Skimming attacks have jumped by 12 percent since 2013. Undoubtedly, online criminals continue to become more creative (and elusive) with the tactics they are employing to steal banking, credit, and personal financial information. What’s more, one of the favored approaches […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
How Hackers Are Using Free Wi-Fi To Steal Your Information
If you have a smartphone or laptop chances are you have used free Wi-Fi before. But what you may not know is that you are putting yourself at risk to be hacked. CBS4’s David Sutta teamed up with a group […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Hackers hold almost 20,000 Australians to ransom using CryptoWall
Almost 20,000 Australian have been held to ransom after hacker hijacked their files using CryptoWall – a malicious software program. The CryptoWall ransomware is being used by a hacking crew to encrypt users’ computer files. Once the files are encrypted […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Hacking Any Facebook Accounts using REST API
Stephen Sclafani , a Security Researcher, has discovered a critical security vulnerability in the Social Networking giant Facebook that allowed him to hack any facebook accounts. Stephen just need your user ID, he can hack into your account and read private messages, view email addresses, create or delete notes, on…
PandaLabs Discovers Hackers Using the Final Episode of TV Series “Lost” to Spread the MySecurityEngine Fake Antivirus
PandaLabs, Panda Security’s antimalware laboratory, has in the last few hours, detected the proliferation in search engines of numerous Web pages distributing the
“Using TrueCrypt is not secure” , End of TrueCrypt Development
Today, security enthusiasts woke up with a shocking news that TrueCrypt has ended its development and warns users that the tool used for encrypting drive is not safe to use. Read More…. For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com The post “Using TrueCrypt is not secure”…
Australian Govt. App Are Using Apps to Ensure Users’ Safety
Department of Human Services of Australia says that excessive permissions sought by its mobile applications are compulsory for the service delivery. This is to make sure that the customers are not at the privacy risk. Last week, the register accessed the department over board permissions sought by the apps. These…
How to Securely Erase Removable Media Using Windows 7
In a companion post, How to Securely Erase Removable Media Using Mac OS X, I explain how physical loss, theft or improper disposal of laptops or removable drives is the most common data breach of electronic personal health information. Personal identifying or health data disclosure are too frequent outcomes of…
Scammers using Zeus faulted of stealing millions and infecting thousands of computers
Federal officials announced: Nine people connected to the “Zeus” malware have been indicted, they declared the code “one of the most damaging pieces of financial malware that has ever been used.” And most of them from the Ukraine. The authorities said the defendants used Zeus to hijack account numbers, passwords,…