Names of 37 million cheating spouses are leaked online: Hackers dump huge data file revealing clients of adultery website Ashley Madison – including bankers, UN and Vatican staff

Source: National Cyber Security – Produced By Gregory Evans Hackers today outed millions of cheating spouses using the Ashley Madison infidelity website by publishing all their personal details and sexual fantasies online. The names, ages, addresses, phone numbers and credit card details of up to 37million users including 1.2million in…

read more

Hackers Dump Data Online from Infidelity Website

Source: National Cyber Security – Produced By Gregory Evans Hackers dumped online personal details of more than a million users of infidelity websiteAshleyMadison, tech websites reported on Tuesday, the latest high-profile cyber attack that threatens to wreak strife in relationships across the globe. After threatening to release salacious details on…

read more

New Social Media Cybersecurity Training Website Equips Employees To Prevent Cyber Attacks

Source: National Cyber Security – Produced By Gregory Evans SocialMediaAndCyberSecurity.com (SMCS). Henderson has over 20 years of experience in technology sales management and holds an MBA from the New York Institute of Technology. His flagship course is a full-day Cybersecurity awareness program that helps participants appreciate how their organization’s computers…

read more

The 3-step plan to make your website harder to hack

Source: National Cyber Security – Produced By Gregory Evans When a big website like Lenovo’s gets hacked, it’s news. But most such attacks take place under the radar, at smaller sites lacking the skills or time to protect themselves. Take the legions of WordPress-based sites, which got a rude awakening…

read more

What Is The Most Interesting Attack Made On A Website?

Source: National Cyber Security – Produced By Gregory Evans While not specifically a website hack, probably the most impressive Internet-related hack I can think of involved was “Internet Census 2012″, performed by a security researcher/hacker took over many, many embedded devices in order to create what may have been the…

read more