seeks

now browsing by tag

 
 

Immigration phone scam seeks to steal victims’ identities

Source: National Cyber Security – Produced By Gregory Evans

Immigration phone scam seeks to steal victims’ identities

Scam artists claiming to work for “U.S. Immigration” are calling victims across the country seeking to steal their personal information and commit identity theft, the Department of Homeland Security’s inspector …

The post Immigration phone scam seeks to steal victims’ identities appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

MasterCard Seeks To Stop Online Fraud With Selfies, Fingerprints

smartcrop

Source: National Cyber Security – Produced By Gregory Evans

MasterCard Seeks To Stop Online Fraud With Selfies, Fingerprints

MasterCard plans to launch new biometric technology for verifying customer identities during online shopping transactions in the coming weeks with merchants and banks. The company has been testing facial and fingerprint recognition software, called Identity Check, in the Netherlands, Canada

The post MasterCard Seeks To Stop Online Fraud With Selfies, Fingerprints appeared first on National Cyber Security.

View full post on National Cyber Security

U.S. Supreme Court Seeks Views on Level of ‘Benefit’ Required in Special Education

The justices ask the Obama administration whether it should take up a case about the level of benefit required under federal special education law.

View full post on The School Law Blog – Education Week







#pso #htcs #b4inc

Read More

The post U.S. Supreme Court Seeks Views on Level of ‘Benefit’ Required in Special Education appeared first on Parent Security Online.

View full post on Parent Security Online

Is state’s child-abuse reporting system working? Audit seeks to find out

The world of child protection in Pennsylvania has turned upside over the past year or so with two dozen new laws put in place to bolster child safety along with new systems installed for reporting child abuse and neglect.

Given all those changes spurred at least in part by the Jerry Sandusky child sexual abuse scandal, state Auditor General Eugene DePasquale wants to take a look at how well the ones affecting ChildLine are working.

DePasquale announced on Wednesday his auditors last month began the first-ever state audit of this program overseen by Department of Human Services that runs the state’s child abuse hotline and processes applications for child abuse clearances.

Read More

The post Is state’s child-abuse reporting system working? Audit seeks to find out appeared first on Parent Security Online.

View full post on Parent Security Online

Federal Bureau of Investigation seeks hacker after 1.2 billion logins are stolen

Source: National Cyber Security – Produced By Gregory Evans

Federal Bureau of Investigation seeks hacker after 1.2 billion logins are stolen

That hacker, known as “mr.grey”, was identified based on data from a cybsecurity firm that announced in August 2014 that it had determined an alleged Russian crime ring was responsible for stealing information from more than 420,000 websites,THE DOCUMENTS said. Court documents made public last week, and seen by Reuters, name a mysterious force called “mr.grey” as the hacker, or group of hackers, behind last year’s attack, which is regarded as the biggest cyber heist to date. The FBI is now on the heels of a “mr.grey”, a Russian hacker who announced on hackers forums that he is selling users’ data hacked from thousands of websites, including Facebook and Twitter; the U.S.SECURITY AGENCY has linked the foreign hacker through a Russian email id to the breach of about 1.2 billion users’ data across the internet. Hold Security’s chief information security officer, Alex Holden, told Reuters that he believes the 2011 message proves the hacker, or group of hackers, has access to a large database of stolen data. Source: http://www.ledgergazette.com/federal-bureau-of-investigation-seeks-hacker-after-1-2-billion-logins-are-stolen/155356/

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Federal Bureau of Investigation seeks hacker after 1.2 billion logins are stolen appeared first on National Cyber Security.

View full post on National Cyber Security

For Cybersecurity, US Government Seeks a Few Good Hackers

cyber-security-generic_650x400_41445837998

Source: National Cyber Security – Produced By Gregory Evans

WASHINGTON:  Alejandro Mayorkas, a high-ranking Department of Homeland Security official, opened a speech over the summer in Las Vegas before hundreds of hackers with a dare. “I challenge you all to make my phone ring during my remarks,” he said, brandishing a flip phone the size of a soda bottle. “Take a shot,” he said, urging the crowd to hack his phone. Then he sweetened the deal: There would be a government job for anyone who succeeded. The conference’s volunteer organizers, known as goons, soon interrupted Mayorkas for a long-standing tradition at the cybersecurity convention DEF CON: First-time speakers take a shot of whiskey on stage. “That was my first of the day, by the way,” Mayorkas said after downing the Jack Daniels, “but it won’t be my last.” Mayorkas was just one of a fleet of federal officials who attended Black Hat and DEF CON this year. The two gatherings have grown into annual pilgrimages for security researchers, hackers and hangers-on. Their mission? Enlist hackers to protect the homeland. Black Hat attracts cybersecurity companies that are eager to mingle with government officials and secure government work. The DEF CON crowd skews toward the Hollywood hacker stereotypes of geeks in […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post For Cybersecurity, US Government Seeks a Few Good Hackers appeared first on National Cyber Security.

View full post on National Cyber Security

South Korea seeks hackers to defend against North Korean cyberattacks

image

Source: National Cyber Security – Produced By Gregory Evans

A new army of South Korean soldiers was intently focused on fending off the enemy attack. Where were they coming from? What tactics were they using? And how best to neutralize them? The attackers were probably North Korean – that’s a given on this divided peninsula, which remains stuck in a state of war – but those manning the defenses weren’t armed conscripts along the demilitarized zone. No, they were some of South Korea’s savviest computer whizzes, and they were dealing with that most 21st century of invasions: the cyberattack. “I do think about how I’m going to defend us against an attack from North Korea,” said Lee Kyung-won, a 16-year-old high school student from Suwon who was part of a team fighting a hypothetical cyberwar during a “white hat” hacking competition here this week. Having endured numerous cyberattacks – apparently stemming from North Korea – in recent years, South Korea is bolstering its technological defenses. The National Intelligence Service and the defense ministry have this month been hosting a competition to find computer geniuses to use their skills for good – hence the “white hats” – by intercepting attacks from nefarious “black hat” hackers. After several preliminary rounds, 16 […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post South Korea seeks hackers to defend against North Korean cyberattacks appeared first on National Cyber Security.

View full post on National Cyber Security

eGovWatch: Narendra Modi asks techies to take on cyber crime, seeks ideas for PMO mobile app

Source: National Cyber Security – Produced By Gregory Evans

With concerns over cyber security worrying the world, Prime Minister Narendra Modi on Sunday asked the Indian IT industry to innovate solutions to counter the global menace as well as work on path-breaking ideas like ‘cloud godowns’ and ‘cloud lockers’ to help keep data secure. “The whole world is concerned. Since I have become the PM, I have met around 50 world and political leaders and out of that, almost 25-30 have said cyber security is a concern. Can Indian youth work on solutions for cyber security” Modi said at a Nasscom event. The PM also said ideas from the public will be invited for developing a mobile app for his office (PMO) to make it mobile friendly for citizens. Stating that cyber security will be a “very big market”, Modi suggested that Nasscom should form a task force to see how this opportunity can be leveraged as Indian IT professionals can do a lot for cyber-safety of digital assets across the world. “I look forward to path breaking ideas from young talent across the country to build innovative technology solutions,” he added. The PM said if security is not provided, people will be scared of using their mobile phones […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post eGovWatch: Narendra Modi asks techies to take on cyber crime, seeks ideas for PMO mobile app appeared first on National Cyber Security.

View full post on National Cyber Security

Google Voices Concerns Regarding Government Warrants, Seeks to Protect Users

AH-GOOGLE-IO-2014-144

Source: National Cyber Security – Produced By Gregory Evans

Google has joined advocacy organisations such as the ACLU in voicing their concerns about proposed Amendments to Federal Rule of Criminal Procedure 41 by sending a comment letter to The Judicial Conference Advisory Committee on Criminal Rules. This rule outlines how warrants are issued to obtain information. This rule places limitations on how and what types of warrants may be issued. More specifically it states that a judge may not issue a search and seizure warrant outside his or her jurisdiction though there are exceptions to this rule. The Advisory Committee on the Rules of Criminal Procedure wants to include new rules for conducting “remote access” searches of electronic storage media. It stipulates that the physical location of the media must be concealed through electronic means. It also includes provisions related to botnet investigations in some cases. What does all that mean? Well, Google claims that the new provisions that The Advisory Committee on the Rules of Criminal Procedure have proposed will have a huge impact concerning warrant power and that because it will give the Department of Justice (DoJ)  such far-reaching power, that this matter should be left to Congress to handle, and not an obscure committee. Google also […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Google Voices Concerns Regarding Government Warrants, Seeks to Protect Users appeared first on National Cyber Security.

View full post on National Cyber Security

U.S. seeks to extradite B.C. resident accused of stealing jet secrets – National Cyber Security | National Cyber Security

nationalcybersecurity.com – U.S. officials have filed the necessary paperwork to have a B.C. resident from Beijing extradited over allegations that he stole fighter-jet secrets from Pentagon contractors and conspired to sell …

View full post on Hi-Tech Crime Solutions Weekly