Source: National Cyber Security – Produced By Gregory Evans What is most secure website? NOTHING. Even Google is vulnerable to all sort of attacks! Security researchers and Co-Founders of Detectify have discovered a critical security vulnerability in Google that allowed them to access Internal servers. The vulnerability exists in the…
US senator: The new NSA spying program is so clumsy the NSA won’t bother using it
Source: National Cyber Security – Produced By Gregory Evans A new, more limited system for monitoring Americans’ phone calls for signs of terrorist intent is so slow and cumbersome that the U.S. National Security Agency will likely never use it, a senior Senate Republican said. Richard Burr, chairman of the…
He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan. IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year.
Source: National Cyber Security – Produced By Gregory Evans He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums…
An Entire City Trolled NSA Spies Using an Art Project
Source: National Cyber Security – Produced By Gregory Evans When it was revealed in 2013 that the NSA and its UK equivalent, GCHQ, routinely spied on the German government, artists Mathias Jud and Christoph Wachter came up with a plan. They installed a series of antennas on the roof of the Swiss Embassy…
Man wanted on fraud, using stolen credit card
Source: National Cyber Security – Produced By Gregory Evans Police are looking for the public’s help in searching for a man wanted on fraud. According to police, one man used a stolen credit in his possession to make purchases at the Westfield Target totaling nearly $600. Police go on to…
Hackers steal £20 million from UK bank accounts using malware
£20($30) million stolen from British bank accounts in malware attack Law enforcement agencies with the help of several cybersecurity firms took control of a botnet network of machines that distributed malicious software known as “Bugat,” “Cridex” or “Dridex. The Dridex malware was used by cyber criminals to steal some £20…
PSA: You may have issues using a Fitbit with your Marshmallow phone right now [Update]
Update: It looks like you will need to keep location services turned on — at least for now — for your Android 6.0 Marshmallow device to sync with your Fitbit. Original story: Now that Google is rolling out Android 6.0 Marshmallow to Nexus devices, we are starting to see different…
Report: Iran-based hackers spy using fake LinkedIn profiles
Source: National Cyber Security – Produced By Gregory Evans Washington (CNN)A group of suspected Iranian hackers are using a sophisticated network of fake LinkedIn profiles to spy on unsuspecting targets worldwide — including the U.S. — according to a new report. The fake personas fell into two groups: one set…
EU-US data flows using “Safe Harbour” may be illegal because of NSA spying
Source: National Cyber Security – Produced By Gregory Evans The “Safe Harbour” framework—which is supposed to ensure data transfers from the EU to the US are legal under European data privacy laws—does not satisfy the EU’s Data Protection Directive as a result of the “mass, indiscriminate surveillance” carried out by the…
Leaked documents reveal Microsoft’s plan to sell mobile to the enterprise using trials
Microsoft has apparently put together a special marketing campaign to help push Windows Phone sales for the enterprise. Microsoft is apparently looking at two different presentation packages for businesses. One uses a “premium packaging concept development,” designed for “decision makers in organizations with large handset opportunities.” The other is a…