COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Aug 14 10:15

Three more data-leaking security holes found in Intel chips as designers swap security for speed

Intel will today disclose three more vulnerabilities in its processors that can be exploited by malware and malicious virtual machines to potentially steal secret information from computer memory.

These secrets can include passwords, personal and financial records, and encryption keys. They can be potentially lifted from other applications and other customers' virtual machines, as well as SGX enclaves, and System Management Mode (SMM) memory.

Aug 14 09:47

How Hacked Water Heaters Could Trigger Mass Blackouts

In a power network large enough to serve an area of 38 million people—a population roughly equal to Canada or California—the researchers estimate that just a one percent bump in demand might be enough to take down the majority of the grid. That demand increase could be created by a botnet as small as a few tens of thousands of hacked electric water heaters or a couple hundred thousand air conditioners.

Aug 14 09:35

RUSSIAN MILITARY SPY SOFTWARE IS ON HUNDREDS OF THOUSANDS OF HOME ROUTERS

The Russian military is inside hundreds of thousands of routers owned by Americans and others around the world, a top U.S. cybersecurity official said on Friday. The presence of Russian malware on the routers, first revealed in May, could enable the Kremlin to steal individuals’ data or enlist their devices in a massive attack intended to disrupt global economic activity or target institutions.

On May 27, Justice Department officials asked Americans to reboot their routers to stop the attack. Afterwards, the world largely forgot about it. That’s a mistake, said Rob Joyce, senior advisor to the director of the National Security Agency and the former White House cybersecurity coordinator.

“The Russian malware is still there,” said Joyce.

Webmaster's Commentary: 

Yet more demonization of Russia here in the US?!?

Because IF this is real, it appears to primarily be a problem for routers in Ukraine.

So then, how, please, did it become a problem for American computers, and what US agencies tasked with protecting Americans from this kind of problem, have failed the American people (yet again)?!?

Aug 14 00:17

George Orwell Warned Us Of The Most Dangerous Type Of Censorship

The end result of this type of censorship, however, quite likely will not bring about the feared Soviet-style clampdown on ideas that challenge the establishment. It’s more reasonable to expect that these companies have fallen prey to monopolistic hubris and will soon see massive declines in viewership, collapsing stock prices and the revolt of angry shareholders. In other words, these companies are shooting themselves in the feet. That said, the current social/political/media climate in America today is likely to bring about the rise of a far more insidious and dangerous type of censorship: self-censorship.

Aug 13 23:57

Exposed: How Google Still Tracks You Even When “Location History” Is Turned Off

Android and iPhone users may be under the impression that Google is not tracking their location data if they’ve turned off “Location History” on their devices. After all, the Google support page says, “With Location History off, the places you go are no longer stored.” -- But a new Associated Press investigation showed how that is not really the case. Some Google apps still automatically collect users’ location markers—information it can use to benefit its advertising revenue.

Aug 13 17:40

New Wi-Fi attack cracks WPA2 passwords with ease

The common Wi-Fi security standard is no longer as secure as you think.

Aug 13 17:37

New security flaw with Intel processors

A new security flaw has been detected by German researchers in relation to Intel. This comes on the back of earlier concerns from January and March 2018. The flaw means that passwords can potentially be stolen.

Aug 13 17:37

Hacker Finds Hidden 'God Mode' on Old x86 CPUs

Some x86 CPUs have hidden backdoors that let you seize root by sending a command to an undocumented RISC core that manages the main CPU, security researcher Christopher Domas told the Black Hat conference here Thursday (Aug. 9).

The command — ".byte 0x0f, 0x3f" in Linux — "isn't supposed to exist, doesn't have a name, and gives you root right away," Domas said, adding that he calls it "God Mode."

The backdoor completely breaks the protection-ring model of operating-system security, in which the OS kernel runs in ring 0, device drivers run in rings 1 and 2, and user applications and interfaces ("userland") run in ring 3, furthest from the kernel and with the least privileges. To put it simply, Domas' God Mode takes you from the outermost to the innermost ring in four bytes.

"We have direct ring 3 to ring 0 hardware privilege escalation," Domas said. "This has never been done."

Aug 13 17:34

Vulnerabilities Found in the Firmware of 25 Android Smartphone Models

Last week, at the DEF CON security conference held in Las Vegas, security researchers presented details about 47 vulnerabilities in the firmware and default apps of 25 Android smartphone models, 11 of which are also sold in the US.

These vulnerabilities, embedded in full in the table at the bottom of this article, range from simple flaws that crash devices to dangerous bugs that grant attackers the ability to get root access on users' devices.

Some of the most dangerous of these vulnerabilities allow an attacker to retrieve or send SMS texts from the user's phone, take screenshots or record videos of the phone's screen, retrieve the user's contacts list, force the installation of third-party arbitrary apps without the user's knowledge or consent, or even wipe the user's data from the device.

Aug 13 17:33

Backdoor Mechanism Discovered in VIA C3 x86 Processors

At the Black Hat 2018 and DEF CON 26 security conferences held in Las Vegas last week, a security researcher detailed a backdoor mechanism in x86-based VIA C3 processors, a CPU family produced and sold between 2001 and 2003 by Taiwan-based VIA Technologies Inc.

The affected CPU family was designed with PC use in mind but was more widely known for being deployed with point-of-sale units, smart kiosks, ATMs, gaming rigs, healthcare devices, and industrial automation equipment.

Christopher Domas, a well-known hardware security expert, says that VIA C3 x86-based CPUs contain what he referred to as a "hidden God mode" that lets an attacker elevate the execution level of malicious code from kernel ring 3 (user mode) to kernel ring 0 (OS kernel).

Aug 13 17:05

Hackers ‘to steal MILLIONS from cash machines within days’: FBI warns of imminent mass attack on world’s ATMs

America's intelligence chiefs have warned banks of a major hacking threat to cash machines worldwide in the next few days.

The FBI sent out a confidential alert on Friday to warn that cyber criminals are planning a global 'cash-out scheme' using malware to take over ATMs and steal millions of dollars.

Banks were warned that they could fall victim to an 'unlimited operation' in which millions of dollars could be withdrawn from cash machines.

Aug 13 17:03

Hackers discover vulnerability in Amazon Echo devices that could let anyone SPY on your conversations

A group of security researchers have exposed a flaw in the Amazon Echo that allows hackers to secretly listen to unsuspecting users' conversations - but only if they're savvy enough to be able to carry out the attack.

In a presentation dubbed 'Breaking Smart Speakers: We are Listening to You,' researchers from Chinese tech giant Tencent explained how they were able to build a doctored Echo speaker and use that to gain access to other Echo devices.

The researchers have since notified Amazon of the vulnerability, and the company issued a patch in July.

Aug 13 15:24

Beware the fax machine: Experts warn MILLIONS of office gadgets are at risk of being hacked - and many are too old to be updated

What could be less threatening than the old office fax machine? Nothing.

That's precisely why it's used as a backdoor for hackers to get into an organization's network.

Check Point, a cyber security firm in Israel, said Sunday that their research discovered security flaws in tens of millions of fax machines.

The hack works by sending an image file through the phone line - or a file that the fax machine thinks is an image file - and that is coded to contain malicious software.

When a company receives the photo, the image is decoded and uploaded into the fax-printer's memory, allowing the hackers to take over the device and spreading the malicious code through the network.

Aug 13 15:22

Vimeo joins Facebook, Apple, YouTube and other tech giants in banning InfoWars' Alex Jones from its platform

Vimeo has become the latest tech giant to take action against controversial radio host Alex Jones.

The video-hosting website removed InfoWars from its platform for violating the site's Terms of Service.

Aug 13 11:04

COMING SOON TO THE USA=> A Month Before Election Sweden’s Leftist Govt. Obtains Right to Silence Critics on Facebook

Sweden’s government has been given a direct hotline to Facebook to remove “unreasonable things” and “problematic campaigns”, news outlet Samhällsnytt reports, and this is just in time to silence their opponents in the upcoming elections.

“The call has been made”. Infrastructure Minister Peter Eriksson MP has described the cooperation between Facebook and the government to delete unwanted content in a candid interview.

The politician commends the willing cooperation of the social media company. At the same time, more and more of the opposition are leaving social media.

Aug 13 09:44

Flashback: Adobe Voco 'Photoshop-for-voice' causes concern

A new application that promises to be the "Photoshop of speech" is raising ethical and security concerns.

Adobe unveiled Project Voco last week. The software makes it possible to take an audio recording and rapidly alter it to include words and phrases the original speaker never uttered, in what sounds like their voice.

One expert warned that the tech could further undermine trust in journalism.

Another said it could pose a security threat.

Aug 13 09:21

New smart meter code could hand energy firms power to monitor usage, raid credit balances, hike prices and switch customers' tariffs

A little known code governing smart meters includes details of sweeping powers that could take over customer accounts.

It reveals that technology is available to the meter network that could enable suppliers to raid credit balances built up by consumers, turn off supplies remotely, raise prices and even switch problem customers on to a pre-payment scheme. Authority to use these functions has yet to be granted.

Nick Hunn, a wireless technology expert with London-based firm WiFore, fears this might eventually give energy suppliers the ability to act like the fictional Big Brother in the classic novel Nineteen Eighty-Four by George Orwell.

Aug 13 09:18

Watch out for Nectar text message scam doing the rounds asking card holders to log-in online to double points

In the text message, card holders are told that in occasion of the loyalty scheme's 10th anniversary, they will be able to double their points by just logging into their accounts via the link included in the text.

But Nectar has warned the message is not genuine and urged card holders who receive it not to click on the link and instead delete the message.

Aug 13 09:08

Google really IS recording your every movements! Search firm tracks location data using your smartphone, even when you explicitly tell it not to

Google services on Android devices and iPhones store records of your location even after you have enabled privacy settings that claim to halt the practice.

Disabling 'Location History' in the settings of Google apps should stop the company keeping track of your movements.

However, researchers discovered the search company was still keeping tabs on users' location behind their back.

Aug 13 08:43

Apple macOS vulnerability paves the way for system compromise with a single click

A security researcher uncovered a zero-day in Apple software by tweaking a few lines of code. Speaking at Defcon in Las Vegas last week, Patrick Wardle, Chief Research Officer of Digita Security, described his research into "synthetic" interactions with a user interface (UI) that can lead to severe macOS system security issues.

Synthetic events are when attackers can virtually "click" objects in order to load code without user consent. If a threat actor is able to "click" a security prompt and load a kernel extension, this could lead to the full compromise of an operating system.

"Via a single click, countless security mechanisms may be completely bypassed," the researcher says. "Run untrusted app? click ...allowed. Authorize keychain access? click ...allowed. Load 3rd-party kernel extension? click ...allowed. Authorize outgoing network connection? click ...allowed."

Webmaster's Commentary: 

Aug 13 07:50

UAE: UP TO 25 YEARS IN JAIL FOR CYBER CRIMINALS

The UAE has made an amendment to a 2012 Cyber Crime law, increasing financial penalties and extending jail terms to up to 25 years for terrorism related activity, WAM Agency reported today.

Those engaging in cybercrimes in the UAE can be sent to jail for a period not exceeding 25 years in addition to a fine up to some $1 million.

The terrorism related activity includes: “whoever establishes, manages or runs a website or publishes information on the computer network or information technology means for the interest of a terrorist group or any unauthorised group, association, organisation”, the WAM Agency statement read.

‘HATE CRIMES’

Webmaster's Commentary: 

Why does it not surprise me, that this same country, terrified of what its own people may think about its government, is torturing in Yemen?!?

That has to be part of the three-legged stool, is it not, of surveillance, threatening those who do not believe the government, posting alternative viewpoints, and then using torture to reinforce the consequences of the first two acts.

This is all as logical as it is deplorable.

Aug 13 05:40

Hacking the US mid-terms? It's child's play

Bianca Lewis, 11, has many hobbies. She likes Barbie, video games, fencing, singing… and hacking the infrastructure behind the world’s most powerful democracy.

“I’m going to try and change the votes for Donald Trump,” she tells me.

“I’m going to try to give him less votes. Maybe even delete him off of the whole thing.”

Fortunately for the President, Bianca is attacking a replica website, not the real deal.

She’s taking part in a competition organised by R00tz Asylum, a non-profit organisation that promotes “hacking for good”.

Its aim is to send out a dire warning: the voting systems that will be used across America for the mid-term vote in November are, in many cases, so insecure a young child can learn to hack them with just a few minute’s coaching.

Aug 12 23:51

In A Corporatist System Of Government, Corporate Censorship Is State Censorship

We’re going to have to find a way to keep the oligarchs from having their cake and eating it too. Either (A) corporations are indeed private organizations separate from the government, in which case the people need to get money out of politics and government agencies out of Silicon Valley so they can start acting like it, and insist that their owners can’t be dragged out on to the Senate floor and instructed on what they can and can’t do with their business, or (B) these new media platforms get treated like the government agencies they function as, and the people get all the First Amendment protection that comes with it. Right now the social engineers are double-dipping in a way that will eventually give the alliance of corporate plutocrats and secretive government agencies the ability to fully control the public’s access to ideas and information. If they accomplish that, it’s game over for humanity.

Aug 11 23:56

3D Printed Guns: Debating Inevitability

For those fearful of guns being 3D printed and then used by criminals, they should begin understanding and then addressing what actually drives certain individuals to violence. Understanding that socioeconomic factors, not merely access to firearms drives violence, will open up the possibility to more practical solutions to diminish gun violence. Gun control efforts are already proven ineffective, and with 3D printing, soon to be rendered impossible. 3D printing will bring with it greater individual wealth and influence, but with it, society will have to learn to live with the greater individual responsibility that comes with it.

Aug 11 09:40

Next News Network joins REAL.video

The REAL.video channel for Next News Network is:

REAL.video/channel/nextnewsnetwork

Aug 11 08:47

How 3D Printing is Revolutionizing Housing

The housing industry is like a roller coaster.

The housing crash left houses empty and people homeless. Some neighborhoods are still littered with empty and decaying homes, some having stood empty going on 10 years now.

By this point, a lot of these homes aren’t even worth repairing. Since the crash, there has been a lot of conversation, and demand, for more housing options.

And why not? Engineers have discovered cheaper, more eco-friendly and sustainable housing options. Why not use them?

Current homes were built between 40 and 100 years ago. They now show signs of wood rot, weakening foundation, insect infestations, and mold. And without modern insulation and windows, residents shoulder high power and heating costs.

These problems will only get worse as time goes on. But what’s going to replace them?

Will people build more of the same, or start building smarter?

New Era of Housing

Webmaster's Commentary: 

This is a really exciting use of the technology which will, no doubt, get traction as a profoundly useful tool in the housing industry.

Aug 11 08:14

FACEBOOK TEAMS UP WITH NATO TO CENSOR NEWS (VIDEO)

A new Reuters report confirms that social media censorship is taking a chilling geopolitical effect, as Facebook has been revealed as a top donor to the Atlantic Council, alongside Western governments, Gulf autocratic regimes, NATO, various branches of the US military, and a number of major defense contractors and corporations.

In May Facebook announced that it was outsourcing much of its political “fact-checking” to the Atlantic Council, the PR arm of NATO, and more specifically, four individuals within the Atlantic Council will form a “Digital Forensic Lab (DFR Lab)” so as to help the billion dollar tech giant spot those pesky Russian election meddling trolls…because God knows, Facebook simply does not have the money or know-how to hire its own team of “fact checkers”, something that a publisher platform of Facebook’s size would naturally do in house as it formulates its editorial position.

Webmaster's Commentary: 

Yet another compelling set of reasons to make "Facebook"... irrelevant, by not using it again, ever.

Aug 11 08:12

BIG TECH COLLUDED WITH POWER ELITE AT 2013 BILDERBERG MEETING; RE-CAST AS “GOOGLE-BERG”

Big Tech has been in bed with the power structure for years. It should come as no surprise that the major tech companies would act in the globalists favor.

Preceding the crackdown on alternative media like Alex Jones infowars, Bilderberg discussed big tech’s narrative of a “post truth” world during this year’s annual meeting in Turin, Italy.

In 2013, the secretive Bilderberg group met in Watford, U.K. at the Grove Hotel. Google, the big tech kingpin, was present.

Infowars covered the meeting, and as usual had sources inside.

As Paul Joseph Watson reported,

“Put simply, Bilderberg is merging with Google under the stewardship of Google CEO Eric Schmidt, a regular Bilderberg attendee. Google’s annual Zeitgeist conference, which has been based at the Grove since 2007, immediately precedes the Bilderberg Group conference by a matter of days.

Webmaster's Commentary: 

Thank you, I have utterly no appetite for being force-fed government agendas through my computer screen, and continue to want the true ability to determine what I should read, see, or not read, or see.

Google has become one of the most evil manifestations of an anti-Constitutional/ anti Bill of Rights electronic monster which has ever been created, and deserves, simply and peacefully, the fate it has imposed on its, and the deep states, alleged "enemies" (like WRH): total electronic shunning, period, end of discussion.

Think about it: if you don't use or post on their platforms, they cannot algorithmically consign you "to the back of the digital bus."

Find the alternatives, and start using them today!!

The words "indispensable" and "Google", no longer have an ongoing relationship.

Aug 11 07:49

NEOCONS HYPE THREAT OF “IRANIAN HACKERS” TO JUSTIFY PREEMPTIVE “COUNTERATTACK”

Several reports in both American and Israeli media have recently been circulating the claim that Iran is increasingly likely to respond to draconian U.S.-imposed sanctions by conducting “cyberattacks” against the United States. According to this narrative, “Iranian hackers have laid the groundwork to carry out extensive cyberattacks on U.S. and European infrastructure and on private companies,” prompting the U.S. to consider launching a preemptive “counterattack” in response.

Quoting anonymous U.S. government officials, think tanks and “experts,” these articles assert that the sanctions the U.S. re-imposed on Iran this Tuesday are “likely to push that country to intensify state-sponsored cyber-threat activities,” activities that one expert called “the most consequential, costly and aggressive in the history of the internet, more so than Russia.”

Webmaster's Commentary: 

Israel has been trying to goad both the US and Saudi Arabia in a potentially brutal attack against Iran, in the name of "regime change" in this country, and they are thoroughly frustrated that all their collective propaganda in this area, cannot seem to get the American people, now war-weary, and very war skeptical, after 17 years of America's failures in places like Afghanistan; Somalia; Iraq; and Libya, on it s"Bomb, Bomb Iran" War Train.

And I find it ironic, in looking at the region, that those who so deeply advocate war against Iran, are those countries in desperate need of regime change themselves.

Let's start with Israel, with its current and its painfully corrupt Prime Minister Netanyahu, who must always keep Israel's citizens in a psychological attitude of fear, and dread, against both the Palestinians, and against all their neighbors, who, it is said, want to kill them all, and create a 2nd holocaust.

Never mind that Israel appears pathologically incapable of getting along with its neighbors, and is always advocating regime change; never mind that it is constantly trying to figure out how to assassinate more Palestinians, and get away with it without the world noticing.

Then, let's shift to Prince Mohammed bin Salman, Saudi Arabia's thoroughly embarrassing 21st century autocratic ruler, and the current Butcher of Yemen, who the United States is assisting militarily in Saudi War Crimes in Yemen.

Let's take a look at what the "good Prince" has caused to happen in Yemen, shall we?!? Warning: graphic images.

Images: Yemeni infants and children being killed, courtesy of Saudi bombing Runs

Starvation and disease (possibly weaponised cholera) are running rampant in Yemen, courtesy of joint US/Saudi bombing of the Yemeni ports, so food cannot get in.

Images:
Yemeni children starving to death, courtesy of US/Saudi port blockades

And please do not forget that Prince Salman, one of President Trump's BFFs in the Middle East, has ordered the use of depleted uranium weapons in Yemen:
Video:
Saudis using depleted uranium weapons in Yemen

And the use of these DU weapons in Yemen, is having the same effect as they had in Iraq, both on Iraqis... and American military professionals, who discovered to their horror, that their children were born, just as maimed and deformed, as were their Iraqi counterparts.

Images: Yemeni children born with massive deformities due to their parents' exposure to DU

So to our very own Merchant of Death in Chief, President Trump, who has authorized the sale of billions of dollars of weapons to Saudi Arabia, and to His Highness, the Butcher of Yemen, AKA Prince bin Salman, , all I have for you both is the polite, reiteration of two profoundly insightful sayings.

The first by the late US President John F. Kennedy, who said: "When peaceful revolution is impossible, violent revolution is inevitable."

And the second, by philosopher George Santayana, observes: ""Those who cannot remember the past are condemned to repeat it.".

Just some food for thought, gentlemen.

Aug 11 00:25

Human Zombies Unaware Of The Real World

One wonders what these Zombies would do if they were in a location without connectivity? (I’ve seen it – it’s not pretty). One wonders what these Zombies would do if the power or internet went out for more than just a few hours!

Aug 10 23:47

Censorship PURGE points to imminent false flag violence before mid-term elections… bigger than 9/11?

The coordinated de-platforming effort is clearly directed by the deep state to eliminate a prominent, dissenting voice in preparation for unleashing a history-shaping false flag attack that’s likely going to be bigger than 9/11.

Aug 10 15:50

Tokyo Olympics Using Facial Recognition For Security

By Aaron Kesel

The technology NeoFace will use IC chips within identification cards to automatically verify the identity of those entering over 40 venues...

Aug 10 09:23

Warning over satellite security bugs

Satellite systems used on aircraft, ships and by the military contain bugs that could let hackers take control of them, a security researcher has warned.

The worst bugs could let attackers overcharge satellite antenna to damage the equipment or harm operators.

And others could be used to betray the exact location of military forces in crisis zones, the researcher said.

IOActive, which found the bugs, said it was working with manufacturers to harden devices against attack.

"The consequences of these vulnerabilities are shocking," said Ruben Santamarta, from IOActive, in a statement explaining some of his findings.

Aug 10 09:20

This rigged charger can hijack your new laptop

A neat feature of many modern laptops is the ability to power them up through the USB port. Unlike the rectangular USB ports of old, the newer type - USB-C - can carry enough power to charge your machine.

That’s great news: it means you don’t need to add a separate port just for charging. And when the USB port isn’t being used for power, it can be used for something useful, like plugging in a hard drive, or your phone.

But while you and I may look at that as an improvement, hackers see an opportunity to exploit a new vulnerability.

One researcher, who goes by the name MG, showed me how a Macbook charger could be booby-trapped. Modified in such a way it was possible to hijack a user's computer, without them having any idea it was happening.

Aug 10 09:04

Tweets from Alex Jones have been DELETED as Twitter confirms it is now 'reviewing' the content, just days after CEO Jack Dorsey said the company would not block the InfoWars host

Controversial radio host Alex Jones has seen tweets and videos removed from his personal Twitter account, as well as posts from the official InfoWars account.

Twitter has confirmed the tweets have been removed – but claims it was not responsible for taking down the posts.

Instead, it suggested the contentious tweets may have been removed by Jones himself or somebody with access to the Infowars account.

However, Twitter confirmed to MailOnline that it is actively 'reviewing' the content included in Alex Jones' personal account, as well as that on InfoWars.

Aug 10 09:03

Cyber criminals are using Facebook Messenger to trick people into opening malicious links that harvest their personal data, FBI officials warn

The scam attempts to trick users into opening a malicious URL that harvests their personal data and login credentials for social networks, like Facebook.

In a bid to coerce people into opening the suspicious URL, cyber criminals pose a question to their targets: 'Hey I saw this video. Isn't this you?'

Although the original warning from the FBI highlighted Facebook Messenger as a particular platform of concern, this has since been amended after the scam was found on other rival platforms.

It's unclear how many people have been hit by the latest scam, or how exactly cyber criminals are generating revenue.

Aug 10 09:01

Facebook web traffic nearly HALVES in just two years, with younger users flocking to rival YouTube instead

Facebook has seen a significant drop in monthly page visits, plummeting 3.8 billion visits from 8.5 billion to 4.7 billion over the last two years.

While the Facebook mobile app's traffic has grown steadily over that period, it has not been by enough to plug the gap, experts say.

Aug 09 15:26

Microsoft threatens to boot the far-right's favorite social network off its cloud over posts that threatened Jews with 'vengeance'

In a statement provided to Business Insider, a Microsoft spokesperson said the company had "received a complaint about specific posts on Gab.ai that advocate 'ritual death by torture' and the 'complete annihilation' of all Jews," and that it had determined the content incited violence, "is not protected by the First Amendment, and violates Microsoft Azure's acceptable use policy."

Multiple users on Gab responded to the news of Microsoft's threat with virulently anti-Semitic messages of their own.

The user behind the two posts in question — which advocate the vandalism of Holocaust memorial museums and discuss in explicit detail a plan for torturing Jews — says he will delete the posts, but as of publication, they remain live on Gab. Microsoft has given Gab 48 hours to take them down.

Aug 09 14:41

Google Employees Protest China Censorship Plans

By Aaron Kesel

Just a few hundred of Google’s massive 88,000 employees were briefed on the project known as “Dragonfly” prior to the revelations, which triggered massive blowback against the company in a move seen as capitulating to the Chinese Communist government and censorship...

Aug 09 11:39

ALTERNATIVE MEDIA PLATFORMS FOR 2018

No-one at 12160 is affiliated to or has been paid / rewarded for promotion of these services - this is simply a list of alternatives if you are sick of the increasing censorship and lock down.

YOU decide if you want to patronize / use these services ...or not.

Moaning and complaining won't change anything.

STOP FEEDING THE BEAST.

GO ELSEWHERE!

Let's make Facebook, Twitter and YouTube OBSOLETE!

REMEMBER THE MORE OF US USE THESE PLATFORMS, THE MORE OTHERS WILL, THE MORE INFO IS SPREAD, THE MORE WE DO - WE WIN

Webmaster's Commentary: 

Bump to the top

Aug 09 10:55

Researchers Developed Artificial Intelligence-Powered Stealthy Malware

To demonstrate this scenario, security researchers at IBM Research came up with DeepLocker—a new breed of "highly targeted and evasive" attack tool powered by AI," which conceals its malicious intent until it reached a specific victim.

According to the IBM researcher, DeepLocker flies under the radar without being detected and "unleashes its malicious action as soon as the AI model identifies the target through indicators like facial recognition, geolocation and voice recognition."

Describing it as the "spray and pray" approach of traditional malware, researchers believe that this kind of stealthy AI-powered malware is particularly dangerous because, like nation-state malware, it could infect millions of systems without being detected.

Aug 09 10:05

Honeytrap: Spies hacked RAF airwoman’s Tinder profile to tease out F-35 jet fighter secrets

An RAF airwoman had her Tinder profile hacked, and spies attempted to match her with colleagues and sweet-talk them into revealing secrets about Britain’s new F-35 Lightning II stealth fighter.

After hacking the airwoman’s profile in July, the spies - posing as the woman - matched her up with colleagues, hoping to find at least one who worked with the F-35. After the spy extracted some trivial details out of a smitten serviceman, the woman noticed her profile had been hacked and informed her bosses immediately, reported the Daily Mail.

The incident set alarm bells ringing within the RAF. While nobody caught in the trap actually worked with the F-35, and no information of consequence was leaked, top brass issued a memo warning RAF personnel to be vigilant for any attempts at social engineering by Britain’s adversaries.

Aug 09 08:50

VIDEO: Expert, “If Trump Doesn’t Bust Up Monopolies, They’ll Bust Him”

Ezra Levant, CEO of Rebel Media, joins Paul Joseph Watson to discuss the escalating net-censorship, and he issues a dire warning to President Trump with Former President Theodore Roosevelt in mind.

Aug 09 08:36

Samsung Galaxy S7 Smartphones Vulnerable To Hacking: Researchers

Samsung’s Galaxy S7 smartphones contain a microchip security flaw, uncovered earlier this year, that has put tens of millions of devices at risk to hackers looking to spy on their users, researchers told Reuters.

The Galaxy S7 and other smartphones made by Samsung Electronics Co Ltd <005930.KS> were previously thought to be immune to a security vulnerability known as Meltdown, which researchers said earlier this year was present in most of the world’s PCs, smartphones and other computing devices.

But researchers from Austria’s Graz Technical University told Reuters they have figured out a way to exploit the Meltdown vulnerability to attack Galaxy S7 handsets.

Samsung said it rolled out security patches to protect Galaxy S7 handsets from Meltdown in January, followed by a further software update in July.

Aug 09 08:16

GOVERNMENT ETHICS WATCHDOGS FEAR AMAZON’S WEB OF INFLUENCE MAY HAVE TAINTED PENTAGON’S $10 BILLION JEDI CLOUD DEAL

A former senior adviser to Secretary of Defense James Mattis was receiving payments from her sale of a consulting firm she founded that worked with Amazon’s cloud computing arm, while the Pentagon simultaneously crafted a $10 billion contract that many say is tilted in favor of the tech giant, a Daily Caller News Foundation investigation has found.

Sally Donnelly’s financial disclosure filings do not clearly state that she was receiving payments from the purchaser of her firm during her stay at the Pentagon, nor did she file a written recusal from involvement with the Department of Defense’s cloud computing contract. Government ethics experts say those factors taint the landmark deal with the specter of impropriety.

“It sounds that she was not fully paid off, which would be a violation of conflicts of interest if she took any official action that affected that business,” government affairs lobbyist Craig Holman of Public Citizen, a liberal watchdog, told TheDCNF.

Aug 09 08:11

YouTube will now place Wikipedia entries about global warming below videos 'refuting evidence of rising temperatures'

YouTube is fighting back against climate change deniers by implementing a fact-checking box below user-uploaded videos on the controversial topic.

The system will surface information from Wikipedia or Britannica Encyclopedia to display factual information in bitesize chunks below videos on climate change.

Aug 09 07:58

Warning over 'panic' hacks on cities

Security flaws have been found in major city infrastructure such as flood defences, radiation detection and traffic monitoring systems.

A team of researchers found 17 vulnerabilities, eight of which it described as "critical".

The researchers warned of so-called "panic attacks", where an attacker could manipulate emergency systems to create chaos in communities.

The specific flaws uncovered by the team have been patched.

“If someone, supervillain or not, were to abuse vulnerabilities like the ones we documented in smart city systems, the effects could range from inconvenient to catastrophic,” wrote Daniel Crowley, from IBM’s cyber research division, X-Force Red.

Aug 08 16:28

WhatsApp users beware! New bug allows hackers to send fake messages pretending to be you – and there's nothing you can do to stop them

A newly-discovered WhatsApp bug allows hackers to infiltrate and message your group chats and private conversations.

If combined with other existing glitches, the vulnerability could allow cyber criminals to impersonate you and send fake messages to your friends and family, security experts have warned.

Researchers who unearthed the bug believe it is of the 'utmost importance' WhatsApp fixes the problem – as it could be used to quickly spread misinformation.

The Facebook-owned company says it is aware of the flaw but has no plans to patch the problem as the exploited vulnerability forms a core part of the app's design.

Aug 08 16:23

Time to clear your browser history? Firefox is testing a new feature that suggests articles based on EVERY website you've ever visited

Dubbed Advance, the feature uses AI to find common themes in the list of websites you've visited and uses these to recommend new articles in a designated sidebar.

For example, if you've recently clicked on a lot of websites, articles and social media posts about football — the bot may recommend a news story about a key transfer.

But those who frequent adult or not-safe-for-work sites may have to be careful, as the technology will publish sites of a similar ilk in the sidebar.

Aug 08 15:49

SMART METERS RAISE HEALTH, PRIVACY AND CONSTITUTIONAL CONCERNS

Smart meters monitor home energy usage in minute detail in real time. The devices transmit data to the utility company where it gets stored in databases. Anybody with access to the data can download it for analysts. Without specific criteria limiting access to the data, these devices create significant privacy issues. Smart meters can also be used to remotely limit power usage during peak hours.

Aug 08 14:55

The Social Media Purge

The state and its cronyist friends have built a world that seeks to silence our perspectives. We must recognize that arguments and content mean nothing if conduits for disseminating them are shut down.

Aug 08 08:32

MINDS - The crypto social network

We are an open source and decentralized platform for Internet freedom. Get paid in crypto for your contributions to the community.

Aug 08 08:30

Blockchain technology that will improve the electrical power industry

What is Lectro?

? Lectro is a revolutionary energy technology services group utilizing blockchain to improve how electricity
providers and consumers conduct business.

? The Lectro project is a major step forward toward creating the modern power grid that’s smarter, safer and
more efficient than ever before.

? Lectro is based in Houston, Texas, USA – the Energy Capital of the World.

? The project is global – Lectro has the potential to impact people all around the world in a positive and
meaningful way.

Aug 08 07:56

Medical Applications Expose Current Limits of AI

IBM has big plans for how its Watson artificial intelligence software could change the medical industry. But a number of hospitals have ended their experiments with the platform, arguing that it doesn't help diagnose or treat diseases.

Aug 08 07:44

New Wi-Fi attack cracks WPA2 passwords with ease

A new way to compromise the WPA/WPA2 security protocols has been accidentally discovered by a researcher investigating the new WPA3 standard.

The attack technique can be used to compromise WPA/WPA2-secured routers and crack Wi-Fi passwords which have Pairwise Master Key Identifiers (PMKID) features enabled.

Security researcher and developer of the Hashcat password cracking tool Jens "Atom" Steube made the discovery and shared the findings on the Hashcat forum earlier this month.

Aug 08 06:14

Delete these Android apps NOW! Google says 150 Play Store downloads have hidden malware designed to infect your computer when you plug in your smartphone

The apps – some of which were downloaded hundreds of times – have now been removed from the Play Store, but could still lurk on the gadgets of unsuspecting users.

The malicious software, also known as malware, does not affect Android devices but could farm your private data if an infected gadget is plugged into a Windows PC.

Once inside a computer, the virus can track keystrokes, revealing credit card numbers, account passwords and even social security numbers.

Aug 07 23:43

Twitter Suspends Libertarian Accounts, Including Ron Paul Institute Director

One day after what appeared to be a coordinated attack by media giants Facebook, Apple, Spotify and Google on Alex Jones, whose various social media accounts were banned or suspended in a matter of hours, the crackdown against alternative media figures continued as several Libertarian figures, including the Ron Paul Institute director, found their Twitter accounts suspended.

Aug 07 23:36

Now That Facebook, YouTube And Apple Have Come For Alex Jones, They Will Start Coming After The Rest Of Us

We were supposed to understand that if they can do this to Alex Jones, they can do it to any of us, and so we better shut up and fall in line. I can’t even begin to tell you how sick I feel right now. The big tech giants have made it abundantly clear how they feel about all of us, and there is no future for alternative points of view on any of their platforms.

Aug 07 18:18

Banned by YouTube and Facebook, InfoWars videos are now available on REAL.video

Since yesterday’s coordinated purge of Alex Jones / InfoWars content off all the major tech platforms, REAL.video has been inundated with requests for Infowars videos.

Perhaps anticipating the coming purge, InfoWars began uploading videos to REAL.video 10 days ago, and their official channel is:

REAL.video/channel/infowarsnetwork

Aug 07 15:52

The InfoWars app is now ranked fourth for “news” in Apple’s App Store

But InfoWars, whose reach has been severely limited by these moves, still has a prominent platform with Apple: the InfoWars app is today (Aug. 7) ranked fourth among all free news apps on the company’s App Store. On Monday (Aug. 6), it was ranked 37th.

This doesn’t mean it’s the fourth-most downloaded news app, since the App Store’s algorithm takes other factors into account, but it does give InfoWars a significant boost. Visibility is key to success on the App store—the higher the app is ranked, the more people get to see it.

Aug 07 15:46

The hypocrisy of the Alex Jones purge shows Facebook is morally spineless

When Facebook removed the page of Alex Jones, InfoWars host and king of conspiracy theories, it violated a value it called "fundamental" less than one month ago — and it perfectly illustrates how the tech titan has no backbone or moral leadership.

"We believe banning these Pages would be contrary to the basic principles of free speech," Facebook said when asked by CNN's Oliver Darcy why Infowars still had a presence on the site after it stated it would clamp down on fake news in mid-July.

"I think part of the fundamental thing here is that we created Facebook to be a place where different people can have a voice. And different publishers have very different points of view," John Hegeman, the head of Facebook's News Feed told Darcy at the time.

In removing Jones yesterday, Facebook betrayed its "fundamental" belief that "different people can have a voice" that express "very different points of view."

Aug 07 12:26

Eerie Censorship Precedent: Big Tech Proves Alex Jones’ Motto Correct - Mac Slavo

The banning of Alex Jones’ YouTube channel has just set a dangerous precedent for free speech. Big tech has just proven they are no friend of free speech, by censoring those with whom they disagree while simultaneously proving Jones correct.

Jones had a large following on YouTube, about 2.5 subscribers. The owner and creator of InfoWars has often been derided by establishment media as a conspiracy theorist. Yet on Monday, Apple, Spotify, YouTube, and Facebook has actually proven the motto of his show correct: “There’s a war on for your mind!” By blocking or deleting InfoWars accounts from their platforms, saying he allegedly engaged in “hate speech” and violated their “community standards,” they’ve proven that they prefer the government approved official narrative to free thinking and free will.

Apparently, people don’t get to decide what information they are exposed to, Big Tech will do it for us.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA