Computer Hackers, Identity Thieves and Hi-Tech Scam Artists are taking over the world. Everyday you hear about companies like Sony, FBI even the United States Whitehouse. Don’t become the next victim! National Cyber Security ...Read more
Computer Hackers, Identity Thieves and Hi-Tech Scam Artists are taking over the world. Everyday you hear about companies like Sony, FBI even the United States Whitehouse.
Don’t become the next victim! National Cyber Security (NationalCyberSecurity.com) for Android delivers the latest news and information as it happens 24 hours a day. With over 70 categories and 1500 news feeds from around the world, National Cyber Security covers everything from computer hacking, cell phone security, cyber bullying, events, conferences, videos, computer security job openings.
This application is for the laymen, computer geeks, students, law enforcement and fellow computer hackers.
Cyber threats are dominating the news headlines. National Cyber Security gives you up-to- date information about the cyber world. It is perfect for both tech geeks and the technically challenged.
National Cyber Security was created by Ex-hacker Gregory Evans (GregoryDEvans.com) in 2009. Today it’s Managing Editor In Chief, Gregory Scott, a 23 year veteran of the Federal Bureau of Investigation (FBI), recently retired from the Los Angeles office. Scott worked in Los Angeles and the Washington, D.C. area, where he held many leadership positions in administration and conducted criminal investigations. He recently managed a cyber squad task force that investigated the exploitation and sexual abuse of children in Southern California, resulting in successful outcomes and awards from the United States Attorney’s Office.
Here are just some of the categories:
Announcements App Exclusive Application Security Bluetooth Security Breaking News Business Security Cell Phone Security Child Safety Online Cloud Security Computer Forensics Computer Hacking Conferences Credit Card Fraud/Scams Cyber Bully Cyber Crime Cyber Extortion/Sextortion/Sexting Cyber Fraud Cyber Security Alert Cyber Security Industry Watch Cyber Stalking Cyber Terrorism Watch Cyber Wars Cyber Wars (Anonymous) Cyber Wars (LulzSec) Email/Phishing Alerts & Scams Ethical Hacking Events and Conferences FBI Scam & Fraud Alerts Featured Stories General Government Cyber Wars Government Security Watch Hacker Gear Online Clothing Hackers In The News Hackers vs. Banks Hackers vs. Government Hacking Hacking Tools Identity Theft Watch Internet Cyber Law Internet Saftey IT Audit IT News and Information Laptop Security Law Internet / Cyber LIGATT Security In The News Moguls and Leaders National Cyber Security Radio Other Security News PCI and Compliance Penetration Testing Piracy – Software Piracy – Software, Music, and Movies PoliceOne Prison Time Product Announcements Security Jobs & Internships Security News Security Threats Security Tips Social Media Threats Spoofing Spyware and Malware Spyware/ Cyber Snooping Tech Jobs Twitter Uncategorized Video Library Virus/Malware/Worms VOIP Vulnerabilities/Exploits Wireless Security
Do you have a question about this app?
UPDATED ON: Sep 6, 2012
INSTALLATIONS: 10,000 - 50,000
LATEST VERSION: 1.0
REQUIRED ANDROID VERSION: 1.5 and up
view network state
Allows an application to view the state of all networks.
full Internet access
Allows an application to create network sockets.
read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to, ect.
modify/delete SD card contents
Allows an application to write to the SD card.
prevent phone from sleeping
Allows an application to prevent the phone from going to sleep.
approximate (network-based) location
Access location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.
precise (GPS) location
Access precise location sources such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are, and may consume additional battery power.