Source: National Cyber Security – Produced By Gregory Evans Irked that advertisers are already trying to pinpoint your phone’s location? It might be even harder to escape their grasp if AdNear is successful. The ad intelligence group is experimenting with location-tracking drones that profile audiences in harder-to-reach areas (say, field…
As Jamaica Prepares to Begin Using Drones to Fight Crime, Concerns Emerge Over Human Rights
Source: National Cyber Security – Produced By Gregory Evans As Jamaica gets ready to use drone technology in its crime fighting, the United States has announced new guidelines governing the use of the technology that could influence Jamaica’s approach. Last week, the Jamaica Constabulary Force outlined its timetable for the…
Scunthorpe police using tablet computers to tackle crime
Source: National Cyber Security – Produced By Gregory Evans A STALWART of Humberside Police, Sergeant James Main has been witness to a host of changes to the force during his years of service. Now, faced with major restructuring that will reduce the number of officers in the region, it would…
Five arrested for allegedly using fake credit cards
Source: National Cyber Security – Produced By Gregory Evans CARTERET – Five people — four from Florida and one from New York — who were allegedly involved in using fake credit cards to make purchases at local stores have been arrested by police. Detectives believe the five were using stolen…
Suffolk caregiver arrested for allegedly stealing, using elderly woman’s credit card
Source: National Cyber Security – Produced By Gregory Evans Powered by Max Banner Ads Suffolk, Va. – Suffolk Police are looking for a woman in connection to a series of credit card/debit card fraud incidents. The incidents occurred over five days in December. Police say 31-year-old Lynette Maria Riddick made a…
Hacker fakes German minister’s fingerprints using photos of her hands
It’s an old cliché of security researchers: fingerprints might appear more secure than passwords. But if your password gets stolen, you can change it to a new one; what happens when your fingerprint gets copied? That’s no longer an abstract […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Man bites Macy’s employee after using fake credit cards
One man reportedly bit a Macy’s employee at the Westfield mall in Milford after he and another man used fake credit cards to buy more than $12,000 if gift cards. The Milford Police Department received a complaint from Macy’s department […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Hacker demonstrates risks of using public Wi-Fi
ORLANDO, Fla. – Computer hacker Jonathan Singer wants to remind everyone that not all hackers are of the so-called “black hat” variety who have sinister intent. [WEB EXTRA: Extended video] “‘White hat’ is what I do in my industry and […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
North Korea Is Using Infected Mobile Games To Hack The Phones Of South Koreans
Wednesday that North Korea used infected mobile games to hack the phones of over 20,000 South Koreans. The Korea Times reports that the National Intelligence Service has accused the North Korean government of using its hacker army to disguise spying software […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Hackers Are Using Gmail Drafts to Update Their Malware and Steal Data
In his career-ending extramarital affair that came to light in 2012, General David Petraeus used a stealthy technique to communicate with his lover Paula Broadwell: the pair left messages for each other in the drafts folder of a shared Gmail […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…