‘Babyface hacker who paralysed a phone giant’: Son of a single mother, TalkTalk suspect, 15, is violent video game addict who rarely leaves his bedroom

Source: National Cyber Security – Produced By Gregory Evans The boy of 15 arrested over the TalkTalk cyber-attack is a baby-faced loner and gaming fanatic nicknamed ‘Vicious’ who rarely leaves his bedroom. The reclusive youngster is suspected of being behind the huge security breach that has put the banking details…

read more

FBI report shows drop in property and violent crime

The estimated number of violent crimes in the nation decreased 4.4 percent in 2013 when compared with 2012 data, according to FBI figures released today. Property crimes decreased 4.1 percent, marking the 11th straight year the collective estimates for these […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more

4 additional alleged MS-13 members charged in violent racketeering conspiracy

John Wagley Top Priority Sector:  law_enforcement_first_responders A federal grand jury has returned a For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com The post 4 additional alleged MS-13 members charged in violent racketeering conspiracy appeared first on National Cyber Security. View full post on National Cyber Security

read more

Anonymous ATTACKS California Cop over a Violent Tweet.

A Californian cop who goes by the name – “Sgt.Mike Rood”(Richmond Police Department), tweeted last thursday that he would shoot Anonymous hacktivists in a co… ________________________ https://gregorydevans.com – http://gregorydevans.wordpress.com – http://hackerforhire.com – http://hackerforhireusa.com

read more

Book Review: Violent Python

Violent Python (http://store.elsevier.com/product.jsp?locale=en_US isbn=9781597499576) is A Cookbook for Hackers, Forensic Analysts, Penetration Testers, and Security Engineers. This is a relatively broad scope and demonstrates how Python can be used to automate and assist with tasks across a variety of diverse InfoSec disciplines. However, breadth does not preclude depth in this…

read more