hackers

now browsing by tag

 
 

Bitcoin users are opening their wallets to hackers through mobile networks

Source: National Cyber Security – Produced By Gregory Evans

Cryptocurrencies like Bitcoin make a big deal of their security; theoretically, they are almost impossible to hack. Every transaction is stored in a ‘digital ledger’, shared across multiple machines; an attacker would need to compromise every computer in the chain to successfully hack the system. However, the digital wallets that…

The post Bitcoin users are opening their wallets to hackers through mobile networks appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

20-year prison term proposed for hackers of State secrets

Source: National Cyber Security – Produced By Gregory Evans

Cyber criminals, convicted of hacking into government databases to mine State secrets for sale to foreign countries, will serve 20 years in jail if Parliament passes a Bill seeking to tame the growing white-collar crime. The Computer and Cybercrimes Bill 2017, a revised version of a 2016 law, also proposes…

The post 20-year prison term proposed for hackers of State secrets appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Cyberattack performed by Anonymous hackers on Israeli government ministry’s website

Source: National Cyber Security – Produced By Gregory Evans

Members of Anonymous hacked into the website of the Israeli Periphery Development Ministry’s Galilee Development Authority leaving a message with the organization’s symbol: “Israel is helping human terrorist groups,” they wrote. The website of the Israeli Periphery Development Ministry’s Galilee Development Authority was broken into by hackers from Anonymous, most…

The post Cyberattack performed by Anonymous hackers on Israeli government ministry’s website appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hackers can steal data off your Android phone via Bluetooth

Hackers can steal data off your Android phone via BluetoothAs always with new security issues affecting mobile devices, it’s Android users who have to worry about the newly discovered Bluetooth hack. Windows and iOS phones are protected against it but only if you’ve installed the September 12th security patch on Windows or run iOS 9.3.5 or laters. A security… View full post on National […] View full post on AmIHackerProof.com | Can You Be Hacked?

Cybersecurity firm Symantec says hackers infiltrated power grid controls in America and abroad

Source: National Cyber Security – Produced By Gregory Evans

Attempts by hackers to break into the energy sector in the US and abroad have made headlines in recent months. According to a report by the cybersecurity firm Symantec, hackers have now successfully infiltrated power grid controls in the US and Turkey, and gained access to systems “that could provide…

The post Cybersecurity firm Symantec says hackers infiltrated power grid controls in America and abroad appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hackers target Schuyler Co. 911 center, system temporarily disrupted

more information on sonyhack from leading cyber security expertsSource: National Cyber Security – Produced By Gregory Evans SCHUYLER COUNTY, NY (WENY) — Roughly two weeks ago, Schuyler County officials say hackers were able to gain access to the communications system for the whole county. The mode of access is now being investigated on a state and federal level. “The New York State Cyber […] View full post on AmIHackerProof.com | Can You Be Hacked?

App lets hackers develop Android ransomware without code

more information on sonyhack from leading cyber security expertsSource: National Cyber Security – Produced By Gregory Evans Creating malware isn’t rocket science anymore. Unlike those old-school hackers, who had to write their own malicious code and run them to hack someone’s computer, all the new hackers need is an Android device. Yes, you’ve read it right. Now, there’s a new Android app that […] View full post on AmIHackerProof.com | Can You Be Hacked?

Hackers are able to command Siri, Alexa in a frequency too high for you to hear

Source: National Cyber Security – Produced By Gregory Evans

Researchers have discovered that it is possible to “speak” to voice assistants like Siri and Alexa in a frequency too high for the human ear to hear, Fast Company reports. This so-called “DolphinAttack” could potentially allow hackers to send commands to iPhones or Amazon Echos, asking the devices to call…

The post Hackers are able to command Siri, Alexa in a frequency too high for you to hear appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hackers can now mine cryptocurrency on your PC, warns Kaspersky

Source: National Cyber Security – Produced By Gregory Evans

Russian cybersecurity firm Kaspersky Lab has discovered malware which hides inside a computer, mines cryptocurrency and sends it to hackers. The virus is spread through social engineering and adware. Kaspersky Lab has discovered two groups of hackers working in Russia, which have control of 5,000 and 4,000 computers. When installed…

The post Hackers can now mine cryptocurrency on your PC, warns Kaspersky appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hackers target govt websites in cyber spillover from Arakan crisis

Source: National Cyber Security – Produced By Gregory Evans

Hackers targeted several government websites this week, according to state media, apparently in retaliation for Burma’s treatment of the country’s Muslim minority, as international attention on the plight of the Rohingya in northern Arakan State intensifies. The Burmese-language state-run daily Kyemon reported on Tuesday that six government websites had been…

The post Hackers target govt websites in cyber spillover from Arakan crisis appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures