Serious e-bank cyber threat Warning by the Greek Cyber Crime Unit
What looks like a genuine invoice from their lender is what the bank customers’ receive via-e-mails, being invited to click on a link in the e-mail, which installs the EMOTET virus. the Greek Cyber-Crime Administration announced on June 30, 2014, warning e-banking users to protect themselves against a new computer virus that helps criminals steal their details.
Athens, June 30, 2014
more, by moodhackerblog
The Chief of Computer Crime Unit in Greece Brigadier Emmanouil Sfakianakis emphasized that it is the most important case ever, Greece’s Computer Crime Unit has handled, since this cases’ impacts had become extremely severe on the global Internet computer system. “We managed to avert a significant threat of digital safety which caused big problems to millions of internet users around the world.”
The two Greek hackers who managed to drive crazy 250,000 computers and their
users worldwide, Facebook itself, and the Privacy Security system of
Facebook also, are finally arrested by the Cyber Safety
Administration in Greece, and their malware is no longer posing threat
to cyberspace, the Administration announced,
go to our article by moodhackerblog on Wordpress
Keep an eye on your laptop
A golden advise to travelers,
"Some foreign governments -- as well as some foreign businesses, which work extremely closely with their own governments -- will use mobile technologies to keep you under constant surveillance. “They’ll hot mic your cell phone, and they’ll track your movements.” said John Mullen, emphasizing that unlike the U.S. Government, many foreign governments -- declining to name them -- have identified as part of their national economic strategy a concerted effort to steal whatever intellectual property they can lay their hands on
To that end, these assertive governments “will manipulate your relationships and your friendships” to achieve their goals, he advised. (....)
John Mullen, a longtime senior operations officer with the CIA, caught the attention of his audience at the SINET Innovation Summit in New York City last August GO TO full article
Mobile electronic devices such as laptops, cell phones, and tablets, when taken abroad, may be successfully attacked with malware and automated attack tools. These devices, even when kept current with security software, may not be able to thwart such an attack.
When traveling to certain countries where there is strong scientific competition, the country is not on friendly terms with the United States, there is civil unrest or political discord, or where violence and crime ar prevalent,
they may become
victims of cyber-attacks,
monitoring or surveillance.
This is particularly true if the individual is engaged in classified or proprietary research in a STEM (science, technology, engineering and mathematics) program.
Institutional leaders who ar politically or religiously active, fluent speakers of the language, and individual tourists may also be actively targeted. Northe Dakota State University, Information technology Security
YOU SHOULD KNOW
• In most countries you have no expectation of privacy in Internet cafes, hotels, offices, or public places.
Hotel business centers
and phone networks are regularly monitored in many countries. In some countries, hotel rooms are often searched.
• All information you send electronically – by fax machine, personal digital assistant (PDA), computer, or telephone – can be intercepted. Wire less devices are especially vulnerable.
• Security services and criminals can track your movements using your mobile phone or PDA and can turn on the microphone in your device even when you think it’s off. To prevent this, remove the battery.
• Security services and criminals can also insert malicious software into your device through any connection they control. They can also do it wirelessly if your device is enabled for wireless.
• Malware can also be transferred to your device through thumb drives (USB sticks), computer disks, and other “gifts.”
• Transmitting sensitive government, personal, or proprietary information from abroad is therefore risky.
• Corporate and government officials are most at risk, but don’t assume you’re too insignificant to be targeted.
• Foreign security services and criminals are adept at “phishing” – that is, pretending to be
someone you trust in order to obtain personal or sensitive
• If a customs official demands to examine your device, or if your hotel room is searched while the device is in the room and you’re not, you should assume the device’s hard drive has been copied.
Before you travel:
Additional smart tips for traveling abroad in less than friendly countries:
Travelers may become victims of cyber-attacks, cyber crime, monitoring or surveillance,
when traveling to certain countries where there is strong scientific competition,or the country is not on friendly terms with the United States, there is civil unrest or political discord, or where violence and crime are prevalent, notes the NDCU special page, adding that mobile electronic devices such as laptops, cell phones, and tablets, when taken abroad, may be successfully attacked with malware and automated attack tools
In most countries you have no expectation of privacy in Internet cafes, hotels, offices, or public places.
Traveltips by ncix publications
WHAT THE HACKERS NOW DO
Hackers and security researchers are moving away from simply trying to break into — or protect — people’s e-mail accounts, stealing credit cards and other dirty digital deeds. Now they’re exploring vulnerabilities to break through the high-tech security of homes, cause car accidents or in some extreme cases, kill people who use implanted medical devices.
“Once any single computer in a car is compromised, safety of the vehicle goes out the window,” Mr. Miller said in an e-mail interview. Modern cars typically have 10 to 40 little computers in them.“Right now, there aren’t a lot of ways for hackers to remotely attack cars: Bluetooth, wireless tire sensors, telematics units,” he added.
“But as cars get Internet connections, things will get easier for the attacker.”
Photo ;Reuters/REUTERS - Black Hat USA 2013 attendees pass under a projected Black Hat logo during the hacker convention at Caesars Palace in Las Vegas, Nevada July 31, 2013. REUTERS/Steve Marcus
The local news, March 2014
By Greek to me !, moodhacker
Is this a greek or a Euroepan -greek
Go to full story for more
Because of the jobs they do, members of the Armed Forces community and defense civilians need to be particularly careful when they are online.
Not only do they have to make sure that they don’t share information they need to keep safe, but they also need to make sure they tell their friends and families to do the same thing.
People can find out more about online security for the defense community on the Think before you share online page of GOV.UK
Greek to me ! is a Social Responsibility Communication social media for the Traveler's Health Safety in Greece, designated to keep travelers, visitors and foreigners updated 24/7 for any Public Health Safety and Preparedness information concerning Greece and the Greek islands, especially under the critical conditions that one could potentially face while traveling to Greece due to the austerity and refugee crisis .
Traveler's Health Recommendations and Guidelines are provided by the commitment of the greek2m team, to journalistic accuracy and credibility on scientific updated evidence based medical information , under the auspices and the approval of the Greek Center of Disease Control, the Hellenic CDC (HCDP)