Jan 23 09:44

The smoking gun?

Special Access Programs (SAP) is a game changer. It is now undeniably clear that the results of the FBI investigation will be the end of one of two things: Hillary’s bid for the White House or the legitimacy of the FBI—at least when it comes to prosecuting cases on the mishandling of classified material.

Jan 23 09:37

Not-guilty ruling sets up framework for Twitter cases

Friday’s verdict in the trial of Gregory Alan Elliott — not guilty on all counts — was widely discussed by legal experts and the divided supporters of the accused and the complainants in the case. Many took to the Internet to spout rancour or gloat about the ruling, possibly inflaming the pitched debates of gender politics that were at the core of the harassment trial to begin with.

Webmaster's Commentary: 

Freedom of speech means everyone gets to say what is on their mind. Freedom of speech means that some of what you hear you may not like, but the appropriate response is to offer a counter argument in open debate. Those people using legal and harassment tactics think the Twitterverse (or Facebook, or Myspace, or whatever) should be constrained to their own unique point of view and alternative views banned. And that is NOT Freedom of Speech!

Jan 22 16:58

DARPA Launches New Program to Connect Brains to Computers with Implantable Chip

By Nicholas West

The U.S. BRAIN Initiative and its European counterpart, the Human Brain Project, are not spending multi-billions of dollars on neuroscience research simply to help people with Post Traumatic Stress Disorder and organic brain dysfunction. It is, perhaps first and foremost, a military endeavor that has wide ramifications if even 1/10th of what is being studied comes to fruition...

Jan 22 16:19

‘Save us Bill Gates!’ Satirical video game slams billionaire’s philanthropy

Anti-poverty campaigners have launched an online video game satirizing Bill Gates' global philanthropy and featuring a pixelated version of the billionaire flying across stereotypical African landscape.

‘Save us Bill Gates’ was released on Friday by UK campaign group Global Justice Now in a bid to highlight the business magnate’s role in international development.

Jan 22 15:45

State tries to delay Clinton email release, blaming snowstorm

The State Department on Friday sought to delay its final release of emails from Hillary Clinton’s personal server, blaming a massive snowstorm hitting Washington as well as an internal “oversight.”

In a court filing, the department asked a federal court to delay by a month the Jan. 29 deadline for it to release the last batch of roughly 55,000 pages of Clinton’s emails believed to be work-related.

Jan 22 14:06

Robert Gates, 'Odds are pretty high' that Russia, China and Iran have compromised Hillary's server

Jan 22 13:48


The question stems from an exclusive Infowars interview earlier this month in which former Secret Service agent Dan Bongino reported that Clinton continued using her private email to discuss classified information despite knowing her server had been compromised.

“A source fed to me… and by the way Alex, an unimpeachable source by any measure… This is an unimpeachable source who said, ‘Not only was the email server hacked,’ which is breaking news… but not only was it hacked Alex, but the Clintons knew it was hacked and they kept using it,” he said.

Jan 22 10:40

What is open source software?

Open source software is software whose source code is available for modification or enhancement by anyone.

"Source code" is the part of software that most computer users don't ever see; it's the code computer programmers can manipulate to change how a piece of software—a "program" or "application"—works. Programmers who have access to a computer program's source code can improve that program by adding features to it or fixing parts that don't always work correctly.

Webmaster's Commentary: 

Recent changes in policy by corporate software vendors is boosting interest in open source software development. I was talking with an IT guy just yesterday whose clients are enraged because the vendors they bought software from (and are now dependent on) are moving to month-to-month subscriptions at elevated prices. One wonders what happened to the laws we have in this nation against monopolies, but that is a matter for another article.

The problem is there are no controls on the subscription prices, which means no matter how hard these clients work, most of the profits are now going to the software companies, who because of the month-to-month payment plan, have no real incentive to improve their products, as they have no need to worry about future sales. As a result, America is starting to lose its competitive edge against other countries, where future sales are dependent on coming up with better products.

I have already commented on the long-term effects of refusing to sell perpetual licenses to software as a single slump in business can shut an entire company's computer systems and productivity down completely. Having dusted off my programming skills during the NSA code challenge I find myself writing more and more of my own utilities rather than go through the hassle of licensing from a corporate vendor, and I suggest that it may be time for a programming renaissance among young people, going back to the early days of computers when we wrote most of the software we used. No, it won't have all the whiz-bang of a corporate product, but be honest, have you ever actually used all the bells and whistles in corporate software products, or just the core function? After my experience with Windows 10 (and I did give it a fair test) my next computer will be a Linux open source box. It is really all I need to keep doing what I do now. Yes, I still love to play with my animation software (at least the one that would actually install properly) but I can live without it.

Ancient Rome was built on the development of new technologies, but then as now technology must be maintained. When Rome could no longer keep the roads and aquaducts in working order, Rome started to fall. The same thing is starting to happen with our computers. Even today we are left to find the problems for ourselves and customer service from the software giants has become an industry joke.

Jan 22 09:48

Cashless Society War Intensifies During Global Epocalypse

By David Haggith

In the fall of 2015, the world descended into an economic apocalypse that will transform the globe into a single cashless society. This bold prediction is based on trends in nations all over the earth as shown in this article.

As we enter 2016, we are only beginning to see this Epocalypse form through the fog of war. The war I’m talking about is the world war waged furiously by central banks against the Great Recession as the governments they supposedly serve fiddled while their "capital" burned...

Jan 22 09:41

Six senators accidentally just admitted they are clueless about internet speeds

Congress has struggled to understand the internet for a long time, and a group of six US senators joined a chorus of ignorance today when they submitted a letter to the FCC criticizing it for changing the definition of high-speed internet, The Hill first reported. Last January, the FCC made an obvious and reasonable decision to raise minimum download and upload speeds for "broadband internet" from a measly 4Mbps/1Mbps to 25Mbps/3Mbps.

Jan 22 07:57

Boston Brakes? How to Hack a New Car With Your iPhone or Android

According to crafty insurance moguls, their revolutionary ‘smart’ plug-in device connects to your car’s computer port which is normally located just beneath the steering wheel. They claim that it only records drivers when they accelerate, brake and steer. They claim that this data will reveal how erratic a driver you are, which in turn will determine your road risk actuary – and how much you will have to pay for auto insurance.

Most ‘smart’ people realize that this smart device will not save you money, as much as it will give insurance companies like Progressive an easy metric by which to raise your rates, not lower them.

If that isn’t bad enough, now cyber researchers in America have shown how hackers can send a simple text message to manipulate your car’s functions – even disable your car’s brakes.

Jan 22 07:47

Catherine Herridge: "The @FBI was able to recover [Clinton's] deleted emails ... [wipe] was not what I would call a professional standard."

Jan 22 07:47

Clinton’s Emails: A Criminal Charge Is Justified

When asked whether she had her server “wiped,” she assumed an air of grandmotherly befuddlement: “What, like with a cloth or something?” she said. “I don’t know how it works digitally at all.”

The current news, reported in the Journal and elsewhere, is that her server contained information at the highest level of classification, known as SAP, or Special Access Program. This is a level so high that even the inspector general for the intelligence community who reported the discovery did not initially have clearance to examine it.

The server also contained messages showing her contempt for classification procedures. This was bred at least in part by obvious familiarity with exactly “how it works”—such as when, an email shows, she directed a staff member simply to erase the heading on a classified document, converting it into “unpaper,” and send it on a “nonsecure” device.

Webmaster's Commentary: 

UPDATE: For some reason the Wall Street Journal has moved this article behind their subscriber wall, right after I asked if Hillary was selling US secrets using her email server and collecting/laundering the payments through her "charitable" foundation.

Jan 21 19:28

China Wants to Issue Its Own Digital Currency

China’s central bank plans to issue its own digital currency “as soon as possible,” according to Xinhua. The People’s Bank of China made the announcement at a conference on digital currency in Beijing.

Jan 21 18:24

DARPA Aims For Brain Implants to Control Machines

An implantable neural chip being developed under a newly-announced program by the US Defense Advanced Research Projects Agency, which will allow humans to directly communicate with computers and control them with just their mind. Besides the obvious military application, the device will open new possibilities for the treatment of different neural disorders, as well as potentially improving the lives of disabled people who are paralyzed, deaf or blind, DARPA claimed in a press-release.

Jan 21 18:19

NSA Director Finally Admits Encryption Is Needed to Protect Public’s Privacy

By Carey Wedler

Encryption, a security measure that makes data impossible to read without a secure code or password, has become an increasingly contentious subject for government agencies and private companies. While the likes of Apple, Android, and other technology companies maintain it is vital, the federal government has forcefully resisted. On Thursday, however, NSA Director Mike Rogers expressed his support for the security feature, drawing a clear line in the sand between federal intelligence and law enforcement...

Jan 21 18:03


I hope the FBI is checking into the reason WHY Hillary had highly sensitive information on her private, non-government server that was HIDDEN FROM CONGRESS AND POSSIBLE OVERSIGHT BY OTHER GOV'T AGENCIES.

Did Zero order her to do this as part of some treasonous plot to forward our national security information to hostile countries such as Iran?

Did Hillary SELL access to her private server to the highest bidders by giving them passwords to her email accounts where classified information was located?

Although Hillary was Secretary of State, did she have 'need to know' for each of the various Top Secret/SAP programs data found on her server? If not, for what reason did she possess such information?

Was Hillary 'cleared' for each program which she possessed information for on her server?

Was there any classified information on her server which there was no compelling need for her to have?

Webmaster's Commentary: 

Starting to go viral!

Jan 21 17:45

Chief Israeli rabbi calls for executing Palestinians

We must not allow a Palestinian to survive after he was arrested. If you leave him alive, he will be released and kill other people,” Eliyahu said, “we must eradicate this evil from within our midst.”

Jan 21 16:19

UK’s War Submarines Running Windows XP-Based OS Called “Windows for Submarines”

A Windows XP-based operating system called “Windows for Submarines” is said to be powering these submarines because “it was cheaper than the alternatives,” although the same article acknowledges that everyone involved in this actually admitted that there are indeed some security risks associated with using an unsupported platform.

Basically, the biggest threat is experienced when submarines are called to ports to get software updates, as unpatched vulnerabilities in the operating system could be used by cybercriminals to break into their systems.

The Ministry of Defense isn’t worried that hackers could exploit vulnerabilities found in the unpatched operating system, and in a statement, officials explain they pay particular attention to keeping submarines protected against this kind of threats.

Jan 21 16:15

?You're Going to Need an Ad Blocker for Your Next TV

Smart TVs are evidently so smart they can tell what’s playing on the screen and show you pop-up ads based on what you watch. So discovered security researcher Paul McMillan this week while watching Inglorious Basterds on his Samsung smart TV: one minute into the movie, an Army recruitment ad popped up on the screen.

This is my Samsung SmartTV with a US Army pop-up ad on top of Inglorious Basterds streamed from Netflix on my FireTV
— Paul McMillan (@PaulM) January 19, 2016

Now, pop-up ads on Samsung and other smart TVs have been discovered before. But the weird thing here is that the TV can seemingly recognize any input you play through it, and add ads on top. What’s more, the ads may be targeted based on content recognition, a sort of built-in Shazam for ads.

Jan 21 15:59

GCHQ spies quashed this phone encryption because it was too good against snoopers

The researcher who discovered that the UK government's phone encryption standard has a huge backdoor installed has made another discovery: GCHQ's rejection of a better encryption standard because it didn't allow for undetectable spying.

Jan 21 15:57

AMX backdoors US govt's comms system with Batman-inspired surveillance mode

AMX, which supplies communications kit for the White House, US military, and several of the largest corporations, built a superhero-themed surveillance backdoor into its products.

An analysis of the AMX NX-1200 communications controller by researchers at SEC Consult showed the device had a "setUpSubtleUserAccount" function.

It turns out this does exactly what it says – it sets up a hidden account with special abilities not even given to an administrator, such as packet-capture and sniffing, as well as access to the network interface. This powerful, all-seeing account can be accessed via the device's built-in web interface or via SSH using a hardcoded password.

That's a major issue, particularly because the US President has been seen using AMX equipment to talk to his military advisors.

Jan 21 14:45

FBI ran website sharing thousands of child porn images

For nearly two weeks last year, the FBI operated what it described as one of the Internet’s largest child pornography websites, allowing users to download thousands of illicit images and videos from a government site in the Washington suburbs.

The operation — whose details remain largely secret — was at least the third time in recent years that FBI agents took control of a child pornography site but left it online in an attempt to catch users who officials said would otherwise remain hidden behind an encrypted and anonymous computer network. In each case, the FBI infected the sites with software that punctured that security, allowing agents to identify hundreds of users.

Webmaster's Commentary: 

Sooooo ... the FBI is guilty of trafficking in child porn? ARREST THE BASTARDS!!!!!

Jan 21 10:31

Now California state wants to ban sale of encrypted smartphones

California: home of the world's biggest technology companies, terrible bagels, and the only place that can suffer both drought and floods at the same time.

Despite the state's deep tech roots, California's legislature is considering banning devices that come with unbreakable encryption.

California assembly member Jim Cooper (D-9th) introduced the legislation -- bill 1681 -- which requires any smartphone manufactured "on or after January 1, 2017, and sold in California after that date" to be "capable of being decrypted and unlocked by its manufacturer or its operating system provider."

Any smartphone that couldn't be decrypted on-demand would subject a seller to a $2,500 fine.

Jan 21 09:45

Why you should not develop apps for Windows 10

Since Windows 10 arrived, the sales of all of my apps, which have been very low compared to other apps stores, have gone down significantly, nearly to zero (even the one I upgraded to Windows 10).

Jan 21 09:09

Millions Unfriend Facebook

Facebook is not good at math. The forum is notorious for including lapsed subscribers when head counting. The network claims over one billion subscribers but these are not necessarily one billion users; those using the forum are likely a fraction of this figure.

Facebook is notorious for abruptly disabling accounts or imposing user bans for silly things like subscribers posting images of lightly clad ladies. The social forum was recently ridiculed for refusing to allow an image of the celebrated Little Mermaid figurine situated at Copenhagen’s harbour. Reason, the figurine’s nipples could be seen. Bizarrely, FB defended a user’s posting a video of him burning to death a tethered puppy.

Dual passport holder, Israeli-American Mark Zuckerberg, whilst cracking down on pro-ethnic European posts, offers free internet access to millions of illegal immigrants.

Webmaster's Commentary: 

Once again, we see Israeli support for the masses of refugees pouring into Europe!

Jan 21 08:50

More money for the rich, fewer jobs for everyone else: The price of the coming AI revolution

Financial analysts forecast AI and automation will drive "greater income inequality" and lower wages for low and middle-skilled workers.

Webmaster's Commentary: 

There is an obvious flaw in that concept.

Robots don't buy products! They don;t drive cars because they never go home. They don;t buy food, or big-screen TV sets, or even clothes!

No sales, no money.

Jan 21 08:47

Is Hillary Clinton Above The Law Now?

Jan 20 16:48

Teen hackers strike again: White House official becomes latest high-ranking victim

The president’s senior adviser on science and technology is the latest high-ranking government casualty of a group of teenage hackers with a pro-Palestine agenda. He joins the head of the CIA and the director of national intelligence as a hacking victim.

Jan 20 16:17

Hospital’s Windows XP Computers Cause Chaos After Getting Infected with Virus

Windows XP support came to an end in April 2014, but despite the numerous warnings issued by Microsoft, there still are a lot of companies that are yet to upgrade their computers.

The Royal Melbourne Hospital is one of them, and the network’s administrators found on their own how dangerous it is to run unsupported software when all Windows XP computers got infected with malware last week.

The virus first hit the hospital’s pathology department, so the staff had to manually perform a number of operations that were previously conducted automatically by Windows XP machines, including blood and tissue processing.

Furthermore, nurses and the food service worked together to make sure that each patient receives the proper meals, as computers that stored patient information were also infected.

Jan 20 16:07

Nest Thermostat Leaked Zip Codes Over the Internet

Nest may be the poster child for the so-called Internet of Things, but as it turns out, even one of the most popular connected devices—owned by Google’s parent company Alphabet, no less—isn't free from the sorts of security flaws plaguing other smart devices.

Researchers at Princeton University have found that, until recently, Alphabet’s popular Nest thermostat was leaking the zip codes of its users over the internet. This data was transmitted unencrypted, or in the clear, meaning that anyone sniffing traffic could have intercepted it, according to the researchers.

The researchers also studied several other smart devices, including the Sharx security camera, a PixStar smart photoframe, and Samsung’s SmartThings Hub.

Jan 20 16:05

Nielsen Wants to Watch You Talk to Your Facebook Friends About What You Watch on TV

ielsen is going to start tracking discussions that people have about TV on Facebook with their family and friends, even if that discussion isn’t marked as “public.” Nielsen still won’t be able to peer into Facebook messages you send directly to your friends, but it will see if you post a message on someone’s feed declaring your love for “The Real Housewives of Atlanta” or “Jessica Jones.”

Nielsen says it will create new social TV ratings that incorporate Facebook data later this year, and will rename its Twitter TV Ratings “Social Content Ratings” when that happens. Eventually, it says, it will also incorporate conversation from Instagram.

Jan 20 15:24

Who is hunting Angela Merkel?

The premeditated operation of New Year’s rapes, in Cologne and elsewhere, continues with a denunciation of the responsibility of the Federal Chancellor, Angela Merkel. A study of computer traffic certify that the Twitter accounts organizing this protest are based on the West Coast of the United States.

Jan 20 12:47

IRS Erases Hard Drive Despite Court Order

This is not the first time the agency has failed to preserve key information. The IRS also “accidentally” destroyed the hard drive belonging to Lois Lerner during investigations into the targeting of conservative groups. As many as 24,000 emails were lost forever when 422 backup tapes were wiped clean despite an agency-wide preservation order and congressional subpoena.

In the Lerner case, the IRS failed to take simple steps to ensure compliance with the order, according to a report by the House Oversight Committee.

Now, it appears that important information has once again disappeared because of IRS corruption, incompetence, or both.

Jan 20 11:15

MSNBC: Clinton Creating Conspiracy Theories to Explain Away Her Email Scandal

Webmaster's Commentary: 

The return of the "Vast Right-Wing Conspiracy!"

For our younger readers, the term "Vast Right-Wing Conspiracy" was used by then First Lady Hillary Clinton in 1998 as a catch-all dismissal of the scandals surrounding herself and President Bill Clinton, including Vince Foster, Monica Lewinsky, China-gate, travel-gate, Whitewater, etc.

The term quickly became an object of ridicule, satire, and abuse.

If Hillary is trying to resurrect this tactic, it signals that her campaign is in real trouble and she is panicking.

Hillary needs to be in the Big House, not the White House, and I still want to know if Hillary was using her weak private email server to sell US government secrets and collecting/laundering the payments through her "charitable" foundation!

Jan 20 10:45

Fake Mobile Phone Surveillance Towers Discovered across London

By Michaela Whitton

An investigation has uncovered at least 20 rogue telephone masts operating in London. The IMSI catchers — also known as Stingrays or cell-site simulators — mimic mobile phone masts and trick phones into logging on and giving access to the owners’ calls and data...

Jan 20 09:30

For fsck's SAKKE: GCHQ-built phone voice encryption has massive backdoor – researcher

The UK government's official voice encryption protocol, around which it is hoping to build an ecosystem of products, has a massive backdoor that would enable the security services to intercept and listen to all past and present calls, a researcher has discovered.

Dr Steven Murdoch of University College London has posted an extensive blog post digging into the MIKEY-SAKKE spec in which he concludes that it has been specifically designed to "allow undetectable and unauditable mass surveillance."

He notes that in the "vast majority of cases" the protocol would be "actively harmful for security."

Jan 20 09:15

Trojan-filled Chrome extensions for Steam boil off gamers' assets

Miscreants are slinging fraudulent Chrome extension trojans at gamers that, if installed, will empty victims’ Steam inventory.

Security researcher Bart Blaze warned that supposedly "helpful" Chrome extensions for Counter-Strike: Global Offensive (CS:GO) are actually scamware.

“Instead of being able to change your CS:GO Double theme, your items from your inventory are getting stolen; instead of trading with X or Y person you trust, the items go to the scammer rather than whoever you're trading with,” Blaze warned in a blog post on Tuesday.

The rogue extensions pose as “CS:GO Double Withdraw Helper”, “Csgodouble AutoGambling Bot” among other browser add-on themes.

Jan 20 08:47

How to see what government agency is spying on your phone

Jan 20 08:33

German high court rules Facebook "Friend Finder" is unlawful, calling the contact-scraping tool a deceptive marketing practice

Germany's highest court has declared unlawful a feature that encourages Facebook users to market the social media network to their contacts, confirming the rulings of two lower courts.

Jan 19 15:18

New 3D Printing Tech Lowers Cost of Producing Items at Home

By Kevin Samson

The marvel of 3D printing is still in its infancy, especially in regards to being understood by the masses. Its many applications, however, are already beginning to transform the medical and manufacturing fields – not to mention 3D-printed weapons – ushering in low-cost methods of production as well as increasing the diversity of products that can be designed.

But for 3D printing to transform the lives of everyday individuals, the cost of high-quality 3D printers that can produce useful items still needs to drop dramatically. While this has steadily been happening, the cost is still greatly prohibitive for most people.

A new technique is being studied at the University of Bristol, UK that takes us one step closer to producing useful items right from our homes while making a quantum leap in providing low-cost access to many more people...

Jan 19 12:16


Let us start with an historical fact. Treason and betrayal by the highest levels is a common feature of history, whether it is Judas vs Jesus, Brutus vs Julius Caesar, Benedict Arnold, the Rosenbergs, Jonathan Pollard, Aldrich Ames, Robert Hanssen. It is just a fact of life. It does happen.

Webmaster's Commentary: 

Time for a repost in light of today's revelation that documents classified above "Top Secret" were on Hillary's private email server!

This question of spying by the former Secretary of State using her email server to deliver and her "charitable" foundation to collect and launder payments must be asked, and demands an answer!

Please copy this article and forward it to all your connections.

Optional Banner: 
WRH Exclusive
Jan 19 12:04

Inspector General: Clinton emails had intel from most secretive, classified programs

Hillary Clinton's emails on her unsecured, homebrew server contained intelligence from the U.S. government's most secretive and highly classified programs, according to an unclassified letter from a top inspector general to senior lawmakers.

Fox News exclusively obtained the text of the unclassified letter, sent Jan. 14 from Intelligence Community Inspector General I. Charles McCullough III. It laid out the findings of a recent comprehensive review by intelligence agencies that identified "several dozen" additional classified emails -- including specific intelligence known as "special access programs" (SAP).

Webmaster's Commentary: 

Click for larger image

Feel free to copy and use!

Jan 19 11:44

Hyatt Hotel guests should be on credit card high alert

ROADSIDE BEDROOM FACILITATOR the Hyatt Hotel chain has released a whack of detail about a hack on the firm last year and warned that customers may have details that are lost in the wild.

The hack was reported by internet equaliser Brian Krebs in December. Hyatt provided a statement at the time, but Krebbs suggested that it was light on detail.

Jan 19 10:08


Auto manufacturers are working with a company called Eyelock to put Myris‘ iris scanners in new cars. Click here to view the Myris Eyelock video. According to, Eyelock’s iris authentication process takes less than five seconds to complete.

Webmaster addition: And if my eyes are bloodshot?????

Anyway, I can turn a key in less than half a second... unless it's a GM car, of course!

Jan 19 09:13

Shop online at Asda? Website vuln created account hijack risk

Walmart-owned store patches hole, but it was open for nearly 2 years

Jan 18 16:07

BUSTED: New York cop who posted horrifying, violent ‘filth’ on social media under investigation

An NYPD cop, who markets pro-police schwag to his fellow cops in his off time, is becoming internet infamous after he allegedly posted a ridiculously fascist and tyrannical shirt photo that praised the arresting of protestors and the money made while doing so.

Jan 18 14:11

World Economic Forum: Robots Will Eliminate 5 Million Jobs By 2020

By Joseph Jankowski

According to research by the World Economic Forum over five million jobs will be lost due to developments in genetics, artificial intelligence, robotics and other technological changes.

WEF founder Klaus Schwab and managing board member Richard Samans wrote in the newly released report titled “The Future of Jobs” that an estimated 7 million jobs will be lost with just 2 million gained as a result of technological change in 15 major developed and emerging economies...

Jan 18 13:51

Cars can be hacked by their tiny, plug-in insurance discount trackers

The latest way to remotely hack a car? By tapping into one of those plug-in tracking devices from insurance companies.

In some cases, hackers can send a text message -- and disable a car's brakes, according to research presented by computer security experts on Monday.

Jan 18 12:03

Skylake users given 18 months to upgrade to Windows 10

If you own a system with an Intel 6th generation Core processor—more memorably known as Skylake—and run Windows 7 or Windows 8.1, you'll have to think about upgrading to Windows 10 within the next 18 months. Microsoft announced today that after July 17, 2017, only the "most critical" security fixes will be released for those platforms and those fixes will only be made available if they don't "risk the reliability or compatibility" of Windows 7 and 8.1 on other (non-Skylake) systems.

Jan 18 10:29


Over five million jobs will be lost by 2020 as a result of developments in genetics, artificial intelligence, robotics and other technological change, according to World Economic Forum research. About 7 million jobs will be lost and 2 million gained as a result of technological change in 15 major developed and emerging economies, WEF founder Klaus Schwab and managing board member Richard Samans said in "The Future of Jobs." The findings are taken from a survey of 15 economies covering about 1.9 billion workers, or about 65 percent of the world’s total workforce.

Jan 18 08:38

Paul Vernon, Cryptsy’s CEO, Seems To Have Flown To China

Bitcoin News Channel has just managed to dig up exclusive news regarding Cryptsy, the cryptocurrency exchange whose customers are currently unable to withdraw their coins out of its platform. Paul Vernon, the CEO of Cryptsy, seems to have just flown to Liaoning, China, according to an IP and geolocation report that has just been sent to Bitcoin News Channel BNC an hour ago.

Jan 18 07:44

Apple's anti-malware Gatekeeper still useless: Security bloke reveals lingering holes

Apple has flubbed attempts to patch flaws in OS X's anti-malware system Gatekeeper, leaving the defenses still easy to bypass.

Patrick Wardle, a former NSA staffer who now heads up research at crowdsourced security intelligence firm Synack, found a way to circumvent Gatekeeper last year. Gatekeeper is supposed to block dodgy apps from running, but it turns out it's easy for malicious programs to sidestep.

Apple patched Gatekeeper in November in response to Wardle's findings. However, subsequent work by the researcher ahead of this weekend's ShmooCon conference – an "East Coast hacker convention" – revealed the patch is “incredibly weak.” The update was “easy to bypass” in minutes, Wardle told El Reg.

Jan 18 07:39

Microsoft herds biz users to Windows 10 by denying support for Win 7 and 8 on new CPUs

In a stunning example of consensus-building, Microsoft has somehow persuaded the big names of silicon that it would be better for all concerned if they quietly euthanize Windows 7 and 8.1.

Accordingly, Redmond, Intel, Qualcomm and AMD have occupied the same room without injury long enough to promise that future products like Kaby Lake (Intel), 8996 (Qualcomm) and Bristol Ridge (AMD) will not be sullied with Windows 7 or 8.1 code.

Jan 18 05:47

Microsoft’s new PR idiocy: New PC can only use Windows 10 (not 7 nor 8.1)

Microsoft made this ridiculous “clarification” to the Windows support policy. With notice, older versions of Windows lose support on the latest PC hardware.

Yep, that's right: Now you can't downgrade to Windows 7 or 8.1 on Skylake CPUs (or later). There's a woolly, limited get-out-of-jail-free card for a short while, but this is just the latest ludicrous Microsoft scheme to get you onto Windows 10.

Jan 17 17:07

Paleomar Project

Select one of the times from the list on the left and check out what the Earth's climate was like millions of years ago.
Or view an animation that shows how the Earth's climatic belts have changed through time. View Climate Animation
We can determine the past climate of the Earth by mapping the distribution of ancient coals, desert deposits, tropical soils, salt deposits, glacial material, as well as the distribution of plants and animals that are sensitive to climate, such as alligators, palm trees & mangrove swamps.

More Info on how we determined the ancient climate.

During the last 2 billion years the Earth's climate has alternated between a frigid "Ice House", like today's world, and a steaming "Hot House", like the world of the dinosaurs.

This chart shows how global climate has changed through time.

Jan 17 08:17

DHS and the Supreme Court collude to hide secret plan to shut off cell phone communication in American cities

The Department of Homeland Security’s plan to shut off cell phone service across large swaths of the country in the event of a major disaster or civil emergency will remain secret after the Supreme Court “set aside”

Jan 17 04:27

Benefits Of Using Linux

If your sick of being pushed around by Micro$oft then there is a solution(and its free).
Xubuntu Desktop with Debian linux is a good choice because its stable, lightweight and can be fully customised.
Download and make a bootable USB drive with Rufus
How to install Xubuntu to dual boot with Windows 7,8,10
Recommendations for the software centre:
Office:- LibreOffice Suite fully featured and can work with MSoffice Docs.
Media:- VLC-media player, Flowblade-video editor,Blender-3d modelling, Audacity-audio editor, Gimp-graphics, Cheese-webcam recording, SimpleScreenRecorder recording screen.
Internet:-Firefox browser, ThunderBird Mail, Filezilla-FTP, Atom for coding, Google Earth, Skype.

Jan 16 08:50

Mossad proxy faked violent Facebook anti-Semitism

An Israeli legal group with intimate ties to the state’s intelligence agencies has admitted to faking an ostensibly pro-Palestinian Facebook page and using it to post anti-Semitic statements including “Death to all the Jews.”

Jan 15 15:12

Evil OpenSSH servers can steal your private login keys to other systems – patch now

Malicious OpenSSH servers can silently steal people's private SSH keys as they try to login, it emerged today.

This means criminals who compromise one server can secretly grab keys needed to log into other systems from a user's computer – allowing crooks to jump from server to server.

The security cockup, present in the default configuration of OpenSSH, has been patched today, and all users and administrators are urged to update as soon as possible.

Jan 15 14:13

White House wants to ‘edit’ Daesh propaganda

Since our providers and tech makers in Silicon Valley are already deep in bed with the NSA to help spy on us, it should be little surprise that the White House now wants them to climb on board another Bill of Rights busting train and help “disrupt” ISIS online by editing the Internet.

Jan 15 11:51

Government pressurizing tech firms to join big brother state

The pressure on social media companies to limit or take down content in the name of national security has never been greater. Resolving any ambiguity about how much the Obama administration values the companies’ cooperation, the White House on Friday dispatched the highest echelon of its national security team.

Jan 15 09:48

Drone Laws to Require Owners To Buy Insurance, Get License Plates – Constant GPS Tracking

By John Vibes

Assemblyman Mike Gatto Southern of California lawmaker introduced legislation this week that would require owners of drones to get insurance and license plates, similar to the requirements for motor vehicles. The bill is called the Drone Registration/Omnibus Negligence-prevention Enactment (DRONE) Act of 2016 and would tighten the restrictions on personal drones even further than they have been already...

Jan 15 09:25

Clapper hacked: US Intelligence director’s personal e-mail and phone breached

The same entity that claims to be behind a recent hack of CIA Director John Brennan's personal email now claims to be behind a breach of the accounts of Director of National Intelligence James Clapper. The Office of the Director of National Intelligence confirmed to Motherboard that Clapper had been targeted, and that the case has been forwarded to law enforcement.

Jan 15 08:42

Android banking malware SlemBunk is part of a well-organized campaign

An Android Trojan that targets mobile banking users has evolved into a sophisticated, persistent and hard-to-detect threat, suggesting that it is part of a well-organized attack campaign.

Researchers from security firm FireEye first documented the Trojan in December and named it SlemBunk. Once installed, it starts monitoring the processes running on the device and when it detects that a mobile banking app is launched, it displays a fake user interface on top of it to trick users into inputting their credentials.

The Trojan can spoof the user interfaces of apps from at least 31 banks from across the world and two mobile payment service providers.

Jan 15 08:41

Want to save money by buying your own modem? Comcast will attack you with unstoppable pop-ups

Comcast has done plenty of things to frustrate subscribers over the years. In fact, some of the company’s recent moves are bad for all of us, not just for its own subscribers. The latest customer complaint making the rounds might be one of the most frustrating ones we’ve seen though, namely because it will likely only impact the savviest of Comcast’s Internet users, and it appears to be completely impossible to prevent.

That’s right, Comcast customers, get ready for an unstoppable wave of spam-like pop-ups in your web browser courtesy of your favorite Internet service provider.

Jan 15 08:00

Hyatt says hackers took card data from 250 of its hotels

The infection, which harvested data between July 13 and December 8 of last year, collected customer credit card numbers, names, expiration dates and verification codes.

Jan 14 16:51

Activist Forces Chicago Police to Disclose Details on Stingray Cellphone Surveillance

By Derrick Broze

In a rare victory against the secrecy that often shrouds state surveillance, a Cook County, Illinois judge has ordered the Chicago Police Department to allow her to review documents related to cellphone surveillance tools, which are sometimes known as “Stingrays.”...

Jan 14 16:36

Cisco fixes hard-coded password 'backdoor' flaw in Wi-Fi access points

Two of the vulnerabilities were considered 'critical," allowing an attacker to take complete over an affected device.

Jan 14 16:32

The US Government Has An Internet Killswitch - And It's None Of Your Business

On Monday the Supreme Court declined to hear a petition from the Electronic Privacy Information Center (EPIC) that sought to force the Department of Homeland Security to release details of a secret “killswitch” protocol to shut down cellphone and internet service during emergencies.

Jan 14 16:19

Yahoo dumps 13.5TB of users' news interaction data for machine eating

Yahoo! has publicly dumped a sample dataset for machine learning enthusiasts based on "anonymised" user interactions with the news feeds of several of its properties, ostensibly extending the research bridge between industry and academia.

The dataset contains ~110bn lines, coming in at 1.5TB bzipped, which decompresses to a whopping 13.5TB and covers the news item interactions of 20 million users between February and May 2015.

"Many academic researchers and data scientists don’t have access to truly large-scale datasets because it is traditionally a privilege reserved for large companies," said Suju Rajan, director of research at Yahoo! Labs.

Jan 14 14:02

Emails of Chelsea Clinton, Clinton Insiders Sought in New Lawsuit

A new Freedom of Information Act lawsuit against the State Department is requesting emails from Chelsea Clinton and other individuals from Hillary Clinton’s inner circle.

The Washington Examiner reported that conservative watchdog Citizens United filed the lawsuit in federal court Thursday. The suit requests emails sent from the name “Diane Reynolds,” the pseudonym under which Chelsea Clinton operated an email account on Hillary Clinton’s personal website domain.

The lawsuit comes just as Chelsea Clinton begins to play a larger role in her mother’s presidential campaign, launching attacks at Democratic challenger Sen. Bernie Sanders (I., Vt.) and headlining an upcoming fundraiser at a SoulCycle studio in New York City.

Jan 14 10:46

Before I Can Fix This Tractor, We Have to Fix Copyright Law

How many people does it take to fix a tractor? A year ago, I would have said it took just one person. One person with a broken tractor, a free afternoon, and a box of tools.

I would have been wrong.

When the repair involves a tractor's computer, it actually takes an army of copyright lawyers, dozens of representatives from U.S. government agencies, an official hearing, hundreds of pages of legal briefs, and nearly a year of waiting. Waiting for the Copyright Office to make a decision about whether people like me can repair, modify, or hack their own stuff.

Jan 14 08:31

Police sweeps of cellphone data in 'tower dumps' face charter challenge

Police powers to seize call records from tens of thousands of cellphone subscribers at once could be reined in with a court decision Thursday.

An Ontario judge will rule on a case brought by two of Canada's biggest telecommunications companies, arguing that sweeping "tower dumps" violate the Charter of Rights and Freedoms.