Source: National Cyber Security – Produced By Gregory Evans While Russia’s cyber escapades continue to dominate the headlines, a more salient threat to those outside of the Beltway is escaping notice. For the average hacker, private sector networks are preferred targets over their public sector counterparts because they tend ……
New Techniques Used to Target Business Email
Source: National Cyber Security – Produced By Gregory Evans An Internet-security firm Thursday offered new insights into the perpetrators behind an increasingly popular type of cyberfraud targeting small businesses, tracing the attacks to Nigerians involved in earlier types of email scams. In one variant of the scheme, SecureWorks Inc. said…
Now webcams are being used by hackers to attack websites
Source: National Cyber Security – Produced By Gregory Evans THE GROUP RESPONSIBLE for knocking both Xbox Live and Playstation Network offline back in 2014 hacked thousands of cameras and used them to carry out attacks. Lizard Squad made a name for itself after carrying out DDoS (Distributed Denial of Service)…
FBI Randomly Used Malware on TORMail Users While Busting Pedophiles
Source: National Cyber Security – Produced By Gregory Evans In 2013, the Federal Bureau of Investigation seized one of the most popular dark web email platform called TorMail and soon after the department began to rifle through the contents of the server. Back then, the researchers suspected that the FBI…
Men who used fake identities wanted by police
Source: National Cyber Security – Produced By Gregory Evans POLICE have stepped up the hunt for two men who were using fake identity cards around Europe and wiring money to relatives of the Paris attacks ringleader. It was discovered the men, who disguised themselves as Samir Bouzid and Soufiane Kayal,…
Cops are struggling to crack encrypted phones used for organised crime due to advances in technology
Source: National Cyber Security – Produced By Gregory Evans LAW enforcement agencies are being thwarted in the war on terror and organised crime by a surge in highly-encrypted mobile phones. Codebreakers say they are involved in a constant battle with manufacturers updating their technology to stay one step ahead of…
Chinese Hackers Used Dropbox To Monitor Hong Kong Activists, Journalists: FireEye
Source: National Cyber Security – Produced By Gregory Evans Chinese hackers used malicious software to monitor journalists and activist groups involved in the Hong Kong protests this year, according to new research from the cybersecurity company FireEye. Attackers used Dropbox and other cloud storage providers to communicate malware after targeting users…
Suspects used fraudulent credit cards at three Rock Hill stores
Source: National Cyber Security – Produced By Gregory Evans Three New York City residents were jailed onCREDIT CARD FRAUDcharges after they used fraudulent cards to purchase more than $2,000 in merchandise, according to Rock Hill Police. Shakera Louise Brown, 24, of Staten Island, 24-year-old Jewel Wilson of Brooklyn and 24-year-old…
Police: Bookkeeper used office credit card to buy $96K in groceries, personal travel
Source: National Cyber Security – Produced By Gregory Evans A woman who worked as a bookkeeper for a West Palm Beach construction business is accused of making more than $96,000 in fraudulent charges while using her company’s credit account, police said. City police say Jessica Erinne Mount, 37, used a…