May 16 16:52

This Blockchain Project is Decentralizing All The Things

In this video, Vin Armani talks with Swarm City contributor Matthew Carano about how they’re building a platform to decentralize everything. They set out to create a decentralized ride-sharing company after their town banned Uber and the project turned into so much more. Find out how it works below:

May 16 15:42

Swedish Pensioner Prosecuted For ‘Hate’ After Accusing Migrants Of Torching Cars On Facebook

A 70-year-old Swedish woman in Dalarna is being prosecuted for hate speech after claiming on Facebook she saw migrants defecating in the streets and setting fire to cars.

According to the prosecution, the woman “expressed a disparaging view of refugees” on Facebook. She stands accused of having taken to the social media website in early July 2015 to make the “derogatory” post, alleging that migrants “set fire to cars, and urinate and defecate on the streets”.

May 16 15:07

Hackers Seize Unreleased Disney Film, Demand ‘Huge’ Bitcoin Ransom – Report

The latest movies in the Disney franchises “Pirates of the Caribbean” and “Cars” are set to hit the big screen this summer, but Disney CEO Bob Iger is reportedly warning that hackers are holding an unreleased Disney film for ransom, to be paid in Bitcoin.

May 16 13:08

Victims Paid WannaCry Ransom Hackers Less Than $70k, No Data Recovered – White House

WannaCry, the global cyber ransomware attack that infected more than 300,000 computers in 150 countries, yielded the hackers less than $70,000, and no federal computer systems were infected, according to the White House.

May 16 12:06

Murdered DNC Staffer Seth Rich Shared 44,053 Democrat Emails With WikiLeaks: Report

For the past several months, Democrats have based their "Resist 45" movement on unsubstantiated assertions that the Trump campaign coordinated with Russian intelligence officials to undermine the 2016 Presidential Election thereby 'stealing' the White House from Hillary Clinton. Day after day we've all suffered through one anonymously sourced, "shock" story after another from the New York Times and/or The Washington Post with new allegations of the 'wrongdoing'.

But, new evidence surfacing in the Seth Rich murder investigation may just quash the "Russian hacking" conspiracy theory. According to a new report from Fox News, it was former DNC staffer Seth Rich who supplied 44,000 DNC emails to WikiLeaks and not some random Russian cyber terrorist, as we've all been led to believe.

May 16 11:57

The Exponential Growth of Insecurity

There is no such thing as cyber security. The only choice is more security or less security, as the recent hack of the National Security Agency demonstrates.

May 16 11:31

Claims of North Korea Links to Cyber Attack ‘Well Short of Proof’

Researchers investigating last week’s cyber attacks involving the WannaCry ransomware say that early versions of the software had some code in common with past attacks by the “Lazarus Group,” which some officials have accused of being North Korean hackers.

The Lazarus Group was behind a handful of past attacks, most notably the Sony hacking incident of 2014, which officials attributed to North Korea primarily because it came around the release of the movie The Interview, which involved a plot to kill North Korea’s leader.

The researchers who noted the similar code conceded that copying snippets of code between hacker groups is not uncommon, and that this was “well short of proof” of an actual relationship between the two. Indeed, most of the WannaCry code was a copy of exploits developed by the NSA.

Webmaster's Commentary: 

It appears that those in the bowels of power in the USSA (the Unhinged, Surveilled States of America), are desperate for ANY accusation which might "fly' in public opinion in terms of getting it to go along with a war against North Korea, which may well escalate into a war against China.

They seem to have missed the point, thank you very much, that Americans are profoundly war-weary, and war-skeptical at this point in their history.

And it is very damning that no 16 year old American teenager has ever lived through a time in their lives, when the US government hasn't been at war with SOME foreign power or another, somewhere else in the world.

May 16 10:45

CAGE director in legal battle to protect crucial evidence in torture caserrests

While flying back home Muhammad Rabbani, CAGE's International Director, was stopped by border police under Schedule 7 powers. They asked for his password and he declined. Now he's being threatened with prison.

Mr Rabbani refused in order to protect crucial evidence in a torture case and to take a stand against schedule 7.

May 16 10:29

Confirmed: DNC Emails LEAKED … Not Hacked

We’ve reportedly documented that the DNC emails were leaked … not hacked.

(And the “evidence” that it was the Ruskies has collapsed.)

The head of Wikileaks – the organization which published the leaked DNC emails – has previously hinted that the leaker was DNC insider Seth Rich.

Today, the local Washington DC Fox news channel reports that the Rich family’s private investigator – a former Homicide Detective in Washington DC and white collar criminal investigator for the Attorney General of the State of Ohio – says that evidence on Rich’s computers proves that he communicated with Wikileaks:

May 16 09:53

Facial recognition installed in female university dormitory in China – to keep out ‘strangers’

ne of China’s top universities has installed facial recognition in a female dormitory to ensure the building is off limits to non-residents.

The scanners were introduced by Beijing Normal University last month over security concerns, and will be rolled out to another nine female dormitory buildings if they prove successful.

Facial recognition is becoming increasingly common in China, where it has been installed in ATM machines, KFC restaurants and even public toilets, as a means of clamping down on loo-roll theft.

May 16 09:32

Security experts: WannaCry ransomware attack may just be getting started

The WannaCry ransomware attack that hit nations around the world over the weekend may just be warming up, according to security experts.

May 16 08:53

WannaCry ransomware shares code with North Korea-linked malware – researchers

The source for WannaCry ransomware, which has spread to 150 countries, may be Pyongyang or those trying to frame it, security analysts say, pointing to code similarities between the virus and a malware attributed to alleged hackers from North Korea.

May 16 08:49

Horrified mother, 27, discovers Google Street View had published NAKED images of her daughters, four and three, playing in a paddling pool outside their home

Google Street View published naked images of two naked children playing outside their house, leaving their mother horrified.

Laura Haslam, 27, was outraged after finding out daughters Brooke, four, and Eva, three, were snapped by internet giant Google Maps outside their fenced-off home in Poulton-Le-Fylde, Lancashire.

The youngster's faces were blurred in the images - but their naked bodies could clearly be seen using the website's 'street view' option as users trawl along the street.

May 16 07:44

DocuSign forged – crooks crack email system and send nasties

Electronic signatures outfit DocuSign has warned world+dog that one of its email systems was cracked by phisherpholk.

The company has of late reported an extensive phishing campaign that sees messages with the subject line “Completed *company name* - Accounting Invoice *number* Document Ready for Signature” land in plenty of inboxes. As is the way with such things the mail carried a link to a Microsoft Word document bearing “macro-enabled-malware.”

May 16 07:41

Military Seeks Machine Learning To Interpret Big Data For A.I. Warfare

By Nicholas West

Even as the military has downplayed its willingness to delegate lethal decision making to artificial intelligence, it appears to be developing systems which could do exactly that.

The rise of Big Data has been a boon for the military and surveillance industries, as the exponential increase in computer processing power has enabled the collection and storage of information on a scale and speed never before seen. However, with that collection and storage also comes the need to meaningfully analyze it. So far, that has been a restriction which is not proving easy to overcome.

Nowhere is this challenge better highlighted than in warfare...

May 16 07:41

Why Microsoft's Windows game plan makes us WannaCry

In the circular firing squad of WannaCrypt, the world's largest recorded ransomware outbreak, nobody looks good.

Not end-users for clinging to dated and unprotected Windows PCs despite warnings, not the government whose National Health Service saw 61 organisations compromised, and certainly not Microsoft – the actual author of Windows.

Just last night, The Register revealed that even though Microsoft had been griping about NSA exploit stockpiles at the weekend, it had also been sitting on its own stockpile ...of patches: Friday's WinXP fix was built in February.

May 16 07:38

Cryptocurrency miner found armed with same exploits as WannaCrypt

The now infamous Windows vulnerability (MS17-010) exploited by the WannaCrypt ransomware has also been abused to spread another type of malware, specifically a cryptocurrency miner.

The Adylkuzz campaign predates WannaCry by severals day and may even have limited the spread of last week’s WannaCry infection, according to security firm Proofpoint.

"Initial statistics suggest that this attack may be larger in scale than WannaCry[pt], because this attack shuts down SMB networking to prevent further infections with other malware (including the WannaCry[pt] worm) via that same vulnerability," according to Proofpoint.

Targeted machines are used to mine for the Monero cryptocurrency. Monero is an alternative to Bitcoin recently adopted by the AlphaBay darknet market to trade in drugs, stolen credit cards, and counterfeit goods.

May 15 20:05

WinAntiRansom Review

WinAntiRansom is an excellent program that provides better protection against ransomware than any of the other programs designed for that purpose.

With better functionality comes more complexity often, but this is not the case here as everything is handled automatically for the user. This does not mean that you have to give up control though, as you can monitor and manage the activity at any time, and enable advanced mode for more control.

The program has been designed to block ransomware, but there is little reason why it won't stop other malware as well dead in its tracks, especially those malicious programs that share similarities with ransomware.

It is a complementary security tool all in all that runs well alongside traditional antivirus software.

May 15 17:19

BEX ALERT - Researchers see possible North Korea link to global cyber attack

Cyber security researchers have found technical clues they said could link North Korea with the global WannaCry “ransomware” cyber attack that has infected more than 300,000 machines in 150 countries since Friday.

Symantec and Kaspersky Lab said on Monday some code in an earlier version of the WannaCry software had also appeared in programs used by the Lazarus Group, which researchers from many companies have identified as a North Korea-run hacking operation.

“This is the best clue we have seen to date as to the origins of WannaCry,” Kaspersky Lab researcher Kurt Baumgartner told Reuters.

May 15 16:33

Who’s Responsible For The Ransomware Hack?

What should we make of the global ransomware attacks which happened today?

We’ve documented that the intelligence services intentionally create digital vulnerabilities, then intentionally leave them open … leaving us exposed and insecure.

Washington’s Blog asked the highest level NSA whistleblower ever* – Bill Binney – what he thinks of the attacks.

May 15 14:55

Government Is the Cause of—Not the Solution to—the Latest Hacking Outbreak

Privacy and cybersecurity experts and activists have been warning for ages that governments have their priorities all wrong. National security interests (not just in America but other countries as well) comparatively spend much more time and money attempting to breach the security systems of other countries and potential enemies than they do bolstering their own defenses. Reuters determined, with the information from intelligence officials, that the United States spends $9 on cybersurveillance and government hacking for every $1 it sends on defending its network systems.

May 15 13:54

Ransomware Is Tip Of The Iceberg: “You Could See 90% Of Americans Die As A Result Of A Prolonged Power Outage Because The Grid Gets Hacked”

The Ransomware that began spreading across the globe on Friday is still going with more computers reportedly being affected today by new variants of the virus.

What we’ve learned is that the attack hasn’t just taken down personal computers, but core government and business networks affecting everything from health care systems and transportation in Europe, to ATM withdrawals in China.

It’s massive, to be sure. But in the grand scheme of things, up to this point, it has been a fairly minor inconvenience.

May 15 10:17

It Is Not Over - WannaCry RansomWare Attack – There Is A Version 2.0 – Kill Switch Only Slows It Down.

The update on the WannaCry RansonWare Attack is: Multiple security researchers have claimed that there are more samples of WannaCry out there, with different ‘kill-switch’ domains and without any kill-switch function, continuing to infect unpatched computers worldwide.

May 15 09:35

AMI Smart Meters Defined In Four Minute Cartoon

By Catherine J. Frompovich

To most utility customers, AMI Smart Meters may be an unknown entity, even though they have one on their electric service, and probably on their natural gas and water utilities too! The goal is to have at least 90 million AMI Smart Meters installed in the USA by 2020. Larger cities already are AMI SM-retrofitted...

May 15 09:12

Worried About 'WannaCry'? You Should Have Listened To Julian Assange

The virus does not attack modern computer operating systems, it is designed to attack the Windows XP operating system that is so old, it was likely used in offices in the World Trade Center prior to September 11 2001, when the buildings collapsed. Windows XP was first released on 25 August, 2001.

Furthermore, early vulnerabilities in modern Windows systems were almost instantly patched up by Microsoft as per the fact that such operating systems are constantly updated.

The obsolete XP system is simply out of the loop.

A child born on the release date of Windows XP is now on the verge of his or her 17th birthday. Feeling old yet?

The fact of the matter is that governments and businesses around the world should not only feel old, they should feel humiliated and disgraced.

Webmaster's Commentary: 

Let's be fair. XP was a great OS by the time Microsoft pulled the plug. All the following Windows have been disappointing. I would have stayed with XP if I could have.

May 15 09:04

Bank of China ATMs Go Dark As Ransomware Attack Cripples China

One place which seemed to have emerged relatively unscathed from the global cyber-havoc (aside from the US, which is ironic as it is the U.S. NSA that was created the hacking software) has been China. Or so it seemed due to lack of media reports from the mainland. Now, courtesy of, and its twitter account, we have the first visual evidence that China too was materially impacted, to the point where not only local ATMs had been taken offline, but Chinese traffic police, immigration authorities and various public security bureaus and schools have suspended normal work until the malware threat is resolved.

May 15 09:02

This Is What Scares Israel’s Army Far More Than Missile Attacks

Responding to the massive global cyberattack that used stolen NSA spying tools and affected some 200,000 Windows servers in more than 200 organizations, including large medical networks, a senior Israeli Defense Force (IDF) official suggested that hacking is more dangerous than missile attacks.

May 15 09:02

‘Like letting Tomahawk missiles get stolen’: Microsoft slams NSA mishandling of exploits

Microsoft has criticized the NSA for their major role in spreading the WannaCry ransomware epidemic which paralyzed hundreds of thousands of computers worldwide. The tech giant urged governments to use and store their cyber warfare tools responsibly.

“We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world,” Microsoft President and Chief Legal Officer Brad Smith said in a blog post on Sunday. “This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem.”

May 15 08:55

Theresa May’s Conservatives threaten social media crackdown if elected

If Theresa May and the Conservative Party retain control of the government in the June 8 U.K. elections, they vow to beef up online protections for U.K. citizens, threatening fines against social media companies who fail to safeguard their users.

They want to introduce a new measure that could fine or punish internet firms which fail to adequately flag and take down content harmful to minors or “direct users unintentionally to hate speech, pornography or other sources of harm,” according to a press release.

“The internet has brought a wealth of opportunity but also significant new risks which have evolved faster than society’s response to them,” May said. “We want social media companies to do more to help redress the balance and will take action to make sure they do.”

Webmaster's Commentary: 

Prime Minister May, a word, please: do those "other sources of harm" (a phrase so ambiguous, one could pilot a frigate through it), include telling the truth about what the British government is actually doing, which don't even get a breath's worth of of coverage at the bbc, like the following headlines?!?

Does UK’s lucrative arms trade come at the cost of political repression?

Most Britons believe selling arms to Saudis is unacceptable

href="">UK’s £100m weapons deal with Turkey ‘turns blind eye to rights abuse’

href="">British Foreign Policy and UK Weapons Trade

Because when foreign policy objectives (which seem to include the UK's arming some of the most repressive governments in the world)align with economic opportunity for your very lucrative weapons industry, the outcome is generally civilian slaughter and genocide, as we are seeing with Yemen.

I would imagine that these stories are those you don't want your brother and sister Brits worrying their little heads about, and would scream that these stories constitute the "other harm" to which this legislation refers.

Prime Minister May, the UK gave the world the Magna Carta; you can do far better than this horrifically worded, loose, one size fits all, legislation, which intends to repress honest, fact-checked free speech.

May 15 08:52

CYBER ATTACK: French carmaker Renault’s biggest factory closed over ransomware virus

FRENCH carmaker Renault announced its largest factory, which is located in the northern French town of Douai, would remain closed on Monday to prevent the spread of a global cyber attack that hit its computer systems over the weekend.

May 15 08:37

Defence Secretary unable to deny Trident nuclear submarines run on same outdated software hackers exploited to cripple NHS systems

Defence Secretary Michael Fallon has refused to deny that Britain’s nuclear submarines use the outdated Windows XP program amid the ongoing WannaCry ransomware attack.

May 15 08:36

Putin: Malware created by intelligence services can backfire on its creators

The ransomware that hit computers across the world could backfire on its creators, Russian President Vladimir Putin said in Beijing, adding that the implications of the global hack attack need to be discussed on a political level.

The ransomware was apparently developed in the US, Putin said. “Microsoft’s management has made it clear that the virus originated from US intelligence services,” the Russian president stressed.

May 15 08:26

Fake URL gets users to install adware

Next time someone links you to, make sure you take a second look. There’s some adware currently circulating around the web by tricking users to visit a ‘????????.com’ domain instead. Yes, those are different URLs – the fake URL uses characters from the Cyrillic alphabet.

IDN Safe

IDN Safe is a browser extension which blocks internationalized domain names to prevent you from visiting probable fake sites.

May 15 08:22

'Jaff' argh snakes: 5m emails/hour ransomware floods inboxes

The Necurs botnet has been harnessed to fling a new strain of ransomware dubbed "Jaff".

Jaff spreads in a similar way to the infamous file-encrypting malware Locky and even uses the same payment site template, but is nonetheless a different monster. Attached to dangerous emails is an infectious PDF containing an embedded DOCM file with a malicious macro script. This script will then download and execute the Jaff ransomware.

Locky – like Jaff – also used the Necurs botnet and a booby-trapped PDF, Malwarebytes notes.

May 15 08:19

74 countries hit by NSA-powered WannaCrypt ransomware backdoor: Emergency fixes emitted by Microsoft for WinXP+

In response, Microsoft has released emergency security patches to defend against the malware for unsupported versions of Windows, such as XP and Server 2003, as well as modern builds.

May 15 08:16

More UPNP woes: Crashable library bites routers and software

It's a patch for vendors and developers, but it could be nasty: there's a bug in a Universal Plug'N'Play (UPNP), used in a wide range of black-box devices.

The bug, in miniupnpc, allows the lightweight UPNP library to be crashed by an attacker – and while the discoverer only confirmed its risk as a denial-of-service vector, library crashes always carry at least the potential that an attacker could find a way through to a shell.

The library in question pops up all over the place: as well as broadband routers, the bug was tested against the bitcoind Bitcoin daemon, the qBittorrent open source alternative to uTorrent, and a C++ based Ethereum client.

May 15 07:29


By year’s end, the Pentagon wants computers to be leading the hunt for Islamic State militants in Iraq and Syria, through turning countless hours of aerial surveillance video into actionable intelligence.

May 15 07:23

FLASHBACK - Five Eyes spying alliance reportedly gather in NZ for secret surveillance conference

Officials from some of the top international government spy agencies have flocked to New Zealand’s Queenstown for a secretive meeting of the Five Eyes spying alliance between the US, UK, Australia, Canada and New Zealand.

The secretive meeting is expected to bring FBI director James Comey and CIA chief Mike Pompeo together with the top officials from the Australian, Canadian, UK and New Zealand intelligence and security agencies.

Webmaster's Commentary: 

Was this the birthplace of WannaCry?

May 15 07:21


Over 200 applications on the Google Play store contain software which uses inaudible sounds from TV commercials to obtain data about the end user. The developer, Silverpush, abandoned and denounced the intrusive software a year ago, but are unable to stop application developers from using their open-source toolkit.

Webmaster's Commentary: 

How bloody wonderful!!

Just what all Android users least expected when they bought their phones for all the neat things it could do!

May 15 07:15

WikiLeaks publishes “AfterMidnight” and “Assassin”, two CIA malware frameworks for the Microsoft Windows platform.

“AfterMidnight” allows operators to dynamically load and execute malware payloads on a target machine. The main controller disguises as a self-persisting Windows Service DLL and provides secure execution of “Gremlins” via a HTTPS based Listening Post (LP) system called “Octopus”. Once installed on a target machine AM will call back to a configured LP on a configurable schedule, checking to see if there is a new plan for it to execute. If there is, it downloads and stores all needed components before loading all new gremlins in memory. “Gremlins” are small AM payloads that are meant to run hidden on the target and either subvert the functionality of targeted software, survey the target (including data exfiltration) or provide internal services for other gremlins. The special payload “AlphaGremlin” even has a custom script language which allows operators to schedule custom tasks to be executed on the target machine.

May 15 07:14

Cyber Attacks Show Vulnerability of Digital Systems and Digital Currencies

– Cyberattacks expected to spread today in “second phase”
– UK intelligence says scale of threat significant
– Microsoft slams NSA for letting hacking tools cause global malware epidemic
– Ransomware attack already crippled more than 200,000 computers in 150 countries
– 1.3 million computer systems believed to be at risk
– Europol warns many computer systems simply won’t start
– Businesses, banks and government agencies around world told to prepare
– Renault, FedEx among companies affected by cyber-attack
– Banks in China including ATMs were affected
– Hackers could shut down banks and cut off power and water supplies
– “Biggest threat to civilisation” since the Second World War – Cyber security expert
– Risks posed to digital deposits and digital wealth are the “new case for gold”

May 15 07:12

Microsoft blames U.S. stockpiled vulnerability after WannaCry ransomware attack

Microsoft on Sunday said a software vulnerability stolen from the U.S. National Security Agency has affected customers around the world, and described the spread of the WannaCry/WannaCrypt ransomware on Friday in many countries as yet another example of the problems caused by the stockpiling of vulnerabilities by governments.

Referring to the attack as a “wake-up call,” Microsoft’s President and Chief Legal Officer, Brad Smith wrote in a blog post that governments have “to consider the damage to civilians that comes from hoarding these vulnerabilities and the use of these exploits.”

May 15 07:11

New WannaCrypt ransomware variant discovered in the wild

Following reports of the ransomware attack across the UK, researchers soon discovered instances of the same malware being used in thousands of attacks in 150 countries at last count, including the UK, Russia, and Spain. It is believed the ransomeware has claimed at least 200,000 victims.

Researchers have warned that more attacks may be on the way as the first wave struck on Friday, and in addition, new variants are appearing in the wild which could make fighting the ransomware even more complicated.

May 15 07:09

Ransomware attack: The second wave is coming, so get ready now

The global ransomware attack that caused chaos could spring back to life again as workers return to the office, experts have warned.

While ransomware has been a growing menace for some time, this particular attack is without parallel, largely because the ransomware was combined with a worm-like functionality that allowed the infection to spread rapidly from PC to PC.

The lightning spread of the WannaCrypt ransomware attack was felt worldwide last week, causing problems for thousands of private and public sector organisations across dozens of countries on Friday, and forced hospitals in the UK to cancel treatment and resort to pen and paper. The ransomware has also caused problems in Germany, Russia, the US, and Spain.

Webmaster's Commentary: 

"It's all North Korea's fault. Honest! And Russia helped them. And China. And Iran; don't forget Iran. We have to bomb them now." -- Official White Horse Souse

See VIRTUAL 9-11: Will the US & Israel Hack US Computers and Falsely Blame It On Iran or Syria or Russia or China (or at least to stop us saying bad things about Hillary)?

May 15 06:52


Over 200 applications on the Google Play store contain software which uses inaudible sounds from TV commercials to obtain data about the end user. The developer, Silverpush, abandoned and denounced the intrusive software a year ago, but are unable to stop application developers from using their open-source toolkit.

May 14 09:20

Nothing is real: How German scientists control Putin's face

Webmaster's Commentary: 

Another reason you cannot trust what you see on corporate media.

May 14 08:42

British IT expert, 22, who lives with his parents reveals how he stopped the global cyber attack that wreaked havoc on the NHS as he warns he is already fighting hackers trying to unleash a NEW threat

The UK blogger who discovered a 'kill switch' that has slowed the spread of a virus wreaking havoc across the globe has revealed that the world is facing a fresh cyber attack from malicious hackers who are trying to sabotage the fix.

The 22-year-old 'accidental hero' - who lives at home in the south of England with his mother and father - spotted a loophole in the code that meant he could block the virus.

He says he inadvertently halted the ransomware just hours after hearing news of a cyber attack on the NHS while out for lunch with a friend while on a week off from his job at an information security company.

But speaking exclusively to MailOnline, the anonymous computer security expert revealed that cyber attackers are working to bring down the 'emergency stop' which is halting the virus from spreading in a bid to infect millions more across the globe.

Webmaster's Commentary: 

So, a single 22-year old was able to do what the NSA, CIA, FBI, etc. could NOR do?!? Does that mean the NSA, CIA, FBI, etc. are hopelessly inept? Or is WannaCry part of an operation to cripple the internet ahead of some grand was escalation? Or were NSA, CIA, FBI, etc. just stealing some party cash for themselves? Or all of the above?

May 14 08:38

"Comey Was Wrong" Trey Gowdy Slams FBI Director James Comey Over Hillary Clinton Investigation

May 13 19:31

Flashback: The FBI is worried driverless cars will be used as bombs

Look at that self-driving prototype up there. Isn't it cute? The Federal Bureau of Investigation doesn't think so.

Criminals could use driverless cars to evade law enforcement, shoot cops from the back of the vehicle, and "conduct tasks that require use of both hands or taking one’s eyes off the road which would be impossible today," according to an internal report obtained by The Guardian. The last concern was outlined in a section called "multitasking."

Another fear is that criminals will pack a driverless car with explosives and program it to drive itself into a target.

May 13 18:14

NHS ransom hack 'turns into recrimination' as Politcians BLAME each other for safety fails

Security chiefs yesterday warned that weak NHS IT systems could allow sinister forces to hack into personal data and deliberately change details such as blood types, with “catastrophic” consequences.

Just 24 hours before the attack the British Medical Journal published a warning about NHS vulnerabilities.

Dr Krishna Chinthapalli, a registrar at the National Hospital for Neurology and Neurosurgery in London, said: “Hackers know that hospitals are good targets. They are vulnerable and easy to penetrate and the data they hold is irreplaceable. The NHS was unprepared for such an attack. There is now a risk of it happening again and more frequently.”

The NHS accounted for 64 per cent of all Government data breaches between 2015-16.

Scottish trusts were the worst hit, with almost 60 per cent being attacked, while 79 English trusts – more than 33 per cent – were hit since June 2015.

May 13 15:52

Cyberattack hit 'one in five' NHS England trusts, says Amber Rudd

NHS trusts have come under fire for failing to stop using outdated software that left them at risk.

However, Ms Rudd added: "If you look at who's been impacted by this virus, it's a huge variety across different industries and across international governments.

"This is a virus that attacked Windows platforms... I don't think it's to do with that preparedness.

"There's always more we can all do to make sure we're secure against viruses, but I think there have already been good preparations in place by the NHS to make sure they were ready for this sort of attack."

May 13 11:47

Russian hacker claims FBI coerced confession over Clinton cyberattack

A Russian man wanted by the Justice Department on charges connected to hacking U.S. companies now claims the FBI offered him immunity in exchange for accepting responsibility for cyberattacks targeting former Democratic nominee Hillary Clinton.

May 13 09:05

24 Hours Later: "Unprecedented" Fallout From "Biggest Ransomware Attack In History"

24 hours after it first emerged, it has been called the first global, coordinated ransomware attack using hacking tools developed by the NSA, crippling over a dozen hospitals across the UK, mass transit around Europe, car factories in France and the UK, universities in China, corporations in the US, banks in Russia and countless other mission-critical businesses and infrastructure.

According to experts, "this could be one of the worst-ever recorded attacks of its kind." The security researcher who tweets and blogs as MalwareTech told The Intercept, “I’ve never seen anything like this with ransomware,” and “the last worm of this degree I can remember is Conficker.” Conficker was a notorious Windows worm first spotted in 2008; it went on to infect over 9 million computers in nearly 200 countries.

Webmaster's Commentary: 

Here is a hypothetical. Someone takes these NSA tools and writes a worm that spreads as fast as WannaCry or Conficker, but shows no sign of its presence. Then, at some trigger, possibly the creation of a file somewhere in the world, the payload simply formats the hard drives of all infected computers.

Thanks to the NSA, the entire world's computer systems are now under threat.

May 12 15:51

Flashback: NHS trusts are still using unsupported Windows XP PCs

Motherboard filed Freedom of Information requests with more than 70 NHS hospital trusts asking how many Windows XP machines they use. 48 replied within the allotted time, and a whopping 42 of them admitted that they still use the operating system that reached end-of-life status in April 2014.

Some of the culprits include East Sussex Healthcare, which has 413 Windows XP machines, Sheffield's Children's hospital with 1,290, and Guy's and St Thomas' NHS Trust in London with an insane 10,800 Windows XP-powered PCs.

23 replied to Motherboard's quizzing about whether they have an extended support agreement in place and, unsurprisingly, the majority said that they do not.

This delay in upgrading could land some NHS trusts in trouble.

May 12 15:39

NHS services in England and Scotland hit by global cyber-attack

Last December, it emerged that 90% of NHS computers still run on Windows XP, two and a half years after Microsoft stopped supporting the operating system.


Dr Christopher Richardson, the head of the cybersecurity unit at Bournemouth University, said the process of recovering the NHS’s IT systems would involve a painful and longwinded “deep strip” of affected computers.

“You go down to the basic machine, you take everything off it, you reconfigure it and then you build it back up again,” he said. “If you’re talking national health, you’re talking a lot of machines on a single site and you’ve got to get them all because these nasty pieces of malware, they float around, so they only have to remain on one machine and when you reboot it will deliver the same thing again.”

May 12 12:22

FACTBOX-Don't click: What is the 'ransomware' WannaCry worm?

It exploited a vulnerability in the Windows operating system believed to have been developed by the National Security Agency, which became public last month. It was among a large number of hacking tools and other files that a group known as the Shadow Brokers released on the Internet. Shadow Brokers said that they obtained it from a secret NSA server.

May 12 12:14

Cyberattacks in 12 Nations Said to Use NSA Hacking Tool

An extensive cyberattack struck computers across a wide swath of Europe and Asia on Friday, and strained the public health system in Britain, where doctors were blocked from patient files and emergency rooms were forced to divert patients.

The attack involved ransomware, a kind of malware that encrypts data and locks out the user. According to security experts, it exploited a vulnerability that was discovered and developed by the National Security Agency.

The hacking tool was leaked by a group calling itself the Shadow Brokers, which has been dumping stolen NSA hacking tools online beginning last year.

Microsoft rolled out a patch for the vulnerability last March, but hackers took advantage of the fact that vulnerable targets -- particularly hospitals -- had yet to update their systems.

The malware was circulated by email; targets were sent an encrypted, compressed file that, once loaded, allowed the ransomware to infiltrate its targets.

Webmaster's Commentary: 

Thank you, NSA!

May 12 11:35

Is There Secret Software That Utility Companies Are Being Forced To Use?

So here goes: According to that ten-year utility company employee, the U.S. government is forcing electric utilities to use a software program called SAP. Looking online, I find information for the SAP electric software program from Germany. The information I’m receiving, however, is that program is ‘flawed’, easily hackable and can be used to take down the entire USA grid system. See why I’m concerned!

May 12 10:39

Ransomware infections reported worldwide

A massive ransomware campaign appears to have infected a number of organisations around the world.

Screenshots of a well known program that locks computers and demands a payment in Bitcoin have been shared online by parties claiming to be affected.

There have been reports of infections in the UK, US, China, Russia, Spain, Italy, Vietnam, Taiwan and others.

Security researchers are linking the incidents together.

One cyber-security researcher tweeted that he had detected 36,000 instances of the ransomware, called WannaCry and variants of that name.

"This is huge," he said.

Another, at cyber-security firm Kaspersky, said that the ransomware had been spotted cropping up in 74 countries and that the number was still growing.

May 12 10:25

The True Story of Silk Road Is Way More Interesting Than The Government’s Fairy Tale

In this video, Vin Armani discusses the latest on the Silk Road appeal with Lyn Ulbricht, mother of Ross Ulbricht, the original founder of the free market website Silk Road. Lyn also disputes a new book that uses the government narrative to villainize her son as a drug kingpin. She says the true story of the case is far more interesting with corrupt agents inside the site’s administration and all of the dangerous precedents the case set.

May 12 09:52

FBI Gives Hollywood Hacking Victims Surprising Advice: "Pay the Ransom"

Netflix isn't alone: Agencies and others are balancing demands for money against the fears of stolen data ending up online.
Phones are the lifeblood of a talent agency like UTA, but on April 11, its IT department discovered an intruder lurking in the voicemail system and computer network and quickly decided to shut them down, sending agents to conduct business on their iPads. Soon thereafter a demand from a hacker arrived: Pay a ransom or watch the agency's most confidential data get posted online.

Webmaster's Commentary: 

And where is the great and grand NSA in all this to champion We the People, suffering from epidemic hacking attacks?!?

AWOL; nowhere to be found, of course!!

May 12 09:39

NHS hit by ransomware attack, hospitals across country shutting down

Payments appear to be being made to the Bitcoin addresses given in the NHS ransomware attack – which in turn confirms that the same strain of malware has infected Telefónica Spain, Gareth Corfield reports.

May 12 09:22

Avast blocks the entire internet – again

An Avast software update pushed out on Wednesday is preventing web access for at least some devices running the firm's freebie anti-malware software.

Users affected by the problem have started threads (here and here among others) on Avast's support forum.

El Reg learnt of the issue through reader Michael S.

"Non tech savvy users will have issues reporting or getting the problem fixed," he explained. "To regain web access you have to disable Web Shield or disable Avast or uninstall Avast. To fix the issue you have to do a clean install of the latest version of software."

May 12 09:18

Study Shows Heavy Facebook Users Have Less Grey Matter

If you're a heavy social media user, it might be because of a particular part of your brain being smaller than usual.

A recent study showed the nucleus accumbens - a region which plays a big part in reward and addiction - was smaller in more frequent users of social media, particularly mobile visitors.

May 12 09:14

Telefonica Tells Employees to Shut Down Computers Amid Massive Ransomware Outbreak

A ransomware outbreak is wreaking havoc all over the world, but especially in Spain, where Telefonica — one of the country's biggest telecommunications companies — has fallen victim, and its IT staff is desperately telling employees to shut down computers and VPN connections in order to limit the ransomware's reach.

The culprit for these attacks is v2.0 of the WCry ransomware, also known as WannaCry or WanaCrypt0r ransomware.

May 12 09:12

The time has come to remove Facebook from your life

As you ponder whether or not to delete your account, it's worth considering at what point a tool crosses from the realm of useful to that of burden. Because whatever that point is, Facebook long ago passed it. Take it from someone who hasn't had a personal Facebook account in years: You're not missing much, and once you're free of Zuckerberg's clutches you'll wonder how you stuck it out for so long in the first place.

May 12 09:09

Reddit Users Lose Real Money After Meme Currency Bot Dies

Another day, another cryptocurrency clusterfuck. This week, the creator of the tipping bot “dogetipbot”—a service that let Reddit users “tip” each other in Dogecoin—announced that his company is broke, he’s broke, and the bot is broke because he spent all the coins, after he himself ran out of money.

May 12 09:07

NHS hospitals across England hit by large-scale cyber-attack

Hospitals across England have been hit by a large-scale cyber-attack, the NHS has confirmed, which has locked staff out of their computers and forced many trusts to divert emergency patients.

The IT systems of NHS sites across the country appear to have been simultaneously hit, with a pop-up message demanding a ransom in exchange for access to the PCs. NHS England said it was aware of the problem and would release more details soon.

According to reports, affected hospitals include those run by East and North Hertfordshire NHS trust, Barts Health in London, Essex Partnership university NHS trusts, the university hospitals of Morecambe Bay NHS foundation trust, Southport and Ormskirk hospital NHS trust and Blackpool teaching hospital NHS foundation trust.

May 12 08:06

Trump's cybersecurity executive order: 4 things you need to know

US President Donald Trump signed an executive order on cybersecurity on Thursday, outlining plans to address the cybersecurity of federal networks, the cybersecurity of critical infrastructure , the cybersecurity of the nation as a whole, and how to ensure that the United States achieves long-term excellence in cybersecurity.

May 11 17:49

HP users beware: Laptops revealed to have built-in keylogger

Several models of the HP EliteBook, ProBook, and other machines may be recording every keystroke you make. Here's how to fix the problem.

May 11 14:20

Russian Company Adds Pre-Crime Emotional Recognition Tech To Surveillance Cameras

By Nicholas West

Nearly all areas of the modern world have now adopted some form of surveillance camera apparatus. With the concurrent rise in biometric identification technology, we are now entering the next phase of unprecedented privacy reduction: surveillance cameras equipped with real-time facial recognition, tied into police departments...

May 11 12:31

‘Power Grab’: FCC Website Hit With 128k Anti-Net Neutrality Messages In Bot Cyberattack

After the FCC announced plans to rollback net neutrality regulations, their public comment system was flooded with hundreds of thousands of comments crashing the system. Many of the comments appear to be fake and from a bot.

May 11 11:57


IN EARLY DECEMBER 2016, Adam was doing what he’s always doing, somewhere between hobby and profession: looking for things that are on the internet that shouldn’t be. That week, he came across a server inside New York University’s famed Institute for Mathematics and Advanced Supercomputing, headed by the brilliant Chudnovsky brothers, David and Gregory. The server appeared to be an internet-connected backup drive. But instead of being filled with family photos and spreadsheets, this drive held confidential information on an advanced code-breaking machine that had never before been described in public. Dozens of documents spanning hundreds of pages detailed the project, a joint supercomputing initiative administered by NYU, the Department of Defense, and IBM. And they were available for the entire world to download.

Webmaster's Commentary: 
May 11 11:28

U.S. intelligence chiefs say reviewing use of Kaspersky software

U.S. intelligence officials told a Congressional committee on Thursday they are reviewing government use of software from Russia's Kaspersky Lab as senators raised concerns that Moscow might use the product to attack American computer networks.

Webmaster's Commentary: 

Actually, they are just pissed that Kaspersky outed the Equation Group hackers as NSA.

May 11 10:32


Though celebrated early on as Samsung’s comeback year—with strong sales and glowing reviews of the Samsung Galaxy Note 7, S7 and S7 Edge—2016 has quickly turned a devastating corner for the company. Since the release of the Galaxy Note 7 in August 2016, the company’s phones have gone viral for all the wrong reasons.

Around the world, dozens of Galaxy Note 7s have overheated and caught fire, causing personal injury and property damage. The battery issue was initially thought to be isolated to this specific model—until S7 and S7 Edge owners reported similar experiences.

May 11 10:10

Spectrum still having major problems.

May 11 09:30

Ukraine Soldiers Bombarded By 'Pinpoint Propaganda' Texts

Television journalist Julia Kirienko was sheltering with Ukrainian soldiers and medics two miles (three kilometers) from the front when their cellphones began buzzing over the noise of the shelling. Everyone got the same text message at the same time.

"Ukrainian soldiers," it warned, "they'll find your bodies when the snow melts."

Text messages like the one Kirienko received have been sent periodically to Ukrainian forces fighting pro-Russian separatists in the eastern part of the country. The threats and disinformation represent a new form of information warfare, the 21st-century equivalent of dropping leaflets on the battlefield.

"This is pinpoint propaganda," said Nancy Snow, a professor of public diplomacy at the Kyoto University of Foreign Studies.

May 11 09:30

Coca-Cola teams up with grocery giant Albertsons to steal your smartphone information … invasive “Minority Report” marketing goes mainstream

Struggling to maintain its customer base amid lagging sales, soft drink giant Coca-Cola has developed a new program in partnership with grocery supermarkets that invades people’s smartphones in order to steal their private information and send them custom-tailored coupons and other marketing material – this, after previously attempting to boost sales by pushing soda for breakfast.

Albertsons is reportedly the first grocery chain to adopt the technology, which utilizes digital signage placed at grocery end caps that targets shoppers and drives them towards the beverage aisle. Once there, shoppers are offered coupons and other promotions designed to entice them to buy more high-fructose corn syrup-laden soft drinks.

May 11 09:30

The Imperative of Replacing Google and Facebook

Nations are beginning to take more seriously the control of their respective information space after years of allowing US-based tech giants Google and Facebook to monopolize and exploit them.

Vietnam, according to a recent GeekTime article, is the latest nation to begin encouraging local alternatives to the search engine and social media network in order to rebalance the monopoly over information both tech giants enjoy in the Southeast Asian country today.

Google and Facebook: More than Search Engines and Social Media

The two tech giants and others like them may have appeared at their inceptions to political, business, and military leaders around the world as merely opportunistic corporations seeking profits and expansion.

However, Google and Facebook, among others, have become clearly much more than that.

May 11 09:27

Demand-side Management (DSM) Aspect Of AMI Smart Meters

By Catherine J. Frompovich

There is information about AMI Smart Meters probably very few people know anything about, but will affect them enormously, especially when consumers don’t know to expect what’s happening.

It’s demand-side management (DSM), which allows electric utilities to turn off various appliances in order to conserve energy—one of the main, if not the key reason—for AMI Smart Meters, in my opinion, in addition to surveillance...

May 11 09:21


According to an article in Texas Public Radio, law enforcement will now have access to DHS’s biometric database. “Texas law enforcement are now getting a big assist from the federal government. Texas is the first and only state to get access to a massive Department of Homeland Security biometric database…” Letting police have access to everyone’s biomterics is asinine and the potential for abuse will be astronomical.

May 11 09:20


Of China's 1.35 billion population, 710 million are internet users. The results of a survey by the Beijing Youth Daily newspaper released in March found that, like Xu, 70 percent of internet users polled thought carrying cash was not necessary.

The apps fuelling this cashless trend are Tencent's WeChat and Alibaba's Alipay. Launched in 2011, WeChat is a multi-function app based around a messaging system that incorporates WhatsApp and Twitter-like elements. The app is phenomenally popular in China—the majority of WeChat's roughly 889 million monthly-active users worldwide are based in the People's Republic. Chinese users of apps like WeChat tend to not be put off by the personal data storing and sharing that goes on in them. Snooping by authorities is pretty much accepted.

May 11 09:14

If you get this text message, do NOT click on the link: NatWest scam gives fraudsters access to your account

NatWest has warned its customers of a new 'smishing' scam that is circulating this week.

The scam sees fraudsters sending unsuspecting victims text messages that appear to be from NatWest.

Users are asked to verify their account details by clicking on a link which takes them through to what looks like NatWest's website.

But when they enter their online banking login details, it gives the scammers complete access to their details – and their money.

May 11 09:11

Would YOU wear a virtual reality headset during sex? Firm says the technology can improve your love life

Virtual reality is set to transform every aspect of our lives.

Now, one company claims it could prove valuable in the bedroom.

A porn production company has encouraged men to stimulate their love life by using a virtual reality (VR) headset while having sex with their partner.

Men can use the headsets during sex and their partners will be transformed into a porn star - giving them the illusion of being unfaithful.

May 11 07:44

BREAKING Dew News - Coinbase Unable to Fulfill Orders - Scam or Failure to Execute?

May 11 07:17

UK teachers’ union now “HP free zone” due to Israel ties

The UK’s largest union for school teachers has launched a boycott of HP over the technology giant’s role in the Israeli occupation.

More than 21,000 people in the UK have also signed a pledge to boycott the US-headquartered firm.

Kevin Courtney, general secretary with the National Union of Teachers, said “the NUT does not buy or use HP products or services as a gesture of solidarity with the Palestinian people.”

May 11 07:00

Apple Watch Button To Blame For Increase In Mistaken 911 Calls

New technology that is supposed to make accessing 911 easier is actually proving to be a burden, according to some dispatchers.

Authorities in Sedgwick County, Kansas, are blaming a button on the side of the Apple Watch for an increase in mistaken 911 calls.

The watches join the county’s already growing problem with accidental dials on cellphones.

The two combined accounted for over 130,000 mistaken calls last year.

“Calling 911 in a true emergency, you don’t want to be blocked by an Apple Watch that’s calling in just because somebody hit the button,” said Sedgwick County Emergency Communications Director Elora Forshee.

You can turn off the “Hold To Auto Call” function in your Apple Watch app on your phone.

May 11 06:56

Keylogger Found in Audio Driver of HP Laptops

The audio driver installed on some HP laptops includes a feature that could best be described as a keylogger, which records all the user's keystrokes and saves the information to a local file, accessible to anyone or any third-party software or malware that knows where to look.

Swiss cyber-security firm modzero discovered the keylogger on April 28 and made its findings public today.

May 11 06:53

Oh, great: There's a new Same Origin Policy exploit for Edge

Edge nemesis, security tester Manuel Caballero from Buenos Aires, has popped the browser again, getting around its Same Origin Policy to steal stored credentials.

Over at his Broken Browser blog, Caballero explains that an attacker can fake their originator for a referrer spoof, and “thanks to the existence of data-uris and the fact that most sites render iframes, we can end up turning this vulnerability into a full SOP bypass.”

It gets better: “Then, because the password manager tries to be smart and complete everything without checking too much, we can simply render a universal snippet of code that will work everywhere.”

May 10 15:42

Well this is awkward. As Microsoft was bragging about Office at Build, Office 365 went down

Microsoft scrambled to get its Office 365 service back online after the cloud productivity suite was hit with a mid-day outage.

Loads of people reported that, at around 1245 PT, access to the service went out. Microsoft confirmed shortly after it was having problems, and said it was looking into the matter. Subscribers in New York, Denver, Texas, and Portland, in the US, were, for example, unable to access the service.

May 10 15:40

Cisco patches switch hijacking hole – the one exploited by the CIA

On a 1-10 scale, Cisco scores the issue as 9.8 and has labeled it a critical risk. With no other mitigations available, aside from turning off Telnet, admins are urged to install the provided patch as soon as possible.

And maybe switch off that Telnet, too.

May 10 15:38

Another IoT botnet has been found feasting on vulnerable IP cameras

Researchers have discovered yet another IoT botnet.

Persirai targets more than a thousand different internet protocol camera models. Researchers at Trend Micro warn that 120,000 web-connected cameras are vulnerable to the malware.

Consumers would, in most cases, be unaware that their devices are even exposed to the internet much less at risk of compromise. Hackers are using a known but seldom patched vulnerability to hack the cameras.


Unlike its relatives, Persirai sticks to IP cameras rather than also going after internet-connected digital video recorders, routers, and other vulnerable IoT devices. The targeting might be down, at least in part, to how easy IP cameras are to hack.

May 10 14:58

‘Constitutional Crisis’: Trump’s Firing Of FBI Director Ignites Twitter Frenzy

The unexpected firing of FBI Director James Comey has ignited a war of words and tweets. Will President Donald Trump’s decision restore confidence, or, was this a sudden move to undermine investigations into alleged Russian meddling of US elections?

May 10 12:56

FLASHBACK - 650,000 Emails Found On Anthony Weiner's Laptop; DOJ Blocked Foundation Probe

Yesterday, we reported that the FBI has found "tens of thousands of emails" belonging to Huma Adein on Anthony Weiner's computer, raising questions how practical it is that any conclusive finding will be available or made by the FBI in the few days left before the elections

Now, according to the WSJ, it appears that Federal agents are preparing to scour roughly 650,000 emails that, as we reported moments ago were discovered weeks ago on the laptop of Anthony Weiner, to see how many relate to a prior probe of Hillary Clinton’s email use, as metadata on the device suggests there may be thousands sent to or from the private server that the Democratic nominee used while she was secretary of state, according to people familiar with the matter.

May 10 12:28

President Trump Deletes Every Old Press Release, But The Internet Never Forgets

Yesterday, journalists discovered that the Trump regime had deleted the president’s infamous press release from 2015 that called for a ban on all Muslims traveling to the United States. But it wasn’t just the Muslim ban. Every single press release from before January 1, 2017 has been erased from Thankfully, the internet never forgets.

As Russ Kick from the website Memory Hole notes, every Trump/Pence 2016 campaign press release that was deleted this week has been backed up by the Internet Archive’s Wayback Machine. It’s almost impossible to completely erase something from the internet these days—for better and for worse.

May 10 10:16

10 Things to Know Before Starting a Raspberry Pi Project

The Raspberry Pi is at the center of a revolution that has put the power of a PC in the hands of the masses, providing an easy-to-use platform with a wide ecosystem of support. As intuitive and easy to use as the platform may be, both engineers and beginners can benefit from a few tips from those who have already used the Pi.

These “10 Things to Know” are not intended to be comprehensive as there is continuous online community support for that. They are some nuggets that may not be found in any one guidebook or tutorial, but have been acquired through hard-won experience. It includes advice and tips from choosing and formatting SD cards, selecting power supplies for the Raspberry Pi, choosing the right Wi-Fi dongle, programming tips, what to do when the system freezes, and how to avoid destroying the board by powering it correctly.

May 10 09:57


Easy means of delivering secrets using the weak private email server. Easy means of accepting payment through a "charitable" foundation!

This is a perfect setup to repeat the 1996 selling of secrets for cash. In other words, a perfect espionage operation, running out the US State Department, with the weak email server providing the secrets and a charitable foundation to accept and launder the payments! Hillary doesn't have to physically steal the files, the way Jonathan Pollard did. Hillary doesn't have to scratch an X on a mailbox, the way Aldrich Ames did. Hillary doesn't have to tape bundles of stolen documents underneath a park bridge, like Robert Hannsen did!

Webmaster's Commentary: 

Hillary had two shields protecting her from a full investigation as to what was going on with the private email server, Loretta Lynch and James Comey. Both are no longer able to protect her, and it is time to find out if in fact this nation had a serving Secretary of State who committed espionage using the weak email server to deliver secret documents to foreign interests and the "charitable" Foundation to collect and launder the payments! In addition, the Clinton Foundation was suspected of actually being both a slush fund and money laundry in which many top politicians in both parties participated!

Let justice be done though the heavens may fall!

Optional Banner: 
WRH Exclusive
May 10 09:11

Google Chrome - Do NOT download THIS app, it could HACK you

Just a few weeks after it was revealed Google Chrome contained a dangerous vulnerability that made phishing attacks "almost impossible to detect", a new threat has been detected.

SophosLabs Android researcher Rowland Yu has published a blog post about a malicious version of Google Chrome for Android spotted online.

The compromised version of the hugely-successful browser contains a piece of malware – dubbed Andr/SandRat-C – that can evade the digital signatures at the heart of modern security procedures.

The fraudulent Chrome can bypass these safeguards built into your device and record audio or video from your smartphone, read the contents of your SMS messages, send SMS, and record the location of the device.

May 10 09:08

U.N. aviation agency seeks global approach to laptop ban

A United Nations agency has launched an effort to craft global guidance for the use of laptops and other portable electronics in passenger aircraft cabins after selective bans by the United States and Britain upset airline passengers as well as Middle Eastern carriers.

May 10 08:59

Study finds cybersecurity pros are hiding breaches, bypassing protocols, and paying ransoms

Cybersecurity company Bromium has found that an average of 10% of security professionals have quietly paid ransomware demands, and that 35% have admitted to circumventing, disabling, or otherwise bypassing their organization's security.

Webmaster's Commentary: 


May 10 08:08

Google Chrome won't be allowed on Windows 10 S

Microsoft's newest Windows 10 edition is designed to allow desktop apps that have been converted to packages for the Windows Store. But a provision in the Store policies blocks desktop browsers like Chrome. Is it about security, or something else?

May 09 09:52

How Burger King revealed the hackability of voice assistants

the stunt may have done some good by highlighting how easy it is to hijack such devices.

May 09 09:36

The infamous hacktivist group Anonymous has released a chilling new video

Anonymous warns world to 'prepare' for World War 3

May 09 09:28


Today we live in an age where there is a technology battle front being waged against citizens of the West and the people are losing it on every front – nowhere is that battle raging most in Western democracies than in Britain. Britain already has a reputation for deploying the most intrusive surveillance systems against its own people in the Western world. Widely reported just a few days ago, it appears the government has just awarded itself the ability to monitor and surveil the live communications of the British general public at will. In addition, it also forces encryption backdoors to be made available to the authorities by privacy driven communications services such as WhatsApp. This is an exploit that will see a considerable degrading of security for everyone in Britain, which will inevitably lead to hugely increased hacking by criminals.

Share | Comment

May 09 09:04

FBI’s Comey Debunks Huma Abedin’s Excuse for Clinton Emails Appearing on Anthony Weiner’s Laptop

COMEY: His then spouse, Huma Abedin, appears to have had a regular practice of forwarding e-mails to him, for him I think to print out for her so she could then deliver them to the Secretary of State.

Those details seem to contradict claims made by Abedin last November through her lawyer, Karen Dunn, immediately following reports that the FBI discovered possible Clinton emails on her estranged husband’s computer. Dunn claimed that Abedin did not know how the emails could have reached Weiner’s device and only learned about the possibility of emails being on Weiner’s laptop via media reports.

May 09 08:46

Microsoft makes emergency security fix

Microsoft has released an urgent update to stop hackers taking control of computers with a single email.

The unusual bug, in Microsoft anti-malware software such as Windows Defender, could be exploited without the recipient even opening the message.

Researchers working for Google's Project Zero cyber-security outfit discovered the flaw at the weekend.

The fix has been specially pushed out hours before the software giant's weekly Tuesday security update.

Hackers could exploit the flaw simply by sending an infected email, instant message or getting the user to click on a web browser link.

May 09 08:25

Spotify’s Beta Used ‘Pirate’ MP3 Files, Some From Pirate Bay

Spotify is often credited as the music service most in tune with the 'pirate' mentality, having converted millions of former file-sharers in recent years. Interestingly, according to writer and researcher Rasmus Fleischer, a decade ago the site actually populated its beta with pirate MP3s, including some that were only available on The Pirate Bay.

May 08 15:27


Surf freely. No DNS redirects. No Logging.

May 08 14:59

Facebook Wages War On ‘Fake News’ Ahead Of UK General Elections

Social network company Facebook has taken a series of new measures to crack down on what it calls “fake news” in the UK, as the country prepares for crucial general elections next month.

May 08 09:34

Naval War College Professor And Snowden Critic Out After X-Rated Twitter Picture

A frequent Edward Snowden critic and former National Security Agency analyst who was involved in an investigation over “inappropriate” content shared on Twitter is leaving his job at the Naval War College, he announced on Monday.

“Sorry to say I’m severing my affiliation with Naval War College,” John Schindler wrote on Twitter. “I had a great time there but it’s time to move on. Thanks for your support.”

A picture of Schindler’s penis was posted to Twitter in June by a woman who described it as part of a consensual exchange, but one that eventually turned sour.