possible

now browsing by tag

 
 

Vetting of social media, phones possible as part of travel ban review

Source: National Cyber Security – Produced By Gregory Evans

The Trump administration is developing new ways to vet people coming into the United States as a deadline in the President’s controversial travel ban nears, officials said Tuesday. “Each of the opportunities that the US government has to interview and/or vet potential inbound travelers is being reviewed,” acting Customs and…

The post Vetting of social media, phones possible as part of travel ban review appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Is brain hacking possible?

Brain hacking. It may evoke images of Hephaestus, Greek god of craftsmen and metallurgy, hacking literally through the head of his father Zeus, enabling the birth of Athena, fully grown with weapons and armor. But we’ll be hearing increasingly about a more modern form of brain hacking, and it doesn’t… View full post on National Cyber Security Ventures

It’s Possible (and Fairly Easy) to Hack a PC With a Vape Pen

Source: National Cyber Security – Produced By Gregory Evans

It’s Possible (and Fairly Easy) to Hack a PC With a Vape Pen

E-cigarette smokers consider yourself warned: that vape pen you love to puff on could expose your computer to malware. According to a report from Sky News, security researcher Ross Bevington recently demonstrated how to hack a PC with a vape pen during a presentation at BSides London. Bevington showed how…

The post It’s Possible (and Fairly Easy) to Hack a PC With a Vape Pen appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Decade in prison possible for man who stole man’s ID

Source: National Cyber Security – Produced By Gregory Evans

Decade in prison possible for man who stole man’s ID

A Jersey City man with a long criminal record could face 10 years in prison after he was convicted of stealing a Mendham man’s identity and more than $74,000 from his bank in Bedminster, according to a statement issued on Wednesday, May 3, by Somerset County Prosecutor Michael H. Robertson. After a trial before Superior Court Judge Edward M.Coleman in …

The post Decade in prison possible for man who stole man’s ID appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Additional sex charges raise new concerns of possible trafficking ring

Police forwarded new information to prosecutors that they believe could result with a human trafficking charge being filed against a former Muskogee firefighter who already faces several sex crimes.

Muskogee Police Officer Lincoln Anderson said during a news conference Tuesday the investigative findings have prompted concerns about a possible child pornographic, trafficking ring. Anderson said investigators have identified a second child who is believed to be a victim an another adult co-conspirator.

Zackery Blaine Perry, 30, was charged Jan. 19 with four felonies that included possessing and distributing child pornography, sexual exploitation of a child and crimes against nature. He was charged Monday along with Melissa Skelton, 26, for conspiracy and sexual abuse of a child younger 12 years old — both are being held without bond.

Read More

The post Additional sex charges raise new concerns of possible trafficking ring appeared first on Parent Security Online.

View full post on Parent Security Online

LGBT Students: Five Possible Effects of Trump’s Presidency, Ed. Secretary Choice – Rules for Engagement – Education Week

How will Donald Trump’s stances on education, which stress a scaled back federal role, and the appointment of voucher advocate Betsy DeVos as education secretary affect LGBT students?

View full post on Education Week: Bullying







#pso #htcs #b4inc

Read More

The post LGBT Students: Five Possible Effects of Trump’s Presidency, Ed. Secretary Choice – Rules for Engagement – Education Week appeared first on Parent Security Online.

View full post on Parent Security Online

Correcting the Record on 38 North’s Analysis of North Korea’s Possible Fifth Nuclear Test

Source: National Cyber Security – Produced By Gregory Evans

The recent article, “What’s behind North Korea’s attempts for dialogue?” by Cha Du-Hyeogn, published by NK News calls 38 North to task as “falling for Pyongyang’s trickery” and reporting on “omens” of an imminent fifth nuclear test. Normally, we wouldn’t respond to such comments, but 38 North takes a great deal of pride in its […]

The post Correcting the Record on 38 North’s Analysis of North Korea’s Possible Fifth Nuclear Test appeared first on National Cyber Security.

View full post on National Cyber Security

New Possible Indication of North Korean Nuclear Test Preparations

Source: National Cyber Security – Produced By Gregory Evans

A 38 North exclusive with analysis by Joseph S. Bermudez Jr. Commercial satellite imagery of North Korea’s Punggye-ri Nuclear Test Site from May 5 suggests that Pyongyang may be preparing for a nuclear test in the near future. While the test site continues to show low levels of activity, vehicles have been spotted at what […] New Possible Indication of North Korean Nuclear Test Preparations is an article from 38 North: Informed Analysis of North Korea, published by the US-Korea Institute at SAIS. View full post on 38 North: Informed Analysis of North Korea

The post New Possible Indication of North Korean Nuclear Test Preparations appeared first on National Cyber Security.

View full post on National Cyber Security

More Evidence of Possible Reprocessing Campaign at Yongbyon; Progress at Experimental Light Water Reactor

Source: National Cyber Security – Produced By Gregory Evans

A 38 North exclusive with analysis by Joseph S. Bermudez, Jr. Summary Recent commercial satellite imagery shows new developments at the Yongbyon Nuclear Scientific Research Center indicating that North Korea has already begun or plans to commence a reprocessing campaign to separate additional plutonium for nuclear weapons. This activity consists of the presence of a […] More Evidence of Possible Reprocessing Campaign at Yongbyon; Progress at Experimental Light Water Reactor is an article from 38 North: Informed Analysis of North Korea, published by the US-Korea Institute at SAIS. View full post on 38 North: Informed Analysis of North Korea

The post More Evidence of Possible Reprocessing Campaign at Yongbyon; Progress at Experimental Light Water Reactor appeared first on National Cyber Security.

View full post on National Cyber Security

Australia in probe of possible tax evasion

Source: National Cyber Security – Produced By Gregory Evans

Australia in probe of possible tax evasion

BERLIN (AP) — The Latest on the publication by a coalition of media outlets of an investigation into offshore financial dealings by the rich and famous (all times local): 11:35 a.m. Nordea, the Nordic region’s biggest bank, says it doesn’t help wealthy customers evade taxes in response to reports linking it to the Panamanian law firm at the center of a media investigation into offshore accounts. Swedish public broadcaster SVT, one of the hundreds of media with access to leaked documents detailing offshore accounts, says Nordea’s private banking unit in Luxembourg worked with Panamanian firm Mossack Fonseca to help wealthy customers set up shell companies. Nordea said Monday it follows and “all rules and regulations” and doesn’t tolerate being used to evade taxes. It said its Luxembourg unit in 2009 started taking measures “in addition to those prescribed in laws and regulations or industry practices.” Since then the number of customers “with these structures” has decreased, Nordea said. ___ 11:20 a.m. A group representing current and former lawmakers from Southeast Asian countries says the trove of leaked documents shows how the wealthy and politically powerful have abused rules governing offshore tax havens, often to the detriment of their own communities. […]

The post Australia in probe of possible tax evasion appeared first on National Cyber Security.

View full post on National Cyber Security