COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Jun 19 06:30

The CIA has been hacking dozens of Wi-Fi routers and using them as covert listening points for at least a DECADE, leaked documents reveal

Once installed, CherryBlossom turns the device into a 'Flytrap' that sends messages to a CIA-controlled server known as 'CherryTree'.

The Flytrap sends the router's device status and security information, which CherryTree logs to a database.

The CherryTree server then sends the infected device a 'mission' with specific tasks tailored to the target.

A web-based user interface known as 'CherryWeb' is used by CIA operators to check the Flytrap's status and web traffic and to assign the infected device new missions.

Missions assigned to the Flytrap can target specific laptops or phones in the house based on IP and email addresses, chat user names and MAC addresses.

Mission tasks include copying some or all of the user's internet traffic, email exchanges and private chat usernames.

Jun 19 06:22

400 Burger Per Hour Robot Will Put Teenagers Out Of Work

Just a quick heads up, high school students. You might want to save your job application efforts for retail gigs, because the fast food space is about to be invaded by robots.

We already showed you an autonomous grillmaster that can monitor and flip an entire grill full of patties. Today’s bot is even more versatile. Not only can it cook the patty, but it can also dice up fresh toppings like tomatoes, pickles, and onions… and it can even deftly stack everything on a toasted bun.

Jun 19 06:18

Report estimates cost of disruption to GPS in UK would be £1bn per day

The UK stands to lose £1bn per day in the event of a major disruption to the Global Positioning System (GPS), according to a government report.

Emergency services would also be severely affected and struggle to cope with demand. Longer emergency calls, less efficient dispatch, navigation, and congested roads would mean a total estimated loss of £1.5bn, the report said.

Besides navigation, many industries are reliant on GPS software for swathes of critical applications such as financial trading and precision docking of oil tankers.

Jun 19 06:16

It's 2017, and UPnP is helping black-hats run banking malware

Another banking malware variant has been spotted in the wild, and it's using UPnP to pop home routers to expose unsuspecting home users, recruited as part of the botnet.

McAfee Labs says the new campaign uses a variant of the ancient “Pinkslipbot”, and says it uses Universal Plug'n'Play (UPnP) to open ports through home routers, “allowing incoming connections from anyone on the Internet to communicate with the infected machine”.

As with any credential-harvesting botnet, the malware needs to get its booty back to the botmasters without exposing them, and this is where the UPnP exploit comes in.

Jun 18 15:21

Power Outage: ‘Crash Override’ malware heightens fears for US electric grid

The identification of malware tied to a cyberattack on Ukraine last year is putting a renewed focus on threats to America’s electric grid.

Jun 18 10:56

American Chipmakers Had a Toxic Problem. Then They Outsourced It

Twenty-five years ago, U.S. tech companies pledged to stop using chemicals that caused miscarriages and birth defects. They failed to ensure that their Asian suppliers did the same.

Jun 18 10:40

Comodo DNS Blocks TorrentFreak Over “Hacking and Warez “

At TorrentFreak, we write about website blocking on a weekly basis, but it's not often that we are the target ourselves. This week we are, as major computer security vendor Comodo has decided to block direct access to our site, claiming that we might offer illegal access to copyrighted software or media. Interestingly. Comodo's DNS blocking doesn't prevent users from accessing The Pirate Bay and other known pirate sites.

Jun 18 10:37

China just took the lead in the quantum space race

On Thursday, a team of Chinese scientists released findings from a breakthrough study that makes China the indisputable leader in the field of quantum communication, an achievement that could be of immense strategic importance.

The study, led by Pan Jianwei and published in Science magazine, successfully demonstrated the ability to distribute entangled photons across unprecedented distances, from space to earth, opening the door for the practical application of cutting-edge, ultra-secure communication.

Jun 17 09:44

SPECIAL PROSECUTOR MUELLER IS A POLITICAL HACK

The New York Times characterizes special prosecutor Robert Mueller as being independent and fair:

Robert S. Mueller III managed in a dozen years as F.B.I. director to stay above the partisan fray, carefully cultivating a rare reputation for independence and fairness.
Let’s fact-check the Times …

ANTHRAX FRAME-UP

Mueller presided over the incredibly flawed anthrax investigation.

The U.S. Government Accountability Office says the FBI’s investigation was “flawed and inaccurate”. The investigation was so bogus that a senator called for an “independent review and assessment of how the FBI handled its investigation in the anthrax case.”

The head of the FBI’s anthrax investigation says the whole thing was a sham. He says that the FBI higher-ups “greatly obstructed and impeded the investigation”, that there were “politically motivated communication embargos from FBI Headquarters”.

Webmaster's Commentary: 

Translation: Mueller has been hired to attempt a political assassination against President Trump.

With his vile track record so publicly revealed, however, this may not be as easy as Democrats may hope.

Jun 16 14:09

Governments breaking encryption still a bad idea

Each awful terrorist attack brings with it government demands of an "internet clampdown", shorthand for increased censorship and compromised encryption to aid surveillance.

In Australia, the Turnbull government wants to follow Britain's example, and introduce the proposed "technology capability notices" that oblige internet providers and telcos to decrypt data in real-time if the authorities order it.

Depending on how the government-forming goes for Theresa May in the UK, she could lead the country in a Brexit from the internet, introducing strict regulations and logging of what people do online.

It's highly unlikely that an "internet clampdown" will result in anything else than the general population becoming less secure online. In fact, it's pretty much guaranteed nothing much good will come out of such a move.

Jun 16 14:07

California man facing prison after uploading Deadpool movie to Facebook

Fresno, CA — A Fresno, California, man is facing prison after allegedly uploading the movie Deadpool to his Facebook account. Twenty-one-year-old Trevon Maurice Franklin was arrested and charged with copyright infringement Tuesday morning following a federal investigation that accused him of uploading the Hollywood blockbuster eight days after its release in theaters in February 2016.

Jun 16 12:44

BREAKING: Facebook exposed identities of moderators to suspected terrorists

Have you ever wondered who takes on the grueling, unforgiving task of combing Facebook's groups and personal profiles for terrorist activity? Meet Community Operations workers

Jun 16 12:43

Facebook’s A.I. ‘Chatbots’ Begin Communicating After Inventing New Language

Chatbots created at the Facebook Artificial Intelligence Research lab developed their own language without being directed by researchers.

According to a report released Wednesday, the discovery was made during a project that gave bots the ability to negotiate and make compromises.

As the bots’ development progressed, researched say they suddenly noticed a “divergence from human language” during interactions, forcing them to alter their model.

Jun 16 09:36

ADVANCED CIA FIRMWARE HAS BEEN INFECTING WI-FI ROUTERS FOR YEARS

Home routers from 10 manufacturers, including Linksys, DLink, and Belkin, can be turned into covert listening posts that allow the Central Intelligence Agency to monitor and manipulate incoming and outgoing traffic and infect connected devices. That’s according to secret documents posted Thursday by WikiLeaks.

Webmaster's Commentary: 

Why am I not surprised here?!?

The Unhinged Surveillance States of America have morphed from "The land of the free... and the home of the brave" to "the land of the surveilled...and the home of the cowed.

Jun 16 08:34

Facebook's bots get the ability to 'reason, converse and negotiate' and will even CHEAT to get what they want

Facebook's artificial intelligence researchers announced Wednesday they had broken new ground by giving automated programs or 'bots' the ability to negotiate, and make compromises.

The new technology pushes forward the ability to create bots 'that can reason, converse and negotiate, all key steps in building a personalized digital assistant,' said researchers Mike Lewis and Dhruv Batra in a blog post.

Up to now, most bots or chatbots have had only the ability to hold short conversations and perform simple tasks like booking a restaurant table, according to the researchers.

But in the latest code developed by Facebook, bots will be able to dialogue and 'to engage in start-to-finish negotiations with other bots or people while arriving at common decisions or outcomes,' they wrote.

Jun 16 08:33

Man Sends Nude Photos Of Ex-Wife To Her Co-Workers Via Fake Facebook Account

A Florida man is under arrest after police say he used “revenge porn” to get back at his estranged ex-wife. Tampa NBC affiliate WFLA reports 37-year-old Joshua Persaud of Lake Wales allegedly sent 11 sexually graphic images of his wife to five of her male co-workers. He’s now been charged with 11 counts of sexual cyber harassment.
The ex-wife, whose name has been withheld, told police she had sent Persaud nude photographs of herself during the course of their marriage. The couple separated last January and is now in the process of getting a divorce.

Jun 16 08:21

Texting suicide trial: Michelle Carter found guilty of involuntary manslaughter

Michelle Carter, a 20-year-old who was accused of urging her then-boyfriend to commit suicide three years ago, has been found guilty of involuntary manslaughter by a Massachusetts judge.

Jun 16 08:08

Trump Orders Government to Stop Work on Y2K Bug, 17 Years Later

Seventeen years after the Year 2000 bug came and went, the federal government will finally stop preparing for it.

The Trump administration announced Thursday that it would eliminate dozens of paperwork requirements for federal agencies, including an obscure rule that requires them to continue providing updates on their preparedness for a bug that afflicted some computers at the turn of the century. As another example, the Pentagon will be freed from a requirement that it file a report every time a small business vendor is paid, a task that consumed some 1,200 man-hours every year.

Jun 16 08:06

Rural America has a serious internet problem

Millions of rural Americans are stranded in the "dial-up age" as internet providers continue to under-serve regions outside of major metropolitan centers, The Wall Street Journal reports. Approximately 39 percent of the rural population in the country — about 23 million people — don't have "fast" internet, which is defined as having the speed to support "email, web surfing, video streaming, and graphics for more than one device at once," the Journal writes.

Jun 16 08:00

Yahoo! cleanup! will! cost! Verizon! half! a! billion! bucks!

Verizon says it will have to write off $500m for severance and integration costs on its acquisition of Yahoo!

The telco told the SEC it would mark down the $500m charge in its next quarterly report as it cuts unneeded staff and offices and mixes the rest in with AOL.

It is believed as many as 2,000 workers will be getting pink slips.

"In connection with the transaction, Verizon expects to record severance, acquisition and integration-related expenses of approximately $500 million pre-tax in the second quarter of 2017," Verizon said.

"Verizon expects to realize over $1 billion in cumulative operating expense synergies from the transaction through 2020."

Jun 16 07:56

New Fileless Ransomware with Code Injection Ability Detected in the Wild

It is no secret that hackers and cybercriminals are becoming dramatically more adept, innovative, and stealthy with each passing day.

While new forms of cybercrime are on the rise, traditional activities seem to be shifting towards more clandestine techniques that come with limitless attack vectors with low detection rates.

Security researchers have recently discovered a new fileless ransomware, dubbed "Sorebrect," which injects malicious code into a legitimate system process (svchost.exe) on a targeted system and then self-destruct itself in order to evade detection.

Unlike traditional ransomware, Sorebrect has been designed to target enterprise's servers and endpoint. The injected code then initiates the file encryption process on the local machine and connected network shares.

Jun 15 13:33

WEED-BACKED CRYPTOCURRENCY POTCOIN FUNDED DENNIS RODMAN’S NORTH KOREA TRIP

Former NBA player Dennis Rodman has made yet another trip to North Korea this week. Though time a fully unofficial ambassador of the United States, he arrives in the republic as the official ambassador of PotCoin, a digital currency marketed to the marijuana industry.

Jun 15 10:22

Access Denied: US Mulls Blocking Chinese Investment in Artificial Intelligence

According to an unreleased Pentagon report, a federal agency is considering limiting Chinese financial investment in the US, even as Beijing continuously finds new ways to gain access to sensitive cutting edge US technologies, including artificial intelligence and machine learning.

Webmaster's Commentary: 

Of course, no such restriction applies to Israel!

Jun 15 10:10

Signed Into Law: Nevada Becomes Free-Trade Zone for Bitcoin And Other Blockchains

This could make Nevada a hub for blockchain startups and it certainly offers agorist opportunities. In this video, Vin Armani examines a brand new law in his home state of Nevada that creates a free-trade zone for cryptocurrencies and other blockchain applications exempting them from regulations. The law prohibits taxing and regulating blockchain businesses. Check out the details below:

Jun 15 09:49

‘CIA’s Cherry Bomb’: WikiLeaks #Vault7 reveals wireless network targets

The latest Wikileaks Vault7 release reveals details of the CIA’s alleged Cherry Blossom project, a scheme that uses wireless devices to access users’ internet activity.

The Cherry Blossom program also provides a means to perform software exploits on particular ‘targets’, meaning the hacker can take advantage of vulnerabilities on the target’s device, according to a Wikileaks press release.

Wikileaks notes that the common use of WiFi devices in homes, offices, and public spaces makes them ideal for these so-called ‘Man-In-The-Middle’ attacks as the Cherry Blossom program can easily monitor, control and manipulate the Internet traffic of connected users.

Malicious content can be injected into the data stream between the user and the internet service, which exploits vulnerabilities in the target’s computer or operating system, according to WikiLeaks.

Jun 15 09:19

Japan Imposes Sweeping Pre-Crime Surveillance Law Ahead Of 2020 Olympics

By Nicholas West

With the latest spate of terror attacks we are beginning to witness supposedly democratic countries take increasingly tyrannical positions in the name of security...

Jun 15 08:58

Policing the power of tech giants

Despite populist promises, cracking down on Silicon Valley is not one of President Trump's near-term priorities. Makan Delhrahim, Trump's top antitrust enforcer at the Justice Department, has pledged to to enforce antitrust violations with respect to online platforms just as he would with any other industry, but insiders expect him to be cautious. And Maureen Ohlhausen, acting FTC chair, said in a recent speech that the agency has no intention of meddling in the way tech companies use algorithms and data.

Jun 15 08:54

Windows WARNING: This is probably the most important update you will EVER need to install

MICROSOFT has released a “highly unusual” software patch for Windows XP, Windows Vista and Windows 7 to protect against the spread of the WannaCry malware that brought a number of NHS hospitals to their knees earlier this year.

Jun 15 08:42

SWEDISH RAILWAY USES MICROCHIP IMPLANTS

Sweden's state-owned rail operator SJ is allowing passengers to use microchip implants rather than conventional tickets.
The idea is currently being trialed just among some SJ members. It means all they need to travel is their left hand and the small microchip implanted in it. Authorities believe implanting the microchip will make the train journey more convenient.

SJ claims to be the first travel company in the world to enable passengers to use microchip implants to validate their tickets. The small implants use Near Field Communication technology, the same tech used in contactless credit cards or mobile payments.

Webmaster's Commentary: 

Thank you, NO!!!

Jun 15 08:39

ARMS GIANT BAE SOLD POWERFUL MASS SURVEILLANCE EQUIPMENT TO OPPRESSIVE REGIMES – REPORT

Global arms firm BAE Systems sold powerful mass surveillance equipment to six Middle Eastern nations with repressive human rights records, investigators claim, while warning that the technology could be used to track and hack dissidents.

The BBC report appears to show that the powerful and invasive hacking technology, which was made by a Danish firm that was bought by BAE in 2011, was sold to Saudi Arabia, the UAE, Qatar, and Oman, as well as North African states Morocco and Algeria.

The technology, known as Evident, can be used to track individuals using their mobile phones and is said to be capable of boring through sophisticated encryption.

Evident, which was developed by Denmark-based BAE Systems Applied Intelligence, can reportedly also collect, collate and analyze massive amounts of personal online data.

One former employee told the BBC: “You would be able to intercept any internet traffic. If you wanted to do a whole country, go ahead.

Webmaster's Commentary: 

BAE doesn't give a damn about to whom they sell this kind of technology; this is just another in-your-face demonstration that for weapons manufacturers, its "profits uber alles!"

Jun 15 07:42

“Top ISPs” Are Discussing Fines & Browsing Hijacking For Pirates

Some of the "top ISPs" are in "very thorough" discussions with anti-piracy outfit Rightscorp over proposals to hijack the browsers of alleged pirates until a fine is paid. Rightscorp is presenting this as an opportunity for ISPs to avoid being sued as well as a way to generate profit for the company.

Jun 15 07:29

Don't touch that mail! London uni fears '0-day' used to cram network with ransomware

University College London is tonight tackling a serious ransomware outbreak that has scrambled academics' files.

It is feared the software nasty may be exploiting a zero-day vulnerability, or is a previously unseen strain of malware as antivirus defenses did not spot it in time, we're told. Eggheads at the UK uni are urged to not open any more email attachments, which may be booby-trapped with the ransomware.

The UCL Information Services Division (ISD) said it had locked down access to the shared and networked drives that have been under siege from the malware since it began infecting users around mid-day Wednesday via an email message.

Jun 15 07:27

Researcher says fixes to Windows Defender's engine incomplete

James Lee says Microsoft's A-V software still has remote code execution holes

Jun 15 07:25

Jaff Ransomware Decryption Tool Released – Don't Pay, Unlock Files for Free

Kaspersky Labs has released an updated version 1.21.2.1 of its free ransomware decryption tool, RakhniDecryptor, which can now also decrypt files locked by the Jaff ransomware.

Security researchers at Kaspersky Labs have discovered a weakness in the Jaff ransomware code that makes it possible for victims to unlock their Jaff-infected files for free.

Jun 14 17:26

Fearing Terrorism, Germany Wants to Fingerprint 6-year-old Children and Force Smartphone Surveillance

By Jeff Paul

“We can’t allow there to be areas that are practically outside the law,” German interior minister Thomas de Maiziere told reporters today while announcing new Nazi-like surveillance measures to fight terrorism.

The new measures include fingerprinting 6-year-old children and forcing technology companies to give the German authorities front doors to smartphones and backdoors into messaging apps in order to spy on all communications...

Jun 14 17:18

Heads Up! 'Industroyer' Malware Found That Could Threaten Electrical Grid

A new malware variant capable of knocking out networks that run power grids around the globe has been discovered by a computer security company studying an attack on the Ukrainian power grid.

Jun 14 15:20

Apple’s App Store Becomes a Scammer’s Paradise

Apple’s App Store has a problem.

Shady developers are gaming the App Store’s policies and its search ads to get users to download apps that trick them into paying for subscriptions for scam apps.

Jun 14 10:30

Retired U.S. Military Commanders Call For “Perpetual, networked presence that enables operations and awareness anywhere in the world”

By Nicholas West

Perhaps it should never be surprising when those who have dedicated their lives to the military should call for a further expansion of the military. However, two retired commanders – Charles F. Wald, Retired U.S. Air Force general, former Deputy Commander of EUCOM; and Ted Johnson, Retired Navy Commander – have penned the most blatant and revealing vision of the future of war I’ve yet come across. It is a vision that literally sees Earth as a prison with the military in charge of the prison population...

Jun 14 09:28

Apple’s App Store Becomes a Scammer’s Paradise

Apple’s App Store has a problem.

Shady developers are gaming the App Store’s policies and its search ads to get users to download apps that trick them into paying for subscriptions for scam apps.

Jun 14 08:04

Robot-Powered Restaurant One Step Closer To Dumping Fast-Food Workers

A secretive robotics startup has raised a new round of venture funding as part of its quest to replace humans with robots in the kitchens of fast-food restaurants.

Momentum Machines secured over $18 million in financing, according to a SEC filing in May. The startup has generated investments from top VC firms Google Ventures and Khosla Ventures in the past.

Jun 14 08:04

Stephen King claims POTUS has blocked him on Twitter

Stephen King’s frequent criticisms of President Trump have resulted in him being blocked from the President’s Twitter page.

Jun 14 07:20

FLASHBACK - Rivero challenges the NSA

The US Government insists their demand for a ban on strong encryption or back doors into all of our electronic devices is to stop crime and terror.

But over the course of a year, as documented on this page, What Really Happened issued six encryption challenges based on systems of encryption created and programmed here on an air-gapped computer.

Now, I am not an encryption expert, and only a moderately decent programmer. The NSA would have a strong motive to break my codes to discourage others from creating their own systems of encryption.

None were ever solved.

If I can beat the NSA, it means real criminals and terrorists can defeat the NSA and keep their communications private.

Hence, the real agenda of the government is not to stop crime and terror but to monitor the American people to make sure they are not thinking those double-plus ungood thoughts about how this nation is being run!

Webmaster's Commentary: 

As noted below, the Five Eyes nations are working to force tech companies to once again provide back doors for all encryption, claiming it is needed to fight crime and terror, but as we demonstrated here, real criminals and terrorists can easily create their own codes the Five Eyes cannot read, while the back doors allow cyber-criminals easy access to our data!

Optional Banner: 
WRH Exclusive
Jun 14 07:10

Five Eyes nations stare menacingly at tech biz and its encryption

Officials from the United States, the United Kingdom, Canada, Australia and New Zealand will discuss next month plans to force tech companies to break encryption on their products.

The so-called Five Eyes nations have a long-standing agreement to gather and share intelligence from across the globe. They will meet in Canada with a focus on how to prevent "terrorists and organized criminals" from "operating with impunity ungoverned digital spaces online," according to Australian prime minister Malcolm Turnbull.

In the most forthright call yet from a national leader to break encryption, Turnbull told Parliament: "The privacy of a terrorist can never be more important than public safety – never."

Jun 14 07:01

Beware! Over 800 Android Apps on Google Play Store Contain 'Xavier' Malware

Over 800 different Android apps that have been downloaded millions of times from Google Play Store found to be infected with malicious ad library that silently collects sensitive user data and can perform dangerous operations.

Dubbed "Xavier," the malicious ad library, initially emerged in September 2016, is a member of AdDown malware family, potentially posing a severe threat to millions of Android users.

Since 90 percent of Android apps are free for anyone to download, advertising on them is a key revenue source for their developers. For this, they integrate Android SDK Ads Library in their apps, which usually doesn't affect an app's core functionality.

According to security researchers at Trend Micro, the malicious ad library comes pre-installed on a wide range of Android applications, including photo editors, wallpapers and ringtone changers, Phone tracking, Volume Booster, Ram Optimizer and music-video player.

Jun 14 06:59

Microsoft Releases Patches for 3 Remaining NSA Windows Exploits

Shortly after WannaCry outbreak, we reported that three unpatched Windows exploits, codenamed "EsteemAudit," "ExplodingCan," and "EnglishmanDentist," were also being exploited by individuals and state-sponsored hackers in the wild.

Specially EsteemAudit, one of the dangerous Windows hacking tool that targets remote desktop protocol (RDP) service on Microsoft Windows Server 2003 and Windows XP machines, while ExplodingCan exploits bugs in IIS 6.0 and EnglishmanDentist exploits Microsoft Exchange servers.

But now Microsoft has released free security updates for unsupported versions of its products, including Windows XP and Server 2003, to patch all the three cyber-weapons and block next wave of "destructive cyberattacks" similar to WannaCry.

Jun 14 01:59

‘JOE THE PLUMBER’ DIES IN FREAK ACCIDENT AFTER ANNOUNCING BID FOR CONGRESS - HOAX ALERT!

Fake/satirical website “The Last Line of Defense” seems to have taken the turn from fake news to something dangerously close to full-on fraud with this article titled: "'Joe The Plumber' Dies In Freak Accident After Announcing Bid For Congress".

Jun 13 15:03

New malware exposes vulnerability in 'critical infrastructure'

Six months on from a hacking attack that caused a blackout in Kiev, Ukraine, security researchers have warned that the malware that was used in the attack would be “easy” to convert to cripple infrastructure in other nations.

The discovery of the malware, dubbed “Industroyer” and “Crash Override”, highlights the vulnerability of critical infrastructure, just months after the WannaCry ransomware took out NHS computers across the UK.

Jun 13 15:01

Protecting your human rights in a digital age

What have human rights got to do with the technical running of the internet?

Jun 13 13:20

Facebook Helps Ex-Muslim Get Death Sentence!

Pakistan has sentenced a man to death for blasphemy on Facebook. The catch? Facebook aided Pakistan in cracking down on said anti-Islam blasphemy which begs the question: does Facebook have blood on its hands?

Jun 13 09:53

Apple users beware! Developers are giving away the 'most sophisticated Mac spyware ever' that could allow hackers to takeover devices and demand cash ransoms

Computer security researchers from Alien Vault and Fortinet have discovered two pieces of malware, MacSpy and MacRansom, which target Apple Mac systems.

MacSpy allows users to monitor an infected system, capture passwords and other sensitive details through the use of key stroke logging, screenshots and clipboard contents.

MacRansom works in a similar manner to the WannaCry software that plagued computer systems around the world, including the NHS, last month.

It encrypts the contents of a user's computer and threatens to delete all of the information it contains, unless a ransom of 0.25 Bitcoins, around £530 ($684), is paid.

Jun 13 09:47

Bitcoin wallet COINBASE now seizing accounts of Americans… users rage against “total ripoff” as their Coinbase accounts VANISH

The popular online Bitcoin wallet Coinbase has been routinely seizing accounts of users in Hawaii and Wyoming, effectively “stealing” their Bitcoins by locking them out of their accounts. A Natural News investigation confirms that Coinbase is citing obscure state laws in its decision to seize accounts of users in both states, yet the online wallet refuses to allow users to log in and change their state of residence if they move to another state.

In effect, Coinbase is “stealing” Bitcoins from users by locking them out of their own accounts, preventing them from accessing their Bitcoin balances even if they move to another state. Users are raging against the “ripoff” and the “theft” in user comments

That happened to me!

Jun 13 08:04

China on WannaCry: It wasn't us, honest

Chinese security firms have hit out against suggestions that last month's global WannaCry ransomware outbreak can be blamed on China.

The WannaCry ransomware epidemic hit over 300,000 PCs around the globe, using worm-like capabilities to spread and infect Microsoft Windows machines -- including many in China. While nobody has uncovered evidence to specifically identify the perpetrators, there are several theories as who might be behind the attack.

One hypothesis, offered by researchers Flashpoint following linguistic analysis of the WannaCry ransom note, is that it's the work of a native or highly fluent Chinese speaker who used machine translation to convert the original note into other languages.

But Chinese security firm Qihoo 360 has dismissed the claims and questioned the attempt to attribute the attacks by analysing the ransom note text.

Webmaster's Commentary: 

Most of the code originated with NSA, remember?

Jun 12 18:04

COVFEFE Act Would Make Social Media A Presidential Record, Even Deleted Tweets

Rep. Mike Quigley (D-Ill.) introduced legislation Monday to classify presidential social media posts — including President Trump's much-discussed tweets — as presidential records.

Jun 12 15:12

Claims of WannaCry ties to China 'groundless,' Chinese firms say

A report suggesting that WannaCry ransomware's authors could be native Chinese speakers has drawn fire from Chinese cybersecurity experts.

China-based cybersecurity companies Qihoo 360 and Antiy Labs have come to their country's defense, calling Flashpoint's linguistic analysis last month "groundless" and "unprofessional," Chinese state-run media Xinhua reported Monday.

Jun 12 15:10

Israeli hacking company NSO Group is on sale for more than $1 billion

The Israeli hacking company NSO Group has been put up for sale for a price of more than $1 billion, according to multiple people familiar with the matter.

The U.S.-based private equity firm Francisco Partners Management, which owns NSO Group, is looking to bring in around 10 times the $120 million it paid for a majority stake in the company in 2014. The group grew from around 50 employees when it was acquired to nearly 10 times that size, including more than 200 engineers dedicated to the hacking products that bring in the company’s rising profits.

NSO, which is known for selling cutting-edge offensive hacking technology to governments around the world, traces its roots to the Israeli military’s world-renowned signals intelligence unit known as Unit 8200.

Jun 12 15:09

IPhone 8 Secret Development in Israel under Security Precautions

IPhone 8 is undoubtedly one of the few gadgets the whole world is expecting the market to be supplied with in the coming months. According to the reports, Apple company will unveil the model in 2018 in the tenth anniversary of the IPhone line production. IPhone 8, whose brand model name has not been confirmed yet, is reported to have major differences with other former models. The main difference, however, lies in the fact that this model is originally designed and manufactured in Israel.

Jun 12 08:54

Chicago Police Refuse To Reveal “Heat List” Pre-Crime Surveillance Tactics – Journalists Sue

By Nicholas West

The Chicago police department continues to march toward what it calls “policing in the 21st century.” If their conduct is any indication, that police work would include systemic corruption, unlawful detention, torture, racial profiling and mass surveillance...

Jun 12 08:53

Dangerous Malware Discovered that Can Take Down Electric Power Grids

Last December, a cyber attack on Ukrainian power grid caused the power outage in the northern part of Kiev — the country's capital — and surrounding areas, causing a blackout for tens of thousands of customers for an hour and fifteen minutes around midnight.

Now, security researchers have discovered the culprit behind the attacks on industrial control systems.

Slovakia-based security software maker ESET and US critical infrastructure security firm Dragos Inc. say they have uncovered a new dangerous piece of malware in the wild that targets critical industrial control systems and is capable of causing blackouts.

Jun 12 08:09

Comey Thought He Knew of Obstruction Of Justice in Hillary Case

Former FBI Director James Comey thought he saw proof of obstruction of justice in the Hillary Clinton email case, but rather than report it as an officer of the court he furthered the obstruction.

Comey wants to talk about memos and obstruction? The President and his defenders must turn the tables and bore in on this fact. The President has already said he may live tweet during Mr. Comey’s testimony to “correct the record.”

The source of this shocking expose is the Washington Post which documents that Comey decided to give Hillary a pass only after seeing and believing in the authenticity of a memo the FBI had intercepted claiming Obama’s DOJ Chief, Attorney General Loretta Lynch had assured a Clinton associate that DOJ would not vigorously pursue the case against Hillary for use of an illegal server and using an unsecure server for classified documents. That document has been discredited as a forgery.

Comey embraced it over the disagreement about it’s province in the FBI!

Jun 12 07:43

Is Google’s Search-Engine Now Appallingly Corrupt?

Here is the evidence I’ve come across which indicates to me that the Google search-engine is now appallingly corrupt, and for which reason I am seeking (and hope to see in reader-comments at sites that publish this article) an alternative explanation for what presently appear to me to be systematic efforts by Google to hide crucial information and understanding from the public — to hide it so that the public can be manipulated to tolerate increasing control, by billionaires, of their governments (the diminution of democracy):

Jun 11 17:50

Give AI self doubt to prevent RISE OF THE MACHINES, experts warn

The idea goes that if AI has self-doubt, it will need to seek reassurance from humans, much in the same way a dog does, which will consolidate our place as top of the totem on Earth.

Jun 11 11:27

Warning! Hackers Started Using "SambaCry Flaw" to Hack Linux Systems

The maintainers of Samba has already patched the issue in their new Samba versions 4.6.4/4.5.10/4.4.14, and are urging those using a vulnerable version of Samba to install the patch as soon as possible.

Jun 11 09:36

CrowdStrike, The DNC’s Security Firm, Was Under Contract With The FBI

Claims of “Russian interference” have been ubiquitous in U.S. political discourse for almost a full year now; these often amount to a melange of allegations ranging from “hacking” to “influence campaigns” to “online trolls” sent by the Kremlin to harangue unsuspecting Midwestern voters. “Hacking,” however, remains the centerpiece of the narrative?—?the idea that Russian state actors “hacked” the Democratic National Committee and exfiltrated emails is routinely cited as the centerpiece of the overall “interference” thesis. After the alleged hacking, the DNC retained a private security firm?—?CrowdStrike?—?which made the determination that the Russian government was responsible, setting into motion a chain of Russia-related events that continue to unfold even now.

Webmaster's Commentary: 

Why am I so singularly unsurprised by this revelation?!?

Jun 11 09:29

Qatar's Al Jazeera TV says it has come under cyber attack

DOHA: Pan-Arab satellite network Al Jazeera is combating a large-scale cyber attack on its media platform, but all its entities remain operational, a company source said on Thursday.

"There were attempts made on the cyber security of Al Jazeera but we are combating them and currently all our entities are operational," said a senior employee who declined to be named.

Al Jazeera is the flagship broadcaster for Qatar, which is in a stand-off with fellow Arab states which accuse it of ties to terrorism, in a row that is endangering stability in the region.

Webmaster's Commentary: 

"In a time of universal deceit — telling the truth is a revolutionary act." - George Orwell, "1984".

I, for one, appreciate the English language edition of Al Jazeera, and respect the general integrity of its reporting.

So hang in there, IT people at Al Jazeera; as was said during World War II, if you're catching flack, you know you're over the target.

Jun 11 07:21

Tracking Hacking: Visualizing The World's Biggest Data Breaches

The graphic below shows a timeline of some of the biggest data breaches on record. As Visual Capitalist's Chris Matei notes, each bubble represents the number of records lost in any given breach, with the most sensitive data clustered toward the right side.

Jun 10 20:13

Theresa May's Plan To Regulate The Internet Won't Stop Terrorism; It Might Make Things Worse

While May's desire for a strong response is easy to understand, her call for more expansive internet regulation and censorship is wrongheaded and will make it harder to win the war against violent extremism.

May didn't specify the details of her proposal, but to many observers it was clear that she's asking for sweeping new powers to compel tech companies to help spy on citizens and censor online content. Unfortunately, this isn't simply a knee-jerk response to horrible circumstances, but reflects a longstanding ambition of May's Conservative Party to impose draconian controls on cyberspace.

Jun 10 17:52

Facebook Could Rig The General Election... And We Wouldn't Even Notice

Whilst there is no evidence that Facebook has done anything dodgy - nor any suggestion that it wants to - it certainly would have the power to do something like this if it chose to. And there are few checks on Facebook and other major social media companies, if they did want to wield their power in a partisan way.

Ultimately, the big tech players are not neutral arbiters of content - and they all have potentially huge amounts of unchecked power at their disposal - which could, conceivably, change the results of an election.

Jun 10 17:47

Malware Uses Obscure Intel CPU Feature to Steal Data and Avoid Firewalls

The good news is that Intel AMT SOL comes disabled by default on all Intel CPUs, meaning the PC owner or the local systems administrator has to enable this feature by hand.

The bad news is that Microsoft discovered malware created by a cyber-espionage group that abuses the Intel AMT SOL interface to steal data from infected computers.

Microsoft can't say if these state-sponsored hackers found a secret way to enable this feature on infected hosts, or they just found it active and decided to use it.

Jun 10 17:44

China uncovers massive underground network of Apple employees selling customers’ personal data

Of the 22 suspects, 20 were employees of an Apple “domestic direct sales company and outsourcing company”.

The suspects allegedly used an internal company computer system to gather users’ names, phone numbers, Apple IDs, and other data, which they sold as part of a scam worth more than 50 million yuan (US$7.36 million).

The statement referred to “domestic employees of Apple” but it was unclear whether they were directly employed by the company or by Apple suppliers or vendors. It also did not specify whether the data belonged to Chinese or foreign Apple customers.

Jun 10 17:41

GameStop confirms extensive credit card data breach

If you're a GameStop customer, check your mail. The company just sent out letters to online patrons confirming a suspected payment security breach.

In April, GameStop said they were looking into a possible data breach that might have put customers' credit card information at risk. Confirming those suspicions, Kotaku reported today that a number of GameStop customers have received letters notifying them that their credit cards may have been stolen.

The company hasn't released any numbers yet, but anyone who placed an online order with them between August 10, 2016 and February 9, 2017 is at risk. That's quite a long time and it's safe to say many people were exposed. Names, addresses and credit card information were compromised and the reports from April speculated that the three-digit security numbers were taken as well.

Jun 10 17:37

THERESA MAY TO LAUNCH WIDE-RANGING INTERNET REGULATION AND SECURITY CHANGES DESPITE NOT WINNING MAJORITY

Theresa May looks set to launch wide-ranging internet regulation and plans to fundamentally change how technology works despite not having won a majority.

In the speech in which she committed to keep governing despite calls to stand down, the prime minister made reference to extending powers for the security services. Those powers – which include regulation of the internet and forcing internet companies to let spies read everyone's private communications – were a key part of the Conservative campaign, which failed to score a majority in the House of Commons.

Jun 10 09:11

CrowdStrike, The DNC’s Security Firm, Was Under Contract With The FBI

TYT can report that at the same time CrowdStrike was working on behalf of the DNC, the company was also under contract with the FBI for unspecified technical services. According to a US federal government spending database, CrowdStrike’s “period of performance” on behalf of the FBI was between July 2015 and July 2016. CrowdStrike’s findings regarding the DNC server breach?—?which continue to this day to be cited as authoritative by everyone from former FBI Director James Comey, to NBC anchor Megyn Kelly?—?were issued in June 2016, when the contract was still active.

Jun 10 09:08

AFTER YEARS OF BEING A MEMBER, I JUST GOT LOCKED OUT OF TWITTER BECAUSE THEY THINK I’M A ROBOT OR DO THEY NOT LIKE MY POLITICS?

Jun 10 07:37

This Raspberry Pi-inspired Z-Berry board will take you back to the dawn of home computing

The ?Z-Berry is a single-board computer that is the same size as the Raspberry Pi and is built around the Zilog Z80 processor used in the ZX Spectrum, a best-selling British computer launched in 1982.

Jun 10 07:20

California finally releases wiretap dataset

In 2016, California investigators used state wiretapping laws 563 times to capture 7.8 million communications from 181,000 people, and only 19% of these communications were incriminating. The year’s wiretaps cost nearly $30 million.

We know this, and much more, now that the California Department of Justice (CADOJ) for the first time has released to EFF the dataset underlying its annual wiretap report to the state legislature.

Jun 10 07:20

SUPER CREEP! WHAT MARK ZUCKERBERG IS ABOUT TO DO TO YOUR SMARTPHONE WILL MAKE YOU CRINGE

Facebook wants to spy on YOU through your smartphone camera and analyse the emotions on your face. The social network just patented technology that monitors users' reactions to posts, messages and adverts you see on its app.

Jun 09 14:56

Al Jazeera Under Cyber-Attack

Whilst the UK has a political upheaval in a General Election debarcle, whilst Trump’s politicing creates divisions across the globe and as other crazy events unfurl, yesterday the Al Jazeera network came under Cyber Attack:

Jun 09 13:40

AMAZON SCRAMBLES TO KNOCK CONSERVATIVE BOOK OFF #1 SPOT... SUNK TO NEW LEVEL

In what looks like could be a new low for Amazon, a book on Amazon’s best sellers, “Dangerous” by Milo Yiannopoulos, was knocked out of its place by a Dr. Seuss. What’s fishy isn’t that it simply switched places, but the circumstance around its drop.

Jun 09 11:35

4 World-Famous Websites Who Ripped off Their Ideas from Someone Else

Look into the histories of world-famous websites like Facebook, Twitter, Hulu, and PayPal, and you’ll find they ripped off smaller, less well-funded competitors for their ideas, marketing strategies, and even business models. It’s not subtle, either. They took someone else’s idea and ran with it, making it worth millions or even billions in the process.

Sure, they improved the product. Sure, they had better marketing. Sure, they just plain got it done, when no one else could.

Without a doubt, they deserve credit for everything they’ve done, but they don’t get to claim they were first. Let’s take a look into their histories, and I’ll show you what I mean.

Jun 09 10:45

NASA employees caught watching child porn

At least a dozen NASA employees have been caught watching porn at the office since 2015 by the agency’s Inspector General (IG), including several with images of children in sexual situations, according to documents obtained by The Daily Caller News Foundation’s Investigative Group.

NASA has changed since I was there!!!!!!!!

Jun 09 10:01

The S.M.A.R.T Psy-op Consumers Don’t Recognize

By Catherine J. Frompovich and Contributing researcher Kerri Ellen Wilder

“Smart” is really S.M.A.R.T., an engineering acronym for Specific – Measurable – Achievable – Relevant – Time-based. The reality that ultimately will evolve from this psy-op is a dystopian future destructive of dignity and freedom. Your liberty, your privacy, and the American way of life are on sale right now for electric dollars. The Internet of Things (IoT) and 5G are being represented and presented as the harbingers of a global utopia. They are, in fact, nothing short of a Faustian bargain of illusory promises many will live to regret when all their individual freedoms are forfeited for technology.

The “smart” meme and techno world stretches back to the 1930s when M. King Hubbert authored his “Technocracy Study Course,” which developed technocracy’s principles for the distribution of energy resources, as well as the monitoring and measurement of all of energy’s outputs...

Jun 09 09:23

Hackers could use Amazon voice gadget to steal bank details: Warning electronic assistants pose security risk because they are always listening

Electronic assistants such as the Amazon Echo could be hacked by criminals to steal personal information, a security expert has warned.

Millions have bought voice-activated speakers which play music, provide weather forecasts, order groceries and answer questions.

The devices are brought to life by vocal commands such as 'Alexa' or 'Hello Google' but experts warn they pose a major security risk as they are always listening in and monitoring conversations.

Criminals could hack into them to find out when families are away or steal credit card details when someone orders a takeaway over the phone.

Jun 09 08:24

Say hello to Dvmap: The first Android malware with code injection

A powerful Android trojan with novel code injection features that posed as a game was distributed through the Google Play Store before its recent removal.

The Dvmap trojan installs its malicious modules while also injecting hostile code into the system runtime libraries. But Dvmap has other tricks up its sleeve. Once successfully installed, the malware deletes root access in an attempt to avoid detection.

"The introduction of code injection capability is a dangerous new development in mobile malware," according to Kaspersky Lab. "Since the approach can be used to execute malicious modules even with root access deleted, any security solutions and banking apps with root-detection features that are installed after infection won't spot the presence of the malware."

Jun 09 08:04

Why it's Facebook wot won it

There’s been a whole campaign and conversation going on in people’s inboxes and Facebook feeds during this election that the media won’t have seen. .As newspaper audiences decline and broadcast audiences fracture, it’s a no-brainer for political parties to bolster their online presence. We know that more than half the country consume their news online. And the smartphone is the main vehicle for people to digest the latest developments. News by appointment belongs to a bygone era.

Jun 09 08:03

Unresolved Murder: Why Seth Rich's Case is Key to #TrumpRussia Investigation

The unresolved murder of Democratic National Committee (DNC) staffer Seth Rich has again been brought into the spotlight.

About a year ago Rich, who reportedly worked as the voter expansion data director at the DNC, was shot in the back in the Bloomingdale neighborhood of Washington D.C.

The Metropolitan Police Department (MPD) surmises that the DNC staffer was a victim of a robbery. However, his wallet, credit cards and cellphone were found on his body, intact.

Jun 08 13:59

FLASHBACK - Cyber Firm at Center of Russian Hacking Charges Misread Data

While questions about CrowdStrike’s findings don’t disprove allegations of Russian involvement, they do add to skepticism voiced by some cybersecurity experts and commentators about the quality of their technical evidence.

The Russian government has denied covert involvement in the election, but U.S. intelligence agencies have concluded that Russian hacks were meant to discredit Hillary Clinton and help Donald Trump’s campaign. An FBI and Homeland Security report also blamed Russian intelligence services.

On Monday, FBI Director James Comey confirmed at a House Intelligence Committee hearing that his agency has an ongoing investigation into the hacks of Democratic campaign computers and into contacts between Russian operatives and Trump campaign associates. The White House says there was no collusion with Russia, and other U.S. officials have said they’ve found no proof.

Jun 08 10:06

Microsoft will be retiring Skype for some of the older platforms starting July 1

Microsoft will be retiring Skype on Windows Phone 8, Windows Phone 8.1, Messaging app for Windows 10 Mobile, Windows RT, TV, wef July 1, 2017.

Webmaster's Commentary: 

Also some linux versions as well.

Jun 07 12:31

May Imposes Censorship on Internet After London Attack – Instead of Repairing the Devil

It takes guts and humility to admit mistakes. Admitting we're wrong is courage, not weakness.

Tell that to British Prime Minister Theresa May. She still believes her country has never made a mistake in Syria or in the region; at least, never one that she couldn't explain away. She refuses to yield when she knows her government’s course to collude with terrorists is wrong. She refuses to own her mistakes, let alone end the unnecessary war on Syria and repair the devil.

Instead, PM May wasted no time after Saturday’s London Bridge attack in announcing that she will be pushing some irrelevant international agreements aimed at global regulation of speech on the Internet, claiming that extremists have been using “safe spaces online” in their terror attacks.

Jun 07 09:47

US Investigators Blame ‘Russian Hackers’ for Qatar Split With Saudis

While President Trump has personally claimed credit for the split between Qatar and the other Gulf Arab states, some US investigators are engaged in particularly wild speculation today, aiming to make the whole situation a plot carried out by Russian hackers.

A little over a week into the latest row, tensions between Qatar and other Gulf states is a hugely complicating factor for US foreign policy in the region, particularly since Qatar hosts the largest US military base in the Middle East. Qatar’s split is something that’s been an ongoing issue for years, based around differing views on the Arab Spring.

Fake news helped though, too, as while that row between Qatar and the Saudis has been a thing for years, this latest escalation centered around a report in the Qatar state media, right after President Trump’s visit to Saudi Arabia to make hawkish speeches about Iran, quoted the Qatari Emir warning against seeking military confrontation toward Iran.

Webmaster's Commentary: 

President Trump cannot have this situation both ways.

Either he was responsible for the blockade, and the Saudi ultimatum against Qatar, or he was not; it's sort of like being pregnant; one either is, or is not, period, end of discussion.

But in the collusion of events within the last 24 hours, one can see the opening salvos of a war against Iran coming, and coming quickly. Fast forward to this morning:

Turkey approves a bill to send troops to Qatar

Assad's military alliance threatens strike against US forces in Syria.

Qatari riyal crashes after Saudi Arabia orders their banks to cut exposure to it

Iran blames Saudi Arabia for terrorist attack,
Vows revenge.

UAE threatens 15 years jail time for publishing statements sympathetic to Qatar

Tehran Stock Exchange down 76% after terror attack

All of these situations, evaluated together, most probably mean a coming war against Iran, which possibly means war with Russia, and sooner rather than later.

Jun 07 09:32

POLICE NOW ROUTINELY CRACK AND EXTRACT ALL PHONE DATA FROM ARRESTEES

Muckrock filed Freedom of Information Requests with multiple US police forces to find out how they were using "mobile phone forensic extraction devices" -- commercial devices that suck all the data out of peoples' phones and make it available for offline browsing. They discovered that the practice of sucking up the entirety of arrestees' phones was incredibly common, and that often, cops sucked up this data without a warrant, after first obtaining "consent" from arrestees.

Jun 07 09:06

Break crypto to monitor jihadis in real time? Don't be ridiculous, say experts

Jennifer Arcuri, a co-founder of cyber-security Hacker House, who debated with Silva on Today, pointed out that any government backdoor would necessarily weaken the security of an encrypted comms channel. "If you allow one backdoor for government, you've no idea who else is accessing or listening," she said.

The government has the capability to hack phones. It is possible to monitor and surveil people, argued Arcuri, who added that the authorities simply need to obtain a warrant under existing surveillance law – namely, the Investigatory Powers Act.

Silva asserted that terrorists responsible for recent atrocities in Paris 2015 and more recently in April in Stockholm - "insofar as we can tell" - were using encrypted comms.

"Even if you try to hack into someone's device, you can't tell what's going on within those apps," he claimed.

Jun 07 08:51

Australia to float 'not backdoors' that behave just like backdoors to Five-Eyes meeting

Brandis told Sky News "If those encrypted communications contain information which is necessary to a prosecution, an intelligence task like keeping a terrorism suspect under appropriate surveillance, then there does need to be a level of co-operation from the carriage services providers."

Speaking on the Australian Broadcasting Corporation's AM program, MacGibbon also called for "co-operation" and said that while "no-one is talking about back doors here" Australians understand that their privacy at home can be breached when Police gain a warrant to enter their homes.

"From time to time we do expect our privacy to be breached," he said, adding "From time to time you would expect a law enforcement agency to break into a private communication online."

Jun 07 08:43

Pop-up Android adware uses social engineering to resist deletion

A malicious Android app that downloads itself from advertisements posted on forums strongly resists removal, security firm Zscaler warns.

The dodgy Android utility poses as "Ks Clean", an Android cleaner app. Once installed, the app displays a fake system update message in which the only option presented to the user is to select the "OK" button, giving victims little immediate option other than to accept a supposed security update.

As soon as the user presses "OK", the malware prompts the installation of another APK named "Update". The Update app asks for administrator privileges which, if granted, can't be revoked.

The app uses the insidious mask of a "security update" to get a user to complete the installation.

After that, there is nothing to stop malware from slinging pop-up ads at victims even when the user is using other apps.

Jun 07 08:43

FLASHBACK - Charter Communications sued for not delivering promised internet speed

New York’s attorney general has filed a lawsuit against Charter Communications alleging that the cable and internet provider failed to deliver on promised internet speeds and reliability.

Charter’s subsidiary, Spectrum, was previously known as Time Warner Cable.

Webmaster's Commentary: 

Spectrum cannot get their act together. Internet speed from the local hub to my home is just 10% of what we pay for and to the mainland it is even worse! You should read the comments/complaints over at Down Detector!

Jun 07 08:41

Beware! This Microsoft PowerPoint Hack Installs Malware Without Requiring Macros

"Disable macros and always be extra careful when you manually enable it while opening Microsoft Office Word documents."

You might have heard of above-mentioned security warning multiple times on the Internet as hackers usually leverage this decade old macros-based hacking technique to hack computers through specially crafted Microsoft Office files, particularly Word, attached to spam emails.

But a new social engineering attack has been discovered in the wild, which doesn't require users to enable macros; instead it executes malware on a targeted system using PowerShell commands embedded inside a PowerPoint (PPT) file.

Moreover, the malicious PowerShell code hidden inside the document triggers as soon as the victim moves/hovers a mouse over a link (as shown), which downloads an additional payload on the compromised machine -- even without clicking it.

Jun 07 08:05

Claims of 'Russian Hackers' in Qatar Seen as Attempt to Pit US, Russia

Vladimir Dzhabarov, the first deputy chairman of the Russian upper house International Affairs Committee said that he considers eports of alleged Russian hackers behind a planted pro-Iranian story on Qatar's news agency website as an attempt to push the US and Russia as the leading players in the Middle East.

Jun 07 07:50

BEX ALERT - Russian hackers may have put out fake info that helped spark Gulf crisis

Russian hackers are suspected of interfering with a news site in Qatar and may have put out fake information that helped spark a diplomatic crisis in the Gulf, CBS News has learned.

Jun 07 07:49

OneLogin security chief reveals new details of data breach

OneLogin is similar to a password manager, but also manages the identities and login information of enterprise and corporate users -- from hospitals, law firms, financial giants, and even newsrooms. OneLogin acts as a central sign-in point to allow its customers -- which includes millions of staff and end users -- to access their accounts on other popular sites and services, like Microsoft and Google accounts.

Jun 06 11:00

How The Intercept Outed Reality Winner

Today, The Intercept released documents on election tampering from an NSA leaker. Later, the arrest warrant request for an NSA contractor named "Reality Winner" was published, showing how they tracked her down because she had printed out the documents and sent them to The Intercept. The document posted by the Intercept isn't the original PDF file, but a PDF containing the pictures of the printed version that was then later scanned in.

Jun 06 10:10

London Attack, Cyber Warfare, Putin, Trump, and Climate Hoax. Michael Rivero - June 5, 2017

Jun 06 09:33

Facebook wants to SPY on you through your webcam or phone: Creepy patent reveals footage collected would be used to tailor material but critics warn it is an 'ethical minefield'

The patent describes using 'passive imaging data' – video captured by cameras which aren't turned on.

An algorithm would then determine the user's emotion, based on their facial expressions.

To illustrate how the system would work, Facebook created a fictitious person, called Desmond Jones.

The patent says: 'It appears from the profile that the user, Desmond Jones, was looking away from his device during a kitten video posted by Tim Boone.

'Thus, a content delivery system may determine to exclude videos of that type in the future.

'In another example, it appears that the user has watched an advertisement for scotch. Thus, in the future, more advertisements for scotch may be displayed to the user.'

Jun 06 09:26

flashback ---- DHS Caught Pretending To Be Russian Hackers

Georgia’s Secretary of State Brian Kemp claims the Department of Homeland Security (DHS) tried to hack into his office’s firewall, pretending to be Russian hackers.

Jun 06 09:03

DEA Deploying Powerful Spyware Without Required Privacy Impact Assessments

It's not just the FBI that can't seem to turn in its privacy-related paperwork on time. The FBI has pushed forward with its biometric database rollout -- despite the database being inaccurate, heavily-populated with non-criminals, and without the statutorily-required Privacy Impact Assessment that's supposed to accompany it. As of 2014, it hadn't produced this PIA, one it had promised in 2012. And one that applied to a system that had been in the works since 2008.

Jun 06 08:54

Tech World Angry With Theresa May’s Internet Regulation Plans

Internet companies, tech experts, activists and fellow politicians have reacted to PM May’s comments with disapproval, even accusing her of pushing her own agenda in the wake of recent tragic events.

Limiting cryptography or building the kind of backdoors that May wants would end up crippling the Internet as we know it, argues author and BoingBoing co-editor Cory Doctorow. He claims: “There’s no back door that only lets good guys go through it.” Even if app developers were instructed to refrain from using encryption, it would be very difficult to stop criminals from encrypting their messages manually or writing them in code.

Mark Chapman, UK Pirate Party’s candidate for Vauxhall, said: “Regulating the internet is not the answer, and it is shameful that Theresa May is so quick to use the events of a tragedy to fuel her own autocratic agenda.”

Jun 06 08:44

Peplink patches SD-WAN routers

SD-WAN company Peplink has patched its load-balancing routers against vulnerabilities turned up by a German pentest company.

The bugs discovered by X41 Security centre, as is so often the case, around the products' Web admin interface, with seven individual bugs reported (CVE-2017-8835 to CVE-2017-8841).

The vulnerabilities include a critical SQL injection attack via the bauth cookie; a lack of cross-site request forgery protection; clear text password storage; two cross-site scripting bugs; a file deletion vulnerability; and an information disclosure bug.

Jun 06 08:41

Apple gives world ... umm ... not much new actually

Minimalist makeovers for iPad, Mac, iOS and MacOS leave Cupertino perhaps looking iterative, not innovative

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA