COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Aug 18 09:26

The Shadow Brokers auction demonstrates why it is a bad idea to hoard security holes

The Shadow Group getting its hands on what increasingly look like actual tools used by one of the most advanced government sponsored threat actors shows that no one is immune to leaks. Hoarding such tools, or keeping zero day exploits secret, will eventually become a major problem to individuals and organisations. It is only a matter of time before the secrets get leaked. The information is going to eventually get into the wild, so it is safer to inform the affected companies of the zero day exploits.

Microsoft just unintentionally demonstrated why backdoors are a bad idea when it accidentally released configuration files that made Microsoft technologies vulnerable to some kinds of attacks.

Aug 18 09:02

NSA LABELS LINUX JOURNAL READERS AND TOR AND TAILS USERS AS EXTREMISTS

Linux fans are typically outspoken about the OS, and are quick to argue the benefits with OSX and Windows users. They have developed a reputation for being champions of open source and anonymity when computing. Tails and Tor users are not only fans of the OS, but are also focused on security. The NSA recently became interested in these users’ activity, reportedly labeling Linux Journal Readers and Tor and Tails users as extremists, according to Techspot.

Aug 18 08:03

10 Orwellian Moments Found In The Newly Leaked Private NSA Newsletters

After reading hundreds of them, here is my list of the most Orwellian SIDtoday NSA newsletters:

Aug 18 07:42

This bag of tricks may help stop a Locky ransomware infection

A malware researcher has found a few tricks to stop one of the latest types of ransomware, called Locky, from infecting a computer without using any security programs.

Webmaster's Commentary: 

Normally I am against the death penalty. But I cannot help but think that if we were to catch just one of these cybercriminals and crucify them live on an internet video feed (if they are healthy, it will take them a week to die) that a large part of this problem might just go away!

Aug 18 07:33

Windows 10 needs proper privacy portal says EFF

The Electronic Frontier Foundation (EFF) has called on Microsoft to offer a “single unified screen” on which Windows 10 users can control how Windows 10 deals with their personal information and monitors their use of the OS.

The organisation has listed the long list of nasty nagware tactics Microsoft used to get people running Windows 10, labelling some “questionable tactics to cause users to download a piece of software that many didn’t want.”

It's not keen on the nagware bundled alongside patches, suggesting that tactic reduced trust in patches and therefore potentially exposed users who don't act promptly when important fixes arrive.

Aug 18 07:29

FireEye warns 'massive' ransomware campaign hits US, Japan hospitals

The dangerous and as-yet-undefeated Locky ransomware is being hurled at hospitals across the United States and Japan in a 'massive' number of attacks, according to FireEye researcher Ronghwa Chong.

Locky is a popular ransomware variant that will encrypt files in a way that forces users to pay ransoms or cut their losses and purge data.

This month the already increasingly hammered health sector is copping a massive spray of phishing attacks bearing the Locky ransomware

Aug 17 08:55

SNOWDEN: EXPOSURE OF ALLEGED NSA TOOLS MAY BE WARNING TO US

In a series of messages posted to Twitter , Snowden suggested the leak was the fruit of a Russian attack on an NSA-controlled server and could be aimed at heading off U.S. retaliation over allegations that the Kremlin is interfering in the U.S. electoral process.

Aug 17 08:24

Shark bosses sink teeth into booming ransomware market

Cybercrooks are harnessing the “ransomware-as-a-Service” (RaaS) business model to mount a new scam.

Coders distributing a ransomware builder to aspiring attackers that can be used on condition that a 20 per cent cut of any ransom payments it generates is returned to the original coders.

Aug 17 07:36

Clickbait 'hitman' at Sean Adl-Tabatabai's Yournewswire writing outrageous attacks on David Icke must have a twin then? Right?

Sean Adl-Tabatabai is a former webmaster at Davidicke.com who left years ago to start an alleged ‘alternative’ website in California called Yournewswire.com which has become notorious among serious researchers for its clickbait headlines with no sources to support the headline. Every click = money.

He appears to hate me with a vengeance and has taken every opportunity to try to damage me through his ridiculous website and it must have been incredibly frustrating that he has not been able to do so – not least because people can see his motivations from 100 miles away.

Webmaster's Commentary: 

That there are disruptors infiltrating the independent media has been obvious for a long time. Sorcha Faal is one of the better known ones. Sean is another.

Aug 17 07:05

Judicial Watch: New Documents Show Top Clinton Aide Alerted On Email Inquiry

Judicial Watch today released 10 pages of new State Department records that include an email sent by State Department spokesman Brock Johnson alerting Cheryl Mills, Hillary Clinton’s then Chief of Staff, that a “significant” Freedom of Information Act (FOIA) request had been made for records showing the number of email accounts used by then-Secretary of State Hillary Clinton.

Aug 17 07:03

Clinton’s Top Aide Cheryl Mills Answers More Questions Under Oath; Reveal She and Pagliano Were Concerned that Guccifer Hack of Blumenthal’s Emails Could Compromise Clinton’s Unsecured Email System

Judicial Watch today released the responses by former Clinton Chief of Staff Cheryl Mills to Judicial Watch interrogatories, revealing that shortly after “Guccifer” hacked the email account of long-time Clinton advisor Sidney Blumenthal, Mills and former State Department IT official Bryan Pagliano discussed the danger of Guccifer’s actions compromising Clinton’s unsecure non-state.gov email system:

Aug 16 18:14

Microsoft to end decades-old pick-a-patch practice in Windows 7

As of October, Microsoft's switching older editions to the update model pioneered by Windows 10, and slammed by some customers

Aug 16 15:30

FBI Seeks Developer to Build an App to Help the Government Spy on Us

Are you an app developer? Are you covert as hell? Do you think we should all throw our privacy cautions to the wind? Boy, does the FBI have the job for you: design an app to help the government spy.

The Department of Justice posted a job opportunity last month to create something called a Smartphone-Based Audio Recorder. The technical requirements draft describes an app that would allow an FBI agent to "surreptitiously capture audio and video" on their smartphone. It describes two scenarios this piece of spy tech would be needed in — one is to collect live audio covertly (read: spy), and the other is to use the app as a recorder alternative to overtly record audio and video during an interview (read: not spy).

Aug 16 13:19

Government surveillance of Internet users increasing each year

A new report from search giant Google has revealed how many times governments and courts have asked it to hand over information about users.

The annual transparency report shows that in 2014, 35,365 requests were made, and 40,677 were made in 2015.

Aug 16 12:36

London ‘Thought Police’ Special Unit To Track Down Online Trolls

A generously funded “online hate crime hub” has been set up to tackle online vitriol by identifying suspects and encouraging citizens to report them to police, but critics fear the newly-established unit might endanger freedom of speech.

Aug 16 12:02

America’s Biggest Ally Now Has Special “Thought Police” Unit to Track Down Online Trolls

By Claire Bernish

Thought police now patrol social media platforms and online forums to quash putatively ‘abusive’ vitriol with the help of feckless civilians urged to end freedom of speech under the guise of rooting out hate.

Expected to run for two years at a cost of $2.2 million (£1.7 million) — of which the Home Office will contribute $581,000 (£450,000) — the London Mayor’s Office for Policing And Crime (MOPAC) believes severely curtailing free speech is necessary due to “the increasing role that online hate played in targeting individuals and communities.”...

Aug 16 11:19

18 U.S. Code § 793 - Gathering, transmitting or losing defense information

Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense, (1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or (2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer—
Shall be fined under this title or imprisoned not more than ten years, or both.

Webmaster's Commentary: 

This is where FBI Director James Comey lied to the American people when he said he would not recommend charges because he did not find evidence that Hillary intended to do wrong. Comey dismissed Hillary's actions as reckless, careless, and negligent, but as 18 U.S. Code § 793 states, intent to do harm is not required, and exposure of national secrets through negligence is a crime, punishable by ten years in prison.

Aug 16 08:38

George Soros was Hacked! — Thousands of Files Expose Election Manipulation & More

In June, Open Society Foundations, the group owned and operated by the unscrupulous George Soros, reported a data breach by hackers to the Federal Bureau of Investigation. For over a month, the foundation nervously waited to see what had been taken. And, on Saturday, the site DC Leaks released the hacked information containing more than 2,500 files from the raft of organizations run by this shady billionaire.

Webmaster's Commentary: 

And scarcely a word in the corporate media!

Aug 16 08:33

Australian university students spend $500 to build a census website to rival their governments existing $10 million site

Two first year university students have designed an alternative to the ABS Census website in just 54 hours.

Austin Wilshire, 18, and Bernd Harzer, 24, created the site during the Queensland University of Technology's Code Network Winter hack-a-thon at the weekend.

Aug 16 08:21

Cell-Jamming Technology Is Being Turned against Journalists

Technology developed to jam cellphones during the Iraq War may be getting deployed against journalists reporting on protests against the political establishment in the United States.

While police and government surveillance of protests, including monitoring of cellphone use, is well-documented, efforts to block signals at protests remains an oft-repeated, but never proven, rumor.

It may be impossible to definitively prove that authorities are using cellphone “jamming” technology, but journalists working with both mainstream and independent media reported unusual difficulties accessing the internet during recent protests at the gates of the Democratic National Convention, consistent with the effects this very real technology could have.

Aug 16 08:05

GOP lays out case for charging Clinton with perjury

A pair of leading House Republicans on Monday laid out detailed instructions for the Justice Department to file perjury charges against Democratic presidential nominee Hillary Clinton.

More than a month after first requesting the department open a criminal probe into Clinton for alleged misstatements she made under oath, the GOP heads of the House Judiciary and Oversight committees told a federal prosecutor specifically where they believed Clinton had lied to Congress about her email setup at the Department of State.

In at least four separate occasions during a marathon appearance before the House Select Committee on Benghazi, the lawmakers alleged, the former secretary's claims were at odds with what the FBI has now discovered to be the truth about her private server.

Aug 16 07:48

Cortana: The spy in Windows 10

Microsoft also claims that Windows 10 SP1 is safer than ever, which I find even less assuring than the promise not to exploit all that Cortana data. Think about this: You can use Cortana from the lock screen. That’s right; Cortana is active and listening to when your PC is locked. Well, it’s supposed to be locked, but if it’s able to listen, how locked down is it, really? Not very!

Microsoft calls this a feature that gives you the ability to ask your PC simple questions without logging in. But I call anything that lets me input data into a PC without being logged into it a bug. It’s a security hole begging to be exploited. Windows, which God knows has had more than enough security problems, now has a new attack surface.

Fortunately, you can fix this one easily. Just open Cortana’s Settings and turn off the “Use Cortana even when my device is locked.”

Aug 16 07:40

Aussie cops ran child porn site for months, revealed 30 US IPs

Turns out the FBI isn't the only agency to take over a child pornography website and bust some of its participants. Australian authorities have apparently employed similar tactics against Americans—revealing at least 30 targets.

Aug 16 07:34

Linux traffic hijack flaw also affects most Android phones, tablets

About 80 percent of all Android devices are affected, but "exploitability is hard."

Aug 16 07:31

Two university students take just 54 hours to build a Census website that WORKS - for $10 MILLION less than the ABS' disastrous site

Two first year university students have designed an alternative to the ABS Census website in just 54 hours.

Austin Wilshire, 18, and Bernd Harzer, 24, created the site during the Queensland University of Technology's Code Network Winter hack-a-thon at the weekend.

The pair took a little over two days to make the site, and it cost them less than $500 - far less than the $10 million the Australian government spent on their site.

The ABS' Census site crashed for over 24 hours on the night the servers were overloaded when millions of Australians logged on to fill out the survey - taken every five years.

Their project - titled 'Make Census Great Again' - used 'serverless architecture' by hosting their site on Amazon servers - meaning it could not get overloaded.

Aug 16 07:18

George Soros hacked, over 2,500 internal docs released online

Last Thursday, as Bloomberg was gingerly setting the stage, and the preemptive damage control for what was about to be a historic leak, it did everything in its power to deflect attention from the key topic, namely that prominent liberal billionaire and Hillary suppo

Aug 15 18:25

RT Besieged by DDoS Attacks Days After US Think Tank Called for Cyber Terrorism

Hackers bombarded RT with a well-planned series of Distributed Denial of Service (DDoS) attacks one week after the Atlantic Council wrote an article suggesting preemptive cyber terrorism against RT and the Moscow Metro.

Webmaster's Commentary: 

Welcome to my world.

Aug 15 16:37

Google AdSense abused to distribute Android spyware

A banking trojan targeting Android users is spreading through malicious ads as part of an ongoing campaign.

The scenario by which the malware spreads is all too familiar to long-suffering Windows fans, but may well come as an unpleasant shock to smartphone users.

Worse yet, Android users can get infected by the Svpeng Trojan simply by visiting mainstream websites, as researchers from Kaspersky Lab explain:

By simply viewing their favourite news sites over their morning coffee users can end up downloading last-browser-update.apk, a banking Trojan detected by Kaspersky Lab solutions as Trojan-Banker.AndroidOS.Svpeng.q. There you are, minding your own business, reading the news and BOOM! – no additional clicks or following links required. And be careful – it’s still out there!

Aug 15 15:56

Government surveillance of Internet users increasing each year

A new report from search giant Google has revealed how many times governments and courts have asked it to hand over information about users.

The annual transparency report shows that in 2014, 35,365 requests were made, and 40,677 were made in 2015.

Aug 15 15:41

George Soros Hacked, MSM Blames Russia; Many “Dissident” Orgs Revealed In Leaks

By Brandon Turbeville

George Soros has been hacked and, according to the Western mainstream press, the Russians did it! In fact, that is the entirety of the story for most of the mainstream outlets – that the Russians hacked such an important American figure and therefore made their power play over American elections yet again. This Russian hack comes after Russians hacked the DNC, Hillary Clinton, hired Donald Trump to destroy the country and invented a time machine enabling them to go back in time and prevent the election of Barack Obama. It doesn’t matter that there is as much evidence for the latter as there is for the former, the mainstream outlets are wild with speculation and neo-McCarthyism...

n/a
Aug 15 13:59

Mysterious Group Hacks The NSA

The latest hack revealed over the weekend has nothing to do with the Democratic Party or George Soros, and instead a mysterious hacker group by the name “The Shadow Brokers” claims to have hacked the Equation Group - a government cyberattack hacking group associated with the NSA, and released a bunch of the organization's hacking tools. The hackers are also asking for 1 million bitcoin (around $568 million) in an auction to release more files.

“Attention government sponsors of cyber warfare and those who profit from it!!!!” the hackers wrote in a manifesto posted on Pastebin, on GitHub, and on a dedicated Tumblr.

Aug 15 13:53

Judge Jeanine: Now we know why Hillary used private email

Aug 15 13:43

Government surveillance of Internet users increasing each year

A new report from search giant Google has revealed how many times governments and courts have asked it to hand over information about users.

The annual transparency report shows that in 2014, 35,365 requests were made, and 40,677 were made in 2015.

Aug 15 09:52

Hillary’s Unsecured Email EXPOSES U.S. Spy… Leading to His EXECUTION

As reported by the Washington Examiner, “I’m not going to comment on what he may or may not have done for the United States government, but in the emails that were on Hillary Clinton’s private server, there were conversations among her senior advisors about this gentleman. The senator said this lapse proves she is not capable of keeping the country safe.

“That goes to show just how reckless and careless her decision was to put that kind of highly classified information on a private server. And I think her judgment is not suited to keep this country safe,” he said.

Here’s what they said to expose the brave spy Amiri, leading to his death:

The scientist’s name shows up in Clinton’s emails back in 2010, just nine days before he returned to Iran.

Aug 15 09:05

PokemonGo Ransomware installs Backdoor Account and Spreads to other Drives

With the popularity of PokemonGo, it was inevitable that a malware developer would create a ransomware that impersonates it. This is the case with a new Hidden-Tear ransomware discovered by Michael Gillespie that impersonates a PokemonGo application for Windows and targets Arabic victims.

Aug 15 09:03

Windows 10 may freeze after installing the Anniversary Update

Microsoft has received a small number of reports of Windows 10 freezing after installing the Anniversary Update on systems with the operating system stored on a solid-state drive (SSD) and apps and data stored on a separate drive. This issue does not occur when starting Windows 10 in Safe Mode.

Aug 15 07:47

TWITTER BOWS TO ISRAELI GOVERNMENT PRESSURE TO CENSOR TWEETS

Though Israel’s reputation as a true democracy has certainly come under fire, its advocates proudly point to its freewheeling press as an exemplar of the values of liberal Zionism. But even this last holdout of Israeli democracy israpidly receding, particularly in traditional domestic print and broadcast media and, more recently, among foreign-headquartered social media platforms.

Aug 14 16:18

Massive hack of Soros files released

The files of George Soros’s Open Society Institute have been hacked over a period of years, with 2,576 just published on the mysterious DCLeaks site.

Aug 14 16:13

Guy tricks Windows tech support scammers into installing ransomware

Kwiatkowski got an idea… an awful idea. He got a wonderful, awful idea.

He’d already noticed that the remote control software the scammer was using allowed him to send and receive files. So he turned to his inbox, where he had several samples of Locky ransomware variants. He grabbed one, renamed it to look like a digital photo, and fired it over.

Kwiatkowski feigned vision trouble and suggested that Dileep just have a look at a picture of the credit card instead. It certainly sounds like he did, though, strangely, the picture must’ve been corrupted… because nothing came up on his screen when he double-clicked it.

That’ll soon change, though. A ransom notice ought to be appearing any time now.

Aug 14 14:07

Twitter Suspends Account Of Guccifer 2.0, Hacker Behind DNC & DCCC Leaks

The Twitter account of Guccifer 2.0, the hacker who claimed responsibility for leaking a trove of Democratic National Committee documents, was suspended less than 24 hours after dumping fresh sensitive DNC data.

Aug 14 07:43

CLINTON COLLAPSE: INSIDERS SAY MAY DROP "SOON"

Insiders say the Hillary camp is panicked--possibly on the verge of collapse. Not only is Trump's polling far better than the media narrative shows but the even more predictive Social Media scene has collapsed to "landslide" proportions in favor of Donald Trump. While Brietbart and The Gateway Pundit had covered the publicly available data, we used some of our benefactors extensive resources to try to get a look inside the Social Media response center of the Clinton Campaign.

We'll tell you: the shop they run is tight. Fear--terror, really--of Mrs. Clinton goes a long way to keeping people in line--but now that the cracks have started we were able to compromise a key person inside the sequestered Media Room run by David Brock's "Internet Warrior Virgins" (his term, not ours).

This is what we learned.

Aug 13 16:29

Just How Bad Is (Social) Media Bias In This Election?

“They take away the hashtag that has negative tweets for Clinton and replace it with something that doesn’t so the average person doesn’t see what was really trending... This happens every day.”

Aug 13 12:09

Drug Sales On The Dark Web Have Tripled Since The Feds Shut Down Silk Road

By John Vibes

This week, it was reported that drug sales on the dark web have tripled since the infamous Silk Road was shut down in 2013.

Within hours of the Silk Road takedown, there were several competitors that were already on the dark web who were ready to move in on the newly available business.

Stijn Hoorens of the RAND corporation recently published a study showing how this growth has occurred despite government intervention...

Aug 13 10:00

MICROSOFT INADVERTENTLY DEMONSTRATES THE INTRINSIC SECURITY PROBLEM OF INCLUDING A UNIVERSAL BACKDOOR IN ITS SOFTWARE BY ACCIDENTALLY LEAKING ITS "GOLDEN KEY"

Microsoft has inadvertently demonstrated the intrinsic security problem of including a universal backdoor in its software after it accidentally leaked its so-called "golden key"—which allows users to unlock any device that's supposedly protected by Secure Boot, such as phones and tablets.

The key basically allows anyone to bypass the provisions Microsoft has put in place ostensibly to prevent malicious versions of Windows from being installed, on any device running Windows 8.1 and upwards with Secure Boot enabled.

And while this means that enterprising users will be able to install any operating system—Linux, for instance—on their Windows tablet, it also allows bad actors with physical access to a machine to install bootkits and rootkits at deep levels. Worse, according to the security researchers who found the keys, this is a decision Microsoft may be unable to reverse.

Webmaster's Commentary: 

Oops there!!!

Aug 13 09:58

Hacker Publishes House Democrats' Personal Information

A hacker has published the personal contact information of nearly every Democratic member of the US House of Representatives on his website.

The hacker known as “Guccifer 2.0” uploaded an Excel file on Friday that contains the cell phone numbers and private e-mail addresses of the Democrats.

Aug 13 09:57

The bandwidth bottleneck that is throttling the Internet

On 19 June, several hundred thousand US fans of the television drama Game of Thrones went online to watch an eagerly awaited episode — and triggered a partial failure in the channel's streaming service. Some 15,000 customers were left to rage at blank screens for more than an hour.

The channel, HBO, apologized and promised to avoid a repeat. But the incident was just one particularly public example of an increasingly urgent problem: with global Internet traffic growing by an estimated 22% per year, the demand for bandwidth is fast outstripping providers' best efforts to supply it.

Aug 13 09:54

Newspapers rethink paywalls as digital efforts sputter

Paywalls were supposed to help rescue newspapers from the crisis of sinking print circulation as readers shifted to getting their news online.

But with a few exceptions, they have failed to deliver much relief, prompting some news organizations to rethink their digital strategies.

Newspapers in the English-speaking world ended paywalls some 69 times through May 2015, including 41 temporary and 28 permanent drops, according to a study by University of Southern California researchers.

Paywalls "generate only a small fraction of industry revenue," with estimates ranging from one percent in the United States to 10 percent internationally, the study in July's International Journal of Communication said.

Aug 13 08:34

Amazon Social Justice Warrior Implicated In ‘Doxing’ Conspiracy

An online cabal of Social Justice Warriors (SJWs), including an “internet abuse specialist” who works for Amazon, have been implicated in a conspiracy to reveal a Twitter user’s personal information before unleashing an online “witch hunt” against them.

Aug 12 20:06

Terrorist-Fighting License Plate Readers Just Mobile Revenue Generators Cruising Poor Neighborhoods

We know what automatic license plate readers are good for: collecting massive amounts (billions of records) of plate/location data housed by private companies and accessed by law enforcement for indefinite periods of time. What we don't know is how effective ALPRs are at fighting/investigating crime. George Joseph at Citylab has done some digging into the effectiveness of license plate readers and hasn't found much that justifies the expense, much less the constant compilation of plate info.

Aug 12 14:01

Amazon Social Justice Warrior Implicated In ‘Doxing’ Conspiracy

An online cabal of Social Justice Warriors (SJWs), including an “internet abuse specialist” who works for Amazon, have been implicated in a conspiracy to reveal a Twitter user’s personal information before unleashing an online “witch hunt” against them.

Aug 12 13:24

SURPRISE: Vancouver Police Are Using Secretive “Stingray” Cellphone Surveillance

By Derrick Broze

Vancouver police have become the first Canadian police force to admit to using a controversial cellphone monitoring tool sometimes known as a Stingray.

Amidst mounting pressure from civil liberties groups, the Vancouver Police have confirmed that they have used a cell site simulator, popularly known as a “stingray,” on at least one occasion. The admission is the first of its kind by a municipal police force in Canada...

Aug 12 12:00

Was This Wartime Technology Really Deployed Against Journalists Inside the DNC?

Technology developed to jam cellphones during the Iraq War may be getting deployed against journalists reporting on protests against the political establishment in the United States.

While police and government surveillance of protests, including monitoring of cellphone use, is well-documented, efforts to block signals at protests remains an oft-repeated, but never proven, rumor.

It may be impossible to definitively prove that authorities are using cellphone “jamming” technology, but journalists working with both mainstream and independent media reported unusual difficulties accessing the internet during recent protests at the gates of the Democratic National Convention, consistent with the effects this very real technology could have.

Webmaster's Commentary: 

So, THIS is what the DNC thinks about the First Amendment; something to be broken and battered with high tech, if the narrative they are spewing has absolutely no relationship with reality.

Aug 12 11:56

‘War On Drugs Futile In Face Of Dark Web Marketplace,’ Say Campaigners

Britain’s war on drugs is failing, campaigners say, with the online narcotics market soaring in value and police finding themselves seizing 1,000 cannabis plants every day.

Researchers for think tank Rand Europe found the UK has the largest online drugs trade of any European nation, and is second only to the US.

Aug 12 08:58

FLASHBACK - Hillary Clinton camp now paying online trolls to attack anyone who disparages her online 

Many moons ago, David Brock, now the head of a Hillary Clinton Super PAC, used every resource available to ruin the life of Anita Hill and anyone who supported her. He would lie, cheat, and blatantly misrepresent facts if it meant getting Clarence Thomas through the Supreme Court nomination process.

Brock openly admitted it.

Now, it appears Brock, who is no doubt great at what he does, is using his same old tools, but for a new cause in a new technological era.

As head of the Correct The Record Super PAC for Hillary Clinton, David Brock has launched something called Barrier Breakers — an online mob of paid trolls designed to attack any and every person who says one cross word about Hillary Clinton on Facebook, Twitter, Instagram, Reddit, or elsewhere.

Webmaster's Commentary: 

Aug 12 07:55

Linux TCP Flaw allows Hackers to Hijack Internet Traffic and Inject Malware Remotely

The Transmission Control Protocol (TCP) implementation in all Linux systems deployed since 2012 (version 3.6 and above of the Linux kernel) poses a serious threat to Internet users, whether or not they use Linux directly.

This issue is troubling because Linux is used widely across the Internet, from web servers to Android smartphones, tablets, and smart TVs.

Researchers have uncovered a serious Internet flaw, which if exploited, could allow attackers to terminate or inject malware into unencrypted communication between any two vulnerable machines on the Internet.

The vulnerability could also be used to forcefully terminate HTTPS encrypted connections and downgrade the privacy of secure connections, as well as also threatens anonymity of Tor users by routing them to certain malicious relays.

Aug 12 06:39

Thieves can wirelessly unlock up to 100 million Volkswagens, each at the press of a button

Security researchers will demonstrate how crooks can break into cars at will using wireless signals that can unlock millions of vulnerable vehicles.

The eggheads, led by University of Birmingham computer scientist Flavio Garcia alongside colleagues from German engineering firm Kasper & Oswald, have managed to clone a VW Group remote control key fob after eavesdropping on the gizmos' radio transmissions.

The hack can be used by thieves to wirelessly unlock as many as 100 million VW cars, each at the press of a button. Almost every vehicle the Volkswagen group has sold for the past 20 years – including cars badged under the Audi and Skoda brands – is potentially vulnerable, say the researchers. The problem stems from VW’s reliance on a “few, global master keys.”

Aug 11 20:34

US couple sues IP mapping firm over 'digital hell'

A US couple is suing an internet mapping firm for $75,000 (£58,000) after years of "digital hell".

MaxMind matches IP addresses, which are used to connect devices to the internet, to physical locations. It has said these are not meant to be precise.

James and Theresa Arnold say it registered their home as the position of more than 600 million addresses.

They say this has led many people to wrongly believe a host of crimes were committed at the property.

Aug 11 15:00

When A Door Closes, A Window Opens: Closing Silk Road Leads To Surge In Online Drug Sales

Closing the online black market known as the Silk Road was a success for the FBI, but a short-lived one. Three years later, it seems that it did little to deter internet-facilitated drug purchases as new reports found more markets have opened in its place.

Aug 11 13:49

Apple Patents Remote ‘Kill Switch’ For IPhone Cameras

What to do about all those darn videos showing cops murdering people?

They make it much harder for law enforcement to lie about their own actions, and just get everyone all fired up. Why not ask Apple (for starters) to build in a “feature” on a future generation of iPhones that will allow cameras to be disabled remotely?

Aug 11 13:37

What Do They Know That We Don’t? World’s Billionaires Are Stockpiling Cash: “Taking Money Off the Table”

Many of these people literally helped to build the system we all now rely upon, and now they are holding cash, gold and other assets our of fear that stocks will crash and digital instruments of wealth could be undermined:

The world’s billionaires are holding more than $1.7 trillion in cash — the highest amount since one firm began recording the measure in 2010. Because of what they perceive to be growing risks in the economy and world, the world’s 2,473 billionaires are keeping 22.2 percent of their total net worth in cash.

Read more at SHTF

Aug 11 13:17

Pokémon GO Is 'Racist'

A new article from the Urban Institute, a Washington-based community-engagement research organization, calls out Pokémon GO’s failure to break down barriers and reach marginalized groups.

Aug 11 12:34

Clinton Is Fighting the Troll Wars With a Million Dollar Super-PAC Campaign

As the Los Angeles Times reports, a super-PAC called Correct the Record has hired a legion of “former reporters, bloggers, public affairs specialists, [and] designers” to go after anyone online who is critical of Hillary Clinton. And it’s a well-funded effort. According to Correct the Record, it’s “engaged” with roughly 5,000 people online so far.

“It is meant to appear to be coming organically from people and their social media networks in a groundswell of activism, when in fact it is highly paid and highly tactical,” Brian Donahue, chief executive of the consulting firm Craft Media/Digital, told the Los Angeles Times.

Webmaster's Commentary: 

Well, I guess if McDonald's turns you down, a job is a job!

Aug 11 11:24

Newly released Clinton emails shed light on relationship between State Dept. and Clinton Foundation

Judicial Watch, a conservative watchdog group, released 296 pages of emails from the Democratic presidential nominee, including 44 that Judicial Watch says were not previously handed over to the State Department by Clinton. The emails, many of which are heavily redacted, raise questions about the Clinton Foundation's influence on the State Department and its relations during her tenure.

Aug 11 11:23

Dems worried another hacked email trove could surface before November

Democratic Party officials reportedly are bracing for the possibility that another batch of damaging or embarrassing internal emails — the kind that cost the party chairman her job on the eve of the Democratic National Convention — could become public before the November presidential election.

Webmaster's Commentary: 

Maybe the Democratic party will play it safe and drop barbells onto the throats of all their IT people now, to prevent any more leaks! :)

Aug 11 07:40

FBI probe of Clinton's emails prompted by espionage fears, secret letters say

Two secret letters the FBI sent to the State Department have revealed for the first time that the bureau's investigation into Hillary Clinton's private email server, and the classified emails sent through it, stemmed from a so-called "Section 811" referral from the Intelligence Community's Inspector General (ICIG). The ICIG determined that classified, national security information in Clinton's emails may have been "compromised" and shared with "a foreign power or an agent of a foreign power."

Section 811 of the Intelligence Authorization Act of 1995 "is the statutory authority that governs the coordination of counterespionage investigations between Executive Branch departments or agencies and the FBI." A Section 811 referral is a report to the FBI about any unauthorized information that may have been disclosed to a foreign power.

Webmaster's Commentary: 

It is that "something else" I am most concerned with. :)

Aug 11 07:33

Scammers Take Over Popular KickassTorrents ‘Mirror’

The popular KickassTorrents 'mirror' KAT.am is back online. After a brief suspension, the registry re-released the domain name for registration, allowing scammers to pick it up. While the site still appears to be a mirror, it asks people to sign up for an account with a credit card if they want to download something.

Aug 11 07:30

McAfee outs malware dev firm with scores of Download.com installs

McAfee says a software company with more than 50,000 downloads on sites such as Download.com is distributing web browser hijacking and fraud malware.

Researcher Santosh Revankar says Lavians Inc is pushing the Bing.vc browser redirect and home page hijacker which creates seeming problems that the company then attempts to fix at a cost.

The technique is straight out of the black hat fraud handbook and is used by low level and lowly web scum who take advantage of the proliferation of trash software to inject advertisements, and drop all manner of malware on user machines.

Lavians Inc has 19 uploads currently hosted on Download.com and 24 on Brothersoft.com, along with applications on its own site.

Aug 11 06:47

If Two Countries Waged Cyber War On Each Other, Here’s What To Expect

Imagine you woke up to discover a massive cyber attack on your country. All government data has been destroyed, taking out healthcare records, birth certificates, social care records and so much more.

Webmaster's Commentary: 

How about the tax records? Can we blow up those tax records? :)

Aug 10 09:47

SNOPES busted yet again for fabricating total lies in order to cover for Obama’s money laundering crimes

Snopes is widely regarded as one of the most reliable fact-checking and myth-busting resources on the internet. When it comes to urban legends, there’s no website that does a better job of providing evidence as to whether or not stories are fact or fiction than Snopes .

Unfortunately, the same cannot be said when it comes to any political issues. In that realm, Snopes is visibly liberal, constantly taking the side of leftist politicians and actively avoiding the whole truth when it comes to controversies surrounding the Democratic Party. So if you’re getting your “facts” from their website, be prepared to read lie after lie after lie.

Aug 10 09:42

Source of DNC email leak murdered, Wikileaks Julian Assange implies – Offers $20,000 reward

Subscribe now for more! http://bit.ly/1QHJwaK The source of the DNC e-mail leak was murdered, Wikileaks founder Julian Assange Implies. The Whistleblower organization has offered a $20,000 reward for information leading to the conviction of whoever killed Seth Rich, the DNC staffer who was mysteriously murdered shortly after the #DNCLeak. Media analyst Mark Dice has the story. © 2016 by Mark Dice

Aug 10 09:35

Biohybrid Robots Built From Living Tissue Start to Take Shape

By Victoria Webster, Case Western Reserve University

(Activist Post Editor’s Note: We have featured many articles over the years warning about scientific and military developments that were trending toward the merger of robotics with nature, typically in the areas of war and surveillance. Running parallel to this are developments in environmental science and health that employ nanotechnology and biorobotics which are beginning to fundamentally change how we define the natural world...

Aug 10 09:32

Where Does Your Info Come From? Mainstream Media Now Literally Using Robots to Write News

By Claire Bernish

Corporate ownership of 90 percent of media outlets in the United States has made the term ‘mainstream journalist’ quite the oxymoron, but the Washington Post’s newest project eliminates ‘journalist’ from the equation entirely — robots are now writing the outlet’s ‘news.’

Using artificial intelligence technology, the Washington Post is ‘employing’ software to ‘write’ hundreds of news briefs highlighting key information about the Olympic Games in Rio in real-time.

“‘Heliograf,’ which was developed in-house, automatically generates short, multi-sentence updates for readers,” the Post proudly announced Friday, as if the news organization couldn’t predict the collective American jaw-drop at the notion a computer could simply replace a longstanding tradition of actual journalism...

Aug 10 08:35

Microsoft rolls out several new Windows 10 cumulative updates

Microsoft is making a number of fixes and reliability and performance improvements available across a variety of different flavors of Windows 10 via new Cumulative Updates.

Webmaster's Commentary: 

Why didn't Microsoft apply the fixes before releasing Windows 10?

Oh, that's right, the end user is now an unpaid member of Microsoft's quality control department!

Aug 10 08:21

Someone made a smart vibrator, so of course it got hacked

The Internet of Things That Can Be Hacked grows daily. Lightbulbs, trucks, and fridges all have computers inside them now, and all have been hacked by someone. But at least you don’t put those inside your body.

Two years ago, someone had the good idea to put a bluetooth connection inside a vibrator, and the We-Vibe 4 Plus was born. The vibrator can connect with a smartphone app that its makers say “allows couples to keep their flame ignited – together or apart”: that is, it can be controlled remotely, while, say, making a video call.

But at the Def Con hacking conference in Las Vegas, two independent hackers from New Zealand, who go by the handles goldfisk and follower, revealed that the way the vibrator speaks with its controlling app isn’t really secure at all – making it possible to remotely seize control of the vibrator and activate it at will.

Aug 10 08:11

Google explains why Palestine isn't labeled in Maps

It's restoring the labels "West Bank" and "Gaza" after accidentally deleting them.

Webmaster's Commentary: 

Suuuuuuuuuuure it was an accident!

Aug 10 08:08

Copperhead OS: The startup that wants to solve Android’s woeful security

A startup on a shoestring budget is working to clean up the Android security mess, and has even demonstrated results where other "secure" Android phones have failed, raising questions about Google's willingness to address the widespread vulnerabilities that exist in the world's most popular mobile operating system.

"Copperhead is probably the most exciting thing happening in the world of Android security today," Chris Soghoian, principal technologist with the Speech, Privacy, and Technology Project at the American Civil Liberties Union, tells Ars. "But the enigma with Copperhead is why do they even exist? Why is it that a company as large as Google and with as much money as Google and with such a respected security team—why is it there's anything left for Copperhead to do?"

Aug 10 08:00

Internet of Car...rikey what the hell just happened to my car?

Vehicle manufacturers are making many of the same security mistakes as each other, creating scores of vulnerabilities in the process.

Not very reassuringly, half of the vulnerabilities discovered by security researchers at IOActive could result in "complete or partial loss of control" of a vehicle.

IOActive’s study is based on real-world security assessments with the world’s leading vehicle manufacturers, covering three years’ worth of data and active vulnerabilities. An alarming 71 per cent of the vulns uncovered during the research could be exploited without much difficulty, or are almost certain to be exploited.

Aug 10 07:58

Facebook to forcefeed you web ads, whether you like it or not: Ad blocker? Get the Zuck out!

These silos of your personal information don't run themselves for free, folks

Aug 10 07:56

Bungling Microsoft singlehandedly proves that golden backdoor keys are a terrible idea

Microsoft leaked the golden keys that unlock Windows-powered tablets, phones and other devices sealed by Secure Boot – and is now scrambling to undo the blunder.

These skeleton keys can be used to install non-Redmond operating systems on locked-down computers. In other words, on devices that do not allow you to disable Secure Boot even if you have administrator rights – such as ARM-based Windows RT tablets – it is now possible to sidestep this block and run, say, GNU/Linux or Android.

What's more, it is believed it will be impossible for Microsoft to fully revoke the leaked keys.

And perhaps most importantly: it is a reminder that demands by politicians and crimefighters for special keys, which can be used by investigators to unlock devices in criminal cases, will inevitably jeopardize the security of everyone.

Aug 10 07:52

Hitler ‘ransomware’ offers to sell you back access to your files – but just deletes them

The ransomware appears to be a test variant put together by unskilled coders, as a blog post by IT help site Bleeping Computer explains.

“It does not encrypt any files at all. Instead this malware will remove the extension for all of the files under various directories, display a lock screen, and then show a one hour countdown as shown in the lock screen below.

After that hour it will crash the victim's computer, and on reboot, delete all of the files under the [use profile] of the victim,” it adds.

German language text found within an embedded batch file associated with the malware states “Das ist ein Test” (“This is a test”).

Aug 10 07:13

Judicial Watch Uncovers New Batch of Hillary Clinton Emails

Judicial Watch today released 296 pages of State Department records, of which 44 email exchanges were not previously turned over to the State Department, bringing the known total to date to 171 of new Clinton emails (not part of the 55,000 pages of emails that Clinton turned over to the State Department). These records further appear to contradict statements by Clinton that, “as far as she knew,” all of her government emails were turned over to the State Department

Aug 10 06:59

BREAKING=> Julian Assange Suggests Seth Rich – Who Was MURDERED in DC – Was Wikileaks DNC Source!

On July 8, 2016, 27 year-old Democratic staffer Seth Conrad Rich was murdered in Washington DC. The killer or killers took nothing from their victim, leaving behind his wallet, watch and phone.

Shortly after the killing, Redditors and social media users were pursuing a “lead” saying that Rich was en route to the FBI the morning of his murder, apparently intending to speak to special agents about an “ongoing court case” possibly involving the Clinton family.

Webmaster's Commentary: 

Seth Rich was one of five people closely associated with the Clintons in the past six weeks who ‎have died under strange circumstances. His death was officially listed as a robbery, although apparently nothing was stolen and he was about to meet with government officials. The liar & warmonger Hillary, of course, saw to it that she & her people seized the opportunity to make this a "two fer"---they blamed the hacking and leak (which they didn’t want to occur but couldn’t stop) on the Russians (with the help of the corporate media) even as they eliminated a "traitor" in their midst.

Aug 09 18:46

Over half of connected cars are at risk of being hijacked by hackers - with potentially dire consequences

Half of connected cars are at risk of being hijacked by hackers, according to the company that managed to hack a Jeep and steer it off the road last year.

Researchers from cyber security firm IOActive were able to take control of the Chrysler Jeep Cherokee from miles away while it was being driven by Wired reporter Andy Greenberg.

A new report from the company claims that some 51% of connected cars could be at risk of a similar takeover.

What's more, 71% of the security flaws uncovered could be "exploited without much difficulty, or are almost certain to be exploited", according to the report.

Aug 09 15:17

Google In The White House? Assange Warns Of Close Ties Between Hillary Clinton & Internet Giant

During the Green Party convention in Houston, Texas, over the weekend, WikiLeaks founder Julian Assange spoke via video stream.

Aug 09 12:38

WikiLeaks emails expose alcohol industry’s paid campaign to stifle pot legalization

When the good people at Marijuana.com went through the WikiLeaks dump of the DNC emails, they found something unrelated to the trove of damning information on the criminal Hillary Clinton. Within the mountains of email texts, was a paid segment by the Wine & Spirits Wholesalers of America (WSWA), stoking fear within Washington, encouraging politicians to be wary of marijuana legalization.

Aug 09 10:48

Windows 10 Anniversary Update: Watch out for these nasty surprises

Windows 10 users are getting the first major update to the operating system in just under a year, with the release of the Anniversary Update.

But alongside the new features and fixes are some more unwelcome changes, ranging from less control for users to frozen machines.

Here are the main gotchas to look out for, as well as some fixes.

Webmaster's Commentary: 

"Sure there are problems, but doesn't the new logo look great?" -- Microblorch

Aug 09 10:39

Internet Archive posted 10,000 browser-playable Amiga titles – go, play

Seriously, go. Enjoy yourself. It’s Monday. We’ll still be here when you get back. It’s bound to be a long week. The world is coming apart at the seams. Your boss won’t notice if you play a round or two of Bubble Bobble from the comfort of your own browser (Firefox seems to work best on my end).

We can’t vouch for the quality of all of the Amiga titles that were recently posted up on Archive.org, but there sure as heck are a lot of them – 10,000+, by the site’s count, including favorites as Where in the World is Carmen San Diego, King’s Quest and Double Dragon,

Webmaster's Commentary: 

I loved the Amiga. I was a developer and did a lot of code work for some Amiga companies in between film gigs. Memories, memories! :)

Aug 09 09:44

One bug to rule them all: 'State-supported' Project Sauron malware attacks world's top PCs

Two top electronic security firms have discovered a new powerful malware suite being used to target just dozens of high-value targets around the world. The research shows that it was likely developed on the orders of a government engaging in cyber espionage.

The California-based Symantec has labeled the group behind the attack Strider, while Moscow-based Kaspersky Labs dubbed it ProjectSauron. Both are references to J. R. R. Tolkien’s Lord of the Rings, a nod to the fact that the original malware code contained the word “Sauron.”

But behind the playful literary allusions is a powerful piece of software, capable of “harvesting” passwords on entire networks and “modules are designed to perform specific functions like stealing documents, recording keystrokes, and stealing encryption keys from both infected computers and attached USB sticks,” according to Kaspersky.

Aug 09 09:34

VIDEO: OWNED! WIKILEAKS FOUNDER JULIAN ASSANGE TURNS TABLES ON BILL MAHER

Maher promptly launched a red herring at Assange:

Why haven’t we seen anything hacked from the Trump campaign? Obviously we know these came from Russia. And we also know that you do not like Hillary Clinton at all, as does not Vladimir Putin.

Then Maher attempted to poison the well:

It looks like you are working with a bad actor, Russia, to put your thumb on the scale and basically f*ck with the one person who stands in the way of us being ruled by Donald Trump.

Assange – without hesitation – responded with an unexpected question for Maher:

I do notice that a William Maher gave a Clinton-affiliated entity $1 million. Perhaps you would like to comment. Is that you?

Aug 09 09:18

TOOSDAY’S TOON ~~ #PokemonGo BANNED IN IRAN

Pokemon Go Banned in Iran Due To “Security Concerns”

Aug 09 09:16

Google in the White House? Assange Warns of Close Ties Between Hillary Clinton & Internet Giant

Webmaster's Commentary: 

This explains why Google servers are being used to DOS my site!

Aug 09 08:42

Researchers crack open unusually advanced malware that hid for 5 years

Kaspersky researchers estimate that development and operation of the Sauron malware is likely to have required several specialist teams and a budget in the millions of dollars. The researchers went on to speculate that the project was funded by a nation-state, but they stopped short of saying which one.

"The actor behind ProjectSauron is very advanced, comparable only to the top-of-the top in terms of sophistication: alongside Duqu, Flame, Equation, and Regin," the Kaspersky researchers wrote. "Whether related or unrelated to these advanced actors, the ProjectSauron attackers have definitely learned from them."

Aug 09 08:36

Windows 10 Anniversary Update crashing under Avast antivirus update

Intel Skylake drivers + Avast = kernel panic, BSOD

Aug 09 08:35

Brit network O2 hands out free Windows virus with USB pens

The virus infects program files and web files on computers running the following systems: Windows 2000, Windows 95, Windows 98, Windows ME, Windows NT,Windows Server 2003, Windows Vista, Windows XP.

An O2 spokesman said the business had contacted all customers who received the USB and advised them to discard it.

He said: "For any customers that have already used the USB or are concerned, we have a specialist team on hand to support them and guide them through any action they may need to take. We apologise for any inconvenience."

Aug 09 07:39

Facebook bans picture of cancer sufferer posted by widower who lost his wife to ovarian tumour for being too 'suggestive'

Mr Piears launched the Dying for a Cure campaign in March following the death of his 'inspirational' wife.

The initiative aims to highlight his concerns over what he describes as the 'profit-led' approach to drug research.

He paid for a 'boosted Facebook post' on the website to promote the message and encourage users to sign a petition.

The image he used on the site shows a female cancer patient holding up a sign over her bare chest that reads: 'UK Governments: The profits on cancer drugs are killing us.'

However on July 8 he received a message from Facebook that said: 'Your advert wasn't approved because it doesn't follow our Advertising Policies by featuring an image containing excessive amounts of skin or suggestive content.

Aug 08 12:22

GOOGLE IGNITES INTERNATIONAL OUTRAGE AFTER WIPING PALESTINE OFF THE MAP, REPLACING IT WITH ISRAEL

Palestine – Internet giant Google has come under fire from around the world this week, after removing the name Palestine from Google Maps and replacing it with Israel. Interestingly, international mainstream corporate media has completely blacked out any coverage of the incident or the international outrage it has sparked.

Webmaster addition: If you search for "Palestine" in Google Earth, it takes you to the Atlantic Ocean off the west coat of Africa! As a side note, many of the hack attacks on my server come from Google's IP addresses!

Aug 08 11:43

You know those new chips in your credit card? They’re failing you miserably

Americans have spent much of 2016 lamenting the addition of chips into their credit and debit cards. In exchange for the extra few moments consumers spend checking out, however, they are promised enhanced security to protect their accounts.

Aug 08 11:39

Amazon Echo is the ultimate spy device that records everything you say

The world’s largest retailer is under fire for releasing a device that, according to some experts, is little more than a spying tool for government surveillance.

Aug 08 11:13

Erik Prince: Hillary Clinton ‘Very Likely Caused’ Iranian Nuclear Scientist’s Death

Bannon asked if Hillary Clinton should be considered complicit in the execution of Iranian nuclear physicist Shahram Amiri, on charges of spying for the United States, who was discussed in some of the emails on Clinton’s unsecured private server.

“The physicist that came out, he defected, he was a treasure trove of information, but the CIA and the Clinton State Department botched it while he was in the States, left him pretty much unsupported,” Prince replied, calling it a major mistake to leave Amiri’s family in Iran.

“The second time he calls home, the Iranian intelligence service answers the phone. Undoubtedly, they leveraged him. When the guy talks about psychological trauma here in the United States, I’m sure it’s because the Iranians were telling him all the things they were going to do to his family if he didn’t come home,” said Prince.

Aug 08 09:13

'Sauron' spyware attacking targets in Belgium, China, Russia and Sweden

A previously unknown hacking group called Strider has been conducting cyber espionage against selected targets in Belgium, China, Russia and Sweden, according to Symantec.

The security firm suggested that the product of the espionage would be of interest to a nation state's intelligence services.

Strider uses malware known as Remsec that appears primarily to have been designed for espionage, rather than as ransomware or any other nefarious software.

Aug 08 08:00

My Job Churning Out The Garbage Behind Clickbait Titles

You're not going to fall for this internet misinformation circle jerk. You want real talk, so you strap on your Comments Codpiece and scroll straight to the bottom of the article. Guess what? Those people might not be legit either.

"There are services that will pay people to post on your blog or forum, very much like paying kids to come to your birthday party and pretend to be your friend," Jen says. "The one I used was called Postloop. I loved them because they paid reliably and you could cash out immediately instead of once a week. So if you were desperate to make a little extra to cover a bill or something, they were easy. The way [it] works is you sign up and choose some topics you might be interested in. They match you with forums, which you must post in, meeting a certain frequency and post length requirement so you don't look too spammy. Assuming you fit within their guidelines, you make a meager amount of money from the chatting."

Aug 08 07:50

Either Give Fair Coverage Or We Pull Your FCC Licenses!

Republicans are used to unfair reporting from the news media because the press in the US is mostly Jewish owned and both pro-Israel and pro-Wall Street. But this year has been rather astounding. When Bernie Sanders supporters converged on Debbie Wasserman Schultz to blame her for rigging the primaries for Hillary, MSNBC said 99% applauded the former head of the DNC. I saw the raw video of Sanders supporters booing her and yelling, “Bernie. Bernie.” The TV audience never saw the anti-Hillary protesters outside the convention center chanting, “Lock her up! Lock her up!”

Aug 08 07:18

Executed Iranian Scientist Mentioned in Clinton's Privately-Stored Emails

Recently executed Iranian nuclear scientist Shahram Amiri was mentioned in emails exchanged between US Democratic Party candidate Hillary Clinton and her advisers while she was secretary of state and stored on a private server, US Senator Tom Cotton said.

Aug 08 06:05

Clinton's private server held emails about nuclear 'spy' executed in Iran: Aides discussed scientist 'friend' and his decision to return home after defecting to the U.S. for $5m

Hillary Clinton used her private email server to discuss details of the Iranian nuclear scientist who has executed for giving information to the CIA.

Shahram Amiri, who was hanged on Sunday for 'revealing secrets to the enemy', was in the US and allegedly informing on Tehran's extensive nuclear program during the Democrat's controversial reign as Secretary of State.

At the time she stressed researcher had been there of his 'own free will' and was described as 'our friend' in correspondences.

...

Amiri worked for a university affiliated with Tehran's extensive nuclear program.

He is said to have had an in-depth knowledge of Iran's nuclear program and was kept at a secret location after returning to the country.

According to CBS, he told officials in interviews he was being held against his will by Saudi and U.S. spies.

But American officials said he was set to receive millions for informing.

Aug 08 05:47

Android bug fear in 900 million phones

Serious security flaws that could give attackers complete access to a phone's data have been found in software used on tens of millions of Android devices.

The bugs were uncovered by Checkpoint researchers looking at software running on chipsets made by US firm Qualcomm.

Qualcomm processors are found in about 900 million Android phones, the company said.

However, there is no evidence of the vulnerabilities currently being used in attacks by cyberthieves.

Aug 07 23:51

Iranian Scientist Who Provided U.S. with Info Executed Today – He Was Mentioned in Hillary Email

Hillary Clinton recklessly discussed, in emails hosted on her private server, an Iranian nuclear scientist who was executed by Iran for treason, Sen. Tom Cotton, R-Ark., said Sunday.

Read more: http://therightscoop.com/iranian-scientist-who-provided-u-s-with-info-...

Aug 07 18:59

Windows 10 Anniversary Update is borking boxen everywhere

Microsoft's response: Have you tried uninstalling it and installing it again?

Aug 07 15:43

Princeton Professor Shows How Easy It Is To Hack An Election In Just 7 Minutes

By Claire Bernish

A professor from Princeton University and a graduate student just proved electronic voting machines in the U.S. remain astonishingly vulnerable to hackers — and they did it in under eight minutes.

In fact, Professor Andrew Appel and grad student Alex Halderman took just seven minutes to break into the authentic Sequoia AVC Advantage electronic voting machine Appel purchased for $82 online — one of the oldest models, but still in use Louisiana, Pennsylvania, New Jersey, and Virginia...

Aug 07 12:53

PLC-Blaster Worm Targets Industrial Control Systems

Security researchers at Black Hat USA described a proof-of-concept worm that targets weaknesses within automated industrial control systems used to manage critical infrastructure and manufacturing. The worm, according to OpenSource Security, has the capability to autonomously search for and spread between networked programmable logic controllers (PLCs).

Webmaster's Commentary: 

Shades of STUXNET!

Aug 07 12:52

Windows 10 Anniversary Update deleting Linux partitions?

Many folks who are running Windows 10 on their computers, usually have a Linux partition installed as well. Regular folks do it, developers do it, and then the few who prefer to use Linux but are forced to use Windows. But here’s the thing, it would appear as if the Windows 10 Anniversary Update is removing Linux partition.

Alan Pope, Ubuntu Community manager at Canonical, took to Twitter recently to complain that he has seen several reports of folks claiming the Windows 10 Anniversary Update has been deleting partitions containing Linux operating systems.

Webmaster's Commentary: 

"You VILL use our operating system, dummkopf. UND YOU WILL LIKE IT!!!!!!!"

Aug 07 12:23

Cotton: Clinton discussed executed Iranian scientist on email

Hillary Clinton recklessly discussed, in emails hosted on her private server, an Iranian nuclear scientist who was executed by Iran for treason, Sen. Tom Cotton, R-Ark., said Sunday.

...

The scientist shows up in Clinton's emails back in 2010, just nine days before he returned to Iran.

Webmaster's Commentary: 

And now he has been executed! Did Iran learn he was a spy for the US from Hillary's weak private server?

Aug 07 12:19

Jeanine SLAMS James Comey

Aug 07 10:42

The First "Bitcoin Bail-In": All Bitfinex Users To Lose 36% In "Shared Loss" After Historic Hack

Adding insult to injury for those who "held" their BTC at the hacked exchange, Bitfinex announced it would pull a page right out of Europe's bank resolution mechanism, saying that all of its users will lose 36% of their deposits after it concluded its review the massive hack, in what is set to be the first ever "bitcoin bail-in."

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA