What To Do When Your Phone Gets Hacked

What To Do When Your Phone Gets Hacked

Elise Ackerman Forbes   What To Do When Your Phone Gets Hacked … My friend Mike’s Android phone had been acting strangely for awhile. In the middle of the night, the phone would come alive. It would meander down various menu paths, send texts that were gibberish and start playing poker. Was it bug in the operating system? Or had …

Read More »

Millionaire Manhunt: John McAfee Person of Interest in Belize Homicide

Millionaire Manhunt: John McAfee Person of Interest in Belize Homicide

Chris Dougherty VirtualThreat Contributing Writer   Caribbean officials in Belize have questioned 3 people with regard to the murder of Gregory Viant Faull, an American citizen living in a town north of San Pedro, on the island of Ambergris Caye.  Belize authorities say John McAfee, the 67 year old founder of the antivirus software giant McAfee, is a “person of interest” …

Read More »

US to Scan Facebook and Twitter for Evidence of Bioterrorism

US to Scan Facebook and Twitter for Evidence of Bioterrorism

Liat Clark Wired Magazine – UK     The US department of Homeland Security has commissioned a one-year contract to investigate the efficacy of using social networks to identify instances of bioterrorism, pandemics and other health and security risks. It is paying Accenture Federal Services $3 million (£1.8 million) to scan the networks’ for key words in real time to see if …

Read More »

CIA Mistress’ Email May Have Been Hacked By Anonymous

CIA Mistress' Email May Have Been Hacked By Anonymous

Zeke Miller Buzzfeed   Paula Broadwell’s personal email appears on a list of compromised accounts, hacked by Anonymous, stolen from the commercial intelligence firm Stratfor. A Yahoo email account belonging to former CIA Director David Petraeus’ mistress may have been compromised by the group Anonymous. The personal email account, which other sources confirmed belongs to the writer and veteran at the …

Read More »

Benefits of Training and Awareness for Disaster Recovery Planning

Benefits of Training and Awareness for Disaster Recovery Planning

Oscar Atkinson VirtualThreat Guest Writer   Data centers are vital components for many of today’s companies, especially when it comes to disaster recovery planning. Within these data centers, companies can deploy sensitive equipment, such as servers and large-scale storage devices. These facilities also offer data backup features that can be beneficial during the recovery process after a disaster. However, the …

Read More »

US Fighting Global Cyber Warfare

US Fighting Global Cyber Warfare

Michael Kling Money News   The Pentagon is striving to improve the military’s global cyber warfare capabilities — both offensive and defensive abilities — in an effort to prevent an electronic Pearl Harbor. The Army is interested in leading the cyber war effort through its new Army Cyber Command, according to Defense Tech, a military technology website. The command’s ranks …

Read More »

5 Tips for Protecting Your Identity

5 Tips for Protecting Your Identity

  Mark Walker VirtualThreat Guest Writer   Protecting your identity is important. Once your identity is stolen, it can be difficult to restore. After theft, you may find that you have multiple credit cards and loans under your name, property that you do not own or other financial obligations that you simply did not make. When you want to protect …

Read More »

NICT Daedalus Gives Startling Function and Beauty to Cyber Security

NICT Daedalus Gives Startling Function and Beauty to Cyber Security

Meg Jones VirtualThreat Guest Writer   NICT Daedalus.  It’s an unfortunate fact that many people fail to realize, but advancements in technology also lead to advancements in criminal activity. Yes, even the technologies that are intended for our safekeeping, security, and protection. In short, the bad guys can nearly always find a way to break in—whether it’s into the locks …

Read More »

Hacked Android Apps Trick You into Revealing Personal Data

Hacked Android Apps Trick You into Revealing Personal Data

  BBC   Millions of people are using hacked Android apps that can be tricked into revealing personal data, research indicates. Scientists tested 13,500 Android apps and found almost 8% failed to protect bank account and social media logins. These apps failed to implement standard scrambling systems, allowing “man-in-the-middle” attacks to reveal data that passes back and forth when devices communicate with …

Read More »

Chinese Hackers Target Sony Playstation 3 Firmware

Chinese Hackers Target Sony Playstation 3 Firmware

Ellyne Phneah ZDNet     A Chinese hacking group says it has released a custom Sony PlayStation 3 firmware which can circumvent the firmware on the game console. BlueDiskCFW released the custom firmware CFW which contains the LVO encryption keys to enable users to bypass the current PlayStation Network (PSN) passphrase security protocol, according to The Hacker News Web site on Wednesday. PS3’s …

Read More »