COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Feb 10 23:35

$150 Million Worth of Nano Allegedly Stolen From Cryptocurrency Exchange BitGrail

$150 million worth of Nano, formerly known as RaiBlocks, were stolen from BitGrail, a cryptocurrency exchange based in Italy, merely two weeks after Coincheck experienced the largest cryptocurrency hacking attack in history.

In an official statement, the Nano core team stated that Francesco “The Bomber” Firano, the owner and operator of BitGrail, notified the Nano team about the unauthorized movement of funds from the wallets of BitGrail to external wallets.

Feb 10 12:50

‘Some Are Ready To Talk’: FBI Officials In Clinton Email Probe May Have Mishandled ‘Extremely Sensitive & Classified’ Intel

Hearing from sources that SES senior managers of the FBI,some who were involved in the Hillary email investigation,may have exchanged extremely sensitive & classified information over unclassified devices.Concern is growing about an audit & some are ready to talk,” tweeted Bongino

Feb 10 12:49

Breaking: Peter Strzok KNEW Hillary Camp Used Bleachbit to Delete Emails – The Week They Were Deleted

In March 2016 Hillary Clinton’s staff deleted thousands of emails on her personal server with Bleachbit.

This was AFTER Congress issued a subpoena for the emails on March 4, 2016.

Feb 10 12:47

Shock: News Corp CEO Wants The Alternative Media Censored So Mainstream Media Companies Can Control The Flow Of Information, Make More Money

In a shocking admission by a high-level mainstream media operative, the CEO of News Corp. has revealed that major media corporations are pushing the likes of Google and Facebook to censor the alternative media despite the fact that the vast majority of Americans have little to no trust in the establishment press.

The comments, made by the CEO of Rupert Murdoch’s publishing arm, Robert Thompson, were revealed in an AFP article about the so-called “dysfunctional” online environment which in reality actually refers to a free internet where independent reporters can reach the masses themselves.

Feb 10 12:06

HOW CREEPY IS YOUR SMART HOME? REALLY, VERY CREEPY

One journalist went all-in on connecting her apartment to the internet, but her experiences might make you think twice about doing the same

Feb 10 10:33

Chrome WARNING: Security experts unmask new scam that ONLY affects Google browser users

According to security company Malwarebytes, attackers are abusing code within the web browser to create windows that users are unable to close.

Scammers are exploiting this feature to freeze Google Chrome while simultaneously surfacing a bogus security warning.

“Your PC has alerted us that it has been infected with a virus and spyware,” the fraudulent warning tells users.

The dialogue box also contains a fake Microsoft support line number.

Since users are unable to close the window, attackers hope they’re more likely to be convinced by the security alert and call the hotline.

Malwarebytes says the scam is being targeted at Windows users running the latest version of Google Chrome, build 64.0.3282.140.

Those running alternative operating systems should not be affected by this scam.

Feb 10 10:21

Wow, MIND-BLOWING: Florida Man gets an earful from 'exploding Apple AirPod' bud

A Florida man claims one of his Apple AirPods blew up as he worked out at the gym.

Jason Colon, of Tampa, said on Thursday he noticed white smoke coming out of the painfully trendy headphone bud, set the gizmo down on his workout machine, and went off to get an LA Fitness staffer for help. When he came back, Colon says, one of the pods had ruptured and was a charred mess.

"I don’t know what would’ve happened to my ear,” he told US East Coast news station WFLA. “But I’m sure since it hangs down, it could’ve been [my] ear lobe.”

Apple did not respond to a request for comment on the matter.

Feb 09 16:00

CoinText Announces SMS Bitcoin Cash Wallet To Transact BCH Without Internet

What if setting up a cryptocurrency wallet was as easy as sending a text to grandma?

What if you could send Bitcoin Cash to any mobile phone in the world without Internet?

What if the unbanked could connect to the global economy using a feature phone?

What if they could protect their savings from failing national currencies, bank bail-ins and thieves?

Today CoinText announced the launch of a private beta test that began on February 6th 2018 for its new Short Message Service (SMS) wallet that allows users to send and receive Bitcoin Cash (BCH) without Internet using simple text commands...

Feb 09 15:55

Google patents creepy Big Brother-style system that uses cameras and sensors to watch your kids and tell them off when they've been misbehaving

Google could be making Big Brother-style smart home technology to discipline your children so you don't have to.

A dystopian patent filed by the company suggests smart homes of the future could monitor naughtier members of the household with cameras, microphones, motion sensors and thermal imaging.

The Google Home system could use this real-time information to decide if the person in question is misbehaving and needs telling off.

In another patent Google described a device that would give advice to parents for 'areas of improvement' such as spending more time with their children at supper.

Feb 09 15:53

Is YOUR smart TV at risk of being hacked? Consumer Reports warns MILLIONS of Samsung and Roku devices have 'easy-to-find security flaws'

Millions of popular smart TVs can be easily controlled by hackers, product review magazine Consumer Reports has found.

Unsophisticated hackers can easily access smart TVs and play graphic content, turn up the volume and change channels on them.

They can do this over the web from the comfort of their own home, which could be thousands of miles away, according to the experts.

The findings detailed which products are the most vulnerable to hacking, including devices from Samsung and TCL.

Feb 09 12:54

Russian nuclear weapons engineers caught ­­­­minting blockchange with supercomputer

Russia's Interfax News Agency reports that engineers at the All-Russian Research Institute of Experimental Physics (RFNC-VNIIEF)—the Russian Federation Nuclear Center facility where scientists designed the Soviet Union's first nuclear bomb—have been arrested for mining cryptocurrency with "office computing resources," according to a spokesperson for the Institute. "There has been an unsanctioned attempt to use computer facilities for private purposes including so-called mining," said Tatyana Zalesskaya, head of the Institute's press service.

Zalesskaya did not say how many people were detained, and the Federal Security Service (FSB) has not issued a statement on the arrests or criminal charges pending. But reports indicate that the group was caught trying to harness the lab's supercomputer to mine cryptocurrency.

Feb 09 12:47

THE CLOUD ACT: A DANGEROUS EXPANSION OF POLICE SNOOPING ON CROSS-BORDER DATA

This week, Senators Hatch, Graham, Coons, and Whitehouse introduced a bill that diminishes the data privacy of people around the world.

The Clarifying Overseas Use of Data (CLOUD) Act expands American and foreign law enforcement’s ability to target and access people’s data across international borders in two ways. First, the bill creates an explicit provision for U.S. law enforcement (from a local police department to federal agents in Immigration and Customs Enforcement) to access “the contents of a wire or electronic communication and any record or other information” about a person regardless of where they live or where that information is located on the globe. In other words, U.S. police could compel a service provider—like Google, Facebook, or Snapchat—to hand over a user’s content and metadata, even if it is stored in a foreign country, without following that foreign country’s privacy laws.[1]

Webmaster's Commentary: 

Senators, Hatch, Graham, and Coons, I would like to politely suggest that you collectively re-read the opening statements to the the Bill or Rights, particularly the 4th Amendment:

"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things ..."

This law absolutely does not conform to the protections afforded American citizens under the Constitution and Bill of Rights, which constitute the real, and only, "Contract with America" and the hearings on this legislation should be abandoned.

But sadly, in this portion of the 21st century, this is precisely the kind of thinking one must expect from those in the Bowels of Power in DC; this is
the kind of legislation which can only come from a government deeply fearful of its own people.

Because of all the ugly Federal Government revelations moving now at breakneck speed, Americans are going to start get angry at what has been done by a broken and corrupt system.

I would like to hope that they will use that anger in the most peaceful, calm, calculated way possible, which gets the b*astards who have put the US in its current state, voted out of office, never to return to a position of public trust or power, which they no longer deserve.

Feb 09 12:22

Trump Administration to Test Biometric Program to Scan Faces of Drivers and Passengers in Vehicles

True, Organic and Free

The U.S. Customs and Border Protection is preparing to launch a pilot program to scan the faces of drivers and passengers at Anzalduas Port near McAllen, Texas.

Feb 09 09:44

“Fake News” Is Fake News

The people who created Facebook and Google must be smart. They’re billionaires, their companies are worth multi-multi billions, their programs are used by billions around the world.

But all these smart people, because of Congressional pressure, have swallowed the stories about “fake news”. Facebook hired a very large staff of people to read everything posted by users to weed out the fake stuff. That didn’t last too long at all before the company announced that it wasn’t “comfortable” deciding which news sources are the most trustworthy in a “world with so much division”. We all could have told them that, couldn’t we?

Facebook’s previous efforts to ask its users to determine the accuracy of news did not turn out any better. Last year, the company launched a feature that allowed users to flag news stories they felt were inaccurate. The experiment was shuttered after nine months.

Feb 08 22:19

Leaked iOS source code may be biggest leak in history

A skilled anonymous hacker leaked the source code for Apple's ultra-secret iBoot software on Wednesday, raising fears that almost any iPhone might be vulnerable to hackers.

Feb 08 21:44

US ARMY NOW HOLDING DRILLS WITH GROUND ROBOTS THAT SHOOT

In a historic first, the Army conducted a live fire exercise with a remote-controlled ground combat vehicle armed with a .50-caliber machine gun. It plans to conduct more exercises with more heavily armed ground robots within the next couple of years.

Feb 08 16:36

Boston Police Waste Taxpayer Money Violating Law Through Illegal Surveillance Of Citizenry

By Aaron Kesel

Boston Police effectively broke the law by illegally surveilling social media users for years to conduct online surveillance in 2014, 2015, and 2016, without telling the city council, and violating civilians right to free speech, a new blog post by the ACLU alleges.

In December 2016, the Boston City Council held a hearing to discuss the Boston Police Department’s plan to spend $1.4 million on a social media surveillance system called Geofeedia...

Feb 08 12:17

Spectre reboot problems: Now Intel replaces its buggy fix for Skylake PCs

Intel has released new microcode to address the stability and reboot issues on systems after installing its initial mitigations for Variant 2 of the Meltdown and Spectre attacks.

The stability issues caused by Intel's microcode updates resulted in Lenovo, HP, and Dell halting their deployment of BIOS updates last month as Intel worked to resolve the problems.

Intel initially said unexpected reboots were only seen on Broadwell and Haswell chips, but later admitted newer Skylake architecture chips were also affected. Microsoft also said it had also seen Intel's updates cause data loss or corruption in some cases.

Feb 08 10:27

Hackers Can Now Steal Data Even From Faraday Cage Air-Gapped Computers

A team of security researchers—which majorly focuses on finding clever ways to get into air-gapped computers by exploiting little-noticed emissions of a computer's components like light, sound and heat—have published another research showcasing that they can steal data not only from an air gap computer but also from a computer inside a Faraday cage.

Feb 08 10:06

Jim Carrey urges Facebook users to DELETE their accounts in protest over Russian interference in the US election

Hollywood actor Jim Carrey is urging people to stop using Facebook, saying it has 'profited with Russian interference' in the 2016 US election.

The star of 'Ace Ventura: Pet Detective' and 'The Mask' announced on Twitter that he's deleting his page after saying the company is not doing enough to stop Russian interference.

He is also selling his Facebook shares and has urged other people to do the same.

Reports suggested as many as 126 million Americans saw posts related to Russian interference during the 2016 election.

Feb 08 08:50

FLASHBACK JANUARY - Awan Judge Appointed by Obama Delays High-Profile Imran Trial Yet Again; Swamp Running Scared

Now it is five months of delays and bad excuses.

This is getting ridiculous.

Why does Obama-Crony judge keep postponing the Imran Awan trial? To allow him to flee to Pakistan, where co-defendant and wife Hina Alvi has already fled, with the blessing of the FBI?

It is beyond rare for a federal criminal ‘bank fraud’ case to be granted this many delays and continuances.

The Monday trial date has now been bounced to March. We stopped counting how many continuances this is. Four? Five? Six?

The Swamp is running scared and U.S. District Court Judge Tanya Chutkan is helping to provide the cover.

Chutkan, who is presiding over the Imran Awan and Hina Alvi fraud case, was appointed to the federal bench by Obama after she kicked thousands in campaign donations to his presidential campaign when he was a U.S. Senator in Illinois, records confirm.

Obama also appointed Chutkan’s husband, Peter Krauthamer, a judge to the bench in the District of Columbia Superior Court in 2011.

Webmaster's Commentary: 


There are already reasons to suspect that Hillary Clinton was engaged in espionage while Secretary of State, using her weak private email server to deliver US secrets to foreign interests and the Clinton Foundation to collect and launder the payments. But there is no reason to think the espionage stopped with Hillary herself. What if Hillary was the ultimate driving force behind the hiring of Imran Awan, whose IT company was caught breaking into the computers of members of Congress and stealing secrets?

Feb 07 20:32

KEY IPHONE SOURCE CODE GETS POSTED ONLINE IN 'BIGGEST LEAK IN HISTORY'

Someone just posted what experts say is the source code for a core component of the iPhone’s operating system on GitHub, which could pave the way for hackers and security researchers to find vulnerabilities in iOS and make iPhone jailbreaks easier to achieve.

Feb 07 09:26

WOMAN CHATTING WITH CHILD ON FB MESSENGER SUDDENLY SEES MAN SPYING ON THEM—IN THE APP

A woman who was chatting with her nephew in the Facebook Messenger app was horrifically surprised when she noticed someone watching her inside the app.

A concerned woman has brought her deeply disturbing story to the Free Thought Project after an incident occurred while she was using Facebook Messenger. While she was playing in the app with her nephew, a random stranger appeared on her screen who seemed to be watching her and her nephew.

“So, I’m taking pics of my nephew through FB messenger while talking to my sister through messenger as well, suddenly a video of a man appears sent instead of the picture I was currently taking,”Courtney explained to the Free Thought Project.

“I believe someone was watching me through my messenger,” Courtney said, noting that she has “now covered my cameras with tape.”
Courtney sent TFTP proof of her claims in the form of screen caps as well as the actual video of the random stranger.

Feb 07 09:24

Show Me The Money! How Much Telecom Companies Donated To Your Elected Officials May Determine If You Get Small Cell Towers All Over Your Neighborhood

By B.N. Frank

The Verge published an article in December 2017 regarding net neutrality. In it included several tables and pie charts which include how much U.S. elected officials received in donations from telecom and ISP companies.

"… the industry’s attempt to gain favor with lawmakers is not partisan. Entrenched telecommunications companies liberally spread money and attention to everyone who holds office. Sometimes that influence comes in the form of lavish parties with Olympic athletes and lobbyists, but consistently it comes in the form of contributions to campaigns."

Wow. Let the good times roll!

Telecom companies seem to have no shortage of cash – or influence...

Feb 07 08:00

Two friends beat million-to-one odds to crack the facial recognition on the £999 iPhone X after finding it accepted BOTH their faces

Two friends have cracked the facial recognition on the £999 ($999) iPhone X after discovering it accepted both their faces.

Joe Clayton, 23, was shocked when best friend Brad Butcher, 22, unlocked Apple's most expensive phone just by looking at it, beating one in a million odds.

The construction site manager had set up the gadget so only his face appearing in front of the camera would unlock the screen.

But the phone will also give Mr Butcher access - allowing him to make contactless payments, send messages and make calls - despite Apple claiming the chances of a mix up are one in a million.

Feb 07 07:52

Registrar Namecheap let miscreants slap spam, malware on customers' web domains willy-nilly

Namecheap has admitted it let customers set up and control subdomains for domain names belonging to other customers, allowing miscreants to distribute malware from strangers' websites.

These hijacked sites were subsequently flagged up as malicious by Google's search engine, blocking netizens from visiting them, and piling further misery on webmasters.

Feb 07 07:51

Boffins crack smartphone location tracking – even if you've turned off the GPS

Religiously turning off location services might not save you from having your phone tracked: a paper from a group of IEEE researchers demonstrates tracking when GPS and Wi-Fi are turned off.

And, as a kicker: at least some of the data used in the attack, published this week on arXiv, can be collected without permission, because smartphone makers don't consider it sensitive.

The researchers from Princeton University (student Arsalan Mosenia, IEEE members Xiaoliang Dai and Prateek Mittal, and IEEE fellow Niraj Jha) tracked smartmobes in an attack they dubbed PinMe, which combined data from the phone and non-phone sources to work out where the user is.

Feb 07 07:49

Researcher Claims Hotspot Shield VPN Service Exposes You on the Internet

If you are using the popular VPN service Hotspot Shield for online anonymity and privacy, you may inadvertently be leaking your real IP address and other sensitive information.

Developed by AnchorFree GmbH, Hotspot Shield is a VPN service available for free on Google Play Store and Apple Mac App Store with an estimated 500 million users around the world.

The service promises to "secure all online activities," hide users' IP addresses and their identities and protect them from tracking by transferring their internet and browsing traffic through its encrypted channel.

However, an 'alleged' information disclosure vulnerability discovered in Hotspot Shield results in the exposure of users data, like the name of Wi-Fi network name (if connected), their real IP addresses, which could reveal their location, and other sensitive information.

Feb 06 17:42

Hacker Lauri Love Wins In UK High Court, Will Not Be Extradited To The U.S.

By Derrick Broze

On Monday, after a five-year legal battle against extradition, activist Lauri Love was told he would not be extradited to the United States to face a trial for his suspected hacking of computer networks maintained by the U.S Army, Federal Reserve, NASA, FBI, and Department of Defense...

Feb 06 16:55

NSA Exploits Ported to Work on All Windows Versions Released Since Windows 2000

A security researcher has ported three leaked NSA exploits to work on all Windows versions released in the past 18 years, starting with Windows 2000.

The three exploits are EternalChampion, EternalRomance, and EternalSynergy; all three leaked last April by a hacking group known as The Shadow Brokers who claimed to have stolen the code from the NSA.

Feb 06 10:35

Your Mobile Phone Can Give Away Your Location, Even If You Tell It Not To

By Guevara Noubir, Northeastern University

U.S. military officials were recently caught off guard by revelations that servicemembers’ digital fitness trackers were storing the locations of their workouts – including at or near military bases and clandestine sites around the world. But this threat is not limited to Fitbits and similar devices. My group’s recent research has shown how mobile phones can also track their users through stores and cities and around the world – even when users turn off their phones’ location-tracking services...

Feb 06 08:39

ADB.Miner worm is rapidly spreading across Android devices

Updated: The malware is targeting and compromising thousands of devices to mine cryptocurrency.

Feb 06 07:48

Critical Flaw in Grammarly Spell Checker Could Let Attackers Steal Your Data

A critical vulnerability discovered in the Chrome and Firefox browser extension of the grammar-checking software Grammarly inadvertently left all 22 million users' accounts, including their personal documents and records, vulnerable to remote hackers.

According to Google Project Zero researcher Tavis Ormandy, who discovered the vulnerability on February 2, the Chrome and Firefox extension of Grammarly exposed authentication tokens to all websites that could be grabbed by remote attackers with just 4 lines of JavaScript code.

In other words, any website a Grammarly user visits could steal his/her authentication tokens, which is enough to login into the user's account and access every "documents, history, logs, and all other data" without permission.

Feb 06 07:47

Watch Out! New Cryptocurrency-Mining Android Malware is Spreading Rapidly

Now, security researchers at Chinese IT security firm Qihoo 360 Netlab discovered a new piece of wormable Android malware, dubbed ADB.Miner, that scans wide-range of IP addresses to find vulnerable devices and infect them to mine digital cryptocurrency.

According to the researchers, ADB.Miner is the first Android worm to reuse the scanning code programmed in Mirai—the infamous IoT botnet malware that knocked major Internet companies offline last year by launching massive DDoS attacks against Dyndns.

ADB.Miner scans for Android devices—including smartphones, smart TVs, and TV set-top boxes—with publicly accessible ADB debug interface running over port 5555 and then infects them with a malware that mines Monero cryptocurrency for its operators.

Feb 05 17:30

Trump Administration to Test Biometric Program to Scan Faces of Drivers and Passengers in Vehicles

By Derrick Broze

The U.S. Customs and Border Protection is preparing to launch a pilot program to scan the faces of drivers and passengers at Anzalduas Port near McAllen, Texas.

On Thursday the U.S. Customs and Border Protection announced plans for a new pilot program that will test out biometric facial recognition technology as part of an effort to identify fugitives or terror suspects...

Feb 05 10:39

Bitcoin Bloodbath Builds - Now Among Biggest Crashes Ever

Bitcoin's collapse has continued through the morning to a low price of $7141...

Feb 05 10:33

The £999 phone you CAN'T answer: Apple says it is looking into reports of an ongoing glitch that causes nothing to appear on an iPhone X screen when it rings

Apple says it is 'looking into' reports that some iPhone X users can't answer incoming calls.

According to the reports, £999 ($999) handsets with the bug begin ringing when an incoming call takes place.

However the screen does not turn on for a short period of time - sometimes longer than 10 seconds.

The problem prevents iPhone X users from selecting the Accept or Decline buttons to take or reject a call.

Feb 05 10:26

Knock, knock. Who’s there? Another Amazon Key door-lock hack

This is no joke – chap seems to have cracked Amazon’s latest toy

Feb 05 10:20

Unpatched DoS Flaw Could Help Anyone Take Down WordPress Websites

A simple yet serious application-level denial of service (DoS) vulnerability has been discovered in WordPress CMS platform that could allow anyone to take down most WordPress websites even with a single machine—without hitting with a massive amount of bandwidth, as required in network-level DDoS attacks to achieve the same.

Since the company has denied patching the issue, the vulnerability (CVE-2018-6389) remains unpatched and affects almost all versions of WordPress released in last nine years, including the latest stable release of WordPress (Version 4.9.2).

Feb 05 10:01

UBC psychologist alarmed by Facebook's new Messenger Kids app.

Target users, children aged 4-12, 'not ready to take on the challenges of social media:' developmental expert

Feb 05 09:50

SECRET HOUSE MEMO RELEASED: THE FALLOUT, THE LIES, AND THE BIGGER PICTURE

That’s a lot more spying than three warrants granted by a FISA court to surveil the Trump team. But you’re supposed to look at the warrants and how they were obtained, and not look at the wall-to-wall spying on every American.

You’re supposed to get embroiled in the Republican members of the House Intelligence Committee vs. the Democrat members, as they fling accusations at each other.

You’re not supposed to realize the NSA already has thousands of Trump-related documents, illegally obtained over a long period of time, as well as Obama-related documents, and documents on anybody and everybody who communicates electronically.

Webmaster's Commentary: 

The use of this false information was engineered to create a coup d'etat, and topple the legitimately elected President of the United States, utilizing weaponized disinfo, courtesy of the (alleged) DOJ (Democrat's Office of Juggernauts and FBI. (the Federal Bureau of Political Intrigue).

Thinking Americans should be outraged and disgusted at this travesty, and how it came to be.

The FBI and DOJ should be collectively sacked and reconstructed through the appointment of people who do not allow their political bias affect their work, period, end of discussion.

Feb 05 08:19

Lauri Love case: Hacking suspect wins extradition appeal

Alleged computer hacker Lauri Love has won his High Court appeal against his extradition to the US.

Mr Love, 33, from Stradishall, Suffolk, was first arrested in October 2013 on suspicion of hacking into FBI, US Central Bank and Nasa systems.

Appeal judges said extradition would be "oppressive by reason of his physical and mental condition".

They urged the Crown Prosecution Service (CPS) to prosecute Mr Love, who has Aspergers syndrome, in England.

Feb 05 08:17

Microsoft is about to kill off its weirdest Windows 10 experiment

If the rumors are true, Microsoft is about to ditch Windows 10 S. After struggling with this unmanageable operating system recently, I say good riddance.

Feb 02 15:10

Lawsuit Exposes Internet Giant’s Internal Culture of Intolerance

“It’s good to be periodically reminded, given how popular Dilbert is amongst us geek-folk, that the creator of Dilbert is…a paranoid sexist dickbag” (Exhibit 50)

Also: https://twitter.com/ScottAdamsSays/status/959535412598337536

Feb 02 09:59

NASA finds satellite, realises it has lost the software and kit that talk to it

In this update, dated Monday, the American space agency said “observations from all five sites were consistent with the radio frequency characteristics expected of IMAGE. Specifically, the radio frequency showed a spike at the expected centre frequency, as well as side bands where they should be for IMAGE.”

The Goddard boffins next need to undertake what the agency called “significant reverse-engineering” to capture and analyse the probe's communications.

“The challenge to decoding the signal is primarily technical,” the announcement explained. “The types of hardware and operating systems used in the IMAGE Mission Operations Centre no longer exist, and other systems have been updated several versions beyond what they were at the time.”

In other words, it doesn't have the electronics and software to hand that are compatible with whatever the bird is transmitting and expecting to receive.

Feb 02 09:47

“Israel, Trump & the GoogleGestapo”

Special guest Robert Steele joins me to discuss: pedo takedown, Trump, Israel, false flag in Hawaii, rise in censorship, emerging police state, the question of Jerusalem, FISAMEMO, democratic play in 2020, culture of death we live in, next false flag is?, message of Fatima and MUCH more!

>>>

Feb 02 09:44

The Size of iPhone’s Top Apps Has Increased by 1,000% in Four Years

As the minimum storage capacity of iPhone continues to increase—it sits at 32 GB today on the iPhone 7, double the the iPhone 5S’s 16 GB circa 2013—it’s not surprising that the size of apps themselves is getting larger. In fact, Apple raised the app size cap from 2 GB to 4 GB in early 2015. What’s surprising is how much faster they’re increasing in size compared to device storage itself.

According to Sensor Tower’s analysis of App Intelligence, the total space required by the top 10 most installed U.S. iPhone apps has grown from 164 MB in May 2013 to about 1.9 GB last month, a 12x or approximately 1,100 percent increase in just four years.

Feb 02 09:21

Erica, the creepy robot that is so life-like she appears to 'have a soul', will replace a Japanese TV news anchor in April

Very few details have been revealed about Erica's new job, however Dr Ishiguro said she will use AI to read news put together by humans.

'We're going to replace one of the newscasters with the android,' said Dr Ishiguro, who is director of the Intelligent Robotics Laboratory at Osaka University.

Feb 02 09:12

Twitter followers are vanishing by the MILLIONS from celebrity and influencer accounts as feds open probe into social media 'black market' for bots

Celebrities and social media influencers are watching their Twitter followers dwindle by the millions after it was revealed that many are guilty of paying for fake accounts to follow them.

Singer Clay Aiken, Baroness Martha Lane-Fox, reality TV star Lisa Rinna, British rowing Olympic champion James Cracknell, as well as actor John Leguziamo were all revealed to have purchased fake followers.

Great British Bake Off judge Paul Hollywood even went so far as to delete his Twitter account in shame after it was discovered that he bought roughly 600,000 of his Twitter followers.

Feb 02 09:05

Google's parent company in talks to build massive data hubs in Saudi Arabia – report

Alphabet Inc. is reportedly negotiating a major deal with Saudi Arabia. The tech giant recently cracked down on RT in the name of democracy, but seems to be OK with Riyadh’s systematic human rights violations, at home and abroad.

Senior executives of Alphabet, which owns Google, have reportedly been negotiating “for months” with representatives of the Saudi state oil giant Aramco, as well as Saudi government officials, including Crown Prince Mohammed bin Salman, the Wall Street Journal (WSJ) reports. The potential deal envisages Alphabet building major data centers in the Kingdom.

Details of the project remain scarce, including the date when the agreement will be finalized, the purpose of the tech hubs and who would control them. Sources familiar with the developments told the WSJ, however, that the size of the potential joint venture could be big enough to list on Saudi Arabia’s stock exchange.

Feb 02 09:04

Cryptocurrency Mining Malware Infected Over Half-Million PCs Using NSA Exploit

Several cybersecurity firms are reporting of new cryptocurrency mining viruses that are being spread using EternalBlue—the same NSA exploit that was leaked by the hacking group Shadow Brokers and responsible for the devastating widespread ransomware threat WannaCry.

Researchers from Proofpoint discovered a massive global botnet dubbed "Smominru," a.k.a Ismo, that is using EternalBlue SMB exploit (CVE-2017-0144) to infect Windows computers to secretly mine Monero cryptocurrency, worth millions of dollars, for its master.

Active since at least May 2017, Smominru botnet has already infected more than 526,000 Windows computers, most of which are believed to be servers running unpatched versions of Windows, according to the researchers.

Feb 02 09:02

Disengage, disengage! Cali DMV reports show how often human drivers override robot cars

Mercedes' driverless cars need human intervention approximately every 2.08km (1.3 miles), and other makes are totally reliant on frequent switching to manual, according to figures from the Californian Department for Motor Vehicles.

Feb 02 09:01

Smart sex toy fails penetration test

Security researchers have found multiple vulnerabilities in smart sex toys that create the potential for all sorts of mischief by hackers.

The Vibratissimo Panty Buster and its associated services from German company Amor Gummiwaren were riddled with flaws that create all manner of privacy risks, the researchers said.

A database containing all the customer data (explicit images, chat logs, sexual orientation, email addresses, passwords in clear text, etc) was openly accessible on the internet. Enumeration of users' explicit images was possible because of predictable numbers and missing authorisation checks.

Feb 02 07:51

The Federal Government is Using Tracking Tech to Monitor License Plates Nationwide

By Derrick Broze

In another example of the growing use of surveillance technology by the United States government, the U.S. Immigration and Customs Enforcement agency now has access to a nationwide license plate recognition database...

Feb 01 09:20

A giant botnet is forcing Windows servers to mine cryptocurrency

The Smominru miner has infected at least half a million machines - mostly consisting of Windows servers - and spreads via the EternalBlue exploit

Jan 31 10:45

Robots Will Soon Be Punishing Humans: Ford Files Patent For Robotic Police Cars

By Nicholas West

In October of last year, I reported on the network of autonomous police vehicles being deployed in Dubai that included hoverbikes and fleets of mini police surveillance vehicles that look like electric cars. The vehicles are part of a citywide initiative of embedding artificial intelligence to patrol with biometric and conventional surveillance tools. I commented at the time that these measures were fairly easy to dismiss by readers accustomed to a constitutional republic, since Dubai is ruled by an absolute monarchy under Sharia Law that has free rein to rapidly implement new forms of governance. Nevertheless, I warned that Dubai was playing host to the World Expo 2020 where they would be featured as a model for any large city of the future.

Apparently, stalwart all-American company – Ford – is prepared to help usher in the technocratic police state to the (diminishing) land of the free...

Jan 31 10:24

How Long Before Artificial Intelligence Makes Humans Redundant?

With all of the recent advances in artificial intelligence, are you starting to get worried? You really have to wonder how long it will be before human beings become redundant.

Maybe you should be concerned. In many cases, robots can easily replace humans in the manufacturing industry, the medical system, and even food service. Some theories suggest that offering universal basic income is the first step toward ushering in a world in which robots have all the jobs and humans live off the goodness of the government…for as long as that lasts.

But losing jobs isn't the only reason for concern...

Jan 31 08:50

ATMs Hit By Malware “Jackpotting” Attacks That Dispense All Cash In Minutes

$1 million has been stolen from ATMs across the United States by hackers in a new hacking approach known as ‘jackpotting’. Using malware and an endoscope hackers are able to force cash machines to spew out their entire holding of cash.

Once the machine has been emptied the malware, known as Plotus. D, has handed over complete control to the hackers and displays an ‘Out of Service’ message.

This week a memo was leaked from the US Secret Service regarding this discovery. It stated that it was only a matter of time that the US became a target for this type of hacking, given it has already been seen in both Europe and Asia.

Jan 30 15:34

Quantum Encryption even NSA Cannot Break!

Webmaster addition: Heck, NSA couldn't break my codes!

Jan 30 14:02

Facebook To Prioritize Local News Over ‘Divisive’ National Issues

Facebook will prioritize local news sources in people’s news feeds in an effort to avoid “divisive” media and promote civic engagement, according to Mark Zuckerberg.

“Starting today, we’re going to show more stories from news sources in your local town or city,” Zuckerberg wrote in a Facebook post on Monday. “If you follow a local publisher or if someone shares a local story, it may show up higher in [your] news feed.”

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA