COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Jul 27 07:06

Did the Russians really hack the DNC or is this another Sony Pictures moment? You decide

Establishing proof of a hacker's identity is notoriously difficult – indeed impossible in some cases. People can connect through systems all over the world and use tools and tricks to hide their origins and motivations. Using a Russian VPN service shouldn't necessarily mean an operation was carried out in or for Russia.

There are worrying similarities between this case and the supposed hacking of Sony by the North Koreans. Many in the security industry feel that there's little proof that Best Korea staged that hack, other than the US government saying so and, as we've seen in the case of missing weapons of mass destruction in Iraq, those sorts of claims are not bulletproof evidence.

Meanwhile, Guccifer 2.0 claims he is a lone hacker with no Russian government ties; ThreatConnect thinks that's a classic denial and deception tactic to throw people off the scent.

Jul 27 06:42

Judicial Watch Goes to Court On Clinton Testimony

JW sought Hillary Clinton’s testimony a few weeks ago after my attorney colleagues deposed seven former Clinton top aides and current State Department officials, including top Clinton aides Cheryl Mills and Huma Abedin. Judicial Watch’s legal team also took the testimony of IT official Brian Pagliano, who asserted his Fifth Amendment right not to testify during the Judicial Watch deposition.

Judge Sullivan ordered Monday’s hearing after requiring the State Department’s and Hillary Clinton’s lawyers to respond to our request for permission to depose Clinton; the Director of Office of Correspondence and Records of the Executive Secretariat (“S/ES-CRM”) Clarence Finney; and the former Director of Information Resource Management of the Executive Secretariat (“S/ES-IRM”) John Bentel.

In the oral arguments before Judge Sullivan, Judicial Watch attorney Michael Bekesha repeatedly put the issue in perspective:

Jul 27 05:44

Trump Not Included in Google Search for 'Presidential Candidates'

Google is up to their old tricks.

If you search "presidential candidates," all that shows up is Hillary Clinton, Bernie Sanders who is no longer in the race and Green Party candidate Jill Stein.

Donald Trump, according to Google, is not a presidential candidate.

Jul 26 15:32

FLASHBACK - The Real Email Question: Did Hillary Clinton Sell US Secrets?

While the media is focusing your attention on the shiny object that is her email server, the real story is not being told. The circumstantial evidence indicates that Hillary Clinton, or members of her inner circle with her connivance, purloined highly classified US intelligence and either sold it, traded it, or used it for personal gain. This is not a conspiracy theory and it is not hyperbole. Stick with me for a moment.

Jul 26 15:32

You will use Cortana, Microsoft says

Surprise, surprise. If things remain as they are, Windows 10 users who upgrade to the Anniversary Update won't be able to turn off Cortana anymore using the Cortana settings.

If you compare the start menu settings of Cortana of the current version of Windows (version 1511) with those of the Anniversary Update (version 1607) you will notice that Cortana's off switch is no longer available.

...

If you cannot or won't use the Group Policy option to disable Cortana, you may use the Registry instead to do so.

1 - Tap on the Windows-key, type regedit.exe and hit enter.
2 - Confirm the UAC prompt that is displayed.
3 - Go to the key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Windows Search
4 - If AllowCortana exists already, jump to step 7.
5 - Right-click on Windows Search and select New > Dword (32-bit) Value.
6 - Name it AllowCortana.
7 - Double-click on AllowCortana and set its value to 0 to disable the feature.

Jul 26 15:18

3D Printed and Homemade “Ghost Guns” Must Now Be Registered in California

By Everett Numbers

California law will no longer look the other way on homemade guns, or “ghost guns,” as gun control advocates call them. Building a gun from parts or a 3D printer will soon require a background check. It will also require that a state-provided serial number be permanently affixed to the weapon...

Jul 26 11:33

FCC PUTS U.S. CELL PHONE ROUTING SYSTEM IN HANDS OF EUROPEAN FIRM DESPITE SECURITY WARNINGS

The Federal Communications Commission has decided to make a European-owned company the clearinghouse for routing billions of cellphone calls and text messages across the United States, despite claims by critics that the plan poses national security risks, officials said Thursday.

The FCC’s approval, which has not been publicly announced, will give a New Jersey subsidiary of Ericsson, the Swedish technology giant, the obscure but critical job of operating a sprawling national system to track and route wireless calls and texts among hundreds of service providers.

The routing system began in the 1990s as a way for people to keep their cellphone numbers when they switched carriers, but intelligence and law enforcement agencies have come to rely on it to track and trace phone numbers in investigations.

Webmaster's Commentary: 

As reported yesterday at breitbart.com:

Just one day after the global premiere of Clinton Cash, Hans Westberg, the embattled CEO and president of telecoms company Ericsson, stepped down as the head of the Swedish wireless equipment maker. Though the telecom giant’s announcement to remove Westberg is not confirmed as a direct result of the film’s online popularity, the company’s timing is an odd coincidence. The New York Times best-selling book Clinton Cash, authored by Government Accountability Institute President and Breitbart Senior Editor-at-Large Peter Schweizer, highlighted that Ericsson — on Westberg’s watch — had come under heavy fire for selling telecom equipment to countries that were considered state sponsors of terrorism by Hillary’s State Department. The company had received a letter in late 2010 from the Securities and Exchange Commission, warning it about the sells to oppressive governments. U.S. diplomatic cables noted that State Department officials had “regularly and increasingly” raised Ericsson’s transgressions with the Swedish foreign minister.

Also, as reported at the Washingtontimes.com in June of this year:

As the money flowed to the foundation from Sweden, Mrs. Clinton’s team in Washington declined to blacklist any Swedish firms despite warnings from career officials at the U.S. Embassy in Stockholm that Sweden was growing its economic ties with Iran and potentially undercutting Western efforts to end Tehran’s rogue nuclear program, diplomatic cables show. Separately, U.S. intelligence was reporting that Sweden’s second-largest employer, telecommunications giant Ericsson AB, was pitching cellphone tracking technology to Iran that could be used by the country’s security services, officials told The Times. By the time Mrs. Clinton left office in 2013, the Clinton Foundation had collected millions of dollars inside Sweden for his global charitable efforts and Mr. Clinton personally pocketed a record $750,000 speech fee from Ericsson, one of the firms at the center of the sanctions debate.

Apparently, ultimately Ericsson's "financial association" with the Clinton Foundation hit pay dirt with this contract, big-time.

Jul 26 10:59

Julian Assange: ‘No Proof Whatsoever’ Russians Are Behind DNC Hack

During an interview with NBC’s Richard Engel, Julian Assange said that “there is no proof whatsoever” that Russian intelligence sources are responsible for hacking thousands of Democratic National Committee emails. The emails were posted by WikiLeaks over the weekend. The FBI is investigating the hack. Three cybersecurity experts told the DNC that the emails were hacked by Russian intelligence.

‘There is no proof of that whatsoever. We have not disclosed our source, and of course, this is a diversion that’s being pushed by the Hillary Clinton campaign. That’s a meta-story. The real story is what these emails contain and they show collusion. The very top of the Democratic party, Debbie Wasserman Schultz, is now being forced to resign,”Assange said during the interview.

Jul 26 09:13

Democrats Accuse Russia Of Hacking DNC Server To Help Donald Trump

In the aftermath of the fallout from the DNC server hack, the Democrats have been scrambling how to redirect public anger (especially among Bernie Sanders supporters) from the revelations that not only did the Democratic party try everything in its power to sabotage Bernie Sanders presidential bid, but also colluded with various "impartial" media outlets as well as breach fundraising rules in the process.

And, as of this morning, it appears that the solution they have decided upon is not to explain or even justify the scandalous actions, but to simply blame Russia for the hack.

Webmaster's Commentary: 

Jul 26 08:57

Marissa Mayer Made A Lot Of Money Losing The Fight To Save Yahoo

If Marissa Mayer ends up leaving Yahoo when Verizon’s deal to buy the ailing web giant closes, she could walk away having made $219 million during her four-year tenure as chief executive.

Jul 26 08:39

Ransomware 2.0 is around the corner and it's a massive threat to the enterprise

Ransomware is a top concern because it's become an area of intense focus for cybercriminals due to its effectiveness at generating revenue. Once a cybercriminal hacks into a company's files and encrypts them, victims have little option but to pay the asking price for the code to decrypt their files. Ransomware is becoming more ominous as new versions are continually being developed.

Webmaster's Commentary: 

And the same government that insist they know Russia hacked the DNC servers can't find these bozos!

Jul 26 08:28

Russia Foreign Minister Responds To Allegation It Is Behind DNC Hack: "I Don't Want To Use Four-Letter Words"

Secretary of State John Kerry says he raised the email hack of the Democratic National Committee with Russia's top diplomat but stopped short of making any allegation about who might be responsible.

According to CBS, Kerry told reporters Tuesday he brought the matter up with Russian Foreign Minister Sergey Lavrov at a meeting in Laos and explained that the FBI was investigating. He did not, however, repeat allegations or echo suspicions that Russia was responsible for the hack and said he would not draw conclusions until the probe is complete. "I raised the question and we will continue to work to see precisely what those facts are," Kerry said. He would not say if Lavrov responded

Earlier, Russia's Foreign Minister Sergey Lavrov responded to accusations that Russia was allegedly behind the DNC server hack, when he blasted a reporter over her question that Russia was behind the DNC email leaks. Lavrov had a concise reply, stating: "I don't want to use four-letter words."

Webmaster's Commentary: 

And a reminder that when Sony Pictures was hacked, FBI Director James Comey claimed to know that the hack originated in North Korea. It later turned out it was an internal leak.

Remember this pile of bovine excrement when Comey tries to claim the leaked DNC emails are an eeeeeeeevil Russian plot!!!!

Jul 26 07:56

FLASHBACK - FBI director offers new evidence to back claim North Korea hacked Sony

FBI Director James B. Comey said Wednesday that the recent cyberattack against Sony Pictures was traced back to Internet addresses “exclusively used” by North Korea, as he offered new evidence intended to rebut skeptics of the bureau’s claims.

Webmaster's Commentary: 

Ultimately, it turned out North Korea had nothing to do with the Sony Pictures hack; it was an internal leak by a disgruntled employee.

So we should take the current claims that Russia is behind the DNC emails with the usual tiny grain of salt.

Jul 26 07:42

Snowden Explains How To Get To The Bottom Of "Who Hacked The Democrats"

With the scandals plaguing the Democratic National Convention - set to start in just over an hour - get stronger, so does the narrative that it was all Russia's fault the Democratic party was hacked.

Webmaster's Commentary: 

Jul 26 07:39

Hillary Graphics FEEL FREE TO COPY AND USE

Webmaster's Commentary: 

Since I posted this yesterday I have received emails from readers confirming that Facebook, LinkedIn, etc. are erasing/blocking posts of these images. So I have put them all in a gallery which you are free to copy from and use as you see fit.

We can get past this Iron (Silicon) curtain if everyone emails these around and suggests they be forwarded.

Optional Banner: 
WRH Exclusive
Jul 25 17:25

Cell 411 Is An Activist’s Best Friend

By Derrick Broze

As more activists begin to look beyond the political arena for solutions, technology is playing a greater role in organizing and building community networks...

Jul 25 12:35

Pokémon Go Is Using Your Children For Walking Ad Revenue: Petition

By Kevin Samson

The augmented reality resurrection of 1990s’ anime sensation Pokémon continues to set download records even as disturbing consequences of gameplay are exposed.

There is of course the standard tracking that any use of a smartphone will carry with it; but even by those egregious parameters, Pokémon Go takes an extra step toward fully integrating the user (and all of their contacts) into a literal matrix of mapping and surveillance...

Jul 25 11:50

Your luggage HACKED: Group creates 3D printable master key for major line of TSA-approved luggage locks 

Three hackers have developed and released a 3D printable master key used by Transportation Security Administration, which opens Safe Skies luggage locks.

During a talk given on Saturday, the three hackers known as DarkSim905, a lock enthusiast, Nite 0wl and Johnny Xmas, showed the 3D-printable model of the Safe Skies master key.

In addition to the key, they also discussed methods of collecting intelligence, which led to the compromise of Travel Sentry master keys in 2015 and vulnerabilities in the Safe Skies lock design, according to CSO Online.

Travel Sentry and Safe Skies are TSA recommended travel locks for luggage. They became popular in 2003 to prevent theft.

Jul 25 11:42

Hillary's Campaign Manager Calls DNC Leaks a Putin Plot to Help Trump

Hillary Clinton’s campaign has decided to double down on their bid to cast Trump as a secret agent of the Kremlin propped up by Russian President Vladimir Putin despite the obvious absurdity of the narrative.

Webmaster's Commentary: 

You mean Putin wasn't behind the leaks?!? Dang. I just sent him a bottle of champagne! :)

Jul 25 11:19

The Missing Man at the Center of Hillary Clinton’s Email Scandal

Of all the characters in the political drama of Hillary Clinton’s private email server, none has been more mysterious—and potentially more important—than a 40-year-old technology specialist named Bryan Pagliano.

Pagliano didn’t just set up the now infamous “homebrew” server in the basement of Clinton’s New York home, which she used for official business while serving as secretary of state. Pagliano has been the former secretary’s go-to IT guy for the past several years. He’s also the only person in the entire investigation of Clinton’s email who got an immunity deal, protecting him from possible criminal prosecution. That was Pagliano’s demand for telling FBI investigators about Clinton’s unorthodox system—a system that he apparently knows more about than anyone else.

Webmaster's Commentary: 

Jul 25 09:50

BREAKING: FBI Just Confirmed Something Huge About DNC

So is the FBI going to investigate Donald Trump and Putin for the hack!
They wont prosecute Hillary for putting classified material on an unsecured server but the FBI is investigating the hack. This will be very interesting. Can you say HYPOCRISY!

Jul 25 08:52

WHETHER OR NOT RUSSIANS HACKED DNC MEANS NOTHING CONCERNING HOW NEWSWORTHY THE DETAILS ARE

As you almost certainly know by now, on Friday Wikileaks released a bunch of hacked DNC emails just before the Democratic Presidential convention kicked off. While Wikileaks hasn't quite said where it got the emails, speculation among many quickly pointed to Russian state sponsored hackers. That's because of the revelation last month of two sets of hackers breaching the DNC's computer system and swiping (at the very least) opposition research on Donald Trump. Various cybersecurity research firms, stating with CrowdStrike, who was hired by the DNC to investigate, pointed the fingerat the Russians.

Jul 25 07:58

Tale of Two Press Conferences

Jul 25 07:37

Could YOUR identity be stolen? Experts warn of permanent damage if biometric scanners are hacked

From unlocking your smartphone, to scanning your fingerprint at the airport, your physical attributes - or 'biometrics' - are regularly used to verify your identity.

But experts warn that using your unique features to confirm your identity could leave you susceptible to being hacked.

And unlike a password, which you can easily change, your biometrics cannot be altered.

Jul 25 07:20

Nintendo shares plummet after investors realize it doesn't actually make Pokémon Go

Nintendo shares have skyrocketed since Pokémon Go's release and instant transformation into global cultural phenomenon, but they fell dramatically today after investors realized that Nintendo doesn't actually make the game. Nintendo put out a statement after the close of trading on Friday pointing out that the bottom-line impact will be "limited" as it only owns 32 percent of The Pokémon Company, and that revenue from the game and its Pokémon Go Plus smartwatch peripheral have been accounted for in the company's current forecasts.

Pokémon Go is a collaboration between The Pokémon Company and Niantic Labs, the developer who previously created the similar AR game Ingress as part of Google.

Jul 24 18:14

Declassified Document: The U.S. Army has Weaponized a Pokemon Episode

While the Pokemon Go craze continues to spread across the world, a number of troublesome stories about the app and its GPS features are coming to light. While drivers crash into the back of police cars and teenagers mindlessly cross busy highways – whilst searching for their favorite virtual 90s creatures – others are delving into the darker mysteries surrounding the app and Pokemon franchise as a whole.

Jul 24 11:08

MoveOn.org DELETES petition to put Hillary Clinton on trial!

Webmaster's Commentary: 

I smell fear coming from the Hillary camp!

Jul 24 10:37

“Careless” is Not the Word For What Clinton Did

But even if we accept that the standard is what Comey says it is, Clinton is still guilty. Because there was nothing “careless” about the way she set up her email system. In fact, she went out of her way to cautiously and deliberately thwart State Department rules regarding the use of email. She relied on multiple private servers, warned agency IT staff to look the other way, and failed to abide by regulations requiring her to turn her emails over at the end of her term. None of this happened by accident.

Webmaster's Commentary: 

Jul 24 08:44

Leaked Bernie Sanders emails a headache for Hillary as convention gets set to kick off

A CACHE OF leaked emails from Democratic party leaders’ accounts includes at least two messages suggesting an insider effort to hobble Bernie Sanders’ upstart campaign, a revelation that threatens an uneasy truce within the party.

The release of more than 19,000 emails sent and received by seven top Democratic National Committee officials, by anti-secrecy website WikiLeaks, comes at a time when the party is anxious to project an image of unity.

Jul 24 08:17

The Hillary email scandal keeps getting uglier: 3 key aides got messages clearly marked ‘Top Secret’

Emails marked “top secret” were sent from Hillary Clinton’s private server to the email addresses of three of her top aides.

The emails were not put under a higher level of classification after the fact, according to Comey’s report.

n/a
Jul 23 09:36

European Supreme Court says “Maybe” to mass surveillance of innocents

The European Court of Justice (ECJ) says that mass surveillance of innocent people may be legal in a preliminary ruling issued today. The ECJ is the highest court in the European Union, and it issues preliminary rulings by a General Advocate about six months ahead of its final ruling. Today’s preliminary ruling allows for mass surveillance on a state-by-state basis, but only when five conditions are met.

Jul 23 09:26

WikiLeaks fights The Man by, er, publishing ordinary people's personal information

WikiLeaks prides itself on taking on The Man by finding and publishing information that the world's most powerful organizations want to keep hidden.

Unfortunately, on Friday, WikiLeaks took a swing at The Man by standing on the heads of thousands of innocent citizens whose personal details it has published, including their names, home addresses, phone numbers, and even credit card, social security and passport numbers.

Just to make it even easier for identity thieves, the veritable goldmine of personal information is provided online in plain text and is even searchable.

Jul 23 07:52

Turkish Protesters Are Spray Painting “8.8.8.8” and “8.8.4.4.” On Walls — Here’s What It Means

As hard as the Turkish government might try, shutting down Twitter isn’t as easy as it seems. At 11:30 p.m. Thursday the Turkish government officially blocked the country’s 33 million Internet users from Twitter, but clever, tech-savvy Turks are sharing a simple and effective method to help fellow citizens bypass the ban — and they’re sharing it everywhere.

Jul 23 07:00

CHAFFETZ: HAMMERS DOWN ON HILLARY CLINTON SECURITY CLEARANCE BREACHES

Jul 22 11:40

‘Big Milestone’: Facebook Test-Flies Solar-Powered, Internet-Beaming Drone

Launching its internet-beaming drone into the sky for the very first time, Facebook has reached new heights. Named Aquila, it may soon deliver internet access to billions of people in the world’s remotest corners.

Jul 22 11:38

Snowden Designs Phone Case To Show When Data Being Monitored

American surveillance whistleblower Edward Snowden says smartphones are tracking devices, and he has helped design a mobile phone case that will show when a smartphone is transmitting information that could be monitored.

Jul 22 10:05

Edward Snowden Develops Phone Case to Alert Users if Their Data is Being Compromised

By Matt Agorist

Three years ago, when Edward Snowden fled from the US and met with reporters in Hong Kong to reveal his reasons for leaving — he asked them to put their phones in the hotel room refrigerator. He asked them to do so in order to block the signals sent to and from the phones. Now, three years later, Snowden and Andrew ‘Bunnie’ Huang have used that same principle to design a phone case that warns users when their data is being monitored. Say hello to the Snowden phone case...

Jul 22 08:45

The EFF is suing over one of the worst US copyright rules

The Electronic Frontier Foundation is attempting to overturn a US copyright provision that can stop people from doing anything from remixing videos to fixing cars. In a lawsuit filed today, it argues that the Digital Millennium Copyright Act’s rules against circumventing copy protection — designed to stop people from pirating copyrighted works — places unconstitutional limits on free speech.

The EFF filed suit on behalf of Johns Hopkins computer science researcher Matthew Green and hacker / inventor Andrew "bunnie" Huang, both of whom argue that the DMCA’s rules are impeding their work. They’re seeking a confirmation that the framework is restrictive, over-broad, and a violation of the First Amendment. It would be a major blow against one of the most controversial, and most unnecessarily harmful, sections of the DMCA.

Jul 22 08:37

HIGHWAY BLUETOOTH DETECTORS ARE SPYING ON MOTORISTS AND PEDESTRIANS

DHS, the Dept., of Transportation and probably the DEA are using Bluetooth detectors to spy on motorists and pedestrians.

Government agencies like DHS and the DEA use Bluetooth detectors to gather Bluetooth data from a Wireless Sensor Network.
Wireless technology that allows electronic devices to communicate directly with one another
Recently emerged as viable travel time collection technology
Open standard, allows for off-the-shelf equipment
Detection range limited to about 328 feet (100 meters)
Less expensive than many other options
Flexible installation
Some potential privacy concerns
Detection technology relies on drivers' use of Bluetooth-enabled devices
“The whole country is doing this,” Paul Misticawi, vice president of public sector sales for traffic data software company.

Bluetooth detectors will soon be able to identify everyone

Webmaster's Commentary: 

These are the acts of a government terrified of their own people.

And in terms of surveilling ME?!?

The question would be, why the heck?!?

I'm a Christian pacifist activist, and the choral director of a small local church choir; what "threat level", please, do I present to this government?!?

The logical, short answer would be, zero.

But because I post to this blog, and work through information as logically and intelligently as I can, under the NDAA, I can be imprisoned indefinitely without due process whatsoever.

And as Shakespeare said, "Aye, there's the rub."

When logic itself becomes criminalized, the society in which this is happening is in deep kim chee. (Here in the Islands, that's literally a sour cabbage dish, but it means being in deep trouble.)

And folks, this is already starting to happen in this country.

Jul 22 06:01

Ransomware poses a massive threat as payment demands skyrocket

Infection numbers varied between 23,000 and 35,000 per month last year, but recently spiked in March 2016 to hit 56,000 thanks to the arrival of Trojan.Cryptolocker.AF.

And the average ransom demand made has more than doubled in the last six months. It stood at an average of $294 (around £225, AU$395) at the end of last year, but it's now $679 (around £530, AU$930).

Jul 21 16:39

Microsoft to rip up P2P Skype, killing native Mac, Linux apps

Redmond decides you'll sound better if its VoIP system runs in the cloud via the browser

Jul 21 16:38

GOP delegates suckered into connecting to insecure Wi-Fi hotspots

A Wi-Fi hack experiment conducted at various locations at or near the Republican National Convention site in Cleveland, US, underlines how risky it can be to connect to public Wi-Fi without protection from a VPN.

The exercise, carried out by security researchers at Avast, an anti-virus firm, revealed that more than 1,000 delegates were careless when connecting to public Wi-Fi.

Attendees risked the possibility of being spied on and hacked by cybercriminals or perhaps even spies while they checked their emails, banked online, used chat and dating apps, and even while they accessed Pokemon Go.

Jul 21 12:56

A quick fix for your slow Chrome browser

After some research and experimentation, I tweaked one setting that made Chrome run considerably faster. Your mileage may vary, of course, but this is worth a try:

Jul 21 10:30

iPhone bug allows hackers to steal passwords with just a text message – update now to protect yourself

Apple has fixed a major security hole that potentially allowed hackers to gain access to a user’s iPhone, potentially allowing them to steal sensitive data such as passwords.

The flaw allowed hackers to break into an iPhone simply by sending them a text message with a specially-modified image file.

When the phone’s software tries to process the image, the file would exploit the vulnerability to access parts of the device’s code usually off-limits to third parties such as downloadable apps. It could then execute malicious code within applications without the receiver suspecting a thing.

Jul 21 09:11

TURKEY BLOCKS WIKILEAKS

Turkey blocks access to WikiLeaks after ruling party email dump

Webmaster's Commentary: 

"Why can't we do that here?!?" -- Hitlery

Jul 21 08:13

WikiLeaks Dispenses 23,000 Hillary Emails Marked “C” for Confidential (Classified)

WikiLeaks founder Julian Assange told us a month ago that the next batch of leaked Hillary Clinton emails could lead to an indictment.

Now, over 23,000 cables were just put out for the world to see.

Webmaster's Commentary: 

This is way beyond what Comey admitted to, which means the FBI is incompetent and/or complicit.

n/a
Jul 20 19:46

Don't Panic, But Our Technology Now Defies Human Understanding

Even the scientists who make our most complicated software are sometimes baffled by how it works—and, more frighteningly, by how it breaks.

Jul 20 19:45

Wave of business websites hijacked to deliver crypto-ransomware

If you've visited the do-it-yourself project site of Dunlop Adhesives, the official tourism site for Guatemala, or a number of other legitimate (or in some cases, marginally legitimate) websites, you may have gotten more than the information you were looking for. These sites are redirecting visitors to a malicious website that attempts to install CryptXXX—a strain of cryptographic ransomware first discovered in April.

Webmaster addition: And just what is the NSA, FBI, and CIA doing about it?

Nothing!

Jul 20 19:27

Microsoft ordered to fix 'excessively intrusive, insecure' Windows 10

A French regulator has issued Microsoft a formal warning over Windows 10, saying the operating system collects excessive amounts of personal data, ships that information illegally out of the EU, and has lousy security.

The warning comes from the Commission Nationale de l'Informatique et des Libertés (CNIL), an independent data privacy watchdog with the power to levy fines against companies. The CNIL has been investigating Windows 10 since its launch and has now drawn up a damning list of criticisms.

Jul 20 16:07

Bank of England Urge Central Banks to Create Their Own Digital Currencies

In a research paper published on Monday, John Barrdear and Michael Kumhof, economists at the Bank of England, call for central banks to issue their own digital currencies, along the line of Bitcoin

Jul 20 10:47

Last gasp: Microsoft updates Get Windows 10 nagster, KB 3035583, yet again

Windows 7 and 8.1 customers have another new version of GWX, now with a countdown clock

With nine days to go, Microsoft really, really wants you to claim your free upgrade to Windows 10. Come to think of it, Microsoft has really, really wanted you to upgrade your Windows 7 or 8.1 PC to Windows 10 for more than a year, and backed it with the GWX subsystem -- first installed by KB 3035583 in March 2015, 15 months ago.

>>>

Jul 20 09:58

Hillary Clinton Emails TOO TOP SECRET for Congress to See - UNBELIEVABLE!!!

Jul 20 07:44

Google Doesn’t Believe in Privacy, episode 4772

Most people generate so much noise with their internet activity that it’s hard to draw a clear connection between an action and an ad. I’ve been blocking all Google trackers for the last two years, but recently disabled the blocker to test some code. Google interpreted my sudden tracker activity as INTENTION TO SPEND MONEY. When Google discovers a user with commercial intent, it does whatever it can to make that user look at high-priced ads.

And that is how Google drives customer value, increases business performance, and ensures peace and prosperity for all.

Are you blocking trackers yet?

Jul 20 07:41

Government Requests For Google User Data Hit A Record High In 2015

In total, the company received 40,677 data requests — up from 35,365 in the first half of the year, and 30,140 one year before.

Jul 20 07:38

Amazon isn't saying if Echo has been wiretapped

Its transparency reports only includes data demands to its cloud-stored data.

Jul 20 07:37

U.S. GOVERNMENT SUED FOR SOFTWARE PIRACY, MAKER CLAIMS $600M

The U.S. military is being accused of installing 'pirated' copies of 3D virtual reality software onto hundreds of thousands of computers without permission. Bitmanagement, the makers of the software, accuse the Navy of willful copyright infringement and are suing the Government for more than half a billion dollars in unpaid licenses.

Jul 20 07:35

Flaws found in security products from AVG, Symantec and McAfee

Hundreds of security products may not be up the job, researchers say, thanks to flawed uses of code hooking.

The research is the handiwork of EnSilo duo Udi Yavo and Tommer Bitton, who disclosed the bugs in anti-virus and Windows security tools ahead of their presentation at the Black Hat Las Vegas conference next month.

The pair say 15 products including AVG, Symantec, and McAfee are affected. Scores more may be vulnerable thanks to their use of Microsoft's Detours, code Redmond says is used for "re-routing Win32 APIs underneath applications [and] is licensed by over 100 ISVs and used within nearly every product team at Microsoft."

Jul 20 07:06

Judicial Watch: Hillary Clinton Testimony Essential

Judicial Watch today announced it submitted reply briefs (available here and here) to the court in response to the State Department’s and Secretary Clinton’s oppositions to Judicial Watch’s request for permission to depose former Secretary of State Hillary Clinton, the Director of Office of Correspondence and Records of the Executive Secretariat (“S/ES-CRM”) Clarence Finney; and the former Director of Information Resource Management of the Executive Secretariat (“S/ES-IRM”) John Bentel. Today’s filings arise in a Judicial Watch Freedom of Information Act (FOIA) lawsuit before U.S. District Court Judge Emmet G. Sullivan that seeks records about the controversial employment status of Huma Abedin, former Deputy Chief of Staff to Clinton. The lawsuit was reopened because of revelations about the clintonemail.com system

Jul 19 11:35

Hillary Clinton vs. James Comey: Email Scandal Supercut

Jul 19 10:29

Snapchat applies for patent to serve ads by recognizing objects in your snaps

Just took a picture of some coffee? Here's an advert for more coffee!

Jul 19 09:30

Never10

The name “Never 10” is a bit of an overstatement, since this utility may also be used to easily re-enable Windows operating system automatic upgrading. But the primary reason for using this is to disable Windows' pestering insistence upon upgrading Windows 7 or 8.1 to Windows 10.

Jul 19 09:25

Nintendo is now worth more than Sony thanks to 'Pokémon Go'

In dollar terms, Nintendo has added a whopping $23 billion to its value in less than two weeks.

Jul 19 09:23

UK government admits 'Snooper's Charter' would allow it to ban end-to-end encryption

The UK government has publicly admitted that parts of the Investigatory Powers Bill (IPB), better known as the 'Snooper’s Charter', would allow it to force companies to ban end-to-end encryption.

In what may be viewed as a huge assault on the public’s privacy, not to mention digital security, the government would ask internet and communication service providers to “develop and maintain a technical capability to remove encryption that has been applied to communications or data”. As one member of the House of Lords put it, when debating the IPB, this essentially means that companies may not use end-to-end encryption, and could leave the public at risk, not to mention setting a supremely dangerous precedent.

Jul 19 09:21

Yahoo's Latest Earnings Report Basically Confirms That Tumblr Purchase Was a Waste of Money

Yahoo released its latest earnings report today, and while there were some bright nuggets for the beleaguered company—its reported revenue for the second quarter of this year beat analyst estimates—there was one distinct black mark. Yahoo recorded a total goodwill impairment charge of $482 million related to its purchase of Tumblr. Whoops!

A “goodwill impairment charge” is a fancy way of saying that Yahoo is writing off part of the blogging platform’s value. The $482 million comes on top of the $230 million write down it reported in February. Given that the maligned purple giant purchased Tumblr for just over $1 billion, the total write down now amounts to about $700 million—more than half of the deal’s initial value.

Jul 19 09:07

Remove Api.viglink.com and Www.adcash.com Redirect Virus

Api.viglink.com and Www.adcash.com are the a malicious redirect virus which can hijack user's browser to unwanted and malicious webpages, such as www.wizard101.com, plarium.com, greatmmos.com, www.habbo.com, www.roblox.com, www.adcash.com, click.apptrckr.info, etc. Some websites will display false warning message to cheat you to install unwanted programs. Some malicious sites will ask you to sign in their services. There are also bogus survey and tricky games and so on. Anyhow, you'd better not or should not believe in the message or information from Api.viglink.com and Www.adcash.com.

Webmaster's Commentary: 

It turns out one of our advertisers was placing VigLink in their ads. They claim they were themselves the victim of a hoax, but I have canceled with them anyway. I try to be careful about security for our readers, but sometimes something gets through. The symptoms of this browser hijacker include slow performance, ads for products and services like online gambling (which are not allowed at WRH), phony alarms to get you to download malware disquised as fixes, and so forth. If you are on a Windows machine user and have been seeing these problems, here are instructrions to remove it. I am unable to find out if SpyBot or Malwarebytes will remove it, but there is another tool called freefixer that will.

Again, my apologies to the WRH readers. It has taken me more than a month to track down who the culprit was. And thanks to those who donated during our recent fundraiser, I can afford to lose this particular advertiser.

Jul 19 07:40

Reddit - Clintonbot is ClintonCaught

Webmaster addition: I suspect all the social media platforms are playing similar games. I get complaints from readers all the time that attempts to post links to WRH either fail or vanish shortly afterwards, and Claire and I have noticed the view counts on her videos will suddenly drop without explanation. It is just one more indication of a corrupt society in decline.

Jul 18 20:07

Netflix shares plunge 15% as subscribers give streaming service the cold shoulder

Company missed second-quarter expectations, announcing that it added only 1.7 million members worldwide and blamed price increase for drop in membership

Jul 18 11:35

Badvertising: Stop the 5 Biggest Threats to Online Privacy

"One of the biggest challenges in the ad ecosystem right now is that it's really easy for anyone to place an ad," says Polonetsky, one of the attendees of next week's roundtables. "Including actual criminals who would like to mug you."

Such is the case with malvertising gangs, groups of scammers who pose as legitimate advertisers in order to infiltrate the complex system of nearly 100 ad networks—like Google's AdSense—that distribute ads to Web sites all across the Internet.

Webmaster's Commentary: 

ANNOUNCEMENT

After much work, we identified one of our advertisers who was causing trouble and have "fired" them, so hopefully there will be fewer problems reading whatreallyhappened.com


Jul 18 09:18

Zero Days

Alex Gibney’s ZERO DAYS is a documentary thriller about the world of cyberwar. For the first time, the film tells the complete story of Stuxnet, a piece of self-replicating computer malware (known as a “worm” for its ability to burrow from computer to computer on its own) that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. ZERO DAYS is the most comprehensive accounting to date of how a clandestine mission hatched by two allies with clashing agendas opened forever the Pandora’s Box of cyberwarfare. Beyond the technical aspects of the story, ZERO DAYS reveals a web of intrigue involving the CIA, the US Military's new cyber command, Israel's Mossad and Operations that include both espionage and covert assassinations but also a new generation of cyberweapons whose destructive power is matched only by Nuclear War.

Webmaster's Commentary: 

Claire and I caught this documentary on cable last night. On the negative side, Gibney shows a very pro-Israel anti-Iran slant in the telling of the story, suggesting that Israel was right to do what they did with STUXNET because Iran was building a bomb, and even including the now discredited quote from Ahmadinejad about wiping Israel off of the map.

On the positive side, it is an in-depth telling of the story of the development of STUXNET by NSA, GCHQ, and Israel as the first of a new breed of cyber weapons that can actually cause harm in the real world. I don't want to give the story away, but it reveals that the only reason STUXNET was discovered at all was a reckless push to increase its aggressiveness, which called attention to its existence.

Jul 18 07:25

It took nearly three hours for France's terror alert app to respond to Nice attack

The app, called SAIP (Système d’alerte et d’information des populations) was released by the French Interior Ministry on iOS and Android in June, ahead of the Euro 2016 soccer tournament. According to the ministry, the app would provide users with alerts and information within 15 minutes of a terrorist attack being confirmed. But it apparently took much longer to send out alerts following last night's attack in Nice.

Jul 18 07:21

Newt Gingrich: Merely Visiting An ISIS Or Al Qaeda Website Should Be A Felony

Merely visiting a website should put you in jail? What if you're a journalist? Or a politician? Or a researcher trying to understand ISIS? That should be a felony? That's not how it works. This also assumes, idiotically, that merely reading a website about ISIS will make people side with ISIS. It's also not, at all, how the law works.

Jul 18 07:18

Maxthon browser caught sending personal data to Chinese server without user’s consent

Polish security researchers from the company Exatel that the browser regularly sends a ZIP files to server in China. The ZIP file contains all kinds of data about the system of the user and the internet history. Information about the system includes the CPU, memory, the adblocker status and the startpage. Also the URL of all visited websites, Google searches and a list of installed application on the system including their version number is sent to the Chinese company.

The browser has an opt-in setting for users to send specific information as part of Maxthon’s ‘User Experience Program’ but whether the user has this disabled or not, the ZIP file is send to Maxthon. The information that is sent to the Chinese company is perfect for cybercriminals to perform a targeted attack, according to one of the security researchers.

Jul 18 07:08

ARM acquired by SoftBank for $31 billion

United Kingdom-based ARM — the company that designs the processors at the heart of most every smartphone chipset much less many computers’ chipsets — has come to an agreement with Japanese telco SoftBank to be bought out for £23.4 billion or $31 billion.

Jul 18 06:58

The Pokemon Pied Piper zombie apocalypse has begun: Hoards of mindless, obedient sheeple now stampede anywhere the puppet masters plant fictitious monsters

By now, you've probably heard of Pokemon Go, the new "hybrid reality" mobile app game that overlays real world geographic locations with virtual monsters that are collected for points.

What you may not yet know is that the game was actually developed by a CIA-funded software front group for the purpose of using all the mobile device cameras of the brain dead public to conduct what I call "mass redundant surveillance" of any area requiring immediate video documentation by the CIA or NSA. It's essentially a CIA spying machine pretending to be a game.

To accomplish citizen-assisted spying, the game's puppet masters simply plop a virtual monster into any desired surveillance location, and hoards of totally brain dead apocalyptic zombie humans instantly converge on the scene, all pointing their mobile cameras at the virtual "monsters" so they can earn their virtual "points."

Jul 18 06:50

BEX ALERT - Why does the internet hate Hillary Clinton?

From B-E-N-G-H-A-Z-I memes to the #MoreTrustedThanHillary hashtag, the internet has plenty of hate for Hillary Clinton.

Public displays of dislike for the presumptive Democratic nominee for president are made even more possible (and creative) by the internet's fluid, remix culture. Of course, Clinton hatred has its roots in the pre-internet days. Few presidential candidates have been in the public eye for as long or held such a diverse array of roles, which is why her supporters call her the most qualified candidate to ever run for president.

(*This article must be part of that big PR campaign , that she funded with the missing Clinton Foundation 'proceeds' . )

Webmaster addition: The internet is, unlike corporate media, reporting the truth about Hillary!

Jul 17 18:54

One in five consumers upgraded to Win10 for free instead of buying a PC

Just why were retail sales s*$%t last year? Microsoft's OS roll out didn't help

Jul 17 18:52

Silently clicking on porn ads you can't even see – this could be you...

Pokemon Go mobile malfeasance spinning out of control

Jul 17 07:38

Putin To Ban Pokemon GO From Russia Due To Links To CIA

Vladimir Putin is set to ban Pokemon GO from Russia after an internal Kremlin investigation revealed the viral augmented reality smartphone game has direct links to the CIA and wider intelligence community and is being used to secretly gather data on a colossal scale. Young people are being tricked into giving up their privacy to these intelligence agencies, according to Kremlin sources, and while playing the game they act as unwitting intelligence gatherers for the CIA. The game has an extensive list of intrusive tracking permissions, and it is these ‘fine print clauses’ that raised eyebrows in the Kremlin and sparked the ongoing investigation.

Jul 16 11:07

U.S. Defense Contractor to Blanket Earth With New Surveillance Technology

By Nicholas West

Google has received vast criticism for its Google Earth, Google Maps and Google Streetview systems that have essentially removed the inherent right to privacy and transferred it to the whim of corporate terms and conditions. However, this would seem to pale in comparison to what is being announced from the largest U.S. defense contractor, Lockheed Martin, working in tandem with commercial space imagery vendor, DigitalGlobe...

Jul 16 08:23

New York federal judge to DEA: If you want to use a stingray you’re going to need a warrant for that

Earlier this week, a New York federal judge became the nation’s first jurist to rule inadmissible evidence collected after Drug Enforcement Administration (DEA) officials used a stingray, or cell site simulator, to locate a drug suspect’s phone, and by extension the man himself, without a warrant. This ruling—along with a landmark Second Circuit Court of Appeals opinion handed down this week holding that US warrants do not extend overseas—is a bright spot in what’s otherwise been a bleak series of court decisions on privacy in the digital age.

Jul 16 05:44

Israel launches anti-Facebook bill

Israeli Justice Minister Eyelet Shaked and Internal Security Minister Gilad Erdan have gone public with details of a proposed bill which will force internet companies to remove content which the government deems to be promoting terror, Safa news agency reported yesterday.

The bill would empower courts to order social media providers like Facebook, Google, YouTube and Twitter to remove content that is in itself criminal as well as constitutes a danger to personal, public or state security.

Webmaster's Commentary: 

And, of course, exposing government lies is a HUGE threat to state security!

Jul 15 18:12

Federal Judge Suppresses Evidence Gathered With “Stingray” Surveillance Tool

By Derrick Broze

A federal judge has set a precedent by suppressing evidence obtained without a warrant using a surveillance device sometimes known as a Stingray.

After several years of law enforcement agencies across the United States gathering evidence using a secret surveillance tool – and doing so without a warrant – a federal judge has struck down evidence collected by the U.S Drug Enforcement Administration. U.S. District Judge William Pauley in Manhattan ruled that the defendant’s rights were violated when the DEA used a cell site simulator, also known as a Stingray, without a warrant in order to find the suspects home...

Jul 15 09:38

BENGHAZI! EMAILS! BENGHAZI!

Jul 15 07:27

YouTube deletes another video about Hillary's lies!

Jul 15 07:03

The Clinton Body Count [VIDEO]

Webmaster's Commentary: 

Don't bother clicking the link, YouTube has already orwellized that video!

Jul 14 15:07

FBI Agents In Clinton Investigation Have All Been Gagged with A “Very, Very Unusual” NDA

By Claire Bernish

FBI agents involved in the probe of former Secretary of State Hillary Clinton’s emails were required to sign unusually-extensive nondisclosure agreements — forcing them into silence unless they’re called to testify in the matter. FBI insiders surmised there may have been an ‘inside deal.’

“This is very, very unusual,” said an unnamed, retired FBI chief, cited by the New York Post. “I’ve never signed one, never circulated one to others.”...

Jul 14 14:46

The FBI Has Quietly Collected 434,000 Iris Scans of US Citizens

By Josie Wales

In a shocking article published Tuesday by the Verge, it was revealed the FBI has been quietly collecting hundreds of thousands of iris scans as part an experimental program referred to as the “FBI Iris Pilot.” Working together with local police departments, U.S. Border Patrol, and the Pentagon, the FBI has discreetly amassed 434,000 iris scans.

The surveillance technology, used primarily by airports and private security companies, was pitched in 2013 as a way to help police departments catch criminals in a safer and more efficient manner. At that point, the FBI already had 30,000 scans and was looking to coordinate with local and national agencies to develop a searchable database of scans taken by police departments across the nation...

Jul 14 13:51

How to Download and Build Your Own House: “Affordable, Open Source, Modular, Ecological”

Like so many other institutions in our society, the idea of buying and cookie cutter house and being in debt with a mortgage to pay – indefinitely until you die – is out dated, and does nothing to promote freedom for the people living in it. Here's what you could do instead:

Read more

Jul 14 13:21

Police Raid 60 Homes For ‘Xenophobic’ Facebook Posts

German Police raided the homes of 60 people suspected of writing ‘hate’ speech on social media in Germany. Coordinated by the Federal Criminal Police (BKA), the operation saw officers from 25 departments search across 14 states.

Jul 14 12:39

More EU Antitrust Headaches for Google

The EU sends Google two Statement of Objections regarding its search practices and AdWords business.

The European Commission today levied new antitrust charges against Google, sending the company two Statement of Objections regarding its search practices and AdWords business.

In April 2015, the Commission formally accused the Web giant of favoring its own shopping products in search results, and demoting those of its competitors. It has since investigated further and today released a supplementary Statement of Objections that includes "a broad range of additional evidence and data that reinforces the Commission's preliminary conclusion."

"The Commission is concerned that users do not necessarily see the most relevant results in response to queries—>>>

Jul 14 10:01

AVFM Facebook page taken down

On the opening day of ICMI 16 London, dissenters with Facebook’s tacit or direct support have seen fit to attack and unpublish A Voice For Men’s Facebook page. A further assault has taken place in subsequent days on many of those involved in providing the space for men’s rights issues; including Paul Elam, the FB page Admins, and Moderators by banning their accounts for time spans ranging from 24 hours to 30 days.

Paul recently stated that this had been foreseen, and there have been some indications that this may be in the works. The page has been removed for “Violating Community Standards” but no specific reason was given for exactly what standards were violated and why aside from a couple highly questionable issues with relatively benign posts directed at the administrators and moderators.

Jul 14 06:59

Extended Blackouts: Power Grid Completely Vulnerable to Sabotage: “America Could Go Dark”

The 21st Century is run off of electricity, and in the United States, that electric grid is woefully out of date – and that has left the country quite vulnerable.

The U.S. electric system is in danger of widespread blackouts lasting days, weeks or longer through the destruction of sensitive, hard-to-replace equipment.

“Virtually any region would suffer major, extended blackouts if more than three key substations were destroyed.”

Read more

Jul 13 15:22

Windows 10: You have TWO WEEKS to upgrade for free, or you'll have to cough-up £130

...or you do something more sensible...

http://www.zdnet.com/article/solydxk-hands-on-two-good-linux-distribut...

A rolling update Linux distribution. Initially looks bland but is easily customized. Works for me.

Jul 13 12:56

FBI Agents Silenced on Hillary Probe

FBI agents who worked on the investigation of Hillary Clinton's use of a private email server reportedly had to sign an unusual non-disclosure form banning them from talking about the case unless they were called to testify.

Jul 13 12:49

It’s Official: Robots Are Now Injuring And Killing Humans

By Nicholas West

Even as robotics experts, universities and tech luminaries sound the alarm about the potential for a future filled with killer robots, this technology evidently already has arrived … minus the stringent ethics.

There can be no debate about the use of killer robots in the military. We are in the middle of an admitted global drone arms race in which there are mass civilian casualties occurring under a specious U.S. legal framework that has thus far not even excluded its own citizens from being targeted for assassination. There is also a host of ground- and sea-based systems that are equally lethal and continue to be tested in massive joint military exercises.

Then there is the artificial intelligence contained in autonomous vehicles and security robots...

Jul 13 09:53

Ashley Madison admits using fembots to lure men into spending money

After nearly a year of radio silence, the infidelity hookup site Ashley Madison has finally released a statement about what's next for the company. Among other things, the company's new executive team admits that it used fembots to lure men into paying to join the site, which promised the men discreet affairs with willing women.

Jul 13 09:17

With the Right Software, PCs Can Outdistance Supercomputers

Three recent news items highlight how a set of users, armed only with PCs, were able to achieve supercomputing results through innovative software. Their success illustrates how innovative algorithms can overcome a lack of hardware, especially when those algorithms are carefully designed to exploit the hardware that is available. From another perspective, these stories also highlight how poorly many supercomputers are utilized under the burden of legacy software, or in some cases, just plain conventional wisdom.

Jul 13 08:10

Every version of Windows hit by "critical" security flaw

An attacker could exploit the flaw by conducting a man-in-the-middle attack on a system or print server and injecting malicious code. That's possible because the print spooler service doesn't properly validate print drivers when installing a printer.

Jul 13 08:01

Decision to Blow up US Citizen With Robot Was Improvised in Less Than 20 Minutes

By Claire Bernish

A hotly-contested decision by law enforcement to use a drone robot to blow up a U.S. citizen, who allegedly carried out the murders of five police officers in Dallas, just got exponentially more controversial—because, according to Dallas Police Chief David Brown, the “whole idea was improvised in about 15 to 20 minutes.”

Already igniting fury around the country for neglecting any semblance of due process, the use of the “Remotec model F-5” to deliver a pound of C-4 explosive to decimate suspected shooter Micah Xavier Johnson as he targeted police in a sniper-style attack, has been revealed by the police chief as a hastily-plotted … whim...

Jul 13 07:34

Facebook sued for $1bn by families of terror victims in Israel over Hamas attacks

Claiming that Facebook's conduct was "intentional and malicious", the suit includes information about the deaths of all five terror victims. It also lists how the social media platform was used by Hamas militants to operate, plan and coordinate attacks.

Jul 13 07:17

Australian Government must lodge protest about release of our classified information by Clinton - here's why

When Hillary Clinton was US Secretary of State she used her own private email server instead of the secure government system for classified information.

I have posted many of her communications about Australia and Australian political figures here.

How did I get them? Her private emails were subpoenaed in a court action in the United States.

Her private email server was not in a protected US Government facility. It could easily have been targetted for burglary.

And that matters to Australia.

Jul 13 06:55

Facebook Is Throttling Nonprofits and Activists

So far coverage of Facebook's plan to squeeze the organic reach of Pages has focused on its impact on "brands" that spam us with ads and promotions. But nonprofits, activists, and advocacy groups with much fewer resources (and no ad budgets) are also being hugely affected. It's starting to look like Facebook is willing to strangle public discourse on the platform in an attempt to wring out a few extra dollars for its new shareholders.

Webmaster's Commentary: 

I am posting this because every Facebook page I visit is working correctly ... except my own, which are slow to the point of uselessness!

Jul 12 16:12

US, EU Adopt New Rules For Transferring Internet Data

A new agreement between the United States and the European Union on the surveillance of cross-border internet data flow has come into effect.

Jul 12 12:54

Clinton legal team moves to block deposition in email lawsuit

Lawyers for Hillary Clinton are going to federal court for the first time to block efforts to force her to testify in a civil lawsuit related to her private email set-up.
Clinton's attorneys submitted a legal filing Tuesday morning in a bid to shut down a conservative group's request for an order forcing her to submit to a deposition in the midst of her presidential campaign.

Jul 12 09:54

Nukeware: New malware deletes files and zaps system settings

Lazy but sneaky cybercrooks are slinging a new ransomware variant that falsely claims to have encrypted files when in reality it has deleted them.

Ranscam tricks victims by falsely claiming that files have been moved onto an hidden, encrypted partition.

In reality the malware has deleted files and comprehensively messed with system settings (removing executables associated with System Restores, deleting shadow copies, hobbling Safe Mode etc.) such that it is difficult or impossible to recover from an infection.

Victims are encouraged to pay a 0.2BTC ($125) ransom but in reality the crooks have no mechanism to restore compromised files. The attackers provided the same wallet address for all payments and for all samples identified by Cisco’s Talos security division.

Jul 12 06:47

ABCNews: Hidden Video Catches Hillary on Emails - She Knew It All Along - Guccifer


This clip from ABC News reporting on its 20/20 investigation brings new light to the Hillary Clinton email scandal. She is caught speaking about emails and not wanting to use emails due to wanting to keep from having them come up in investigations later.

Jul 12 06:45

Hillary Clinton LYING THREE TIMES UNDER OATH Before Congress

Jul 12 06:41

Oops: When Clearing Clinton, FBI Accidentally Proved She Committed Perjury

Testifying before the House Select Committee on Benghazi, Clinton lied under oath — no less than three times — and her mendacious statements in no way constituted fumbling forgetfulness, ambiguity, or misinterpretation.

Jul 11 15:14

Pokémon Go is another mass-survellience tool? Here's the truth

Pokémon Go, a smartphone game developed by Niantic, is sweeping the world at the moment. Among the hype surrounding this, there has been a somewhat vocal minority claiming that the game is nothing more than a data mining tool that is being used as a means of government surveillance.

Jul 11 14:59

FBI-Hillary interview lost; and the silence of the lambs

There was no transcript of the Hillary-FBI interview.

There was no recording.

FBI agents merely took notes.

Jul 11 12:32

Will “Pokemon Go” Be Used To Catch Us All?

By Derrick Broze

Millions of smartphone users around the world have downloaded the new Pokemon Go app, but is there more to the story than just fanciful game play?...

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA