COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Jul 29 12:56

British Spies Used a URL Shortener to Honeypot Arab Spring Dissidents

A shadowy unit of the British intelligence agency GCHQ tried to influence online activists during the 2009 Iranian presidential election protests and the 2011 democratic uprisings largely known as the Arab Spring, as new evidence gathered from documents leaked by Edward Snowden shows. The GCHQ’s special unit, known as the Joint Threat Research Intelligence Group or JTRIG, was first revealed in 2014, when leaked top secret documents showed it tried to infiltrate and manipulate—using “dirty trick” tactics such as honeypots—online communities including those of Anonymous hacktivists, among others.

Jul 29 08:40

What Makes People Choose Hedonistic Foods Over Healthful Ones?

By Karen Foster

When hunger strikes, we often eat with our eyes and it creates a fine line between eating those foods which we consider pleasurable or healthy. This then often forms the the connection between the mind and the mouth dictating our health and weight. A series of five studies suggests that when one sees a self-indulgent food on a touch screen, the hedonistic centers of our brain are facilitated...

Jul 29 08:38

iTunes users targeted with £20 purchase refund scam - how to protect yourself

Apple's iTunes customers are being warned to delete "scam" emails that are being sent to some customers claiming they have been charged more than £20 to download a song.

Reports have surfaced on social media of iTunes users receiving an email claiming to be from Apple, detailing an alleged recent song purchase from the iTunes Store that costs £23.34.

However, the aim appears to be to encourage them to click a link within the email to 'cancel and manage subscriptions', but in fact leads to a fraudulent website that asks users to enter their personal details.

Apple customers have also reported receiving emails claiming to be from iTunes that include a bill for Netflix.

Jul 29 06:50

No, We Don’t Know Yet That Russia is Behind DNC Email Hacks. Here’s Why.

There is a strong narrative underway. It was propelled largely by Clinton’s campaign manager, Robby Mook, and members of the Democratic National Committee after news broke over the weekend that thousands of embarassing internal emails were posted to WikiLeaks. The theory goes that the Russian government is behind the hack because they want to meddle in U.S. politics to help Donald Trump (who is “cozy” with Vladimir Putin).

Different media organizations continue to cite “government sources” as confirmation of Russia’s evil intentions. (Russia has denied any involvement). And, if you actually examine the facts, you will see that we simply don’t have enough yet to prove this theory out. Yes, there are some indicators that it could be Russia. Yes, there is reportedly metadata hidden in early documents that show they were edited with Russian language settings. Yes, Crowd Strike, a cyber firm hired by the DNC, claims that they found two hacker groups associated

Jul 29 06:07

Amazon's Alexa can lock your front door if you own this smart lock

What could possibly go wrong?

Jul 29 06:01

Security experts have cloned all seven TSA master keys

The TSA, for their part, doesn’t care, telling The Intercept that “The reported ability to create keys for TSA-approved suitcase locks from a digital image does not create a threat to aviation security. These consumer products are ‘peace of mind’ devices, not part of TSA’s aviation security regime.”

In other words, you might as well not use locks at all.

Jul 29 05:58

Google search connects Trump's book to Hitler's 'Mein Kampf'

Google’s search function has been thrust into the spotlight again for connecting Donald Trump and Adolf Hitler. On Wednesday, typing the name of Trump’s 2015 book “Crippled America” into a Google image search, in addition to bringing up images of that book, displayed images of Adolf Hitler’s 1920s manifesto “Mein Kampf.” (The "Mein Kampf" images have since been removed.)

Google has been in the spotlight before for a connection between Trump and the infamous Nazi leader. In June, Googling the phrase “When was Hitler born” also produced an image of Donald Trump and listed his birthday. In that case, Google said it removed the Trump image, and a recent search confirms that the candidate’s image is no longer connected with Hitler’s birthday.

Jul 28 16:05

National Weather Service Accused Of Spying On Its Unionized Employees

It looks like the National Weather Service is observing more than just clouds and wind. Its employees have filed charges against management alleging the federal agency is conducting illegal surveillance of private discussions on the union’s Facebook page.

Jul 28 15:02

Dear Russia: Can You Find Hillary’s 30,000 Missing E-Mails? (Trump taunts humorless Hill)

‘Russia, if you’re listening, I hope you’re able to find the 30,000 emails that are missing,’ Trump said. ‘I think you’ll be rewarded mightily by our press!’

Jul 28 13:40

10K GOOGLE WI-FI KIOSKS ARE COLLECTING MILLIONS OF FACES AND MAC ADDRESSES

image credit: Cryptome According to a NYC. gov page, CityBridge was chosen in 2014 to offer free private Wi-Fi to NYC residents. CityBridge is a consortium of companies that includes Intersection, Qualcomm, and CIVIQ Smartscapes – to develop and operate the LinkNYC network. (the above pic. shows one of two surveillance cameras) These kiosks, called ‘Links,’ will provide the public with a fast, private Wi-Fi network providing free domestic calling, two USB charging ports, a tablet for accessing the internet, and a red 911 button to contact emergency services. New York city plans on installing nearly10,000 spying kiosks.

Jul 28 13:30

BEX ALERT - How Donald Trump Made the U.S. a Target For Russia’s New Brand Of Warfare

Webmaster's Commentary: 

Recall just WHO created STUXNET!

Jul 28 11:46

GESTAPO IN THE USA: FCC INTIMIDATES PRESS AND KILLS FREE SPEECH AT 5G ROLLOUT

In a public meeting at FCC headquarters on July 14, the agency which once served the people instead acted like tyrannical thugs, in an escalating series of remarkable events.

First, they prevented wireless science advocates from displaying a simple sign, violating their First Amendment rights in a public venue. Then, a security guard forcefully prevented a t-shirt from being taken out of a bag, by a former Congressional candidate with opposing views.

Next, a Bloomberg reporter had his credentials confiscated — almost unbelievably — for merely talking with the former Congressional candidate.

WHY IS THE FCC RESORTING TO GESTAPO-LIKE TACTICS OF SUPPRESSION AND OUTRIGHT INTIMIDATION?

Webmaster's Commentary: 

It's always "profits uber alles" for this country's government, at this state.

Jul 28 10:24

Banking trojan being distributed via 'legitimate' PayPal accounts

Hackers are using PayPal to distribute the Chtonic banking trojan, a variant of Zeus, according to security company Proofpoint.

The emails are ‘legitimate' but low in volume, and are not filtered by anti-spam or antivirus software because they come via genuine PayPal accounts.

"The sender does not appear to be faked. Instead the spam is generated by registering with PayPal (or using stolen accounts) and then using the portal to request money," said Proofpoint in a security advisory.

Jul 28 10:22

PetNet smart pet feeders break, leaving pets without food

The Petnet Smartfeeder, a $149 internet-connected pet food machine, has suffered server issues causing pets to go hungry as scheduled meals have failed to dispense and manual feeding from the corresponding iOS app didn't work for some users.

As tweeted by a Petnet customer, the company issued an email to users stating: “we are experiencing some difficulties with one of our third party servers.” The servers, rented by Petnet from Google, were down for about 10 hours.

As a result, the company told users: “you may experience a loss of scheduled feeds and failed remote feedings".

In a knock to confidence for early adopters of the emergent ‘Internet of Things’, the startup advised owners of Smartfeeder devices: “please ensure that your pets have been fed manually until we have resolved this issue".

Jul 28 09:35

Amazon Delivery Drones Are Just The First Step To A Highway In The Sky

By Andy Miah, University of Salford

Amazon recently announced plans to test a drone delivery system in parts of the UK that are hard to access with conventional delivery methods. While much attention has focused on the service it would provide to Amazon customers, the really interesting story is what this agreement with the British government tries to achieve on a much broader level.

If successful, it will essentially create a high-altitude floating highway between 200 and 400 feet above the ground, within which a whole range of activities could be performed...

Jul 28 07:43

DNC TITANIC

When Hillary Clinton sent classified emails from her unsecure, personal server, lied and got caught they said... Everybody does it.

When thousands of emails and documents suddenly disappeared from the IRS on hard drives conveniently eaten by the dog they said... Nothing to see... Move along.

When the CIA Director got his email hacked by a teenager who smokes pot every day they said... Dude, he smokes pot?

When the Russians (maybe) hacked the DNC showing the party to be a bunch of frat boy jerks more interested in scoring with chicks, bad mouthing Bernie Sanders and collecting cash from stupid donors they said...

ALERT! NATIONAL SECURITY BREACH! AH WOO GAA! GET THE NSA! GET THE FBI! GET THE MARINES!

Webmaster's Commentary: 

Jul 28 07:27

Siberian candidate?

Who would have thought Russia and Vladimir Putin would play such an important role in the American presidential election? The media treadmill claims Trump is under Putin’s spell. And Hillary Clinton is blaming the Russian president for yet another scandal. Russia is a one-size-fits-all political tool.

Webmaster's Commentary: 

Again, I want to remind everyone that the same government and unnamed "security experts" blamed the Sony Pictures hack on then-top villain North Korea, only to have it later come out it was an internal leak by a disgruntled employee, are the same government and unnamed "security experts" blaming Russia for the DNC leak.

Jul 28 01:26

Trump's Loophole Regarding Russia's Assistance Hacking Criminal Email

Treaty between the Government of the United States of America and the Russian Federation on Mutual Legal Assistance in Criminal Matters, signed at Moscow on June 17, 1999, and a related exchange of notes.
Date Received from President

Jul 27 14:58

Facebook Fails to Show Up for Seventh Tax Summons From IRS

Facebook Inc. officials failed to show up after getting seven summonses from the Internal Revenue Service demanding internal corporate records on one of its offshore tax strategies, according to an IRS court filing.

Webmaster's Commentary: 

"That's okay. I'll get a pardon from President Hillary for blocking all those DNC email links." -- Zookerburg

Jul 27 14:18

Assange Promises To Leak ‘A Lot More’ Materials On US Presidential Elections

WikiLeaks possesses “a lot more” documents to surprise American voters ahead of the upcoming presidential elections – and will not hesitate to make them public.

Jul 27 13:20

Federal Judge Rules Hidden Microphones in Public Do Not Violate Constitution

By Derrick Broze

A federal judge has ruled that law enforcement may continue to place recording devices in public place because it does not violate the constitutional guarantee against warrantless searches and privacy protections.

On Friday July 22, U.S. District Judge Phyllis Hamilton issued a 17-page ruling which found the practice of placing recording devices on the steps of courthouses in Oakland and Martinez, California to be “unsettling,” but not in violation of the Fourth Amendment. The four defendants in the federal criminal fraud case are accused of rigging real estate bids throughout Alameda and Contra Costa Counties...

Jul 27 11:45

Bad news for Bob the Builder: Watch Hadrian X the robo-builder create an entire house in just two days

It can lay 1,000 bricks an hour and work around the clock, 24 hours a day

A robotic 'hand' lays the brick, and applies adhesive instead of mortar, which improves the thermal efficiency

It 3D scans its surroundings to work out exactly where to place bricks - and is simply parked next to site

Webmaster's Commentary: 

Not sure I would care to live in that house, but still, pretty cool!

Jul 27 10:57

Wikileaks Assange Denies Russian Hacker Help / DNC official IT Tech shot in back and not robbed

Webmaster's Commentary: 

Reward for information on the killers is now $50,000.

Maybe Seth was the one who leaked the DNC emails to WikiLeaks?

Jul 27 10:57

KeySniffer: Hackers can snag wireless keyboard keystrokes from 250 feet away

From hundreds of feet away, attackers can see everything that is being typed as well as type directly on a PC due to flawed wireless keyboards from at least eight vendors.

Jul 27 10:37

If Russian Intelligence Did Hack the DNC, the NSA Would Know, Snowden Says

Glenn Greenwald told WNYC on Monday, while there may never be conclusive evidence that the Democratic National Committee was hacked by Russian intelligence operatives to extract the trove of embarrassing emails published by WikiLeaks, it would hardly be shocking if that was what happened.

“Governments do spy on each other and do try to influence events in other countries,” Glenn noted. “Certainly the U.S. government has a very long and successful history of doing exactly that.”

Even so, he added, given the ease with which we were misled into war in Iraq by false claims about weapons of mass destruction — and the long history of Russophobia in American politics — it is vital to cast a skeptical eye over whatever evidence is presented to support the claim, made by Hillary Clinton’s aide Robby Mook, that this is all part of a Russian plot to sabotage the Democrats and help Donald Trump win the election.

Webmaster's Commentary: 

Putin has absolutely no love of Clinton, due to her warmongering and lying; however, I seriously doubt that he would ever sign off on something so ham-fisted that it could be pointed back at Russian cyber-warfare.

Jul 27 10:12

Obama puts FBI in charge of responding to cyber attacks

A presidential directive signed by President Obama Tuesday will put the FBI in charge of responding to all cyber threats and give the federal government a more active role in investigating, preventing and mitigating attempts to hack into U.S.-based computer networks.

Obama's homeland security adviser, Lisa Monaco, said the change was necessary because it's not always clear whether those responsible for a hacking incident are other countries, terrorists or criminals.

Webmaster's Commentary: 

Given his debacle with the Clinton server issue, James Comey will NOT make this investigation fact-based in any way shape or form; it will be bent to the political will of the current administration, and to augment Hillary's chances to assume the presidency next year.

And if Russia is to be bashed and accused of something its operatives absolutely didn't do, so be it.

Never mind that the relationship between Russia and the US is on a hair-point trigger right now, with US sanctions against it still in place, again, for something it didn't do (allegedly "annexing" Crimea after the US-sponsored putsch in Ukraine).

The issues of Ukraine, Syria, and the positioning of NATO troops and weapons with which to encircle Russia, and potentially attack it, are issues where the American government needs to back away from in its hubristic, bellicose posturing, like an insolent teenager, and sit down to the negotiating table like an adult in the room with Russia, and resolve these issues in good-faith negotiations.

Of course, unfortunately, that will only happen when pigs fly; in the 20th and 21st century, the US government has always needed its "Emmanuel Goldstein" against which US citizens can unload their generally misdirected vitriol, when it is their own government which has been screwing things up both domestically, and internationally.

From the time of the cold war until now, that convenient public enemy has been Russia.

I think Trump is intelligent enough to understand that at this point in the 21st century, such enmity is pretty useless, on the cusp of a multi-polar world.

Jul 27 08:51

Julian Assange: 'A lot more material' coming on US elections

Wikileaks founder Julian Assange said Tuesday his whistleblowing website might release "a lot more material" relevant to the US electoral campaign.

Assange was speaking in a CNN interview following the release of nearly 20,000 emails stolen from the Democratic National Committee by suspected Russian hackers.

Webmaster's Commentary: 

CNN is behind the times. Even Hillary's campaign chief admits there is no actual evidence that Russia had anything to do with the hack/leak. And Assange himself, while not identifying the source, has stated it is not Russia.

Jul 27 08:38

‘Mothers Of The Movement’: DNC Guests Spark Trending Twitter War Over Black Lives Matter

Black Lives Matter gained prominent attention at the Democratic National Convention when seven mothers of infamously slain victims, including Trayvon Martin and Michael Brown, took the stage. Known as the “Mothers of the Movement,” they became a Twitter trend, but not necessarily thanks to supporters.

Jul 27 07:58

Gestapo In The USA: FCC Intimidates Press and Kills Free Speech at 5G Rollout

By Josh del Sol

In a public meeting at FCC headquarters on July 14, the agency which once served the people instead acted like tyrannical thugs, in an escalating series of remarkable events...

Jul 27 07:36

NSA Whistleblower: Not So Fast On Claims Russia Behind Hillary Clinton Email Hack

Washington’s Blog asked the highest-level NSA whistleblower in history, William Binney – the NSA executive who created the agency’s mass surveillance program for digital information, who served as the senior technical director within the agency, who managed six thousand NSA employees, the 36-year NSA veteran widely regarded as a “legend” within the agency and the NSA’s best-ever analyst and code-breaker, who mapped out the Soviet command-and-control structure before anyone else knew how, and so predicted Soviet invasions before they happened (“in the 1970s, he decrypted the Soviet Union’s command system, which provided the US and its allies with real-time surveillance of all Soviet troop movements and Russian atomic weapons”) – what he thinks of such claims:

Jul 27 07:17

Facebook admits to blocking Wikileaks links in DNC email hack

Facebook admitted Sunday that it had blocked links to the Wikileaks trove of emails hacked from the Democratic National Committee.

In a Twitter post late Saturday, WikiLeaks accused the social media giant of “censorship” and gave its followers an online workaround, saying “try using https://archive.is.”

The WikiLeaks allegation followed a firestorm of controversy that erupted earlier this year when former Facebook workers admitted routinely suppressing conservative news.

Jul 27 07:08

Pokemon GO-ZILLA: Safety fears after monsters appear in Fukushima danger zone

Japan's Tokyo Electric Power Co is upset that Pokemon Go players on the hunt for monsters are being lured into the Fukushima Nuclear Exclusion Zone.

The fictional creatures were apparently spotted close to the destroyed Daiichi nuclear reactors by Tepco officials. The presence of the collectible cyber-animals could tempt addicts into no-go areas, it is feared.

As a result, power company bosses have demanded that the land around the crippled power plants, where radiation levels remain relatively high, be removed from the hit mobile game.

Jul 27 07:06

Did the Russians really hack the DNC or is this another Sony Pictures moment? You decide

Establishing proof of a hacker's identity is notoriously difficult – indeed impossible in some cases. People can connect through systems all over the world and use tools and tricks to hide their origins and motivations. Using a Russian VPN service shouldn't necessarily mean an operation was carried out in or for Russia.

There are worrying similarities between this case and the supposed hacking of Sony by the North Koreans. Many in the security industry feel that there's little proof that Best Korea staged that hack, other than the US government saying so and, as we've seen in the case of missing weapons of mass destruction in Iraq, those sorts of claims are not bulletproof evidence.

Meanwhile, Guccifer 2.0 claims he is a lone hacker with no Russian government ties; ThreatConnect thinks that's a classic denial and deception tactic to throw people off the scent.

Jul 27 06:42

Judicial Watch Goes to Court On Clinton Testimony

JW sought Hillary Clinton’s testimony a few weeks ago after my attorney colleagues deposed seven former Clinton top aides and current State Department officials, including top Clinton aides Cheryl Mills and Huma Abedin. Judicial Watch’s legal team also took the testimony of IT official Brian Pagliano, who asserted his Fifth Amendment right not to testify during the Judicial Watch deposition.

Judge Sullivan ordered Monday’s hearing after requiring the State Department’s and Hillary Clinton’s lawyers to respond to our request for permission to depose Clinton; the Director of Office of Correspondence and Records of the Executive Secretariat (“S/ES-CRM”) Clarence Finney; and the former Director of Information Resource Management of the Executive Secretariat (“S/ES-IRM”) John Bentel.

In the oral arguments before Judge Sullivan, Judicial Watch attorney Michael Bekesha repeatedly put the issue in perspective:

Jul 27 05:44

Trump Not Included in Google Search for 'Presidential Candidates'

Google is up to their old tricks.

If you search "presidential candidates," all that shows up is Hillary Clinton, Bernie Sanders who is no longer in the race and Green Party candidate Jill Stein.

Donald Trump, according to Google, is not a presidential candidate.

Jul 26 15:32

FLASHBACK - The Real Email Question: Did Hillary Clinton Sell US Secrets?

While the media is focusing your attention on the shiny object that is her email server, the real story is not being told. The circumstantial evidence indicates that Hillary Clinton, or members of her inner circle with her connivance, purloined highly classified US intelligence and either sold it, traded it, or used it for personal gain. This is not a conspiracy theory and it is not hyperbole. Stick with me for a moment.

Jul 26 15:32

You will use Cortana, Microsoft says

Surprise, surprise. If things remain as they are, Windows 10 users who upgrade to the Anniversary Update won't be able to turn off Cortana anymore using the Cortana settings.

If you compare the start menu settings of Cortana of the current version of Windows (version 1511) with those of the Anniversary Update (version 1607) you will notice that Cortana's off switch is no longer available.

...

If you cannot or won't use the Group Policy option to disable Cortana, you may use the Registry instead to do so.

1 - Tap on the Windows-key, type regedit.exe and hit enter.
2 - Confirm the UAC prompt that is displayed.
3 - Go to the key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Windows Search
4 - If AllowCortana exists already, jump to step 7.
5 - Right-click on Windows Search and select New > Dword (32-bit) Value.
6 - Name it AllowCortana.
7 - Double-click on AllowCortana and set its value to 0 to disable the feature.

Jul 26 15:18

3D Printed and Homemade “Ghost Guns” Must Now Be Registered in California

By Everett Numbers

California law will no longer look the other way on homemade guns, or “ghost guns,” as gun control advocates call them. Building a gun from parts or a 3D printer will soon require a background check. It will also require that a state-provided serial number be permanently affixed to the weapon...

Jul 26 11:33

FCC PUTS U.S. CELL PHONE ROUTING SYSTEM IN HANDS OF EUROPEAN FIRM DESPITE SECURITY WARNINGS

The Federal Communications Commission has decided to make a European-owned company the clearinghouse for routing billions of cellphone calls and text messages across the United States, despite claims by critics that the plan poses national security risks, officials said Thursday.

The FCC’s approval, which has not been publicly announced, will give a New Jersey subsidiary of Ericsson, the Swedish technology giant, the obscure but critical job of operating a sprawling national system to track and route wireless calls and texts among hundreds of service providers.

The routing system began in the 1990s as a way for people to keep their cellphone numbers when they switched carriers, but intelligence and law enforcement agencies have come to rely on it to track and trace phone numbers in investigations.

Webmaster's Commentary: 

As reported yesterday at breitbart.com:

Just one day after the global premiere of Clinton Cash, Hans Westberg, the embattled CEO and president of telecoms company Ericsson, stepped down as the head of the Swedish wireless equipment maker. Though the telecom giant’s announcement to remove Westberg is not confirmed as a direct result of the film’s online popularity, the company’s timing is an odd coincidence. The New York Times best-selling book Clinton Cash, authored by Government Accountability Institute President and Breitbart Senior Editor-at-Large Peter Schweizer, highlighted that Ericsson — on Westberg’s watch — had come under heavy fire for selling telecom equipment to countries that were considered state sponsors of terrorism by Hillary’s State Department. The company had received a letter in late 2010 from the Securities and Exchange Commission, warning it about the sells to oppressive governments. U.S. diplomatic cables noted that State Department officials had “regularly and increasingly” raised Ericsson’s transgressions with the Swedish foreign minister.

Also, as reported at the Washingtontimes.com in June of this year:

As the money flowed to the foundation from Sweden, Mrs. Clinton’s team in Washington declined to blacklist any Swedish firms despite warnings from career officials at the U.S. Embassy in Stockholm that Sweden was growing its economic ties with Iran and potentially undercutting Western efforts to end Tehran’s rogue nuclear program, diplomatic cables show. Separately, U.S. intelligence was reporting that Sweden’s second-largest employer, telecommunications giant Ericsson AB, was pitching cellphone tracking technology to Iran that could be used by the country’s security services, officials told The Times. By the time Mrs. Clinton left office in 2013, the Clinton Foundation had collected millions of dollars inside Sweden for his global charitable efforts and Mr. Clinton personally pocketed a record $750,000 speech fee from Ericsson, one of the firms at the center of the sanctions debate.

Apparently, ultimately Ericsson's "financial association" with the Clinton Foundation hit pay dirt with this contract, big-time.

Jul 26 10:59

Julian Assange: ‘No Proof Whatsoever’ Russians Are Behind DNC Hack

During an interview with NBC’s Richard Engel, Julian Assange said that “there is no proof whatsoever” that Russian intelligence sources are responsible for hacking thousands of Democratic National Committee emails. The emails were posted by WikiLeaks over the weekend. The FBI is investigating the hack. Three cybersecurity experts told the DNC that the emails were hacked by Russian intelligence.

‘There is no proof of that whatsoever. We have not disclosed our source, and of course, this is a diversion that’s being pushed by the Hillary Clinton campaign. That’s a meta-story. The real story is what these emails contain and they show collusion. The very top of the Democratic party, Debbie Wasserman Schultz, is now being forced to resign,”Assange said during the interview.

Jul 26 09:13

Democrats Accuse Russia Of Hacking DNC Server To Help Donald Trump

In the aftermath of the fallout from the DNC server hack, the Democrats have been scrambling how to redirect public anger (especially among Bernie Sanders supporters) from the revelations that not only did the Democratic party try everything in its power to sabotage Bernie Sanders presidential bid, but also colluded with various "impartial" media outlets as well as breach fundraising rules in the process.

And, as of this morning, it appears that the solution they have decided upon is not to explain or even justify the scandalous actions, but to simply blame Russia for the hack.

Webmaster's Commentary: 

Jul 26 08:57

Marissa Mayer Made A Lot Of Money Losing The Fight To Save Yahoo

If Marissa Mayer ends up leaving Yahoo when Verizon’s deal to buy the ailing web giant closes, she could walk away having made $219 million during her four-year tenure as chief executive.

Jul 26 08:39

Ransomware 2.0 is around the corner and it's a massive threat to the enterprise

Ransomware is a top concern because it's become an area of intense focus for cybercriminals due to its effectiveness at generating revenue. Once a cybercriminal hacks into a company's files and encrypts them, victims have little option but to pay the asking price for the code to decrypt their files. Ransomware is becoming more ominous as new versions are continually being developed.

Webmaster's Commentary: 

And the same government that insist they know Russia hacked the DNC servers can't find these bozos!

Jul 26 08:28

Russia Foreign Minister Responds To Allegation It Is Behind DNC Hack: "I Don't Want To Use Four-Letter Words"

Secretary of State John Kerry says he raised the email hack of the Democratic National Committee with Russia's top diplomat but stopped short of making any allegation about who might be responsible.

According to CBS, Kerry told reporters Tuesday he brought the matter up with Russian Foreign Minister Sergey Lavrov at a meeting in Laos and explained that the FBI was investigating. He did not, however, repeat allegations or echo suspicions that Russia was responsible for the hack and said he would not draw conclusions until the probe is complete. "I raised the question and we will continue to work to see precisely what those facts are," Kerry said. He would not say if Lavrov responded

Earlier, Russia's Foreign Minister Sergey Lavrov responded to accusations that Russia was allegedly behind the DNC server hack, when he blasted a reporter over her question that Russia was behind the DNC email leaks. Lavrov had a concise reply, stating: "I don't want to use four-letter words."

Webmaster's Commentary: 

And a reminder that when Sony Pictures was hacked, FBI Director James Comey claimed to know that the hack originated in North Korea. It later turned out it was an internal leak.

Remember this pile of bovine excrement when Comey tries to claim the leaked DNC emails are an eeeeeeeevil Russian plot!!!!

Jul 26 07:56

FLASHBACK - FBI director offers new evidence to back claim North Korea hacked Sony

FBI Director James B. Comey said Wednesday that the recent cyberattack against Sony Pictures was traced back to Internet addresses “exclusively used” by North Korea, as he offered new evidence intended to rebut skeptics of the bureau’s claims.

Webmaster's Commentary: 

Ultimately, it turned out North Korea had nothing to do with the Sony Pictures hack; it was an internal leak by a disgruntled employee.

So we should take the current claims that Russia is behind the DNC emails with the usual tiny grain of salt.

Jul 26 07:42

Snowden Explains How To Get To The Bottom Of "Who Hacked The Democrats"

With the scandals plaguing the Democratic National Convention - set to start in just over an hour - get stronger, so does the narrative that it was all Russia's fault the Democratic party was hacked.

Webmaster's Commentary: 

Jul 26 07:39

Hillary Graphics FEEL FREE TO COPY AND USE

Webmaster's Commentary: 

Since I posted this yesterday I have received emails from readers confirming that Facebook, LinkedIn, etc. are erasing/blocking posts of these images. So I have put them all in a gallery which you are free to copy from and use as you see fit.

We can get past this Iron (Silicon) curtain if everyone emails these around and suggests they be forwarded.

Optional Banner: 
WRH Exclusive
Jul 25 17:25

Cell 411 Is An Activist’s Best Friend

By Derrick Broze

As more activists begin to look beyond the political arena for solutions, technology is playing a greater role in organizing and building community networks...

Jul 25 12:35

Pokémon Go Is Using Your Children For Walking Ad Revenue: Petition

By Kevin Samson

The augmented reality resurrection of 1990s’ anime sensation Pokémon continues to set download records even as disturbing consequences of gameplay are exposed.

There is of course the standard tracking that any use of a smartphone will carry with it; but even by those egregious parameters, Pokémon Go takes an extra step toward fully integrating the user (and all of their contacts) into a literal matrix of mapping and surveillance...

Jul 25 11:50

Your luggage HACKED: Group creates 3D printable master key for major line of TSA-approved luggage locks 

Three hackers have developed and released a 3D printable master key used by Transportation Security Administration, which opens Safe Skies luggage locks.

During a talk given on Saturday, the three hackers known as DarkSim905, a lock enthusiast, Nite 0wl and Johnny Xmas, showed the 3D-printable model of the Safe Skies master key.

In addition to the key, they also discussed methods of collecting intelligence, which led to the compromise of Travel Sentry master keys in 2015 and vulnerabilities in the Safe Skies lock design, according to CSO Online.

Travel Sentry and Safe Skies are TSA recommended travel locks for luggage. They became popular in 2003 to prevent theft.

Jul 25 11:42

Hillary's Campaign Manager Calls DNC Leaks a Putin Plot to Help Trump

Hillary Clinton’s campaign has decided to double down on their bid to cast Trump as a secret agent of the Kremlin propped up by Russian President Vladimir Putin despite the obvious absurdity of the narrative.

Webmaster's Commentary: 

You mean Putin wasn't behind the leaks?!? Dang. I just sent him a bottle of champagne! :)

Jul 25 11:19

The Missing Man at the Center of Hillary Clinton’s Email Scandal

Of all the characters in the political drama of Hillary Clinton’s private email server, none has been more mysterious—and potentially more important—than a 40-year-old technology specialist named Bryan Pagliano.

Pagliano didn’t just set up the now infamous “homebrew” server in the basement of Clinton’s New York home, which she used for official business while serving as secretary of state. Pagliano has been the former secretary’s go-to IT guy for the past several years. He’s also the only person in the entire investigation of Clinton’s email who got an immunity deal, protecting him from possible criminal prosecution. That was Pagliano’s demand for telling FBI investigators about Clinton’s unorthodox system—a system that he apparently knows more about than anyone else.

Webmaster's Commentary: 

Jul 25 09:50

BREAKING: FBI Just Confirmed Something Huge About DNC

So is the FBI going to investigate Donald Trump and Putin for the hack!
They wont prosecute Hillary for putting classified material on an unsecured server but the FBI is investigating the hack. This will be very interesting. Can you say HYPOCRISY!

Jul 25 08:52

WHETHER OR NOT RUSSIANS HACKED DNC MEANS NOTHING CONCERNING HOW NEWSWORTHY THE DETAILS ARE

As you almost certainly know by now, on Friday Wikileaks released a bunch of hacked DNC emails just before the Democratic Presidential convention kicked off. While Wikileaks hasn't quite said where it got the emails, speculation among many quickly pointed to Russian state sponsored hackers. That's because of the revelation last month of two sets of hackers breaching the DNC's computer system and swiping (at the very least) opposition research on Donald Trump. Various cybersecurity research firms, stating with CrowdStrike, who was hired by the DNC to investigate, pointed the fingerat the Russians.

Jul 25 07:58

Tale of Two Press Conferences

Jul 25 07:37

Could YOUR identity be stolen? Experts warn of permanent damage if biometric scanners are hacked

From unlocking your smartphone, to scanning your fingerprint at the airport, your physical attributes - or 'biometrics' - are regularly used to verify your identity.

But experts warn that using your unique features to confirm your identity could leave you susceptible to being hacked.

And unlike a password, which you can easily change, your biometrics cannot be altered.

Jul 25 07:20

Nintendo shares plummet after investors realize it doesn't actually make Pokémon Go

Nintendo shares have skyrocketed since Pokémon Go's release and instant transformation into global cultural phenomenon, but they fell dramatically today after investors realized that Nintendo doesn't actually make the game. Nintendo put out a statement after the close of trading on Friday pointing out that the bottom-line impact will be "limited" as it only owns 32 percent of The Pokémon Company, and that revenue from the game and its Pokémon Go Plus smartwatch peripheral have been accounted for in the company's current forecasts.

Pokémon Go is a collaboration between The Pokémon Company and Niantic Labs, the developer who previously created the similar AR game Ingress as part of Google.

Jul 24 18:14

Declassified Document: The U.S. Army has Weaponized a Pokemon Episode

While the Pokemon Go craze continues to spread across the world, a number of troublesome stories about the app and its GPS features are coming to light. While drivers crash into the back of police cars and teenagers mindlessly cross busy highways – whilst searching for their favorite virtual 90s creatures – others are delving into the darker mysteries surrounding the app and Pokemon franchise as a whole.

Jul 24 11:08

MoveOn.org DELETES petition to put Hillary Clinton on trial!

Webmaster's Commentary: 

I smell fear coming from the Hillary camp!

Jul 24 10:37

“Careless” is Not the Word For What Clinton Did

But even if we accept that the standard is what Comey says it is, Clinton is still guilty. Because there was nothing “careless” about the way she set up her email system. In fact, she went out of her way to cautiously and deliberately thwart State Department rules regarding the use of email. She relied on multiple private servers, warned agency IT staff to look the other way, and failed to abide by regulations requiring her to turn her emails over at the end of her term. None of this happened by accident.

Webmaster's Commentary: 

Jul 24 08:44

Leaked Bernie Sanders emails a headache for Hillary as convention gets set to kick off

A CACHE OF leaked emails from Democratic party leaders’ accounts includes at least two messages suggesting an insider effort to hobble Bernie Sanders’ upstart campaign, a revelation that threatens an uneasy truce within the party.

The release of more than 19,000 emails sent and received by seven top Democratic National Committee officials, by anti-secrecy website WikiLeaks, comes at a time when the party is anxious to project an image of unity.

Jul 24 08:17

The Hillary email scandal keeps getting uglier: 3 key aides got messages clearly marked ‘Top Secret’

Emails marked “top secret” were sent from Hillary Clinton’s private server to the email addresses of three of her top aides.

The emails were not put under a higher level of classification after the fact, according to Comey’s report.

n/a
Jul 23 09:36

European Supreme Court says “Maybe” to mass surveillance of innocents

The European Court of Justice (ECJ) says that mass surveillance of innocent people may be legal in a preliminary ruling issued today. The ECJ is the highest court in the European Union, and it issues preliminary rulings by a General Advocate about six months ahead of its final ruling. Today’s preliminary ruling allows for mass surveillance on a state-by-state basis, but only when five conditions are met.

Jul 23 09:26

WikiLeaks fights The Man by, er, publishing ordinary people's personal information

WikiLeaks prides itself on taking on The Man by finding and publishing information that the world's most powerful organizations want to keep hidden.

Unfortunately, on Friday, WikiLeaks took a swing at The Man by standing on the heads of thousands of innocent citizens whose personal details it has published, including their names, home addresses, phone numbers, and even credit card, social security and passport numbers.

Just to make it even easier for identity thieves, the veritable goldmine of personal information is provided online in plain text and is even searchable.

Jul 23 07:52

Turkish Protesters Are Spray Painting “8.8.8.8” and “8.8.4.4.” On Walls — Here’s What It Means

As hard as the Turkish government might try, shutting down Twitter isn’t as easy as it seems. At 11:30 p.m. Thursday the Turkish government officially blocked the country’s 33 million Internet users from Twitter, but clever, tech-savvy Turks are sharing a simple and effective method to help fellow citizens bypass the ban — and they’re sharing it everywhere.

Jul 23 07:00

CHAFFETZ: HAMMERS DOWN ON HILLARY CLINTON SECURITY CLEARANCE BREACHES

Jul 22 11:40

‘Big Milestone’: Facebook Test-Flies Solar-Powered, Internet-Beaming Drone

Launching its internet-beaming drone into the sky for the very first time, Facebook has reached new heights. Named Aquila, it may soon deliver internet access to billions of people in the world’s remotest corners.

Jul 22 11:38

Snowden Designs Phone Case To Show When Data Being Monitored

American surveillance whistleblower Edward Snowden says smartphones are tracking devices, and he has helped design a mobile phone case that will show when a smartphone is transmitting information that could be monitored.

Jul 22 10:05

Edward Snowden Develops Phone Case to Alert Users if Their Data is Being Compromised

By Matt Agorist

Three years ago, when Edward Snowden fled from the US and met with reporters in Hong Kong to reveal his reasons for leaving — he asked them to put their phones in the hotel room refrigerator. He asked them to do so in order to block the signals sent to and from the phones. Now, three years later, Snowden and Andrew ‘Bunnie’ Huang have used that same principle to design a phone case that warns users when their data is being monitored. Say hello to the Snowden phone case...

Jul 22 08:45

The EFF is suing over one of the worst US copyright rules

The Electronic Frontier Foundation is attempting to overturn a US copyright provision that can stop people from doing anything from remixing videos to fixing cars. In a lawsuit filed today, it argues that the Digital Millennium Copyright Act’s rules against circumventing copy protection — designed to stop people from pirating copyrighted works — places unconstitutional limits on free speech.

The EFF filed suit on behalf of Johns Hopkins computer science researcher Matthew Green and hacker / inventor Andrew "bunnie" Huang, both of whom argue that the DMCA’s rules are impeding their work. They’re seeking a confirmation that the framework is restrictive, over-broad, and a violation of the First Amendment. It would be a major blow against one of the most controversial, and most unnecessarily harmful, sections of the DMCA.

Jul 22 08:37

HIGHWAY BLUETOOTH DETECTORS ARE SPYING ON MOTORISTS AND PEDESTRIANS

DHS, the Dept., of Transportation and probably the DEA are using Bluetooth detectors to spy on motorists and pedestrians.

Government agencies like DHS and the DEA use Bluetooth detectors to gather Bluetooth data from a Wireless Sensor Network.
Wireless technology that allows electronic devices to communicate directly with one another
Recently emerged as viable travel time collection technology
Open standard, allows for off-the-shelf equipment
Detection range limited to about 328 feet (100 meters)
Less expensive than many other options
Flexible installation
Some potential privacy concerns
Detection technology relies on drivers' use of Bluetooth-enabled devices
“The whole country is doing this,” Paul Misticawi, vice president of public sector sales for traffic data software company.

Bluetooth detectors will soon be able to identify everyone

Webmaster's Commentary: 

These are the acts of a government terrified of their own people.

And in terms of surveilling ME?!?

The question would be, why the heck?!?

I'm a Christian pacifist activist, and the choral director of a small local church choir; what "threat level", please, do I present to this government?!?

The logical, short answer would be, zero.

But because I post to this blog, and work through information as logically and intelligently as I can, under the NDAA, I can be imprisoned indefinitely without due process whatsoever.

And as Shakespeare said, "Aye, there's the rub."

When logic itself becomes criminalized, the society in which this is happening is in deep kim chee. (Here in the Islands, that's literally a sour cabbage dish, but it means being in deep trouble.)

And folks, this is already starting to happen in this country.

Jul 22 06:01

Ransomware poses a massive threat as payment demands skyrocket

Infection numbers varied between 23,000 and 35,000 per month last year, but recently spiked in March 2016 to hit 56,000 thanks to the arrival of Trojan.Cryptolocker.AF.

And the average ransom demand made has more than doubled in the last six months. It stood at an average of $294 (around £225, AU$395) at the end of last year, but it's now $679 (around £530, AU$930).

Jul 21 16:39

Microsoft to rip up P2P Skype, killing native Mac, Linux apps

Redmond decides you'll sound better if its VoIP system runs in the cloud via the browser

Jul 21 16:38

GOP delegates suckered into connecting to insecure Wi-Fi hotspots

A Wi-Fi hack experiment conducted at various locations at or near the Republican National Convention site in Cleveland, US, underlines how risky it can be to connect to public Wi-Fi without protection from a VPN.

The exercise, carried out by security researchers at Avast, an anti-virus firm, revealed that more than 1,000 delegates were careless when connecting to public Wi-Fi.

Attendees risked the possibility of being spied on and hacked by cybercriminals or perhaps even spies while they checked their emails, banked online, used chat and dating apps, and even while they accessed Pokemon Go.

Jul 21 12:56

A quick fix for your slow Chrome browser

After some research and experimentation, I tweaked one setting that made Chrome run considerably faster. Your mileage may vary, of course, but this is worth a try:

Jul 21 10:30

iPhone bug allows hackers to steal passwords with just a text message – update now to protect yourself

Apple has fixed a major security hole that potentially allowed hackers to gain access to a user’s iPhone, potentially allowing them to steal sensitive data such as passwords.

The flaw allowed hackers to break into an iPhone simply by sending them a text message with a specially-modified image file.

When the phone’s software tries to process the image, the file would exploit the vulnerability to access parts of the device’s code usually off-limits to third parties such as downloadable apps. It could then execute malicious code within applications without the receiver suspecting a thing.

Jul 21 09:11

TURKEY BLOCKS WIKILEAKS

Turkey blocks access to WikiLeaks after ruling party email dump

Webmaster's Commentary: 

"Why can't we do that here?!?" -- Hitlery

Jul 21 08:13

WikiLeaks Dispenses 23,000 Hillary Emails Marked “C” for Confidential (Classified)

WikiLeaks founder Julian Assange told us a month ago that the next batch of leaked Hillary Clinton emails could lead to an indictment.

Now, over 23,000 cables were just put out for the world to see.

Webmaster's Commentary: 

This is way beyond what Comey admitted to, which means the FBI is incompetent and/or complicit.

n/a
Jul 20 19:46

Don't Panic, But Our Technology Now Defies Human Understanding

Even the scientists who make our most complicated software are sometimes baffled by how it works—and, more frighteningly, by how it breaks.

Jul 20 19:45

Wave of business websites hijacked to deliver crypto-ransomware

If you've visited the do-it-yourself project site of Dunlop Adhesives, the official tourism site for Guatemala, or a number of other legitimate (or in some cases, marginally legitimate) websites, you may have gotten more than the information you were looking for. These sites are redirecting visitors to a malicious website that attempts to install CryptXXX—a strain of cryptographic ransomware first discovered in April.

Webmaster addition: And just what is the NSA, FBI, and CIA doing about it?

Nothing!

Jul 20 19:27

Microsoft ordered to fix 'excessively intrusive, insecure' Windows 10

A French regulator has issued Microsoft a formal warning over Windows 10, saying the operating system collects excessive amounts of personal data, ships that information illegally out of the EU, and has lousy security.

The warning comes from the Commission Nationale de l'Informatique et des Libertés (CNIL), an independent data privacy watchdog with the power to levy fines against companies. The CNIL has been investigating Windows 10 since its launch and has now drawn up a damning list of criticisms.

Jul 20 16:07

Bank of England Urge Central Banks to Create Their Own Digital Currencies

In a research paper published on Monday, John Barrdear and Michael Kumhof, economists at the Bank of England, call for central banks to issue their own digital currencies, along the line of Bitcoin

Jul 20 10:47

Last gasp: Microsoft updates Get Windows 10 nagster, KB 3035583, yet again

Windows 7 and 8.1 customers have another new version of GWX, now with a countdown clock

With nine days to go, Microsoft really, really wants you to claim your free upgrade to Windows 10. Come to think of it, Microsoft has really, really wanted you to upgrade your Windows 7 or 8.1 PC to Windows 10 for more than a year, and backed it with the GWX subsystem -- first installed by KB 3035583 in March 2015, 15 months ago.

>>>

Jul 20 09:58

Hillary Clinton Emails TOO TOP SECRET for Congress to See - UNBELIEVABLE!!!

Jul 20 07:44

Google Doesn’t Believe in Privacy, episode 4772

Most people generate so much noise with their internet activity that it’s hard to draw a clear connection between an action and an ad. I’ve been blocking all Google trackers for the last two years, but recently disabled the blocker to test some code. Google interpreted my sudden tracker activity as INTENTION TO SPEND MONEY. When Google discovers a user with commercial intent, it does whatever it can to make that user look at high-priced ads.

And that is how Google drives customer value, increases business performance, and ensures peace and prosperity for all.

Are you blocking trackers yet?

Jul 20 07:41

Government Requests For Google User Data Hit A Record High In 2015

In total, the company received 40,677 data requests — up from 35,365 in the first half of the year, and 30,140 one year before.

Jul 20 07:38

Amazon isn't saying if Echo has been wiretapped

Its transparency reports only includes data demands to its cloud-stored data.

Jul 20 07:37

U.S. GOVERNMENT SUED FOR SOFTWARE PIRACY, MAKER CLAIMS $600M

The U.S. military is being accused of installing 'pirated' copies of 3D virtual reality software onto hundreds of thousands of computers without permission. Bitmanagement, the makers of the software, accuse the Navy of willful copyright infringement and are suing the Government for more than half a billion dollars in unpaid licenses.

Jul 20 07:35

Flaws found in security products from AVG, Symantec and McAfee

Hundreds of security products may not be up the job, researchers say, thanks to flawed uses of code hooking.

The research is the handiwork of EnSilo duo Udi Yavo and Tommer Bitton, who disclosed the bugs in anti-virus and Windows security tools ahead of their presentation at the Black Hat Las Vegas conference next month.

The pair say 15 products including AVG, Symantec, and McAfee are affected. Scores more may be vulnerable thanks to their use of Microsoft's Detours, code Redmond says is used for "re-routing Win32 APIs underneath applications [and] is licensed by over 100 ISVs and used within nearly every product team at Microsoft."

Jul 20 07:06

Judicial Watch: Hillary Clinton Testimony Essential

Judicial Watch today announced it submitted reply briefs (available here and here) to the court in response to the State Department’s and Secretary Clinton’s oppositions to Judicial Watch’s request for permission to depose former Secretary of State Hillary Clinton, the Director of Office of Correspondence and Records of the Executive Secretariat (“S/ES-CRM”) Clarence Finney; and the former Director of Information Resource Management of the Executive Secretariat (“S/ES-IRM”) John Bentel. Today’s filings arise in a Judicial Watch Freedom of Information Act (FOIA) lawsuit before U.S. District Court Judge Emmet G. Sullivan that seeks records about the controversial employment status of Huma Abedin, former Deputy Chief of Staff to Clinton. The lawsuit was reopened because of revelations about the clintonemail.com system

Jul 19 11:35

Hillary Clinton vs. James Comey: Email Scandal Supercut

Jul 19 10:29

Snapchat applies for patent to serve ads by recognizing objects in your snaps

Just took a picture of some coffee? Here's an advert for more coffee!

Jul 19 09:30

Never10

The name “Never 10” is a bit of an overstatement, since this utility may also be used to easily re-enable Windows operating system automatic upgrading. But the primary reason for using this is to disable Windows' pestering insistence upon upgrading Windows 7 or 8.1 to Windows 10.

Jul 19 09:25

Nintendo is now worth more than Sony thanks to 'Pokémon Go'

In dollar terms, Nintendo has added a whopping $23 billion to its value in less than two weeks.

Jul 19 09:23

UK government admits 'Snooper's Charter' would allow it to ban end-to-end encryption

The UK government has publicly admitted that parts of the Investigatory Powers Bill (IPB), better known as the 'Snooper’s Charter', would allow it to force companies to ban end-to-end encryption.

In what may be viewed as a huge assault on the public’s privacy, not to mention digital security, the government would ask internet and communication service providers to “develop and maintain a technical capability to remove encryption that has been applied to communications or data”. As one member of the House of Lords put it, when debating the IPB, this essentially means that companies may not use end-to-end encryption, and could leave the public at risk, not to mention setting a supremely dangerous precedent.

Jul 19 09:21

Yahoo's Latest Earnings Report Basically Confirms That Tumblr Purchase Was a Waste of Money

Yahoo released its latest earnings report today, and while there were some bright nuggets for the beleaguered company—its reported revenue for the second quarter of this year beat analyst estimates—there was one distinct black mark. Yahoo recorded a total goodwill impairment charge of $482 million related to its purchase of Tumblr. Whoops!

A “goodwill impairment charge” is a fancy way of saying that Yahoo is writing off part of the blogging platform’s value. The $482 million comes on top of the $230 million write down it reported in February. Given that the maligned purple giant purchased Tumblr for just over $1 billion, the total write down now amounts to about $700 million—more than half of the deal’s initial value.

Jul 19 09:07

Remove Api.viglink.com and Www.adcash.com Redirect Virus

Api.viglink.com and Www.adcash.com are the a malicious redirect virus which can hijack user's browser to unwanted and malicious webpages, such as www.wizard101.com, plarium.com, greatmmos.com, www.habbo.com, www.roblox.com, www.adcash.com, click.apptrckr.info, etc. Some websites will display false warning message to cheat you to install unwanted programs. Some malicious sites will ask you to sign in their services. There are also bogus survey and tricky games and so on. Anyhow, you'd better not or should not believe in the message or information from Api.viglink.com and Www.adcash.com.

Webmaster's Commentary: 

It turns out one of our advertisers was placing VigLink in their ads. They claim they were themselves the victim of a hoax, but I have canceled with them anyway. I try to be careful about security for our readers, but sometimes something gets through. The symptoms of this browser hijacker include slow performance, ads for products and services like online gambling (which are not allowed at WRH), phony alarms to get you to download malware disquised as fixes, and so forth. If you are on a Windows machine user and have been seeing these problems, here are instructrions to remove it. I am unable to find out if SpyBot or Malwarebytes will remove it, but there is another tool called freefixer that will.

Again, my apologies to the WRH readers. It has taken me more than a month to track down who the culprit was. And thanks to those who donated during our recent fundraiser, I can afford to lose this particular advertiser.

Jul 19 07:40

Reddit - Clintonbot is ClintonCaught

Webmaster addition: I suspect all the social media platforms are playing similar games. I get complaints from readers all the time that attempts to post links to WRH either fail or vanish shortly afterwards, and Claire and I have noticed the view counts on her videos will suddenly drop without explanation. It is just one more indication of a corrupt society in decline.

Jul 18 20:07

Netflix shares plunge 15% as subscribers give streaming service the cold shoulder

Company missed second-quarter expectations, announcing that it added only 1.7 million members worldwide and blamed price increase for drop in membership

Jul 18 11:35

Badvertising: Stop the 5 Biggest Threats to Online Privacy

"One of the biggest challenges in the ad ecosystem right now is that it's really easy for anyone to place an ad," says Polonetsky, one of the attendees of next week's roundtables. "Including actual criminals who would like to mug you."

Such is the case with malvertising gangs, groups of scammers who pose as legitimate advertisers in order to infiltrate the complex system of nearly 100 ad networks—like Google's AdSense—that distribute ads to Web sites all across the Internet.

Webmaster's Commentary: 

ANNOUNCEMENT

After much work, we identified one of our advertisers who was causing trouble and have "fired" them, so hopefully there will be fewer problems reading whatreallyhappened.com


Jul 18 09:18

Zero Days

Alex Gibney’s ZERO DAYS is a documentary thriller about the world of cyberwar. For the first time, the film tells the complete story of Stuxnet, a piece of self-replicating computer malware (known as a “worm” for its ability to burrow from computer to computer on its own) that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. ZERO DAYS is the most comprehensive accounting to date of how a clandestine mission hatched by two allies with clashing agendas opened forever the Pandora’s Box of cyberwarfare. Beyond the technical aspects of the story, ZERO DAYS reveals a web of intrigue involving the CIA, the US Military's new cyber command, Israel's Mossad and Operations that include both espionage and covert assassinations but also a new generation of cyberweapons whose destructive power is matched only by Nuclear War.

Webmaster's Commentary: 

Claire and I caught this documentary on cable last night. On the negative side, Gibney shows a very pro-Israel anti-Iran slant in the telling of the story, suggesting that Israel was right to do what they did with STUXNET because Iran was building a bomb, and even including the now discredited quote from Ahmadinejad about wiping Israel off of the map.

On the positive side, it is an in-depth telling of the story of the development of STUXNET by NSA, GCHQ, and Israel as the first of a new breed of cyber weapons that can actually cause harm in the real world. I don't want to give the story away, but it reveals that the only reason STUXNET was discovered at all was a reckless push to increase its aggressiveness, which called attention to its existence.

Jul 18 07:25

It took nearly three hours for France's terror alert app to respond to Nice attack

The app, called SAIP (Système d’alerte et d’information des populations) was released by the French Interior Ministry on iOS and Android in June, ahead of the Euro 2016 soccer tournament. According to the ministry, the app would provide users with alerts and information within 15 minutes of a terrorist attack being confirmed. But it apparently took much longer to send out alerts following last night's attack in Nice.

Jul 18 07:21

Newt Gingrich: Merely Visiting An ISIS Or Al Qaeda Website Should Be A Felony

Merely visiting a website should put you in jail? What if you're a journalist? Or a politician? Or a researcher trying to understand ISIS? That should be a felony? That's not how it works. This also assumes, idiotically, that merely reading a website about ISIS will make people side with ISIS. It's also not, at all, how the law works.

Jul 18 07:18

Maxthon browser caught sending personal data to Chinese server without user’s consent

Polish security researchers from the company Exatel that the browser regularly sends a ZIP files to server in China. The ZIP file contains all kinds of data about the system of the user and the internet history. Information about the system includes the CPU, memory, the adblocker status and the startpage. Also the URL of all visited websites, Google searches and a list of installed application on the system including their version number is sent to the Chinese company.

The browser has an opt-in setting for users to send specific information as part of Maxthon’s ‘User Experience Program’ but whether the user has this disabled or not, the ZIP file is send to Maxthon. The information that is sent to the Chinese company is perfect for cybercriminals to perform a targeted attack, according to one of the security researchers.

Jul 18 07:08

ARM acquired by SoftBank for $31 billion

United Kingdom-based ARM — the company that designs the processors at the heart of most every smartphone chipset much less many computers’ chipsets — has come to an agreement with Japanese telco SoftBank to be bought out for £23.4 billion or $31 billion.

Jul 18 06:58

The Pokemon Pied Piper zombie apocalypse has begun: Hoards of mindless, obedient sheeple now stampede anywhere the puppet masters plant fictitious monsters

By now, you've probably heard of Pokemon Go, the new "hybrid reality" mobile app game that overlays real world geographic locations with virtual monsters that are collected for points.

What you may not yet know is that the game was actually developed by a CIA-funded software front group for the purpose of using all the mobile device cameras of the brain dead public to conduct what I call "mass redundant surveillance" of any area requiring immediate video documentation by the CIA or NSA. It's essentially a CIA spying machine pretending to be a game.

To accomplish citizen-assisted spying, the game's puppet masters simply plop a virtual monster into any desired surveillance location, and hoards of totally brain dead apocalyptic zombie humans instantly converge on the scene, all pointing their mobile cameras at the virtual "monsters" so they can earn their virtual "points."

Jul 18 06:50

BEX ALERT - Why does the internet hate Hillary Clinton?

From B-E-N-G-H-A-Z-I memes to the #MoreTrustedThanHillary hashtag, the internet has plenty of hate for Hillary Clinton.

Public displays of dislike for the presumptive Democratic nominee for president are made even more possible (and creative) by the internet's fluid, remix culture. Of course, Clinton hatred has its roots in the pre-internet days. Few presidential candidates have been in the public eye for as long or held such a diverse array of roles, which is why her supporters call her the most qualified candidate to ever run for president.

(*This article must be part of that big PR campaign , that she funded with the missing Clinton Foundation 'proceeds' . )

Webmaster addition: The internet is, unlike corporate media, reporting the truth about Hillary!

Jul 17 18:54

One in five consumers upgraded to Win10 for free instead of buying a PC

Just why were retail sales s*$%t last year? Microsoft's OS roll out didn't help

Jul 17 18:52

Silently clicking on porn ads you can't even see – this could be you...

Pokemon Go mobile malfeasance spinning out of control

Jul 17 07:38

Putin To Ban Pokemon GO From Russia Due To Links To CIA

Vladimir Putin is set to ban Pokemon GO from Russia after an internal Kremlin investigation revealed the viral augmented reality smartphone game has direct links to the CIA and wider intelligence community and is being used to secretly gather data on a colossal scale. Young people are being tricked into giving up their privacy to these intelligence agencies, according to Kremlin sources, and while playing the game they act as unwitting intelligence gatherers for the CIA. The game has an extensive list of intrusive tracking permissions, and it is these ‘fine print clauses’ that raised eyebrows in the Kremlin and sparked the ongoing investigation.

Jul 16 11:07

U.S. Defense Contractor to Blanket Earth With New Surveillance Technology

By Nicholas West

Google has received vast criticism for its Google Earth, Google Maps and Google Streetview systems that have essentially removed the inherent right to privacy and transferred it to the whim of corporate terms and conditions. However, this would seem to pale in comparison to what is being announced from the largest U.S. defense contractor, Lockheed Martin, working in tandem with commercial space imagery vendor, DigitalGlobe...

Jul 16 08:23

New York federal judge to DEA: If you want to use a stingray you’re going to need a warrant for that

Earlier this week, a New York federal judge became the nation’s first jurist to rule inadmissible evidence collected after Drug Enforcement Administration (DEA) officials used a stingray, or cell site simulator, to locate a drug suspect’s phone, and by extension the man himself, without a warrant. This ruling—along with a landmark Second Circuit Court of Appeals opinion handed down this week holding that US warrants do not extend overseas—is a bright spot in what’s otherwise been a bleak series of court decisions on privacy in the digital age.

Jul 16 05:44

Israel launches anti-Facebook bill

Israeli Justice Minister Eyelet Shaked and Internal Security Minister Gilad Erdan have gone public with details of a proposed bill which will force internet companies to remove content which the government deems to be promoting terror, Safa news agency reported yesterday.

The bill would empower courts to order social media providers like Facebook, Google, YouTube and Twitter to remove content that is in itself criminal as well as constitutes a danger to personal, public or state security.

Webmaster's Commentary: 

And, of course, exposing government lies is a HUGE threat to state security!

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA