Monthly Archives: December 2015

JP Morgan Breach – Discussion on CNBC

Since the JP Morgan breach, companies are becoming more aware of the data breaches that are likely to happen. Vinny Troia, Cyber Security Expert and CEO of Night Lion Security, discusses the JP Morgan breach with Kevin O’Leary, Michelle Caruso-Cabrera and the staff of CNBC’s Closing Bell. The hacker had gotten in through a personal computer at JP Morgan. This proves that hackers can get into anything at any time.

Troia explains that the hackers had clearly calculated their move because they did not take the passwords that go to the usernames. This is because JP Morgan would have sent out a notification for everyone to change his or her passwords immediately. A question came up regarding whether the hacker had stolen money and it was never confirmed. This data breach clearly shows that people’s information is not safe anymore.


Cyber Security Expert Discusses Hacked Celebrity Photos

With the rise of celebrity’s photos getting hacked, Vinny Troia, Certified Hacking Forensic Investigator and CEO of Night Lion Security, discusses this issue with Rebecca Jarvis on ABC World News. Celebrities like Jennifer Lawrence, Kate Upton, and many others have all experienced these awful hacks. Apple announced that there were no hacks on their systems but on the celebrity’s user names, passwords and security questions.

Night Lion Security is a St. Louis based Digital Forensics firm, Troia explains how hackers can find a lot of the information to hack them through their Wikipedia pages. The hackers can find the latitude, longitude and altitude of where these photos were taken and they make lots of money doing this. The only solution to these hacking problems is to create unique passwords and changing them frequently.

Hacking Smart Devices and Internet of Things – Interview on Fox

People are becoming more and more reliant on the Internet and smart devices. Everything is now, essentially, connected and a potential target for hackers. In a discussion on Fox News, Joe Loomis states that people are becoming obsessed with convenience and not paying attention to the security, or lack thereof, in their smart devices. Having the new smart phone or device is now more important to consumers than having a safe, secure one. Security is getting thrown to the back burner in the personal technologies world.

Everyone needs to be more aware of these cyber security issues and less into their up-to-date devices. Having the new smart device is nice, but when your safety and security are at stake, security should be priority number one.

Hackers use Dark Net for Credit Card Fraud

The Internet is full of unknowns and one of these unknowns is the dark net. Dark net is an underground system of anonymous websites that are untraceable. In this system, you can launder money, hire a hit man, and get guns. Unfortunately, the dark net is also a place to buy hacked credit card numbers in bulk. There are hundreds of millions of stolen card numbers on this system.

KSDK, St. Louis, interviews Vinny Troia, CEO of Night Lion Security, a St. Louis based Cyber Security Company.

What these card hackers usually do is make small transactions at a time, also known as micro fraud. These small transactions eventually add up to outrageous numbers. Most people do not notice a small transaction so it is important to always check your credit card statement daily to prevent fraud.

CISA won’t stop hackers – Interview on Fox News

Cyber security hacks are happening more often each year and the cyber security defense bill is supposed to help fix these problems. The bill will not stop these attacks from happening but will minimize the damage that occurs. Night Lion Security, a St. Louis Cyber Security and IT Risk Consulting Firm CEO Vinny Troia is interviewed on Fox News to discuss the upcoming cyber security defense bill.

Senator Mike Rounds says, companies should share when and how they get hacked to help other companies deal with this issue in the future. Senator describes how it is easy once a hacker gets into one company’s digital security, to get to another. What are your thoughts on the cyber security bill?