When governments, utilities and corporations need to protect their most sensitive data, they create what’s called an air-gap network. It involves storing information on computers that are never connected to the Internet, an extreme method of isolation designed to prevent […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Home Depot hackers used vendor log-on to steal data, e-mails
Hackers used a vendor’s stolen log-on credentials to penetrate Home Depot’s computer network and install custom-built malware that stole customer payment-card data and e-mail addresses, the retailer announced Thursday. The malware, which had not been seen in other data thefts, […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Stolen IDs Being Used to Steal Cars
Forget hot-wiring. As new technology makes it harder to steal cars the old-fashioned way, today’s thieves are using more sophisticated “white-collar” methods to get their hands on a set of wheels, according to the National Insurance Crime Bureau (NICB). For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com…
Hackers Are Using Gmail Drafts to Update Their Malware and Steal Data
In his career-ending extramarital affair that came to light in 2012, General David Petraeus used a stealthy technique to communicate with his lover Paula Broadwell: the pair left messages for each other in the drafts folder of a shared Gmail […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Phone Hackers Dial and Redial to Steal Billions
SAN FRANCISCO — Bob Foreman’s architecture firm ran up a $166,000 phone bill in a single weekend last March. But neither Mr. Foreman nor anyone else at his seven-person company was in the office at the time. Read More…. For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com…
How Hackers Are Using Free Wi-Fi To Steal Your Information
If you have a smartphone or laptop chances are you have used free Wi-Fi before. But what you may not know is that you are putting yourself at risk to be hacked. CBS4’s David Sutta teamed up with a group […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Hackers can steal an astonishing amount of personal information in iCloud
During Tuesday’s big keynote address, Apple never once mentioned the iCloud-related scandal that occurred in the week before its iPhone 6 announcement. But although Tim Cook vowed to improve iCloud security in an interview soon after those celebrities’ nudes popped […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
The Police Tool That Pervs Use to Steal Nude Pics From Apple’s iCloud
Source: National Cyber Security – Produced By Gregory Evans As nude celebrity photos spilled onto the web over the weekend, blame for the scandal has rotated from the scumbag hackers who stole the images to a researcher who released a tool used to crack victims’ iCloud passwords to Apple, […]…
Chinese Hackers Steal Personal Data From 4.5M Community Health Systems Patients
Source: National Cyber Security – Produced By Gregory Evans Community Health Systems, one of the largest hospital operators in the U.S., today announced that hackers stole about 4.5 million records with patient names, addresses, birth data, phone numbers and Social Security numbers. The company says the data was stolen […]…
Hacker used Canadian Internet provider to steal $83K Bitcoins
Researchers with a cyber security firm say they have uncovered that a hacker used access to a Canadian Internet provider to hijack large foreign networks, stealing more than US$83,000 in virtual currency. The U.S.-based Dell SecureWorks says the hacker operated […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…