COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Aug 17 09:23

‘Too Big to Fail’: RussiaGate One Year After VIPS Showed a Leak, Not a Hack

One year later, the VIPS memo contending that the DNC emails were leaked and not hacked has yet to be successfully challenged. Meanwhile, the country sinks deeper into the morass of the new McCarthyism.

Aug 17 06:50

Has YOUR Twitter account been affected? Social media site continues to cull users in a bid to clean up the platform

Twitter has started banning a huge amount of accounts, with many users taking to the site to bemoan the loss of hundreds of followers in a single day.

The cull started yesterday and had such an impact on numbers that the 'Twitterverse' was swept with the hashtag #TwitterPurge.

The firm is ruthlessly removing accounts, with those who have been previously suspended or banned most likely to see their account deactivated.

Aug 17 00:07

Mozilla / Firefox goes all in for EVIL… pushes corporate news collusion to silence independent media

It’s time to dump Firefox. Like all the other tech giants, Mozilla is going to abuse and exploit its position of market dominance to control what you read, watch and hear. That’s pure evil, and it’s the kind of evil we’ve all now come to expect from Google, YouTube, Twitter and Facebook. Now you can add Mozilla to that list.

Aug 17 00:01

Modern Censorship Is Voluntary

Censorship is an enormous problem that the internet temporarily freed us from. Now we’re seeing the State leverage the tech giants to once again control the flow of information. All of us that are aware of this problem have the solution in our hands. Instead of worrying about it and complaining about it we should migrate off the websites that are being used as blinders and discover new platforms that are building a business around privacy and openness. These tools are available and the more quickly we all migrate to them the move value we will all receive from them. It’s time we all did our part. Just be prepared to read, see and hear ideas that one might not like.

Aug 16 17:56

RAND PAUL “I think that he (Julian Assange) should be given immunity from prosecution in exchange for coming to the United States and testifying”..

Wiki leaks played a major role in sorting out the trove of Clinton Campaign documents that were hacked During the 2016 Election and Senator Rand Paul has a Major offer for WikiLeaks founder Julian Assange.

Paul suggests that Assange be given immunity in exchange for his testimony before the Senate Intelligence Committee.

In an interview with the Gateway Pundit, Paul suggested that Assange likely has important information about the hack and that it’s unlikely he would agree to testify without immunity.

“I think that he should be given immunity from prosecution in exchange for coming to the United States and testifying,” Senator Paul told the Gateway Pundit. “I think he’s been someone who has released a lot of information, and you can debate whether or not any of that has caused harm, but I think really he has information that is probably pertinent to the hacking of the Democratic emails that would be nice to hear.”

Aug 16 17:53

Google forced to update its help page to admit it DOES still track user's location even if they turn the setting off

Google has admitted that it tracks users' location history even after they turn off location sharing.

On Thursday, the search giant revised a help page that erroneously described how its 'Location History' setting works.

The page now clarifies that Google still tracks their location even if they turn the setting off.

Aug 16 17:50

Celebrities and 'influencers' probed by competition watchdog over paid-for social media posts

The competition watchdog has written to a string of celebrities and social media 'influencers' to find out whether they are disclosing their paid-for posts properly.

Businesses grappling to advertise their wares to the biggest audience possible often harness the popularity of social media stars to promote their latest must-have item.

Celebrities can be paid huge sums of money to post about a particular brand or product range.

The problem comes when consumers are left unclear about whether that celebrity has posted as part of a paid-for promotion or simply rates a particular product themselves.

Aug 16 14:58

Westpac NZ issues 30,000 replacement cards due to fraud risk linked to Ticketmaster security breach

About 30,000 Westpac NZ customers will receive replacement cards following a data security incident related to Ticketmaster in June.

Those who purchased, or attempted to purchase, tickets between September 2017 and June 23, 2018, were potentially at risk of fraud.

Tiffany Ryan, Westpac NZ head of financial crime and security, said while the risk of fraud was low, Westpac wanted to take an extra proactive step to protect customers.

"Westpac NZ is in the process of proactively replacing around 30,000 cards, where we have concerns that a customer's card details may have been compromised," Ryan said.

"We have strong fraud controls in place, but we wanted to take an extra proactive step to protect our customers and provide them with peace of mind around this issue."

Aug 16 14:54

2015 United Nations Paper Proposed Government Licensing To “Supervise Content” Online

In recent purge, globalists are following long existing plans to censor internet.
In 2015, the Washington Post warned that the United Nations was attempting to “…transform the Web from a libertarian free-for-all to some kind of enforced social commons“.

The warning came in response to a UN report titled “Cyber Violence Against Women and Girls: A World-Wide Wake-up Call“.

The report was promptly withdrawn due to errors with “footnoting”.

Based on a campaign to promote “gender sensitive content” for women and prevent online harrassment and bullying, the report proposed a Chinese style system of government licensing.

Aug 16 10:14

A $2,000 iPhone: It's coming. It's inevitable

With Samsung pushing the envelope on the price of flagship smartphones with its $1,250 512GB Galaxy Note 9, it's only a matter of time before we have a $2,000 iPhone.

Webmaster's Commentary: 

The $1000 iPhone isn't selling so well and latest word is that the next iPhone will sell for just $500.

Aug 16 08:53

Mozilla / Firefox goes all in for EVIL… pushes corporate news collusion to silence independent media

Many of us sought out Firefox from Mozilla, an organization with a strong history supporting free speech and open access to information.

But now Mozilla has joined the dark side. They’re jumping in bed with pure evil, pushing an “Information Trust Initiative” that would block independent media sources at the browser level while favoring corporate media giants like CNN, a cesspool of deliberately fake news.

Aug 16 08:32

Google risks mega-fine in EU over location 'stalking'

Privacy campaigners say Google's obsessive collection of location markers violates Europe's privacy laws - potentially exposing the Californian giant to punitive fines.

Several privacy watchers agree that as it stands, users are misled, and can't give informed consent. That exposes the company to financial penalty under GDPR rules: which could be 2 per cent or 4 per cent of turnover.

"Burying its stalking settings, while distracting users with a deliberately crippled 'Location history' button, isn't just deceitful - it's unlawful," campaigner Phil Booth opined. "Without proper consent or legitimate purpose, Google is breaching the GDPR rights of every EU citizen it has been tracking.

"Under GDPR, such location data - associated with a Google account - is clearly personal data, breach of which could expose Google to a giant fine. The question is, will regulators act on this globalised prowling?"

Aug 16 08:25

Facebook news chief to media: ‘Work with Facebook or die’

The Australian reports that Facebook media relations chief Campbell Brown privately disclosed that Mark Zuckerberg is indifferent to publishers and offers the news media a simple choice: "Work with Facebook or die."

A senior Facebook executive has privately admitted Mark Zuckerberg “doesn’t care” about publishers and warned that if they did not work with the social media giant, “I’ll be holding your hands with your dying business like in a ­hospice”.

Aug 16 08:20

Firefox Add-On With 220,000+ Installs Caught Collecting Users’ Browsing History

A popular Firefox add-on is secretly logging users' browsing history, according to reports from the author of the uBlock Origin ad blocker and Mike Kuketz, a German privacy and security blogger.

The add-on in question is named Web Security and is currently installed by 222,746 Firefox users, according to the official Mozilla Add-ons Portal.

Aug 16 08:12

President Trump relaxes US cyber-attacks rules

President Trump has signed an order relaxing rules around the use of cyber-weapons, the Wall Street Journal reports.

It is a reversal of guidelines, drawn up under President Obama, which required a large number of federal agencies to be involved in any decision to launch a cyber-attack.

Specific details of what the new rules will be are classified information.

One official said the US was taking "an offensive step forward".

Aug 15 18:07

Can hackers tamper with your vote? Researchers show it’s possible in nearly 30 states

Top computer researchers gave a startling presentation recently about how to intercept and switch votes on emailed ballots, but officials in the 30 or so states said the ease with which votes could be changed wouldn’t alter their plans to continue offering electronic voting in some fashion.

Aug 15 13:39

Big Tech Censorship: YouTube On The Verge Of Deleting Stefan Molyneux's Entire Channel

Philosopher and popular right-wing commentator Stefan Molyneux was hit with two strikes within 24 hours Wednesday on YouTube and now faces his entire channel being deleted.

"Within 24 hours, my @YouTube channel has received two community guidelines strikes - likely as a result of a mass flagging campaign - and is now on the verge of total deletion," Molyneux announced on Twitter. "Please respectfully contact @TeamYouTube and alert them to this injustice."

Aug 15 11:32

BBC Caught Cherry-Picking Anti-Privacy Computer Scientists for Segment

The BBC was caught red-handed engaging in manipulation after it declined to invite a potential guest for a segment on computer security, turning the expert down because he refused to state why it would be a good idea to put “back-doors” into cryptographic systems.

Aug 15 07:25

Hackers can take control of MILLIONS of brand-new Android smartphones because of vulnerabilities with pre-installed apps, experts warn

Most apps can't access protected files, but this is not the case with many pre-installed apps, which often have privileged access to the Android operating system.

Because there are so many manufacturers making hardware for Google's operating system, it's hard for the company and researchers to keep tabs on all pre-installed apps.

Many firms make sure that any apps that come pre-installed are as secure as possible, but that is not always the case.

Aug 15 07:19

Update your computer NOW: Intel reveals 'Foreshadow' flaws affecting its chips could put MILLIONS of devices at risk - just months after Spectre and Meltdown scares

An international team initially identified a type of attack dubbed Foreshadow that would allow hackers to steal information from a computer’s memory, including files, pictures, and passwords.

After researchers notified Intel of the issue earlier this year, the firm identified two more related variants that could have even more ‘devastating’ consequences, allowing attackers to access information stored on a third-party cloud.

Intel says its commonly used Core and Xeon processors were among the products that were affected, putting both personal computer users and data centers at risk.

...

Intel says it began rolling out updates to the operating system and hypervisor software today to address the flaws, along with updates released earlier this year that are an ‘important component of the mitigation strategy,’ for all three iterations.

Aug 15 04:07

Taking on a Supporter of the Surveillance State

Here’s what you need to understand. If the government is allowed to conduct secret surveillance, it will eventually be used against you or people you care about.

Aug 14 12:51

Breaking: Infowars under attack, official website taken down completely

It looks like last week’s purging of Infowars content from social media sites like Facebook and YouTube is not enough the powers-that-be have now taken down Infowars.com altogether in what appears to be an outright attack.

Aug 14 12:46

George Orwell Warned us of the Most Dangerous Type of Censorship

The big tech companies are now openly censoring popular viewpoints and deleting select social media pages who supposedly ‘violate community guidelines.’

Aug 14 12:02

Twitter To "Suspend Accounts For Trying To Evade Suspension"

Having seemingly distracted the world, briefly, from being caught 'shadowbanning' conservatives (or should we say "using quality filters"), by outright-banning other right-leaning individuals (Alex Jones and Peter van Buren forever; and Candace Owen and Ron Paul Institute's Daniel McAdams temporarily), it appears Twitter's CEO Jack Dorsey has a cunning plan for purging the rest of the world's naysayers from his platform.

"This week, we are suspending accounts for attempting to evade an account suspension. These accounts were previously suspended for abusive behavior or evading a previous suspension, and are not allowed to continue using Twitter."

Webmaster's Commentary: 

With the next month, I am hoping that people, not wanting to have their websites chosen for them, with others are suppressed, will be flocking to alternatives to twitter, and that this will render Twitter thoroughly... irrelevant.

Twitter Is Dying! 7 Alternative Social Networks to Join Now

5 top Twitter Alternatives you Must Try!

Stop using the default Twitter App, and check these

Top Ten Twitter Alternatives

Aug 14 11:33

JUDICIALWATCH: More Evidence of Political Coverup in DNC IT Security Scandal

More evidence has surfaced about the disturbing political coverup of grave national security violations committed by the Pakistani who ran House Democrats’ information technology. His name is Imran Awan and last year he was arrested on bank-fraud charges at Dulles International Airport in Washington D.C. while trying to flee to his native Pakistan. Even after getting fired by some members of Congress for stealing computers and data systems, Florida’s Debbie Wasserman Schultz, then Democratic National Committee (DNC) chair, kept him and let him have access to her emails and files as well as the password to the electronic device she used for DNC business. At one point, Awan had access to the computers of dozens of members of Congress, including those on the House Intelligence and Foreign Affairs committees. Judicial Watch has launched an investigation and is pursuing public records.

Aug 14 11:06

CENSORSHIP IS WHAT HAPPENS WHEN POWERFUL PEOPLE GET SCARED

Anyone who tells you the recent escalation of censorship by U.S. tech giants is merely a reflection of private companies making independent decisions is either lying or dangerously ignorant.

In the case of Facebook, the road from pseudo-platform to willing and enthusiastic tool of establishment power players is fairly straightforward. It really got going earlier this year when issues surrounding egregious privacy violations in the case of Cambridge Analytica (stuff that had been going on for years) could finally be linked to the Trump campaign. It was at this point that powerful and nefarious forces spotted an opportunity to leverage the company’s gigantic influence in distributing news and opinion for their own ends. Rather than hold executives to account and break up the company, the choice was made to commandeer and weaponize the platform. This is where we stand today.

Webmaster's Commentary: 

There is only one thing to do with the unholy triumverate of Facebook, Twitter, and YouTube: ignore them as though they were the plague, and take a look at their upcoming competitors, like GAB! Yandex, and DuckDuckGo.

This is not to say that ultimately, these outlets won't get bought out, but at least for the time being, they are reasonably open, and don't track where you have been on these sites.

Aug 14 10:59

Ajit Pai loses in court—FCC can’t kill broadband subsidy in Tribal areas

A US appeals court has blocked the Federal Communications Commission's attempt to take a broadband subsidy away from Tribal areas.

The FCC decision, originally slated to take effect later this year, would have made it difficult or impossible for Tribal residents to obtain a $25-per-month Lifeline subsidy that reduces the cost of Internet or phone service for poor people. But on Friday, a court stayed the FCC decision pending appeal, saying that Tribal organizations and small wireless carriers are likely to win their case against the commission.

FCC stands by decision to raise broadband prices on American Indians

Webmaster's Commentary: 

Good for our First Nation Americans on this!!

Aug 14 10:57

AN 11-YEAR-OLD HACKED A MOCK FLORIDA ELECTION SITE IN 10 MINUTES

The security of the U.S. election system just lost a vote of confidence.

At the annual hacker conference DefCon, Emmett Brewer, an 11-year-old boy from Austin, Texas, was able to change the results on a mock Florida election website. It took him 10 minutes.

Though the website in question was a mere replica of the Florida Secretary of State website, the hack points to the larger vulnerabilities of the election infrastructure in the U.S. On the heels of Russian meddling in the 2016 U.S. election, Microsoft has already detected evidence of Russian interference in three races in the 2018 mid-terms.

Webmaster's Commentary: 

It took this 11 year old kid 10 minutes to change the outcome of a mock-up of Florida's electronic voting system?!?

Folks, if we ever need to give these voting machines the deep-six, and restore paper ballots, now is the time.

And particularly in the upcoming midterms, we cannot allow Voter ID to be considered criminal, in any way, shape, or form!!

Aug 14 10:32

OH LOOK, YET MORE EFFORTS TO STRANGLE BROADBAND COMPETITION

A major component of the Telecommunications Act of 1996 was the idea of line sharing, or local loop unbundling. Simply put, the rules set forth required that incumbent telcos needed to share their networks with smaller competitors, providing wholesale access to bandwidth. It was an effort to foster something vaguely resembling competition in the broadband space by letting smaller companies piggyback on existing network infrastructure. The thought was that because the barriers to market entry were so high (both politically and financially), this could help smaller competitors gain footholds that would otherwise be impossible.

The effort didn't work out for several reasons.

Webmaster's Commentary: 

Here on Oahu, we are stuck with Spectrum, which promises much, in those multi-million commercials, featuring the voice of the comedian, Ellen De Generes, but actually delivers very little of what it promises.

When cable companies do not have to compete, they don't have to give a damn about the true quality of their service, or if there is even a modicum of public satisfaction with it.

Aug 14 10:18

When's a backdoor not a backdoor? When the Oz government says it isn't

Australia's promised “not-a-backdoor” crypto-busting bill is out and the government has kept its word - it doesn't want a backdoor, just the keys to your front one.

The draft of The Assistance and Access Bill 2018 calls for anyone using or selling communications services in Australia will be subject to police orders for access to private data.

That includes all vendors of computers, phones, apps, social media and cloud services in the Lucky Country, and anyone within national borders using them. These data-tapping orders will be enforced with fines of up to AU$10m (US$7.3m) for companies or $50,000 ($36,368) for individuals

The draft legislation also wants five years in prison for anyone who reveals a data-slurping investigation is going on.

Aug 14 10:15

Three more data-leaking security holes found in Intel chips as designers swap security for speed

Intel will today disclose three more vulnerabilities in its processors that can be exploited by malware and malicious virtual machines to potentially steal secret information from computer memory.

These secrets can include passwords, personal and financial records, and encryption keys. They can be potentially lifted from other applications and other customers' virtual machines, as well as SGX enclaves, and System Management Mode (SMM) memory.

Aug 14 09:47

How Hacked Water Heaters Could Trigger Mass Blackouts

In a power network large enough to serve an area of 38 million people—a population roughly equal to Canada or California—the researchers estimate that just a one percent bump in demand might be enough to take down the majority of the grid. That demand increase could be created by a botnet as small as a few tens of thousands of hacked electric water heaters or a couple hundred thousand air conditioners.

Aug 14 09:35

RUSSIAN MILITARY SPY SOFTWARE IS ON HUNDREDS OF THOUSANDS OF HOME ROUTERS

The Russian military is inside hundreds of thousands of routers owned by Americans and others around the world, a top U.S. cybersecurity official said on Friday. The presence of Russian malware on the routers, first revealed in May, could enable the Kremlin to steal individuals’ data or enlist their devices in a massive attack intended to disrupt global economic activity or target institutions.

On May 27, Justice Department officials asked Americans to reboot their routers to stop the attack. Afterwards, the world largely forgot about it. That’s a mistake, said Rob Joyce, senior advisor to the director of the National Security Agency and the former White House cybersecurity coordinator.

“The Russian malware is still there,” said Joyce.

Webmaster's Commentary: 

Yet more demonization of Russia here in the US?!?

Because IF this is real, it appears to primarily be a problem for routers in Ukraine.

So then, how, please, did it become a problem for American computers, and what US agencies tasked with protecting Americans from this kind of problem, have failed the American people (yet again)?!?

Aug 14 00:17

George Orwell Warned Us Of The Most Dangerous Type Of Censorship

The end result of this type of censorship, however, quite likely will not bring about the feared Soviet-style clampdown on ideas that challenge the establishment. It’s more reasonable to expect that these companies have fallen prey to monopolistic hubris and will soon see massive declines in viewership, collapsing stock prices and the revolt of angry shareholders. In other words, these companies are shooting themselves in the feet. That said, the current social/political/media climate in America today is likely to bring about the rise of a far more insidious and dangerous type of censorship: self-censorship.

Aug 13 23:57

Exposed: How Google Still Tracks You Even When “Location History” Is Turned Off

Android and iPhone users may be under the impression that Google is not tracking their location data if they’ve turned off “Location History” on their devices. After all, the Google support page says, “With Location History off, the places you go are no longer stored.” -- But a new Associated Press investigation showed how that is not really the case. Some Google apps still automatically collect users’ location markers—information it can use to benefit its advertising revenue.

Aug 13 17:40

New Wi-Fi attack cracks WPA2 passwords with ease

The common Wi-Fi security standard is no longer as secure as you think.

Aug 13 17:37

New security flaw with Intel processors

A new security flaw has been detected by German researchers in relation to Intel. This comes on the back of earlier concerns from January and March 2018. The flaw means that passwords can potentially be stolen.

Aug 13 17:37

Hacker Finds Hidden 'God Mode' on Old x86 CPUs

Some x86 CPUs have hidden backdoors that let you seize root by sending a command to an undocumented RISC core that manages the main CPU, security researcher Christopher Domas told the Black Hat conference here Thursday (Aug. 9).

The command — ".byte 0x0f, 0x3f" in Linux — "isn't supposed to exist, doesn't have a name, and gives you root right away," Domas said, adding that he calls it "God Mode."

The backdoor completely breaks the protection-ring model of operating-system security, in which the OS kernel runs in ring 0, device drivers run in rings 1 and 2, and user applications and interfaces ("userland") run in ring 3, furthest from the kernel and with the least privileges. To put it simply, Domas' God Mode takes you from the outermost to the innermost ring in four bytes.

"We have direct ring 3 to ring 0 hardware privilege escalation," Domas said. "This has never been done."

Aug 13 17:34

Vulnerabilities Found in the Firmware of 25 Android Smartphone Models

Last week, at the DEF CON security conference held in Las Vegas, security researchers presented details about 47 vulnerabilities in the firmware and default apps of 25 Android smartphone models, 11 of which are also sold in the US.

These vulnerabilities, embedded in full in the table at the bottom of this article, range from simple flaws that crash devices to dangerous bugs that grant attackers the ability to get root access on users' devices.

Some of the most dangerous of these vulnerabilities allow an attacker to retrieve or send SMS texts from the user's phone, take screenshots or record videos of the phone's screen, retrieve the user's contacts list, force the installation of third-party arbitrary apps without the user's knowledge or consent, or even wipe the user's data from the device.

Aug 13 17:33

Backdoor Mechanism Discovered in VIA C3 x86 Processors

At the Black Hat 2018 and DEF CON 26 security conferences held in Las Vegas last week, a security researcher detailed a backdoor mechanism in x86-based VIA C3 processors, a CPU family produced and sold between 2001 and 2003 by Taiwan-based VIA Technologies Inc.

The affected CPU family was designed with PC use in mind but was more widely known for being deployed with point-of-sale units, smart kiosks, ATMs, gaming rigs, healthcare devices, and industrial automation equipment.

Christopher Domas, a well-known hardware security expert, says that VIA C3 x86-based CPUs contain what he referred to as a "hidden God mode" that lets an attacker elevate the execution level of malicious code from kernel ring 3 (user mode) to kernel ring 0 (OS kernel).

Aug 13 17:05

Hackers ‘to steal MILLIONS from cash machines within days’: FBI warns of imminent mass attack on world’s ATMs

America's intelligence chiefs have warned banks of a major hacking threat to cash machines worldwide in the next few days.

The FBI sent out a confidential alert on Friday to warn that cyber criminals are planning a global 'cash-out scheme' using malware to take over ATMs and steal millions of dollars.

Banks were warned that they could fall victim to an 'unlimited operation' in which millions of dollars could be withdrawn from cash machines.

Aug 13 17:03

Hackers discover vulnerability in Amazon Echo devices that could let anyone SPY on your conversations

A group of security researchers have exposed a flaw in the Amazon Echo that allows hackers to secretly listen to unsuspecting users' conversations - but only if they're savvy enough to be able to carry out the attack.

In a presentation dubbed 'Breaking Smart Speakers: We are Listening to You,' researchers from Chinese tech giant Tencent explained how they were able to build a doctored Echo speaker and use that to gain access to other Echo devices.

The researchers have since notified Amazon of the vulnerability, and the company issued a patch in July.

Aug 13 15:24

Beware the fax machine: Experts warn MILLIONS of office gadgets are at risk of being hacked - and many are too old to be updated

What could be less threatening than the old office fax machine? Nothing.

That's precisely why it's used as a backdoor for hackers to get into an organization's network.

Check Point, a cyber security firm in Israel, said Sunday that their research discovered security flaws in tens of millions of fax machines.

The hack works by sending an image file through the phone line - or a file that the fax machine thinks is an image file - and that is coded to contain malicious software.

When a company receives the photo, the image is decoded and uploaded into the fax-printer's memory, allowing the hackers to take over the device and spreading the malicious code through the network.

Aug 13 15:22

Vimeo joins Facebook, Apple, YouTube and other tech giants in banning InfoWars' Alex Jones from its platform

Vimeo has become the latest tech giant to take action against controversial radio host Alex Jones.

The video-hosting website removed InfoWars from its platform for violating the site's Terms of Service.

Aug 13 11:04

COMING SOON TO THE USA=> A Month Before Election Sweden’s Leftist Govt. Obtains Right to Silence Critics on Facebook

Sweden’s government has been given a direct hotline to Facebook to remove “unreasonable things” and “problematic campaigns”, news outlet Samhällsnytt reports, and this is just in time to silence their opponents in the upcoming elections.

“The call has been made”. Infrastructure Minister Peter Eriksson MP has described the cooperation between Facebook and the government to delete unwanted content in a candid interview.

The politician commends the willing cooperation of the social media company. At the same time, more and more of the opposition are leaving social media.

Aug 13 09:44

Flashback: Adobe Voco 'Photoshop-for-voice' causes concern

A new application that promises to be the "Photoshop of speech" is raising ethical and security concerns.

Adobe unveiled Project Voco last week. The software makes it possible to take an audio recording and rapidly alter it to include words and phrases the original speaker never uttered, in what sounds like their voice.

One expert warned that the tech could further undermine trust in journalism.

Another said it could pose a security threat.

Aug 13 09:21

New smart meter code could hand energy firms power to monitor usage, raid credit balances, hike prices and switch customers' tariffs

A little known code governing smart meters includes details of sweeping powers that could take over customer accounts.

It reveals that technology is available to the meter network that could enable suppliers to raid credit balances built up by consumers, turn off supplies remotely, raise prices and even switch problem customers on to a pre-payment scheme. Authority to use these functions has yet to be granted.

Nick Hunn, a wireless technology expert with London-based firm WiFore, fears this might eventually give energy suppliers the ability to act like the fictional Big Brother in the classic novel Nineteen Eighty-Four by George Orwell.

Aug 13 09:18

Watch out for Nectar text message scam doing the rounds asking card holders to log-in online to double points

In the text message, card holders are told that in occasion of the loyalty scheme's 10th anniversary, they will be able to double their points by just logging into their accounts via the link included in the text.

But Nectar has warned the message is not genuine and urged card holders who receive it not to click on the link and instead delete the message.

Aug 13 09:08

Google really IS recording your every movements! Search firm tracks location data using your smartphone, even when you explicitly tell it not to

Google services on Android devices and iPhones store records of your location even after you have enabled privacy settings that claim to halt the practice.

Disabling 'Location History' in the settings of Google apps should stop the company keeping track of your movements.

However, researchers discovered the search company was still keeping tabs on users' location behind their back.

Aug 13 08:43

Apple macOS vulnerability paves the way for system compromise with a single click

A security researcher uncovered a zero-day in Apple software by tweaking a few lines of code. Speaking at Defcon in Las Vegas last week, Patrick Wardle, Chief Research Officer of Digita Security, described his research into "synthetic" interactions with a user interface (UI) that can lead to severe macOS system security issues.

Synthetic events are when attackers can virtually "click" objects in order to load code without user consent. If a threat actor is able to "click" a security prompt and load a kernel extension, this could lead to the full compromise of an operating system.

"Via a single click, countless security mechanisms may be completely bypassed," the researcher says. "Run untrusted app? click ...allowed. Authorize keychain access? click ...allowed. Load 3rd-party kernel extension? click ...allowed. Authorize outgoing network connection? click ...allowed."

Webmaster's Commentary: 

Aug 13 07:50

UAE: UP TO 25 YEARS IN JAIL FOR CYBER CRIMINALS

The UAE has made an amendment to a 2012 Cyber Crime law, increasing financial penalties and extending jail terms to up to 25 years for terrorism related activity, WAM Agency reported today.

Those engaging in cybercrimes in the UAE can be sent to jail for a period not exceeding 25 years in addition to a fine up to some $1 million.

The terrorism related activity includes: “whoever establishes, manages or runs a website or publishes information on the computer network or information technology means for the interest of a terrorist group or any unauthorised group, association, organisation”, the WAM Agency statement read.

‘HATE CRIMES’

Webmaster's Commentary: 

Why does it not surprise me, that this same country, terrified of what its own people may think about its government, is torturing in Yemen?!?

That has to be part of the three-legged stool, is it not, of surveillance, threatening those who do not believe the government, posting alternative viewpoints, and then using torture to reinforce the consequences of the first two acts.

This is all as logical as it is deplorable.

Aug 13 05:40

Hacking the US mid-terms? It's child's play

Bianca Lewis, 11, has many hobbies. She likes Barbie, video games, fencing, singing… and hacking the infrastructure behind the world’s most powerful democracy.

“I’m going to try and change the votes for Donald Trump,” she tells me.

“I’m going to try to give him less votes. Maybe even delete him off of the whole thing.”

Fortunately for the President, Bianca is attacking a replica website, not the real deal.

She’s taking part in a competition organised by R00tz Asylum, a non-profit organisation that promotes “hacking for good”.

Its aim is to send out a dire warning: the voting systems that will be used across America for the mid-term vote in November are, in many cases, so insecure a young child can learn to hack them with just a few minute’s coaching.

Aug 12 23:51

In A Corporatist System Of Government, Corporate Censorship Is State Censorship

We’re going to have to find a way to keep the oligarchs from having their cake and eating it too. Either (A) corporations are indeed private organizations separate from the government, in which case the people need to get money out of politics and government agencies out of Silicon Valley so they can start acting like it, and insist that their owners can’t be dragged out on to the Senate floor and instructed on what they can and can’t do with their business, or (B) these new media platforms get treated like the government agencies they function as, and the people get all the First Amendment protection that comes with it. Right now the social engineers are double-dipping in a way that will eventually give the alliance of corporate plutocrats and secretive government agencies the ability to fully control the public’s access to ideas and information. If they accomplish that, it’s game over for humanity.

Aug 11 23:56

3D Printed Guns: Debating Inevitability

For those fearful of guns being 3D printed and then used by criminals, they should begin understanding and then addressing what actually drives certain individuals to violence. Understanding that socioeconomic factors, not merely access to firearms drives violence, will open up the possibility to more practical solutions to diminish gun violence. Gun control efforts are already proven ineffective, and with 3D printing, soon to be rendered impossible. 3D printing will bring with it greater individual wealth and influence, but with it, society will have to learn to live with the greater individual responsibility that comes with it.

Aug 11 09:40

Next News Network joins REAL.video

The REAL.video channel for Next News Network is:

REAL.video/channel/nextnewsnetwork

Aug 11 08:47

How 3D Printing is Revolutionizing Housing

The housing industry is like a roller coaster.

The housing crash left houses empty and people homeless. Some neighborhoods are still littered with empty and decaying homes, some having stood empty going on 10 years now.

By this point, a lot of these homes aren’t even worth repairing. Since the crash, there has been a lot of conversation, and demand, for more housing options.

And why not? Engineers have discovered cheaper, more eco-friendly and sustainable housing options. Why not use them?

Current homes were built between 40 and 100 years ago. They now show signs of wood rot, weakening foundation, insect infestations, and mold. And without modern insulation and windows, residents shoulder high power and heating costs.

These problems will only get worse as time goes on. But what’s going to replace them?

Will people build more of the same, or start building smarter?

New Era of Housing

Webmaster's Commentary: 

This is a really exciting use of the technology which will, no doubt, get traction as a profoundly useful tool in the housing industry.

Aug 11 08:14

FACEBOOK TEAMS UP WITH NATO TO CENSOR NEWS (VIDEO)

A new Reuters report confirms that social media censorship is taking a chilling geopolitical effect, as Facebook has been revealed as a top donor to the Atlantic Council, alongside Western governments, Gulf autocratic regimes, NATO, various branches of the US military, and a number of major defense contractors and corporations.

In May Facebook announced that it was outsourcing much of its political “fact-checking” to the Atlantic Council, the PR arm of NATO, and more specifically, four individuals within the Atlantic Council will form a “Digital Forensic Lab (DFR Lab)” so as to help the billion dollar tech giant spot those pesky Russian election meddling trolls…because God knows, Facebook simply does not have the money or know-how to hire its own team of “fact checkers”, something that a publisher platform of Facebook’s size would naturally do in house as it formulates its editorial position.

Webmaster's Commentary: 

Yet another compelling set of reasons to make "Facebook"... irrelevant, by not using it again, ever.

Aug 11 08:12

BIG TECH COLLUDED WITH POWER ELITE AT 2013 BILDERBERG MEETING; RE-CAST AS “GOOGLE-BERG”

Big Tech has been in bed with the power structure for years. It should come as no surprise that the major tech companies would act in the globalists favor.

Preceding the crackdown on alternative media like Alex Jones infowars, Bilderberg discussed big tech’s narrative of a “post truth” world during this year’s annual meeting in Turin, Italy.

In 2013, the secretive Bilderberg group met in Watford, U.K. at the Grove Hotel. Google, the big tech kingpin, was present.

Infowars covered the meeting, and as usual had sources inside.

As Paul Joseph Watson reported,

“Put simply, Bilderberg is merging with Google under the stewardship of Google CEO Eric Schmidt, a regular Bilderberg attendee. Google’s annual Zeitgeist conference, which has been based at the Grove since 2007, immediately precedes the Bilderberg Group conference by a matter of days.

Webmaster's Commentary: 

Thank you, I have utterly no appetite for being force-fed government agendas through my computer screen, and continue to want the true ability to determine what I should read, see, or not read, or see.

Google has become one of the most evil manifestations of an anti-Constitutional/ anti Bill of Rights electronic monster which has ever been created, and deserves, simply and peacefully, the fate it has imposed on its, and the deep states, alleged "enemies" (like WRH): total electronic shunning, period, end of discussion.

Think about it: if you don't use or post on their platforms, they cannot algorithmically consign you "to the back of the digital bus."

Find the alternatives, and start using them today!!

The words "indispensable" and "Google", no longer have an ongoing relationship.

Aug 11 07:49

NEOCONS HYPE THREAT OF “IRANIAN HACKERS” TO JUSTIFY PREEMPTIVE “COUNTERATTACK”

Several reports in both American and Israeli media have recently been circulating the claim that Iran is increasingly likely to respond to draconian U.S.-imposed sanctions by conducting “cyberattacks” against the United States. According to this narrative, “Iranian hackers have laid the groundwork to carry out extensive cyberattacks on U.S. and European infrastructure and on private companies,” prompting the U.S. to consider launching a preemptive “counterattack” in response.

Quoting anonymous U.S. government officials, think tanks and “experts,” these articles assert that the sanctions the U.S. re-imposed on Iran this Tuesday are “likely to push that country to intensify state-sponsored cyber-threat activities,” activities that one expert called “the most consequential, costly and aggressive in the history of the internet, more so than Russia.”

Webmaster's Commentary: 

Israel has been trying to goad both the US and Saudi Arabia in a potentially brutal attack against Iran, in the name of "regime change" in this country, and they are thoroughly frustrated that all their collective propaganda in this area, cannot seem to get the American people, now war-weary, and very war skeptical, after 17 years of America's failures in places like Afghanistan; Somalia; Iraq; and Libya, on it s"Bomb, Bomb Iran" War Train.

And I find it ironic, in looking at the region, that those who so deeply advocate war against Iran, are those countries in desperate need of regime change themselves.

Let's start with Israel, with its current and its painfully corrupt Prime Minister Netanyahu, who must always keep Israel's citizens in a psychological attitude of fear, and dread, against both the Palestinians, and against all their neighbors, who, it is said, want to kill them all, and create a 2nd holocaust.

Never mind that Israel appears pathologically incapable of getting along with its neighbors, and is always advocating regime change; never mind that it is constantly trying to figure out how to assassinate more Palestinians, and get away with it without the world noticing.

Then, let's shift to Prince Mohammed bin Salman, Saudi Arabia's thoroughly embarrassing 21st century autocratic ruler, and the current Butcher of Yemen, who the United States is assisting militarily in Saudi War Crimes in Yemen.

Let's take a look at what the "good Prince" has caused to happen in Yemen, shall we?!? Warning: graphic images.

Images: Yemeni infants and children being killed, courtesy of Saudi bombing Runs

Starvation and disease (possibly weaponised cholera) are running rampant in Yemen, courtesy of joint US/Saudi bombing of the Yemeni ports, so food cannot get in.

Images:
Yemeni children starving to death, courtesy of US/Saudi port blockades

And please do not forget that Prince Salman, one of President Trump's BFFs in the Middle East, has ordered the use of depleted uranium weapons in Yemen:
Video:
Saudis using depleted uranium weapons in Yemen

And the use of these DU weapons in Yemen, is having the same effect as they had in Iraq, both on Iraqis... and American military professionals, who discovered to their horror, that their children were born, just as maimed and deformed, as were their Iraqi counterparts.

Images: Yemeni children born with massive deformities due to their parents' exposure to DU

So to our very own Merchant of Death in Chief, President Trump, who has authorized the sale of billions of dollars of weapons to Saudi Arabia, and to His Highness, the Butcher of Yemen, AKA Prince bin Salman, , all I have for you both is the polite, reiteration of two profoundly insightful sayings.

The first by the late US President John F. Kennedy, who said: "When peaceful revolution is impossible, violent revolution is inevitable."

And the second, by philosopher George Santayana, observes: ""Those who cannot remember the past are condemned to repeat it.".

Just some food for thought, gentlemen.

Aug 11 00:25

Human Zombies Unaware Of The Real World

One wonders what these Zombies would do if they were in a location without connectivity? (I’ve seen it – it’s not pretty). One wonders what these Zombies would do if the power or internet went out for more than just a few hours!

Aug 10 23:47

Censorship PURGE points to imminent false flag violence before mid-term elections… bigger than 9/11?

The coordinated de-platforming effort is clearly directed by the deep state to eliminate a prominent, dissenting voice in preparation for unleashing a history-shaping false flag attack that’s likely going to be bigger than 9/11.

Aug 10 15:50

Tokyo Olympics Using Facial Recognition For Security

By Aaron Kesel

The technology NeoFace will use IC chips within identification cards to automatically verify the identity of those entering over 40 venues...

Aug 10 09:23

Warning over satellite security bugs

Satellite systems used on aircraft, ships and by the military contain bugs that could let hackers take control of them, a security researcher has warned.

The worst bugs could let attackers overcharge satellite antenna to damage the equipment or harm operators.

And others could be used to betray the exact location of military forces in crisis zones, the researcher said.

IOActive, which found the bugs, said it was working with manufacturers to harden devices against attack.

"The consequences of these vulnerabilities are shocking," said Ruben Santamarta, from IOActive, in a statement explaining some of his findings.

Aug 10 09:20

This rigged charger can hijack your new laptop

A neat feature of many modern laptops is the ability to power them up through the USB port. Unlike the rectangular USB ports of old, the newer type - USB-C - can carry enough power to charge your machine.

That’s great news: it means you don’t need to add a separate port just for charging. And when the USB port isn’t being used for power, it can be used for something useful, like plugging in a hard drive, or your phone.

But while you and I may look at that as an improvement, hackers see an opportunity to exploit a new vulnerability.

One researcher, who goes by the name MG, showed me how a Macbook charger could be booby-trapped. Modified in such a way it was possible to hijack a user's computer, without them having any idea it was happening.

Aug 10 09:04

Tweets from Alex Jones have been DELETED as Twitter confirms it is now 'reviewing' the content, just days after CEO Jack Dorsey said the company would not block the InfoWars host

Controversial radio host Alex Jones has seen tweets and videos removed from his personal Twitter account, as well as posts from the official InfoWars account.

Twitter has confirmed the tweets have been removed – but claims it was not responsible for taking down the posts.

Instead, it suggested the contentious tweets may have been removed by Jones himself or somebody with access to the Infowars account.

However, Twitter confirmed to MailOnline that it is actively 'reviewing' the content included in Alex Jones' personal account, as well as that on InfoWars.

Aug 10 09:03

Cyber criminals are using Facebook Messenger to trick people into opening malicious links that harvest their personal data, FBI officials warn

The scam attempts to trick users into opening a malicious URL that harvests their personal data and login credentials for social networks, like Facebook.

In a bid to coerce people into opening the suspicious URL, cyber criminals pose a question to their targets: 'Hey I saw this video. Isn't this you?'

Although the original warning from the FBI highlighted Facebook Messenger as a particular platform of concern, this has since been amended after the scam was found on other rival platforms.

It's unclear how many people have been hit by the latest scam, or how exactly cyber criminals are generating revenue.

Aug 10 09:01

Facebook web traffic nearly HALVES in just two years, with younger users flocking to rival YouTube instead

Facebook has seen a significant drop in monthly page visits, plummeting 3.8 billion visits from 8.5 billion to 4.7 billion over the last two years.

While the Facebook mobile app's traffic has grown steadily over that period, it has not been by enough to plug the gap, experts say.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA