COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Aug 14 14:07

Twitter Suspends Account Of Guccifer 2.0, Hacker Behind DNC & DCCC Leaks

The Twitter account of Guccifer 2.0, the hacker who claimed responsibility for leaking a trove of Democratic National Committee documents, was suspended less than 24 hours after dumping fresh sensitive DNC data.

Aug 14 07:43

CLINTON COLLAPSE: INSIDERS SAY MAY DROP "SOON"

Insiders say the Hillary camp is panicked--possibly on the verge of collapse. Not only is Trump's polling far better than the media narrative shows but the even more predictive Social Media scene has collapsed to "landslide" proportions in favor of Donald Trump. While Brietbart and The Gateway Pundit had covered the publicly available data, we used some of our benefactors extensive resources to try to get a look inside the Social Media response center of the Clinton Campaign.

We'll tell you: the shop they run is tight. Fear--terror, really--of Mrs. Clinton goes a long way to keeping people in line--but now that the cracks have started we were able to compromise a key person inside the sequestered Media Room run by David Brock's "Internet Warrior Virgins" (his term, not ours).

This is what we learned.

Aug 13 16:29

Just How Bad Is (Social) Media Bias In This Election?

“They take away the hashtag that has negative tweets for Clinton and replace it with something that doesn’t so the average person doesn’t see what was really trending... This happens every day.”

Aug 13 12:09

Drug Sales On The Dark Web Have Tripled Since The Feds Shut Down Silk Road

By John Vibes

This week, it was reported that drug sales on the dark web have tripled since the infamous Silk Road was shut down in 2013.

Within hours of the Silk Road takedown, there were several competitors that were already on the dark web who were ready to move in on the newly available business.

Stijn Hoorens of the RAND corporation recently published a study showing how this growth has occurred despite government intervention...

Aug 13 10:00

MICROSOFT INADVERTENTLY DEMONSTRATES THE INTRINSIC SECURITY PROBLEM OF INCLUDING A UNIVERSAL BACKDOOR IN ITS SOFTWARE BY ACCIDENTALLY LEAKING ITS "GOLDEN KEY"

Microsoft has inadvertently demonstrated the intrinsic security problem of including a universal backdoor in its software after it accidentally leaked its so-called "golden key"—which allows users to unlock any device that's supposedly protected by Secure Boot, such as phones and tablets.

The key basically allows anyone to bypass the provisions Microsoft has put in place ostensibly to prevent malicious versions of Windows from being installed, on any device running Windows 8.1 and upwards with Secure Boot enabled.

And while this means that enterprising users will be able to install any operating system—Linux, for instance—on their Windows tablet, it also allows bad actors with physical access to a machine to install bootkits and rootkits at deep levels. Worse, according to the security researchers who found the keys, this is a decision Microsoft may be unable to reverse.

Webmaster's Commentary: 

Oops there!!!

Aug 13 09:58

Hacker Publishes House Democrats' Personal Information

A hacker has published the personal contact information of nearly every Democratic member of the US House of Representatives on his website.

The hacker known as “Guccifer 2.0” uploaded an Excel file on Friday that contains the cell phone numbers and private e-mail addresses of the Democrats.

Aug 13 09:57

The bandwidth bottleneck that is throttling the Internet

On 19 June, several hundred thousand US fans of the television drama Game of Thrones went online to watch an eagerly awaited episode — and triggered a partial failure in the channel's streaming service. Some 15,000 customers were left to rage at blank screens for more than an hour.

The channel, HBO, apologized and promised to avoid a repeat. But the incident was just one particularly public example of an increasingly urgent problem: with global Internet traffic growing by an estimated 22% per year, the demand for bandwidth is fast outstripping providers' best efforts to supply it.

Aug 13 09:54

Newspapers rethink paywalls as digital efforts sputter

Paywalls were supposed to help rescue newspapers from the crisis of sinking print circulation as readers shifted to getting their news online.

But with a few exceptions, they have failed to deliver much relief, prompting some news organizations to rethink their digital strategies.

Newspapers in the English-speaking world ended paywalls some 69 times through May 2015, including 41 temporary and 28 permanent drops, according to a study by University of Southern California researchers.

Paywalls "generate only a small fraction of industry revenue," with estimates ranging from one percent in the United States to 10 percent internationally, the study in July's International Journal of Communication said.

Aug 13 08:34

Amazon Social Justice Warrior Implicated In ‘Doxing’ Conspiracy

An online cabal of Social Justice Warriors (SJWs), including an “internet abuse specialist” who works for Amazon, have been implicated in a conspiracy to reveal a Twitter user’s personal information before unleashing an online “witch hunt” against them.

Aug 12 20:06

Terrorist-Fighting License Plate Readers Just Mobile Revenue Generators Cruising Poor Neighborhoods

We know what automatic license plate readers are good for: collecting massive amounts (billions of records) of plate/location data housed by private companies and accessed by law enforcement for indefinite periods of time. What we don't know is how effective ALPRs are at fighting/investigating crime. George Joseph at Citylab has done some digging into the effectiveness of license plate readers and hasn't found much that justifies the expense, much less the constant compilation of plate info.

Aug 12 14:01

Amazon Social Justice Warrior Implicated In ‘Doxing’ Conspiracy

An online cabal of Social Justice Warriors (SJWs), including an “internet abuse specialist” who works for Amazon, have been implicated in a conspiracy to reveal a Twitter user’s personal information before unleashing an online “witch hunt” against them.

Aug 12 13:24

SURPRISE: Vancouver Police Are Using Secretive “Stingray” Cellphone Surveillance

By Derrick Broze

Vancouver police have become the first Canadian police force to admit to using a controversial cellphone monitoring tool sometimes known as a Stingray.

Amidst mounting pressure from civil liberties groups, the Vancouver Police have confirmed that they have used a cell site simulator, popularly known as a “stingray,” on at least one occasion. The admission is the first of its kind by a municipal police force in Canada...

Aug 12 12:00

Was This Wartime Technology Really Deployed Against Journalists Inside the DNC?

Technology developed to jam cellphones during the Iraq War may be getting deployed against journalists reporting on protests against the political establishment in the United States.

While police and government surveillance of protests, including monitoring of cellphone use, is well-documented, efforts to block signals at protests remains an oft-repeated, but never proven, rumor.

It may be impossible to definitively prove that authorities are using cellphone “jamming” technology, but journalists working with both mainstream and independent media reported unusual difficulties accessing the internet during recent protests at the gates of the Democratic National Convention, consistent with the effects this very real technology could have.

Webmaster's Commentary: 

So, THIS is what the DNC thinks about the First Amendment; something to be broken and battered with high tech, if the narrative they are spewing has absolutely no relationship with reality.

Aug 12 11:56

‘War On Drugs Futile In Face Of Dark Web Marketplace,’ Say Campaigners

Britain’s war on drugs is failing, campaigners say, with the online narcotics market soaring in value and police finding themselves seizing 1,000 cannabis plants every day.

Researchers for think tank Rand Europe found the UK has the largest online drugs trade of any European nation, and is second only to the US.

Aug 12 08:58

FLASHBACK - Hillary Clinton camp now paying online trolls to attack anyone who disparages her online 

Many moons ago, David Brock, now the head of a Hillary Clinton Super PAC, used every resource available to ruin the life of Anita Hill and anyone who supported her. He would lie, cheat, and blatantly misrepresent facts if it meant getting Clarence Thomas through the Supreme Court nomination process.

Brock openly admitted it.

Now, it appears Brock, who is no doubt great at what he does, is using his same old tools, but for a new cause in a new technological era.

As head of the Correct The Record Super PAC for Hillary Clinton, David Brock has launched something called Barrier Breakers — an online mob of paid trolls designed to attack any and every person who says one cross word about Hillary Clinton on Facebook, Twitter, Instagram, Reddit, or elsewhere.

Webmaster's Commentary: 

Aug 12 07:55

Linux TCP Flaw allows Hackers to Hijack Internet Traffic and Inject Malware Remotely

The Transmission Control Protocol (TCP) implementation in all Linux systems deployed since 2012 (version 3.6 and above of the Linux kernel) poses a serious threat to Internet users, whether or not they use Linux directly.

This issue is troubling because Linux is used widely across the Internet, from web servers to Android smartphones, tablets, and smart TVs.

Researchers have uncovered a serious Internet flaw, which if exploited, could allow attackers to terminate or inject malware into unencrypted communication between any two vulnerable machines on the Internet.

The vulnerability could also be used to forcefully terminate HTTPS encrypted connections and downgrade the privacy of secure connections, as well as also threatens anonymity of Tor users by routing them to certain malicious relays.

Aug 12 06:39

Thieves can wirelessly unlock up to 100 million Volkswagens, each at the press of a button

Security researchers will demonstrate how crooks can break into cars at will using wireless signals that can unlock millions of vulnerable vehicles.

The eggheads, led by University of Birmingham computer scientist Flavio Garcia alongside colleagues from German engineering firm Kasper & Oswald, have managed to clone a VW Group remote control key fob after eavesdropping on the gizmos' radio transmissions.

The hack can be used by thieves to wirelessly unlock as many as 100 million VW cars, each at the press of a button. Almost every vehicle the Volkswagen group has sold for the past 20 years – including cars badged under the Audi and Skoda brands – is potentially vulnerable, say the researchers. The problem stems from VW’s reliance on a “few, global master keys.”

Aug 11 20:34

US couple sues IP mapping firm over 'digital hell'

A US couple is suing an internet mapping firm for $75,000 (£58,000) after years of "digital hell".

MaxMind matches IP addresses, which are used to connect devices to the internet, to physical locations. It has said these are not meant to be precise.

James and Theresa Arnold say it registered their home as the position of more than 600 million addresses.

They say this has led many people to wrongly believe a host of crimes were committed at the property.

Aug 11 15:00

When A Door Closes, A Window Opens: Closing Silk Road Leads To Surge In Online Drug Sales

Closing the online black market known as the Silk Road was a success for the FBI, but a short-lived one. Three years later, it seems that it did little to deter internet-facilitated drug purchases as new reports found more markets have opened in its place.

Aug 11 13:49

Apple Patents Remote ‘Kill Switch’ For IPhone Cameras

What to do about all those darn videos showing cops murdering people?

They make it much harder for law enforcement to lie about their own actions, and just get everyone all fired up. Why not ask Apple (for starters) to build in a “feature” on a future generation of iPhones that will allow cameras to be disabled remotely?

Aug 11 13:37

What Do They Know That We Don’t? World’s Billionaires Are Stockpiling Cash: “Taking Money Off the Table”

Many of these people literally helped to build the system we all now rely upon, and now they are holding cash, gold and other assets our of fear that stocks will crash and digital instruments of wealth could be undermined:

The world’s billionaires are holding more than $1.7 trillion in cash — the highest amount since one firm began recording the measure in 2010. Because of what they perceive to be growing risks in the economy and world, the world’s 2,473 billionaires are keeping 22.2 percent of their total net worth in cash.

Read more at SHTF

Aug 11 13:17

Pokémon GO Is 'Racist'

A new article from the Urban Institute, a Washington-based community-engagement research organization, calls out Pokémon GO’s failure to break down barriers and reach marginalized groups.

Aug 11 12:34

Clinton Is Fighting the Troll Wars With a Million Dollar Super-PAC Campaign

As the Los Angeles Times reports, a super-PAC called Correct the Record has hired a legion of “former reporters, bloggers, public affairs specialists, [and] designers” to go after anyone online who is critical of Hillary Clinton. And it’s a well-funded effort. According to Correct the Record, it’s “engaged” with roughly 5,000 people online so far.

“It is meant to appear to be coming organically from people and their social media networks in a groundswell of activism, when in fact it is highly paid and highly tactical,” Brian Donahue, chief executive of the consulting firm Craft Media/Digital, told the Los Angeles Times.

Webmaster's Commentary: 

Well, I guess if McDonald's turns you down, a job is a job!

Aug 11 11:24

Newly released Clinton emails shed light on relationship between State Dept. and Clinton Foundation

Judicial Watch, a conservative watchdog group, released 296 pages of emails from the Democratic presidential nominee, including 44 that Judicial Watch says were not previously handed over to the State Department by Clinton. The emails, many of which are heavily redacted, raise questions about the Clinton Foundation's influence on the State Department and its relations during her tenure.

Aug 11 11:23

Dems worried another hacked email trove could surface before November

Democratic Party officials reportedly are bracing for the possibility that another batch of damaging or embarrassing internal emails — the kind that cost the party chairman her job on the eve of the Democratic National Convention — could become public before the November presidential election.

Webmaster's Commentary: 

Maybe the Democratic party will play it safe and drop barbells onto the throats of all their IT people now, to prevent any more leaks! :)

Aug 11 07:40

FBI probe of Clinton's emails prompted by espionage fears, secret letters say

Two secret letters the FBI sent to the State Department have revealed for the first time that the bureau's investigation into Hillary Clinton's private email server, and the classified emails sent through it, stemmed from a so-called "Section 811" referral from the Intelligence Community's Inspector General (ICIG). The ICIG determined that classified, national security information in Clinton's emails may have been "compromised" and shared with "a foreign power or an agent of a foreign power."

Section 811 of the Intelligence Authorization Act of 1995 "is the statutory authority that governs the coordination of counterespionage investigations between Executive Branch departments or agencies and the FBI." A Section 811 referral is a report to the FBI about any unauthorized information that may have been disclosed to a foreign power.

Webmaster's Commentary: 

It is that "something else" I am most concerned with. :)

Aug 11 07:33

Scammers Take Over Popular KickassTorrents ‘Mirror’

The popular KickassTorrents 'mirror' KAT.am is back online. After a brief suspension, the registry re-released the domain name for registration, allowing scammers to pick it up. While the site still appears to be a mirror, it asks people to sign up for an account with a credit card if they want to download something.

Aug 11 07:30

McAfee outs malware dev firm with scores of Download.com installs

McAfee says a software company with more than 50,000 downloads on sites such as Download.com is distributing web browser hijacking and fraud malware.

Researcher Santosh Revankar says Lavians Inc is pushing the Bing.vc browser redirect and home page hijacker which creates seeming problems that the company then attempts to fix at a cost.

The technique is straight out of the black hat fraud handbook and is used by low level and lowly web scum who take advantage of the proliferation of trash software to inject advertisements, and drop all manner of malware on user machines.

Lavians Inc has 19 uploads currently hosted on Download.com and 24 on Brothersoft.com, along with applications on its own site.

Aug 11 06:47

If Two Countries Waged Cyber War On Each Other, Here’s What To Expect

Imagine you woke up to discover a massive cyber attack on your country. All government data has been destroyed, taking out healthcare records, birth certificates, social care records and so much more.

Webmaster's Commentary: 

How about the tax records? Can we blow up those tax records? :)

Aug 10 09:47

SNOPES busted yet again for fabricating total lies in order to cover for Obama’s money laundering crimes

Snopes is widely regarded as one of the most reliable fact-checking and myth-busting resources on the internet. When it comes to urban legends, there’s no website that does a better job of providing evidence as to whether or not stories are fact or fiction than Snopes .

Unfortunately, the same cannot be said when it comes to any political issues. In that realm, Snopes is visibly liberal, constantly taking the side of leftist politicians and actively avoiding the whole truth when it comes to controversies surrounding the Democratic Party. So if you’re getting your “facts” from their website, be prepared to read lie after lie after lie.

Aug 10 09:42

Source of DNC email leak murdered, Wikileaks Julian Assange implies – Offers $20,000 reward

Subscribe now for more! http://bit.ly/1QHJwaK The source of the DNC e-mail leak was murdered, Wikileaks founder Julian Assange Implies. The Whistleblower organization has offered a $20,000 reward for information leading to the conviction of whoever killed Seth Rich, the DNC staffer who was mysteriously murdered shortly after the #DNCLeak. Media analyst Mark Dice has the story. © 2016 by Mark Dice

Aug 10 09:35

Biohybrid Robots Built From Living Tissue Start to Take Shape

By Victoria Webster, Case Western Reserve University

(Activist Post Editor’s Note: We have featured many articles over the years warning about scientific and military developments that were trending toward the merger of robotics with nature, typically in the areas of war and surveillance. Running parallel to this are developments in environmental science and health that employ nanotechnology and biorobotics which are beginning to fundamentally change how we define the natural world...

Aug 10 09:32

Where Does Your Info Come From? Mainstream Media Now Literally Using Robots to Write News

By Claire Bernish

Corporate ownership of 90 percent of media outlets in the United States has made the term ‘mainstream journalist’ quite the oxymoron, but the Washington Post’s newest project eliminates ‘journalist’ from the equation entirely — robots are now writing the outlet’s ‘news.’

Using artificial intelligence technology, the Washington Post is ‘employing’ software to ‘write’ hundreds of news briefs highlighting key information about the Olympic Games in Rio in real-time.

“‘Heliograf,’ which was developed in-house, automatically generates short, multi-sentence updates for readers,” the Post proudly announced Friday, as if the news organization couldn’t predict the collective American jaw-drop at the notion a computer could simply replace a longstanding tradition of actual journalism...

Aug 10 08:35

Microsoft rolls out several new Windows 10 cumulative updates

Microsoft is making a number of fixes and reliability and performance improvements available across a variety of different flavors of Windows 10 via new Cumulative Updates.

Webmaster's Commentary: 

Why didn't Microsoft apply the fixes before releasing Windows 10?

Oh, that's right, the end user is now an unpaid member of Microsoft's quality control department!

Aug 10 08:21

Someone made a smart vibrator, so of course it got hacked

The Internet of Things That Can Be Hacked grows daily. Lightbulbs, trucks, and fridges all have computers inside them now, and all have been hacked by someone. But at least you don’t put those inside your body.

Two years ago, someone had the good idea to put a bluetooth connection inside a vibrator, and the We-Vibe 4 Plus was born. The vibrator can connect with a smartphone app that its makers say “allows couples to keep their flame ignited – together or apart”: that is, it can be controlled remotely, while, say, making a video call.

But at the Def Con hacking conference in Las Vegas, two independent hackers from New Zealand, who go by the handles goldfisk and follower, revealed that the way the vibrator speaks with its controlling app isn’t really secure at all – making it possible to remotely seize control of the vibrator and activate it at will.

Aug 10 08:11

Google explains why Palestine isn't labeled in Maps

It's restoring the labels "West Bank" and "Gaza" after accidentally deleting them.

Webmaster's Commentary: 

Suuuuuuuuuuure it was an accident!

Aug 10 08:08

Copperhead OS: The startup that wants to solve Android’s woeful security

A startup on a shoestring budget is working to clean up the Android security mess, and has even demonstrated results where other "secure" Android phones have failed, raising questions about Google's willingness to address the widespread vulnerabilities that exist in the world's most popular mobile operating system.

"Copperhead is probably the most exciting thing happening in the world of Android security today," Chris Soghoian, principal technologist with the Speech, Privacy, and Technology Project at the American Civil Liberties Union, tells Ars. "But the enigma with Copperhead is why do they even exist? Why is it that a company as large as Google and with as much money as Google and with such a respected security team—why is it there's anything left for Copperhead to do?"

Aug 10 08:00

Internet of Car...rikey what the hell just happened to my car?

Vehicle manufacturers are making many of the same security mistakes as each other, creating scores of vulnerabilities in the process.

Not very reassuringly, half of the vulnerabilities discovered by security researchers at IOActive could result in "complete or partial loss of control" of a vehicle.

IOActive’s study is based on real-world security assessments with the world’s leading vehicle manufacturers, covering three years’ worth of data and active vulnerabilities. An alarming 71 per cent of the vulns uncovered during the research could be exploited without much difficulty, or are almost certain to be exploited.

Aug 10 07:58

Facebook to forcefeed you web ads, whether you like it or not: Ad blocker? Get the Zuck out!

These silos of your personal information don't run themselves for free, folks

Aug 10 07:56

Bungling Microsoft singlehandedly proves that golden backdoor keys are a terrible idea

Microsoft leaked the golden keys that unlock Windows-powered tablets, phones and other devices sealed by Secure Boot – and is now scrambling to undo the blunder.

These skeleton keys can be used to install non-Redmond operating systems on locked-down computers. In other words, on devices that do not allow you to disable Secure Boot even if you have administrator rights – such as ARM-based Windows RT tablets – it is now possible to sidestep this block and run, say, GNU/Linux or Android.

What's more, it is believed it will be impossible for Microsoft to fully revoke the leaked keys.

And perhaps most importantly: it is a reminder that demands by politicians and crimefighters for special keys, which can be used by investigators to unlock devices in criminal cases, will inevitably jeopardize the security of everyone.

Aug 10 07:52

Hitler ‘ransomware’ offers to sell you back access to your files – but just deletes them

The ransomware appears to be a test variant put together by unskilled coders, as a blog post by IT help site Bleeping Computer explains.

“It does not encrypt any files at all. Instead this malware will remove the extension for all of the files under various directories, display a lock screen, and then show a one hour countdown as shown in the lock screen below.

After that hour it will crash the victim's computer, and on reboot, delete all of the files under the [use profile] of the victim,” it adds.

German language text found within an embedded batch file associated with the malware states “Das ist ein Test” (“This is a test”).

Aug 10 07:13

Judicial Watch Uncovers New Batch of Hillary Clinton Emails

Judicial Watch today released 296 pages of State Department records, of which 44 email exchanges were not previously turned over to the State Department, bringing the known total to date to 171 of new Clinton emails (not part of the 55,000 pages of emails that Clinton turned over to the State Department). These records further appear to contradict statements by Clinton that, “as far as she knew,” all of her government emails were turned over to the State Department

Aug 10 06:59

BREAKING=> Julian Assange Suggests Seth Rich – Who Was MURDERED in DC – Was Wikileaks DNC Source!

On July 8, 2016, 27 year-old Democratic staffer Seth Conrad Rich was murdered in Washington DC. The killer or killers took nothing from their victim, leaving behind his wallet, watch and phone.

Shortly after the killing, Redditors and social media users were pursuing a “lead” saying that Rich was en route to the FBI the morning of his murder, apparently intending to speak to special agents about an “ongoing court case” possibly involving the Clinton family.

Webmaster's Commentary: 

Seth Rich was one of five people closely associated with the Clintons in the past six weeks who ‎have died under strange circumstances. His death was officially listed as a robbery, although apparently nothing was stolen and he was about to meet with government officials. The liar & warmonger Hillary, of course, saw to it that she & her people seized the opportunity to make this a "two fer"---they blamed the hacking and leak (which they didn’t want to occur but couldn’t stop) on the Russians (with the help of the corporate media) even as they eliminated a "traitor" in their midst.

Aug 09 18:46

Over half of connected cars are at risk of being hijacked by hackers - with potentially dire consequences

Half of connected cars are at risk of being hijacked by hackers, according to the company that managed to hack a Jeep and steer it off the road last year.

Researchers from cyber security firm IOActive were able to take control of the Chrysler Jeep Cherokee from miles away while it was being driven by Wired reporter Andy Greenberg.

A new report from the company claims that some 51% of connected cars could be at risk of a similar takeover.

What's more, 71% of the security flaws uncovered could be "exploited without much difficulty, or are almost certain to be exploited", according to the report.

Aug 09 15:17

Google In The White House? Assange Warns Of Close Ties Between Hillary Clinton & Internet Giant

During the Green Party convention in Houston, Texas, over the weekend, WikiLeaks founder Julian Assange spoke via video stream.

Aug 09 12:38

WikiLeaks emails expose alcohol industry’s paid campaign to stifle pot legalization

When the good people at Marijuana.com went through the WikiLeaks dump of the DNC emails, they found something unrelated to the trove of damning information on the criminal Hillary Clinton. Within the mountains of email texts, was a paid segment by the Wine & Spirits Wholesalers of America (WSWA), stoking fear within Washington, encouraging politicians to be wary of marijuana legalization.

Aug 09 10:48

Windows 10 Anniversary Update: Watch out for these nasty surprises

Windows 10 users are getting the first major update to the operating system in just under a year, with the release of the Anniversary Update.

But alongside the new features and fixes are some more unwelcome changes, ranging from less control for users to frozen machines.

Here are the main gotchas to look out for, as well as some fixes.

Webmaster's Commentary: 

"Sure there are problems, but doesn't the new logo look great?" -- Microblorch

Aug 09 10:39

Internet Archive posted 10,000 browser-playable Amiga titles – go, play

Seriously, go. Enjoy yourself. It’s Monday. We’ll still be here when you get back. It’s bound to be a long week. The world is coming apart at the seams. Your boss won’t notice if you play a round or two of Bubble Bobble from the comfort of your own browser (Firefox seems to work best on my end).

We can’t vouch for the quality of all of the Amiga titles that were recently posted up on Archive.org, but there sure as heck are a lot of them – 10,000+, by the site’s count, including favorites as Where in the World is Carmen San Diego, King’s Quest and Double Dragon,

Webmaster's Commentary: 

I loved the Amiga. I was a developer and did a lot of code work for some Amiga companies in between film gigs. Memories, memories! :)

Aug 09 09:44

One bug to rule them all: 'State-supported' Project Sauron malware attacks world's top PCs

Two top electronic security firms have discovered a new powerful malware suite being used to target just dozens of high-value targets around the world. The research shows that it was likely developed on the orders of a government engaging in cyber espionage.

The California-based Symantec has labeled the group behind the attack Strider, while Moscow-based Kaspersky Labs dubbed it ProjectSauron. Both are references to J. R. R. Tolkien’s Lord of the Rings, a nod to the fact that the original malware code contained the word “Sauron.”

But behind the playful literary allusions is a powerful piece of software, capable of “harvesting” passwords on entire networks and “modules are designed to perform specific functions like stealing documents, recording keystrokes, and stealing encryption keys from both infected computers and attached USB sticks,” according to Kaspersky.

Aug 09 09:34

VIDEO: OWNED! WIKILEAKS FOUNDER JULIAN ASSANGE TURNS TABLES ON BILL MAHER

Maher promptly launched a red herring at Assange:

Why haven’t we seen anything hacked from the Trump campaign? Obviously we know these came from Russia. And we also know that you do not like Hillary Clinton at all, as does not Vladimir Putin.

Then Maher attempted to poison the well:

It looks like you are working with a bad actor, Russia, to put your thumb on the scale and basically f*ck with the one person who stands in the way of us being ruled by Donald Trump.

Assange – without hesitation – responded with an unexpected question for Maher:

I do notice that a William Maher gave a Clinton-affiliated entity $1 million. Perhaps you would like to comment. Is that you?

Aug 09 09:18

TOOSDAY’S TOON ~~ #PokemonGo BANNED IN IRAN

Pokemon Go Banned in Iran Due To “Security Concerns”

Aug 09 09:16

Google in the White House? Assange Warns of Close Ties Between Hillary Clinton & Internet Giant

Webmaster's Commentary: 

This explains why Google servers are being used to DOS my site!

Aug 09 08:42

Researchers crack open unusually advanced malware that hid for 5 years

Kaspersky researchers estimate that development and operation of the Sauron malware is likely to have required several specialist teams and a budget in the millions of dollars. The researchers went on to speculate that the project was funded by a nation-state, but they stopped short of saying which one.

"The actor behind ProjectSauron is very advanced, comparable only to the top-of-the top in terms of sophistication: alongside Duqu, Flame, Equation, and Regin," the Kaspersky researchers wrote. "Whether related or unrelated to these advanced actors, the ProjectSauron attackers have definitely learned from them."

Aug 09 08:36

Windows 10 Anniversary Update crashing under Avast antivirus update

Intel Skylake drivers + Avast = kernel panic, BSOD

Aug 09 08:35

Brit network O2 hands out free Windows virus with USB pens

The virus infects program files and web files on computers running the following systems: Windows 2000, Windows 95, Windows 98, Windows ME, Windows NT,Windows Server 2003, Windows Vista, Windows XP.

An O2 spokesman said the business had contacted all customers who received the USB and advised them to discard it.

He said: "For any customers that have already used the USB or are concerned, we have a specialist team on hand to support them and guide them through any action they may need to take. We apologise for any inconvenience."

Aug 09 07:39

Facebook bans picture of cancer sufferer posted by widower who lost his wife to ovarian tumour for being too 'suggestive'

Mr Piears launched the Dying for a Cure campaign in March following the death of his 'inspirational' wife.

The initiative aims to highlight his concerns over what he describes as the 'profit-led' approach to drug research.

He paid for a 'boosted Facebook post' on the website to promote the message and encourage users to sign a petition.

The image he used on the site shows a female cancer patient holding up a sign over her bare chest that reads: 'UK Governments: The profits on cancer drugs are killing us.'

However on July 8 he received a message from Facebook that said: 'Your advert wasn't approved because it doesn't follow our Advertising Policies by featuring an image containing excessive amounts of skin or suggestive content.

Aug 08 12:22

GOOGLE IGNITES INTERNATIONAL OUTRAGE AFTER WIPING PALESTINE OFF THE MAP, REPLACING IT WITH ISRAEL

Palestine – Internet giant Google has come under fire from around the world this week, after removing the name Palestine from Google Maps and replacing it with Israel. Interestingly, international mainstream corporate media has completely blacked out any coverage of the incident or the international outrage it has sparked.

Webmaster addition: If you search for "Palestine" in Google Earth, it takes you to the Atlantic Ocean off the west coat of Africa! As a side note, many of the hack attacks on my server come from Google's IP addresses!

Aug 08 11:43

You know those new chips in your credit card? They’re failing you miserably

Americans have spent much of 2016 lamenting the addition of chips into their credit and debit cards. In exchange for the extra few moments consumers spend checking out, however, they are promised enhanced security to protect their accounts.

Aug 08 11:39

Amazon Echo is the ultimate spy device that records everything you say

The world’s largest retailer is under fire for releasing a device that, according to some experts, is little more than a spying tool for government surveillance.

Aug 08 11:13

Erik Prince: Hillary Clinton ‘Very Likely Caused’ Iranian Nuclear Scientist’s Death

Bannon asked if Hillary Clinton should be considered complicit in the execution of Iranian nuclear physicist Shahram Amiri, on charges of spying for the United States, who was discussed in some of the emails on Clinton’s unsecured private server.

“The physicist that came out, he defected, he was a treasure trove of information, but the CIA and the Clinton State Department botched it while he was in the States, left him pretty much unsupported,” Prince replied, calling it a major mistake to leave Amiri’s family in Iran.

“The second time he calls home, the Iranian intelligence service answers the phone. Undoubtedly, they leveraged him. When the guy talks about psychological trauma here in the United States, I’m sure it’s because the Iranians were telling him all the things they were going to do to his family if he didn’t come home,” said Prince.

Aug 08 09:13

'Sauron' spyware attacking targets in Belgium, China, Russia and Sweden

A previously unknown hacking group called Strider has been conducting cyber espionage against selected targets in Belgium, China, Russia and Sweden, according to Symantec.

The security firm suggested that the product of the espionage would be of interest to a nation state's intelligence services.

Strider uses malware known as Remsec that appears primarily to have been designed for espionage, rather than as ransomware or any other nefarious software.

Aug 08 08:00

My Job Churning Out The Garbage Behind Clickbait Titles

You're not going to fall for this internet misinformation circle jerk. You want real talk, so you strap on your Comments Codpiece and scroll straight to the bottom of the article. Guess what? Those people might not be legit either.

"There are services that will pay people to post on your blog or forum, very much like paying kids to come to your birthday party and pretend to be your friend," Jen says. "The one I used was called Postloop. I loved them because they paid reliably and you could cash out immediately instead of once a week. So if you were desperate to make a little extra to cover a bill or something, they were easy. The way [it] works is you sign up and choose some topics you might be interested in. They match you with forums, which you must post in, meeting a certain frequency and post length requirement so you don't look too spammy. Assuming you fit within their guidelines, you make a meager amount of money from the chatting."

Aug 08 07:50

Either Give Fair Coverage Or We Pull Your FCC Licenses!

Republicans are used to unfair reporting from the news media because the press in the US is mostly Jewish owned and both pro-Israel and pro-Wall Street. But this year has been rather astounding. When Bernie Sanders supporters converged on Debbie Wasserman Schultz to blame her for rigging the primaries for Hillary, MSNBC said 99% applauded the former head of the DNC. I saw the raw video of Sanders supporters booing her and yelling, “Bernie. Bernie.” The TV audience never saw the anti-Hillary protesters outside the convention center chanting, “Lock her up! Lock her up!”

Aug 08 07:18

Executed Iranian Scientist Mentioned in Clinton's Privately-Stored Emails

Recently executed Iranian nuclear scientist Shahram Amiri was mentioned in emails exchanged between US Democratic Party candidate Hillary Clinton and her advisers while she was secretary of state and stored on a private server, US Senator Tom Cotton said.

Aug 08 06:05

Clinton's private server held emails about nuclear 'spy' executed in Iran: Aides discussed scientist 'friend' and his decision to return home after defecting to the U.S. for $5m

Hillary Clinton used her private email server to discuss details of the Iranian nuclear scientist who has executed for giving information to the CIA.

Shahram Amiri, who was hanged on Sunday for 'revealing secrets to the enemy', was in the US and allegedly informing on Tehran's extensive nuclear program during the Democrat's controversial reign as Secretary of State.

At the time she stressed researcher had been there of his 'own free will' and was described as 'our friend' in correspondences.

...

Amiri worked for a university affiliated with Tehran's extensive nuclear program.

He is said to have had an in-depth knowledge of Iran's nuclear program and was kept at a secret location after returning to the country.

According to CBS, he told officials in interviews he was being held against his will by Saudi and U.S. spies.

But American officials said he was set to receive millions for informing.

Aug 08 05:47

Android bug fear in 900 million phones

Serious security flaws that could give attackers complete access to a phone's data have been found in software used on tens of millions of Android devices.

The bugs were uncovered by Checkpoint researchers looking at software running on chipsets made by US firm Qualcomm.

Qualcomm processors are found in about 900 million Android phones, the company said.

However, there is no evidence of the vulnerabilities currently being used in attacks by cyberthieves.

Aug 07 23:51

Iranian Scientist Who Provided U.S. with Info Executed Today – He Was Mentioned in Hillary Email

Hillary Clinton recklessly discussed, in emails hosted on her private server, an Iranian nuclear scientist who was executed by Iran for treason, Sen. Tom Cotton, R-Ark., said Sunday.

Read more: http://therightscoop.com/iranian-scientist-who-provided-u-s-with-info-...

Aug 07 18:59

Windows 10 Anniversary Update is borking boxen everywhere

Microsoft's response: Have you tried uninstalling it and installing it again?

Aug 07 15:43

Princeton Professor Shows How Easy It Is To Hack An Election In Just 7 Minutes

By Claire Bernish

A professor from Princeton University and a graduate student just proved electronic voting machines in the U.S. remain astonishingly vulnerable to hackers — and they did it in under eight minutes.

In fact, Professor Andrew Appel and grad student Alex Halderman took just seven minutes to break into the authentic Sequoia AVC Advantage electronic voting machine Appel purchased for $82 online — one of the oldest models, but still in use Louisiana, Pennsylvania, New Jersey, and Virginia...

Aug 07 12:53

PLC-Blaster Worm Targets Industrial Control Systems

Security researchers at Black Hat USA described a proof-of-concept worm that targets weaknesses within automated industrial control systems used to manage critical infrastructure and manufacturing. The worm, according to OpenSource Security, has the capability to autonomously search for and spread between networked programmable logic controllers (PLCs).

Webmaster's Commentary: 

Shades of STUXNET!

Aug 07 12:52

Windows 10 Anniversary Update deleting Linux partitions?

Many folks who are running Windows 10 on their computers, usually have a Linux partition installed as well. Regular folks do it, developers do it, and then the few who prefer to use Linux but are forced to use Windows. But here’s the thing, it would appear as if the Windows 10 Anniversary Update is removing Linux partition.

Alan Pope, Ubuntu Community manager at Canonical, took to Twitter recently to complain that he has seen several reports of folks claiming the Windows 10 Anniversary Update has been deleting partitions containing Linux operating systems.

Webmaster's Commentary: 

"You VILL use our operating system, dummkopf. UND YOU WILL LIKE IT!!!!!!!"

Aug 07 12:23

Cotton: Clinton discussed executed Iranian scientist on email

Hillary Clinton recklessly discussed, in emails hosted on her private server, an Iranian nuclear scientist who was executed by Iran for treason, Sen. Tom Cotton, R-Ark., said Sunday.

...

The scientist shows up in Clinton's emails back in 2010, just nine days before he returned to Iran.

Webmaster's Commentary: 

And now he has been executed! Did Iran learn he was a spy for the US from Hillary's weak private server?

Aug 07 12:19

Jeanine SLAMS James Comey

Aug 07 10:42

The First "Bitcoin Bail-In": All Bitfinex Users To Lose 36% In "Shared Loss" After Historic Hack

Adding insult to injury for those who "held" their BTC at the hacked exchange, Bitfinex announced it would pull a page right out of Europe's bank resolution mechanism, saying that all of its users will lose 36% of their deposits after it concluded its review the massive hack, in what is set to be the first ever "bitcoin bail-in."

Aug 07 09:04

Trust Hillary With Nuclear Launch Codes? She Can’t Even Secure Her Emails…

No one seems to be stating the obvious: The email hacking has taken place on Obama’s watch. In addition, why is it that whoever did the hacking were able to find the so-called missing emails but the FBI and other agencies could not?

The Democrats are in panic mode. They’re blaming Trump and the Russians which is just another way of blaming Obama. Trump didn’t hack the servers. His masterful press conference the other day made fools of the media, Obama, and Hillary. Why would anyone want this woman as President when she left the door open to a seemingly secure server? Maybe she’ll do the same thing with the nuclear launch codes.

Aug 07 07:54

US think-tank suggests cyber-attacks on Moscow Metro, St. Pete power grid, RT offices

Page 12, paragraph 7 and I quote: “Poland should announce that it reserves the right to deploy offensive cyber operations (and not necessarily in response just to cyber attacks). The authorities could also suggest potential targets, which could include the Moscow metro, the St. Petersburg power network, and Russian state-run media outlets such as RT.”

Aug 06 09:38

Commentary: The world's best cyber army doesn’t belong to Russia

National attention is focused on Russian eavesdroppers’ possible targeting of U.S. presidential candidates and the Democratic Congressional Campaign Committee. Yet, leaked top-secret National Security Agency documents show that the Obama administration has long been involved in major bugging operations against the election campaigns -- and the presidents -- of even its closest allies.

The United States is, by far, the world’s most aggressive nation when it comes to cyberspying and cyberwarfare. The National Security Agency has been eavesdropping on foreign cities, politicians, elections and entire countries since it first turned on its receivers in 1952. Just as other countries, including Russia, attempt to do to the United States. What is new is a country leaking the intercepts back to the public of the target nation through a middleperson.

Aug 06 00:58

Fighting Clickbait: Facebook Changes Its News Feed Algorithm Again

Facebook introduced improvements to its news feed algorithm to minimize the number of clickbait headlines published on the network.

In an article from its official newsroom blog page, the social network stated it wants more authentic communication on its website and that it continues to work hard to give more place for stories that are considered genuine by its users.

To deal with the matter, FB is changing the News Feed by updating how the system recognizes phrases which are frequently used in clickbait headlines. Thousands upon thousands of headlines are labeled as clickbait if the following key points are found:

  • If the headline consists of facts needed to understand what the content material of the article is.
Aug 05 16:48

Getting Ready For ‘Black Hat’ Global Hacker Conference: Leave All Devices At Home

Some of the highest profile hackers and cyber-security specialists have converged on Las Vegas for the Black Hat hacker conference.

Aug 05 14:30

CGI's StormyOne How To Defeat Vote Fraud, Or, Silent Death of the TruVote System

"TruVote allows voters to touch their candidates' names on a computer screen and receive receipts of their vote at the end of the process. They can then go to a Web site, punch in their voter validation number and make sure their vote was recorded." (The Tennessean.com, 14 March 2004).

Aug 05 12:33

This Company Has Built a Profile on Every American Adult

Forget telephoto lenses and fake mustaches: The most important tools for America’s 35,000 private investigators are database subscription services. For more than a decade, professional snoops have been able to search troves of public and nonpublic records—known addresses, DMV records, photographs of a person’s car—and condense them into comprehensive reports costing as little as $10. Now they can combine that information with the kinds of things marketers know about you, such as which politicians you donate to, what you spend on groceries, and whether it’s weird that you ate in last night, to create a portrait of your life and predict your behavior.

Aug 05 09:54

FLASHBACK - First "Shocking" Deposition In Clinton Email Case Reveals She Did Not Use A Password

He was asked why he had proposed this solution, and he said it was “For ease of access” and, “as far as I knew, there was no requirement for her to be connected to our system” (even though he had earlier said that her having an email address assigned to her in the State Department’s system, the OpenNet system, was “required”). He said that the “ease of access” would be because of there being “fewer passwords.”

He was asked whether doing things this way was necessary in order for her to be able to access the Internet from the State Department, and he said, ”the Internet is available” to employees at the office, just as anywhere.

He was asked about the inconvenience of the State Department’s passwords system, and he said that he eliminated her need for any passwords:

A: She wouldn’t have had a password.
Q: So the computer would have just been open and be able to use without going through any security features?
A: Correct.

Aug 05 09:53

Clinton Campaigners Use Pokemon Go to Literally “Lure” Voters

By Tony Cartalucci

Some could have been excused for dismissing initial qualms surrounding the GPS-based augmented reality game, Pokemon Go. The game has swept the world, but its development is surrounded by disturbing connections between its developer Niantic, its former parent company Google, and the US State Department.

But while many before could only speculate as to the reason the US State Department may have been interested in developing such a game, it appears now there is at least a partial answer...

Aug 05 09:10

Hackers turn to dodgy ads as malvertising risk increases by 400 per cent

THE USE OF DODGY AD CAMPAIGNS, otherwise known as malvertising, increased by a whopping 400 per cent during the first six months of 2016, according to security company RiskIQ.

Malvertising relates to malware-riddled adverts served usually on dodgy websites that can infect a user's machine if they visit the site. People are often tricked into visiting such sites via phishing emails or spam on social media sites.

RiskIQ logged 1.7 million malvertising-related incidents between January and June, compared with just 368,000 in the same period in 2015. The 2014 figure was 250,000, underlining the dramatic growth over the past two years.

Aug 05 09:04

Washington Post to use robo-reporters to write Olympics news

THE WASHINGTON POST, Amazon founder Jeff Bezos' own media plaything, is planning to use artificial intelligence (AI) software to generate news reports and populate Twitter feeds during the Olympics.

The software will produce real-time news reports that will automatically end up on the newspaper's website and Twitter feeds.

Aug 05 08:50

Ransomware has left almost 10 per cent of UK firms 'unable to operate'

MORE THAN HALF of UK businesses have been hit by ransomware, according to security outfit Malwarebytes, and almost 10 per cent were left "entirely unable to operate" as a result.

Malwarebytes surveyed 540 CIOs, CISOs and IT chiefs at organisations with an average headcount of 5,400 in the UK, US, Germany and Canada. Around 40 per cent have been affected by ransomware and a third lost revenue as a result.

The majority of ransomware attacks come via a single end point, and 46 per cent begin, unsurprisingly, with a dodgy email.

What’s more, the crooks are clearly reaping the rewards of such attacks as 40 per cent of all firms pay the ransom to get the data unlocked.

Aug 05 08:38

Amazon Echo is the ultimate spy device that records everything you say

"In many ways the Echo is a law enforcement dream," writes Matt Novak for Paleo Future, a division of Gizmodo. Novak filed a Freedom of Information Act (FOIA) request with the FBI back in March to find out if the federal agency had ever wiretapped an Amazon Echo, to which the agency responded that it could "neither confirm nor deny" – essentially an admission of guilt.

"Years ago agencies like the FBI would need to wiretap a phone conversation or place bugs inside homes, practices that can be cost prohibitive and labor intensive. Today, you just need some software to tap into a device's microphone. And if that device is 'always listening' for a command, all the better for someone who wants to hear what's going on."

Aug 05 08:23

WATCH: US Marines Are Getting Land Drones With Heavy Machine Guns and Tiny UAVs

The US Marine Corps has spent years developing multiple unmanned combat robots, and last month it took them for a test drive.

Aug 05 08:12

FBI SEEKS 'SECRET' CONTROL OF SMARTPHONES

The FBI wants the ability to surreptitiously turn your smartphone into a video- and audio-recording device without your knowledge, and it is calling on the high-tech industry to supply it with an app to perform those surveillance functions.

Webmaster's Commentary: 

My understanding is that they already have this capability.

Aug 05 07:35

Bahrain's internet shutdown marks a 'new form of information control'

On July 23rd, people in the village of Duraz, Bahrain began having serious internet problems — mobile networks ground to a halt and landline connections were unusable. The outages continued for nearly three weeks, occurring from 7PM to 1AM every night, and they began just three days after residents took to the streets of Duraz in peaceful protest against the government. Bahrain's three telecoms offered no explanation for the localized blackout, saying only that they were working to fix it, but a new report suggests that it was ordered by the government, in what researchers call "a new form of information control."

Aug 05 07:31

Google slammed for removing Palestine from its maps

The Palestinian Journalists’ Forum has denounced Google for deleting the name of Palestine from its maps and replacing it with Israel.

In a statement released yesterday, the forum said Google’s decision to remove Palestine from its maps on 25 July “is part of the Israeli scheme to establish its name as a legitimate state for generations to come and abolish Palestine once and for all.”

“The move is also designed to falsify history, geography as well as the Palestinian people’s right to their homeland, and a failed attempt to tamper with the memory of Palestinians and Arabs as well as the world.”

The forum said the move was “contrary to all international norms and conventions”, stressing that Google should back track on its actions.

Aug 05 07:26

Hackers unleash smart Twitter phishing tool that snags two in three users

Just. Don't. Click. On. Dodgy. ShortURLs. People.

Aug 04 18:36

Very peed off: Ohio urologists stay zipped after embarrassing leak

150GB of patient, internal files stolen? You gotta be kidney me – no, urine for a shock

Aug 04 15:05

Police: Parking in Newport Beach, CA Makes You Part of a Criminal Investigation

By Mike Maharrey

If you park your car in Newport Beach, police will likely scan your license plate with an automated license plate reader (ALPR). According to police, this automatically makes you the subject of a criminal investigation.

In an effort to find out what police do with all of the data they collect using automatic license plate readers (ALPRs), local activist Mike Glenn filed an open records request. The police refused to release the information...

Aug 04 14:53

Rikers Island Inmate Amazes Facebook With Livestream From Cell, Shows Off Improvised Knife

A Rikers Island inmate livestreamed his life behind bars at one of America’s most notorious prisons. He showed off his cell, food and even a self-made weapon to Facebook, in a video that failed to attract management’s attention.

Aug 04 13:16

POLICE GET FACEBOOK TO KILL LIVESTREAM OF STANDOFF WHICH ENDED WITH SUSPECT BEING SHOT TO DEATH

A 23-year-old woman, and mother of a 5-year-old child, is dead. She was killed by police officers who came to serve a warrant for failure to appear charges stemming from a March 11th traffic stop. That this ever escalated to the point where bullets started flying is incomprehensible. Then again, much of what the woman, Korryn Gaines, did was incomprehensible. Gaines apparently considered herself a "sovereign citizen," which meant she chose not to recognize whatever laws she felt weren't worth following -- like registering her vehicle, insuring it, and equipping it with valid plates. Instead, she chose to make plates of her own out of cardboard that made some sort of statement about her sovereign citizen status. The traffic stop on March 11th escalated into an altercation with officers, resulting in more charges being added to the traffic violations.

Aug 04 09:51

Is Creating “Superhumans” the Next Arms Race?

By Nicholas West

The very nature of any arms race is a study in one-upmanship that is presumed to be necessitated by that which came before. A perfect current example is the global drone arms race. But what happens when a country starts tinkering with genetics?...

Aug 04 09:51

Hillary Clinton Exposed: Unfit for security clearance

Aug 04 08:04

They're back! Car hackers take control of Jeep’s steering and braking

Charlie Miller and Chris Valasek show how an attack can take control of steering, press the gas pedal and even kill the brakes while the vehicle is driving at high speeds

Webmaster's Commentary: 

Is that how Michael Hastings was killed? (And boy am I glad I drive a 17 year old car!!!!)

Aug 04 07:46

Does dropping malicious USB sticks really work? Yes, worryingly well…

Good samaritans and skinflints beware!

Plugging in that USB stick you found lying around on the street outside your office could lead to a security breach.

This is no secret, of course. We have all (hopefully) been aware of the dangers of inserting an unknown USB device into our computers for some time. Heck, the technique has even made it into the Mr Robot TV series.

But what may not be widely known is just how successful the tactic can be for allowing hackers to compromise your computer systems.

Aug 04 07:34

Intel's smartwatches are so hot right now – too hot: Basis Peak recalled for skin burns, blistering

Intel has recalled every single one of its Basis Peak smartwatches – as well as urging people to stop using them – because they can become dangerously hot.

Chipzilla has told everyone who bought a Peak to send back the watch along with any and all accessories for a full refund. Keeping it is not an option: by the end of the year, Intel will switch off its Peak cloud services, which the devices synchronize to, rendering the wrist-puters useless.

Aug 04 07:33

Forget card skimmers, chip-card shimmers will be your next nightmare

America's belated move to EMV (Europay, MasterCard and Visa) chip-equipped cards won't be the panacea some had hoped. As it turns out, the cards are just as easy to clone as their magnetic stripe predecessors.

At the Black Hat 2016 security conference in Las Vegas this week, engineers from Rapid7 demonstrated how a few small pieces of electronics could be used to stage a man-in-the-middle attack against an ATM.

The shimmer device is so named because it is inserted in the card slot like a shim, and it then takes a snapshot of the transaction data as a request for cash is processed.

Aug 04 07:29

Classic Shell, Audacity downloads infected with retro MBR nuke nasty

Classic Shell and Audacity downloads were booby-trapped with an old-school software nasty this week that knackered victims' Windows PCs.

Hackers were able to inject some retro-malware into the popular applications' installers hosted on fosshub.com, an official home for Classic Shell and Audacity releases among other software projects.

When victims fetched the tainted downloads and ran them, rather than install the expected app, the computer's Master Boot Record (MBR) was replaced with code that, during the next reboot or power on, displayed a cheeky message and prevented the machine from starting up properly. The drive's partition table was also likely damaged.

Aug 04 06:45

EX CIA Agent Pissed at James Comey! Undercover CIA Will Hurd Confronts FBI Director

Aug 04 06:31

UPDATE - VIRTUAL 9-11: Will the US & Israel Hack US Computers and Falsely Blame It On Iran or Syria or Russia or China (or at least to stop us saying bad things about Hillary)?

Such a cyber false-flag also gives the US Government the excuse to take total control of the internet so that those pesky truth-seeking bloggers don't give the slaves uppity ideas that this is just another war-starting hoax like the attack on the USS Liberty or 9-11 or the Boston bombing. At the very least, the government could return the dissemination of information back to the sole monopoly of the corporate media, so the independent media stops reminding the voters of Hillary Clinton's crimes and corruptions!

Optional Banner: 
WRH Exclusive
Aug 03 20:51

Comcast wants to sell your Web history to advertisers

Did you know that in some parts of the country, Internet providers such as AT&T offer a special deal on broadband prices? The plans lower your monthly payments, but there's a catch: To qualify for them, you have to agree to let the carrier track your Web history, search activity and other valuable behavioral data that can be used for advertising purposes.

Now, Comcast is telling regulators it wants the flexibility to offer these types of plans, too. In a meeting Monday with the Federal Communications Commission, officials from the cable company argued that it and other Internet providers shouldn't be prohibited from trading discounts for data.

Aug 03 20:43

New attack steals SSNs, e-mail addresses, and more from HTTPS pages

The HTTPS cryptographic scheme protecting millions of websites is vulnerable to a newly revived attack that exposes encrypted e-mail addresses, social security numbers, and other sensitive data even when attackers don't have the ability to monitor a targeted end user's Internet connection.

The exploit is notable because it doesn't require a man-in-the-middle position. Instead, an end user need only encounter an innocuous-looking JavaScript file hidden in an Web advertisement or hosted directly on a webpage.

Aug 03 16:54

Neural “Smart” Dust Connects Brain and Computer (Wireless Mind Control)

By Nicholas West

Neural Dust – “Smart Dust” – has entered the mainstream via the Independent’s article: “Tiny implant could connect humans and machines like never before.” It is implied to be a new technology that can wirelessly link a human brain to a computer via the implantation of a device the size of a grain of sand. However, I wrote about this in 2013, drawing upon research from many years previous. This invention is clearly nothing new; but when the mainstream media begins highlighting something that is literally wireless mind control, it’s worth taking note...

Aug 03 10:01

Global surveillance industry database helps track big brother worldwide

Offering a groundbreaking glimpse of the global surveillance industry—the tools it employs, the extent of its reach, and the accountability it largely evades—human rights watchdog organization Privacy International on Tuesday released a searchable database and accompanying report that track Big Brother worldwide.

Aug 03 09:18

Almost half of US businesses hit by ransomware, says study

The threat of ransomware is becoming widespread among corporations, with almost half of U.S. businesses suffering an attack from the nasty form of malware recently, according to a new survey.

Security firm Malwarebytes sponsored the study, which found in June that 41 percent of U.S. businesses had at least encountered between one to five ransomware attacks in the previous 12 months.

Another 6 percent saw six or more attacks.

The study surveyed corporations in the U.S., Canada, U.K. and Germany to gauge how ransomware affected their operations.

Aug 03 09:16

GLOBAL SURVEILLANCE INDUSTRY DATABASE HELPS TRACK BIG BROTHER WORLDWIDE

"Without instruments capable of restricting transfers and shining a light on the companies and the trade, surveillance technologies developed in and traded from the West will further undermine privacy and facilitate other abuses," says report. (Photo: Alan Levine/flickr/cc) Offering a groundbreaking glimpse of the global surveillance industry—the tools it employs, the extent of its reach, and the accountability it largely evades—human rights watchdog organization Privacy International on Tuesday released a searchable database and accompanying report that track Big Brother worldwide.

Aug 03 08:32

Microsoft won't fix Windows flaw that lets hackers steal your username and password

The flaw is widely known, and it's said to be almost 20 years old. It was allegedly found in 1997 by Aaron Spangler and was most recently resurfaced by researchers in 2015 at Black Hat, an annual security and hacking conference in Las Vegas.

The flaw wasn't considered a major issue until Windows 8 began allowing users to sign into their Microsoft accounts -- which links their Xbox, Hotmail and Outlook, Office, and Skype accounts, among others.

Overnight, the attack got larger in scope, and now it allows an attacker to conduct a full takeover of a Microsoft account.

Webmaster's Commentary: 

20 years old? Is it a bug, or one of those ubiquitous NSA back doors?

Aug 03 07:35

BOMBSHELL: Khizr Khan linked to Hillary’s email server!

What’s perhaps interesting is that also on this website that he has now deleted, Khan revealed that he spent nearly a decade working for the mega-D.C. law firm Hogan & Hartson—now Hogan Lovells LLP—which connects him directly with the government of Saudi Arabia and the Clintons themselves. Saudi Arabia, which has retained the firm that Khan worked at for years, has donated between $10 million and $25 million to the Clinton Foundation. Hillary Clinton, despite the repeated urging of Trump, has refused to return the Clinton Cash money to the Saudis. What’s more, Hogan Lovells also did Hillary Clinton’s taxes—and helped acquire the patents for parts of the technology she used in crafting her illicit home-brew email server that the FBI director called “extremely careless” in handling classified information.

Aug 03 07:33

Bitcoin price plummets after exchange loses $65 million to hackers

The price of the virtual currency bitcoin fell sharply Tuesday after Hong Kong-based digital-currency exchange Bitfinex said it was hacked, resulting in the possible theft of $65 million worth of bitcoin.

Aug 03 07:23

FLASHBACK - AP Fact Check: Hillary Clinton Email Claims Collapse Under FBI Investigation

Key assertions by Hillary Clinton in defense of her email practices have collapsed under FBI scrutiny.

The agency's yearlong investigation found that she did not, as she claimed, turn over all her work-related messages for release. It found that her private email server did carry classified emails, also contrary to her past statements. And it made clear that Clinton used many devices to send and receive email despite her statements that she set up her email system so that she only needed to carry one.

Webmaster's Commentary: 

Despite this, Hillary over last weekend insisted she had not only been honest with Congress and the people about the email server! Even the staunchest Hillary supporters in the media pointed out that this was a lie. Hillary then tried to backtrack, saying that her recollection was that James Comey said she was truthful, then her campaign backtracked yet again saying that Hillary didn't really lie; it was just her honest opinion that she voiced!

We understand just fine!

Click for larger image to print and share.

Aug 02 19:09

Your battery status is being used to track you online

A little-known web standard that lets site owners tell how much battery life a mobile device has left has been found to enable tracking online, a year after privacy researchers warned that it had the potential to do just that.

Aug 02 15:16

America’s Electronic Voting Machines Are Scarily Easy Targets

By now states have had plenty of warning since a damning report by the Brennan Center for Justice about our voting machine vulnerabilities came out last September. Surely matters must have improved since then. -- Well, not exactly. In fact, not really at all...

Aug 02 14:23

FBI Agent Caught Spying For China Draws Comparisons to Hillary ( China gave millions in “speaking fees” to Clinton Foundation)

An FBI employee pled guilty in court for passing along sensitive information to the Communist Chinese government even as known Chinese agent Hillary Clinton is allowed to continue running for president.

Aug 02 12:27

Whistleblower’s Stunning Claim: “NSA Has All Of Hillary’s Deleted Emails, It May Be The Leak”

It would be truly ironic if instead of the Democrat hack originating at the Kremlin, as the media and Hillary have already concluded is the case without any actual proof, the true source of Hillary’s hacked and leaked emails is none other than an unknown crusader at the NSA itself, another “Snowden”, determined to see the downfall of Clinton after her actions exposed national security to unprecedented risk for years. Alas, we will never know: as we reported yesterday, it is the NSA that has been tasked with determining if Putin was responsible. We doubt it will find anything, however, we are certain that it won’t find itself to be the culprit.

Aug 02 11:36

What to do about lawless government hacking and the weakening of digital security

In our society, the rule of law sets limits on what government can and cannot do, no matter how important its goals. To give a simple example, even when chasing a fleeing murder suspect, the police have a duty not to endanger bystanders. The government should pay the same care to our safety in pursuing threats online, but right now we don’t have clear, enforceable rules for government activities like hacking and “digital sabotage.” And this is no abstract question—these actions increasingly endanger everyone’s security.

Aug 02 11:26

Windows 10 Anniversary Update: This design needs a dictator

Windows 10 doesn’t look very "Swiss" at all, though. In fact, its predecessors, Windows 8 and 8.1 and (especially) Windows Phone were much more "Swiss": spare, bold and confident. By contrast, Windows 10 looks a nervous Nellie. The wireframe glyphs which were chosen because they scale better across devices are much harder to identify correctly.

Webmaster's Commentary: 

Beware of geeks bearing glyphs!

Aug 02 09:36

HILLARY THE SPY? - UPDATED INFO!

Let us start with an historical fact. Treason and betrayal by the highest levels is a common feature of history, whether it is Judas vs Jesus, Brutus vs Julius Caesar, Benedict Arnold, the Rosenbergs, Jonathan Pollard, Aldrich Ames, Robert Hanssen. It is just a fact of life. It does happen.

Back in 1996, when Bill Clinton was running for re-election, he authorized the transfer of highly sensitive technology to China. This technology had military applications and allowed China to close the gap in missile performance with the United States. The transfers were opposed and severely criticized by the Defense Department.

Webmaster's Commentary: 

With WikiLeaks releasing over 20,000 Hillary emails clearly marked classified, it is time for a repost!

Optional Banner: 
WRH Exclusive
Aug 02 09:27

Court Rules Whole Site Blocking Justifiable in Piracy Fight

Forcing ISPs to block entire websites to tackle Internet piracy is justifiable, a court in India has ruled. The decision by the Delhi High Court means that copyright holders will not have to target specific URLs when attempting to stop infringement on sites that are involved in widespread piracy.

Aug 02 09:25

Madame President Clinton’s Coming War on the Blogosphere, and Your Countermeasures

Now that Hillary (“Hitlery”) Rodham Clinton (HRC) has received the Democratic Party nomination for president, there is a strong likelihood that she will win the election in November and then be enthroned as president in January of 2017. I predict that she willwaste no time in launching an onslaught of punitive new policies via executive orders, presidential memoranda, and policy directives promulgated through her cabinet and Federal agencies to eviscerate our Constitutional rights (most notably the 1st and 2nd Amendments). A key goal this campaign will be silencing dissent in the alternative press and the American blogosphere. Given HRC’s history in government “service”, her outlook on life, her socialist agenda, and her vindictiveness, I anticipate that any or all of the following measures will be undertaken by the HRC Administration:

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA