Find Your Happiness, Health &Wellness Do's In Greece

Greek to me ! 

          #WellnessGreece &Health Travel Greece Guide, 24/7    

     

Keep your
 cyber -safety 
in Greece,
it may not be that simple !







 

Serious e-bank cyber threat Warning by the Greek Cyber Crime Unit



What looks like a genuine invoice from their lender is what the bank customers’ receive via-e-mails, being invited to click on a link in the e-mail, which installs the  EMOTET virus. the Greek Cyber-Crime Administration announced on June 30, 2014, warning e-banking users to protect themselves against a new computer virus that helps criminals steal their details.

Athens, June 30, 2014

more, by moodhackerblog

 



Two Greek famous bitcoin hackers, the arrest and the Facebook thanks

The Chief of Computer Crime Unit in Greece Brigadier Emmanouil Sfakianakis emphasized that it is the most important case ever, Greece’s Computer Crime Unit has handled, since this cases’ impacts had become extremely severe on the global Internet computer system. “We managed to avert a significant threat of digital safety which caused big problems to millions of internet users around the world.”

The two Greek hackers who managed to drive crazy 250,000 computers and their users worldwide, Facebook itself, and the Privacy Security system of Facebook also, are finally arrested by the Cyber Safety Administration in Greece, and their malware is no longer posing threat to cyberspace, the Administration announced,

go to our article by moodhackerblog on Wordpress


Oh, Watch your steps Travelers!

Keep an eye on your laptop 

A golden advise to travelers, 

truly 

unexpected;

really shocking

"Some foreign governments -- as well as some foreign businesses, which work extremely closely with their own governments -- will use mobile technologies to keep you under constant surveillance. They’ll hot mic your cell phone, and they’ll track your movements.” said John Mullen, emphasizing  that unlike the U.S. Government, many foreign governments --  declining to name them -- have identified as part of their national economic strategy a concerted effort to steal whatever intellectual property they can lay their hands on

To that end, these assertive governments “will manipulate your relationships and your friendships” to achieve their goals, he advised. (....)

John Mullen, a longtime senior operations officer with the CIA, caught the attention of his audience at the SINET Innovation Summit in New York City last August GO TO full article 





What can happen to my mobile electronic devices when I travel abroad?

Mobile electronic devices such as laptops, cell phones, and tablets, when taken abroad, may be successfully attacked with malware and automated attack tools. These devices, even when kept current with security software, may not be able to thwart such an attack.


When traveling to certain countries where there is strong scientific competition, the country is not on friendly terms with the United States, there is civil unrest or political discord, or where violence and crime ar prevalent,

they may become

victims of cyber-attacks,

cybercrime,

monitoring or surveillance.


This is particularly true if the individual is engaged in classified or proprietary research in a STEM (science, technology, engineering and mathematics) program.

 Institutional leaders who ar politically or religiously active, fluent speakers of the language, and individual tourists may also be actively targeted. Northe Dakota State University, Information technology Security




How to protect yourself, your electronic devices, and your information when traveling abroad?


  • If possible, do not take your work or personal devices with you. Use a temporary device, such as an inexpensive laptop and/or a prepaid "throw away" cell phone purchased specifically for travel.

  • If you must take your electronic device(s) with you, only include information that you will need for your travel.

  • Be sure that any device with an operating system and software is fully patched and up-to-date with all institutional recommended security software.

  • When not in use, turn off the device(s). Do allow them to be in "sleep" or "hibernation" mode when they are not in active use.

  • Be sure to password or passcode protect the device. Do not use the same passwords/passcodes that you use on your work and personal devices. The password/passcode should be long and complex.

  • Minimize the data contained on the device. This is particularly true of logins and passwords, credit card information, your social security number, passport number, etc.

  • Assume that anything you do on the device, particularly over the Internet, will be intercepted. In some cases, encrypted data may be decrypted.

  • Never use shared computers in cyber cafes, public areas, hotel business centers, or devices belonging to other travelers, colleagues, or friends.

  • Keep the device(s) with you at all times during your travel. Do not assume they will be safe in your hotel room or in a hotel safe.

  • Upon returning from your travels, immediately discontinue use of the device(s). The hard drive of the devices should be reformatted, and the operating system and other related software reinstalled, or the device properly disposed of.

  • Change any and all passwords you may have used abroad



YOU SHOULD KNOW

 

In most countries you have no expectation of  privacy in Internet cafes, hotels, offices, or  public places.

Hotel business centers

and phone networks are regularly monitored in many  countries. In some countries, hotel rooms are  often searched.


All information you send electronically – by fax machine, personal digital assistant (PDA), computer, or telephone – can be intercepted. Wire less devices are especially vulnerable.

Security services and criminals can track your movements using your mobile phone or PDA  and can turn on the microphone in your device  even when you think it’s off. To prevent this, remove the battery.


Security services and criminals can also insert malicious software into your device through any connection they control. They can also do it wirelessly if your device is enabled for wireless.


  • When you connect to your home server, the  "mal ware” can migrate to your business, agency, or home system, can inventory your system, and  can send information back to the security service or potential malicious actor.

Malware can also be transferred to your device  through thumb drives (USB sticks), computer disks, and other “gifts.”

• Transmitting sensitive government, personal, or  proprietary information from abroad is therefore risky.


Corporate and government officials are most at  risk, but don’t assume you’re too insignificant to be targeted.


• Foreign security services and criminals are adept  at “phishing” – that is, pretending to be 

someone you trust in order to obtain personal or sensitive

 information.


• If a customs official demands to examine your  device, or if your hotel room is searched while  the device is in the room and you’re not, you  should assume the device’s hard drive has been copied. 

by ncix.gov


Additional tips and guidelines that I can use when I travel to countries that are less than friendly or there is civil unrest, or where crime and violence are prevalent


Before you travel:


  • Tape over any integrated laptop cameras, or disable them.

  • Physically diconnect any integrated laptop microphones

  • Install a privacy screen on your laptop to discourage "shoulder surfing."

  • Disable all file sharing.

  • Disable all unnecessary network protocols (e.g., WiFi, Bluetooth, infrared, etc.)

  • Backup any data you may have stored on the device.

  • Leave unneeded car keys, house keys, smart cards, credit cards, swipe cards, or fobs you would use to access your work place,  or other areas, and any other access control devices you may have at home.

  • Clean out your purse or wallet of any financial information such as bank account numbers, logins and passwords, any RFID cards (including U.S. Government Nexus "trusted traveler" cards) should be carried inside an RF-shielded cover.

  • If you need to send and receive email while traveling, create a temporary "throw away" account on Microsoft Outlook or a similar service before you travel.


Additional smart tips for traveling abroad in less than friendly countries:


  • Do not send any sensitive messages via email.

  • Limit or avoid making or receiving voice calls, using voice mail, instant messaging, text messaging, or sending and/or receiving faxes.


Travelers may become victims of cyber-attacks, cyber crime, monitoring or surveillance,

when traveling to certain countries where there is strong scientific competition,or the country is not on friendly terms with the United States, there is  civil unrest or political discord, or where violence and crime are prevalent, notes the NDCU special page, adding that mobile electronic devices such as laptops, cell phones, and tablets, when taken abroad, may be successfully attacked with malware and automated attack tools

In most countries you have no expectation of privacy in Internet cafes, hotels, offices, or public places.


Traveltips by ncix publications


contact the police via the

following e-mails:

[email protected],

[email protected]


The New Hackers' generation

 SOS! 

WHAT THE HACKERS NOW DO

Hackers and security researchers are moving away from simply trying to break into — or protect — people’s e-mail accounts, stealing credit cards and other dirty digital deeds. Now they’re exploring vulnerabilities to break through the high-tech security of homes, cause car accidents or in some extreme cases, kill people who use implanted medical devices.

“Once any single computer in a car is compromised, safety of the vehicle goes out the window,” Mr. Miller said in an e-mail interview. Modern cars typically have 10 to 40 little computers in them.“Right now, there aren’t a lot of ways for hackers to remotely attack cars: Bluetooth, wireless tire sensors, telematics units,” he added. 


“But as cars get Internet connections, things will get easier for the attacker.” 

more


Photo ;Reuters/REUTERS - Black Hat USA 2013 attendees pass under a projected Black Hat logo during the hacker convention at Caesars Palace in Las Vegas, Nevada July 31, 2013. REUTERS/Steve Marcus

UK Travelers abroad, take care, warns Travel Kingdom







Because of the jobs they do, members of the Armed Forces community and defense civilians need to be particularly careful when they are online.

Not only do they have to make sure that they don’t share information they need to keep safe, but they also need to make sure they tell their friends and families to do the same thing.

People can find out more about online security for the defense community on the Think before you share online page of GOV.UK




Thank you for contacting us. We will get back to you as soon as possible
Oops. An error occurred.
Click here to try again.