National Cyber Security By Gregory Evans show

National Cyber Security By Gregory Evans

Summary: National Cyber Security, the only "Daily" Cyber Security news show in the world. The show is has been designed for the laymen person who may not be technical, but also informative enough for all of the computer geeks of the world. Think of it like the CNN Headline News of Cyber Security Our daily news includes the latest news in hacking, id theft, IT Jobs, Government Security, Risk Management and 60+ other categories. Execute Produced by one of the worlds most known and respected Ex-hacker Gregory Evans (GregoryDEvans.com) National Cyber Security is guaranteed to deliver the news you the “people” want to hear and see. If you have a show idea please email it to contacus@nationalcybersecurity.com

Join Now to Subscribe to this Podcast
  • Visit Website
  • RSS
  • Artist: nationalcybersecurity
  • Copyright: 2008 BlogTalkRadio.com. All Rights Reserved.

Podcasts:

 NCS 01/10/12 | File Type: audio/mpeg | Duration: 00:06:00

Several Saudi citizens have warned against the potential threat posed by foreign workers who dominate the Kingdom’s mobile phone and computer shops. Some of these workers are involved in cyber crimes and blackmail women customers. Also check out the job of the day!!

 NCS 01/09/12 | File Type: audio/mpeg | Duration: 00:06:00

A scientist has come up with a revolutionary new technology that protects confidentiality and authenticity, seamlessly and simultaneously. It could fight of cyber criminals. Banks are also looking at new ways to protect themselves from cyber crime.   Also check out the job of the day.

 NCS 01/06/12 | File Type: audio/mpeg | Duration: 00:07:00

A SWEDISH company has created eye-control computer technology that could spell the end of the traditional mouse. The Tobii Gaze enables users to operate Windows 8 by looking where they want to click. Yesterday in federal court, a 49-year-old Carver man pleaded guilty to producing inapropriate images of a child.  Randy Davies Anderson specifically pleaded guilty to one count of production of those images by using his computer. Also check out the job of the day.

 NCS 01/05/12 | File Type: audio/mpeg | Duration: 00:06:00

Voters in many states will have an easier time casting their ballots in 2012, as elections officials are now allowing some people vote via email or iPad devices. They're also using technology to help count ballots faster and keep track of ballot boxes. Passwords could become a thing of the past for Apple iPhone and iPad users; the tech company recently revealed a patent application for what it is calling “Low Threshold Face Recognition,” a tool that would allow users to unlock their phones by simply picking up the device and pointing it at their face. Also check out the job of the day!!

 NCS 01/04/12 | File Type: audio/mpeg | Duration: 00:06:00

Evidence collected by computer forensics teams has recently become admissible in US and Canada court systems. U.S. Attorney William J. Hochul, Jr. announced today that Eugene DeBerger, 59, of Rochester, N.Y., was charged by criminal complaint with knowing infringement of copyright for purposes of private financial gain. Also check out the job of the day!!

 NCS 01/03/12 | File Type: audio/mpeg | Duration: 00:05:00

Cyber bugs are big trouble for many websites, mostly those sites frequently accessed by users. Most companies have their own ways to tackle bugs and pay a good amount of money to bug hunters. Facebook, however, has found a unique way to reward its bug hunters. Also check out the job of the day!

 NCS 01/02/12 | File Type: audio/mpeg | Duration: 00:05:00

It follows a hack attack which led to the theft of personal details of 45m Chinese customers of various banks. The Chinese government is taking steps to crack down on domestic cyber criminals who steal online banking details. An official of Iran’s Judiciary announced new limitations on using cyber space and content publishing on the Internet ahead of the upcoming parliamentary elections. Barnaby Lenon, chairman of the Independent Schools Council, said young people’s reading and conversational skills were being put at risk by overexposure to modern technology. Also check out the job of the day!!

 NCS 12/30/11 | File Type: audio/mpeg | Duration: 00:07:00

Computer hackers plan to take the Internet beyond the reach of censors by putting their own communication satellites into orbit. A federal grand jury has indicted six foreign nationals on charges related to an Internet sales scheme that allegedly defrauded Americans who attempted to purchase automobiles and other vehicles on the Internet through websites that included eBay Motors, Auto Trader, Yahoo Auto, Edmunds.com and Craigslist.   Mobile device users continue to be lax about installing security software or using strong pass codes to protect data saved on their mobile devices, behavior that can have an impact on enterprises. Also check out the job of the day!!

 NCS 12/29/11 | File Type: audio/mpeg | Duration: 00:06:00

A report from bug identification specialist TippingPoint indicates that Microsoft remains a leader in an unwelcome category: The software giant is one of the most sluggish responders when it comes to patching bugs in its programs. New York Assemblywoman Jane Corwin announced Tuesday she has authored and introduced landmark legislation to create the crime of cyber-bullying in New York state. With the “License” app for Apple iPhones and iPads, making a realistic fake ID has never been easier; to prevent this app from falling into the wrong hands that would use it for nefarious purposes, Senator Bob Casey (D -- Pennsylvania) recently requested that Apple remove the app from its online store. Also listen for the job of the day.

 NCS 12/28/11 | File Type: audio/mpeg | Duration: 00:06:00

The Controls Systems Security Program (CSSP) at DHS and Idaho National Laboratory have created a series of training programs for managerial and technical people in the critical infrastructure sector that are packed with up-to-date information on cyber threats and mitigations for vulnerabilities Detectives from UK’s top cyber crime unit have spotted out various websites, which are targeting Olympic visitors by using Olympic images. SEN. Edgardo Angara is pushing for the passage of Senate Bill 2796, or the Cybercrime Prevention Act, to bolster the capacity of the country’s two main law-enforcement agencies, the National Police and the National Bureau of Investigation (NBI). Also check out the job of the day!

 NCS 12/27/11 | File Type: audio/mpeg | Duration: 00:05:00

A Law Firm is branching out into a digital forensic lab, a move to capitalize on the computer crime phenomenon and offer integrated legal and technical consulting services. An Indian man is in hot water for allegedly changing someone's email information to steal money and deposit that cash into his account. Also check out the job of the day!

 NCS 12/26/11 | File Type: audio/mpeg | Duration: 00:05:00

The loosely-associated band of hackers known as Anonymous claims to have targeted the global intelligence think tank Strategic Forecasting. As we approach 2012, we’ve seen plenty of predictions on what types of security threats to expect in the coming months. If the predictions are correct, expect your mobile device to be under attack, no matter which OS you use. Also check out the job of the day.

 NCS 12/23/11 | File Type: audio/mpeg | Duration: 00:05:00

People in poorer countries send text messages more often than those in wealthier countries. Men in Spain and Germany access the Internet on their phones twice as much as women do.   Italy's Finmeccanica and U.S. company Northrop Grumman have joined to help NATO boost its ability to quickly detect and respond to cybersecurity threats.   Bloomington police’s cybercrime unit is getting some high praise from federal prosecutors.   Also check out the job of the day!!

 NCS 12/22/11 | File Type: audio/mpeg | Duration: 00:05:00

Identity theft can be easy for thieves preying on holiday travelers, whether through low-tech tactics like snooping or as a result of stolen or left-behind electronics. Malware has become very sophisticated in its entry, infection and damage mechanisms – and 2011 saw a dramatic increase in attacks. In the UK, the information commissioner reported that data security breaches were up 58% in 2011/12 so far. Also check out the job of the day!!

 NCS 12/21/11 | File Type: audio/mpeg | Duration: 00:06:00

Lawyers for the Army intelligence analyst blamed for the biggest national security leak in American history rested their case today, with closing arguments ahead before Pfc. Bradley Manning learns whether he will face a court-martial. A group of hackers in China breached the computer defenses of America's top business-lobbying group and gained access to everything stored on its systems, including information about its three million members, according to several people familiar with the matter. Malware targeting devices cell phone devices jumped 37 per cent since last quarter.  Mobile security threats have become a reality. Malware growth for 2011 is set to exceed last year's, with the Android operating system emerging as the main target. Also check out the job of the day!!

Comments

Login or signup comment.