COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Oct 11 13:58

Trouble For Trolls: Unleashing Online Abuse & Harassment May Now End In Jail Sentence

Internet trolls will face prosecution for certain types of online harassment and abuse, including posting degrading photoshopped images or creating derogatory hashtags, under new legal guidelines.

Oct 11 09:13

5 COMPANIES NOW CONTROL 80% OF AMERICA'S CONTRACTED SPYING

America paid about $16 billion to five companies last year for 80% of our contracted domestic and international surveillance: Leidos Holdings, CSRA Inc., SAIC, CACI International, and Booz Allen Hamilton, recently in the news following an employee arrest on cyberweapons theft charges.

Oct 11 08:31

Yahoo Turned Off E-Mail Forwarding Just When People Might Want To Leave

Whether it’s become of the breach of their account data, reports that the company built a tool for the U.S. government to monitor users’ e-mail, the pending sale (maybe) to Verizon, or because they’ve simply outgrown the service, a lot of users want to quit using Yahoo for their e-mail. Some of them already had quit, and then learned that automatically forwarding e-mail to a new address isn’t an option.

Oct 10 15:19

Germany Uses VR Model of Auschwitz-Birkenau to Catch Nazis

But now investigators, prosecutors and judges are able to rely on a new technological tool — one that allows them to essentially travel back in time to see for themselves.

German experts have constructed a detailed digital model of Hitler's Auschwitz-Birkenau extermination camp, where more than 1.1 million people were murdered during World War II.

Using virtual-reality googles, investigators can now walk around the camp in the shoes of former SS soldiers, analyzing the terrain through the eyes of the suspect.

Oct 10 15:04

EpiPen goes from $300 to $30 to $3 with Opensource and 3D Printing

By Brian Berletic

Corporations will take as much as the public allows them to. It is ultimately up to the public to represent their own best interests, and unrealistic to expect corporations or the governments charged with reining in their behavior to keep abuse and overpricing in check.

While the US government held a hearing regarding Mylan’s EpiPen pricing in which a package containing two of the devices costs a whooping $600 ($300 per device), little appears to have been done except provide the public with the belief that “something” will eventually be done by what is a clear case of price gouging.

What perhaps was more effective than the expensive and ultimately superficial Congressional hearing, was a DIY biohacking group’s demonstration of turning an ordinary store-bought autoinjector into a functioning EpiPen, called an “EpiPencil.”...

Oct 10 14:56

Fake accounts, manufactured reality on social media

The parallelisms of the boiling frog syndrome with the lies being propagated, tolerated, and accepted are easy to see. Without doing anything, users of social media may find themselves no different from the desensitized frog slowly cooked in the heat and the fire.

The battle to preserve truth has shifted online and is no longer fought in the streets alone. Technology has created platforms of empowerment and self-expression, but without timely intervention, it could evolve into a monster that could devour and swallow us all.

Oct 10 14:44

In the UK, running a blog over HTTPS is an act of terrorism, says Scotland Yard

This is one of those cases where you do a double take. As reported by Ars Technica, UK’s Scotland Yard is charging a Cardiff person with preparing for terrorism – but the list of charges shows activities we associate with very ordinary precautionary privacy measures. “Developing an encrypted version of a blog” can be read as, and probably means, publishing it over HTTPS – such as this blog and many others, simply because it’s considered best practice.

He was also charged with having a flash drive in a cufflink with a bootable operating system, presumably Tails. Using open and free operating systems with the capacity for general-purpose encryption is now an act of terrorism?

Oct 10 12:42

MASSIVE REPORT DETAILS THE SURVEILLANCE POWERS OF 12 CENTRAL AND SOUTH AMERICAN NATIONS

Unblinking Eye, EFF's giant, deep research report (available in Spanish, English and Portuguese) on the state of surveillance law in latinamerica, reveals an alarming patchwork of overbroad powers given to police forces and government agencies. In the 1980s and 1970s, the military dictatorships of Argentina, Chile, Paraguay, Bolivia, Uruguay and Brazil pooled their resources in something called "Operation Condor," which was used to effect mass kidnappings, torture, murders and disappearances. Today, less than a generation later, these countries and their neighbors are effecting surveillance dragnets that are one click away from totalitarianism. Following a military coup in one of these countries, the new generalissimos would be able to quickly crush their opposition and undertake mass arrests of all potential dissidents.

Oct 10 08:26

In the UK, running a blog over HTTPS is terrorism, says Scotland Yard

In a bizarre case, Scotland Yard is accusing a person for six separate acts of preparing terrorism. Those six acts include researching encryption, developing an “encrypted version” of his blog, and instructing others how to use encryption.

Oct 10 08:21

Now You Can Torrent (and Explore) The Galaxy… in Your Browser!

Have you ever wanted to explore an accurate 3D map of the galaxy from the comfort of your own home? Thanks to data from ESA's Gaia satellite, you can. Float through two million stars and explore the universe, in part powered by WebTorrent.

Oct 10 08:17

Internet of Things botnets: You ain’t seen nothing yet

Internet of Things (IoT) botnet "Mirai" is the shape of things to come and future assaults could be even more severe, a leading security research firm warns.

Mirai powered the largest ever DDoS attack ever, spawning a 620Gbps DDoS against KrebsOnSecurity. Source code for the malware was released on hacker forums last week.

The malware relied on factory default or hard-coded usernames and passwords to compromise vulnerable IoT devices such as insecure routers, IP cameras, digital video recorders and the like.

PenTestPartners, the UK security consultancy behind numerous hack on Iot devices ranging from Wi-Fi enabled kettles to cars, said that the botnet finally illustrates the consequences of IoT vendors cutting the corners on security.

Oct 09 07:41

Booz Allen Hamilton: NSA’s ‘Digital Blackwater’ A Sign Of Deep Ties Between US Gov’t & Private Spies

Booz Allen Hamilton, a powerful government contractor at the heart of multiple leaks of classified material from the NSA, also spends big on D.C. lobbying, and its employees have given generously to presidential campaigns this election cycle. In light of Booz Allen Hamilton’s role in two major leaks of government surveillance secrets, the corporation’s lobbying efforts and its employees’ campaign contributions reflect the deep ties between private corporations and the U.S. government and its national intelligence apparatus. In August, the FBI quietly arrested Harold Thomas Martin, a Booz Allen Hamilton contractor, for stealing classified documents. News of his arrest finally surfaced last week. Martin may have been responsible for the leak of a suite of malware tools that the NSA uses to secretly access computers.

Oct 07 20:02

YouTube Takes Down European Parliament Video On Stopping Torture For 'Violating Community Guidelines'

Back in 2008, then Senator Joe Lieberman went on a ridiculous pro-censorship campaign, demanding that YouTube take down any "terrorist" videos. For reasons I still don't understand, YouTube complied. As a result, watchdogs documenting Syrian atrocities had them censored from YouTube, because YouTube determined them to be in "violation" of its guidelines in publishing "shocking and offensive videos."

That was a few years ago, and it seems like the problem has only gotten worse -- as have the ridiculous calls for YouTube and other platforms to be the giant censor in the digital sky. The latest victim? Would you believe it's the European Parliament itself? Marietje Schaake, a really wonderful Member of the European Parliament (and a Techdirt reader), tweeted that the video she had posted of a European Parliament debate on "anti-torture" was taken down for "violating community guidelines." Really.

n/a
Oct 07 15:48

BT Yahoo! customers: Why! can't! we! grrr! delete! our! webmail! accounts!?

A recent screengrab of a customer attempting to use this function seen by The Register reads: “Sorry the delete feature is currently unavailable. This feature will become available by the end of September."

The customer said BT/Yahoo! had also made it impossible for BT customers to configure the forwarding of emails to a third party address from their BT Yahoo addresses.

He said: "BT is being about as communicative as Trappist monks about this."

He added: "BT refuse to acknowledge any contractual responsibilities to customers with regard to email as they see email as a freebie add-on to the broadband service."

n/a
Oct 07 14:52

Thousands Of Hillary Clinton Emails Go Missing From FBI Evidence Room

Oct 07 08:59

Trustworthy?

Oct 07 08:51

Shadow broker? NSA contractor arrested for allegedly stealing classified code

The FBI in August secretly arrested a National Security Agency (NSA) contractor for allegedly stealing “highly classified computer codes,” the New York Times reported Wednesday, citing anonymous government sources.

Oct 07 08:41

How to delete your Yahoo account

Before you do anything, you should make sure that you export all your data. Your Yahoo account doesn’t only hold your email conversations. It also contains contacts, calendar, and Flickr photos. To back up that data, you should follow the instructions posted on Yahoo’s help pages.

Once that’s done, head over to this Yahoo page where you can initiate the process of deleting your account. Log in, do a Captcha to prove you’re the holder of the account, and then press that delete button.

The trick is that you’ll have to wait some 90 days before your data is actually removed from Yahoo’s servers. This is a safety mechanism that ensures that malicious individuals can’t delete a Yahoo account after getting access to it.

Webmaster's Commentary: 

Not that I ever really used it, but I just deleted my Yahoo account.

Oct 07 08:38

DELETE YOUR YAHOO ACCOUNT

THERE’S NO GOOD reason to have a Yahoo account these days. But after Tuesday’s bombshell report by Reuters, indicating the enormous, faltering web company designed a bespoke email-wiretap service for the U.S. government, we now know that a Yahoo account is a toxic surveillance liability.

Reuters’s Joseph Menn is reporting that just last year, Yahoo chose to comply with a classified “directive” to build “a custom software program to search all of its customers’ incoming emails for specific information provided by U.S. intelligence officials” — the NSA in particular.

Oct 07 07:57

Backpage.com CEO Arrested for Sex Trafficking

Carl Ferrer, Backpage.com’s CEO, was arrested by Texas authorities on Thursday. They say he enabled human trafficking by letting certain classified sex ads onto his website.

“Making money off the backs of innocent human beings by allowing them to be exploited for modern-day slavery is not acceptable in Texas,” Attorney General Ken Paxton said in a statement obtained by LawNewz.com. “I intend to use every resource my office has to make sure those who profit from the exploitation and trafficking of persons are held accountable to the fullest extent of the law.”

Alleged victims of the trafficking include adults and children, he said.

Oct 07 06:27

Smash and grab PoS pwners ready with pre-Xmas malware update

A smash and grab malware gang has updated its FastPoS point of sales hack app to plunder credit cards more efficiently ahead of the festive season.

The FastPoS author is known for issuing an annual update to the malware which throws stealth to the wind in favour of quick and noisy raiding.

The technique marks FastPoS as distinct from rivals that attempt to dump and store cards on local systems before quietly hoovering it off in a bid to extend the time before banks can cancel cards.

FastPoS was first found in March last year and has since been known for receiving pre-Christmas updates to allow it to plunder modern PoS systems.

Trend Micro researchers say the malware is already being used to target small businesses.

Oct 07 05:24

Hillary Clinton's Murder Market

Retreat Research is running is a private assassination market where select users can pay in, with Bit Coin, and nominate targets. When the user-base (they are organized into "teams") has paid enough to meet the threshold, an assassin can collect.

The way assassins collect is by submitting a SHA-256 Hash code--a string of numbers and letters--that can be used to validate a specific datetime and target. If the kill happens at that time (the hash is encrypted) the assassin gets paid.

What we see is tens of thousands of dollars being funneled towards the killing of everyone who has ever crossed the Clinton Campaign.

Oct 06 16:09

Former NSA employee: This hack gains access to your Mac's webcam

A former employee of the NSA details a method in which hackers could record your Mac's webcam and microphone without detection.

Oct 06 14:38

U.S. Navy Upgrades “SSBN Nuclear Sub Electronic Security” With World War On the Horizon

While Americans are scared up over creepy clowns, Russians are conducting drills for tens of millions of people taking shelter from nuclear war.

On the U.S. side, solicitation notices on FedBizOpps.gov reveals that there is considerable effort going into upgrading, fortifying and securing communications technology– particularly for SSBNs, one of the most important pieces on the chess board.

Read more at SHTF

Oct 06 09:07

Snowden 2.0 Spotlights 'Criminal' US Govt’s Attempts to Silence Whistleblowers

In recent months, the US National Security Agency claimed it had been hit by a series of a cyberattacks. Without providing any evidence, Washington resorted to the familiar tactic of blaming the hacks on Russia.

But William Binney, a whistleblower who left the NSA in 2001, always doubted this narrative, believing the evidence instead showed signs that an agency insider was responsible for the leaks.

Oct 05 16:58

Mastercard rolls out pay-by-selfie across Europe

MaterCard’s "selfie pay" will be coming to Europe next year after trials in the US, Canada and the Netherlands. The financial services firm is rolling out biometric technologies that will allow European consumers to authenticate their identity without a password, but with a selfie, in order to provide customers with a more convenient method to sign in and a faster checkout process. Security firms view the development as another sign of the mainstream availability of biometric authentication, comparing it to the introduction of TouchID fingerprint authentication technology in the iPhone.

Oct 05 13:41

“Stunning Secret”: Andrew Breitbart Planned to Expose a Candidate Right Before Election, Too

Are we about to see an October Surprise bombshell via Julian Assange, or will he go down like Andrew Breitbart and many others who've dared to speak out against corrupt candidates?

Read more at SHTF

Oct 05 11:42

Google’s Jigsaw To Be Used To Undermine Alternative Media?

In this premier episode of The Geopolitical Report with Kurt Nimmo, we examine Google’s Jigsaw, an emerging technology that will be used on the internet to counter speech and ideas considered “extremist” by the global elite. Initially beta tested on radical Islamists, we demonstrate how Google and its partners plan to leverage the technology to marginalize and ultimately eliminate opposition to the establishment.

Oct 05 09:38

Yahoo Secretly Scanned Customer Emails For US Intelligence

Yahoo Inc last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter.

The company complied with a classified U.S. government demand, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI, said three former employees and a fourth person apprised of the events.

Oct 05 09:29

Not OK, Google

At its hardware launch event in San Francisco yesterday, Alphabet showed the sweeping breadth of its ambition to own consumers’ personal data, as computing continues to accelerate away from static desktops and screens, coalescing into a cloud of connected devices with the potential to generate far more data — and data of a far more intimate nature — than ever before.

Oct 05 09:23

Yahoo Caves in to NSA, FBI and Secretly Monitors its Email Accounts for US Government

This will rank as one of the most egregious miscarriages of consumer trust in US history.
In a brief statement to Reuters, according to these Silicon Valley executives:

“Yahoo is a law-abiding company, and complies with the laws of the United States.”

Actually, Yahoo is in breach of the law. The ‘laws’ they think they are talking about do not allow for flipping a ‘dead switch’ on the 4th Amendment and conducting mass surveillance on all US citizens.

Oct 05 09:09

Wasted: Kaspersky makes jokers of upstart ransomware VXers

Kaspersky has released a decryption tool that neuters the MarsJoke ransomware, less than a month after it was first revealed.

The decryption effort is salvation for victims who are told they have 96 hours to pay the 0.7 Bitcoin (US$427) ransom before their data is permanently encrypted.

MarsJoke, also known as Polyglot, spreads through spam bearing compressed .rar attachments.

When executed the ransomware encrypts files and demands payment before the trojan deletes itself and decryption is no longer possible.

Oct 05 08:39

These diabetes pumps obey unencrypted radio commands – which is, frankly, f*%king stupid

The OneTouch Ping consists of two components: the Insulin Pump, which delivers doses of insulin to patients, and the Meter Remote, which monitors the patient's blood glucose level and can signal the Insulin Pump from up to 10 feet away to inject the patient.

Were a diabetes patient to be victimized by such an attack, he or she could be overdosed with insulin. A 2013 article in the journal Clinical Toxicology says insulin dosing errors represent one of the most dangerous medication issues because of the risk of hypoglycemia.

The Animas letter advises customers who are concerned about the flaw to disable the pump's radio as a precaution. Doing so, however, necessitates entering meter readings into the pump manually.

Oct 05 07:23

Secure phone app Signal received its first federal grand jury subpoena this year

The company that makes Signal, one of the most secure phone call and messaging apps in the world, said Tuesday that earlier this year it received its first federal grand jury subpoena for a customer’s communications records but only shared limited information with authorities.

San Francisco-based Open Whisper Systems told the government that it does not gather or keep most of the data that was being sought. The Signal platform does not collect or retain “metadata” on calls and messages that would indicate the times, dates and durations of communications, as well as the participants’ phone numbers.

The only data that Open Whisper gathers is the date and time an account is created and the date of the user’s last connection to Signal servers. The data was sought by the FBI in Northern Virginia as part of a criminal investigation. The subpoena was issued by a grand jury at the request of the U.S. attorney’s office in the Eastern District of Virginia.

Webmaster's Commentary: 

I wonder what the government did before text messaging? Peek through your keyholes?

Oct 04 22:09

Shawnee Mission East principal cracks down on underground newspaper The Eastonian

This guy has a sexual assault scandal going on at his school. This would appear to be a diversion.It is an online paper put together off school grounds on the students time. This guy thinks he can ban it and expel the students who publish it. They are using the bullying excuse. Poor delicate things.

www.kshb.com/news/local-news/shawnee-mission-east-student-accused-of-a...

PRAIRIE VILLAGE, Kan. -- The principal of Shawnee Mission East High School is appealing to parents to help him stop the spread of an underground publication that he says is harming students.

"It is created by students," said John McKinney, the school principal. "We don’t feel it is a very large number of students. The vast majority of students have made it very clear to me that they want it to end. You have students coming to me saying, 'we want this to end. Please help us.'"

Oct 04 18:59

Let's not meet up with JPEG 2000 – researchers find security hole in image codec

Researchers are warning about a newly discovered security vulnerability in a popular open-source JPEG 2000 parser that could let corrupted image files trigger remote code execution.

Cisco-owned security firm Talos warns that by embedding a malformed image file into a web page, PDF file, or email message, an attacker could gain control over the targeted system simply by the user loading the page or message in a vulnerable application.

The flaw itself (designated CVE-2016-8332) involves the mishandling of mcc data by the OpenJPEG library. This, in turn, leads to an out-of-bounds heap write that, if set up correctly, could allow attack code to be loaded and executed in memory.

Software including Poppler, MuPDF and Chrome's PDFium use the vulnerable OpenJPEG library, meaning it is possible to exploit this latest programming blunder to attack users.

Oct 04 16:16

Johnson & Johnson says insulin pump 'could be hacked'

Pharmaceutical firm Johnson & Johnson has warned that one of its insulin pumps for diabetics is at risk of being hacked, causing an overdose.

The firm said the vulnerability concerned its OneTouch Ping pump which is only sold in the US and Canada.

However, it told the BBC there had been no reported attacks and the risk was "extremely low".

"It would require technical expertise, sophisticated equipment and proximity to the pump," it said.

Oct 04 15:46

Windows 10 usage plateaus while Windows 7 holds its own

Microsoft tossed Win10 under the bus when it unleashed the Get Windows 10 infection. Microsoft lost much of its credibility with consumers and put a severe dent in corporate loyalty. As soon as the coerced upgrades stopped, Win10 market share drifted.

Microsoft’s main hope right now lies in convincing enterprises to move to Win10, spurred by demonstrated advances in security. The consumer market may be nudged forward with new machines replacing old ones: All new machines from the major WinPC manufacturers will ship with Win10 pre-installed, starting next month.

But there’s another force at work. Starting this month, Windows 7 and 8.1 will get the same kind of forced updating -- and, presumably, snooping -- that have become hallmarks of Windows 10. The patchopalypse may drive some to move to Windows 10, to cave in to the indominatable force. My guess is that the patchopalypse will lead most Windows 8.1 and 7 users to simply stop applying updates, or to drop Windows entirely.

Oct 04 14:46

Guccifer 2.0 Hacks Clinton Foundation, Finds Massive Trove of Unsecured Data, "Pay to Play" Folder

Star Wars director JJ Abrams among list of corporate donors...

Guccifer hacked into the Clinton Foundation and found a massive trove of unsecured data -- including a folder literally named "Pay to Play."

Oct 04 14:35

Clinton Foundation Allegedly Hacked Exposing Thousands Of Donor Databases; "Pay To Play" Folder

This is what Guccifer 2.0, who has denied being affiliated with the Russian government claiming that like the original Guccifer he is from Romania, posted moments ago on his website:

So, this is the moment. I hacked the Clinton Foundation server and downloaded hundreds of thousands of docs and donors’ databases.

Hillary Clinton and her staff don’t even bother about the information security. It was just a matter of time to gain access to the Clinton Foundation server.

...

But the most interesting, and perhaps damning, finding is the following: a root directory snapshot revealing a folder which Hillary may have some trouble explaining: "Pay to Play"

Oct 04 14:00

Happy Anniversary WikiLeaks! Guccifer 2.0 Leaks Hacked Clinton Foundation Files

Guccifer 2.0, the hacker(s) behind the breach of the Democratic National Committee, released another batch of files on Tuesday, this time claiming that they are from the Clinton Foundation servers.

Webmaster's Commentary: 

"No, no, NO! You need to wait for Assange! Pay no attention to these other leakers! Wait for Assange! Wait for Assange! Wait for Assange! " -- ABCNNBBCBSFOX

Oct 04 12:41

Who Has Been Hacking the Emergency Alert System?

What do you really think is going on here?

Would you? Could you? On a train?

Please subscribe & share

Oct 04 11:20

Yahoo Admits It Secretly Hacked All User Accounts For US Intelligence

Just days after admitting that some 500 millions of its email accounts were hacked (allegedly Russians, of course), the Yahoo confessional continues as Reuters reports, somewhat stunningly that, Yahoo secretly built software to search all of its customers' incoming emails for US intel officials. Yahoo's reaction to this: we are "a law abiding company."

Oct 04 09:09

EMBEDDED BEINGS: HOW WE BLENDED OUR MINDS WITH OUR DEVICES

Like life itself, technologies evolve. So it is that the telephone became the smartphone, that near-at-hand portal to the information superhighway. We have held these powerful devices in the palms of our hands for the better part of a decade now, but there is a palpable sense that in recent years something has shifted, that our relationship with technology is becoming more intimate. Some people worry that one day soon we might physically attach computer chips to our minds, but we don’t actually need to plug ourselves in: proximity is a red herring. The real issue is the seamless way in which we are already hybridising our cognitive space with our devices. In ways both quotidian and profound, they are becoming extensions of our minds.

Oct 04 08:53

Samsung smartphones can be hacked due to some major security flaws, reveals Israeli research firm

All Samsung smartphones especially its high end range Galaxy devices can be taken over by hackers due to some major flaws in its system, reveals a security report. Although the company has issued an update to fix these vulnerabilities, many users –who are yet to download it – stand at risk.

Oct 04 08:43

A big Dutch bank is replacing 5,800 people with machines, at a cost of $2 billion

European banks are desperately trying to find ways to save money in these straitened times. ING, a major Dutch lender, announced this week that it plans to save €900 million ($1 billion) a year by cutting 5,800 jobs as part of a “digital transformation.” A further 1,200 employees will have their jobs will be changed or moved.

This transformation doesn’t come cheap. ING plans to invest €800 million over the next five years on technology that will standardize its infrastructure, data, and other processes into “one digital banking platform.” Most of the job losses will be full-time staff in Belgium and the Netherlands, where risk management, finance, HR, and IT functions will be centralized. In Belgium, the number of ING branches will be cut to 650, from 1,200.

Oct 04 08:37

Sudden explosion in reports of exploding phones

An American student's iPhone has exploded in his pocket - the latest in a global wave of smartphone combustions increasingly suggesting one of the seven signs of the modern Apocalypse is upon us.

Darin Hlavaty, a student at Rowan College at Burlington County, told US media network ABC that his iPhone 6 Plus had exploded in his back pocket, burning a hole in his jeans.

Oct 04 07:40

Inside Correct The RecordPost-Debate PLOT!

Correct the Record is a Hillary-campaign super-pac that is dedicated to "fighting the lies" on the Internet. What it is, is a battalion of paid trolls whose job it is to disrupt, demoralize, and defame any Trump supporters and message boards. They communicate using a secure messaging software called "slack" pictured above.

We were able to get some monitoring software onto a junior analyst's laptop to take a look inside the slack-channel where they were doing work. What we found was startling. In the fall-out from last night's debate, they are beginning a new campaign of targeted harassment (or worse) against the "ring leaders" of the decentralized online Trump movement.

Webmaster's Commentary: 

It is quite revealing that Hillary's online squad has access to NSA software.

The good news is that in reading the transcript, her gang looks like a bunch of kids who spend all their time celebrating themselves over being mischief makers for the Empress Hillary, but it doesn't look they are being an effective team.

Oct 04 07:24

Interesting Coincidence – U.S. Internet Disruption Maps During WikiLeaks Presser…

There was a great deal of anticipatory interest overnight in a press conference held by WikiLeaks and Julian Assange. Numerous alternative media sources hinted at a potentially damaging release of information that might impact the U.S. election.

[ *NOTE* No Info. It was a complete PR stunt – A total nothing burger! ]

However, the WikiLeaks presser was schedule for 4:00am East Coast U.S. time, 10:00am in Berlin Germany. U.S. media were not covering the press release, however it was being streamed live over the internet. Coincidentally, at the same time the WikiLeaks press conference was taking place, there were widespread internet disruptions amid major U.S. corporate internet service providers:

Oct 04 07:21

Windows 10 Anniversary Update: Fix for endless reboot problem coming soon, says Microsoft

Microsoft is in the final stages of fixing a Windows 10 update that endlessly rebooted some PCs.

Issued last Friday, the patch, known as Cumulative Update 14393.222, would keep restarting some Windows 10 computers in a vain attempt to install itself.

Microsoft has acknowledged the problem affecting the patch for the Windows 10 Anniversary Update and said it is on the verge of correcting it.

Webmaster's Commentary: 

Oct 04 05:16

Donald Trump Buys ClintonKaine.com, Turns It into Anti-Hillary News Portal

Donald Trump has trolled Hillary Clinton by buying the domain ClintonKaine.com and turning it into a Drudge Report-style website reporting all the negative aspects of the Clinton campaign.

Webmaster's Commentary: 
Oct 04 04:52

Forget the iPhone, This Is the Next Big Thing for Apple Inc. Stock

Apple Inc. (NASDAQ:AAPL) stock bears often argue that the company has reached its peak and will only go downhill. Their argument is that other than the “iPhone,” Apple stock doesn’t have much else going for it. However, here’s the thing: Apple doesn’t like to talk about what it’s working on, but that doesn’t mean there is no exciting projects underway.

Keeping secrets is not easy; that’s why we know Apple is developing electric cars. But I’m not talking about that project. Rather, I’m looking at the company’s potential in another hot field today: “smart home” systems.

Webmaster's Commentary: 

You know, the ones that can be used to make massive DDOS botnets!

Oct 03 16:26

Snowden-Approved Qubes OS 3.2 Released With New Management Features, Xfce4 Desktop Environment

Qubes OS is a security-oriented operating that aims to protect users through “compartmentalization.” The idea is to keep activities that aren’t related to each other, such as personal, work, and banking activities, in isolated virtual machines. You simply start a VM for work and one for banking, ensuring that the malware you may be getting while working doesn’t affect your banking accounts (for example).

The OS allows even more fine-grained control, though. You could for instance start a “disposable VM” that opens a single risky application, and then everything will be wiped when you close its VM.

Oct 03 16:18

Rotten to the Core: Apple Doesn't Care About Consumers

The hard part for Apple apologists is admitting their high priced technology is a fashion statement, not a future-proof gadget that remains top quality for years and years. Yes, technology is moving fast. But how do you sanely argue that 15 versions of the iPhone in seven years is less about making money and more about keeping best intentions in mind for the consumer?

The answer is you can’t, because Apple doesn’t care about the consumer.

Oct 03 16:12

Apple adopts Windows 10 tactic to auto-download Sierra to Macs

Starts pushing 4.8GB upgrade to eligible Macs today; users still have to authorize install

Oct 03 12:08

Bob Latte Letter to Loretta Lynch

Webmaster's Commentary: 

The Judiciary Commitee's formal request for information related to the FBI's intentional destruction of laptops used by Cheryl Mills and Heather Samuelson.

Oct 03 10:31

FBI Allowed 2 Hillary Aides To "Destroy" Their Laptops In Newly Exposed "Side Agreements"

Just when you think the Hillary email scandal can't get any more bizarre and corrupt, it does. According to a just released letter from the Chairman of the House Judiciary Committee, Bob Goodlatte (R - Virginia), to Attorney General Lynch, the FBI apparently struck "side agreements" with both Cheryl Mills an Heather Samuelson to "destroy" their "laptops after concluding its search."

While we parse the letter to understand what basis for action the FBI may have had when pursuing such a course of action, we can't help but note that the FBI appears to have acted as a co-conspirator in what appears to be an unprecedented case of destruction of key evidence.

Below are some of the key excerpts from the letter (full document attached at the end of this post):

Webmaster's Commentary: 

Why did the FBI allow this to happen?!?

Because the institution has become rotten to the core, from it's head, John Comey, on down, and additionally, the elite rarely eat their own.

Absoflippinglutely unbelievable!!

Oct 03 09:23

Source code unleashed for junk-blasting Internet of Things botnet

Security blogger Hacker Fantastic, who has put together an informative early analysis of the malware, summed up the feelings of several security researchers who have looked at the code. “If all it took to create biggest recorded DDoS attack in history was a telnet scanner and 36 weak credentials the net has a huge IoT problem,” he said on Twitter.

Stephen Gates, chief research intelligence analyst at NSFOCUS, argued that the problem of consumer kit with default passwords needs to be resolved sooner rather than later or else more and perhaps more widespread attacks along the same lines will become inevitable.

Oct 03 09:08

Windows 10: Latest update brings fresh FAILURE for Microsoft users

Those who are affected by the annoying glitch have been quick to point out that reports of this issue first emerged when Microsoft delivered the update to its Insiders beta testers.

Despite reports from these beta testers that there were issues with the update, Microsoft appears to have pushed ahead with the release.

Oct 03 08:14

Smart fridge browses porn in US store, shows hot action while keeping its cool

An Internet of Things-connected refrigerator showing videos from PornHub, an adult content website, was spotted by antivirus pioneer John McAfee, who tweeted his concern to his 50,000+ followers.

“The [internet of things].... do you believe me now? Pornhub on a refrigerator. What, in our current cybersecurity paradigm, accounts for this?” McAfee wrote.

Oct 03 08:04

COMPANY SUSPECTED OF BLAME IN OFFICE OF PERSONNEL MANAGEMENT BREACH WILL HELP RUN NEW CLEARANCE AGENCY

In 2014, the US Office of Personnel Management was hacked (presumably by Chinese spies), and leaked 22,000,000+ records of Americans who'd applied for security clearance, handing over the most intimate, compromising details of their lives (the clearance process involves disclosing anything that could be used to blackmail you in the future). This didn't come to light until 2015.

It's still not clear how OPM got hacked, but signs point to a failure at one of its contractors, Keypoint Government Solutions, who appear to have lost control of their logins/passwords for sensitive OPM services.

In the wake of the hacks, the job of giving out security clearances has been given to a new government agency, the National Background Investigations Bureau.

NBIB is about to get started, and they've announced that they're contracting out significant operations to Keypoint. Neither Keypoint nor the NBIB would comment on this arrangement.

Webmaster's Commentary: 

I am having a palm to forehead moment, upon reading this!!

Oct 02 18:50

Company suspected of blame in Office of Personnel Management breach will help run new clearance agency

In 2014, the US Office of Personnel Management was hacked (presumably by Chinese spies), and leaked 22,000,000+ records of Americans who'd applied for security clearance, handing over the most intimate, compromising details of their lives (the clearance process involves disclosing anything that could be used to blackmail you in the future). This didn't come to light until 2015.

Oct 02 10:11

Putin Bans Bill Gates And Microsoft From Russia

Russian President Vladimir Putin has banned Microsoft products from Russia and placed Bill Gates on a Federal Security Service watchlist.

Citing “concerns over security and reliability,” Putin has ordered the removal of Microsoft software to begin immediately.

Oct 02 10:04

Microsoft Delivers Yet Another Broken Windows 10 Update

This week, Microsoft pushed out another cumulative update and reports of installation problems are widespread. While I don’t know how many users are impacted, based on comments sent to me, it’s certainly widespread enough that this is well beyond an isolated issue.

The update that is causing the problem, KB3194496, is not installing correctly for users. The update, when it does fail, is causing some machines to restart, often multiple times, as Windows 10 attempts to remove the failed update. Worse, after a restart, the file will attempt to install again resulting in the loop of failed install, reboot, re-install and failure again.

Some users have reported that the cumulative update did install correctly on the second or third attempt while others have said that it fails every time.

Oct 02 10:03

A Yahoo insider believes the hackers could really have stolen over 1 billion accounts

The actual tally of stolen user accounts from the hack Yahoo experienced could be much larger than 500 million, according to a former Yahoo executive familiar with its security practices.

The former Yahoo insider says the architecture of Yahoo’s back-end systems is organized in such a way that the type of breach that was reported would have exposed a much larger group of user account information.

Oct 02 09:08

Pediatricians Warn Cell Phone Radiation Poses Cancer Risk to Children

By Whitney Webb

Following a study last May that linked wireless radiation to deadly heart and brain cancers, the American Academy of Pediatrics (AAP) has issued a series of recommendations that warn parents of the dangers cell phones and other wireless devices present to their children.

The initial study was carried out by the US National Toxicology Program over a period of two years. It found that rats suffered DNA damage in their brain cells as well as a high probability of developing brain tumors and malignant Schwann cell tumors in the heart...

Oct 02 08:14

Robots take pizza delivery to the next level in California

Zume is using advanced robotics and some of the smartest humans around to make your favorite pizza.

Their pizza truck contains more than 50 small ovens so they can cook while on the go.

The co-founders of Zume say this method actually makes the pizza-buying process faster and cheaper for businesses, so it allows them to invest in higher quality ingredients.

Oct 01 15:55

Conspiracy Theorists Were Right – Congress to Expand TSA in Other Forms of Travel Like Bus & Train

Waking Times Media

No one’s favorite government agency, the U.S. Transportation Security Administration, will be harassing innocent travelers on buses and trains, if new legislation — unsurprisingly proposed after rather questionable ‘attacks’ in New York City and New Jersey on September 18 — passes as expected.

Oct 01 15:16

Now In Effect: Sweeping Vermont Privacy Law Will Hinder Several Federal Surveillance Programs

By Mike Maharrey

A sweeping new law that establishes robust privacy protections in Vermont went into effect today. It not only limits warrantless surveillance and helps ensure electronic privacy in the Green Mountain State, it will also hinder several federal surveillance programs that rely on cooperation and data from state and local law enforcement.

The new law bans warrantless use of stingray devices to track the location of phones and sweep up electronic communications, restricts the use of drones for surveillance by police, and generally prohibits law enforcement officers from obtaining electronic data from service providers without a warrant or a judicially issued subpoena...

Sep 30 09:02

Israeli firm allegedly selling spy tech capable of hacking WhatsApp encrypted chats

An Israeli spy tech firm has been found privately marketing unparalleled surveillance software, according to reports. The firm claims that when in close proximity of phones, it can comprehensively extract data from WhatsApp chats, including contents of encrypted messages, via a Wi-Fi powered device.

The surveillance tech, called CatchApp was uncovered when Haifa-based intelligence and security firm Wintego's marketing brochures were leaked by an anonymous source to Forbes. The documents revealed that CatchApp used MITM (man-in-the-middle) attacks to siphon off data from a target's WhatsApp account. The leaked brochures also claim that the spy tech "provides complete access to all of a target's WhatsApp content".

Sep 30 08:50

Multiple Backdoors found in D-Link DWR-932 B LTE Router

If you own a D-Link wireless router, especially DWR-932 B LTE router, you should get rid of it, rather than wait for a firmware upgrade that never lands soon.

D-Link DWR-932B LTE router is allegedly vulnerable to over 20 issues, including backdoor accounts, default credentials, leaky credentials, firmware upgrade vulnerabilities and insecure UPnP (Universal Plug-and-Play) configuration.

If successfully exploited, these vulnerabilities could allow attackers to remotely hijack and control your router, as well as network, leaving all connected devices vulnerable to man-in-the-middle and DNS poisoning attacks.

Sep 30 08:46

A Close Election Could Expose Risky Electronic Voting Machines

Voters in 15 states, including several battlegrounds, will use systems that lack an important safeguard against software errors and tampering.

Sep 30 08:42

The Hacking of Yahoo

Last week, Yahoo! announced that it was hacked pretty massively in 2014. Over half a billion usernames and passwords were affected, making this the largest data breach of all time.

Yahoo! claimed it was a government that did it:

A recent investigation by Yahoo! Inc. has confirmed that a copy of certain user account information was stolen from the company's network in late 2014 by what it believes is a state-sponsored actor.

I did a bunch of press interviews after the hack, and repeatedly said that "state-sponsored actor" is often code for "please don't blame us for our shoddy security because it was a really sophisticated attacker and we can't be expected to defend ourselves against that."

Well, it turns out that Yahoo! had shoddy security and it was a bunch of criminals that hacked them.

Sep 30 07:48

Why the FBI Let Hillary Go Free

Webmaster's Commentary: 

Because Obama was also guilty of using Hillary's private server and engaging in "pay to play" politics!

n/a

n/a
Sep 29 13:18

Eerie: Hacked Emergency Message Foreshadows Devastating NJ Train Crash: “Would You? Could You? On a Train?”

The most horrific news of the day is undoubtedly the disastrous train crash in Hoboken, New Jersey that frightened everyone in the station, and killed at least one person as it went off its rails and crashed through the station.

But it is the hacked message that happened hours before that makes this event truly creepy.

“Civil Authorities have issues a Hazardous Materials Warning for The United States. Effective until September 29, 02:16AM EDT. Would you. Could you. On a Train? Wait for further instructions.”

Read more at SHTF

Sep 29 09:34

FBI Director James Comey Admits “Stonetear” is Paul Combetta During Hearing….

Yesterday, Ohio Representative Jim Jordan questioned FBI Director James Comey about the “Stonetear” Reddit posting. Director Comey admits that Stonetear is in fact Paul Combetta, and the “VERY VIP” was, indeed, Hillary Clinton.

Additionally Director Comey also stated the phrase “they” in the Combetta post (ie. “Basically, they don’t want the VIP’s email address exposed to anyone“…) most likely included Hillary Clinton’s legal team.

Sep 29 08:30

LIVE Panel: “Clinton Scandal Update – Emails and the Clinton Foundation”

In response to the revelations about the pay-to-play scandal tied to former Secretary of State Hillary Clinton’s non-state.gov email system and the Clinton Foundation, Judicial Watch announced today that it will host an educational panel discussion: “Clinton Scandal Update – Emails and the Clinton Foundation.”Panelists include author of the New York Times best-seller Clinton Cash and President of Government Accountability Institute Peter Schweizer; Joe diGenova, former U.S. Attorney, Independent Counsel and founding partner of the Washington, D.C., law firm diGenova & Toensing; and Chris Farrell, director of investigations and research at Judicial Watch. Moderator will be Judicial Watch President Tom Fitton.

Sep 29 07:40

House delays contempt vote on Hillary Clinton IT aide Bryan Pagliano until after the election

Committee Chair Jason Chaffetz said that Pagliano would face (unspecified) consequences for “thumbing his nose at Congress.” After Pagliano stiffed the committee again, the committee voted 19?15 along straight party lines last Thursday to send a resolution to the full House of Representatives to hold Pagliano in contempt.

Now that vote looks like it won’t take place until after the American people vote on their next president.

Webmaster's Commentary: 

WTF?!?

Sep 29 05:23

Donald Trump claims Google is hiding bad Hillary Clinton news, and isn’t entirely wrong

The site’s autocomplete tools are set up to hide some kinds of negative suggestions, meaning that all bad things are hidden

Sep 28 14:31

YouTube “Heroes” Program Makes Censorship Into A Role-Playing Game

YouTube is shamelessly incentivizing censorship by involving its users in a new program called “YouTube Heroes,” wherein creators and consumers are awarded points and exclusive perks for reporting negative videos and policing negative community content.

Sep 28 10:22

Did last night's US presidential debate Wi-Fi rip-off break the law?

The host of the first presidential debate on Monday night, Hofstra University in New York, may have broken the law and could be in line for a huge fine.

Reporters at the event were appalled to find that among the heavily marked-up items they were offered – $150 to rent a lamp, anyone? – was a $200 charge for a "secure wireless internet connection."

Worse than the clear effort to price-gouge people trying to file stories, however, was the fact that the university decided that only its wireless access points were allowed to be used, and even sent someone around with a Wi-Fi signal detector apparently threatening to throw out anyone who was using an "unauthorized" access point.

Sep 28 09:07

Hillary Clinton Slyly Reminded America of the Stuxnet Attack

“With respect to Iran, when I became secretary of state, Iran was weeks away from having enough nuclear material to form a bomb. They had mastered the nuclear fuel cycle under the Bush administration. They had built covert facilities. They had stocked them with centrifuges that were whirling away.”

At first glance, it’s an innocuous descriptor of Iran’s nuclear program, which Clinton later said the U.S. was able to tame through diplomatic and economic sanctions. But that last line — “stocked them with centrifuges that were whirling away,” is pure shade. Because Stuxnet’s primary target was the centrifuge system in the Iranian nuclear facilities.

Sep 28 09:06

President Obama Becomes Entangled In Clinton Email Scandal Following FBI Document Release

FBI Documents from the Clinton email investigation reveal that Obama used a pseudonym when communicating with the former-Secretary of State's private email server.

Sep 28 08:01

Beware who you search for! Amy Schumer is the most dangerous celebrity online as hackers use stars' names to target internet users

Hackers use the fascination with celebrity news to entice unsuspecting fans to visit sites that can download viruses onto their computers and steal passwords or personal information.

Sep 28 07:12

Sage advice: Avoid the Windows 10 Anniversary Update – it knackers our accounting app

Try this workaround if you're frozen out

Sep 27 09:55

WhatsApp banned from sharing data with Facebook in Germany

WhatsApp’s hugely controversial data-sharing deal with Facebookis now officially banned in Germany.

The two companies announced last month that WhatsApp would start handing over data about its users to Facebook. Facebook would then use that data to help its ads, generating more information about the people using it.

Sep 27 07:47

152k cameras in 990Gbps record-breaking dual DDoS

The world's largest distributed denial of service (DDoS) attack has been clocked from the same network of 152,463 compromised low-powered cameras and internet-of-things devices which punted a media outlet off the internet.

Sep 27 07:45

No wonder we're being hit by Internet of Things botnets. Ever tried patching a Thing?

Akamai CSO laments pisspoor security design practices

Sep 26 16:40

Security man Krebs' website DDoS was powered by hacked Internet of Things botnet

The huge distributed denial of service (DDoS) attack which wiped security journalist Brian Krebs' website from the internet came from a million-device-strong Internet of Things botnet.

"Attack appears to include numerous IoT devices, including security cameras. Still itemizing them," an Akamai spokesman told El Reg by email.

The attack "included substantial shaped traffic (traffic directly controlled by that botnet operator), rather than merely reflected, amplified unshaped traffic," he added.

Sep 26 15:40

Documents Reveal Widespread Abuse of Social Media Spying Tools by California Cops

By Derrick Broze

The release of thousands of pages of documents has revealed that California law enforcement have secretly acquired social media monitoring tools that focus on activists.

The American Civil Liberties Union of California has obtained thousands of pages of documents pertaining to California law enforcement agencies secretly purchasing social media surveillance software. The ACLU of California filed open records requests with 63 police departments, sheriffs, and district attorneys across California and found that at least 20 agencies across California are in possession of social media monitoring tools...

n/a
Sep 26 12:19

YouTube “Heroes” Program Makes Censorship Into A Role-Playing Game

YouTube is shamelessly incentivizing censorship by involving its users in a new program called “YouTube Heroes,” wherein creators and consumers are awarded points and exclusive perks for reporting negative videos and policing negative community content.

Sep 26 09:01

ISP explains data caps to FCC: Using the Internet is like eating Oreos: "You have to pay extra for double-stuffed," cable company Mediacom tells FCC.

If you were worried that the debate over Internet data caps would get bogged down in technical mumbo-jumbo, fear no more—it's actually much simpler than you think.
Mediacom, a US cable company with a little over 1.1 million Internet subscribers in 22 states, has put the matter to rest by explaining to the Federal Communications Commission that its customers shouldn't get unlimited data because using the Internet is just like eating Oreos.

Sep 26 08:42

UPDATED ~~ MORE IMAGES OF THE DAY ~~ FACEBOOK DELETES PALESTINE YET AGAIN

Sep 26 08:27

America the Banana Republic – Most of Clinton’s Recovered Emails Will Be Released After Election Day

America, this is how little your government thinks of you.

Gotta keep the public as ignorant and stupid as possible until election day.

Sep 26 06:27

Your vibrator isn’t the only thing spying on you: Welcome to the Internet of everything

Nevertheless, before physical devices were connected to the Internet, the damage hackers could cause was confined to financial ruin, damaged reputations and nuisance. Now it could prove deadly.

Last summer, a pair of hackers took control of a Jeep Cherokee over the Internet during a demonstration for Wired magazine, leading to a recall of 1.4 million vehicles. Hackers have also reported finding vulnerabilities in connected drug infusion pumps and pacemakers that could allow them to deliver lethal doses of medication or stop hearts.

With that in mind, a snooping vibrator starts to sound pretty tame.

Sep 26 05:44

Apple Weakens iOS 10 Backup Encryption; Now Can Be Cracked 2,500 Times Faster

With the latest update of its iPhone operating system, it seems the company might have made a big blunder that directly affects its users' security and privacy.

Apple has downgraded the hashing algorithm for iOS 10 from "PBKDF2 SHA-1 with 10,000 iterations" to "plain SHA256 with a single iteration," potentially allowing attackers to brute-force the password via a standard desktop computer processor.

Sep 26 05:39

Heathrow airport and stock exchange throw mystery BSODs

It's no surprise that public transport delivers up a huge number of BSODs, since transport needs to disseminate lots of information.

So let's open this week's BSOD Watch with not one, but three BSODs readers spotted at London's aviation paradise, Heathrow Airport.

Sep 25 19:08

Microsoft's Windows 10 has caused us 'nothing but trouble' say users

Computer users have faced major technical issues with Microsoft's new Windows 10 software since its launch in July last year, according to research by U.K. consumer charity Which.

"We've received well over 1,000 complaints about Windows 10, as well as plenty of comments ... with PC users telling us that this software update has brought them nothing but problems," Andrew Laughlin, a senior researcher at the consumer association, said in a blogpost on Thursday.

Consumers in the U.K. have told the company about being "nagged" by Microsoft to install the operating system update and, despite declining advances, have experienced the Windows 10 software installing itself anyway.

Various problems, once it is installed, have included printers, wi-fi cards and speakers no longer working, as well as instances of lost files and email accounts no longer syncing, according to Which.

Sep 25 11:44

Scary Microsoft patent would have Windows watch everything you do, send it to Bing, for better search results

The patent, “QUERY FORMULATION VIA TASK CONTINUUM”, published yesterday (22/9/2016), notes that efficient searching is enhanced if more information is available regarding the user intent, giving the example of somewhat doing a school report on dancing, and noting that despite the user having done some work already, when they hit the browser to search the search engine would not have any idea what the user is working on except for what they have typed into the search bar.

Sep 25 07:47

Facebook apologizes for disabling Palestinian journalists’ accounts

Facebook says it made a mistake in disabling the accounts of journalists who administer the pages of two of the most widely read Palestinian publications on the Internet.

“The pages were removed in error and restored as soon as we were able to investigate,” a Facebook spokesperson has told The Electronic Intifada. “Our team processes millions of reports each week, and we sometimes get things wrong. We’re very sorry about this mistake.”

Webmaster's Commentary: 

And when was the last time Facebook "accidentally" deleted the accounts of Israel journalists?

Sep 25 07:26

Obama implicated in Clinton email scandal – New FBI docs

During the interview with Huma Abedin, who served as deputy chief of staff under Clinton, the FBI reportedly presented her with an email exchange between Clinton and a person she did not recognize. The FBI then revealed the unknown person’s name was believed to be a pseudonym used by Obama. Abedin reacted by saying, “How is this not classified?”

This exchange could expose Obama as having mislead the public on the issue, given his 2015 statement that he found out about Clinton’s use of a private email server "the same time everybody else learned it, through news reports."

Sep 25 07:18

Obama used a pseudonym in emails with Clinton, FBI documents reveal

President Barack Obama used a pseudonym in email communications with Hillary Clinton and others, according to FBI records made public Friday.

The disclosure came as the FBI released its second batch of documents from its investigation into Clinton’s private email server during her tenure as secretary of state.

Webmaster's Commentary: 

Obama had told CBS he heard about Hillary's private server from "press reports."

Sep 24 09:46

Massive web attack hits security blogger

One of the biggest web attacks ever seen has been aimed at a security blogger after he exposed hackers who carry out such attacks for cash.

The distributed denial of service (DDoS) attack was aimed at the website of industry expert Brian Krebs.

At its peak, the attack aimed 620 gigabits of data a second at the site.

Text found in attack data packets suggested it was mounted to protest against Mr Krebs' work to uncover who was behind a prolific DDoS attack.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA