Source: National Cyber Security – Produced By Gregory Evans ISIS social media accounts are buzzing with a spreadsheet of personal data on employees of the American, British, and Australian governments, including military personnel. The Islamic State claims this list was compiled using data stolen from government systems by its “hacking…
Halo’s main menus, and their music, get revived in new website
As we wait for Microsoft to release Halo 5 Guardians for the Xbox One on October 27, someone has decided to convert all of the main menus, along with their background music, of all the previous games in the Halo series to run in a web browser. View full post…
Game Troopers asks: What environment do you want for their next Xbox game on Windows Phone?
If you use Windows Phone, then Game Troopers should be a familiar name. The studio has produced many of the top, and most recent Xbox enabled games for Microsoft’s mobile OS and they are far from done. Some of their games include Abyss, Lines, Twins, Make it Rain, and Tiny…
Apps and tools every Android power user should have on their device #2
Last week, we showed you some of the fundamental apps for Android power users. Just as we told you back then, pushing the limits of the OS with an app might sound like something “too good to be true” to the regular and uninitiated Android user, but with Android, anything…
Expert: People Need to Know their Data is Private
Source: National Cyber Security – Produced By Gregory Evans Most people do not realize how much their data is being used for purposes they do not understand, internationally renowned security technologist Bruce Schneier told Arutz Sheva on the sidelines of the fifth annual International Cybersecurity Conference in Tel Aviv. “Largely,…
A ‘Tech Dad’ Emailed 97,931 People Their Hacked Passwords
Source: National Cyber Security – Produced By Gregory Evans New hacker horror stories are being spun all the time, whether it’s Uber accounts being sold on the dark web, or an Anonymous affiliate posting the emails and passwords of Canadian government officials. Have you ever wondered if your email and…
6 notorious hackers and their second careers
Source: National Cyber Security – Produced By Gregory Evans The traditional hacker of yore, commonly thought of as a pimply adolescent with Cheetos-colored fingers, is all grown up now. But in the Clinton-era glory days, the hacker was seen as a technological terror, plying a trade few understood. Most of…
Cookie? Spam? Hacker? 11 everyday tech terms and their surprising origins
Source: National Cyber Security – Produced By Gregory Evans Many of the words we use in the modern-day tech lexicon have surprising origins. OK, so the mouse is obvious, because it looks like a mouse. But we bet a lot of you didn’t know that the Bluetooth you use to…
Hackers cast their net far and wide
Source: National Cyber Security – Produced By Gregory Evans Cyber crime in the city has taken a new dimension. Hacking is the in-thing, and it is being done from remote centres in far off countries such as Nigeria or Sierra Leone. Recently, the e-mail account of a prominent businessman in…
Ex-NSA hackers and their corporate clients are stretching legal boundaries and shaping the future of cyberwar.
Bright twenty- and thirtysomethings clad in polo shirts and jeans perch on red Herman Miller chairs in front of silver Apple laptops and sleek, flat-screen monitors. They might be munching on catered lunch—brought in once a week—or scrounging the fully […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…