COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Apr 20 12:10

BOSE HEADPHONES SPY ON LISTENERS: LAWSUIT

Bose Corp spies on its wireless headphone customers by using an app that tracks the music, podcasts and other audio they listen to, and violates their privacy rights by selling the information without permission, a lawsuit charged.

Apr 20 09:24

FBI Admits It Was Not The Russians?

- Launches Manhunt For "Insider" Who Leaked CIA Docs To WikiLeaks

Apr 20 08:39

'Nobody's got to use the internet,' argues idiot congressman in row over ISP privacy rules

Faced with an angry citizen asking why he had voted away their online privacy rights, US House Rep Jim Sensenbrenner (R-WI) had a remarkable answer: you don't have to use the internet if you don't like it.

Speaking at a town hall meeting in Wisconsin on Friday, the Republican legislator was asked about his vote to kill off proposed information safeguards – a move that effectively gave American ISPs the green light, as well as the right, to sell subscribers' sensitive personal details without requiring their consent or even having to inform them.

The voter disputed the Republican line that ISPs should not have to deal with stricter rules than companies like Google or Facebook, arguing that: "Facebook is not comparable to an ISP. I do not have to go on Facebook. I don't have to go on Google. My ISP provider is different than those providers."

Sensenbrenner's response? "Nobody's got to use the internet."

Webmaster's Commentary: 

Dear Wisconsinites: this man is a complete embarrassment to every voter in the state.

If this man is running against a donkey in the next election, please vote for the donkey; it will, assuredly, give you a better outcome in terms of personal rights.

Apr 20 08:38

Gab Founder Banned From Silicon Valley

Andrew Torba talks about how after his political views became known he has been banned from the very liberal Silicon Valley.

Apr 20 08:31

BREAKING: FACEBOOK ANNOUNCES MIND-CONTROLLED COMPUTER TECHNOLOGY

On Tuesday, Facebook founder Mark Zuckerberg dropped a stunner when he announced to the attendees of F8, Facebook’s annual developers’ conference, that the tech giant is developing technology that will allow users to communicate using only their minds. The technology will come in the form of implantable chips that will create a brain-computer interface (BCI). It’s one of several secret projects being developed in the mysterious R&D division Building 8 labs.

Zuckerberg’s past statements on the fabled brain-computer interface have been nothing less than tantalizing. In 2015, Zuckerberg laid out his personal vision for the technology:

“One day, I believe we’ll be able to send full rich thoughts to each other directly using technology,” Zuckerberg said during a Q&A. “You’ll just be able to think of something and your friends will immediately be able to experience it too if you’d like.”

Webmaster's Commentary: 

Sounds fascinating; but the question I want answered is, will those chips send information only, or receive as well, as a form of mind control?!?

Apr 20 07:31

Vigilante botnet infects IoT devices before blackhats can hijack them

Hajime uses the same list of user name and password combinations Mirai uses, with the addition of two more. It also takes steps to conceal its running processes and files, a feature that makes detecting infected systems more difficult. Most interesting of all: Hajime appears to be the brainchild of a grayhat hacker, as evidenced by a cryptographically signed message it displays every 10 minutes or so on terminals. The message reads:

Just a white hat, securing some systems.

Important messages will be signed like this!

Hajime Author.

Contact CLOSED

Stay sharp!

Another sign Hajime is a vigilante-style project intended to disrupt Mirai and similar IoT botnets: It blocks access to four ports known to be vectors used to attack many IoT device. Hajime also lacks distributed denial-of-service capabilities or any other attacking code except for the propagation code that allows one infected device to seek out and infect other vulnerable devices.

Apr 20 07:26

This Robot Works 500% Faster Than Humans, and It Puts Thousands of Jobs at Risk

Meet SAM — short for Semi-Automated Mason — created by the New York based Construction Robotics. SAM is capable of laying 3,000 bricks per day, and he is coming to the U.K. in a few months.

SAM can work about 500 percent faster than humans, and discrepancy in labor cost that causes is significant. According to a report by Zero Hedge, 3,000 bricks boils down to a cost of 4.5 cents per brick. Based on a $15 per hour minimum wage rate and benefits, a human bricklayer with an average efficiency of about 500 bricks will cost construction firms about 32 cents per brick — that’s more than 7x the cost of an automated bricklayer.

SAM isn’t able to work independently, however. A builder still has to feed the bricks onto its conveyor belt, which will then be picked up by SAM’s robotic arm, slathered with mortar, and placed on the wall. From there, another bricklayer has to follow up SAM’s work by cleaning up excess mortar.

Apr 20 07:13

If you've stayed at a Holiday Inn you may have lost more than a good night's sleep (like maybe your bank card)

In February, Intercontinental Hotels Group alerted customers that some of its US locations had been infected with credit-card-stealing malware. Now it has admitted the cyber-outbreak is much worse than first thought.

IHG, which owns brands like Holiday Inn and Crown Plaza, has warned that around 1,200 of its hotels across the US and Puerto Rico have been hit by the same sales terminal malware – which grabs card data from the computers' memory as payments are made. This information is then siphoned off to crooks to use online and create cloned cards. The infections were spotted on September 29, 2016 but the infections weren't cleared up until March 2017, and some hotels might still have a problem.

Apr 20 07:10

Ambient light sensors can steal data, says security researcher

Security researcher Lukasz Olejnik says it is possible to slurp sensitive data with the ambient light sensors installed in many smartphones and laptops.

The sensors are there so that devices can automatically change the brightness of screens, a handy trick that save scrambles to change settings.

But Olejnik says such sensors are dangerous because the World Wide Web Consortium (W3C) is considering “whether to allow websites access the light sensor without requiring the user’s permission.” That discussion is taking place in the context of giving web pages the same access to hardware that native applications enjoy.

If web pages can do so, the sensor can be made to detect variations in brightness on a device's screen so, for instance, the sensors could “read” a QR code presented inside a web page, Olejnik says. And seeing as QR codes are sometimes published as an authentication tool for chores like password changes, Olejnik thinks that's a worry.

Apr 19 18:45

How This One Man Is Giving Free Speech Back To The People

Paul Joseph Watson and Andrew Torba discuss how his app [Gab] is giving the people what they've been asking for, a platform not controlled by giant corporations and designed to crush and control free speech.

Apr 19 14:40

WikiLeaks: CIA tools could infiltrate MacBooks, iPhones

Armed with a fresh set of leaked documents, WikiLeaks said Thursday that the US Central Intelligence Agency has developed tools to infect Apple products like iPhones and MacBooks.

The tools, which date from between 2009 and 2013, are unlikely to affect current Apple hardware. They show a spy agency attempting to crack into some of the most locked-down consumer electronics devices available, using hacking methods that require the agency to directly access the products.

Apr 19 14:40

Bose headphones spy on listeners - lawsuit

Bose Corp spies on its wireless headphone customers by using an app that tracks the music, podcasts and other audio they listen to, and violates their privacy rights by selling the information without permission, a lawsuit charged.

The complaint filed on Tuesday by Kyle Zak in federal court in Chicago seeks an injunction to stop Bose's "wholesale disregard" for the privacy of customers who download its free Bose Connect app from Apple Inc or Google Play stores to their smartphones.

Apr 19 12:07

Paranoid Hillary Clinton downloaded staff emails from her failed 2008 campaign to find out who had been plotting against her as she went up against Trump, bombshell book claims

Hillary Clinton downloaded emails sent and received by her top staff from her failed run for the Presidency in 2008 to see who had been plotting against her, claims a blockbuster new book about the campaign.

The Democratic presidential candidate obtained the emails from her campaign server to see who had been disloyal and who had been leaking against her.

Apr 19 09:14

COURTS ARE USING AI TO SENTENCE CRIMINALS. THAT MUST STOP NOW

Currently, courts and corrections departments around the US use algorithms to determine a defendant’s “risk”, which ranges from the probability that an individual will commit another crime to the likelihood a defendant will appear for his or her court date. These algorithmic outputs inform decisions about bail, sentencing, and parole. Each tool aspires to improve on the accuracy of human decision-making that allows for a better allocation of finite resources.

Typically, government agencies do not write their own algorithms; they buy them from private businesses. This often means the algorithm is proprietary or “black boxed”, meaning only the owners, and to a limited degree the purchaser, can see how the software makes decisions. Currently, there is no federal law that sets standards or requires the inspection of these tools, the way the FDA does with new drugs.

Webmaster's Commentary: 

The alleged American "correctional system" generally does not correct criminal behaviour; by the time the convict has served their time, and is released into the general population, they are generally worse off than when they began their sentence, and as recidivism rates in this country show, are very likely to re-offend.

Adding predictive algorithms to the mix, without either a clarity as to how those algorithms have been created, or the kind of rehabilitation one finds in more enlightened prison systems, like those of Sweden, just adds salt to the wounds of incarceration, and does not help the judges come to any reasonable assumptions on what the predictive outcome of their sentencing of convicts can be.

Apr 19 08:00

Homeland Security warns of 'BrickerBot' malware that destroys unsecured internet-connected devices

Reminiscent of the Mirai botnet that brought down large swathes of the US internet last year, this new malware targets poorly-secured Internet of Things devices and renders them useless.

Webmaster's Commentary: 

Best solution? Don't buy IoT devices!

Apr 19 06:51

Parents In Germany Face $26,500 Fine If They Don’t Destroy Controversial ‘My Friend Cayla’ Dolls

After researchers found that My Friend Cayla dolls were recording users’ and sending this information out to a third party specializing in voice-recognition for police and military forces, officials in Germany told parents to get rid of the toys. In case families didn’t take that request seriously, the country’s telecommunications regulator has since clarified that parents who don’t destroy their Cayla dolls could face more than $25,000 in fines.

Apr 19 06:43

Fixing your oven can cook your computer

If your Hotpoint cooker or washer's on the blink, don't arrange a repair by visiting company's site: Netcraft says the appliance vendor's foisting nastyware onto visitors.

Netcraft says it's found fake Java update dialogs on Hotpoint's UK and Republic of Ireland sites. If you click “Install” you won't be updating Java, you'll be firing up an obfuscated JavaScript that Hotpoint did not place on its site. That script tries to hide the fact it refers to a third-party site that can send a custom payload your way.

That payload won't do nice things to your endpoint and may expose you to attacks like drive-by malware or phishing.

Apr 19 06:41

Chap 'fixes' Microsoft's Windows 7 and 8 update block on new CPUs

Developer says he's found a way to stop Windows' new CPU check, which means updates flow again

Apr 18 15:32

IDN Safe

IDN Safe is a browser extension which blocks internationalized domain names to prevent you from visiting probable fake sites.

IDN Safe blocks internationalized domain names also known as punycode domains. This helps you to identify them and will prevent you from visiting probable fake sites.

The use of Unicode in domain names makes it potentially easier to spoof web sites as the visual representation of an IDN string in a web browser may make a spoof site appear indistinguishable to the legitimate site being spoofed, depending on the font used.

With IDN Safe you can temporarily allow domains or whitelist them at all. By default they are blocked.

Block Punycode phishing attacks on Chrome. Can be used on Opera when https://addons.opera.com/en/extensions/details/download-chrome-extensi... is installed.

Apr 18 15:17

That apple.com link you clicked on? Yeah, it's actually Russian

The trouble – which was first noted way back in 2001 – is that some letters in other languages like Cyrillic are different but look almost identical. You can get identical-looking versions of "a", "B", "c", "i", "l", "O" and "p," among others.

So by combining the codes for these other letters with non-coded letters you can appear to spell out a word like "apple," therefore tricking people into visiting a different website from the one they think they are visiting.

Needless to say, the organization in charge of overseeing the domain name system, US-based ICANN, took this seriously and put out a warning back in 2005 on what it termed "homograph attacks."

...

And so it turned to its community of internet engineers and policy makers and opened a formal comment forum to come up with "countermeasures" and "improve public protection from abusive use of domain names."

That was 12 years ago. What's happened since?

Not much, it seems.

Apr 18 15:11

Debian bins keys assigned to arrested Russian contributor

Debian has removed keys assigned to developer Dmitry Bogatov after he was arrested by Russian authorities for using the internet to organise protests. Or, as Russian outlet TASS puts it, “for terrorism and attempts to stage unrest in Moscow.”

Bogatov was remanded in custody for two months, but claims he was not at his keyboard at the time posts calling for protests were made. He's also said he will co-operate with authorities.

But his arrest has spooked projects he worked on, such as Debian for which he “currently maintains several packages for command line and system tools.” Debian says it stands by Bogatov and hopes “that he receives fair treatment and due process.” But the project has nonetheless “taken measures to secure its systems by removing Dmitry's keys in the case that they are compromised.”

Apr 18 15:08

vCenter phoned home 'customer improvement' data and opened remote code execution hole

Ever worried that software phoning home application performance data so vendors can learn from real-world users might become an attack vector? If so, your nightmare just came true: VMware's vCenter has just that problem, thanks to its use of the Adobe-derived open source BlazeDS messaging tool to process messages.

VMware's issued patches to vCenter 6.0 and vCenter 6.5, both rated critical. Previous versions of vCenter don't have the problem. Nor do users who opted out of VMware's Customer Experience Improvement Program.

Apr 18 14:14

This Phishing Attack is Almost Impossible to Detect On Chrome, Firefox and Opera

A Chinese infosec researcher has reported about an "almost impossible to detect" phishing attack that can be used to trick even the most careful users on the Internet.

He warned, hackers can use a known vulnerability in the Chrome, Firefox and Opera web browsers to display their fake domain names as the websites of legitimate services, like Apple, Google, or Amazon to steal login or financial credentials and other sensitive information from users.

...

Doesn't matter how much aware you're, anyone can fall victim to this "Almost Impossible to Detect" Phishing Attack.

Suggested solution to problem on Chrome:
https://chrome.google.com/webstore/detail/idn-safe/kegeenojcnijgmfgkcokknkbpmjcabdm?hl=en

Apr 18 09:31

Chrome, Firefox, and Opera Vulnerable to Undetectable Phishing Attack

Browsers such as Chrome, Firefox, and Opera are vulnerable to a new variation of an older attack that allows phishers to register and pass fake domains as the websites of legitimate services, such as Apple, Google, eBay, and others.

Apr 18 08:46

SCHOOL-ISSUED DEVICES ALLOW THE FEDS TO SPY ON EVERYTHING STUDENTS HAVE EVER DONE

The Feds, and educational technology (ed tech) companies are using tablets and laptops to spy on students from kindergarten through college.

Students, teachers,administrators and librarians across the country are being forced to use school-issued tablets and laptops which use educational cloud services that spy on everything.

According to a EFF's “Spying on Students” report, more than 30 million students, teachers, and administrators use Google’s education suite of software.

"Across the U.S., more than 30 million students, teachers, and administrators use Google’s G Suite for Education (formerly known as Google Apps for Education), and that number is rapidly growing."

According to the report, students are being given Google login ID's with no option to opt-out.

Feds collect intimate and detailed reports of everything students have ever done

Webmaster's Commentary: 

All of a sudden, home-schooling is going to look like a far more attractive option than will public schooling for many concerned parents, one they understand the "real reason" these electronic devices have been given to their kids; to spy on the kids and their families.

Apr 18 08:41

Killing Privacy Is Fine Because “Nobody’s Got To Use The Internet,” House Rep Says

From a distance, it can often be easy to criticize Congress as being out of touch, no matter what members are actually doing or what policies they’re proposing. But every once in a while, you get a response so staggeringly clueless you wonder if a lawmaker is living on the same planet you are.

This week’s gem comes from Wisconsin Rep. Jim Sensenbrenner, who doesn’t think anyone actually needs to use the internet for anything and that opting out of the 21st century is a valid “choice” for consumers.

Apr 18 07:15

Google Russia agrees to pay $8mn antitrust fine

US technology firm Google has agreed to pay 438 million rubles (nearly $8 million) in fines for antitrust violations in the Russian mobile applications market. The company was found guilty of abusing its dominant position in the market for mobile devices running on Android.

Apr 17 18:38

Lawsuit Attempts To Hold Foreign Governments Accountable For Spying On Americans

By Derrick Broze

The Electronic Frontier Foundation is attempting to reverse a court decision that they say could potentially lead to immunity for foreign governments who spy, attack, and, even murder Americans...

Apr 17 10:08

Wearable Technology Aims to Predict Relationships, Intervene When Computer Detects Trouble

By Nicholas West

Predictive behavior technology is all the rage in everything from advertising to policing to medicine. Technocrats everywhere believe that the supreme being of the universe should be a computer algorithm; because, after all, in its perfection it knows us better than we know ourselves.

The following research from the University of Southern California is a chilling example of how the State could easily employ this technology for literal interventions where potential violence could occur...

Apr 17 09:49

Facebook Suspends 30,000 Fake Accounts In France

Facebook Inc said on Thursday it suspended 30,000 accounts in France as the social network giant steps up efforts to stop the spread of fake news, misinformation and spam.

Apr 17 09:36

Distrowatch: Your source for Linux, Unix and BSD Operating Systems and Software

Linux is surging. Go Linux!

Page Hit Ranking
Data span:
Rank Distribution HPD*
1 Mint 2816>
2 Debian 1885>
3 Manjaro 1678>
4 Ubuntu 1513=
5 openSUSE 1312<
6 Zorin 1133<
7 Fedora 1045=
8 deepin 932>
9 Antergos 920>
10 elementary 917<
11 CentOS 817=
12 Solus 743>
13 Arch 734=
14 PCLinuxOS 725=
15 ReactOS 604>

Apr 17 09:21

MICROSOFT STARTS FORCING WINDOWS 7 AND 8.1 USERS TO UPDATE TO WINDOWS 10

Microsoft has started blocking Windows 7 and Windows 8.1 updates for computers running certain new chipsets.

The company announced plans last January to block next-generation Intel, AMD and Qualcomm processors from system updates on older versions of Windows, but didn't reveal when support would be cut.

The process appears to have just kicked off.

Apr 17 08:16

ISPs Gave 8X More Cash to Politicians That Axed FCC Privacy Rule

Most people realize that Congress' party-line vote to kill the FCC's consumer broadband privacy rules earlier this month was a clear, albeit grotesque, example of pay-to-play American politics. Especially given the majority of Republicans, Democrats and Independents alike thought the rules should have remained in place. But how overt of a display of pay-to-play politics was it? The Intercept looked at campaign finance filings and found that the Senators and Representatives that voted to kill the rules received eight times more cash from broadband providers.

Apr 17 07:51

GOOGLE TAKES OUT MAJOR CONTRACT TO DE-LIST INFOWARS FROM ITS SEARCH INDEX

Google has hired contractors to remove or limit Alex Jones’ website Infowars.com from its search engines. According to a search engine evaluator for Google, all contractors have been instrucred to actively rate InfoWars as a low quality and untrusted site.

Webmaster's Commentary: 

Do NOT use Google. Use Yandex or DuckDuckGo.

Apr 17 07:46

The New Shadow Brokers Leak Connects the NSA to the Stuxnet Cyber Weapon Used on Iran

Researchers have found an hidden gem inside the treasure trove of the new alleged NSA hacking tools dumped by the Shadow Brokers.

The mysterious hacking group known as Shadow Brokers came back on Friday to drop its most explosive—and damaging—dump yet, a collection of alleged hacking tools for Microsoft Windows computers.

Buried among this new treasure trove, there are several mentions of previously disclosed NSA top secret programs and software such as "STRAITBIZARRE," used to control implants remotely, and "JEEPFLEA," a project to hack the money transferring system SWIFT. These provide yet another hint that these are indeed tools stolen from the NSA's elite hacking team.

Perhaps more surprisingly, the dump also included one tool that was used in the famous Stuxnet worm, arguably the world's first digital weapon, used to hit an Iranian nuclear power facility and damage its centrifuges to slow down the

Apr 16 07:53

Did US hackers foil North Korea missile test? Cyber attack may have ruined Kim's launch

COMPUTER hackers working for the US security services could have been behind Kim Jong-un’s disastrous missile test failure, according to a former British foreign secretary.

Apr 16 07:04

Tillerson Brought a Top Spook With Him to Moscow. Putin Was Not Amused

Tillerson's Chief of Staff knows exactly how to manufacture the appearance of Russian hacking in the US elections, and where it's done at the CIA and Pentagon. No wonder the Russians didn't roll out the red carpet

Apr 15 20:47

Hacker documents show NSA tools for breaching global money transfer system

Documents and computer files released by hackers provide a blueprint for how the U.S. National Security Agency likely used weaknesses in commercially available software to gain access to the global system for transferring money between banks, a review of the data showed.

On Friday, a group calling itself the Shadow Brokers released documents and files indicating NSA had accessed the SWIFT money-transfer system through service providers in the Middle East and Latin America. That release was the latest in a series of disclosures by the group in recent months.

Matt Suiche, founder of cybersecurity firm Comae Technologies, wrote in a blog post that screen shots indicated some SWIFT affiliates were using Windows servers that were vulnerable at the time, in 2013, to the Microsoft exploits published by the Shadow Brokers. He said he concluded that the NSA took advantage and got in that way.

Apr 15 18:05

Should You Be Worried That Humanoid Robot Fedor Has Learned How To Shoot Guns Using Both Arms?

HUMANOID ROBOT F.E.D.O.R., SET TO FLY INTO SPACE IN 2021, IS NOW CAPABLE OF SHOOTING USING BOTH OF HIS ARMS, ACCORDING TO DEPUTY PRIME MINISTER DMITRY ROGOZIN.

Apr 15 12:55

Raspberry Pi

Quirky Xerus is fastest. You have to update Mate by terminal including the kernel. Linux Mint has a tool called disks that makes installation to your micro sd easy as pi!

https://www.raspberrypi.org/downloads/

* NEW * Quirky Xerus for the Raspberry Pi
October 24, 2016 - Barry Kauler, creator of Puppy and Quirky Linux, released his latest Quirky Xerus version 8.1 for the Raspberry Pi. (Updated to 8.1.2 on 25 November 2016.)
http://puppylinux.org/main/Download%20Latest%20Release.htm

Ubuntu MATE for the Raspberry Pi 2 and Raspberry Pi 3
Martin Wimpress and Rohith Madhavan have made an Ubuntu MATE image for the Raspberry Pi 2 and Raspberry Pi 3 based on the regular Ubuntu armhf base, not the new Ubuntu “Snappy” Core, which means that the installation procedure for applications uses the traditional tools, ie apt-get.

https://ubuntu-mate.org/raspberry-pi/

Apr 15 12:45

All computers have a processor, and your phone probably uses one designed by ARM.

We got a great question recently that made us remember that not everyone keeps up to date on specs and hardware design. Someone asked what ARM meant.

Firstly, that's an awesome question. I can imagine it's difficult to make sense of some of the technical talk that happens if you aren't sure of even the basics, and the only way to find out is to ask. So, we're glad you asked!

Apr 15 10:32

Flashback: CYBERSECURITY LIE EXPOSED: POWER PLANTS ARE NOT CONNECTED TO THE INTERNET

As a recent Wired News article highlighted, power grid and drinking water systems, “Are rarely connected directly to the public internet. And that makes gaining access to grid-controlling networks a challenge for all but the most dedicated, motivated and skilled — nation-states, in other words.”

The article explains that it would take a gargantuan national effort on behalf of a nation state, utilizing a plethora of national resources, to even begin to attempt taking down complex power and water systems. This isn’t merely a case of a rag-tag terrorist group hacking into a website via their laptops.

Apr 15 09:33

FLASHBACK - Pennsylvania schools spying on students using laptop webcams, claims lawsuit

A suburban Philadelphia school district remotely activates the cameras in school-provided laptops to spy on students in their homes, a lawsuit filed in federal court Tuesday alleged.

According to the lawsuit filed by a high school student and his parents, the Lower Merion School District of Ardmore, Pa. has spied on students and families by "indiscriminate use of and ability to remotely activate the webcams incorporated into each laptop issued to students by the School District."

Webmaster's Commentary: 

Apr 15 09:28

NSA code that can break into any Windows computer is released b yhacking collective that claims spy agency spie penetrated Mideast banking networks

TheShadowBrokers, which startled the security experts last year by releasing some of the NSA's hacking tools, has recently resumed pouring secrets into the public domain.

In a first for TheShadowBrokers, the data includes PowerPoint slides and purported target lists, suggesting that the group has access to a broader range of data than previously known.

'This is by far the most brutal dump,' said Comae Technologies founder Matt Suiche, who has closely followed the group's disclosures and initially helped confirm its connection to the NSA last year.

In a blog post, he said it appeared that thousands of employee accounts and machines from the EastNets' offices had been compromised and that financial institutions in Kuwait, Bahrain and the Palestinian territories had been targeted for espionage.

Apr 15 07:50

Your Kids’ School-Owned Devices Are Spying On Them, Report Finds

As adults, we all kind of have at least a vague peripheral sense that the devices and software we use are probably up to some kind of shenanigans with our personal data. Kids, however, are probably not thinking as closely about what they tell the devices they use, and what data those devices then share — especially if they’re school-owned tools. And yet, a new report finds, some of the learning technology schoolchildren are required to use every day are some of the worst when it comes to explaining and protecting users’ privacy.

The EFF’s new “Spying on Students” report [PDF] pulls together two years’ worth of research and data trying to find out whether educational technology (ed tech) companies are protecting students’ privacy. The answer is, unfortunately, largely not.

Webmaster's Commentary: 

It is far more safe to buy the device which the school is using, and put appropriate security software on it yourself, because you have not a clue what the computer is seeing/hearing/transmitting.

Apr 14 19:56

‘Top secret CIA virus control system’: WikiLeaks releases ‘Hive’ from #Vault7 series

Described as a multi-platform malware suite, Hive provides “customisable implants” for Windows, Solaris, MikroTik (used in Internet routers), Linux platforms, and AVTech Network Video Recorders, used for CCTV recording. Such implants allow the CIA to communicate specific commands.

...

To hide the presence of such malware, WikiLeaks notes that the public HTTPS interface (a protocol for secure communication over a computer network within an encrypted connection) “utilizes unsuspicious-looking cover domains,” meaning those targeted would be unaware of the CIA’s interference.

A ‘self-delete’ function is described in documentation accompanying Hive, revealing that the implant destroys itself if it’s not signalled for a predetermined amount of time. Binary information regarding Hive is deleted from the host, leaving a log and configuration file containing only a timestamp.

Apr 14 19:48

Leaked NSA point-and-pwn hack tools menace Win2k to Windows 8

The Shadow Brokers have leaked more hacking tools stolen from the NSA's Equation Group – this time easy-to-use exploits that attempt to hijack venerable Windows systems, from Windows 2000 up to Server 2012 and Windows 7 and 8.

The toolkit puts into anyone's hands – from moronic script kiddies to hardened crims – highly classified nation-state-level weaponry to compromise and commandeer possibly millions of systems around the world. This is the same powerful toolkit Uncle Sam uses to hack into and secretly snoop on foreign governments, telcos, banks, and other organizations.

The files range from Microsoft Windows exploits to tools for monitoring SWIFT interbank payments. Ongoing analysis of the leaked documents and executables has revealed Cisco firewalls and VPN gateways are also targets.

Apr 14 18:40

Facebook Discovers ‘Major Spam Operation,’ USA Today Likes Plummet

Facebook announced Friday that the company has discovered and dismantled a network of fake accounts that have been rising on the site over the last six months. The result of that purge has caused tremendous damage to one news outlet’s Facebook page in particular — USA Today.

Apr 14 15:02

'Not A Drill': Panic As NSA's Windows Hacking Tools Leaked

"This is not a drill," notorious NSA whistleblower Edward Snowden says.

Malware used by the NSA to hack into Microsoft Windows systems was reportedly leaked just hours ago, meaning anyone who gets the software will have the virtual "keys to the kingdom" and can hack into practically any computer running Windows they want.

Apr 14 12:37

Scott Adams: Am I Shadowbanned on Twitter?

So what we have here is a fascinating situation in which there is either a mass delusion about Twitter shadowbanning political speech on one side … or something evil is happening at Twitter. My operating assumption is that there is no way that I could tell the difference. When you are inside a delusion, it looks totally real to you.

Apr 14 10:50

WikiLeaks ‘hostile intel,’ Assange & his followers ‘demons’: CIA chief goes ballistic

CIA Director Mike Pompeo called Julian Assange and his associates “demons” and accused WikiLeaks of siding with the world’s dictators and endangering the security of the “free world” with the help of states like Russia.

Speaking at an event organized by the Center for Strategic and International Studies (CSIS) in Washington, DC on Thursday, the former Kansas congressman went on the warpath against the whistleblower website, accusing its editor Julian Assange of being on the “wrong side of history” and seeking to harm America, freedom and democracy.

Apr 14 09:53

Robots are learning to be racist AND sexist: Scientists reveal how AI programs exhibit human-like biases

Humans look to the power of artificial intelligence (AI) to make better and unbiased decisions.

However, a new study has found that the technology is becoming racist and sexist as it learns, thus hindering its ability to make balanced resolutions.

Researchers discovered that the better AI becomes at interpreting the human language, the more likely it will adopt human bias about race and gender that lurks within the data it is fed.

Apr 14 09:07

Facebook Urges Users To Report ‘False News’

Facebook is encouraging users to report what they believe to be “fake news.”

On Wednesday, the social media giant informed its users of several techniques to help “stop the spread of false news.”

Apr 14 09:05

Facebook Refuses To Delete ‘Child Pornography & Extremist Material’

Social media giant Facebook could face criminal prosecution after it refused to take down alleged pedophilic content, an investigation has found.

Scores of videos and images were ‘flagged up’ as child pornography to the website’s moderators, alongside several other images believed to be of extremist and terrorist nature, the Times reports.

Apr 14 08:58

Wikileaks is a 'hostile intelligence service' says CIA boss as he declares war on same website which Trump said he 'loved' when it revealed Hillary's secrets 

While Donald Trump said he 'loved' Wikileaks during the campaign for airing out Hillary Clinton's secrets, today the president's CIA Director Mike Pompeo blasted the website and its founder from the podium of a Washington think tank.

'It's time to call out Wikileaks for what it really is, a non-state hostile intelligence service often abetted by state actors like Russia,' Pompeo charged as he spoke at the Center for Strategic and International Studies Thursday.

Apr 14 07:13

Burger King's 'OK Google' sad ad saga somehow gets worse

The 15?second ad features an actor who says, "OK Google, what is the Whopper burger?" in an attempt to force the Google Home devices of viewers to navigate to the cholesterol bomb's Wikipedia page.

...

In response, users edited the Wikipedia page and included unflattering comments, causing Google Home devices to proclaim the burger was made with "100 per cent rat and toenail clippings" when prompted by the video.

Apr 14 07:08

Microsoft raises pistol, pulls the trigger on Windows 7, 8 updates for new Intel, AMD chips

Microsoft has cut software updates and tweaks for computers powered by Intel and AMD's latest-generation processors and running old versions of Windows.

The Redmond giant is no longer serving software fixes to PCs and other systems that run Windows 7 or Windows 8.1 on Intel's fresh new Kaby Lake or AMD's hot-off-the-fab Ryzen chips. Those machines will now be required to update to Windows 10 in order to obtain future improvements. Critical security patches will still be offered for now, though.

Microsoft argues this is all because it can't be bothered supporting the latest silicon, such as Intel's 7th-gen Core series, on anything other than Windows 10. To us, it looks like a convenient way of forcing people onto the newest build of its operating system.

Apr 13 17:40

Judge Sacked For Trolling Critics Online, Calling Them ‘Donkeys’

A judge who allegedly used a pseudonym to call one critic a “donkey” and others “small minded and bigoted” in the comment section of a local news website has been sacked.

Apr 13 11:40

The wife of the Alabama governor who just resigned orchestrated his downfall after she caught him cheating

When a former Alabama governor started sending suggestive texts to a member of his staff, he probably didn't expect them to sync with the state-issued iPad he had given his wife.

Webmaster's Commentary: 

Hell hath no fury...

Apr 13 08:25

Windows XP: Why it won't die for years to come

Old versions of Windows just won't go away.

Earlier this week Microsoft ended its support for Vista, which means the decade-old operating system will no longer get security updates. And while this may spur some companies to finally kick out their old devices, there are still plenty still holding onto Vista and XP -- and perhaps even older versions of Windows.

Webmaster's Commentary: 

Because we like stable working operating systems and reject being forced to "upgrade" those stable working systems for new systems that are buggy and filled with spyware just to make Bill Gates richer than he already is!

Apr 12 19:30

Half-baked security: Hackers can hijack your smart Aga oven 'with a text message'

Miscreants can remotely turn off and on posh Aga ovens via unauthenticated text messages, security researchers have warned.

All the hijackers need is the phone numbers of the appliances, apparently.

Apr 12 19:29

Troll it your way: Burger King ad tries to hijack Google Home gadgets

Artery-attacking mega-chain Burger King has thrown up a new online advertisement designed to hijack nearby Google Home gizmos.

The ad features a bloke in the usual Burger King employee garb holding the chain's signature gut-buster sandwich. Saying the fifteen-second spot will not allow enough time to fully explain the virtues of ground beef inside a bread roll, he instead beckons the camera closer and says "OK Google, what is the Whopper Burger?"

That "OK Google" phrase is supposed to wake up Google Home assistants within listening distance and instruct them to read out info about the grilled patties from the web.

Apr 12 15:23

Facebook rolls out new ‘false news’ program

If you see a story in News Feed that you believe is false, you can report it to Facebook.
Click [down chevron] next to the post you’d like to mark as false
Click Report post
Click It’s a false news story
Click Mark this post as false news

Webmaster's Commentary: 

I just did a search for Facebook posts on "Assad gassed his own people." All are labeled as true!

Apr 12 12:04

Court Rules Facebook Can’t Challenge Demands for User Data (and Can’t Tell Users)

Facebook is not exactly the champion of user privacy, but at least in one case, the company did go to bat for its users. Facebook took New York law enforcement to court over secret warrants that allowed authorities to collect user data.

Unfortunately, Facebook just lost their case in the New York courts. The court ruled that only users themselves, not facebook, can challenge law enforcement demands for their data.

The only problem is, the court orders usually come with a gag order as well. Facebook is not allowed to tell their users that law enforcement is taking their data. And Facebook is not allowed to challenge these orders on behalf of their users.

So in true kangaroo court fashion, the only people able to challenge the government are those forbidden from being told that the government is investigating them. Well isn’t that convenient for prosecutors.

Apr 12 07:40

GOOGLE ‘GOES NUCLEAR’ WITH NEW DEFAULT SETTING AD POLICY THAT COULD CRUSH YOUTUBERS ONCE AND FOR ALL

After facing months of backlash for unintentionally funding extremists through advertising, Google announced a public apology, along with steps the company is taking to help advertisers avoid ‘objectionable’ content and provide more advertiser control over where ads appear.

Apr 12 07:28

Twitter Helps Teen Track Down Dad's War Buddy From 40 Years Ago

Bryce Lacy is a 19-year-old attending Sam Houston State University. But he recently returned home to Richmond, Texas, to see his dad for the weekend. His father, Charles, is a Vietnam veteran and decided to show his son some old military photos from his time in the army. One man was present in nearly all of the photos, an old buddy of his named Kermit Powers.

Apr 12 07:14

Roku TVs will eavesdrop on your shows to serve up ads

Wherein 'enhance your TV experience' means 'sell your data to advertisers.'

Apr 12 07:07

Windows Vista is now officially dead. And good riddance

Support ended on Tuesday and Microsoft's not offering even a single strand of safety net

Apr 11 12:48

MYSTERIOUS DEVICES IN TRUMP'S POP-UP SITUATION ROOM

Last Thursday, April 6, the United States conducted airstrikes against Syria and president Trump received a briefing on this attack at his Mar-a-Lago estate in West Palm Beach, Florida. The next day, his press secretary Sean Spicer tweeted a photo of this briefing, which shows some hitherto unseen and futuristic looking devices

Apr 11 11:44

Canadian Insanity: Nurse Fined $26,000 For Facebook Post

The surreal extent of Canada’s far-left nanny-state culture has been illustrated with a fine of $26,000 dished out to a nurse who dared to complain on Facebook about the healthcare treatment afforded to her grandfather.

Apr 11 10:30

BIG BRO-BOT U.S. Navy funds development of robot surveillance system which can spy on humans in incredible detail

THE U.S. Navy is funding the development of a new super-surveillance system which uses robots to snoop on humans in terrifying detail.

It has handed a $1.7 million (£1.4 million) grant to researchers from Cornell University, who are working to build a system which can “conduct surveillance as a single entity with many eyes”.

The cash was handed over by the U.S. Office of Naval Research, which is dedicated to developing new forms of military and civilian technology.

Last year, we exclusively revealed that the same department discussed plans to fit humans with microchips and track their every move.

Now it wants to develop a system which lets teams of surveillance robots gather and share intelligence “at the speed of light”.

“Once you have robots that cooperate you can do all sorts of things,” said Kilian Weinberger, associate professor of computer science.

Webmaster's Commentary: 

I frankly do not believe that once this technology is perfected, it will only be used for clearly humanitarian purposes, or only to keep people out of harm's way.

When a child has a hammer, everything they encounter is a nail which must be hammered down.

So it is with a government which has become terrified of its own people, because it can no longer truly control the agenda or narrative; therefore, people need to be "nailed down" before they can communicate, and ask intelligent questions which would tear that narrative asunder.

There are moments, which happen with a marked rise in frequency, when I believe I have awakened in the wrong country; the land of the free and the home of the brave has devolved to the land of the cowed, and the home of the surveilled.

Apr 11 10:19

HOW THE DENVER POLICE CRACK AND SEARCH CELL PHONES

Responding to our recent request for mobile phone forensic tools records, Denver Police Department has provided us with not only contracts, but a training bulletin for their Cellebrite Universal Forensic Extraction Device. Cellebrite's UFED, as the device is more commonly known, is the leading model of mobile phone data extraction tools in law enforcement.

Denver PD purchased a UFED Touch in January 2016 for about four grand. The Touch is used for cell phone data extractions done in the field and was infamously rumored to have been used by the FBI to crack the San Bernardino shooters' encrypted iPhone after Apple denied their request for access. DPD also purchased a UFED 4PC for $1,650 - the 4PC is more of a software program to sift through data already collected on the Touch.

Webmaster's Commentary: 

Apparently, in Denver, the 4th Amendment to the Constitution, as well as probably many other US cities, does not apply.

Apr 11 08:27

Hacking group releases passwords to NSA hacking tools to attack Donald Trump for 'abandoning' his base

A secretive hacking group has released the passwords to a trove of hacking tools used by US spies.

The hackers, from the group 'Shadow Brokers', claim that the leak is a form of protest against president Donald Trump for going back on campaign promises.

The tools leaked are used by the US National Security Agency (NSA) to spy on digital devices such as smartphones and laptops.

Apr 11 08:08

From ‘True’ To ‘Pants On Fire’: Google Launches ‘Fake News Fact Check’

Internet giant Google has decided to introduce a fact-checking feature to its search engine.

Which is why I do not use Google much any more, preferring DuckDuckGo and Yandex.

Apr 11 08:05

Russian-made ‘eternal’ disc to store data for 100,000 years

A Russian-made disc is designed to store data for 100,000 years and will be resistant to fire, water and space radiation, the head of the Moscow-based laboratory of laser nano-structuring of glass told TASS on April 11.

"In the normal conditions our disc will allow users to retrieve information with minimal errors even in 100,000 years. Moreover, our eternal disc will be resistant to fires, floods and even long space flights," Ivan Glebov said.

The disc is made of quartz glass and has a standard CD diameter. The principle of data recording and retrieval is similar to that of CD, DVD and Blue Ray.

Apr 11 08:03

The Dark Secret at the Heart of AI

No one really knows how the most advanced algorithms do what they do. That could be a problem.

Apr 11 07:53

Oh my Microsoft Word: Dridex hackers exploit unpatched flaw

Cybercrooks are actively exploiting an unpatched Microsoft Word vulnerability to distribute the Dridex banking trojan, claim researchers.

Booby-trapped emails designed to spread the cyber-pathogen have been sent to hundreds of thousands of recipients across numerous organisations, according to email security firm Proofpoint.

The switch to document exploits by the hackers represents a change of tactics by a group that previously leaned heavily on malicious macros to distribute their wares.

The Word document exploit at the centre of the attack was only discovered last week, so its abuse represents a rapid weaponizisation of the exploit.

Apr 11 07:41

Melding Mind and Machine: How Close Are We?

Undoubtedly there will be beneficial uses for brain-computer interface technology (BCI), particularly in the area of restoring motor skills and communication. But, as you’ll read, the level of mind-tinkering that is being proposed by neuroscience has uses that also create direct mind control in the form of “non-invasive” applications such as neural dust, linking the brain to computer via wireless magnetic stimulation. Or how about treating diseases via “electroceuticals” – sending targeted electrical messages to various organs via implant?...

Apr 10 15:59

Researcher: 90% Of 'Smart' TVs Can Be Compromised Remotely

As recent Wikileaks data revealed, the lack of security and privacy standards in this space has proven to be a field day for hackers and intelligence agencies alike.

And new data suggests that these televisions are even more susceptible to attack than previously thought. While the recent Samsung Smart TV vulnerabilities exposed by Wikileaks (aka Weeping Angel) required an in-person delivery of a malicious payload via USB drive, more distant, remote attacks are unsurprisingly also a problem. Rafael Scheel, a security researcher working for Swiss cyber security consulting company Oneconsult, recently revealed that around 90% of smart televisions are vulnerable to a remote attack using rogue DVB-T (Digital Video Broadcasting - Terrestrial) signals.

Apr 10 15:07

Google Is Teaming Up Its AlphaGo AI With Humans So They Can Learn From It

Google first brought attention to its DeepMind-based artificial intelligence AlphaGo when last year it obliterated the then-leading Go player Lee Sedol in a highly piblicized match-up. Now it wants to team up the crafty AI with humans so they can learn from its unusual moves.

Apr 10 10:03

Your Financial Life Could Be Ruined If Your Name Is On This Massive Government List

Muhammed Ali Khan tried to do one of the most boring, responsible things an American taxpayer can do: set up a government-guaranteed retirement savings account. He was rejected because the Treasury Department thought he might be a terrorist.

He isn’t. He’s a software consultant from Fullerton, California. But he shares a first name (with a different spelling), last name and middle initial with a financier of a Pakistani terror group. That man, Mohammad Naushad Alam Khan, is on the Treasury Department’s Specially Designated Nationals and Blocked Persons List (SDN). The 1,026-page catalog lists people and organizations that U.S. citizens and residents are barred from doing business with because of their ties to terror cells, drug cartels or rogue states.

The SDN is essentially a financial no-fly list that cuts people off from U.S. banks ? and, as a result, the global financial system. The SDN has more than doubled in length in the last five years.

Webmaster's Commentary: 

This is a blatant example of the US government going rogue.

And President Trump, a word please.

The one true, and tested, way of stopping any kind of terrorism in its tracks is the following recipe.

Stop expropriating natural resources from foreign countries, to which the US government and corporations have no moral right.

Stop regime-changing governments not to your liking.

You're welcome, Mr. President!! :-)

Apr 10 09:06

Is this the most frustrating hack yet? Bizarre attack forces people to get a high score in an anime GAME to decrypt their files

Unless you're a big gaming fan, a new ransomware attack could be the most frustrating to infect computers yet.

'Resenware' is a malicious programme that is infecting systems, encrypting documents, music and pictures to make them inaccessible.

But instead of asking for money to decrypt the files, Rensenware forces players to get a high score in a difficult anime game.

Apr 10 08:51

Thousands of fake companies added to Google Maps every month

Local businesses on Google Maps aren’t always as local as they seem. Tens of thousands of bogus listings are added to Google Maps every month, directing browsing traffic towards fraudulent schemes, finds a team of researchers at Google and the University of San Diego, California.

As an example, a fraudster might list a locksmiths at a location on Google Maps when they don’t actually have premises there. When a potential customer calls the phone number listed, they are put through to a central call centre that hires unaccredited contractors to do jobs all over. Often the customer ends up being coerced into paying more than the original quoted price.

Apr 10 08:45

French election: Macron vows to tackle terrorism by taking on tech companies

French centrist candidate Emmanuel Macron has launched his presidential campaign with a plan to tackle terrorism by forcing internet firms to release encrypted messages.

Apr 10 08:42

New Malware Intentionally Bricks IoT Devices

A new malware strain called BrickerBot is bricking Internet of Things (IoT) devices around the world by corrupting their storage capability and reconfiguring kernel parameters.

Detected via honeypot servers maintained by cyber-security firm Radware, the first attacks started on March 20 and continued ever since, targeting only Linux BusyBox-based IoT devices.

Apr 10 08:36

Symantec attributes 40 cyber attacks to CIA-linked hacking tools

Past cyber attacks on scores of organizations around the world were conducted with top-secret hacking tools that were exposed recently by the Web publisher Wikileaks, the security researcher Symantec Corp (SYMC.O) said on Monday.

That means the attacks were likely conducted by the U.S. Central Intelligence Agency. The files posted by WikiLeaks appear to show internal CIA discussions of various tools for hacking into phones, computers and other electronic gear, along with programming code for some of them, and multiple people familiar with the matter have told Reuters that the documents came from the CIA or its contractors.

Symantec said it had connected at least 40 attacks in 16 countries to the tools obtained by WikiLeaks, though it followed company policy by not formally blaming the CIA.

Apr 10 08:28

OLE-y hell. Bug in MSFT Word allows total PC p0wnage

All eyes will be on Microsoft's April patch run - due tomorrow - to see whether Redmond gets ahead of a nasty Word zero-day that popped up last week.

The hack exploits Object Linking and Embedding and the FireEye researchers who discovered the bug were working with Microsoft, but were pre-empted by a disclosure from McAfee.

McAfee and FireEye each explain that the attack works all the way up to Office 2016 running on Windows 10.

A nasty aspect of the attack is that unlike many Word-based attacks, it doesn't ask the victim to enable macros.

Apr 10 08:26

TP-Link 3G/Wi-Fi modem spills credentials to an evil text message

TP-Link's M5350 3G/Wi-Fi router, has the kind of howling bug that gives infosec pros nightmares.

In what looks like a feature created for developers' convenience, but left behind when it should have been deleted, the device's admin credentials can be retrieved by text message.

The discoverer of the bug, a German company called Securai, told Heise.de the issue as a cross-site scripting (XSS) bug triggered by an SMS containing the following attack script:

The device replies with admin username, admin password, its SSID, and its login password.

Apr 09 17:45

Hacker sets off all 156 emergency sirens in Dallas

Dallas city officials said Saturday that a hacker is to blame for setting off all the city's 156 emergency outdoor sirens, which wailed for an hour and half overnight.

Apr 09 09:07

Google’s Censorship Of Independent News

‘Fake news’ is a term designed to fool the weak minded into believing the corporate media are the only reliable sources of information.

You and I both know that is a total lie.

Since you’re reading this, you already know that we’re living in a totalitarian society where anything that does not sit inside the tightly controlled margins of ‘acceptable debate’, is painted as an enemy of the people.

Apr 09 08:38

Shadow Brokers hackers release NSA hacking tools to punish Trump for ‘abandoning’ his base

Trump has no friends and very few supporters left.This is awesome.

Hacking group Shadow Brokers has released the password to a trove of NSA exploits in what they say is a form of protest against President Donald Trump for going back on his campaign promises, and warning the president, “Don’t forget your base.”

NSA just lost control of its Top Secret arsenal of digital weapons; hackers leaked it.
1) https://t.co/zleVbyBtE3
2) https://t.co/aKwdiNbrJA
— Edward Snowden (@Snowden) April 8, 2017

Apr 09 08:33

This sex trafficking law could ruin the internet as we know it. New legislation would hold websites liable for third-party content, undermining the protection of free speech online

On Monday, Rep. Ann Wagner introduced a bill to fight child sexual exploitation and sex trafficking. In an accompanying press release, the congresswoman spoke of “modern slavery,” “the retailers of America’s children,” and called for the need to “provide a voice for the most vulnerable in our society.” Wagner is a Republican from Missouri who voted for Donald Trump and considers George W. Bush’s memoir to be her favorite book. But not too surprisingly, the legislation already has bipartisan support — what Democrat could object to such an attempt to protect children?

Apr 08 08:42

#Vault7: WikiLeaks release shows CIA ‘Grasshopper’ used stolen ‘Russian mafia’ malware

WikiLeaks confirmed that the CIA did not merely copy and paste the suspected Russian malware but appropriated "[the] persistence method, and parts of the installer,” which were then modified to suit the CIA’s purposes.

The latest release came with an emblem containing a grasshopper and the words: “Look before you leap,” a possible reference to how the latest leaked tools would allow the CIA to prepare a machine for future hacking, without raising suspicion.

The rootkits can be installed and used as a 'man on the inside' who can allow more malicious software through undetected in future, if the CIA felt it necessary. If suspicions were raised on initial installation, they would know not to proceed with a more extensive operation.

Apr 08 08:34

'Amnesia' IoT botnet feasts on year-old unpatched vulnerability

Hackers have brewed up a new variant of the IoT/Linux botnet "Tsunami" that exploits a year-old but as yet unresolved vulnerability.

The Amnesia botnet targets an unpatched remote code execution vulnerability publicly disclosed more than a year ago in DVR (digital video recorder) devices made by TVT Digital and branded by over 70 vendors worldwide.

The vulnerability affects approximately 227,000 devices around the world with Taiwan, the United States, Israel, Turkey, and India being the most exposed, specialists at Unit 42, Palo Alto Networks' threat research unit, warn.

The Amnesia botnet is yet to be abused to mount a large-scale attack but the potential for harm is all too real.

Apr 08 08:33

Forget Mirai – Brickerbot malware will kill your crap IoT devices

The malware targets Linux-based IoT devices running the BusyBox toolkit, and seems to have a particular affinity for Ubiquiti network devices, which have their own security issues. Once inside the operating system, the code starts to scramble the onboard memory using rm -rf /* and disabling TCP timestamps, as well as limiting the max number of kernel threads to one.

Brickerbot then flushes all iptables firewall and NAT rules and adds a rule to drop all outgoing packets. Finally it tries to wipe all code on the affected devices and render them useless – a permanent denial of service.

To block the attack, the key factor is disabling Telnet and changing the device's factory-set passwords. Radware also recommends using intrusion prevention systems to lock down devices.

Apr 08 08:29

Google discovers 'Israeli' spy app designed to hack smartphones

Google discovers what they consider to be the most dangerous android malware yet, used to track information of calls, messages and internet history as well as spy on people through their smartphones' camera and microphone; an Israeli company is suspected of creating it.

Apr 08 05:04

Adding to the Purge, Google to Use Fact-Checker Label Against Alleged Fake News

Google is to start displaying fact-checking labels in its search results to highlight news and information that has been vetted and show whether it is considered to be true or false, as part of its efforts to help combat the spread of misinformation and fake news.

Apr 07 13:11

US cyber attack shuts down Al-Masdar News for five hours

DAMASCUS, SYRIA (8:45 P.M.) – On Friday afternoon, Al-Masdar News experienced its biggest hacker attack ever, leaving the website inaccessible to its readers for five hours.

Incidentally, the DDOS attack took place hours after it was revealed that ISIS launched an offensive shortly after US missiles struck Shayrat Airbase, grounding its airplanes at the Homs airfield.

The IT department said the massive DDOS attack could be traced exclusively back to the United States although it could not determine who was responsible for the hacking.

Apr 07 10:24

Keiser Report: Killing Web Privacy For Measly $1M

In this episode of the Keiser Report, Max and Stacy discuss killing internet privacy.

Apr 07 10:12

YouTube channels need 10,000 views for adverts

YouTube is changing the rules about when users can start earning money through carrying adverts on their video channels.

New channels will have to get 10,000 views before they can be considered for the YouTube Partner Program, the firm announced in a blog post.

YouTube will then evaluate whether the channel is adhering to its guidelines before letting it carry adverts.

Apr 07 10:02

Twitter cofounder to sell chunk of his stock for personal reasons

Better do it quickly before the price falls further

Apr 07 08:17

Exclusive–Sen. Ron Johnson: ‘What We Do Know About Susan Rice Is You Can’t Believe What She Says’

The chairman of the Senate Homeland Security Committee told Breitbart News that he is very concerned about allegations that Susan Rice, President Barack Obama’s national security adviser, abused her access to intelligence reports that included incidental collection of information about associates of President Donald Trump.

Apr 06 16:28

Put down your coffee and admire the sheer amount of data Windows 10 Creators Update will slurp from your PC

Then there's the information collected in Full mode, which includes everything in Basic plus your user settings and preferences, your browser choice, lists of your peripherals, the apps you use to edit and view images and videos, how long you use the mouse and keyboard, all the applications you've ever installed, URLs to videos you've watched that triggered an error, URLs to music that triggered an error, time spent reading ebooks, text typed in a Microsoft web browser's address and search bar, URLs visited, visited webpage titles, the words you've spoken to Cortana or had translated to text by the system, your ink strokes, and more.

Apr 06 14:34

Google's Censorship Of Independent News - RINF Is Latest Victim

'Fake news' is a Newspeak term designed to fool the weak minded into believing the corporate media is the only reliable source of information.

This is a total lie.

You know the drill by now, black is white, up is down, 2 + 2 = 5.

Apr 06 12:51

JCC bomb hoaxer made millions selling forged docs online — report

After finding his (Michael Kaydar) bitcoin account, investigators believe Israeli-American teen sold counterfeit IDs on dark net for cryptocurrency

Apr 06 12:35

THE FOUR FLAVORS OF AUTOMATED LICENSE PLATE READER TECHNOLOGY

Automated License Plate Readers (ALPRs) may be the most common mass surveillance technology in use by local law enforcement around the country—but they're not always used in the same way. Typically, ALPR systems are comprised of high-speed cameras connected to computers that photograph every license plate that passes. The photo is converted to letters and numbers, which are attached to a time and location stamp, then uploaded to a central server. This allows police to identify and record the locations of vehicles in real time and also identify where those vehicles have been in the past. Using this information, police could establish driving patterns for individual cars.

Apr 06 12:31

LEGALIZED CORRUPTION FUELED THE DEATH OF INTERNET PRIVACY: THE PROBLEM IS WORSE AT THE STATE LEVEL

The news that Internet service providers (ISPs) can sell your browsing history has been met with a lot of critical media coverage. However, few reporters have set their sights on the flow of money that helped set this legislation in motion. In general, Internet privacy is a bipartisan issue among the American people. However, this was a partisan issue on Capitol Hill with Republican lawmakers supporting the bill. It was passed in the Senate and House by a very narrow margin, 50 to 48 and 215 to 205 respectively. With that said, there were 15 House Republicans who voted outside of their party lines to keep Internet privacy intact.

Apr 06 11:17

Google, YouTube waging “demonetization” WAR on alternative media to bankrupt independent journalism

SGT Report, along with many other independent media outlets, is now asking for Patreon donations as Google / YouTube demonetizes their videos, forcing them to look for alternative sources of operating revenue. But here’s the thing: SGT Report isn’t a Jiahid recruitment hub. They don’t promote terrorism. They simply have an independent point of view on politics and current events. For this reason alone, Google has demonetized them by labeling their videos “extreme.”

Google labels independent media “extremist” by conflating critical thinking with Jihadi terror

Webmaster's Commentary: 

PLEASE DONATE.




Apr 06 10:31

CrowdStrike, First Experts To Affirm Trump, Russia Election Hack Theory, Renege Their Claims

CrowdStrike, a group that was the first to affirm that Russia could have played a part in President Trump winning the 2016 U.S. election, have now reneged on some of their claims, Daily Mail has reported.

CrowdStrike claimed back in June 2016 that Putin’s men were responsible for hacking the Democratic National Committee. This finding was used by the FBI, CIA and other top intelligence agencies in their investigations into Trump and Russia. It turns out, however, that there may not be as much truth to the claim than originally thought.

This could be a huge blow to the case of the Russians helping The Donald win the election, as CrowdStrike, unlike any U.S. intelligence agency, was permitted exclusive access to DNC computers, which in turn provided American government investigators with the fuel they needed to proceed with their probe on a link between the Kremlins and the president.

Apr 06 10:24

Owner Of Servers Implicated In DNC Hacks Says No One Is Interested In Truth Behind Computer Crimes

The mainstream media argues with no real evidence that the Russian government has been behind computer hacking targeting top Democrats and U.S. elections systems. However, the man who runs the servers implicated in the crime said no U.S. law enforcement or intel agency is interested in speaking with him to gather evidence on the perpetrators.

Apr 06 10:23

Russian server co. head on DNC hack: ‘No idea’ why FBI still has not contacted us

Blaming Russia because servers are from here is “absurd,” Vladimir Fomenko, owner of the Russian server company implicated in the DNC hack, told RT adding that they are ready to help any special service in investigating the attack.

Fomenko’s web hosting service, King Servers, was identified by American cybersecurity company ThreatConnect as the platform for the attack on emails of the Democratic National Committee. Six out of the eight IP addresses used by the hackers were hosted on King Servers, ThreatConnect claimed in September.

But the 26-year-old from Biysk, in western Siberia, is far from being scared or unwilling to cooperate. In fact, he recently told the New York Times that “If the FBI asks, we are ready to supply the IP addresses, the logs.” However, he says, “Nobody is asking… It’s like nobody wants to sort this out.”

Apr 06 09:22

'Chinese hackers' linked to espionage campaign on board directors of Google, Amazon, IBM

Ahead of the trade summit this week between US President Donald Trump and his Chinese counterpart, Xi Jinping, security experts claim a nation-state hacking group conducted espionage on a number of key industry players and lobbyists with links to the talks.

Between 27 February and 1 March this year, the operation – dubbed "Operation TradeSecret" – used malware in an attempt to snoop on private-sector officials registering to the website of the National Foreign Trade Council (NFTC), Fidelis Cybersecurity revealed.

Webmaster's Commentary: 

With the recent revelations that CIA has developed the means to frame third parties for CIA hacking attacks, it is reckless and irresponsible to claim that China is behind these attacks. If you recall the Seattle APEC scandal from 1997, it was US agents that were breaking into computers to steal business secrets!

Apr 06 08:38

Apple's desperate Mac damage control message hints at a divided company

Apple's attempts at reassuring customers that it hasn't forgotten about desktop Macs hint at divisions within the company as to what direction the company should be going in.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA