COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Sep 25 07:22

UK INTELLIGENCE AGENCY ADMITS UNLAWFULLY SPYING ON PRIVACY INTERNATIONAL

Press release from Privacy International
Tuesday, September 25, 2018
The UK’s domestic-facing intelligence agency, MI5, today admitted that it captured and read Privacy International’s private data as part of its Bulk Communications Data (BCD) and Bulk Personal Datasets (BPD) programmes, which hoover up massive amounts of the public’s data. In further startling legal disclosures, all three of the UK’s primary intelligence agencies – GCHQ, MI5, and MI6 – also admitted that they unlawfully gathered data about Privacy International or its staff.

The intelligence agencies have repeatedly denied that their BPD and BCD programmes are tantamount to mass surveillance of people not suspected of any wrongdoing. Documents published today demonstrate that Privacy International, an international NGO, has been caught up in MI5’s investigations because its data was part of the UK intelligence agencies vast databases.

Webmaster's Commentary: 

Prime Minister May, you have some explaining to do!!

Sep 25 07:18

SEPTEMBER 25TH IS "NATIONAL PANIC DAY" A DAY WHERE AMERICANS ARE ENCOURAGED TO SPY ON EACH OTHER

Today, September 25th. is Homeland Security's "National Panic Day."

What is "National Panic Day"?

Officially, today is known as "National Awareness Day" not "National Panic Day." For the reasons stated below, I am calling it "National Panic Day" which coincides with DHS reissuing their National Terrorism Bulletins this month.

DHS and law enforcement have created a national day that glorifies spying on your family, neighbors, coworkers, classmates and much more.

"Across the country, in our communities, we share everyday moments with our neighbors, family, coworkers, and friends. We go to work or school, the grocery store, or the gas station. It's easy to overlook these routine moments, but as you’re going about your day if you see something that doesn't seem quite right, say something. By being alert and reporting suspicious activity to your local law enforcement you can protect your family, neighbors, and community."

Webmaster's Commentary: 

Absoflippinglutely unbelievable, but perfectly predictable for this country's government, governing a country which should be renamed as the "Unhinged, Surveilled State of Amerika."

Sep 25 06:25

Is Google Chrome tracking what YOU'RE doing? Browser is now logging people in WITHOUT their permission and 'syncing' user data, professor warns

Until recently Google Chrome users have been able to use the browser without logging in.

However, now when people log into a service such as Gmail they are automatically logged in without their consent.

Sep 24 18:05

FCC Wants to Give $2B to Wireless Carriers on September 26

By B.N. Frank

According to a recent article in ARS Technica, this FCC proposal will also force cities and towns to act on small cell tower and wireless infrastructure applications within 60 or 90 days. It will be voted on September 26, 2018 and statements are still being accepted.

Numerous U.S. municipal governments, organizations, medical professionals and environmentalists are extremely ticked off...

Sep 24 15:51

Less Talk, More Texting

Sep 24 13:54

Wendy's Sued For Violating Illinois Law Against Biometrics

By Aaron Kesel

A class-action lawsuit was filed in Illinois against a fast food restaurant chain of the Wendy’s franchise. The suit accuses the company of violating state laws for the way the business stores its employees’ fingerprints...

Sep 24 11:10

Google secretly logs users into Chrome whenever they log into a Google site

Google has made an important change to the way the Chrome browser works, a move the company did not advertise to its users in any way, and which has serious privacy repercussions.

According to several reports [ 1, 2, 3], starting with Chrome 69, whenever a Chrome user would access a Google-owned site, the browser would take that user's Google identity and log the user into the Chrome in-browser account system --also known as Sync.

This system, Sync, allows users to log in with their Google accounts inside Chrome and optionally upload and synchronize local browser data (history, passwords, bookmarks, and other) to Google's servers.

Sep 24 08:11

New Malware Combines Ransomware, Coin Mining and Botnet Features in One

According to the researchers from security vendor Palo Alto Networks, who uncovered the malware, XBash is an all-in-one malware that features ransomware and cryptocurrency mining capabilities, as well as worm-like ability similar to WannaCry or Petya/NotPetya.

In addition to self-propagating capabilities, XBash also contains a functionality, which is not yet implemented, that could allow the malware to spread quickly within an organization's network.

Sep 24 08:08

Hackers Steal Customers' Credit Cards From Newegg Electronics Retailer

The notorious hacking group behind the Ticketmaster and British Airways data breaches has now victimized popular computer hardware and consumer electronics retailer Newegg.

Magecart hacking group managed to infiltrate the Newegg website and steal the credit card details of all customers who entered their payment card information between August 14 and September 18, 2018, according to a joint analysis from Volexity and RiskIQ.

Magecart hackers used what researchers called a digital credit card skimmer wherein they inserted a few lines of malicious Javascript code into the checkout page of Newegg website that captured payment information of customers making purchasing on the site and then send it to a remote server.

Sep 24 08:07

Flaw in 4GEE WiFi Modem Could Leave Your Computer Vulnerable

A high-severity vulnerability has been discovered in 4G-based wireless 4GEE Mini modem sold by mobile operator EE that could allow an attacker to run a malicious program on a targeted computer with the highest level of privileges in the system.

The vulnerability—discovered by 20-year-old Osanda Malith, a Sri Lankan security researcher at ZeroDayLab—can be exploited by a low privileged user account to escalate privileges on any Windows computer that had once connected to the EE Mini modem via USB.

This, in turn, would allow an attacker to gain full system access to the targeted remote computer and thereby, perform any malicious actions, such as installing malware, rootkits, keylogger, or stealing personal information.

Sep 24 06:32

ORWELLIAN: Apple monitors your phone calls and emails, then calculates a “trust score” just like the communist Chinese government… it’s happening NOW, in America

Apple has gone full-blown authoritarian with its latest initiative to crack-down on freedom. The corporate behemoth says that the “trust ratings,” which were added quietly in the latest iOS update, are benevolent in nature; supposedly these ratings will “help” with fraud prevention. Despite Apple’s insistence that the company is “fully committed to transparency,” and that the scores are “privacy-preserving,” how monitoring people’s phone calls and emails will prevent fraud (or preserve privacy) is never explained.

In fact, Apple hasn’t even provided a single scenario in which the trust score would prevent fraud.

Users can’t even see their own “trust scores,” unless they contact Apple directly and ask for their data.

Sep 24 06:17

Couldn't give a fsck about patching? Well, that's your WordPress website pwned, then

Website admins are urged to update their WordPress installations as soon as possible to the latest version following a rash of attacks exploiting known vulnerabilities in the web publishing software.

Researchers at Malwarebytes say miscreants don't appear to be targeting any one specific bug, but rather a full array of flaws in older versions of WordPress and its various plugins.

"During the past few days, our crawlers have been catching a larger-than-usual number of WordPress sites being hijacked," noted MalwareBytes researcher Jérôme Segura on Thursday.

"One of the most visible client-side payloads we see are redirections to tech support scam pages. Digging deeper, we found that this is part of a series of attacks that have compromised thousands of WordPress sites since early September."

Sep 23 08:59

Judicial Watch Uncovers Five More Clinton Emails Containing Classified Material on Her Unsecure, Non-‘State.gov’ Email System

Judicial Watch today released two batches, 184 pages and 45 pages, of newly uncovered emails of former Secretary of State Hillary Clinton from the U.S. Department of State sent and received over her unsecure, non-“state.gov” email system. Five emails contain classified information.

Sep 22 22:06

Twitter warns direct messages were exposed

Twitter has told an undisclosed number of users their private messages may have been leaked to third-parties for more than a year.

The software “bug”, which has since been fixed, involved direct messages between users and businesses that offer customer services via Twitter.

Affected users are being notified via a message that appeared when opening the app or logging on to Twitter's website.

"The issue has persisted since May 2017," Twitter said.

The company said it had resolved the issue immediately upon discovering it, on 10 September.

Sep 22 10:44

British Spies Hacked Belgian Telecom Firm on UK Government Orders - Reports

Belgian prosecutors' report supported previous claims made by Edward Snowden that British GCHQ had been intercepting communications at NATO HQ and key European institutions for at least two years.

The operation had a codename “Operation Socialist” and was conducted by the British intelligence service GCHQ, the Guardian reported. Belgian Justice minister, Koen Geens, has confirmed that he received the report from the prosecutors and would discuss it with country’s national security council, led by Belgian Prime Minister Charles Michel.

Sep 22 10:43

GOVERNMENT CAN SPY ON JOURNALISTS IN THE U.S. USING INVASIVE FOREIGN INTELLIGENCE PROCESS

THE U.S. GOVERNMENT can monitor journalists under a foreign intelligence law that allows invasive spying and operates outside the traditional court system, according to newly released documents.

Targeting members of the press under the law, known as the Foreign Intelligence Surveillance Act, requires approval from the Justice Department’s highest-ranking officials, the documents show.

In two 2015 memos for the FBI, the attorney general spells out “procedures for processing Foreign Intelligence Surveillance Act applications targeting known media entities or known members of the media.” The guidelines say the attorney general, the deputy attorney general, or their delegate must sign off before the bureau can bring an application to the secretive panel of judges that approves monitoring under the 1978 act, which governs intelligence-related wiretapping and other surveillance carried out domestically and against U.S. persons abroad.

Webmaster's Commentary: 

How completely typical for the 21st century's Unhinged, Surveilled State of Amerika!!

The Constitution and Bill of Rights has just been thrown under the proverbial bus by a succession of Amerikan governments, and are truly no longer any thing more than a couple of pieces of paper.

Americans now live under the illusion of being citizens in a democratic republic; but that no longer exists.

The very wealthy and monied buy the government policies they want, like Sheldon Adelson, having outsourced US Middle East policy to Israel, by funding President Trump to the hilt.

Sep 22 10:31

Trump’s new cyber strategy seeks global dominion over internet

Setting the global standard for online behavior, preserving American dominance, political and economic interests, punishing ‘malicious actors’ like Russia and China: these are the ambitious goals of the new US cyber-strategy.
The White House published the 40-page document on Thursday afternoon, the first comprehensive cyber strategy in 15 years. The strategy’s core assumption is that the US created the internet and that Washington must maintain the dominant role in defining, shaping and policing cyberspace in much the same way as it does the globe.

Sep 22 10:15

THE GAMIFICATION OF TYRANNY

It looks like we’re headed for a brave new world where all citizens are rated on their loyalty to the state and are punished for wandering from its narrative.
Call it the gamification of repression.

In China, the supposedly communist state—in fact, it is an advanced form of crony capitalist authoritarianism that Marx would have disapproved—is busy setting up a rating system for all citizens. According to a paper written by an academic at the Lebanese American University in Beirut, Lebanon, scores are based on professional conduct, corruption, type of products bought, peers’ own scores, and tax evasion.

The author left something out, however. This social credit system will also be used to marginalize and stigmatize those who criticize the state.

China’s nominally communist government says the system and its massive database will allow the trustworthy to roam freely under heaven while making it hard for the discredited to take a single step.

Webmaster's Commentary: 

AND... such a "social credit scoring system" is already happening here in the US, courtesy of Apple.

Sep 22 09:46

GOOGLE SUPPRESSES MEMO REVEALING PLANS TO CLOSELY TRACK SEARCH USERS IN CHINA

GOOGLE BOSSES HAVE forced employees to delete a confidential memo circulating inside the company that revealed explosive details about a plan to launch a censored search engine in China, The Intercept has learned.
The memo, authored by a Google engineer who was asked to work on the project, disclosed that the search system, codenamed Dragonfly, would require users to log in to perform searches, track their location — and share the resulting history with a Chinese partner who would have “unilateral access” to the data.

The memo was shared earlier this month among a group of Google employees who have been organizing internal protests over the censored search system, which has been designed to remove content that China’s authoritarian Communist Party regime views as sensitive, such as information about democracy, human rights, and peaceful protest.

Webmaster's Commentary: 

How Google does this here in the US is, for the moment, far more subtle, by using a combination of algorithms which can get a blog pushed so far down in search results, that it becomes deplatformed.

Couple that with a monetary service which used to take contributions for various blogs, like Pay Pal, but suddenly refuses to do so, and you have a website devoid of both viewers and operational cash.

Sep 21 14:44

Facebook Wants A Facial Recognition Smart Home Device For Its Users

By Aaron Kesel

Facebook is planning to announce a new home assistant device called “Portal” with a controversial facial recognition camera. This is significant because not even Amazon’s Echo or Google’s own Smart Home device has a facial recognition camera built in...

Sep 21 11:50

The UK Government Is Planning To Set Up A Regulator For The Internet

BuzzFeed News has obtained details of plans being drawn up by ministers that also include a compulsory code of conduct and age verification for Facebook, Twitter, and Instagram.

Sep 21 11:42

West Virginia high school counselor is charged with fraud for 'changing her daughter's grades to get the girl more than $10,000 in college scholarships'

A West Virginia high school counselor is accused of using a school computer program to raise her daughter's grades in order for the teen to obtain college scholarship money.

Mellissa Krystynak, 49, of Stuart, Florida, has been indicted on six counts of mail fraud.

The mother worked as a counselor from 2011 until 2017 at Greenbrier West High School in Charmco, West Virginia.

Two of Krystynak's children also attended the school.

US Attorney Mike Stuart said in a news release that Krystynak used her administrative access to change more than 35 of her daughter's grades.

Sep 21 10:37

First U.S. Airport “Biometric Terminal” Set For Rollout This Year

By Nicholas West

Biometric identification at U.S. airports has quietly been rolling out at various locations around the world. In some cases, it has been sprung upon the general traveling public without warning, leaving some to question how optional all of this will be as travelers becomes acclimatized to the new boarding process.

Despite many privacy groups warning about the type of incremental “mission creep” we have seen across the spectrum of technological tracking and surveillance, Delta Airlines is taking the lead in bringing about what they call the future of global air travel...

Sep 21 10:22

Turkey Fines Google $15Mln Over Breaches of Competition Law

The Turkish Antimonopoly Committee decided to make Google pay a 93-million-lira fine (some $15 million) over breaches of competition legislation in the sphere of software for mobile phones, the committee said on Thursday in a statement.

"It was decided to fine the companies of Google, Google International and Google Reklamcilik that will have to pay 93 million Turkish liras over the violation of the legislation on competition in the sphere of sales of software for mobile phones. These companies must remove the violations within six months and restore the effective competition on the market," the statement said.

Sep 21 10:08

Cryptojackers use YouTube ads to mine digital currencies

Hackers have been harnessing the computer processing power of YouTube viewers to mine cryptocurrencies. The malware attack, known as ‘cryptojacking’, was found to have targeted users through Google’s advertising service.

The issue first surfaced last week after social media users reported that YouTube ads were triggering their anti-virus software, according to Ars Technica. These ads were found to contain mining code called CoinHive that covertly used up to 80 percent of visitors’ central processing units to generate digital currency for anonymous hackers.

Sep 21 09:39

After riches and jail, Belarusian ex-hacker's life lesson? 'Don't steal from Americans. Ever'

Notorious hacker Sergey Pavlovich, who was charged with stealing credit-card data from Boston Market, Barnes & Noble, and Forever 21 in 2008, has recently published the English version of his book, How to steal a million: The memoirs of a Russian hacker.

He spent a total of 10 years in prison in Belarus following several investigations conducted by US agents. "The total losses from my fraudulent activity for US banks was over $36m," he tells ZDNet.

Pavlovich, who's now based in Moscow, Russia, and tries to make money by selling handmade boxes in the shape of US dollars, was known as PoliceDog, panther[757], Fallen Angel, and diplomaticos, back in the day.

Sep 21 07:49

CHINA’S CHILLING ‘SOCIAL CREDIT SYSTEM’ IS STRAIGHT OUT OF DYSTOPIAN SCI-FI, AND IT’S ALREADY SWITCHED ON

China’s “Social Credit System” – which is expected to be fully operational by 2020 – doesn’t just monitor the nation’s almost 1.4 billion citizens. It’s also designed to control and coerce them, in a gigantic social engineering experiment that some have called the “gamification of trust”.

Sep 21 07:30

GOOGLE'S EX-CEO ERIC SCHMIDT SAYS THE INTERNET WILL SPLIT IN TWO BY 2028

Ex-Google CEO Eric Schmidt on Wednesday predicted that the internet will split in two in the next decade, CNBC reports. Speaking at a private event in San Francisco, Schmidt said that he believes China will effectively split away and create its own internet.

Sep 21 05:24

White House authorises ‘offensive cyber operations’ to deter foreign adversaries

US eases rules on cyberwarfare amid concerns about election interference in forthcoming midterm elections

The White House has “authorised offensive cyber operations” against US adversaries, in line with a new policy that eases the rules on the use of digital weapons to protect the nation, National Security Adviser John Bolton said on Thursday.

“Our hands are not tied as they were in the Obama administration,” Bolton said during a news briefing to unveil a new national cyber strategy.

The Trump administration has eased rules for using digital weapons against foreign adversaries.

>>>

(*Works For Me !
nodding yayhoo)

Sep 20 17:55

Don’t share this! EU’s new copyright law could kill the free internet

In free societies it should be up to internet users themselves to decide what articles and outlets they read, what Facebook groups they join (closed or otherwise), and what Twitter accounts they follow, and not Big Brother or any other kind of politically correct thought police. And the EU should be concerning itself not with trying to control the internet, through manufactured 'concerns' over copyright, but in solving the pressing problems affecting Europe's economies. Youth unemployment stood at around 43 percent in Greece, 33 percent in Spain and 32 percent in Italy, the last time I looked. What help will the Copyright Directive be to the young jobless?

Sep 20 17:41

‘Our hands are not tied’ anymore: White House approves offensive US cyber strategy

US President Donald Trump has signed off on a new offensive cyber strategy that outlines security priorities and threatens dire consequences for anyone who dares to challenge the US economically or “undermine” its democracy.

“Today the president signed a national cyber strategy, the first fully articulated cyber strategy in 15 years,” National Security Adviser John Bolton told reporters on Thursday. “The strategy takes effect today.”

Sep 20 17:33

Google admits it STILL allows apps to scan Gmail accounts for data and share the information - but doesn't say how many have violated its policies

Alphabet Inc's Google gave details about its policies for third-party Gmail add-ons but stopped short of fully addressing questions from U.S. senators about developers who break its email-scanning rules.

How user data flows between big technology platforms such as Google and Facebook Inc and their partners has faced scrutiny around the world this year since Facebook revealed it had done little to monitor such relationships.

Google said in a letter to U.S. senators made public on Thursday that it relies on automated scans and reports from security researchers to monitor add-ons after launch, but did not respond to lawmakers' request to say how many have been caught violating the company's policies.

Sep 20 11:37

Life Insurance Company Will Add Fitness Tracking Data to ALL Policies Next Year

By Nicholas West

One of America’s oldest insurance companies, John Hancock, has its eyes set firmly on the future. With the arrival of Big Data and the now never-ending stream of information that is available to data brokers on individuals in nearly real time, the lure of using it for customer analytics and behavior modification has become irresistible.

According to a recent announcement cited by Reuters, the company is taking the unprecedented step of “selling only interactive policies that track fitness and health data through wearable devices and smartphones.”...

Sep 20 11:14

The 'significant expansion' of Israeli spyware use in the Gulf and beyond

A recent report showed that spyware produced by an Israeli-based cyber-warfare vendor, which only deals with governments, has witnessed “significant expansions” of usage in Saudi Arabia, the United Arab Emirates and Bahrain.

Citizen Lab, a research and development organisation at the University of Toronto, said on Tuesday that it tracked the use of Pegasus, a mobile phone spyware suite produced by Tel Aviv-based NSO Group between August 2016 and August 2018.

“Our findings paint a bleak picture of the human rights risks of NSO’s global proliferation. At least six countries with significant Pegasus operations have previously been linked to abusive use of spyware to target civil society,” said the report, naming the three Gulf Cooperation Council (GCC) countries, as well as Morocco.

Sep 20 11:13

SECRET SCORES Apple gives you a TRUST rating – and it’s based on your phone call and email habits

Apple's new system was revealed after the company updated its iTunes policy page on the official website.

According to the iPhone maker, Apple builds a score based on the number calls and emails you send and receive – to help spot fraudulent transactions made using your device.

"To help identify and prevent fraud, information about how you use your device, including the approximate number of phone calls or emails you send and receive, will be used to compute a device trust score when you attempt a purchase," Apple explained.

"The submissions are designed so Apple cannot learn the real values on your device. The scores are stored for a fixed time on our servers."

Sep 20 11:12

Students swipe faces to pay for meals in high school canteen

A high school has launched a futuristic facial recognition system to allow students and staff to pay for their meals by scanning their faces.

The , captured in the high school attached to Northwest Normal University on September 3, shows students lining up to scan their faces with a facial recognition machine to pay for their meals.

According to reports, students and teachers have their campus cards connected with the facial recognition system.

This canteen is the first to use the 'face-scanning payment' in Gansu Province and it only takes one second to perform the whole process.

Sep 20 10:36

FEMA puts off test of emergency system that lets Trump text every U.S. cellphone as Americans threaten to turn off their phones in protest because they fear he'll use it to carp about the Mueller probe

The Trump administration plans to send a message to every U.S. cellphone to test a previously unused presidential alert system. But some adversaries of the president would rather shut off their phones than hear his dry-run warning about a national emergency.

A test message from Donald Trump was originally scheduled for 2:18 p.m. EDT on Thursday. Now it's being pushed back to the same time on Oct. 3 because the Federal Emergency Management Agency is focused on responding to Tropical Depression Florence.

Opponents of the president are pledging to turn off their phones at the appointed time rather than receive the alert, which subscribers to Verizon, Sprint, AT&T and other witreless carriers are unable to block.

Sep 20 10:35

Has The Era Of Autonomous Warfare Finally Arrived?

By Nicholas West

The global arms race for the latest weapons of war is a naturally escalating cycle of countries pursuing ways to dominate the battlefield of the future. Increasingly, that battlefield is a matrix of soldiers with traditional weapons, robots, drones and cyberweapons. Until this point, command over this matrix has ultimately been in the hands of humans. Now, however, many of the trends in artificial intelligence-driven autonomy are enabling data collection, analysis and potentially combat to be done by algorithms.

Another key signpost has entered the roadmap toward a future of autonomous systems capable of engaging in combat without human oversight. The U.S. military announced the first ever successful unmanned aerial “kill” of another aircraft during a previously unreported training exercise...

Sep 20 09:01

WATCH A SPACE ROBOT CAPTURE A RUNAWAY SATELLITE WITH ITS NET

What to do about a drifting satellite?

When their missions are done, satellites are supposed to trash themselves—either burning up in the atmosphere, or flying into a parking orbit out of everyone else’s way. But older or malfunctioning satellites aren’t always able to take care of themselves. These can become dangerous obstacles to everything else in orbit, from other satellites to the International Space Station, as can other debris left in orbit by butter fingers.

An experiment designed by the University of Surrey demonstrates one potential clean-up tactic: Use a net to ensnare the errant satellite; its extra weight and broader aerodynamic profile will pull the old satellite down into the atmosphere for incineration. This video shows the net in action:

Webmaster's Commentary: 

Very cool, University of Surrey; very cool indeed!!

Sep 20 08:45

MAJOR INSURANCE COMPANY TO ONLY SELL ONLY HEALTH-TRACKER BACKED LIFE INSURANCE

A week ago, Apple announced a redesigned smartwatch that could track heart data, run EKGs, and even detect atrial fibrillation, promising that it would save lives. Today, one of America's biggest insurers killed its traditional life insurance policies, replacing them with "interactive" insurance that encourages users to use such devices and share the data with them to get perks.

These are already available, but will soon be the only option on John Hancock's menu.

Policyholders score premium discounts for hitting exercise targets tracked on wearable devices such as a Fitbit or Apple Watch and get gift cards for retail stores and other perks by logging their workouts and healthy food purchases in an app.

Privacy and consumer advocates have raised questions about whether insurers may eventually use data to select the most profitable customers, while hiking rates for those who do not participate.

Webmaster's Commentary: 

I predict that we will see insurance rates hike to the point of people not using devices like this not being able to afford health insurance whatsoever.

So what's the next step, please; if the individual using such a tool takes a drop in their "insurance-worthiness", euthanasia?!?

Sep 20 07:57

Amazon Aims To Open 3,000 Cashierless Stores By 2021, Threatening Convenience Stores

By Aaron Kesel

Amazon is considering opening 3,000 cashierless Amazon Go stores by 2021, Bloomberg reported.

A move into retail by the online giant would threaten convenience stores and fast-food chains across the U.S. by selling items to customers cheaper and faster.

Current existing Amazon Go stores sell prepared sandwiches, salads, yogurt, and granola bars. That’s a market that is mostly occupied by small mom-and-pop convenience stores...

Sep 19 16:06

Hackers mine bitcoin & other cryptos using leaked spy tool from US govt – report

Bitcoin, monero and other popular cryptocurrencies are being mined by fraudsters who use EternalBlue, the US National Security Agency (NSA) hacking tool that was leaked last year, according to a recent report.

The report, published by the Cyber Threat Alliance (CTA), says detected cases of illicit cryptocurrency mining have skyrocketed to 459 percent in 2018 compared to last year. The surge is linked to the leak of EternalBlue, a tool to exploit vulnerabilities in outdated Microsoft Windows-based systems, the report says.

Sep 19 15:51

Privacy fears as popular US government payment site leaks more than 14 MILLION customers' records, including names, addresses and credit card information

Security investigator KrebsOnSecurity discovered that Government Payment Service Inc, or GovPayNet, was using outdated security practices that allowed anyone to easily access a customer's receipt data for anything from bail payments to traffic tickets.

As a result, it would potentially expose a user's name, address, phone number and the last four digits of their credit card number.

After a user pays for a bill on the GovPayNet website, they're directed to a confirmation page for each transaction, which includes a unique string of numbers at the end of the URL.

KrebsOnSecurity found that users could simply type in different receipt numbers in the web address to view other people's bills.

Sep 19 12:29

HILLARY CLINTON CONTROLS 50,000 FBI ENCRYPTION KEYS—PROVES MUELLER’S WITCH HUNT IS TREASONOUS

With these encryption keys, nothing in our digital lives is off limits to the Clinton's and their conspirators

President Trump’s new executive order can be sabotaged with these keys; alternatively, he can use the order to prosecute these criminals

Many foreign powers have conspired with the SES and their Queen’s Privy Council overlords since before 1993.

Sep 19 11:37

Child Protective Services Wants Artificial Intelligence To Predict Child Abuse

By Nicholas West

Predictive technology is exploding. The arrival of Big Data initiatives by government, as well as a massive industry of data brokers is not only putting privacy at risk, but is offering those with access to the information unprecedented ways to micromanage our lives. But predictive child abuse??? Various governments are working on it...

Sep 19 11:14

US police force ends use of Tiger Text self-deleting message app

Long Beach Police Department suspends use of Tiger Text phone application following Al Jazeera investigation.

Sep 19 11:09

America 'One Of 45 Countries' Infected By Uber-Powerful Israeli Smartphone Spyware

Some of the world’s most sophisticated Android and iPhone spyware has been found floating around America for the first time. It's one of as many as 45 countries in which NSO Group malware was uncovered. And together they may represent breaches of American and other nations' computer crime laws against cross-border hacking, not to mention a severe concern for citizens’ privacy, according to the researchers who uncovered the professional spy software.

The malware of concern, dubbed Pegasus, is the creation of NSO Group, an Israeli company valued at close to $1 billion. It can hide on Apple or Google devices, spying via the camera, listening in on conversations through the microphone, stealing documents and siphoning off once-private messages, amongst other surreptitious activities.

Sep 19 10:59

Feminists Rage Over Latest Injustice: Sexist iPhones

Feminists are spitting mad after Apple sexistly created an iPhone that was too large for tiny female hands, which are one inch smaller than the average man's hand according to a 2015 study.

Lodging complaints against the new iPhone XS which surely won't diminish cases of actual sexism, women such as University of North Carolina professor Zeynep Tufecki tweeted: "Women like me with small hands who need the most secure phone for safety reasons are stuck with something they can’t hold and constantly risk dropping."

Webmaster's Commentary: 

Whine, whimper, cry whine some more...

Sep 19 09:47

US military given more authority to launch preventative cyberattacks

The US military is taking a more aggressive stance against foreign government hackers who are targeting the US and is being granted more authority to launch preventative cyberstrikes, according to a summary of the Department of Defense's new Cyber Strategy.

The Pentagon is referring to the new stance as "defend forward," and the strategy will allow the US military "to disrupt or halt malicious cyber activity at its source, including activity that falls below the level of armed conflict."
The new military strategy, signed by Defense Secretary James Mattis, also emphasizes an intention to "build a more lethal force" of first-strike hackers.
The "defend forward" initiative wasn't included in the 2015 strategy and further enables the United States to carry out offensive hacking operations to defend against cyberattacks on critical US infrastructure, such as election systems and the energy grid.

Sep 19 09:22

Privacy Violation Alert: Google Admits To Changing Phone Settings Remotely

Google has apologized after admitting to changing the settings on Android users phones remotely and without the phone owners’ permission. Several Android users noticed their battery saver setting had been activated last week without their consent.

Most of the affected posters on Reddit described having a Google Pixel device. Other brands of Android devices were also mentioned, including the Essential Phone, which was designed by one of the creators of Android. Google Pixel phone users were surprised to see their phones’ battery saver function turned on while the battery is at 99% without them turning it on. This unusual incident was first reported by the Android Police, who said that a “substantial” number of Pixel owners complained about such a thing happening, according to the Business Times.

Sep 19 09:09

Mirai botmasters sentenced in District of Alaska federal court

Three men were sentenced to five years of probation in federal court in Anchorage for their role in operating the Mirai botnet.

Paras Jha, 21, of Fanwood, New Jersey; Josiah White, 20, of Washington, Penn.; and Salton Norman, 21, of Metairie, Louisiana, pleaded guilty in the District of Alaska in December to charges related to creating and operating the massive botnet.

"A botnet is a series of devices that have been compromised by a cybercriminal who is then able to control them from a remote location and cause them to respond to his commands," Supervisory Special Agent William Walton of the FBI Anchorage Division told Channel 2 in December.

[RELATED: Alaska spearheads investigation into 'one of the most powerful cyberattacks in history']

In operating the Mirai Botnet, Jha, White and Norman had harnessed a massively powerful collection of computers infected with malware that allowed the group to control them without the knowledge of the devices' owners.

Sep 19 08:38

This Windows file may be secretly hoarding your passwords and emails

If you're one of the people who own a stylus or touchscreen-capable Windows PC, then there's a high chance there's a file on your computer that has slowly collected sensitive data for the past months or even years.

This file is named WaitList.dat, and according to Digital Forensics and Incident Response (DFIR) expert Barnaby Skeggs, this file is only found on touchscreen-capable Windows PCs where the user has enabled the handwriting recognition feature [1, 2] that automatically translates stylus/touchscreen scribbles into formatted text.

Sep 19 08:28

Snowden Validated: European Court Says the Mass Surveillance He Exposed Violates Privacy Rights

When Edward Snowden revealed that the government was secretly collecting and storing mass amounts of our private communications data, he wasn't just talking about the United States government. He also exposed the United Kingdom's intelligence agency (Government Communications Headquarters, or GCHQ) as doing the same overseas.

Today the European Court of Human Rights ruled that the U.K.'s mass collection of everybody's internet communications data violated privacy and failed to provide sufficient safeguards. The Guardian explains that after Snowden exposed the British government's role in citizen surveillance, tapping into communication networks to suck on that massive firehose of data, 14 human rights and privacy groups filed suit against the U.K.

Sep 19 06:10

Powerful Android and iOS Spyware Found Deployed in 45 Countries

One of the world's most dangerous Android and iPhone spyware program has been found deployed against targets across 45 countries around the world over the last two years, a new report from Citizen Lab revealed.

The infamous spyware, dubbed Pegasus, is developed by NSO Group—an Israeli company which is mostly known for selling high-tech surveillance tools capable of remotely cracking into iPhones and Android devices to intelligence agencies around the world.

Pegasus is NSO Group's most powerful creation that has been designed to hack iPhone, Android, and other mobile devices remotely, allowing an attacker to access an incredible amount of data on a target victim, including text messages, calendar entries, emails, WhatsApp messages, user's location, microphone, and camera—all without the victim's knowledge.

Pegasus has previously been used to target human rights activists and journalists, from Mexico to the United Arab Emirates.

Sep 18 18:55

Google’s New ‘Selfish Ledger’ Aims to Direct Human Evolution and Track Your Entire Life

The Selfish Ledger is the title of a leaked Google video released earlier this year in May 2018. Now, a few months later, it’s worth taking a closer look at this apparently leaked vid.

Sep 18 15:55

Google signs up millions of carmakers to use Android in battle with Apple over in car entertainment systems

The Renault-Nissan-Mitsubishi alliance, one of the world's top-selling automakers, has decided to go with Google's Android operating system to run its dashboard information and entertainment features.

Sep 18 15:52

Family claims SPS Google Drive is storing personal information

A local family has claimed that the Springfield Public School System is accessing their personal accounts and storing their private information on the system's Google Drive without their permission.

Springfield residents Norman and Diane Ely went before the school board earlier this year and asked that the district check into safety concerns regarding private information that was being stored on SPS's Google Drive. They claimed that since that meeting, nothing has changed.

Tuesday, the Ely's addressed the board again with more alarming discoveries.

Sep 18 12:51

Exclusive: US police 'using Tiger Text app to conceal evidence'

Al Jazeera's Investigative Unit has discovered that a self-deleting messaging app called Tiger Text has been adopted by at least one US police department, which may have used it to share sensitive and potentially incriminating information that they wouldn't want to be disclosed to a court.

Current and former officers from the Long Beach Police Department in Southern California have told Al Jazeera that their police-issued phones had Tiger Text installed on them.

The Tiger Text app is designed to erase text messages after a set time period. Once the messages have been deleted, they cannot be retrieved - even through forensic analysis of the phone.

Sep 18 08:16

Card-stealing code that pwned British Airways, Ticketmaster pops up on more sites via hacked JS

Essentially, this is a textbook demonstration of why sensitive pages on websites – particular payment pages – should not carry any third-party code. If the JavaScript or other elements are hosted by an external source, and that source is pwned, and there is no way to detect that, it's game over for everyone. And if the source is supplying scripts to thousands of websites, it becomes a very valuable target: hacking it will compromise many, many online stores in one fell swoop.

Sep 18 08:02

Hillary Clinton used an unsecured Blackberry INSIDE Russia while Robert Mueller was FBI Director

NEW EVIDENCE proves that Hillary Clinton used her personal cell phone inside Russia as Secretary of State, exposing her phone and private email server to extreme risk of hacking by Russian intelligence agencies in mid-October 2009, just 10 months into her 4-year term. Clinton would later lie to the public and the FBI about her security practices in Russia, after apparently forgetting that this photo ever existed.

Sep 17 13:09

Watch: Censored Film Reveals The Israel Project's Secret Facebook Campaign

The Israel Project, a major advocacy group based in Washington, is running a secret influence campaign on Facebook.

This is revealed in The Lobby – USA, an undercover Al Jazeera documentary that has never been broadcast due to censorship by Qatar following pressure from pro-Israel organizations.

The video above, exclusive to The Electronic Intifada, shows the latest excerpts to leak from the documentary

>>>

Sep 17 12:57

Police Reveal Surveillance of Activists In Tweet About Recent Explosions, Then Commit Obstruction

By Aaron Kesel

The Massachusetts State Police shared the extent of damage of the gas explosion spreading across Merrimack Valley. But in the process they also shared a bookmarks folder at the top of the browser, which revealed they were spying on activists, Raw Story reported.

The state police’s official Twitter account shared a picture of the screen showing the locations of 39 fires and explosions...

Sep 17 11:45

What's up with these 'Congratulations Amazon User' pop-up ads?

Pop-up ads have long been the scourge of the internet. But the rise of ad blockers, plus anti-pop-up moves by Google and Firefox had given us hope that those days would soon be behind us.

So why are even the most tech-savvy among us starting to see ads appear congratulating us for being "selected as a winner" of a $1,000 Amazon gift card?

If you've found yourself staring at one of these ads on your phone and you have no idea how it happened, it's because of a "forced redirect" on the webpage, caused by a malware-like script running in one of the ads on the page. Needless to say, the gift card offer is almost guaranteed to be a scam.

The pop-ups in question appear on both smartphone and desktops, promising a prize in exchange for your personal information or a few clicks. They are is undeniably annoying, and quite clearly a scam.

Neither Android nor iPhone users are safe, and some frustrated web denizens are at their wits' end.

Sep 17 11:42

Robinhood Investing App Secretly Makes Millions Selling Millennials' User Data To HFT Firms

Stealing from millennials to give to the rich. Robinhood App sells user customer data to make a quick buck from the high-frequency trading (HFT) firms on Wall Street.

Robinhood Financial, LLC, a US-based mobile stock brokerage company, founded on the basis of disrupting the brokage industry by offering commission-free trading, has been secretly making millions of dollars in a profit scheme by selling users' data to HFT traders, said Logan Kane, a writer for North of Sunset Publishing.

Sep 17 10:42

Nasty piece of CSS code crashes and restarts iPhones

A security researcher has discovered a vulnerability in the WebKit rendering engine used by Safari that crashes and restarts the iOS operating system used by iPhones and iPads.

The vulnerability can be exploited by loading an HTML page that uses specially crafted CSS code. The CSS code isn't very complex and tries to apply a CSS effect known as backdrop-filter to a series of nested page segments (DIVs).

Sep 17 10:41

Beware! Unpatched Safari Browser Hack Lets Attackers Spoof URLs

A security researcher has discovered a serious vulnerability that could allow attackers to spoof website addresses in the Microsoft Edge web browser for Windows and Apple Safari for iOS.

While Microsoft fixed the address bar URL spoofing vulnerability last month as part of its monthly security updates, Safari is still unpatched, potentially leaving Apple users vulnerable to phishing attacks.

Sep 17 10:39

Watch Out! This New Web Exploit Can Crash and Restart Your iPhone

It's 2018, and just a few lines of code can crash and restart any iPhone or iPad and can cause a Mac computer to freeze.

Sabri Haddouche, a security researcher at encrypted instant messaging app Wire, revealed a proof-of-concept (PoC) web page containing an exploit that uses only a few lines of specially crafted CSS & HTML code.

Beyond just a simple crash, the web page, if visited, causes a full device kernel panic and an entire system reboot.

Sep 17 10:37

Ransomware Attack Takes Down Bristol Airport's Flight Display Screens

Bristol Airport has blamed a ransomware attack for causing a blackout of flight information screens for two days over the weekend.

The airport said that the attack started Friday morning, taking out several computers over the airport network, including its in-house display screens which provide details about the arrival and departure information of flights.

The attack forced the airport officials to take down its systems and use whiteboards and paper posters to announce check-in and arrival information for flights going through the airport and luggage pickup points for all Friday, Saturday, and the subsequent night.

Sep 17 10:21

A VIEW OF THE DEADLY WORLD ORDER

As of five years ago half of the wealth in the world belonged to the top 1%. Furthermore, the top 10% hold 85% of the total world wealth. But these figures do not tell the whole story. A Credit Suisse Report, “Wealth Distribution & Gini (2013)” tells us the damnable reality of disproportionate value our world is faltering under. While some would argue that the United States of America’s citizens being thirty times wealthier on average than Russian citizens is some kind of golden badge of excellence, others would argue about who is benefiting from whom. Countries like Denmark, with virtually no natural resources, have a citizenry 25 times richer than Russians, 12 times richer than South Africans, 35 times wealthier than Venezuelans, and nearly twice as prosperous as people from oil-rich Qatar. Don’t take my word, parous the unbelievable statistics yourself.

Sep 17 10:13

POLICE STUMPED IN SEARCH FOR MISSING WIKILEAKS-LINKED CYBERSECURITY EXPERT

Nobody has heard from cybersecurity expert and occasional Wikileaks collaborator Arjen Kamphuis since he checked out of his hotel in Bodo, Norway one month ago.

In the intervening weeks, items purportedly belonging to Kamphuis, including his ID and a recently purchased kayak, were discovered by a local fisherman 50 kilometers from his hotel. While this would at first seem to suggest some type of fatal accident, in a strange twist, authorities say that both Kamphuis' work and mobile phones were briefly switched on more than 1,700 km from Bodo 10 days after Kamphuis - who is Dutch and was purportedly traveling back to Amsterdam when he disappeared - was seen leaving his hotel.

Webmaster's Commentary: 

My best guesses here are that he has either been done away with, by an excellent hired assassin who knows how to leave no trail whatsoever, or that the man is running for his life, and knows his "threat assessment" is near to death, because of the way in which Wikileaks has consistently ticked off people in power by telling the American public the truth about them.

Sep 17 09:53

MAJOR: NATO MAY INVOKE ARTICLE 5 IF ‘CYBER ATTACKED’ BY RUSSIA

Article 5 of the 1949 Washington Treaty established the principle of collective defense in the case of an attack against one of the allies, which would then be considered an attack on all signatories. The text, however, did not anticipate a cyber attack at the time.

NATO Secretary-General Jens Stoltenberg said in an interview released on Monday that the bloc could invoke Article 5 on collective defense in the event of a cyber attack by Russia.

“We will never be specific [about] when we will turn to Article 5,” Stoltenberg told Axios news portal, responding to strategies for a possible cyber attack in Russia. Stoltenberg added that the alliance was boosting its cyber security and planned to develop cybernetic offensive capabilities.

Sep 17 09:02

Efforts To Protect Us From Unproven 5G Cell Towers Radiation Health Effects

By Catherine J. Frompovich

Americans for Responsible Technology and Grassroots teamed up the week of September 9, 2018 to visit members of the U.S. Congress House and Senate Commerce Committees, which have jurisdiction over the Federal Communications Commission, in order to inform legislative directors and aides about the science on wireless radiation, which has been “memory-holed” by all who fast track 5G wireless with its special cell towers that must be placed within very close proximity to consumers residences, or even on their properties, in order to implement that technology...

Sep 16 17:16

Google engineers and scientists flee the company as EVIL takes over

Google has become so unethical that even some of its own employees want nothing to do with it anymore. In the latest example of the company driving away valued workers, senior research scientist Jack Poulson has quit his job in protest of the company’s plans to launch a censored version of the Google search engine in China.

Sep 16 12:30

Hacker Steals Tesla Model 3 From Mall of America Using Only A Smartphone

After several humiliating months for Elon Musk and Tesla, the company may have just set a new standard for embarrassing itself when one of its Model 3 vehicles was allegedly stolen from the Mall of America by a 21-year-old, using only his smartphone.

In what will likely come as a blow for confidence in Tesla's software security and deeply troubling set of circumstances for the folks at Tesla customer service, The Drive reported that the car was stolen after Tesla customer service, over the phone, reportedly "handed the thief the keys" by allowing him to add the car, by VIN number, to his Tesla account. The alleged thief then made it 1,000 miles before being caught.

Sep 15 10:42

FEMA to test 'Presidential Alert' system next week

President Donald Trump may soon be communicating with you directly on your phone — even if you don't follow him on Twitter.

Next Thursday, the Federal Emergency Management Agency will do its first test of a system that allows the president to send a message to most U.S. cellphones.

More than 100 mobile carriers, including all the major wireless firms, are participating in the roll out, FEMA stated in a message on its website posted Thursday.

"The EAS [Emergency Alert System] is a national public warning system that provides the President with the communications capability to address the nation during a national emergency," FEMA said.

The test message will have a header that reads "Presidential Alert," according to the agency.

Users whose phones are on will twice hear a tone and vibration and then see an English-only (for now) message: "THIS IS A TEST of the National Wireless Emergency Alert System. No action is needed.”

Webmaster's Commentary: 

One has to wonder at the timing of this test, and what "national emergency" information(or false flag disinfo) we will be getting the first time this is actually used for real.

Sep 15 10:19

Israel running campaign against Jeremy Corbyn

An app operated as part of an Israeli government propaganda campaign issued a “mission” for social media users to make comments against Labour Party leader Jeremy Corbyn, accusing him of anti-Semitism.

This is the latest evidence of an Israeli campaign of psychological warfare against the UK’s main opposition party.

The Act.IL app on Sunday falsely accused Corbyn of comparing Israel to Nazi Germany in a 2010 meeting which had been resurfaced by The Times last week.

The “mission” was documented in this Tweet by Michael Bueckert, a Canadian researcher who has been monitoring the app since last year.

The reality is very different from the app’s claims.

Sep 15 10:12

Israeli government launch video of Twitter/Facebook “Command Centre”, which monitors “all posts” for “anti-semitism”

AI culture wars: Israeli government launch video of Twitter/Facebook "Command Centre", which monitors "all posts" for "anti-semitism" with "artificial intelligence" then lodges complaints e.g with "intelligence & law enforcement" in a "certain european country" or other officials

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA