COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Apr 11 07:53

Oh my Microsoft Word: Dridex hackers exploit unpatched flaw

Cybercrooks are actively exploiting an unpatched Microsoft Word vulnerability to distribute the Dridex banking trojan, claim researchers.

Booby-trapped emails designed to spread the cyber-pathogen have been sent to hundreds of thousands of recipients across numerous organisations, according to email security firm Proofpoint.

The switch to document exploits by the hackers represents a change of tactics by a group that previously leaned heavily on malicious macros to distribute their wares.

The Word document exploit at the centre of the attack was only discovered last week, so its abuse represents a rapid weaponizisation of the exploit.

Apr 11 07:41

Melding Mind and Machine: How Close Are We?

Undoubtedly there will be beneficial uses for brain-computer interface technology (BCI), particularly in the area of restoring motor skills and communication. But, as you’ll read, the level of mind-tinkering that is being proposed by neuroscience has uses that also create direct mind control in the form of “non-invasive” applications such as neural dust, linking the brain to computer via wireless magnetic stimulation. Or how about treating diseases via “electroceuticals” – sending targeted electrical messages to various organs via implant?...

Apr 10 15:59

Researcher: 90% Of 'Smart' TVs Can Be Compromised Remotely

As recent Wikileaks data revealed, the lack of security and privacy standards in this space has proven to be a field day for hackers and intelligence agencies alike.

And new data suggests that these televisions are even more susceptible to attack than previously thought. While the recent Samsung Smart TV vulnerabilities exposed by Wikileaks (aka Weeping Angel) required an in-person delivery of a malicious payload via USB drive, more distant, remote attacks are unsurprisingly also a problem. Rafael Scheel, a security researcher working for Swiss cyber security consulting company Oneconsult, recently revealed that around 90% of smart televisions are vulnerable to a remote attack using rogue DVB-T (Digital Video Broadcasting - Terrestrial) signals.

Apr 10 15:07

Google Is Teaming Up Its AlphaGo AI With Humans So They Can Learn From It

Google first brought attention to its DeepMind-based artificial intelligence AlphaGo when last year it obliterated the then-leading Go player Lee Sedol in a highly piblicized match-up. Now it wants to team up the crafty AI with humans so they can learn from its unusual moves.

Apr 10 10:03

Your Financial Life Could Be Ruined If Your Name Is On This Massive Government List

Muhammed Ali Khan tried to do one of the most boring, responsible things an American taxpayer can do: set up a government-guaranteed retirement savings account. He was rejected because the Treasury Department thought he might be a terrorist.

He isn’t. He’s a software consultant from Fullerton, California. But he shares a first name (with a different spelling), last name and middle initial with a financier of a Pakistani terror group. That man, Mohammad Naushad Alam Khan, is on the Treasury Department’s Specially Designated Nationals and Blocked Persons List (SDN). The 1,026-page catalog lists people and organizations that U.S. citizens and residents are barred from doing business with because of their ties to terror cells, drug cartels or rogue states.

The SDN is essentially a financial no-fly list that cuts people off from U.S. banks ? and, as a result, the global financial system. The SDN has more than doubled in length in the last five years.

Webmaster's Commentary: 

This is a blatant example of the US government going rogue.

And President Trump, a word please.

The one true, and tested, way of stopping any kind of terrorism in its tracks is the following recipe.

Stop expropriating natural resources from foreign countries, to which the US government and corporations have no moral right.

Stop regime-changing governments not to your liking.

You're welcome, Mr. President!! :-)

Apr 10 09:06

Is this the most frustrating hack yet? Bizarre attack forces people to get a high score in an anime GAME to decrypt their files

Unless you're a big gaming fan, a new ransomware attack could be the most frustrating to infect computers yet.

'Resenware' is a malicious programme that is infecting systems, encrypting documents, music and pictures to make them inaccessible.

But instead of asking for money to decrypt the files, Rensenware forces players to get a high score in a difficult anime game.

Apr 10 08:51

Thousands of fake companies added to Google Maps every month

Local businesses on Google Maps aren’t always as local as they seem. Tens of thousands of bogus listings are added to Google Maps every month, directing browsing traffic towards fraudulent schemes, finds a team of researchers at Google and the University of San Diego, California.

As an example, a fraudster might list a locksmiths at a location on Google Maps when they don’t actually have premises there. When a potential customer calls the phone number listed, they are put through to a central call centre that hires unaccredited contractors to do jobs all over. Often the customer ends up being coerced into paying more than the original quoted price.

Apr 10 08:45

French election: Macron vows to tackle terrorism by taking on tech companies

French centrist candidate Emmanuel Macron has launched his presidential campaign with a plan to tackle terrorism by forcing internet firms to release encrypted messages.

Apr 10 08:42

New Malware Intentionally Bricks IoT Devices

A new malware strain called BrickerBot is bricking Internet of Things (IoT) devices around the world by corrupting their storage capability and reconfiguring kernel parameters.

Detected via honeypot servers maintained by cyber-security firm Radware, the first attacks started on March 20 and continued ever since, targeting only Linux BusyBox-based IoT devices.

Apr 10 08:36

Symantec attributes 40 cyber attacks to CIA-linked hacking tools

Past cyber attacks on scores of organizations around the world were conducted with top-secret hacking tools that were exposed recently by the Web publisher Wikileaks, the security researcher Symantec Corp (SYMC.O) said on Monday.

That means the attacks were likely conducted by the U.S. Central Intelligence Agency. The files posted by WikiLeaks appear to show internal CIA discussions of various tools for hacking into phones, computers and other electronic gear, along with programming code for some of them, and multiple people familiar with the matter have told Reuters that the documents came from the CIA or its contractors.

Symantec said it had connected at least 40 attacks in 16 countries to the tools obtained by WikiLeaks, though it followed company policy by not formally blaming the CIA.

Apr 10 08:28

OLE-y hell. Bug in MSFT Word allows total PC p0wnage

All eyes will be on Microsoft's April patch run - due tomorrow - to see whether Redmond gets ahead of a nasty Word zero-day that popped up last week.

The hack exploits Object Linking and Embedding and the FireEye researchers who discovered the bug were working with Microsoft, but were pre-empted by a disclosure from McAfee.

McAfee and FireEye each explain that the attack works all the way up to Office 2016 running on Windows 10.

A nasty aspect of the attack is that unlike many Word-based attacks, it doesn't ask the victim to enable macros.

Apr 10 08:26

TP-Link 3G/Wi-Fi modem spills credentials to an evil text message

TP-Link's M5350 3G/Wi-Fi router, has the kind of howling bug that gives infosec pros nightmares.

In what looks like a feature created for developers' convenience, but left behind when it should have been deleted, the device's admin credentials can be retrieved by text message.

The discoverer of the bug, a German company called Securai, told Heise.de the issue as a cross-site scripting (XSS) bug triggered by an SMS containing the following attack script:

The device replies with admin username, admin password, its SSID, and its login password.

Apr 09 17:45

Hacker sets off all 156 emergency sirens in Dallas

Dallas city officials said Saturday that a hacker is to blame for setting off all the city's 156 emergency outdoor sirens, which wailed for an hour and half overnight.

Apr 09 09:07

Google’s Censorship Of Independent News

‘Fake news’ is a term designed to fool the weak minded into believing the corporate media are the only reliable sources of information.

You and I both know that is a total lie.

Since you’re reading this, you already know that we’re living in a totalitarian society where anything that does not sit inside the tightly controlled margins of ‘acceptable debate’, is painted as an enemy of the people.

Apr 09 08:38

Shadow Brokers hackers release NSA hacking tools to punish Trump for ‘abandoning’ his base

Trump has no friends and very few supporters left.This is awesome.

Hacking group Shadow Brokers has released the password to a trove of NSA exploits in what they say is a form of protest against President Donald Trump for going back on his campaign promises, and warning the president, “Don’t forget your base.”

NSA just lost control of its Top Secret arsenal of digital weapons; hackers leaked it.
1) https://t.co/zleVbyBtE3
2) https://t.co/aKwdiNbrJA
— Edward Snowden (@Snowden) April 8, 2017

Apr 09 08:33

This sex trafficking law could ruin the internet as we know it. New legislation would hold websites liable for third-party content, undermining the protection of free speech online

On Monday, Rep. Ann Wagner introduced a bill to fight child sexual exploitation and sex trafficking. In an accompanying press release, the congresswoman spoke of “modern slavery,” “the retailers of America’s children,” and called for the need to “provide a voice for the most vulnerable in our society.” Wagner is a Republican from Missouri who voted for Donald Trump and considers George W. Bush’s memoir to be her favorite book. But not too surprisingly, the legislation already has bipartisan support — what Democrat could object to such an attempt to protect children?

Apr 08 08:42

#Vault7: WikiLeaks release shows CIA ‘Grasshopper’ used stolen ‘Russian mafia’ malware

WikiLeaks confirmed that the CIA did not merely copy and paste the suspected Russian malware but appropriated "[the] persistence method, and parts of the installer,” which were then modified to suit the CIA’s purposes.

The latest release came with an emblem containing a grasshopper and the words: “Look before you leap,” a possible reference to how the latest leaked tools would allow the CIA to prepare a machine for future hacking, without raising suspicion.

The rootkits can be installed and used as a 'man on the inside' who can allow more malicious software through undetected in future, if the CIA felt it necessary. If suspicions were raised on initial installation, they would know not to proceed with a more extensive operation.

Apr 08 08:34

'Amnesia' IoT botnet feasts on year-old unpatched vulnerability

Hackers have brewed up a new variant of the IoT/Linux botnet "Tsunami" that exploits a year-old but as yet unresolved vulnerability.

The Amnesia botnet targets an unpatched remote code execution vulnerability publicly disclosed more than a year ago in DVR (digital video recorder) devices made by TVT Digital and branded by over 70 vendors worldwide.

The vulnerability affects approximately 227,000 devices around the world with Taiwan, the United States, Israel, Turkey, and India being the most exposed, specialists at Unit 42, Palo Alto Networks' threat research unit, warn.

The Amnesia botnet is yet to be abused to mount a large-scale attack but the potential for harm is all too real.

Apr 08 08:33

Forget Mirai – Brickerbot malware will kill your crap IoT devices

The malware targets Linux-based IoT devices running the BusyBox toolkit, and seems to have a particular affinity for Ubiquiti network devices, which have their own security issues. Once inside the operating system, the code starts to scramble the onboard memory using rm -rf /* and disabling TCP timestamps, as well as limiting the max number of kernel threads to one.

Brickerbot then flushes all iptables firewall and NAT rules and adds a rule to drop all outgoing packets. Finally it tries to wipe all code on the affected devices and render them useless – a permanent denial of service.

To block the attack, the key factor is disabling Telnet and changing the device's factory-set passwords. Radware also recommends using intrusion prevention systems to lock down devices.

Apr 08 08:29

Google discovers 'Israeli' spy app designed to hack smartphones

Google discovers what they consider to be the most dangerous android malware yet, used to track information of calls, messages and internet history as well as spy on people through their smartphones' camera and microphone; an Israeli company is suspected of creating it.

Apr 08 05:04

Adding to the Purge, Google to Use Fact-Checker Label Against Alleged Fake News

Google is to start displaying fact-checking labels in its search results to highlight news and information that has been vetted and show whether it is considered to be true or false, as part of its efforts to help combat the spread of misinformation and fake news.

Apr 07 13:11

US cyber attack shuts down Al-Masdar News for five hours

DAMASCUS, SYRIA (8:45 P.M.) – On Friday afternoon, Al-Masdar News experienced its biggest hacker attack ever, leaving the website inaccessible to its readers for five hours.

Incidentally, the DDOS attack took place hours after it was revealed that ISIS launched an offensive shortly after US missiles struck Shayrat Airbase, grounding its airplanes at the Homs airfield.

The IT department said the massive DDOS attack could be traced exclusively back to the United States although it could not determine who was responsible for the hacking.

Apr 07 10:24

Keiser Report: Killing Web Privacy For Measly $1M

In this episode of the Keiser Report, Max and Stacy discuss killing internet privacy.

Apr 07 10:12

YouTube channels need 10,000 views for adverts

YouTube is changing the rules about when users can start earning money through carrying adverts on their video channels.

New channels will have to get 10,000 views before they can be considered for the YouTube Partner Program, the firm announced in a blog post.

YouTube will then evaluate whether the channel is adhering to its guidelines before letting it carry adverts.

Apr 07 10:02

Twitter cofounder to sell chunk of his stock for personal reasons

Better do it quickly before the price falls further

Apr 07 08:17

Exclusive–Sen. Ron Johnson: ‘What We Do Know About Susan Rice Is You Can’t Believe What She Says’

The chairman of the Senate Homeland Security Committee told Breitbart News that he is very concerned about allegations that Susan Rice, President Barack Obama’s national security adviser, abused her access to intelligence reports that included incidental collection of information about associates of President Donald Trump.

Apr 06 16:28

Put down your coffee and admire the sheer amount of data Windows 10 Creators Update will slurp from your PC

Then there's the information collected in Full mode, which includes everything in Basic plus your user settings and preferences, your browser choice, lists of your peripherals, the apps you use to edit and view images and videos, how long you use the mouse and keyboard, all the applications you've ever installed, URLs to videos you've watched that triggered an error, URLs to music that triggered an error, time spent reading ebooks, text typed in a Microsoft web browser's address and search bar, URLs visited, visited webpage titles, the words you've spoken to Cortana or had translated to text by the system, your ink strokes, and more.

Apr 06 14:34

Google's Censorship Of Independent News - RINF Is Latest Victim

'Fake news' is a Newspeak term designed to fool the weak minded into believing the corporate media is the only reliable source of information.

This is a total lie.

You know the drill by now, black is white, up is down, 2 + 2 = 5.

Apr 06 12:51

JCC bomb hoaxer made millions selling forged docs online — report

After finding his (Michael Kaydar) bitcoin account, investigators believe Israeli-American teen sold counterfeit IDs on dark net for cryptocurrency

Apr 06 12:35

THE FOUR FLAVORS OF AUTOMATED LICENSE PLATE READER TECHNOLOGY

Automated License Plate Readers (ALPRs) may be the most common mass surveillance technology in use by local law enforcement around the country—but they're not always used in the same way. Typically, ALPR systems are comprised of high-speed cameras connected to computers that photograph every license plate that passes. The photo is converted to letters and numbers, which are attached to a time and location stamp, then uploaded to a central server. This allows police to identify and record the locations of vehicles in real time and also identify where those vehicles have been in the past. Using this information, police could establish driving patterns for individual cars.

Apr 06 12:31

LEGALIZED CORRUPTION FUELED THE DEATH OF INTERNET PRIVACY: THE PROBLEM IS WORSE AT THE STATE LEVEL

The news that Internet service providers (ISPs) can sell your browsing history has been met with a lot of critical media coverage. However, few reporters have set their sights on the flow of money that helped set this legislation in motion. In general, Internet privacy is a bipartisan issue among the American people. However, this was a partisan issue on Capitol Hill with Republican lawmakers supporting the bill. It was passed in the Senate and House by a very narrow margin, 50 to 48 and 215 to 205 respectively. With that said, there were 15 House Republicans who voted outside of their party lines to keep Internet privacy intact.

Apr 06 11:17

Google, YouTube waging “demonetization” WAR on alternative media to bankrupt independent journalism

SGT Report, along with many other independent media outlets, is now asking for Patreon donations as Google / YouTube demonetizes their videos, forcing them to look for alternative sources of operating revenue. But here’s the thing: SGT Report isn’t a Jiahid recruitment hub. They don’t promote terrorism. They simply have an independent point of view on politics and current events. For this reason alone, Google has demonetized them by labeling their videos “extreme.”

Google labels independent media “extremist” by conflating critical thinking with Jihadi terror

Webmaster's Commentary: 

PLEASE DONATE.




Apr 06 10:31

CrowdStrike, First Experts To Affirm Trump, Russia Election Hack Theory, Renege Their Claims

CrowdStrike, a group that was the first to affirm that Russia could have played a part in President Trump winning the 2016 U.S. election, have now reneged on some of their claims, Daily Mail has reported.

CrowdStrike claimed back in June 2016 that Putin’s men were responsible for hacking the Democratic National Committee. This finding was used by the FBI, CIA and other top intelligence agencies in their investigations into Trump and Russia. It turns out, however, that there may not be as much truth to the claim than originally thought.

This could be a huge blow to the case of the Russians helping The Donald win the election, as CrowdStrike, unlike any U.S. intelligence agency, was permitted exclusive access to DNC computers, which in turn provided American government investigators with the fuel they needed to proceed with their probe on a link between the Kremlins and the president.

Apr 06 10:24

Owner Of Servers Implicated In DNC Hacks Says No One Is Interested In Truth Behind Computer Crimes

The mainstream media argues with no real evidence that the Russian government has been behind computer hacking targeting top Democrats and U.S. elections systems. However, the man who runs the servers implicated in the crime said no U.S. law enforcement or intel agency is interested in speaking with him to gather evidence on the perpetrators.

Apr 06 10:23

Russian server co. head on DNC hack: ‘No idea’ why FBI still has not contacted us

Blaming Russia because servers are from here is “absurd,” Vladimir Fomenko, owner of the Russian server company implicated in the DNC hack, told RT adding that they are ready to help any special service in investigating the attack.

Fomenko’s web hosting service, King Servers, was identified by American cybersecurity company ThreatConnect as the platform for the attack on emails of the Democratic National Committee. Six out of the eight IP addresses used by the hackers were hosted on King Servers, ThreatConnect claimed in September.

But the 26-year-old from Biysk, in western Siberia, is far from being scared or unwilling to cooperate. In fact, he recently told the New York Times that “If the FBI asks, we are ready to supply the IP addresses, the logs.” However, he says, “Nobody is asking… It’s like nobody wants to sort this out.”

Apr 06 09:22

'Chinese hackers' linked to espionage campaign on board directors of Google, Amazon, IBM

Ahead of the trade summit this week between US President Donald Trump and his Chinese counterpart, Xi Jinping, security experts claim a nation-state hacking group conducted espionage on a number of key industry players and lobbyists with links to the talks.

Between 27 February and 1 March this year, the operation – dubbed "Operation TradeSecret" – used malware in an attempt to snoop on private-sector officials registering to the website of the National Foreign Trade Council (NFTC), Fidelis Cybersecurity revealed.

Webmaster's Commentary: 

With the recent revelations that CIA has developed the means to frame third parties for CIA hacking attacks, it is reckless and irresponsible to claim that China is behind these attacks. If you recall the Seattle APEC scandal from 1997, it was US agents that were breaking into computers to steal business secrets!

Apr 06 08:38

Apple's desperate Mac damage control message hints at a divided company

Apple's attempts at reassuring customers that it hasn't forgotten about desktop Macs hint at divisions within the company as to what direction the company should be going in.

Apr 06 08:05

TURKEY BLOCKED MY BLOG: A Turkish authority has issued an order to block your WordPress.com site: matrixbob.wordpress.com

Apr 06 06:58

Royal Astronomer Warns Robots Will Wipe Out Humanity & Take Over

Royal astronomer Sir Martin Rees has warned that robots will wipe out humans and take over in just a few centuries.

Apr 05 09:30

Robots Take Over – The Apparel Production

First big scale shoe robot factory unveiled: Adidas will use machines to make shoes in Germany instead of humans in Asia

Apr 05 08:18

Samsung’s Tizen is riddled with security flaws, amateurishly written

Tizen, the open source operating system that Samsung uses on a range of Internet-of-Things devices and positions as a sometime competitor to Android, is chock full of egregious security flaws, according to Israeli researcher Amihai Neiderman.

Samsung has been developing the operating system for many years. The project started as an Intel and Nokia project, and Samsung merged its Bada operating system into the code in 2013. Like Android, it's built on a Linux kernel, with a large chunk of open source software running on top. App development on Tizen uses C++ and HTML5.

Presenting at Kaspersky Lab's Security Analyst Summit and speaking to Motherboard, Neiderman had little positive to say about the state of Tizen's code. "It may be the worst code I've ever seen," Neiderman said. "Everything you can do wrong there, they do it."

Apr 05 08:03

Webcam sex blackmailer faces extradition to Canada to stand trial for bullied teen's suicide

The man thought to be behind one of the most notorious cases of cyber bullying may finally face trial in Canada – after a Dutch court approved his extradition from the Netherlands.

Aydin Coban is alleged to have persuaded 15-year-old Canadian Amanda Todd to send compromising pictures of herself to him via webcam, and then demanded more from her or he would share her snaps with the world. The teen's half-naked photos were later spread across the web.

Consequently, Todd was bullied and intimidated to such a degree that in October 2012 she killed herself, and in doing so shone a spotlight on the horrifying abuse of the internet and webcams to extort young and impressionable girls.

Apr 05 08:00

Apple fans, Android world scramble to patch Broadcom's nasty drive-by Wi-Fi security hole

Yesterday, Apple rushed out an emergency patch to plug a severe security hole that can be exploited to wirelessly and silently commandeer iPhones, iPads and iPods.

Now we know why: this remote-code execution vulnerability lies in Broadcom's Wi-Fi stack, which Apple uses in its handhelds. Many other handsets also use Broadcom's naff chipset, and, as a result, we expect – and hope – a lot of other phone and tablet makers push out patches: any gadget using Broadcom's vulnerable tech is at risk to over-the-air hijacking, not just Apple's iThings.

Apr 05 07:58

Brazilians whacked: Crooks hijack bank's DNS to fleece victims

Rather than picking off online banking customers one by one, ambitious hackers took control of a Brazilian bank's entire DNS infrastructure to rob punters blind.

The heist, detailed by security engineers at Kaspersky Lab, took place over about five hours on Saturday October 22, 2016, after the miscreants managed to get control of the bank's DNS hosting service using targeted attacks. They managed to transfer all 36 of the bank's domains to phony websites that used free HTTPS certs from Let's Encrypt. These sites masqueraded as the bank's legit online services, tricking marks into believing the malicious servers were the real deal. That allowed the crims to steal customers' usernames and passwords as they were typed into the sites' login boxes.

Apr 05 07:55

Startup remotely 'bricks' grumpy bloke's IoT car garage door – then hits reverse gear

An Internet of Things maker has just had first-hand experience of the Streisand effect – after remotely killing a customer's Wi-Fi garage door for being rude.

Apr 04 12:47

GNU Operating System

GNU is an operating system that is free software—that is, it respects users' freedom. The development of GNU made it possible to use a computer without software that would trample your freedom.

Apr 04 10:49

Youtube Boycott and Obamagate Scandal with Susan Rice unfolding

Mike Cernovich has explained that his sources for the Susan Rice story were people within Bloomberg and The New York Times, who refused to run the story in an effort to protect the Obama administration.

Apr 04 09:25

Google's video recognition robots are easily deceived, research shows

Google's ability to use its computer systems to spot extremist videos online has been called into question after researchers managed to easily deceive software that the internet giant uses to identify clips.

The program can be tricked by humans with little technical knowledge by inserting individual frames into the videos, according to researchers at the University of Washington.

They managed to convince Google's "cloud video intelligence" tool that a video about animals was about a car by flashing a frame of one every two seconds. The images are too quick to be seen by the human eye but were enough to fool the software into wrongly classifying the video.

Apr 04 09:22

Arrest over Apple hacking threat

A 20-year-old man has been arrested in London in connection with a shadowy hacker group that has threatened to remotely wipe hundreds of millions of Apple iPhones, Macs and iPads.

Apr 04 08:54

Dutch court clears extradition of Amanda Todd's alleged cyber extortionist

The Dutch Supreme Court has approved the extradition to Canada of a convicted cyber blackmailer who faces charges in the case of B.C. teen Amanda Todd, who killed herself after allegedly being extorted online.

Because of several factors, however, it remains unclear when 38-year-old Aydin Coban could be sent to Canada following Tuesday's ruling.

First, his extradition must be approved by the Dutch security and justice minister.

In addition, Coban was convicted last month by a Dutch court and sentenced to nearly 11 years in prison for online fraud and blackmail of 34 other young women and men.

Apr 04 08:25

Swiss man faces defamation trial for ‘liking’ Facebook posts

A Swiss man is on trial for ‘liking’ Facebook posts that accused an animal rights activist of racism and anti-Semitism. The prosecution has accused him of defamation in the landmark case.

The 45-year-old defendant from Zurich is facing charges after becoming involved in an online argument within the animal rights community – by merely ‘liking’ eight Facebook posts.

Apr 04 07:55

Cyborgs at work: employees getting implanted with microchips

The syringe slides in between the thumb and index finger. Then, with a click, a microchip is injected in the employee's hand. Another "cyborg" is created.

What could pass for a dystopian vision of the workplace is almost routine at the Swedish startup hub Epicenter. The company offers to implant its workers and startup members with microchips the size of grains of rice that function as swipe cards: to open doors, operate printers, or buy smoothies with a wave of the hand.

The injections have become so popular that workers at Epicenter hold parties for those willing to get implanted.

Apr 04 07:45

Denmark Proves We Don't Need the FCC

The Danish reputation got a boost among the American left in last year's presidential election, when none other than Bernie Sanders himself plugged the country as a model for the United States to emulate. But admirers of the popular democratic socialist politician may be surprised to learn exactly how Denmark was able to become an international leader in ICT delivery. It wasn't super-charged regulation, top-down "net neutrality" rules, or major government subsidies that did the trick.

So how did Denmark do it? Deregulation. By virtually eliminating their equivalent of the Federal Communications Commission (FCC), Danes now enjoy some of the best ICT service on the planet.

Apr 04 07:38

Wi-Fi sex toy with built-in camera fails penetration test

Sex toy designer Svakom decided that a vibrator needed a camera on the end, and it also needed a Wi-Fi access point – with the utterly predictable result that the device is hackable.

Pen Test Partners – these jokes just write themselves, really – took a look at the device, and the researchers probably wish they hadn’t, because the Svakom Siime Eye is an early favourite for a hypothetical 2017’s Worst Internet-of-S**t Product award.

Looking at the Android app, Pen Test Partners’ (PTP’s) researchers first turned up “some hard-coded credentials, and a hard-coded IP address and port.”

The hard-coded credentials, admin:blank, make it “trivial” to connect to the dildo’s Web admin interface, PTP writes, and even better – the Web app serves the video from the camera, and because it’s an access point, an attacker within range can identify users.

It gets worse.

Apr 04 07:08

Amazon is a destroyer of jobs and the merchant economy

If this is progress, just how much more can our economy afford? The myth of cheap prices, conveniently seldom factors in the structural costs to society. Building an all inclusive monopoly based upon minimal employees and predatory prices ignores the long anti-trust history that helped create the middle class.

Apr 03 16:08

Europe supplants US as biggest source of child abuse hubs

Europe now hosts majority of child sex abuse images (60 per cent), pushing North America into second place (37 per cent), according to an annual report from the Internet Watch Foundation (IWF).

In contrast, UK now hosts less than 0.1 per cent of child sexual abuse imagery globally, something IWF credits as down to a "zero tolerance approach" by the UK internet industry.

The majority of all child sexual abuse URLs identified globally in 2016 (92 per cent) were hosted in five countries: the Netherlands (37 per cent), the United States (22 per cent), Canada (15 per cent), France (11 per cent), and Russia (7 per cent).

The biggest increase seen was in the Netherlands, which went from hosting 12,703 abuse URLs to 20,972.

Apr 03 16:03

Drive-by Wi-Fi i-Thing attack, oh my!

Apple hasn’t provided much detail, but you don’t want to ignore the latest iOS release – 10.3.1 – because it plugs a very nasty Wi-Fi vulnerability.

Cupertino has rushed out the emergency patch because: “An attacker within range may be able to execute arbitrary code on the Wi-Fi chip” – meaning, presumably, that malicious packets gave attackers a vector.

The fix for the bug, which Apple attributes to Gal Beniamini of Google’s Project Zero, was a buffer overflow fixed by better input validation.

The bug affected iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation and later.

Apr 03 13:51

BOOGA BOOGA! Nuclear Power Plants On Alert Following Credible Cyber Threats: “Terrorists May Have Developed Ways Of Bypassing Safety Checks”

The global cyberwarfare scare washed ashore the British isles this weekend after UK nuclear power stations and airports were told to tighten defenses against terrorist attacks in the face of increased threats to electronic security systems, after intelligence agencies concluded terrorists could plant explosives in laptops and mobile phones that won’t be caught by normal security screenings.

Apr 03 12:09

Google Blood Money

A Mail on Sunday investigation today exposes how Google has cashed in on a sickening YouTube video that shows viewers how to kill someone in a stab vest like the one worn by PC Keith Palmer when he was murdered in the Westminster terror attack.

Apr 03 09:42

Fmr. FBI Asst. Director: Farkas Exposed ‘Conspiracy Cabal’ on Trump Surveillance

Evelyn Farkas, former deputy assistant secretary of defense, left the government in 2015 and now works as a fellow at the Atlantic Council. She told Brezinski that she urged her former colleagues to “preserve” the intelligence.

“It was more actually aimed at telling the [Capitol] Hill people, ‘Get as much information as you can and get as much intelligence as you can before President Obama leaves the administration,’ because I had a fear that somehow that information would disappear with the senior people who left,” she said. “So it would be hidden away in the bureaucracy.”

Just in case there was any ambiguity, Farkas made clear her concern was the incoming Trump administration.

Apr 03 09:33

DUBAI POLICE ARREST HACKERS WHO BROKE INTO "HIGHLY CONFIDENTIAL" WHITE HOUSE EMAILS

In a development that could have substantial implications to the ongoing "Russia hacked the US elections" narrative, United Arab Emirates media reports that Dubai police have arrested a group of foreign hackers that targeted five White House officials in an email blackmail scheme.

The Arabic-language Al Bayan newspaper and the television channel Dubai One reported the arrests on Monday according to AP. Dubai police did not answer repeated calls for comment.

The Al Bayan quoted Maj. Saud al-Khalidi of Dubai police as saying an "African gang", broke into the emails of the five senior officials and "got highly confidential information." He said the U.S. asked Dubai police for assistance. Al-Khalidi said that investigators tracked down the gang to an apartment in the emirate of Ajman and arrested three suspects. Those arrested are between 24 and 26 years of age and had a list of "5 million bank accounts," as well as hacking software and millions of dollars in assets, he said.

Webmaster's Commentary: 

How in the world could the emails of these US officials be so compromised that these hackers could get into them?!?!?!?

And what in the world would have have these specific White House officials so blackmailable?!?

Apr 03 09:20

Detailed Review Of DHS/FBI ‘Evidence’ Shows Russia Hacking Is Fake News

On December 29, 2016, the Hill posted an article discussing a 13 page report by the FBI and DHS claiming that their 13 page report was “evidence” of Russian hacking in US elections.
http://thehill.com/policy/national-security/312132-fbi-dhs-release-rep...

Wikileaks has repeatedly stated that the source of its leaks was a disgruntled Democratic Party insider.
http://www.dailymail.co.uk/news/article-4034038/Ex-British-ambassador-...

However, President Obama issued a press release on December 29 2016 using the DHS-FBI report to justify increasing sanctions against Russia.
https://www.whitehouse.gov/the-press-office/2016/12/29/statement-presi...

Apr 03 08:04

Dubai police say they arrest hackers after White House staff

State-owned media in the United Arab Emirates are reporting that Dubai police have arrested a group of foreign hackers that targeted five White House officials in an email blackmail scheme.

The Arabic-language Al Bayan newspaper and the television channel Dubai One reported the arrests Monday. Dubai police did not answer repeated calls for comment.

Al Bayan quoted Saud al-Khalidi of Dubai police as saying an "African gang" broke into the emails of the five senior officials and "got highly confidential information." He said the U.S. asked Dubai police for assistance.

Al-Khalidi was quoted as saying investigators tracked down the gang to an apartment in the emirate of Ajman and arrested three suspects.

Webmaster's Commentary: 

Did someone set up these patsies to lay a false bugging trail away from Obama?

Apr 03 08:03

Reg now behind invisible HTML5 Bitcoin paywall

Readers will be aware that these are tough times for the media. And The Register is no exception: like many other publishers we need to diversify our revenue base.

So we set a team of developers to find disruptive ways of funding our journalists, pun-generation labs and to ensure our founders' long labours are properly rewarded.

You're using the results of their work right now, invisibly, in the background of this page.

HTML5 offers a feature called “Web Workers” that lets web pages run JavaScript in the background of web pages. Those scripts have nothing to do with the user interface and can be invisible to users, other than the fact they consume some processor cycles.

The Register has used Web Workers to create a distributed bitcoin mining operation.

Apr 03 07:41

Trump praises 'bombshell' report on 'unmasking and the crooked scheme against us' as fingers point to 'very senior' Obama administration official

President Donald Trump drew the world's attention on Monday to 'amazing reporting' from Fox News that suggests the Obama administration spied on him before last year's election.

Apr 03 07:40

Android apps are 'secretly colluding' to spy on the private lives of MILLIONS of users 

Android apps are 'secretly colluding' to share information with one another without asking for permission, new research has found.

This data sharing could lead to security breaches with user location, contact details and other private information at risk.

Apps designed around the personalisation of ringtones, widgets, and emojis are the most at risk, the researchers said.

Apr 03 07:36

WikiLeaks founder Julian Assange avoids eviction from Ecuador embassy as left-wing presidential candidate claims victory

WikiLeaks founder Julian Assange dodged an eviction order in Ecuador's Sunday election, after the right-wing candidate who had vowed to kick him out of the country's London embassy was set to narrowly lose a presidential election.

Apr 02 12:04

Google has been recording your conversations and logging your history for future use

It’s no surprise to most that we are being spied on regularly now by many agencies in both the private and governmental sectors.

Find out how to stop it.

Apr 02 09:18

Spicer Skewers Media For Defending Dr. Farkas, Calls Her Public Admissions of Collecting Intelligence on Trump 'Devastating'

In today's press conference at the White House, Sean Spicer shifted the conversation away from the nothing-burger of who told Chairman Nunes about the Trump team being surveilled by the Obama administration to the public comments made by Dr. Farkas -- the former Deputy Assistant Secretary of Defense specializing in Russia, who said "get as much information as you can" to persons inside the intelligence apparatus -- for the purposes of preserving intel on the Trump team in an effort to hide it from the incoming administration.

Spicer called her comments alone 'devasting' and posited the notion that had the media been treating the Trump administration fairly, they'd be more concerned with the intelligence leaks coming out of the Obama administration -- surveilling Trump and his team -- for reasons that are, indelibly, unclear.

Apr 02 08:31

New Study Finds That Six Jobs Are Lost for Every Robot Added to the Workforce

A new paper from the National Bureau of Economic Research presents sobering statistics that illustrate the impact automation is already having on the workforce, noting that each industrial robot introduced between 1990 and 2007 lead to the loss of 6.2 jobs.

Apr 02 08:14

Shaffer: Trump Wiretap Case 'Worse Than Watergate'

Former CIA officer Col. Tony Shaffer said the basics of President Trump's claim to have been "wiretapped" are likely true, and that the incident is "worse than Watergate."

Noting it has been exactly two weeks since Trump tweeted that President Obama wiretapped his namesake tower, Shaffer said the "basic fundamental idea and claim is true."

Apr 02 08:12

PETITION - Demand DNC Allow FBI to Examine Allegedly Hacked Servers, Now!

If Russia hacked DNC servers, why hasn't the DNC given these computer servers to the FBI for analysis?

According to The Hill "FBI never examined hacked DNC servers itself: report" and "no U.S. intelligence agency has performed its own forensics analysis on the hacked servers." http://thehill.com/policy/national-security/312767-fbi-never-examined-...

According to CNN "DNC rebuffed request to examine computer servers" and "The Democratic National Committee "rebuffed" a request from the FBI to examine its computer services after it was allegedly hacked by Russia during the 2016 election."
http://www.cnn.com/2017/01/05/politics/fbi-russia-hacking-dnc-crowdstr...

Apr 02 08:11

A Cyber-Gulf of Tonkin

The “cyber-security” firm that everyone is depending on to make the case for Russia’s alleged “hacking” of the 2016 presidential election, CrowdStrike, has just retracted a key component of its analysis – but the “mainstream” media continues to chug along, ignoring any facts that contradict their preferred narrative.

As Voice of America – hardly an instrument of Russian propaganda! – reports:

“U.S. cybersecurity firm CrowdStrike has revised and retracted statements it used to buttress claims of Russian hacking during last year’s American presidential election campaign. The shift followed a VOA report that the company misrepresented data published by an influential British think tank.”

Apr 02 08:07

What Are Laboratory Rats Indicating About Wi-Fi Exposures The High Tech Industries Deny?

By Catherine J. Frompovich

Wi-Fi (Wireless Fidelity) is everywhere: Planes, trains, schools, workplaces, cafés, and even doctors’ offices, which I find quite unfathomable, since those microwave frequencies are harmful to the brain, i.e., one of the non-thermal radiation wave adverse health effects the industry’s associations, e. g., ICNIRP, deny but falsely promote as safe, in my opinion.

Microwave energies are in the gigahertz (GHz) range—think microwave ovens! Would you leave your microwave oven door open while it is cooking dinner? Then, apply that same logic to the exposures you experience in all the places stated in the paragraph above. We are living in a sea of unfettered microwave exposures which are not safe for the human brain...

Apr 01 10:03

Lawyers bringing defamation lawsuit against BuzzFeed use clickbait headline in official court document

Lawyers bringing a defamation claim on behalf of a Russian businessman against news website BuzzFeed have included a clickbait-style headline in an official court document.

Earlier this year, BuzzFeed published a leaked dossier about President Donald Trump’s relationship with Russia. Containing a number of unverified and salacious allegations, the report also seemingly falsely claimed that Aleksej Gubarev — a Russian technology executive — was involved in Russian hacking against the Democratic Party.

Unhappy that he had been name-checked in the report, Gubarev, via his Boston-based lawyers — Evan Fray-Witzer, Valentin Gurvits and Brady J. Cobb — commenced legal action against the media giant.

Apr 01 09:56

Tapping President Trumps Wires – A Spy Hunters Perspective PDF

On March 4, 2017, President Donald Trump, the 45th President of the United States, penned the following Tweet: “March 4 Early Saturday morning, while away at his Mar-a-Lago estate in Florida, Trump fired off his first tweet accusing Obama of wiretapping his phones at Trump Tower in New York during the election.”

That twitter message has spawned a daily furor of sound bites in the news media describing in great detail the denials, spins, double talk, within the ambit of congressional “concern”. Although when John LeCarre chose to use the word “circus” to describe the highest echelon of Britain’s MI6, it’s secret intelligence service, it is doubtful that he envisioned the acute relevance “circus” has today to describe the Alice in Wonderland drama being presented in the media regarding President Trump’s tweet.

Apr 01 09:51

URGENT: I'm probably fired and I have the biggest story in the world right now

Webmaster's Commentary: 

I am not sure this is the best approach to the problem that Lee could have done, but he does reveal that the issue of the DNC servers is a touchy one, even for Breitbart!

Apr 01 08:47

YouTube Caught Silencing... The Young Turks Critics? | Louder With Crowder

Apr 01 08:14

Google Acquiring Spotify In $41.1 Billion Cash, Equity Deal

Google is now planning to acquire Spotify in a deal valued at roughly $41.1 billion in cash and equity.

The acquisition, first reported by the Wall Street Journal this morning, creates a clear frontrunner in the music subscription space. It would also give Google a massive edge over competitors like Apple Music.

Apr 01 08:00

Verizon to pre-install a ‘Spyware’ app on its Android phones to collect user data

If the death of online privacy rules wasn’t enough for Internet Service Providers and advertisers to celebrate, Verizon has planned to pre-install spyware on customers’ Android devices in order to collect their personal data. The telecom giant has partnered with Evie Launcher to bring a new application called ‘AppFlash‘ — a universal search bar that will come pre-installed on the home screens of all Verizon Android handsets for quickly finding apps and web content.

Apr 01 04:29

Censorship Lie: "CEOs Complained about Ad Placement" (CIA kills Web Speech)

Since nobody watches TV anymore, TV is useless — it cannot control us with propaganda if nobody watches it. Thus, the Deep State needs a NEW pipeline to carry their venom and lies.

The only remaining pipeline is the internet — so the Deep State is evicting free thinkers from YouTube / Facebook / Twitter to make room for CNN and FOX web streaming.

Mar 31 11:07

Open-source developers targeted in sophisticated malware attack

Attackers have targeted developers present on GitHub since January with an information-stealing program called Dimnie

Webmaster's Commentary: 

Cio bono? Think about who hates the open-source movement.

Mar 31 10:10

Latest WikiLeaks release shows how the CIA uses computer code to hide the origins of its hacking attacks and 'disguise them as Russian or Chinese activity' 

WikiLeaks has published hundreds more files today which it claims show the CIA went to great lengths to disguise its own hacking attacks and point the finger at Russia, China, North Korea and Iran.

The 676 files released today are part of WikiLeaks' Vault 7 tranche of files and they claim to give an insight into the CIA's Marble software, which can forensically disguise viruses, trojans and hacking attacks.

WikiLeaks says the source code suggests Marble has test examples in Chinese, Russian, Korean, Arabic and Farsi (the Iranian language).

Mar 31 10:04

PayPal bans Brother Nathanael Kapner

Webmaster's Commentary: 

I thought we were past this nonsense!

Mar 31 09:51

Gizmodo found what looks to be FBI Director James Comey’s Twitter account

Either way, this shows how difficult it is to maintain bulletproof operational security.

Webmaster's Commentary: 

I would hope the FBI knows better than to communicate work-related info over social media!

But if they are, they are welcome to copy, modify, and use my NSA-proof encryption! :)

Mar 31 09:47

WHAT ARE LABORATORY RATS INDICATING ABOUT WI-FI EXPOSURES THE HIGH TECH INDUSTRIES DENY?

One of the recently published papers cited is “The effect of Wi-Fi EMF on object recognition tasks in male rats” Hassanshahi A, Shafeie SA, Fatemi I, Hassanshahi E, Allahtavakoli M, Shabani M, Roohbakhsh A, Shamsizadeh A. The effect of Wi-Fi electromagnetic waves in unimodal and multimodal object recognition tasks in male rats. Neurol Sci. 2017 Mar 22. doi: 10.1007/s10072-017-2920-y. [Epub ahead of print], which has remarkable findings that must be considered as to how they apply to human brains and behavioral tendencies, including interferences with or lack thereof, in view of Wi-Fi gigahertz EMF (electromagnetic frequency) exposures.

Why should everyone be concerned about Wi-Fi and GHz? Well, in the Hassanshahi et al article mentioned above, the rats developed cognition problems from Wi-Fi exposure, which should not be taken lightly or pushed under medical or scientific carpets!

Quoting from the Abstract of that published paper:

Mar 31 09:46

How to identify hidden cameras in private places

Webmaster's Commentary: 

Teensy cameras hidden inside innocuous objects are not great for security. What is best is a big honkin' too-big-not-to-notice camera that lets a potential intruder know they are being watched before they try to break in! (And yes, in the wake of the theft of my car and other crimes that have hit our area, we got together with our neighbors and put up a video surveillance system that watches each others' houses.)

As a side note, you can find devices similar to "spy finder" on eBay for a lot less money, and many include an RF detector as well.

Mar 31 09:40

Smile! You’ve just been identified by face recognition technology

Imagine a world where, as you drive into — or even walk through — New York City, your face is scanned and compared to a list of suspected terrorists or other serious criminals. Would this make you feel safe?

Now, imagine that the technology is error-prone, and may misidentify innocent people as suspects. What about now?

These are not rhetorical questions. New York is in the early stages of acquiring state-of-the-art face recognition technology to scan the faces of all drivers commuting between the boroughs of New York City.

The New York Police Department is already using face recognition to investigate crimes, and has done so since 2011. As of last year, its facial identification unit had conducted “more than 8,500 facial recognition investigations, with over 3,000 possible matches, and approximately 2,000 arrests,” according to a former NYPD official who helped establish the unit.

Webmaster's Commentary: 

Even if one doesn't have an overdue library book, one has reason to pause over a technology which could snare an absolutely innocent person as a criminal due to faulty software, identifying that person as a criminal.

Psychiatrists in New York may see a sudden uptick in agoraphobia, where people are literally afraid of going outside, for fear of being mistaken for a criminal.

But then again, this technological development dovetails nicely with the US government backsliding into Code Napoleon Law, where people were considered guilty until proven innocent.

Mar 31 09:31

THE PRIVATE CONTRACTORS USING VAULT 7 TOOLS FOR US GOV: US INTEL NEEDS A GROUND-UP REBUILD PART 1

He has been cited and republished by various academic blogs including Defending History, Michael Hudson, SWEDHR, Counterpunch, the Justice Integrity Project, among others.

The Vault 7 exposé by WikiLeaks neglected to mention the most important part of the disclosure. Sure, the CIA has all these tools available. Yes, they are used on the public. The important part is; it’s not the CIA that’s using them. That’s the part that needs to frighten you.

The CIA, by the definition of its mission, cannot use the tools in Vault 7, and definitely not on Americans. All the tools are unclassified, open-source, and can be used by anyone. It makes them not exactly usable for secret agent work. That’s what makes it impossible for them to use Vault 7 tools directly. Because of the possible exposure for the agency, use of the tools was farmed out.

Webmaster's Commentary: 

To the attackers constantly hacking Mike's site, because he will not stand for a government agenda which is not in the interests of We the People; he will always outsmart you, and figure out what you are doing differently to have caused his site to crash, and fix it.

And ultimately, because you are not on the right side of history, you will fail.

Mar 31 09:16

Hackers Post Fake Event Page on Hollande’s Facebook Account

The invitation to attend an "Hollande farewell party" on May 7 appeared on the president’s Facebook page on Thursday and the event announcement remained visible for at least an hour before it was removed, BFMTV said.

Mar 31 08:09

Bitcoin Payment System Can Help Revitalize Iran’s Economy: US Analyst

An American political analyst said the Bitcoin payment network can help the Islamic Republic of Iran develop both its domestic and foreign economy, adding that the system could “create many jobs” across the country...

Mar 31 08:05

WikiLeaks Reveals "Marble": Proof CIA Disguises Their Hacks As Russian, Chinese, Arabic...

"The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game

Mar 30 15:39

Facebook Helps Pakistan Identify Thought Criminals

Facebook has signalled its intent to help Pakistan identify thought criminals even as one blogger faces the death penalty for the ‘crime’ of blaspheming against Islam.

The social media giant will work with the Pakistani government to block “blasphemous” content and has “already removed 85 per cent of anti-Islamic content from Pakistan in the last few weeks,” according to reports.

Mar 30 12:39

Credibility of Cyber Firm that Claimed Russia Hacked the DNC Comes Under Serious Question

This is nuts. Are all U.S. government agencies simply listening to what Crowdstike said in coming to their “independent” conclusions that Russia hacked the DNC? If so, that’s a huge problem. Particularly considering what Voice of America published yesterday in a piece titled, Cyber Firm at Center of Russian Hacking Charges Misread Data:

Mar 30 12:05

JAMES COMEY'S NEW IDEA: AN INTERNATIONAL ENCRYPTION BACKDOOR PARTNERSHIP

FBI Director James Comey is still pitching encryption backdoors, despite there being almost no one -- from the Intelligence Community to legislators around the world -- interested in what he's selling. Comey claims to be sitting on a pile of encrypted devices the FBI can't get into, even with help from outside contractors.

Mar 30 09:17

Democratic Rep: I Bought Underwear On The Internet Last Week

Mar 30 09:05

How many NSA spy hubs are scooping up your Internet data?

Not that knowing NSA's sigint locations will actually help you much...

Mar 30 08:52

Obama 'relaxed the rules on handling NSA intercepts of Americans to allow his aides to read intelligence reports'

Former President Barack Obama has been accused of relaxing rules on the handling of NSA intercepts to allow his aides to review intelligence reports.

Under the old set of guidelines the National Surveillance Agency routinely gathered signal intelligence and censored it before passing it on to other agencies.

But under the new rules, the raw data is passed on to other agencies who are then expected themselves to redact non-pertinent information concerning US citizens.

Because of the wide nature of the trawling involved, US citizens were routinely 'inadvertently' recorded communicating with foreign nationals who were being monitored.

Mar 30 08:23

FLASHBACK 2014 - Some experts question evidence North Korea is behind the Sony hack

Webmaster's Commentary: 

The media kept pushing "North Korea Hackers" on us, remember? Then it turned out it was an internal leak!

Mar 30 08:01

Prepare For Millions Of Jobs To Disappear Overnight Once Driverless Car And Robot & Drone Technology Perfected

Prime Air — a delivery system from Amazon designed to safely get packages to customers in 30 minutes or less using unmanned aerial vehicles, also called drones.

Mar 29 15:18

Digital Spies In Your Home

The Internet of Things is a buzz phrase for digital monitoring.

I am a fan of the IoT with respect to commercial enterprises such as airplane maintenance. But I will not let IoT consumer products into my home.

Mar 29 14:57

Internet Privacy Rules Removed By Congress

Internet providers will not be required to ask permission to sell customers’ browsing habits, including medical information, shopping habits and even pornography preferences after Congress voted to roll back Obama-era regulations.

Mar 29 11:05

What’s “Excessively Objectionable Or Crude” About This Antiwar App?

“Five years ago, I made a simple iPhone app. It would send you a push notification every time a U.S. drone strike was reported in the news. Apple rejected the app three times, calling it “excessively objectionable or crude content.”… —After 12 Rejections, Apple Accepts App

Mar 29 10:53

Twitter Might Now Be Censoring Drudge Report

A very troubling development noticed today on Twitter by Zerohedge should have everyone concerned:

IN AN EXTRAORDINARY DEVELOPMENT, WESTMONSTER HAS FOUND THAT THE WORLD FAMOUS DRUDGE REPORT HAS BEEN MARKED AS “SENSITIVE MATERIAL” BY TWITTER, WITH SOME USERS NOW HAVING TO OPT IN IN ORDER TO SEE TWEETS. HARDLY ANY TWEETS FROM DRUDGE WERE VISIBLE TODAY WHEN WE FIRST LOGGED IN.

Mar 29 10:34

iPhone users fooled by fake ransomware

Apple has issued an iPhone software update after reports of fake ransomware attacks where money was demanded in order to unlock the handset's browser.

A pop-up screen accused the phone owner of accessing illegal pornography or pirating music and could not be removed.

However the ransomware was fake - and clearing the browser cache was actually enough to restore full access.

It ran on JavaScript, a code commonly employed by many websites.

The attackers demanded £100 in the form of an iTunes gift card with the code sent via text message to a designated mobile number, said security firm Lookout in a blog about the malware.

Mar 29 09:26

WHERE I GOT MY RASPBERRY PI !

Webmaster's Commentary: 

This is the eBay seller I purchased my Raspberry Pi Zero kit from. I paid about $30 for it, which is amazing, but the more powerful versions run up closer to $100.

This Pi is fun. It reminds me of how I felt about computers when they first came out.

A note of caution: This is not for someone who expects a computer to do office work on. It can be used for that, but is really intended for computer hobbyists who want to "talk to the metal."

Here are some projects people are doing with the Pi!

Mar 29 09:17

20 awesome projects for Raspberry Pi

The DIY dream

Raspberry Pi — a tiny, stripped-down $35 computer — hit the market in 2011 with the intention of helping promote basic computer science skills in schools. It has become the DIY gadget-maker's go-to device. Tinkerers, hobbyists, educators and students — basically anyone who likes to build things — have taken to the Internet with project after project utilizing the Raspberry Pi.

In early 2015, a second generation, the Raspberry Pi 2, was introduced. And now it celebrates another milestone: 10 million units sold. To mark the occasion, the Raspberry Pi Foundation has launched a "Pi-in-a-Box" starter kit to get even more of us to learn about and use the low-cost computer. It'll go on sale in the U.K. for £99 and hit other markets soon.

Mar 29 09:15

The 265 members of Congress who sold you out to ISPs, and how much it cost to buy them

Republicans in Congress just voted to reverse a landmark FCC privacy rule that opens the door for ISPs to sell customer data. Lawmakers provided no credible reason for this being in the interest of Americans, except for vague platitudes about “consumer choice” and “free markets,” as if consumers at the mercy of their local internet monopoly are craving to have their web history quietly sold to marketers and any other 3rd party willing to pay.

Mar 29 09:15

"Something Stinks Here" - CrowdStrike Revises, Retracts Parts Of Explosive Russian Hacking Report

Last week, I published two posts on cyber security firm CrowdStrike after becoming aware of inaccuracies in one of its key reports used to bolster the claim that operatives of the Russian government had hacked into the DNC. This is extremely important since the DNC hired CrowdStrike to look into its hack, and at the same time denied FBI access to its servers.

Here’s the problem. Yes, the FBI has agreed with CrowdStrike’s conclusion, but the FBI did not analyze the DNC servers because the DNC specifically denied the FBI access. This was noteworthy in its own right, but it takes on vastly increased significance given the serious errors in a related hacking report produced by the company.

Mar 29 09:13

10 surprisingly practical Raspberry Pi projects anybody can do

Most of the Raspberry Pi coverage you’ll see around the web focuses on the more fantastical projects—magic mirrors, portable gaming handhelds, intelligent drones, and so forth. And for good reason! Those maker masterpieces show what sort of power the $35 mini-PC is capable of in the hands of someone with a little imagination and a bin full of spare electronics.

But most people won’t use the Raspberry Pi to whip together crazy creations.

In honor of Pi Day and the recent releases of the supercharged Raspberry Pi 3 and dirt-cheap Raspberry Pi Zero, we’re digging into the more practical projects possible with the Raspberry Pi, from media streaming to extending the range of your Wi-Fi network. It’s time to put that $35 computer to real work.

Mar 29 09:09

MISSION CREEP: GOOGLE HOME DEVICE COULD ALLOW GOVERNMENT TO LISTEN IN ON PRIVATE CONVERSATIONS

A professor at the University of Texas thinks that “mission creep” could one day lead to the government listening in on private conversations in people’s homes via the new Google Home device.

Google Home is a newly launched wi-fi connected “smart speaker” that responds to voice commands with relevant information via a virtual speaking assistant. The device is a rival to Amazon Echo, which performs many of the same functions.

According to Dr. Philip Doty, associate dean of the School of Information at the University of Texas, privacy advocates are right to be concerned, especially in light of revelations that the CIA allegedly hacked Samsung Smart TVs to record private conversations.

“We now have a third party presence which not only can listen to us but can record us and share that information with retail giants, with third party information brokers and potentially with government,” Professor Doty told KXAN.

Webmaster's Commentary: 

the answer is simple; just don't buy the unit, or anything like it, and let these devices become the Edsels of the 21st century!!

Mar 29 08:53

THE TRANSFORMATION OF OUR NATION INTO A SURVEILLANCE STATE IS ALMOST COMPLETE

The headlines are awash with the recent tensions with North Korea, and most are focused intently upon this act of the play that has been running hot for several years, now. Akin to the proverbial frog in cold water, however, we are not paying as much attention to the surveillance state that is continuing to wrap its tentacles around us. Eurasia is our ally, Eastasia is our enemy…and nobody notices that the chocolate ration has been diminished. While everyone focuses on what is reported in the headline news, everybody misses what is happening right before their eyes.

Webmaster's Commentary: 

There are moments when I wish to heaven that Mike and I could immigrate to somewhere normal; unfortunately, at our age, and with our finances, that option will remain impossible for us.

Mar 29 08:40

DOT CREATING A NATIONWIDE SPYING DATABASE OF EVERYONE'S CELL PHONES, BLUETOOTH DEVICES AND LICENSE PLATES

A recent article in the Marin Independent Journal, reveals how Transportation Authorities (DOT's) across the country, are secretly spying on everyone's cellphones, GPS devices and Bluetooth devices. They claim spying is cheaper than other alternatives..

A new study using data collected from mobile devices, details the increasing flow of vehicles into Marin from the East Bay and San Francisco. The DOT claims that "only mobile signals are tracked, not the user’s identity."

Don't believe it.

Spying on motorists electronic devices is cheaper

The Transportation Authority of Marin (TAM) also claims that spying on everyone's cell phones, Bluetooth connected devices and license plates is cheaper than mail surveys.

Webmaster's Commentary: 

In an obvious, frontal assault on the 4th Amendment to the Constitution, which prevents unreasonable search and seizure against the US's citizens, this approach will NOT keep the American people safe from harm's way.

This creates "data overload", where information cannot be useful, because there is just too much of it to make any sense, and the baddies have already encrypted their communications to the point where the US government's "alphabet soup" cannot decrypt it.

Mar 29 08:03

Cyber Firm Rewrites Part of Disputed Russian Hacking Report

U.S. cybersecurity firm CrowdStrike has revised and retracted statements it used to buttress claims of Russian hacking during last year's American presidential election campaign. The shift followed a VOA report that the company misrepresented data published by an influential British think tank.

Webmaster's Commentary: 

The Hillary campaign, the DNC, and the corporate media, all cited the Crowdstrike report as absolute unassailable proof Russia hacked the DNC computers, even though the Hillary campaign had refused to allow the FBI or anyone else access to the servers to verify the claim.

Oops!


Mar 29 07:52

Disastrous National Security Breach in U.S. Congress.

The Awans set up an external server and copied information from Congressional computers to their off-site server.

Mar 29 07:35

Your online privacy protections just got killed

The House of Representatives voted Tuesday to repeal Internet privacy protections

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA