COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Aug 16 07:18

George Soros hacked, over 2,500 internal docs released online

Last Thursday, as Bloomberg was gingerly setting the stage, and the preemptive damage control for what was about to be a historic leak, it did everything in its power to deflect attention from the key topic, namely that prominent liberal billionaire and Hillary suppo

Aug 15 18:25

RT Besieged by DDoS Attacks Days After US Think Tank Called for Cyber Terrorism

Hackers bombarded RT with a well-planned series of Distributed Denial of Service (DDoS) attacks one week after the Atlantic Council wrote an article suggesting preemptive cyber terrorism against RT and the Moscow Metro.

Webmaster's Commentary: 

Welcome to my world.

Aug 15 16:37

Google AdSense abused to distribute Android spyware

A banking trojan targeting Android users is spreading through malicious ads as part of an ongoing campaign.

The scenario by which the malware spreads is all too familiar to long-suffering Windows fans, but may well come as an unpleasant shock to smartphone users.

Worse yet, Android users can get infected by the Svpeng Trojan simply by visiting mainstream websites, as researchers from Kaspersky Lab explain:

By simply viewing their favourite news sites over their morning coffee users can end up downloading last-browser-update.apk, a banking Trojan detected by Kaspersky Lab solutions as Trojan-Banker.AndroidOS.Svpeng.q. There you are, minding your own business, reading the news and BOOM! – no additional clicks or following links required. And be careful – it’s still out there!

Aug 15 15:56

Government surveillance of Internet users increasing each year

A new report from search giant Google has revealed how many times governments and courts have asked it to hand over information about users.

The annual transparency report shows that in 2014, 35,365 requests were made, and 40,677 were made in 2015.

Aug 15 15:41

George Soros Hacked, MSM Blames Russia; Many “Dissident” Orgs Revealed In Leaks

By Brandon Turbeville

George Soros has been hacked and, according to the Western mainstream press, the Russians did it! In fact, that is the entirety of the story for most of the mainstream outlets – that the Russians hacked such an important American figure and therefore made their power play over American elections yet again. This Russian hack comes after Russians hacked the DNC, Hillary Clinton, hired Donald Trump to destroy the country and invented a time machine enabling them to go back in time and prevent the election of Barack Obama. It doesn’t matter that there is as much evidence for the latter as there is for the former, the mainstream outlets are wild with speculation and neo-McCarthyism...

Aug 15 14:46

"the first person in the world to be publicly identified a confirmed PRISM target...

a pro-democracy activ1ist.

a middle-aged former tax man and a pro-democracy activist. But four years ago, a botched operation launched by New Zealand spies meant he suddenly found himself deemed a potential terrorist — his passport was revoked, his home was raided, and he was placed on a top-secret National Security Agency surveillance list.

Aug 15 13:59

Mysterious Group Hacks The NSA

The latest hack revealed over the weekend has nothing to do with the Democratic Party or George Soros, and instead a mysterious hacker group by the name “The Shadow Brokers” claims to have hacked the Equation Group - a government cyberattack hacking group associated with the NSA, and released a bunch of the organization's hacking tools. The hackers are also asking for 1 million bitcoin (around $568 million) in an auction to release more files.

“Attention government sponsors of cyber warfare and those who profit from it!!!!” the hackers wrote in a manifesto posted on Pastebin, on GitHub, and on a dedicated Tumblr.

Aug 15 13:53

Judge Jeanine: Now we know why Hillary used private email

Aug 15 13:43

Government surveillance of Internet users increasing each year

A new report from search giant Google has revealed how many times governments and courts have asked it to hand over information about users.

The annual transparency report shows that in 2014, 35,365 requests were made, and 40,677 were made in 2015.

Aug 15 09:52

Hillary’s Unsecured Email EXPOSES U.S. Spy… Leading to His EXECUTION

As reported by the Washington Examiner, “I’m not going to comment on what he may or may not have done for the United States government, but in the emails that were on Hillary Clinton’s private server, there were conversations among her senior advisors about this gentleman. The senator said this lapse proves she is not capable of keeping the country safe.

“That goes to show just how reckless and careless her decision was to put that kind of highly classified information on a private server. And I think her judgment is not suited to keep this country safe,” he said.

Here’s what they said to expose the brave spy Amiri, leading to his death:

The scientist’s name shows up in Clinton’s emails back in 2010, just nine days before he returned to Iran.

Aug 15 09:05

PokemonGo Ransomware installs Backdoor Account and Spreads to other Drives

With the popularity of PokemonGo, it was inevitable that a malware developer would create a ransomware that impersonates it. This is the case with a new Hidden-Tear ransomware discovered by Michael Gillespie that impersonates a PokemonGo application for Windows and targets Arabic victims.

Aug 15 09:03

Windows 10 may freeze after installing the Anniversary Update

Microsoft has received a small number of reports of Windows 10 freezing after installing the Anniversary Update on systems with the operating system stored on a solid-state drive (SSD) and apps and data stored on a separate drive. This issue does not occur when starting Windows 10 in Safe Mode.

Aug 15 07:47

TWITTER BOWS TO ISRAELI GOVERNMENT PRESSURE TO CENSOR TWEETS

Though Israel’s reputation as a true democracy has certainly come under fire, its advocates proudly point to its freewheeling press as an exemplar of the values of liberal Zionism. But even this last holdout of Israeli democracy israpidly receding, particularly in traditional domestic print and broadcast media and, more recently, among foreign-headquartered social media platforms.

Aug 14 16:18

Massive hack of Soros files released

The files of George Soros’s Open Society Institute have been hacked over a period of years, with 2,576 just published on the mysterious DCLeaks site.

Aug 14 16:13

Guy tricks Windows tech support scammers into installing ransomware

Kwiatkowski got an idea… an awful idea. He got a wonderful, awful idea.

He’d already noticed that the remote control software the scammer was using allowed him to send and receive files. So he turned to his inbox, where he had several samples of Locky ransomware variants. He grabbed one, renamed it to look like a digital photo, and fired it over.

Kwiatkowski feigned vision trouble and suggested that Dileep just have a look at a picture of the credit card instead. It certainly sounds like he did, though, strangely, the picture must’ve been corrupted… because nothing came up on his screen when he double-clicked it.

That’ll soon change, though. A ransom notice ought to be appearing any time now.

Aug 14 14:07

Twitter Suspends Account Of Guccifer 2.0, Hacker Behind DNC & DCCC Leaks

The Twitter account of Guccifer 2.0, the hacker who claimed responsibility for leaking a trove of Democratic National Committee documents, was suspended less than 24 hours after dumping fresh sensitive DNC data.

Aug 14 07:43

CLINTON COLLAPSE: INSIDERS SAY MAY DROP "SOON"

Insiders say the Hillary camp is panicked--possibly on the verge of collapse. Not only is Trump's polling far better than the media narrative shows but the even more predictive Social Media scene has collapsed to "landslide" proportions in favor of Donald Trump. While Brietbart and The Gateway Pundit had covered the publicly available data, we used some of our benefactors extensive resources to try to get a look inside the Social Media response center of the Clinton Campaign.

We'll tell you: the shop they run is tight. Fear--terror, really--of Mrs. Clinton goes a long way to keeping people in line--but now that the cracks have started we were able to compromise a key person inside the sequestered Media Room run by David Brock's "Internet Warrior Virgins" (his term, not ours).

This is what we learned.

Aug 13 16:29

Just How Bad Is (Social) Media Bias In This Election?

“They take away the hashtag that has negative tweets for Clinton and replace it with something that doesn’t so the average person doesn’t see what was really trending... This happens every day.”

Aug 13 12:09

Drug Sales On The Dark Web Have Tripled Since The Feds Shut Down Silk Road

By John Vibes

This week, it was reported that drug sales on the dark web have tripled since the infamous Silk Road was shut down in 2013.

Within hours of the Silk Road takedown, there were several competitors that were already on the dark web who were ready to move in on the newly available business.

Stijn Hoorens of the RAND corporation recently published a study showing how this growth has occurred despite government intervention...

Aug 13 10:00

MICROSOFT INADVERTENTLY DEMONSTRATES THE INTRINSIC SECURITY PROBLEM OF INCLUDING A UNIVERSAL BACKDOOR IN ITS SOFTWARE BY ACCIDENTALLY LEAKING ITS "GOLDEN KEY"

Microsoft has inadvertently demonstrated the intrinsic security problem of including a universal backdoor in its software after it accidentally leaked its so-called "golden key"—which allows users to unlock any device that's supposedly protected by Secure Boot, such as phones and tablets.

The key basically allows anyone to bypass the provisions Microsoft has put in place ostensibly to prevent malicious versions of Windows from being installed, on any device running Windows 8.1 and upwards with Secure Boot enabled.

And while this means that enterprising users will be able to install any operating system—Linux, for instance—on their Windows tablet, it also allows bad actors with physical access to a machine to install bootkits and rootkits at deep levels. Worse, according to the security researchers who found the keys, this is a decision Microsoft may be unable to reverse.

Webmaster's Commentary: 

Oops there!!!

Aug 13 09:58

Hacker Publishes House Democrats' Personal Information

A hacker has published the personal contact information of nearly every Democratic member of the US House of Representatives on his website.

The hacker known as “Guccifer 2.0” uploaded an Excel file on Friday that contains the cell phone numbers and private e-mail addresses of the Democrats.

Aug 13 09:57

The bandwidth bottleneck that is throttling the Internet

On 19 June, several hundred thousand US fans of the television drama Game of Thrones went online to watch an eagerly awaited episode — and triggered a partial failure in the channel's streaming service. Some 15,000 customers were left to rage at blank screens for more than an hour.

The channel, HBO, apologized and promised to avoid a repeat. But the incident was just one particularly public example of an increasingly urgent problem: with global Internet traffic growing by an estimated 22% per year, the demand for bandwidth is fast outstripping providers' best efforts to supply it.

Aug 13 09:54

Newspapers rethink paywalls as digital efforts sputter

Paywalls were supposed to help rescue newspapers from the crisis of sinking print circulation as readers shifted to getting their news online.

But with a few exceptions, they have failed to deliver much relief, prompting some news organizations to rethink their digital strategies.

Newspapers in the English-speaking world ended paywalls some 69 times through May 2015, including 41 temporary and 28 permanent drops, according to a study by University of Southern California researchers.

Paywalls "generate only a small fraction of industry revenue," with estimates ranging from one percent in the United States to 10 percent internationally, the study in July's International Journal of Communication said.

Aug 13 08:34

Amazon Social Justice Warrior Implicated In ‘Doxing’ Conspiracy

An online cabal of Social Justice Warriors (SJWs), including an “internet abuse specialist” who works for Amazon, have been implicated in a conspiracy to reveal a Twitter user’s personal information before unleashing an online “witch hunt” against them.

Aug 12 20:06

Terrorist-Fighting License Plate Readers Just Mobile Revenue Generators Cruising Poor Neighborhoods

We know what automatic license plate readers are good for: collecting massive amounts (billions of records) of plate/location data housed by private companies and accessed by law enforcement for indefinite periods of time. What we don't know is how effective ALPRs are at fighting/investigating crime. George Joseph at Citylab has done some digging into the effectiveness of license plate readers and hasn't found much that justifies the expense, much less the constant compilation of plate info.

Aug 12 14:01

Amazon Social Justice Warrior Implicated In ‘Doxing’ Conspiracy

An online cabal of Social Justice Warriors (SJWs), including an “internet abuse specialist” who works for Amazon, have been implicated in a conspiracy to reveal a Twitter user’s personal information before unleashing an online “witch hunt” against them.

Aug 12 13:24

SURPRISE: Vancouver Police Are Using Secretive “Stingray” Cellphone Surveillance

By Derrick Broze

Vancouver police have become the first Canadian police force to admit to using a controversial cellphone monitoring tool sometimes known as a Stingray.

Amidst mounting pressure from civil liberties groups, the Vancouver Police have confirmed that they have used a cell site simulator, popularly known as a “stingray,” on at least one occasion. The admission is the first of its kind by a municipal police force in Canada...

Aug 12 12:00

Was This Wartime Technology Really Deployed Against Journalists Inside the DNC?

Technology developed to jam cellphones during the Iraq War may be getting deployed against journalists reporting on protests against the political establishment in the United States.

While police and government surveillance of protests, including monitoring of cellphone use, is well-documented, efforts to block signals at protests remains an oft-repeated, but never proven, rumor.

It may be impossible to definitively prove that authorities are using cellphone “jamming” technology, but journalists working with both mainstream and independent media reported unusual difficulties accessing the internet during recent protests at the gates of the Democratic National Convention, consistent with the effects this very real technology could have.

Webmaster's Commentary: 

So, THIS is what the DNC thinks about the First Amendment; something to be broken and battered with high tech, if the narrative they are spewing has absolutely no relationship with reality.

Aug 12 11:56

‘War On Drugs Futile In Face Of Dark Web Marketplace,’ Say Campaigners

Britain’s war on drugs is failing, campaigners say, with the online narcotics market soaring in value and police finding themselves seizing 1,000 cannabis plants every day.

Researchers for think tank Rand Europe found the UK has the largest online drugs trade of any European nation, and is second only to the US.

Aug 12 08:58

FLASHBACK - Hillary Clinton camp now paying online trolls to attack anyone who disparages her online 

Many moons ago, David Brock, now the head of a Hillary Clinton Super PAC, used every resource available to ruin the life of Anita Hill and anyone who supported her. He would lie, cheat, and blatantly misrepresent facts if it meant getting Clarence Thomas through the Supreme Court nomination process.

Brock openly admitted it.

Now, it appears Brock, who is no doubt great at what he does, is using his same old tools, but for a new cause in a new technological era.

As head of the Correct The Record Super PAC for Hillary Clinton, David Brock has launched something called Barrier Breakers — an online mob of paid trolls designed to attack any and every person who says one cross word about Hillary Clinton on Facebook, Twitter, Instagram, Reddit, or elsewhere.

Webmaster's Commentary: 

Aug 12 07:55

Linux TCP Flaw allows Hackers to Hijack Internet Traffic and Inject Malware Remotely

The Transmission Control Protocol (TCP) implementation in all Linux systems deployed since 2012 (version 3.6 and above of the Linux kernel) poses a serious threat to Internet users, whether or not they use Linux directly.

This issue is troubling because Linux is used widely across the Internet, from web servers to Android smartphones, tablets, and smart TVs.

Researchers have uncovered a serious Internet flaw, which if exploited, could allow attackers to terminate or inject malware into unencrypted communication between any two vulnerable machines on the Internet.

The vulnerability could also be used to forcefully terminate HTTPS encrypted connections and downgrade the privacy of secure connections, as well as also threatens anonymity of Tor users by routing them to certain malicious relays.

Aug 12 06:39

Thieves can wirelessly unlock up to 100 million Volkswagens, each at the press of a button

Security researchers will demonstrate how crooks can break into cars at will using wireless signals that can unlock millions of vulnerable vehicles.

The eggheads, led by University of Birmingham computer scientist Flavio Garcia alongside colleagues from German engineering firm Kasper & Oswald, have managed to clone a VW Group remote control key fob after eavesdropping on the gizmos' radio transmissions.

The hack can be used by thieves to wirelessly unlock as many as 100 million VW cars, each at the press of a button. Almost every vehicle the Volkswagen group has sold for the past 20 years – including cars badged under the Audi and Skoda brands – is potentially vulnerable, say the researchers. The problem stems from VW’s reliance on a “few, global master keys.”

Aug 11 20:34

US couple sues IP mapping firm over 'digital hell'

A US couple is suing an internet mapping firm for $75,000 (£58,000) after years of "digital hell".

MaxMind matches IP addresses, which are used to connect devices to the internet, to physical locations. It has said these are not meant to be precise.

James and Theresa Arnold say it registered their home as the position of more than 600 million addresses.

They say this has led many people to wrongly believe a host of crimes were committed at the property.

Aug 11 15:00

When A Door Closes, A Window Opens: Closing Silk Road Leads To Surge In Online Drug Sales

Closing the online black market known as the Silk Road was a success for the FBI, but a short-lived one. Three years later, it seems that it did little to deter internet-facilitated drug purchases as new reports found more markets have opened in its place.

Aug 11 13:49

Apple Patents Remote ‘Kill Switch’ For IPhone Cameras

What to do about all those darn videos showing cops murdering people?

They make it much harder for law enforcement to lie about their own actions, and just get everyone all fired up. Why not ask Apple (for starters) to build in a “feature” on a future generation of iPhones that will allow cameras to be disabled remotely?

Aug 11 13:37

What Do They Know That We Don’t? World’s Billionaires Are Stockpiling Cash: “Taking Money Off the Table”

Many of these people literally helped to build the system we all now rely upon, and now they are holding cash, gold and other assets our of fear that stocks will crash and digital instruments of wealth could be undermined:

The world’s billionaires are holding more than $1.7 trillion in cash — the highest amount since one firm began recording the measure in 2010. Because of what they perceive to be growing risks in the economy and world, the world’s 2,473 billionaires are keeping 22.2 percent of their total net worth in cash.

Read more at SHTF

Aug 11 13:17

Pokémon GO Is 'Racist'

A new article from the Urban Institute, a Washington-based community-engagement research organization, calls out Pokémon GO’s failure to break down barriers and reach marginalized groups.

Aug 11 12:34

Clinton Is Fighting the Troll Wars With a Million Dollar Super-PAC Campaign

As the Los Angeles Times reports, a super-PAC called Correct the Record has hired a legion of “former reporters, bloggers, public affairs specialists, [and] designers” to go after anyone online who is critical of Hillary Clinton. And it’s a well-funded effort. According to Correct the Record, it’s “engaged” with roughly 5,000 people online so far.

“It is meant to appear to be coming organically from people and their social media networks in a groundswell of activism, when in fact it is highly paid and highly tactical,” Brian Donahue, chief executive of the consulting firm Craft Media/Digital, told the Los Angeles Times.

Webmaster's Commentary: 

Well, I guess if McDonald's turns you down, a job is a job!

Aug 11 11:24

Newly released Clinton emails shed light on relationship between State Dept. and Clinton Foundation

Judicial Watch, a conservative watchdog group, released 296 pages of emails from the Democratic presidential nominee, including 44 that Judicial Watch says were not previously handed over to the State Department by Clinton. The emails, many of which are heavily redacted, raise questions about the Clinton Foundation's influence on the State Department and its relations during her tenure.

Aug 11 11:23

Dems worried another hacked email trove could surface before November

Democratic Party officials reportedly are bracing for the possibility that another batch of damaging or embarrassing internal emails — the kind that cost the party chairman her job on the eve of the Democratic National Convention — could become public before the November presidential election.

Webmaster's Commentary: 

Maybe the Democratic party will play it safe and drop barbells onto the throats of all their IT people now, to prevent any more leaks! :)

Aug 11 07:40

FBI probe of Clinton's emails prompted by espionage fears, secret letters say

Two secret letters the FBI sent to the State Department have revealed for the first time that the bureau's investigation into Hillary Clinton's private email server, and the classified emails sent through it, stemmed from a so-called "Section 811" referral from the Intelligence Community's Inspector General (ICIG). The ICIG determined that classified, national security information in Clinton's emails may have been "compromised" and shared with "a foreign power or an agent of a foreign power."

Section 811 of the Intelligence Authorization Act of 1995 "is the statutory authority that governs the coordination of counterespionage investigations between Executive Branch departments or agencies and the FBI." A Section 811 referral is a report to the FBI about any unauthorized information that may have been disclosed to a foreign power.

Webmaster's Commentary: 

It is that "something else" I am most concerned with. :)

Aug 11 07:33

Scammers Take Over Popular KickassTorrents ‘Mirror’

The popular KickassTorrents 'mirror' KAT.am is back online. After a brief suspension, the registry re-released the domain name for registration, allowing scammers to pick it up. While the site still appears to be a mirror, it asks people to sign up for an account with a credit card if they want to download something.

Aug 11 07:30

McAfee outs malware dev firm with scores of Download.com installs

McAfee says a software company with more than 50,000 downloads on sites such as Download.com is distributing web browser hijacking and fraud malware.

Researcher Santosh Revankar says Lavians Inc is pushing the Bing.vc browser redirect and home page hijacker which creates seeming problems that the company then attempts to fix at a cost.

The technique is straight out of the black hat fraud handbook and is used by low level and lowly web scum who take advantage of the proliferation of trash software to inject advertisements, and drop all manner of malware on user machines.

Lavians Inc has 19 uploads currently hosted on Download.com and 24 on Brothersoft.com, along with applications on its own site.

Aug 11 06:47

If Two Countries Waged Cyber War On Each Other, Here’s What To Expect

Imagine you woke up to discover a massive cyber attack on your country. All government data has been destroyed, taking out healthcare records, birth certificates, social care records and so much more.

Webmaster's Commentary: 

How about the tax records? Can we blow up those tax records? :)

Aug 10 09:47

SNOPES busted yet again for fabricating total lies in order to cover for Obama’s money laundering crimes

Snopes is widely regarded as one of the most reliable fact-checking and myth-busting resources on the internet. When it comes to urban legends, there’s no website that does a better job of providing evidence as to whether or not stories are fact or fiction than Snopes .

Unfortunately, the same cannot be said when it comes to any political issues. In that realm, Snopes is visibly liberal, constantly taking the side of leftist politicians and actively avoiding the whole truth when it comes to controversies surrounding the Democratic Party. So if you’re getting your “facts” from their website, be prepared to read lie after lie after lie.

Aug 10 09:42

Source of DNC email leak murdered, Wikileaks Julian Assange implies – Offers $20,000 reward

Subscribe now for more! http://bit.ly/1QHJwaK The source of the DNC e-mail leak was murdered, Wikileaks founder Julian Assange Implies. The Whistleblower organization has offered a $20,000 reward for information leading to the conviction of whoever killed Seth Rich, the DNC staffer who was mysteriously murdered shortly after the #DNCLeak. Media analyst Mark Dice has the story. © 2016 by Mark Dice

Aug 10 09:35

Biohybrid Robots Built From Living Tissue Start to Take Shape

By Victoria Webster, Case Western Reserve University

(Activist Post Editor’s Note: We have featured many articles over the years warning about scientific and military developments that were trending toward the merger of robotics with nature, typically in the areas of war and surveillance. Running parallel to this are developments in environmental science and health that employ nanotechnology and biorobotics which are beginning to fundamentally change how we define the natural world...

Aug 10 09:32

Where Does Your Info Come From? Mainstream Media Now Literally Using Robots to Write News

By Claire Bernish

Corporate ownership of 90 percent of media outlets in the United States has made the term ‘mainstream journalist’ quite the oxymoron, but the Washington Post’s newest project eliminates ‘journalist’ from the equation entirely — robots are now writing the outlet’s ‘news.’

Using artificial intelligence technology, the Washington Post is ‘employing’ software to ‘write’ hundreds of news briefs highlighting key information about the Olympic Games in Rio in real-time.

“‘Heliograf,’ which was developed in-house, automatically generates short, multi-sentence updates for readers,” the Post proudly announced Friday, as if the news organization couldn’t predict the collective American jaw-drop at the notion a computer could simply replace a longstanding tradition of actual journalism...

Aug 10 08:35

Microsoft rolls out several new Windows 10 cumulative updates

Microsoft is making a number of fixes and reliability and performance improvements available across a variety of different flavors of Windows 10 via new Cumulative Updates.

Webmaster's Commentary: 

Why didn't Microsoft apply the fixes before releasing Windows 10?

Oh, that's right, the end user is now an unpaid member of Microsoft's quality control department!

Aug 10 08:21

Someone made a smart vibrator, so of course it got hacked

The Internet of Things That Can Be Hacked grows daily. Lightbulbs, trucks, and fridges all have computers inside them now, and all have been hacked by someone. But at least you don’t put those inside your body.

Two years ago, someone had the good idea to put a bluetooth connection inside a vibrator, and the We-Vibe 4 Plus was born. The vibrator can connect with a smartphone app that its makers say “allows couples to keep their flame ignited – together or apart”: that is, it can be controlled remotely, while, say, making a video call.

But at the Def Con hacking conference in Las Vegas, two independent hackers from New Zealand, who go by the handles goldfisk and follower, revealed that the way the vibrator speaks with its controlling app isn’t really secure at all – making it possible to remotely seize control of the vibrator and activate it at will.

Aug 10 08:11

Google explains why Palestine isn't labeled in Maps

It's restoring the labels "West Bank" and "Gaza" after accidentally deleting them.

Webmaster's Commentary: 

Suuuuuuuuuuure it was an accident!

Aug 10 08:08

Copperhead OS: The startup that wants to solve Android’s woeful security

A startup on a shoestring budget is working to clean up the Android security mess, and has even demonstrated results where other "secure" Android phones have failed, raising questions about Google's willingness to address the widespread vulnerabilities that exist in the world's most popular mobile operating system.

"Copperhead is probably the most exciting thing happening in the world of Android security today," Chris Soghoian, principal technologist with the Speech, Privacy, and Technology Project at the American Civil Liberties Union, tells Ars. "But the enigma with Copperhead is why do they even exist? Why is it that a company as large as Google and with as much money as Google and with such a respected security team—why is it there's anything left for Copperhead to do?"

Aug 10 08:00

Internet of Car...rikey what the hell just happened to my car?

Vehicle manufacturers are making many of the same security mistakes as each other, creating scores of vulnerabilities in the process.

Not very reassuringly, half of the vulnerabilities discovered by security researchers at IOActive could result in "complete or partial loss of control" of a vehicle.

IOActive’s study is based on real-world security assessments with the world’s leading vehicle manufacturers, covering three years’ worth of data and active vulnerabilities. An alarming 71 per cent of the vulns uncovered during the research could be exploited without much difficulty, or are almost certain to be exploited.

Aug 10 07:58

Facebook to forcefeed you web ads, whether you like it or not: Ad blocker? Get the Zuck out!

These silos of your personal information don't run themselves for free, folks

Aug 10 07:56

Bungling Microsoft singlehandedly proves that golden backdoor keys are a terrible idea

Microsoft leaked the golden keys that unlock Windows-powered tablets, phones and other devices sealed by Secure Boot – and is now scrambling to undo the blunder.

These skeleton keys can be used to install non-Redmond operating systems on locked-down computers. In other words, on devices that do not allow you to disable Secure Boot even if you have administrator rights – such as ARM-based Windows RT tablets – it is now possible to sidestep this block and run, say, GNU/Linux or Android.

What's more, it is believed it will be impossible for Microsoft to fully revoke the leaked keys.

And perhaps most importantly: it is a reminder that demands by politicians and crimefighters for special keys, which can be used by investigators to unlock devices in criminal cases, will inevitably jeopardize the security of everyone.

Aug 10 07:52

Hitler ‘ransomware’ offers to sell you back access to your files – but just deletes them

The ransomware appears to be a test variant put together by unskilled coders, as a blog post by IT help site Bleeping Computer explains.

“It does not encrypt any files at all. Instead this malware will remove the extension for all of the files under various directories, display a lock screen, and then show a one hour countdown as shown in the lock screen below.

After that hour it will crash the victim's computer, and on reboot, delete all of the files under the [use profile] of the victim,” it adds.

German language text found within an embedded batch file associated with the malware states “Das ist ein Test” (“This is a test”).

Aug 10 07:13

Judicial Watch Uncovers New Batch of Hillary Clinton Emails

Judicial Watch today released 296 pages of State Department records, of which 44 email exchanges were not previously turned over to the State Department, bringing the known total to date to 171 of new Clinton emails (not part of the 55,000 pages of emails that Clinton turned over to the State Department). These records further appear to contradict statements by Clinton that, “as far as she knew,” all of her government emails were turned over to the State Department

Aug 10 06:59

BREAKING=> Julian Assange Suggests Seth Rich – Who Was MURDERED in DC – Was Wikileaks DNC Source!

On July 8, 2016, 27 year-old Democratic staffer Seth Conrad Rich was murdered in Washington DC. The killer or killers took nothing from their victim, leaving behind his wallet, watch and phone.

Shortly after the killing, Redditors and social media users were pursuing a “lead” saying that Rich was en route to the FBI the morning of his murder, apparently intending to speak to special agents about an “ongoing court case” possibly involving the Clinton family.

Webmaster's Commentary: 

Seth Rich was one of five people closely associated with the Clintons in the past six weeks who ‎have died under strange circumstances. His death was officially listed as a robbery, although apparently nothing was stolen and he was about to meet with government officials. The liar & warmonger Hillary, of course, saw to it that she & her people seized the opportunity to make this a "two fer"---they blamed the hacking and leak (which they didn’t want to occur but couldn’t stop) on the Russians (with the help of the corporate media) even as they eliminated a "traitor" in their midst.

Aug 09 18:46

Over half of connected cars are at risk of being hijacked by hackers - with potentially dire consequences

Half of connected cars are at risk of being hijacked by hackers, according to the company that managed to hack a Jeep and steer it off the road last year.

Researchers from cyber security firm IOActive were able to take control of the Chrysler Jeep Cherokee from miles away while it was being driven by Wired reporter Andy Greenberg.

A new report from the company claims that some 51% of connected cars could be at risk of a similar takeover.

What's more, 71% of the security flaws uncovered could be "exploited without much difficulty, or are almost certain to be exploited", according to the report.

Aug 09 15:17

Google In The White House? Assange Warns Of Close Ties Between Hillary Clinton & Internet Giant

During the Green Party convention in Houston, Texas, over the weekend, WikiLeaks founder Julian Assange spoke via video stream.

Aug 09 12:38

WikiLeaks emails expose alcohol industry’s paid campaign to stifle pot legalization

When the good people at Marijuana.com went through the WikiLeaks dump of the DNC emails, they found something unrelated to the trove of damning information on the criminal Hillary Clinton. Within the mountains of email texts, was a paid segment by the Wine & Spirits Wholesalers of America (WSWA), stoking fear within Washington, encouraging politicians to be wary of marijuana legalization.

Aug 09 10:48

Windows 10 Anniversary Update: Watch out for these nasty surprises

Windows 10 users are getting the first major update to the operating system in just under a year, with the release of the Anniversary Update.

But alongside the new features and fixes are some more unwelcome changes, ranging from less control for users to frozen machines.

Here are the main gotchas to look out for, as well as some fixes.

Webmaster's Commentary: 

"Sure there are problems, but doesn't the new logo look great?" -- Microblorch

Aug 09 10:39

Internet Archive posted 10,000 browser-playable Amiga titles – go, play

Seriously, go. Enjoy yourself. It’s Monday. We’ll still be here when you get back. It’s bound to be a long week. The world is coming apart at the seams. Your boss won’t notice if you play a round or two of Bubble Bobble from the comfort of your own browser (Firefox seems to work best on my end).

We can’t vouch for the quality of all of the Amiga titles that were recently posted up on Archive.org, but there sure as heck are a lot of them – 10,000+, by the site’s count, including favorites as Where in the World is Carmen San Diego, King’s Quest and Double Dragon,

Webmaster's Commentary: 

I loved the Amiga. I was a developer and did a lot of code work for some Amiga companies in between film gigs. Memories, memories! :)

Aug 09 09:44

One bug to rule them all: 'State-supported' Project Sauron malware attacks world's top PCs

Two top electronic security firms have discovered a new powerful malware suite being used to target just dozens of high-value targets around the world. The research shows that it was likely developed on the orders of a government engaging in cyber espionage.

The California-based Symantec has labeled the group behind the attack Strider, while Moscow-based Kaspersky Labs dubbed it ProjectSauron. Both are references to J. R. R. Tolkien’s Lord of the Rings, a nod to the fact that the original malware code contained the word “Sauron.”

But behind the playful literary allusions is a powerful piece of software, capable of “harvesting” passwords on entire networks and “modules are designed to perform specific functions like stealing documents, recording keystrokes, and stealing encryption keys from both infected computers and attached USB sticks,” according to Kaspersky.

Aug 09 09:34

VIDEO: OWNED! WIKILEAKS FOUNDER JULIAN ASSANGE TURNS TABLES ON BILL MAHER

Maher promptly launched a red herring at Assange:

Why haven’t we seen anything hacked from the Trump campaign? Obviously we know these came from Russia. And we also know that you do not like Hillary Clinton at all, as does not Vladimir Putin.

Then Maher attempted to poison the well:

It looks like you are working with a bad actor, Russia, to put your thumb on the scale and basically f*ck with the one person who stands in the way of us being ruled by Donald Trump.

Assange – without hesitation – responded with an unexpected question for Maher:

I do notice that a William Maher gave a Clinton-affiliated entity $1 million. Perhaps you would like to comment. Is that you?

Aug 09 09:18

TOOSDAY’S TOON ~~ #PokemonGo BANNED IN IRAN

Pokemon Go Banned in Iran Due To “Security Concerns”

Aug 09 09:16

Google in the White House? Assange Warns of Close Ties Between Hillary Clinton & Internet Giant

Webmaster's Commentary: 

This explains why Google servers are being used to DOS my site!

Aug 09 08:42

Researchers crack open unusually advanced malware that hid for 5 years

Kaspersky researchers estimate that development and operation of the Sauron malware is likely to have required several specialist teams and a budget in the millions of dollars. The researchers went on to speculate that the project was funded by a nation-state, but they stopped short of saying which one.

"The actor behind ProjectSauron is very advanced, comparable only to the top-of-the top in terms of sophistication: alongside Duqu, Flame, Equation, and Regin," the Kaspersky researchers wrote. "Whether related or unrelated to these advanced actors, the ProjectSauron attackers have definitely learned from them."

Aug 09 08:36

Windows 10 Anniversary Update crashing under Avast antivirus update

Intel Skylake drivers + Avast = kernel panic, BSOD

Aug 09 08:35

Brit network O2 hands out free Windows virus with USB pens

The virus infects program files and web files on computers running the following systems: Windows 2000, Windows 95, Windows 98, Windows ME, Windows NT,Windows Server 2003, Windows Vista, Windows XP.

An O2 spokesman said the business had contacted all customers who received the USB and advised them to discard it.

He said: "For any customers that have already used the USB or are concerned, we have a specialist team on hand to support them and guide them through any action they may need to take. We apologise for any inconvenience."

Aug 09 07:39

Facebook bans picture of cancer sufferer posted by widower who lost his wife to ovarian tumour for being too 'suggestive'

Mr Piears launched the Dying for a Cure campaign in March following the death of his 'inspirational' wife.

The initiative aims to highlight his concerns over what he describes as the 'profit-led' approach to drug research.

He paid for a 'boosted Facebook post' on the website to promote the message and encourage users to sign a petition.

The image he used on the site shows a female cancer patient holding up a sign over her bare chest that reads: 'UK Governments: The profits on cancer drugs are killing us.'

However on July 8 he received a message from Facebook that said: 'Your advert wasn't approved because it doesn't follow our Advertising Policies by featuring an image containing excessive amounts of skin or suggestive content.

Aug 08 12:22

GOOGLE IGNITES INTERNATIONAL OUTRAGE AFTER WIPING PALESTINE OFF THE MAP, REPLACING IT WITH ISRAEL

Palestine – Internet giant Google has come under fire from around the world this week, after removing the name Palestine from Google Maps and replacing it with Israel. Interestingly, international mainstream corporate media has completely blacked out any coverage of the incident or the international outrage it has sparked.

Webmaster addition: If you search for "Palestine" in Google Earth, it takes you to the Atlantic Ocean off the west coat of Africa! As a side note, many of the hack attacks on my server come from Google's IP addresses!

Aug 08 11:43

You know those new chips in your credit card? They’re failing you miserably

Americans have spent much of 2016 lamenting the addition of chips into their credit and debit cards. In exchange for the extra few moments consumers spend checking out, however, they are promised enhanced security to protect their accounts.

Aug 08 11:39

Amazon Echo is the ultimate spy device that records everything you say

The world’s largest retailer is under fire for releasing a device that, according to some experts, is little more than a spying tool for government surveillance.

Aug 08 11:13

Erik Prince: Hillary Clinton ‘Very Likely Caused’ Iranian Nuclear Scientist’s Death

Bannon asked if Hillary Clinton should be considered complicit in the execution of Iranian nuclear physicist Shahram Amiri, on charges of spying for the United States, who was discussed in some of the emails on Clinton’s unsecured private server.

“The physicist that came out, he defected, he was a treasure trove of information, but the CIA and the Clinton State Department botched it while he was in the States, left him pretty much unsupported,” Prince replied, calling it a major mistake to leave Amiri’s family in Iran.

“The second time he calls home, the Iranian intelligence service answers the phone. Undoubtedly, they leveraged him. When the guy talks about psychological trauma here in the United States, I’m sure it’s because the Iranians were telling him all the things they were going to do to his family if he didn’t come home,” said Prince.

Aug 08 09:13

'Sauron' spyware attacking targets in Belgium, China, Russia and Sweden

A previously unknown hacking group called Strider has been conducting cyber espionage against selected targets in Belgium, China, Russia and Sweden, according to Symantec.

The security firm suggested that the product of the espionage would be of interest to a nation state's intelligence services.

Strider uses malware known as Remsec that appears primarily to have been designed for espionage, rather than as ransomware or any other nefarious software.

Aug 08 08:00

My Job Churning Out The Garbage Behind Clickbait Titles

You're not going to fall for this internet misinformation circle jerk. You want real talk, so you strap on your Comments Codpiece and scroll straight to the bottom of the article. Guess what? Those people might not be legit either.

"There are services that will pay people to post on your blog or forum, very much like paying kids to come to your birthday party and pretend to be your friend," Jen says. "The one I used was called Postloop. I loved them because they paid reliably and you could cash out immediately instead of once a week. So if you were desperate to make a little extra to cover a bill or something, they were easy. The way [it] works is you sign up and choose some topics you might be interested in. They match you with forums, which you must post in, meeting a certain frequency and post length requirement so you don't look too spammy. Assuming you fit within their guidelines, you make a meager amount of money from the chatting."

Aug 08 07:50

Either Give Fair Coverage Or We Pull Your FCC Licenses!

Republicans are used to unfair reporting from the news media because the press in the US is mostly Jewish owned and both pro-Israel and pro-Wall Street. But this year has been rather astounding. When Bernie Sanders supporters converged on Debbie Wasserman Schultz to blame her for rigging the primaries for Hillary, MSNBC said 99% applauded the former head of the DNC. I saw the raw video of Sanders supporters booing her and yelling, “Bernie. Bernie.” The TV audience never saw the anti-Hillary protesters outside the convention center chanting, “Lock her up! Lock her up!”

Aug 08 07:18

Executed Iranian Scientist Mentioned in Clinton's Privately-Stored Emails

Recently executed Iranian nuclear scientist Shahram Amiri was mentioned in emails exchanged between US Democratic Party candidate Hillary Clinton and her advisers while she was secretary of state and stored on a private server, US Senator Tom Cotton said.

Aug 08 06:05

Clinton's private server held emails about nuclear 'spy' executed in Iran: Aides discussed scientist 'friend' and his decision to return home after defecting to the U.S. for $5m

Hillary Clinton used her private email server to discuss details of the Iranian nuclear scientist who has executed for giving information to the CIA.

Shahram Amiri, who was hanged on Sunday for 'revealing secrets to the enemy', was in the US and allegedly informing on Tehran's extensive nuclear program during the Democrat's controversial reign as Secretary of State.

At the time she stressed researcher had been there of his 'own free will' and was described as 'our friend' in correspondences.

...

Amiri worked for a university affiliated with Tehran's extensive nuclear program.

He is said to have had an in-depth knowledge of Iran's nuclear program and was kept at a secret location after returning to the country.

According to CBS, he told officials in interviews he was being held against his will by Saudi and U.S. spies.

But American officials said he was set to receive millions for informing.

Aug 08 05:47

Android bug fear in 900 million phones

Serious security flaws that could give attackers complete access to a phone's data have been found in software used on tens of millions of Android devices.

The bugs were uncovered by Checkpoint researchers looking at software running on chipsets made by US firm Qualcomm.

Qualcomm processors are found in about 900 million Android phones, the company said.

However, there is no evidence of the vulnerabilities currently being used in attacks by cyberthieves.

Aug 07 23:51

Iranian Scientist Who Provided U.S. with Info Executed Today – He Was Mentioned in Hillary Email

Hillary Clinton recklessly discussed, in emails hosted on her private server, an Iranian nuclear scientist who was executed by Iran for treason, Sen. Tom Cotton, R-Ark., said Sunday.

Read more: http://therightscoop.com/iranian-scientist-who-provided-u-s-with-info-...

Aug 07 18:59

Windows 10 Anniversary Update is borking boxen everywhere

Microsoft's response: Have you tried uninstalling it and installing it again?

Aug 07 15:43

Princeton Professor Shows How Easy It Is To Hack An Election In Just 7 Minutes

By Claire Bernish

A professor from Princeton University and a graduate student just proved electronic voting machines in the U.S. remain astonishingly vulnerable to hackers — and they did it in under eight minutes.

In fact, Professor Andrew Appel and grad student Alex Halderman took just seven minutes to break into the authentic Sequoia AVC Advantage electronic voting machine Appel purchased for $82 online — one of the oldest models, but still in use Louisiana, Pennsylvania, New Jersey, and Virginia...

Aug 07 12:53

PLC-Blaster Worm Targets Industrial Control Systems

Security researchers at Black Hat USA described a proof-of-concept worm that targets weaknesses within automated industrial control systems used to manage critical infrastructure and manufacturing. The worm, according to OpenSource Security, has the capability to autonomously search for and spread between networked programmable logic controllers (PLCs).

Webmaster's Commentary: 

Shades of STUXNET!

Aug 07 12:52

Windows 10 Anniversary Update deleting Linux partitions?

Many folks who are running Windows 10 on their computers, usually have a Linux partition installed as well. Regular folks do it, developers do it, and then the few who prefer to use Linux but are forced to use Windows. But here’s the thing, it would appear as if the Windows 10 Anniversary Update is removing Linux partition.

Alan Pope, Ubuntu Community manager at Canonical, took to Twitter recently to complain that he has seen several reports of folks claiming the Windows 10 Anniversary Update has been deleting partitions containing Linux operating systems.

Webmaster's Commentary: 

"You VILL use our operating system, dummkopf. UND YOU WILL LIKE IT!!!!!!!"

Aug 07 12:23

Cotton: Clinton discussed executed Iranian scientist on email

Hillary Clinton recklessly discussed, in emails hosted on her private server, an Iranian nuclear scientist who was executed by Iran for treason, Sen. Tom Cotton, R-Ark., said Sunday.

...

The scientist shows up in Clinton's emails back in 2010, just nine days before he returned to Iran.

Webmaster's Commentary: 

And now he has been executed! Did Iran learn he was a spy for the US from Hillary's weak private server?

Aug 07 12:19

Jeanine SLAMS James Comey

Aug 07 10:42

The First "Bitcoin Bail-In": All Bitfinex Users To Lose 36% In "Shared Loss" After Historic Hack

Adding insult to injury for those who "held" their BTC at the hacked exchange, Bitfinex announced it would pull a page right out of Europe's bank resolution mechanism, saying that all of its users will lose 36% of their deposits after it concluded its review the massive hack, in what is set to be the first ever "bitcoin bail-in."

Aug 07 09:04

Trust Hillary With Nuclear Launch Codes? She Can’t Even Secure Her Emails…

No one seems to be stating the obvious: The email hacking has taken place on Obama’s watch. In addition, why is it that whoever did the hacking were able to find the so-called missing emails but the FBI and other agencies could not?

The Democrats are in panic mode. They’re blaming Trump and the Russians which is just another way of blaming Obama. Trump didn’t hack the servers. His masterful press conference the other day made fools of the media, Obama, and Hillary. Why would anyone want this woman as President when she left the door open to a seemingly secure server? Maybe she’ll do the same thing with the nuclear launch codes.

Aug 07 07:54

US think-tank suggests cyber-attacks on Moscow Metro, St. Pete power grid, RT offices

Page 12, paragraph 7 and I quote: “Poland should announce that it reserves the right to deploy offensive cyber operations (and not necessarily in response just to cyber attacks). The authorities could also suggest potential targets, which could include the Moscow metro, the St. Petersburg power network, and Russian state-run media outlets such as RT.”

Aug 06 09:38

Commentary: The world's best cyber army doesn’t belong to Russia

National attention is focused on Russian eavesdroppers’ possible targeting of U.S. presidential candidates and the Democratic Congressional Campaign Committee. Yet, leaked top-secret National Security Agency documents show that the Obama administration has long been involved in major bugging operations against the election campaigns -- and the presidents -- of even its closest allies.

The United States is, by far, the world’s most aggressive nation when it comes to cyberspying and cyberwarfare. The National Security Agency has been eavesdropping on foreign cities, politicians, elections and entire countries since it first turned on its receivers in 1952. Just as other countries, including Russia, attempt to do to the United States. What is new is a country leaking the intercepts back to the public of the target nation through a middleperson.

Aug 06 00:58

Fighting Clickbait: Facebook Changes Its News Feed Algorithm Again

Facebook introduced improvements to its news feed algorithm to minimize the number of clickbait headlines published on the network.

In an article from its official newsroom blog page, the social network stated it wants more authentic communication on its website and that it continues to work hard to give more place for stories that are considered genuine by its users.

To deal with the matter, FB is changing the News Feed by updating how the system recognizes phrases which are frequently used in clickbait headlines. Thousands upon thousands of headlines are labeled as clickbait if the following key points are found:

  • If the headline consists of facts needed to understand what the content material of the article is.
Aug 05 16:48

Getting Ready For ‘Black Hat’ Global Hacker Conference: Leave All Devices At Home

Some of the highest profile hackers and cyber-security specialists have converged on Las Vegas for the Black Hat hacker conference.

Aug 05 14:30

CGI's StormyOne How To Defeat Vote Fraud, Or, Silent Death of the TruVote System

"TruVote allows voters to touch their candidates' names on a computer screen and receive receipts of their vote at the end of the process. They can then go to a Web site, punch in their voter validation number and make sure their vote was recorded." (The Tennessean.com, 14 March 2004).

Aug 05 12:33

This Company Has Built a Profile on Every American Adult

Forget telephoto lenses and fake mustaches: The most important tools for America’s 35,000 private investigators are database subscription services. For more than a decade, professional snoops have been able to search troves of public and nonpublic records—known addresses, DMV records, photographs of a person’s car—and condense them into comprehensive reports costing as little as $10. Now they can combine that information with the kinds of things marketers know about you, such as which politicians you donate to, what you spend on groceries, and whether it’s weird that you ate in last night, to create a portrait of your life and predict your behavior.

Aug 05 09:54

FLASHBACK - First "Shocking" Deposition In Clinton Email Case Reveals She Did Not Use A Password

He was asked why he had proposed this solution, and he said it was “For ease of access” and, “as far as I knew, there was no requirement for her to be connected to our system” (even though he had earlier said that her having an email address assigned to her in the State Department’s system, the OpenNet system, was “required”). He said that the “ease of access” would be because of there being “fewer passwords.”

He was asked whether doing things this way was necessary in order for her to be able to access the Internet from the State Department, and he said, ”the Internet is available” to employees at the office, just as anywhere.

He was asked about the inconvenience of the State Department’s passwords system, and he said that he eliminated her need for any passwords:

A: She wouldn’t have had a password.
Q: So the computer would have just been open and be able to use without going through any security features?
A: Correct.

Aug 05 09:53

Clinton Campaigners Use Pokemon Go to Literally “Lure” Voters

By Tony Cartalucci

Some could have been excused for dismissing initial qualms surrounding the GPS-based augmented reality game, Pokemon Go. The game has swept the world, but its development is surrounded by disturbing connections between its developer Niantic, its former parent company Google, and the US State Department.

But while many before could only speculate as to the reason the US State Department may have been interested in developing such a game, it appears now there is at least a partial answer...

Aug 05 09:10

Hackers turn to dodgy ads as malvertising risk increases by 400 per cent

THE USE OF DODGY AD CAMPAIGNS, otherwise known as malvertising, increased by a whopping 400 per cent during the first six months of 2016, according to security company RiskIQ.

Malvertising relates to malware-riddled adverts served usually on dodgy websites that can infect a user's machine if they visit the site. People are often tricked into visiting such sites via phishing emails or spam on social media sites.

RiskIQ logged 1.7 million malvertising-related incidents between January and June, compared with just 368,000 in the same period in 2015. The 2014 figure was 250,000, underlining the dramatic growth over the past two years.

Aug 05 09:04

Washington Post to use robo-reporters to write Olympics news

THE WASHINGTON POST, Amazon founder Jeff Bezos' own media plaything, is planning to use artificial intelligence (AI) software to generate news reports and populate Twitter feeds during the Olympics.

The software will produce real-time news reports that will automatically end up on the newspaper's website and Twitter feeds.

Aug 05 08:50

Ransomware has left almost 10 per cent of UK firms 'unable to operate'

MORE THAN HALF of UK businesses have been hit by ransomware, according to security outfit Malwarebytes, and almost 10 per cent were left "entirely unable to operate" as a result.

Malwarebytes surveyed 540 CIOs, CISOs and IT chiefs at organisations with an average headcount of 5,400 in the UK, US, Germany and Canada. Around 40 per cent have been affected by ransomware and a third lost revenue as a result.

The majority of ransomware attacks come via a single end point, and 46 per cent begin, unsurprisingly, with a dodgy email.

What’s more, the crooks are clearly reaping the rewards of such attacks as 40 per cent of all firms pay the ransom to get the data unlocked.

Aug 05 08:38

Amazon Echo is the ultimate spy device that records everything you say

"In many ways the Echo is a law enforcement dream," writes Matt Novak for Paleo Future, a division of Gizmodo. Novak filed a Freedom of Information Act (FOIA) request with the FBI back in March to find out if the federal agency had ever wiretapped an Amazon Echo, to which the agency responded that it could "neither confirm nor deny" – essentially an admission of guilt.

"Years ago agencies like the FBI would need to wiretap a phone conversation or place bugs inside homes, practices that can be cost prohibitive and labor intensive. Today, you just need some software to tap into a device's microphone. And if that device is 'always listening' for a command, all the better for someone who wants to hear what's going on."

Aug 05 08:23

WATCH: US Marines Are Getting Land Drones With Heavy Machine Guns and Tiny UAVs

The US Marine Corps has spent years developing multiple unmanned combat robots, and last month it took them for a test drive.

Aug 05 08:12

FBI SEEKS 'SECRET' CONTROL OF SMARTPHONES

The FBI wants the ability to surreptitiously turn your smartphone into a video- and audio-recording device without your knowledge, and it is calling on the high-tech industry to supply it with an app to perform those surveillance functions.

Webmaster's Commentary: 

My understanding is that they already have this capability.

Aug 05 07:35

Bahrain's internet shutdown marks a 'new form of information control'

On July 23rd, people in the village of Duraz, Bahrain began having serious internet problems — mobile networks ground to a halt and landline connections were unusable. The outages continued for nearly three weeks, occurring from 7PM to 1AM every night, and they began just three days after residents took to the streets of Duraz in peaceful protest against the government. Bahrain's three telecoms offered no explanation for the localized blackout, saying only that they were working to fix it, but a new report suggests that it was ordered by the government, in what researchers call "a new form of information control."

Aug 05 07:31

Google slammed for removing Palestine from its maps

The Palestinian Journalists’ Forum has denounced Google for deleting the name of Palestine from its maps and replacing it with Israel.

In a statement released yesterday, the forum said Google’s decision to remove Palestine from its maps on 25 July “is part of the Israeli scheme to establish its name as a legitimate state for generations to come and abolish Palestine once and for all.”

“The move is also designed to falsify history, geography as well as the Palestinian people’s right to their homeland, and a failed attempt to tamper with the memory of Palestinians and Arabs as well as the world.”

The forum said the move was “contrary to all international norms and conventions”, stressing that Google should back track on its actions.

Aug 05 07:26

Hackers unleash smart Twitter phishing tool that snags two in three users

Just. Don't. Click. On. Dodgy. ShortURLs. People.

Aug 04 18:36

Very peed off: Ohio urologists stay zipped after embarrassing leak

150GB of patient, internal files stolen? You gotta be kidney me – no, urine for a shock

Aug 04 15:05

Police: Parking in Newport Beach, CA Makes You Part of a Criminal Investigation

By Mike Maharrey

If you park your car in Newport Beach, police will likely scan your license plate with an automated license plate reader (ALPR). According to police, this automatically makes you the subject of a criminal investigation.

In an effort to find out what police do with all of the data they collect using automatic license plate readers (ALPRs), local activist Mike Glenn filed an open records request. The police refused to release the information...

Aug 04 14:53

Rikers Island Inmate Amazes Facebook With Livestream From Cell, Shows Off Improvised Knife

A Rikers Island inmate livestreamed his life behind bars at one of America’s most notorious prisons. He showed off his cell, food and even a self-made weapon to Facebook, in a video that failed to attract management’s attention.

Aug 04 13:16

POLICE GET FACEBOOK TO KILL LIVESTREAM OF STANDOFF WHICH ENDED WITH SUSPECT BEING SHOT TO DEATH

A 23-year-old woman, and mother of a 5-year-old child, is dead. She was killed by police officers who came to serve a warrant for failure to appear charges stemming from a March 11th traffic stop. That this ever escalated to the point where bullets started flying is incomprehensible. Then again, much of what the woman, Korryn Gaines, did was incomprehensible. Gaines apparently considered herself a "sovereign citizen," which meant she chose not to recognize whatever laws she felt weren't worth following -- like registering her vehicle, insuring it, and equipping it with valid plates. Instead, she chose to make plates of her own out of cardboard that made some sort of statement about her sovereign citizen status. The traffic stop on March 11th escalated into an altercation with officers, resulting in more charges being added to the traffic violations.

Aug 04 09:51

Is Creating “Superhumans” the Next Arms Race?

By Nicholas West

The very nature of any arms race is a study in one-upmanship that is presumed to be necessitated by that which came before. A perfect current example is the global drone arms race. But what happens when a country starts tinkering with genetics?...

Aug 04 09:51

Hillary Clinton Exposed: Unfit for security clearance

Aug 04 08:04

They're back! Car hackers take control of Jeep’s steering and braking

Charlie Miller and Chris Valasek show how an attack can take control of steering, press the gas pedal and even kill the brakes while the vehicle is driving at high speeds

Webmaster's Commentary: 

Is that how Michael Hastings was killed? (And boy am I glad I drive a 17 year old car!!!!)

Aug 04 07:46

Does dropping malicious USB sticks really work? Yes, worryingly well…

Good samaritans and skinflints beware!

Plugging in that USB stick you found lying around on the street outside your office could lead to a security breach.

This is no secret, of course. We have all (hopefully) been aware of the dangers of inserting an unknown USB device into our computers for some time. Heck, the technique has even made it into the Mr Robot TV series.

But what may not be widely known is just how successful the tactic can be for allowing hackers to compromise your computer systems.

Aug 04 07:34

Intel's smartwatches are so hot right now – too hot: Basis Peak recalled for skin burns, blistering

Intel has recalled every single one of its Basis Peak smartwatches – as well as urging people to stop using them – because they can become dangerously hot.

Chipzilla has told everyone who bought a Peak to send back the watch along with any and all accessories for a full refund. Keeping it is not an option: by the end of the year, Intel will switch off its Peak cloud services, which the devices synchronize to, rendering the wrist-puters useless.

Aug 04 07:33

Forget card skimmers, chip-card shimmers will be your next nightmare

America's belated move to EMV (Europay, MasterCard and Visa) chip-equipped cards won't be the panacea some had hoped. As it turns out, the cards are just as easy to clone as their magnetic stripe predecessors.

At the Black Hat 2016 security conference in Las Vegas this week, engineers from Rapid7 demonstrated how a few small pieces of electronics could be used to stage a man-in-the-middle attack against an ATM.

The shimmer device is so named because it is inserted in the card slot like a shim, and it then takes a snapshot of the transaction data as a request for cash is processed.

Aug 04 07:29

Classic Shell, Audacity downloads infected with retro MBR nuke nasty

Classic Shell and Audacity downloads were booby-trapped with an old-school software nasty this week that knackered victims' Windows PCs.

Hackers were able to inject some retro-malware into the popular applications' installers hosted on fosshub.com, an official home for Classic Shell and Audacity releases among other software projects.

When victims fetched the tainted downloads and ran them, rather than install the expected app, the computer's Master Boot Record (MBR) was replaced with code that, during the next reboot or power on, displayed a cheeky message and prevented the machine from starting up properly. The drive's partition table was also likely damaged.

Aug 04 06:45

EX CIA Agent Pissed at James Comey! Undercover CIA Will Hurd Confronts FBI Director

Aug 04 06:31

UPDATE - VIRTUAL 9-11: Will the US & Israel Hack US Computers and Falsely Blame It On Iran or Syria or Russia or China (or at least to stop us saying bad things about Hillary)?

Such a cyber false-flag also gives the US Government the excuse to take total control of the internet so that those pesky truth-seeking bloggers don't give the slaves uppity ideas that this is just another war-starting hoax like the attack on the USS Liberty or 9-11 or the Boston bombing. At the very least, the government could return the dissemination of information back to the sole monopoly of the corporate media, so the independent media stops reminding the voters of Hillary Clinton's crimes and corruptions!

Optional Banner: 
WRH Exclusive
Aug 03 20:51

Comcast wants to sell your Web history to advertisers

Did you know that in some parts of the country, Internet providers such as AT&T offer a special deal on broadband prices? The plans lower your monthly payments, but there's a catch: To qualify for them, you have to agree to let the carrier track your Web history, search activity and other valuable behavioral data that can be used for advertising purposes.

Now, Comcast is telling regulators it wants the flexibility to offer these types of plans, too. In a meeting Monday with the Federal Communications Commission, officials from the cable company argued that it and other Internet providers shouldn't be prohibited from trading discounts for data.

Aug 03 20:43

New attack steals SSNs, e-mail addresses, and more from HTTPS pages

The HTTPS cryptographic scheme protecting millions of websites is vulnerable to a newly revived attack that exposes encrypted e-mail addresses, social security numbers, and other sensitive data even when attackers don't have the ability to monitor a targeted end user's Internet connection.

The exploit is notable because it doesn't require a man-in-the-middle position. Instead, an end user need only encounter an innocuous-looking JavaScript file hidden in an Web advertisement or hosted directly on a webpage.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA