at the 44Con conference in London, Michael Jordon from Context Information […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…