. Croix County Investigator Brandie Hart is all too familiar with how children can be victimized in her role as the chief investigator of child and sexual abuse for the sheriff’s office.
He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan. IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year.
Source: National Cyber Security – Produced By Gregory Evans He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums…
Facebook To Warn Users If Government Is Hacking Their Accounts
Source: National Cyber Security – Produced By Gregory Evans Having been able to take steps in the past to assure that Facebook users’ rights haven’t been compromised, now the social network site is taking a step further by notifying users if a government entity is detected to be hacking or…
TalkTalk hack: Family of 15-year-old alleged hacker ‘feel like prisoners in their homes’
Source: National Cyber Security – Produced By Gregory Evans The family of a 15-year-old alleged hacker accused of involvement in a huge cyber attack on TalkTalk feel like prisoners in their homes, it was claimed yesterday. The video-game loving boy was arrested in connection with one of the largest cyber…
Patent application by Google designed to help butterfingers from dropping their phone
You might recall the patent filled by Apple a few years ago that would use internal sprays of a gas inside a handset, to make sure that a falling phone would land on an area where very little internal damage could take place. But a new patent application filed by…
Some AT&T Nokia Lumia 830 owners find a way to flash the Lumia Denim update on their phone
AT&T never sent out the Lumia Denim update for the Nokia Lumia 830. But there is still hope for those AT&T customer rocking the Windows Phone handset. Apparently, some Lumia 830 users were able to flash the update onto their phones from the Windows Phone Recovery Tool server. The app…
BlackBerry users keep their smartphones longer than owners of other brands
Interesting data from Kantar WorldPanel reveals that the average U.S. smartphone owner will hold on to his device for 22 months before upgrading to a new model. It almost seems like American smartphone users are still brainwashed to trade in their phone every two years, the length of the typical…
UBER HIRES HACKERS: UBER RESEARCHING SELF-DRIVING CARS BY HIRING THEIR OWN HACKERS TO TEST THINGS OUT
Source: National Cyber Security – Produced By Gregory Evans Uber has hired hackers in order for them to conduct well-rounded research on their self-driving cars. According to the Wall Street Journal, Uber Technologies Inc. hired security researchers Charlie Miller and Chris Valasek, who will work in the company’s Pittsburgh lab….
How do hackers actually get paid for their services?
Source: National Cyber Security – Produced By Gregory Evans Cyber-crooks don’t receive 1099 forms or pay taxes like other freelancers. Instead they’re paid in clever and often nefarious ways. The successful hacker is the one whose real name is never known, who shuns the limelight, and stays off the radar….
CISOs spend 77% of their time on tech, not enough time on strategy
Source: National Cyber Security – Produced By Gregory Evans According to the Deloitte CISO Transition Lab, a chief information security officer (CISO) has four faces — the strategist, the advisor, the guardian of business assets, and the technologist. The findings suggest that on average, CISOs spend 77 percent of their…