COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Jun 06 11:00

How The Intercept Outed Reality Winner

Today, The Intercept released documents on election tampering from an NSA leaker. Later, the arrest warrant request for an NSA contractor named "Reality Winner" was published, showing how they tracked her down because she had printed out the documents and sent them to The Intercept. The document posted by the Intercept isn't the original PDF file, but a PDF containing the pictures of the printed version that was then later scanned in.

Jun 06 10:10

London Attack, Cyber Warfare, Putin, Trump, and Climate Hoax. Michael Rivero - June 5, 2017

Jun 06 09:33

Facebook wants to SPY on you through your webcam or phone: Creepy patent reveals footage collected would be used to tailor material but critics warn it is an 'ethical minefield'

The patent describes using 'passive imaging data' – video captured by cameras which aren't turned on.

An algorithm would then determine the user's emotion, based on their facial expressions.

To illustrate how the system would work, Facebook created a fictitious person, called Desmond Jones.

The patent says: 'It appears from the profile that the user, Desmond Jones, was looking away from his device during a kitten video posted by Tim Boone.

'Thus, a content delivery system may determine to exclude videos of that type in the future.

'In another example, it appears that the user has watched an advertisement for scotch. Thus, in the future, more advertisements for scotch may be displayed to the user.'

Jun 06 09:26

flashback ---- DHS Caught Pretending To Be Russian Hackers

Georgia’s Secretary of State Brian Kemp claims the Department of Homeland Security (DHS) tried to hack into his office’s firewall, pretending to be Russian hackers.

Jun 06 09:03

DEA Deploying Powerful Spyware Without Required Privacy Impact Assessments

It's not just the FBI that can't seem to turn in its privacy-related paperwork on time. The FBI has pushed forward with its biometric database rollout -- despite the database being inaccurate, heavily-populated with non-criminals, and without the statutorily-required Privacy Impact Assessment that's supposed to accompany it. As of 2014, it hadn't produced this PIA, one it had promised in 2012. And one that applied to a system that had been in the works since 2008.

Jun 06 08:54

Tech World Angry With Theresa May’s Internet Regulation Plans

Internet companies, tech experts, activists and fellow politicians have reacted to PM May’s comments with disapproval, even accusing her of pushing her own agenda in the wake of recent tragic events.

Limiting cryptography or building the kind of backdoors that May wants would end up crippling the Internet as we know it, argues author and BoingBoing co-editor Cory Doctorow. He claims: “There’s no back door that only lets good guys go through it.” Even if app developers were instructed to refrain from using encryption, it would be very difficult to stop criminals from encrypting their messages manually or writing them in code.

Mark Chapman, UK Pirate Party’s candidate for Vauxhall, said: “Regulating the internet is not the answer, and it is shameful that Theresa May is so quick to use the events of a tragedy to fuel her own autocratic agenda.”

Jun 06 08:44

Peplink patches SD-WAN routers

SD-WAN company Peplink has patched its load-balancing routers against vulnerabilities turned up by a German pentest company.

The bugs discovered by X41 Security centre, as is so often the case, around the products' Web admin interface, with seven individual bugs reported (CVE-2017-8835 to CVE-2017-8841).

The vulnerabilities include a critical SQL injection attack via the bauth cookie; a lack of cross-site request forgery protection; clear text password storage; two cross-site scripting bugs; a file deletion vulnerability; and an information disclosure bug.

Jun 06 08:41

Apple gives world ... umm ... not much new actually

Minimalist makeovers for iPad, Mac, iOS and MacOS leave Cupertino perhaps looking iterative, not innovative

Jun 05 16:39

Ex-spy says NSA did mass surveillance during Utah Olympics

A former top spy agency official who was the target of a government leak investigation says the National Security Agency conducted blanket surveillance in Salt Lake City during the 2002 Winter Olympics, according to court documents.

Ex-NSA official Thomas Drake wrote in a declaration released Friday that the agency collected and stored virtually all electronic communications going into or out of the Salt Lake area, including the contents of emails and text messages.

"Officials in the NSA and FBI viewed the Salt Lake Olympics Field Op as a golden opportunity to bring together resources from both agencies to experiment with and fine tune a new scale of mass surveillance," Drake wrote.

Jun 05 16:31

Europe's looming data protection rules look swell – for IT security peddlers. Ker-ching!

The rush to comply with Europe's upcoming General Data Protection Regulation will balloon the continent's IT security budgets to $11.5bn in 2018, analyst group Canalys reckons.

That's a 16 per cent year on year increase, apparently. For what it's worth, IDC thinks Europe will spend $19bn on IT security this year, and more next year. Whichever figure you prefer, both analysts houses are anticipating fatter infosec invoices as the decade closes out.

Jun 05 15:46

Devastating Global ‘ExplodingCan’ Cyber Attack Is Imminent, Warns Experts

Experts have warned that a devastating global cyber attack is imminent.

Jun 05 13:47

DEA DEPLOYING POWERFUL SPYWARE WITHOUT REQUIRED PRIVACY IMPACT ASSESSMENTS

It's not just the FBI that can't seem to turn in its privacy-related paperwork on time. The FBI has pushed forward with its biometric database rollout -- despite the database being inaccurate, heavily-populated with non-criminals, and without the statutorily-required Privacy Impact Assessment that's supposed to accompany it. As of 2014, it hadn't produced this PIA, one it had promised in 2012. And one that applied to a system that had been in the works since 2008.

Jun 05 13:32

Dear Great Britain – Blame Your Intelligence Agencies and Government, Not the Internet

The dishonest and dangerous response of Theresa May’s UK government to the horrific terrorist attacks of the past month is unfortunately all too common when it comes to those in power. Rather than look inward at the glaring shadiness and corruption inherent throughout UK government polices, its “leaders” are looking to use these barbaric acts as a excuse to push through an authoritarian and illiberal expansion of state power. Specifically, Theresa May’s government is despicably using the attacks to push for regulation and censorship of the internet.

Jun 05 09:23

Hypocritical Theresa May Once Fought Against Government Surveillance

British Prime Minister, Theresa May, is calling for the eradication of Internet rights and freedoms, following the recent terrorist attacks in Manchester and London.

Jun 05 08:20

Malware infecting 250 million devices could be a 'catastrophe'

An invasive form of malware believed to be attached to a Chinese firm could spell "global catastrophe," according to the cybersecurity firm that discovered it. The software has the power to gain near-complete control of targets, including spying on files.

Dubbed Fireball, the malware was found by researchers at Check Point Security. The team said its purpose is to hijack web traffic to generate fraudulent ad revenue. It also includes remote control features for downloading more malware in the future.

Jun 04 17:10

Flashback: Theresa May to create new internet that would be controlled and regulated by government

Theresa May is planning to introduce huge regulations on the way the internet works, allowing the government to decide what is said online.

Particular focus has been drawn to the end of the manifesto, which makes clear that the Tories want to introduce huge changes to the way the internet works.

"Some people say that it is not for government to regulate when it comes to technology and the internet," it states. "We disagree."

Senior Tories confirmed to BuzzFeed News that the phrasing indicates that the government intends to introduce huge restrictions on what people can post, share and publish online.

Jun 04 17:05

Days before election, British PM accused of using attacks to push for wider surveillance

But authorities have confirmed that the response to Saturday's attack was "police-led," indicating that there was no prior intelligence, suggesting the government was caught entirely by surprise.

Despite the political rhetoric, neither May nor the police have shown any evidence that the internet was involved in any way.

On one part, it gives a possible insight into why no intelligence was picked up in the first place, and yet on the other, questions remain if greater surveillance would have even helped.

Jun 04 17:01

May’s call for more control of internet misleading and misguided

These are not new suggestions, incidentally, but reiterate proposals in the Conservative Party election manifesto.

They are also misleading and misguided. Misleading because the UK, under the Conservatives, has already recently passed the draconian Investigatory Powers Act, which hands sweeping powers of oversight and surveillance to the government and its agencies.

Under its provisions, the entire browsing history of everyone in the UK must be retained for a year and may be accessed by police and various state agencies. Surveillance agencies have new powers to hack computers and devices, including to conduct secret bulk surveillance on populations outside of the UK.

The government also has the right to demand tech companies insert weaknesses, known as backdoors, into devices and software to enable law enforcement to access data. In addition, encryption on messaging services such as WhatsApp can be removed on government request.

Jun 04 16:56

Theresa May criticised over ‘intellectually lazy’ internet regulation proposal

Professor Peter Neumann, director of the International Centre For The Study Of Radicalisation at King’s College London, was also critical of Mrs May’s speech.

He wrote on Twitter: “Big social media platforms have cracked down on jihadist accounts, with result that most jihadists are now using end-to-end encrypted messenger platforms e.g. Telegram. This has not solved problem, just made it different.

“Moreover, few people radicalised exclusively online. Blaming social media platforms is politically convenient but intellectually lazy.”

Jun 04 08:28

Theresa May says the internet must now be regulated following London Bridge terror attack

New international agreements should be introduced to regulate the internet in the light of the London Bridge terror attack, Theresa May has said.

The Prime Minister said introducing new rules for cyberspace would “deprive the extremists of their safe spaces online” and that technology firms were not currently doing enough.

The Prime Minister made the comments outside Downing Street on Sunday morning in the aftermath of the van and knife attack that saw seven people killed and dozens injured.

London attack shows too much tolerance for extremism in UK, May says
"We cannot allow this ideology the safe space it needs to breed - yet that is precisely what the internet, and the big companies that provide internet-based services provide,” Ms May said.

“We need to work with allies democratic governments to reach international agreements to regulate cyberspace to prevent the spread of extremist and terrorism planning.

Webmaster's Commentary: 

Prime Minister May, a word, please.

Let me start by saying that as a Christian Pacifist Activist, I can never condone violence, ever.

But what of the violence visited upon those countries with resources which the US and UK have expropriated, to which they had utterly no moral right, and whose governments the US and UK have regime changed in order to obtain those resources, and made sure that they were only sold to specific countries, and only for specific currencies?!?

There are no excuses for what happened in London yesterday.

But Prime Minister May, it is hubristic, and disingenuously simplistic in the extreme, to imagine that even without the internet, there would not be blowback from the intense anger caused by these actions, and that this blowback would not, ultimately have horrific consequences.

My heart, soul, and prayers, are with the victims, their families, and their friends. Three of my family surnames are British; they are Yarbrough, Darling, and Rawson, so this is personal for me.

But radicalism of any stripe doesn't just come out of thin air; and if you, and the rest of those in British government serving the British people, are honest with yourself, you also understand this.

So in order to prevent this from becoming the "new normal" in the UK, here is what you and your government need to do.

First, get a consortium from all the great universities in the UK working together, on a very urgent project, to get forms of workable, practical renewable energy created, and patented by the UK government, with some revenue sharing for the universities that helped invent this (Can you imagine what a revenue stream something like THAT would create for the UK?!?)

You have some of the greatest scientific minds on the planet located in the UK; USE THEM!!

This will mean you no longer will have to regime change; invade; or expropriate energy resources anywhere on the planet, ever again.

Withdraw your troops from wherever they are on the planet, except as defense in the UK; use some of the money from that patent to help to heal countries your geopolitical policies have destroyed, like Yemen; Libya; Afghanistan; and Somalia. No geopolitical violence; no counter-violence.

You have the opportunity to have the UK become a trail-blazer for both peace, and the development of alternative energy, which can change the world in a positive way, Prime Minister May. In the Chinese language, the ideogram for "crisis" and "opportunity" is one in the same.

Please seize the opportunity.

Jun 03 07:49

‘WikiLeaks’ Vault 7 cache shows US – not Russia – hacked past French elections’

It appears that this attack was of such of low technical level it could have been done by a script kiddie from their mom’s basement. So rather than this hysteria about: ‘The Russians must have done it, the Russians must have done it,’ which reminds me to a certain extent of the Monty Python script that ‘you must always expect a Spanish Inquisition.’ It is beyond parody. We have a situation now where he was trying to make political hay. It seems to me that any establishment-anointed political candidate now wants to immediately say they are under attack by the Russians because it gives them credibility. It is just crazy.

Jun 03 07:41

U.S. hackers could have framed Russia in election hack: Putin tells NBC

American hackers could have planted false evidence that Russia interfered in the U.S. presidential election, President Vladimir Putin was quoted as saying by NBC News on Saturday.

U.S. intelligence officials have said Russia tried to interfere in the U.S. election by hacking the Democratic Party to sway the vote in favor of Donald Trump, a charge the Kremlin has repeatedly denied.

Jun 03 06:51

NATO Might Invoke Article 5 Over a Serious Cyberattack

NATO officials at a conference in Estonia are discussing the risks of cyberattacks, and talking up the possibility of invoking Article 5, an alliance-wide obligation for member nations to come to the military defense of the attacked nation, in the event of “certain” cyberattacks.

CyberProject Director Catherine Lotrionte said there would need to be a “legal threshold” for the triggering of Article 5, and that such an action would need to only be considered in the case of a “grave threat” which is also “current,” and not in retaliation for something that happened years ago.

Webmaster's Commentary: 

Is NATO telegraphing a coming computer "false flag" to be blamed on the "villain du jure" ?!?

Take your pick; a DOS attack to be blamed on Russia, Iran, or perhaps North Korea, as an "excuse" to fight back, and with actual military combat?!?

Nothing would surprise me here.

Jun 02 13:20

Samba Security Hole Patched but Risk is Bigger

Millions of devices that use Samba Server are vulnerable to attacks.

The world barely recovered from the havoc caused by WannaCry ransomware before a new vulnerability was found in the open source Samba networking utility.

According to Samba.org, “All versions of Samba from 3.5.0 onwards are vulnerable to a remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.”

In pure open source tradition, the patch was released immediately, and most Linux distributions have pushed it into their repository.

The real-world situation is grimmer than it appears. First, it’s not a new bug. The bug has been lurking around for the last seven years, since version 3.5.0 was released in 2010. It exposes a serious problem in the Linux world: It doesn't have enough eyeballs to make all bugs shallow.

Jun 02 11:10

DID GUCCIFER 2.0 FAKE “RUSSIAN FINGERPRINTS?”

The veracity of alleged “Russian hacking fingerprints” reported by cyber firm Crowdstrike on the DNC’s servers have been facing renewed scrutiny in recent weeks. If it can be proven that evidence of “Russian Hacking” had been simulated by the creators of Guccifer 2.0, then the essential fabric of the ‘Russian Hacking’ narrative would unravel. The creation of Guccifer 2.0, and the intent behind its creation, may have a profound effect on establishing the real source of the DNC leaks.

Jun 02 10:42

Dangerous Airline Boarding Pass Hacking Trend Puts Travelers At Risk

If that sounds insane, it happened to travel blogger Ben Schlappig. Schlappig prides himself on blogging live, and in 2011, he had an internet troll who logged onto his accounts and changed his reservations two times a few hours before Schlappig was set to check-in for long haul flights.

“I won’t change the fact that I like to post my travel patterns in advance. It’s what makes blogging fun, and trust me, that’s the main reason I do this,” said Schlappig, in a post following the incident.

Although he almost lost his first-class plane ticket to Paris, Schlappig wasn’t upset at the airlines, and instead decided to password protect all his reservations, so that his internet troll could never foil his travel plans again.

Jun 02 10:13

FBI Paid Geek Squad to Illegally Spy on Customer's Computers

The Electronic Frontier Foundation (EFF) plans to sue the Department of Justice after the FBI allegedly spied on people's computers without a warrant.

The Internet rights group claims that staff working for Best Buy’s Geek Squad in Kentucky illegally searched through customers devices looking for child pornography.

Jun 02 09:25

EFF: WHY WE’RE SUING THE GOVERNMENT FOR RECORDS ABOUT GEEK SQUAD INFORMANTS

A federal prosecution of a doctor in California revealed that the FBI has been working for several years to cultivate informants in Best Buy’s national repair facility in Brooks, Kentucky, including reportedly paying eight Geek Squad employees as informants.

According to court records in the prosecution of the doctor, Mark Rettenmaier, the scheme would work as follows: Customers with computer problems would take their devices to the Geek Squad for repair. Once Geek Squad employees had the devices, they would surreptitiously search the unallocated storage space on the devices for evidence of suspected child porn images and then report any hits to the FBI for criminal prosecution.

Court records show that some Geek Squad employees received $500 or $1,000 payments from the FBI.

Webmaster's Commentary: 

The viewing of child porn is something I just don't, emotionally or intellectually, understand; I just don't get it.

That being said, subcontracting Geek Squad to be on the prowl for this emotionally ill practice, while allegedly fixing a computer that is on the fritz, is a 4th amendment violation, absolutely, and should not be allowed or tolerated.

And the thing that is interesting here is, why was this doctor suspected of harboring child porn on his computer in the first place?!? Was there a rival, attempting to destroy his professional reputation?!? Or was it a disgruntled ex-spouse, trying to ruin him?!?

Or, has this kind of witch hunt become standard operating procedure for the collaboration of the Geek Squad with the FBI?!?

Were I having problems with my computer, I would never darken the doors of Best Buy again, for either repair or purchase. I have nothing to hide; everything they would see on my computer is straight-up; but this is an issue of principle.

We are so falling down the rabbit hole of "Code Napoleon Law" (where one is considered guilty until proven innocent), and at such warp speed, that it is making my head spin.

Jun 02 08:28

Goodness gracious, great Chinese 'Fireball' malware infects 250m systems worldwide

A strain of Chinese browser-hijacking malware dubbed Fireball has infected 250 million computers.

The malware takes over web browsers and turns them into zombies, security firm Check Point warns. Fireball is capable of executing any code on the infected machines, resulting in a wide range of actions from stealing credentials to dropping additional software nasties.

Currently, Fireball installs plug-ins and additional configurations to boost its advertisements, but can just as easily turn into a prominent distributor for any additional malware. In its adware mode, Fireball hijacks and manipulates infected users' web traffic to generate ad revenue.

Fireball spreads mostly via "bundling", which means it is installed alongside a program the user wants to download, but without their consent.

Jun 02 08:27

Whoops! Microsoft accidentally lets out a mobile-'bricking' OS update

“A small portion” of Windows mobile users hoping the unexpected cool new update would start the month off the right way got burned yesterday. Microsoft “accidentally” released a development build of Windows 10 that can transform your phone into jelly if you try to install it.

“We apologize for this inconvenience,” said Microsoft Windows and Devices Group software engineer Dona Sarkar in a blog post last night.

It’s not a pretty situation. If you try installing the build on your mobile device, it will get stuck in a reboot loop and the only way out is to wipe it and start over. Even if you’ve only downloaded it, you will still have to do a hard device reset.

Jun 02 07:20

Are Microwaves Mutating Enablers For Bacteria And Other Super Bugs?

By Catherine J. Frompovich

Professor Olle Johansson, Associate Professor at the Karolinska Institute, Department of Neuroscience and head of The Experimental Dermatology Unit, in Stockholm, Sweden, recently advised about extremely-concerning research confirming “bacteria exposed to mobile phone and WiFi radiation turned resistant to antibiotics, science demonstrates.”...

Jun 01 16:55

JetBlue Joins Delta In Push Toward Biometric ID; Partners With U.S. Customs And Border Protection

By Nicholas West

Just last week I reported on a new program initiated by Delta Airlines at Minneapolis-St. Paul airport to have automated baggage kiosks for “priority customers” that will first scan a traveler’s passport, then their face in order to match identity to checked luggage. It was promoted as a “pilot program” that Delta launched to seek customer feedback in the hope that it could be rolled out more widely in the future. However, pilot program or not, a new announcement by JetBlue makes it clear that this is quickly heading toward the mandatory in the very near future...

Jun 01 11:17

White House Petition - Appoint a Special Prosecutor to investigate the murder of Seth Rich, the alleged Wikileaks email leaker

On July 10, 2016, Seth Rich was shot twice in the early morning as he walked back to his house in Washington D.C. Immediately after the crime, the death was called an armed robbery... but none of Seth Rich's belongings were taken from him.

Rod Wheeler, a private investigator hired by the family, said that there was evidence Seth Rich had contacted WikiLeaks and that law enforcement were covering this up. MSM is not covering this murder, instead pushing it to the side, so it is now up to us.

The facts do not add up, law enforcement stopped covering the crime, and now it is time for us to fight for justice. Seth Rich deserves this.

Webmaster's Commentary: 

The confirmation link in the email DOES NOT WORK!

Jun 01 10:37

Wasserman Schultz Admits Hill IT Security Violations, Blames House Administrators For Not Stopping Her

Florida Democratic Rep. Debbie Wasserman Schultz, whose office equipment U.S. Capitol Police seized in a criminal investigation into congressional network security violations, admitted she violates official information security policy and blamed the House’s chief administrative officer for not stopping her.

Jun 01 10:36

More than 2 MILLION of Hillary Clinton's Twitter followers are fake or never tweet – and she's already under fire for 'buying' fake Facebook fans

Two different online audit tools say no more than 44 per cent of Hillary's 3.6 million Twitter fans are real people who participate in the platform

Jun 01 10:33

Justice Department Sued for Records on FBI Training of Best Buy Geek Squad Spies

The Justice Department was sued Wednesday by a privacy group seeking information on the FBI recruitment of Best Buy employees to search consumer computers for child pornography during repairs — a practice that came to light in court documents in a recent case in Santa Ana, California.

The Electronic Frontier Foundation (EFF) filed a Freedom of Information Act lawsuit against the Trump administration’s Justice Department, demanding access to records about any FBI training and payment to Geek Squad workers to search customer computers without a court warrant.

Jun 01 09:26

MICROSOFT CO-FOUNDER BUILT THE WORLD’S LARGEST PLANE TO LAUNCH ROCKETS INTO SPACE

Microsoft co-founder Paul Allen has spent the last six years working on a giant aircraft capable of launching rockets to space. Today, his company Stratolaunch Systems literally rolled that plane out of its hangar in the Mojave Desert for the first time ever.

Jun 01 09:26

VIDEO: DRAPER'S GENETICALLY MODIFIED CYBORG DRAGONFLEYE TAKES FLIGHT

In January, we wrote about a cybernetic micro air vehicle under development at Draper called DragonflEye. DragonflEye consists of a living, slightly modified dragonfly that carries a small backpack of electronics. The backpack interfaces directly with the dragonfly’s nervous system to control it, and uses tiny solar panels to harvest enough energy to power itself without the need for batteries. Draper showed us a nifty looking mock-up of what the system might look like a few months ago, but today, they’ve posted the first video of DragonflEye taking to the air.

Jun 01 08:43

Password manager OneLogin hit by data breach

Encrypted information has been accessed during a data breach at the password management service, OneLogin.

It affects "all customers served by our US data centre" and perpetrators had "the ability to decrypt encrypted data", according to The Register.

Those affected have been advised to visit a registration-only support page, outlining the steps they need to take.

Security experts said the breach was "embarrassing" and showed every company was open to attack.

OneLogin is a single sign-on service, allowing users to access multiple apps and sites with just one password.

Jun 01 08:38

Crapness of WannaCrypt coding offers hope for ransomware victims

Mistakes in the WannaCrypt ransomware worm might allow files to be restored after infection.

A crack team of security researchers at Kaspersky Lab has discovered that WannaCrypt, which infected hundreds of thousands victims at the beginning of May, contains several coding errors.

Most of the whoopsies make it possible to restore files with the help of publicly available software tools. In one case a mistake in the malware's read-only file processing mechanism does not allow it to encrypt read-only files at all. Instead, the malware creates encrypted copies of the files, while the original files remain untouched and are only given a "hidden" attribute, which is easy to undo.

Jun 01 08:36

US Defense Contractor left Sensitive Files on Amazon Server Without Password

Sensitive files linked to the United States intelligence agency were reportedly left on a public Amazon server by one of the nation's top intelligence contractor without a password, according to a new report.

UpGuard cyber risk analyst Chris Vickery discovered a cache of 60,000 documents from a US military project for the National Geospatial-Intelligence Agency (NGA) left unsecured on Amazon cloud storage server for anyone to access.

The documents included passwords to a US government system containing sensitive information, and the security credentials of a senior employee of Booz Allen Hamilton, one of the country's top defense contractors.

Jun 01 08:35

High-Severity Linux Sudo Flaw Allows Users to Gain Root Privileges

The vulnerability, which affects Sudo 1.8.6p7 through 1.8.20 and marked as high severity, has already been patched in Sudo 1.8.20p1, and users are recommended to update their systems to the latest release.

Red Hat yesterday pushed out patches for Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7, and Red Hat Enterprise Linux Server. Debian has also released fixes for its Wheezy, Jessie and Sid releases and SUSE Linux has rolled out fixes for a number of its products.

Jun 01 08:27

France Finds No Traces of Russian Hackers in Attack on Macron's Campaign

France has found no traces of Russian hackers in a cyberattack on President Emmanuel Macron's campaign, the head of the French National Agency of Information Systems Security (ANSSI) said.

Jun 01 07:47

‘Fucking Bullshit’ : DNC Data Director on Hillary Clinton's Latest Election Loss Claims

Clinton claimed Wednesday that the DNC fell far behind the RNC in terms of voter and data analysis, saying the DNC’s data was “mediocre to poor, nonexistent, wrong.”

“I had to inject money into it,” she said.

May 31 15:43

Apple IPhones Could Soon Be Fitted With Artificial Intelligence Thanks To New ‘Neural Engine’ Chip

APPLE is reportedly planning to install an artificial intelligence chip in upcoming iPhones.

The tech giant is said to be working on a chip called the Apple Neural Engine which would be dedicated to carrying out artificial intelligence (AI) processing, news.com.au reports.

May 31 15:31

Democrat operative David Brock’s chat shows NSA surveillance used to identify and disable online Trump supporters

Panicking that Hillary had lost the debate (“we’re losing 100%”; “Trump made her look like a girl.”), and recognizing that Trump’s supporters are “enthusiastic” and “organized,” Brock et al. vowed they “have to stop the bleeding” and must “hit back hard” with new methods because “the usual means” of online trolling (“disruption scripts” and “down-voting”) “isn’t working” and because Trump supporters are sub-human “deplorables”.

May 31 14:09

Uber Fires Self-Driving Car Chief Over Lawsuit With Google’s Waymo

Taxi firm Uber has sacked its vice president responsible for its self-driving car project. Anthony Levandowski is out after refusing to follow court orders to hand over documents related to the technology Google’s parent company says he stole.

May 31 13:55

WannaCry Ransomware Attack Linked To China, Not Russia Or North Korea

A few weeks ago, in what was described as one of the "worst-ever recorded attacks of its kind," the WannaCry ransomware virus spread the globe at an alarming rate, seizing control of private networks and demanding bitcoin payments to relinquish that control. As we pointed out then, and not terribly surprisingly, those pesky "Russian hackers," the same ones that lay relatively dormant for years then suddenly emerged from hibernation in 2016 to hack the DNC, John Podesta and the entire 2016 U.S. presidential election, were initially considered to be the most likely culprits for the WannaCry virus.

May 31 13:08

Google, Facebook Are Super Upset They May No Longer Be Able To Sell Your Internet Data Without Permission

Google and Facebook are actively trying to stop a proposed law that would force them to acquire consent from users before collecting their personal information.

May 31 09:48

FLASHBACK - Murdered DNC Staffer Seth Rich Shared 44,053 Democrat Emails With WikiLeaks: Report

The Democratic National Committee staffer who was gunned down on July 10 on a Washington, D.C., street just steps from his home had leaked thousands of internal emails to WikiLeaks, law enforcement sources told Fox News.

A federal investigator who reviewed an FBI forensic report detailing the contents of DNC staffer Seth Rich’s computer generated within 96 hours after his murder, said Rich made contact with WikiLeaks through Gavin MacFadyen, a now-deceased American investigative reporter, documentary filmmaker, and director of WikiLeaks who was living in London at the time.

“I have seen and read the emails between Seth Rich and Wikileaks,” the federal investigator told Fox News, confirming the MacFadyen connection. He said the emails are in possession of the FBI, while the stalled case is in the hands of the Washington Police Department.

May 31 08:41

Sorting Out Seth Rich

The acquisition and transfer of these emails has been risibly-- and without a shred of evidence-- ascribed to Vlad Putin and/or the Russians generally. This is part of the swamp-thing propaganda drumbeat meant to forestall any rapprochemént with Russia as threatened (or refreshingly promised) by Trump during his presidential campaign (the difference depending on whether you're an arms merchant, a bring-on-the-rapture world-burner or a Deep State imperialist psychopath, or you're a rational human being).

Against this agenda-serving "Russians did it" absurdity, Seth Rich has very plausibly (and by several witnesses) been identified as the actual source of the emails. He is said to have secured and delivered them, as a lone wolf, due to his disgust with the DNC and Clinton crowd's subversion of the democratic process.

If Rich really is the lone source of the emails, of course, the whole "Russians did it; beware the evil Rooskies!" thing evaporates.

May 31 08:36

Intel reveals its most powerful PC chip yet: The 18-core, teraflop-speed Core i9

The $1,999 Core i9 Extreme Edition processor, the i9-7980XE, is aimed at users carrying out heavy tasks such as VR video editing, 3D modelling, and special-effects creation,

May 31 08:22

Android apps punched out by Judy malware

As many as 36.5 million Android users may have been infected by advertising fraud malware that could have been lurking in Google Play Store for years.

The malware, dubbed "Judy" by the researchers at Check Point who discovered it, was found in 41 apps in the Store, all made by Korean publisher ENISTUDIO. While Google has now pulled all the infected apps, the discovery and the extent of the outbreak cast serious doubt on the efficacy of the Chocolate Factory's anti-malware checking system, Bouncer.

May 31 08:22

Windows XP crashed too much to spread WannaCrypt

What a time to be alive: the BSOD has become a useful feature

May 31 08:14

Plastic surgery patients face extortion in wake of clinic data breach

Thousands of private photos have been leaked by cybercriminals following the hack of a Lithuanian cosmetic surgery clinic.

A hacking group, using the nickname "Tsar Team", leaked images it claims came from the Grozio Chirurgija clinic servers. The group spaffed the data after targeted health facility's customers failed to meet extortionate payment demands.

According to police, a portion of a stolen customer database was released in March prior to the release of sensitive photos including nude images of patients on Tuesday.

May 30 16:12

Activists in Connecticut Pushing To Improve Bill To Prohibit Warrantless Stingray Spying

By Michael Maharrey

Activists in Connecticut are working to improve a bill to limit the use of “stingrays.” If amended and passed, the proposed law would not only protect privacy in Connecticut, but would also hinder one aspect of the federal surveillance state.

The House Judiciary Committee introduced House Bill 7291 (HB7291) in March...

May 30 12:50

CONFIRMED: Obama illegally spied on Americans… no one in the media calls for any investigation at all

The Fourth Amendment of the United States Constitution states that the people have a right to be “secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.” It was originally included in the Bill of Rights because at the time of the amendment’s ratification, the Founding Fathers were extremely fearful of the rise of tyranny in the new world. Warrantless searches and seizures were common under the rule of the king, and the framers included language about privacy protection in the Constitution to ensure that the same practice didn’t continue. Sadly, over two centuries of progressivism and corruption within the federal government has made the Fourth Amendment all but irrelevant.

May 30 10:24

Leaked Classified FBI Memo Shows Seth Rich Had DNC Emails On Laptop, Hints At WikiLeaks Ties

According to Borderland Alternative Media, who obtained a heavily redacted memo from an anonymous FBI source, the document sheds more light into the Seth Rich murder investigation, noting that he did, in fact, have DNC emails on his computer. And though it is unclear what connection the FBI made with the DNC or Wikileaks, both are mentioned in the memo.

In a heavily redacted memo, released to me by a source within the FBI, we see Seth Rich’s name. The Email states that the laptop contained DNC and Wikileaks information.

At the bottom right it has code that can be used to look up the official FBI memo SCRDC-408

What that code means is name of person being looked into. “SCR” Seth Conrad Rich. Location “DC” with “408” documents. Any FBI Memo, if it’s a target of an investigation will show a code that can be used by journalists to request a FOIA. So FOIA experts can use that code and obtain a less redacted version.

May 30 10:21

US might expand laptop ban to all international flights - Homeland Security Secretary

Laptops and other gadgets could soon become a thing of the past on all flights in and out of the US as Homeland Security Secretary hinted that the country could expand their ban on the devices in airplane cabins.
In late March, the US barred passengers traveling from eight middle eastern countries from carrying large electronic devices on board inbound flights over concerns that terrorists had created a new type of airline bomb.

May 30 10:20

FBI Documents Prove Seth Rich Wikileaks Source!

May 30 09:57

7 In 10 Smartphone Apps Share Your Data With Third-Party Services

By Narseo Vallina-Rodriguez, University of California, Berkeley and Srikanth Sundaresan, Princeton University

Our mobile phones can reveal a lot about ourselves: where we live and work; who our family, friends and acquaintances are; how (and even what) we communicate with them; and our personal habits. With all the information stored on them, it isn’t surprising that mobile device users take steps to protect their privacy, like using PINs or passcodes to unlock their phones.

The research that we and our colleagues are doing identifies and explores a significant threat that most people miss: More than 70 percent of smartphone apps are reporting personal data to third-party tracking companies like Google Analytics, the Facebook Graph API or Crashlytics...

May 30 09:40

Google censors Tulsi Gabbard! Her new video “Break Up the Big Banks” shows up as top result on every other search engine. But you will not find it on Google

I checked 10 results pages before giving up

May 30 08:25

Internet of snitches: anyone who can sniff 'Thing' traffic knows what you're doing

Princeton boffins reckon the Internet of woefully insecure things yields sensitive information about connected homes with nothing more than a bit of network traffic analysis.

The problem is that single devices have very individualistic traffic profiles – a thermostat behaves differently from a lighting controller, both of which behave differently from a garage door opener, and so on.

In this paper at arXiv, Noah Apthorpe, Dillon Reisman and Nick Feamster (the latter a critic of slapdash IoT privacy) look at “a Sense sleep monitor, a Nest Cam Indoor security camera, a WeMo switch, and an Amazon Echo” – and they reckon the traffic fingerprints are recognisable even when traffic is encrypted.

May 30 08:22

Russian search engine Yandex's Ukraine offices raided for 'treason'

Already under sanctions by the Ukrainian government, Russian search giant Yandex has been raided by the country's security services.

The raids, in capital Kiev and the southern city Odessa, were conducted under the treason articles of the country's criminal code, according to Russian state newsagency TASS.

Reuters says the basis of the complaint is that the company is collecting user data on Ukrainians and sending it back to Russia.

Yandex's only statement was to confirm that “representatives of Ukraine's Security Services” (the SBU) went to its offices in the two cities, adding that its lawyers would help with any investigation.

May 30 08:17

Chrome Flaw Allows Sites to Secretly Record Audio/Video Without Indication

What if your laptop is listening to everything that is being said during your phone calls or other people near your laptop and even recording video of your surrounding without your knowledge?

Sounds really scary! Isn't it? But this scenario is not only possible but is hell easy to accomplish.

A UX design flaw in the Google's Chrome browser could allow malicious websites to record audio or video without alerting the user or giving any visual indication that the user is being spied on.

AOL developer Ran Bar-Zik reported the vulnerability to Google on April 10, 2017, but the tech giant declined to consider this vulnerability a valid security issue, which means that there is no official patch on the way.

May 30 07:28

CrossTalk: 'Seth Rich'

May 29 08:34

Hypocrisy: Facebook REFUSES to delete videos and images of “violent death,” abortions and self-harm

The incoherent way that Facebook chooses to police the content published on its social media platform is getting stranger and more controversial by the day. New reports indicate that the tech giant will no longer block videos and imagery of extreme violence, including gory death and abortion, because doing so represents a form of “censorship” that supposedly violates the rights of its users (but Facebook is happy to censor content over political views it doesn’t like).

May 28 15:32

Calls To Ban Bitcoin Grow Louder After Ransomware Attack

In this video, Vin Armani covers the predictable fallout from the WannaCry ransomware attack. First they blame North Korea and bitcoin. Then an establishment think tank connects bitcoin to terrorism and presses Congress to ban it.

May 28 08:18

British Airways Cancels All Flights From London After Global IT Outage

British Airways canceled all flights from London's Heathrow and Getwick airports scheduled before 6 pm, after a global computer system outage caused massive delays and left planes stuck on runways. Earlier on Saturday, there were reports of BA staff telling disgruntled passengers trying to get away for the Bank Holiday weekend that the company was under cyber attack but this was denied by the airline.

May 28 07:36

De Blasio Employee Arrested, Charged With Possessing Child Pornography

A leading young Democrat and de Blasio administration employee has a secret taste for sickening kiddie porn that involves baby girls as young as 6 months old, court papers revealed Friday.
Jacob Schwartz, 29, was busted for allegedly keeping more than 3,000 disgusting images and 89 videos on a laptop after downloading the filth from the internet.

May 28 03:55

SUIT AGAINST HILLARY CLINTON OVER BENGHAZI DEATHS & EMAILS DISMISSED

A federal judge in Washington has dismissed a lawsuit alleging that Hillary Clinton's lax security surrounding her emails led to the deaths of two of the Americans killed in the 2012 attack on the U.S. diplomatic compound in Benghazi, Libya.

In a ruling Friday, U.S. District Court Judge Amy Berman Jackson tossed out the wrongful death claims as well as allegations that Clinton essentially slandered the parents of the deceased by contradicting accounts the parents gave of events related to their children's deaths.

>>>

SUIT AGAINST HILLARY CLINTON OVER BENGHAZI DEATHS & EMAILS DISMISSED
(*While America Was Distracted http://us.pressfrom.com/news/us/-52713-818-hot-dogs-eaten-every-second... ?)

May 27 11:33

Over 8,600 Security Flaws Found in Pacemaker Systems

Security researchers from WhiteScope have uncovered over 8,600 vulnerabilities in pacemaker systems and the third-party libraries used to power various of their components.

These issues are broad in nature and range from simple code bugs to terrible design choices that risk the life of their patients.

May 27 11:31

Google Boots 41 Apps Infected with "Judy" Malware off the Play Store

Google has removed 41 Android apps from the official Play Store. The apps were infected with a new type of malware named Judy, and experts estimate the malware infected between 8.5 and 36.5 million users.

According to researchers from Check Point, the apps were available on the Play Store for years, but have been clean and virus-free for most of the time. It appears that starting with April 2016, the apps were slowly updated with malicious code.

The purpose of this code was to launch a browser app, load an URL, and use JavaScript to locate and click on specific banners that would bring profits to the malware's creators.

May 27 10:47

Internet providers have backdoor access to customers' modems

A back door has been built into modems sent to customers of major internet service providers allowing the companies' staff to access settings and potentially create a security hole.

The discovery alarmed a computer expert who contacted the Herald, saying the remote access could provide a pathway to the contents of people's computers by employees of the company.

Vodafone is not the only major ISP with a "back door" into its modems - Spark has confirmed it also has built-in "remote access" in modems it supplies to customers.

...

While the Vodafone support person was able to remotely access and change settings in an effort to fix the problem, the capacity for the back door to be exploited by a rogue company employee was concerning.

He said the access was managed through sending a line of code to the modem which then reset it and allowed access by entering a generic password.

May 27 09:15

Declassified memos show FBI illegally shared spy data on Americans with private parties

The FBI has illegally shared raw intelligence about Americans with unauthorized third parties and violated other constitutional privacy protections, according to newly declassified government documents that undercut the bureau’s public assurances about how carefully it handles warrantless spy data to avoid abuses or leaks.

Webmaster's Commentary: 

Absoflippinglutely unbelievable!!

May 26 15:46

Recently redpilled PewDiePie, along with Tim Pool, JonTron, and Sargon, have been placed on Sweden's hate list

Sweden recently published a database of twitter account they thought as harmful or hateful.

May 26 13:12

Internet providers have backdoor access to customers' modems (NZ)

A back door has been built into modems sent to customers of major internet service providers allowing the companies' staff to access settings and potentially create a security hole.

The discovery alarmed a computer expert who contacted the Herald, saying the remote access could provide a pathway to the contents of people's computers by employees of the company.

Vodafone is not the only major ISP with a "back door" into its modems - Spark has confirmed it also has built-in "remote access" in modems it supplies to customers.

The companies say the ability for its staff to access modems remotely is a huge benefit to customers who might find it technically challenging.

May 26 11:13

MICROSOFT WARNS OF ‘ORWELLIAN FUTURE’ AS WIKILEAKS EXPOSES PARTICIPATION WITH SURVEILLANCE

Recently, an installment of WikiLeaks’ Vault7 documents came to light that exposed two CIA malware programs that specifically infect Microsoft computers with the purpose of carrying out tasks on infected computers, checking for scheduled events, and collecting data.

The revelation put Microsoft in the hot seat, with people speculating that the tech giant may have been aware that the CIA works with features specifically built into Microsoft computers to collect data and perform tasks.

Microsoft’s history would suggest the worst, from Edward Snowden’s 2013 leaks that revealed Microsoft had “collaborated closely with US intelligence services to allow users’ communications to be intercepted, including helping the National Security Agency to circumvent the company’s own encryption,” to the NSA bragging about their newly acquired ability to triple the amount of Skype video calls being collected through Prism just nine months after Microsoft bought Skype.

Webmaster's Commentary: 

Why am I not surprised?!?!

May 26 10:48

Airline Begins Testing Augmented Reality Smart Glasses To Read Travelers’ Emotions

By Nicholas West

It appears that air travel is going to be the new frontier for high-tech privacy invasion taking place in the name of security, efficiency and convenience … and now “customer service.”...

May 26 10:19

FBI probing attempted hack of Trump Organization, officials say

The FBI is investigating an attempted overseas cyberattack against the Trump Organization, summoning President Donald Trump’s sons, Don Jr. and Eric, for an emergency session with the bureau’s cybersecurity agents and representatives of the CIA, officials tell ABC News.

Law enforcement officials who spoke to ABC News on the condition of anonymity confirmed the attempted hack and said the subsequent meeting took place at the FBI’s New York headquarters on May 8, the day before Trump fired FBI director James Comey. Spokesmen for the FBI, CIA and Secret Service all declined to comment.

Reached by phone, Eric Trump, an executive vice president of the family company, would not confirm or deny that he and his brother had met with the FBI but told ABC News that the company had ultimately not been infiltrated.

“We absolutely weren’t hacked,” Eric Trump said during the brief call. “That’s crazy. We weren’t hacked, I can tell you that.”

May 26 07:07

Controversial Reddit Rival Voat May Be Shutting Down Because of Money Problems

Voat was designed as a substitute for Reddit: At time when Reddit is getting criticized for scrubbing “problematic” comments and conversations, Voat was supposed to a freer-speech alternative.

But now it may be shutting down because of financial difficulties. The site racked up $6,600 in hosting costs in April. Donations, advertisements and merchandise “only put a dent” in the costs, and the company doesn’t feel comfortable running a donation campaign to help. Voat has been unable to secure outside funding and struggles with accepting donations after PayPal cut it off for hosting “obscene” content.

May 26 07:00

In a throwback to the ’90s, NTFS bug lets anyone hang or crash Windows 7, 8.1

Those of you with long memories might remember one of the more amusing (or perhaps annoying) bugs of the Windows 95 and 98 era: certain specially crafted filenames could make the operating system crash. Malicious users could use this to attack other people's machines by using one of the special filenames as an image source; the browser would try to access the bad file, and Windows would promptly fall over.

It turns out that Windows 7 and 8.1 (and Windows Vista, but that's out of support anyway) have a similar kind of bug. They can be taken advantage of in the same kind of way: certain bad filenames make the system lock up or occasionally crash with a blue screen of death, and malicious webpages can embed those filenames by using them as image sources. If you visit such a page (in any browser), your PC will hang shortly after and possibly crash outright.

May 26 06:56

UK Government Using Manchester Attacks As An Excuse To Kill Encryption

Again, in case you're just joining us, requiring that internet companies "break their own security so that messages can be read by intelligence agencies" is the nice way of saying "kill real encryption." It means that these companies will be deliberately forced to leave vulnerabilities in encryption that will be a goldmine for hackers of all kinds, from foreign surveillance to online criminals.

And, so far, there is zero evidence that the Manchester attack had anything to do with encryption. And, even if it did, so what? If the UK forced companies to break encryption, people planning terrorist attacks would just switch to other encryption products that don't have corporate entities in the UK. Or they'd come up with other ways to communicate. It will do basically nothing to stop terrorist attacks, but will instead make it much, much easier for all sorts of people with nefarious intent to hack into the private communications of everyone.

May 26 06:54

All Android Phones Vulnerable to Extremely Dangerous Full Device Takeover Attack

Researchers have discovered a new attack, dubbed 'Cloak and Dagger', that works against all versions of Android, up to version 7.1.2.

Cloak and Dagger attack allows hackers to silently take full control of your device and steal private data, including keystrokes, chats, device PIN, online account passwords, OTP passcode, and contacts.

The attack doesn't exploit any vulnerability in Android ecosystem; instead, it abuses a pair of legitimate app permissions that is being widely used in popular applications to access certain features on an Android device.

Researchers at Georgia Institute of Technology have discovered this attack, who successfully performed it on 20 people and none of them were able to detect any malicious activity.

May 25 20:15

Eugene Kaspersky hits back at US cyber espionage claims

Russian cybersecurity expert Eugene Kaspersky has offered to hand over his global company’s code to US authorities as he fights to clear his company of claims of cyber espionage.

Several US authorities reportedly have stopped using Kaspersky Lab security software whose use is under review following claims that Russia could use coding “backdoors” to spy on US agencies.

Mr Kaspersky says no one has offered any evidence to support the claim which was totally unfounded. He has offered to testify in the US and says he is willing to hand over code to authorities so that his software can be scrutinised.

May 25 20:12

Major ISPs accused of deliberately throttling traffic

Five major internet service providers in the US and one in Europe have been accused of abusing their market share to interfere with the flow of the internet for end users. The accusations come from Level 3, a communications company that helps connect large-scale ISPs like Comcast or AT&T to the rest of the internet. According to the company, these six unnamed ISPs are deliberately degrading the quality of internet services using the Level 3 network, in an attempt to get Level 3 to pay them a fee for additional traffic caused by services like Netflix, a process known as paid peering.

May 25 19:59

Orwellian audio editing breakthrough allows your audio recordings to be edited like text to insert words you never said

New technology produced by computer scientists at Princeton University will have the ability to add words into a voice recording by editing the transcript of the recording. So let’s say you record the sentence “I like to drink coffee early in morning,” leaving out the word “the” between “in” and “morning.” The software, officially called VoCo, would automatically synthesize your voice and add the word “the” in the sentence, so that the recording never misses a beat.

“VoCo provides a peek at a very practical technology for editing audio tracks, but it is also a harbinger for future technologies that will allow the human voice to be synthesized and automated in remarkable ways,” explained Adam Finkelstein, a professor of computer science at Princeton.

May 25 16:57

Bitcoin plummets nearly $400 just HOURS after Health Ranger warned of “catastrophic correction”

File this under the “I told you so” category: Earlier today, I posted a detailed mathematical analysis and warning that spoke of a “catastrophic collapse” that will occur in Bitcoin. I was immediately called an “idiot” by Bitcoin cultists who have become delusional in their faith that Bitcoin can only go up forever. Yet in less than two hours, Bitcoin crashed by almost $400, plummeting from almost $2750 to nearly $2350.

Meanwhile, Coinbase has become a total joke, seizing up private accounts and denying people access to their Bitcoins for days on end (possibly WEEKS, for all we know). The blockchain is being overrun with unprecedented trading volume, and the confirmation transaction premium keeps rising. It now costs an average of nearly $17 just to send any amount of Bitcoin to anyone, and many transactions are taking DAYS to get confirmed. In a panic selloff, it will easily cost you $100 just to sell any amount of Bitcoin.

May 25 11:16

Wasserman Schultz Threatened Police Chief For Gathering Evidence On Her IT Staffer’s Alleged Crimes [VIDEO]

Rep. Debbie Wasserman Schultz threatened the chief of the U.S. Capitol Police with “consequences” for holding equipment that she says belongs to her in order to build a criminal case against a Pakistani staffer suspected of massive cybersecurity breaches involving funneling sensitive congressional data offsite.

The Florida lawmaker used her position on the committee that sets the police force’s budget to press its chief to relinquish the piece of evidence Thursday, in what could be considered using her authority to attempt to interfere with a criminal investigation.

May 25 10:20

TRANSIT POLICE ARE SECRETLY SPYING ON COMMUTERS TRAVEL PLANS, TEXTS AND EMAILS.

A class action lawsuit in California, reveals that Transit Police are using a free 'Bart Watch' app and Stingray surveillance to secretly spy on commuters texts and emails. (For more info. read pages 5-15 of the suit.)

Transit Police take their cues from other police departments, claiming they're only interested in the public's safety and security,

Safety and security is our top priority.. BART Watch allows you to quickly and discreetly report criminal or suspicious activity directly to BART Police.

Unfortunately, these 'See Something, Say Something' apps allow police to spy on everyone.

According to ABC7 News at least 10,000-50,000 people have downloaded the Elerts spying app. The lawsuit reveals that Transit Police are using Elerts to secretly collect everyone's cellphone identification number, otherwise known as International Mobile Equipment Identity number (IMEI).

Webmaster's Commentary: 

I hope this lawsuit is successful; whose business is it, anyway, to know the fact that I am looking for an easy zucchini bread recipe to take to a church social in a couple of weeks?!?

Mike and I have long felt that any electronic surveillance against us, by any "alphabet soup" US agency is simply punishment duty; everything we have to say, either in an email, or cell phone, is pretty vanilla!

May 25 09:51

Plot thickens in probe of House IT contractors

A police spokesman, while declining to go into detail, told Fox News this week that the case remains opens and focuses on “the actions of House IT support staff.”

But a high-level House staffer acknowledged Monday to Fox News that the probe has raised concerns about emails being hacked.

Official documents and multiple sources say at least five contractors -- including brothers Imran, Jamal and Abid Awan -- are the focus of the probe but that as many as six people could be involved.

The others purportedly involved are Imran’s wife, Hina Alvi, and Rao Abbas, who is not part of the family.

They allegedly removed hundreds of thousands of dollars of equipment from offices, including computers and servers, and ran a procurement scheme in which they bought equipment, then overcharged the House administrative office that assigns such contractors to members.

May 25 07:30

Google bans hundreds of Android apps that use ultrasonic sounds to secretly SPY on users

Google has banned an army of Android apps that use ultrasonic sounds to spy on users without their knowledge.

The moves comes after researchers revealed that hundreds of Android applications are embedded with ultrasonic cross-device tracking technology that pick up inaudible 'beacons' emitted from advertisements.

May 25 07:24

Bitcoin Explodes, Trades Above $4,000 In South Korea

In recent weeks it has been Japanese demand (and notable premia) that has driven the exponential rise in Bitcoin, but recently, as CoinTelegraph reports, it has been South Korea. Overenight saw Bitcoin prices explode once again, smashing through $2500, $2600, and $2700 for the first time...

May 25 07:11

DO THE MATH: Here’s the rational analysis why 99% of current Bitcoin owners will never be able to sell Bitcoins for anything close to its imagined current value

The very fact that Bitcoin needs new people buying into the system in order to support its rapidly advancing prices is almost the classic definition of a Ponzi framework. The simultaneous fact that even very tiny selloffs cause the price of Bitcoin to substantially nosedive means that very few people can “get out” of Bitcoin at anywhere near the current high price. Imagine a rave club filled to maximum capacity with all exit doors blocked except one. Then imagine an electrical fire setting off a massive blaze, as recently happened in California. In such scenarios, not everybody gets out alive for the simple reason that the exits become choke points. Bitcoin suffers the same structural problem, but almost nobody realizes it yet because they are caught up in the Bitcoin hype that causes them to irrationally believe that Bitcoin can never go down. It’s the dot-com bubble all over again, for a whole new generation.

May 25 06:46

Ransomware hits Australian hospitals after botched patch

Hospitals connected to Australian State of Queensland's integrated electronic medical record system (ieMR) are suffering outages attributed to patching against a ransomware attack.

Since the ransomware-de-jour is WannaCry/WannaCrypt, it's a fair bet that's what Queensland Health was working to patch, but somewhere along the line things have gone wrong.

The Cairns Post identifies Cairns Hospital as having system problems, and The Register has been told at least Townsville Hospital and Brisbane's Princess Alexandra Hospital are also affected.

May 25 06:38

7-Year-Old Samba Flaw Lets Hackers Access Thousands of Linux PCs Remotely

The maintainers of Samba has already patched the issue in their new versions Samba versions 4.6.4/4.5.10/4.4.14, and are urging those using a vulnerable version of Samba to install the patch as soon as possible.

But if you can not upgrade to the latest versions of Samba immediately, you can work around the vulnerability by adding the following line to your Samba configuration file smb.conf:

nt pipe support = no

May 25 06:35

Wanna Cry Again? NSA’s Windows 'EsteemAudit' RDP Exploit Remains Unpatched

Brace yourselves for a possible 'second wave' of massive global cyber attack, as SMB (Server Message Block) was not the only network protocol whose zero-day exploits created by NSA were exposed in the Shadow Brokers dump last month.

Although Microsoft released patches for SMB flaws for supported versions in March and unsupported versions immediately after the outbreak of the WannaCry ransomware, the company ignored to patch other three NSA hacking tools, dubbed "EnglishmanDentist," "EsteemAudit," and "ExplodingCan."

May 24 15:53

U.S. Government Using Secret Surveillance Tech to Track Undocumented Immigrants

By Derrick Broze

Newly released documents detail how U.S. Border Patrol used ‘Stingray’ cellphone surveillance tools to catch an undocumented immigrant.

The Detroit News has obtained a federal search warrant affidavit which details how border patrol agents are using secretive surveillance technology to locate individuals who have entered the U.S. illegally...

May 24 15:33

Top hacker conference to target voting machines

Hackers will target American voting machines—as a public service, to prove how vulnerable they are.

When over 25,000 of them descend on Caesar’s Palace in Las Vegas at the end of July for DEFCON, the world’s largest hacking conference, organizers are planning to have waiting what they call “a village” of different opportunities to test how easily voting machines can be manipulated.

Some will let people go after the network software remotely, some will be broken apart to let people dig into the hardware, and some will be set up to see how a prepared hacker could fiddle with individual machines on site in a polling place through a combination of physical and virtual attacks.

May 24 15:28

Manchester attack could lead Theresa May's government to launch huge internet crackdown

The government may use the deadly attack in Manchester to launch a crackdown on internet securities.

Government officials appear to have briefed newspapers that they will put many of the most invasive parts of the relatively new Investigatory Powers Act into effect after the bombing at Manchester Arena.

The specific powers being discussed – named Technical Capability Orders – require big technology and internet companies to break their own security so that messages can be read by intelligence agencies. Government will ask parliament to allow the use of those powers if Theresa May is re-elected, senior ministers told The Sun.

May 24 15:20

Feeling Locky, punk? Ransomware grew eight-fold last year

Ransomware saw a more than eight-fold (752 per cent) increase as a mode of attack in 2016, according to Trend Micro.

The infosec firm estimates file-scrambling malware families such as Locky and Goldeneye raked in $1 billion in 2016.

2016 was the year when ransomware ruled, and this danger has been maintained by recent WannaCrypt attacks and the latest threat Eternal Rocks, which has no kill switch and continues to grow.

May 24 15:18

Beware! Subtitle Files Can Hack Your Computer While You're Enjoying Movies

In the above video, the researchers demonstrated that how a maliciously crafted subtitle file for a movie added to Popcorn Time media player can hijack a Windows PC. On the right-hand side of the screen, an attacker, running Kali Linux, gained the remote access of the system as soon as the victim added the subtitle file.

Since text-based subtitles for movies and TV shows are created by writers and then uploaded to Internet stores, like OpenSubtitles and SubDB, hackers could also craft malicious text files for same TV shows and movies.

"Our researchers were also able to show that by manipulating the website’s ranking algorithm, we could guarantee crafted malicious subtitles would be those automatically downloaded by the media player, allowing a hacker to take complete control over the entire subtitle supply chain, without resorting to a Man in the Middle attack or requiring user interaction," CheckPoint researchers said.

May 24 13:22

Wasserman Schultz Threatened Police Chief For Gathering Evidence On Her IT Staffer’s Alleged Crimes

Rep. Debbie Wasserman Schultz threatened the chief of the U.S. Capitol Police with “consequences” for holding equipment that she says belongs to her in order to build a criminal case against a Pakistani staffer suspected of massive cybersecurity breaches involving funneling sensitive congressional data offsite.

The Florida lawmaker used her position on the committee that sets the police force’s budget to press its chief to relinquish the piece of evidence Thursday, in what could be considered using her authority to attempt to interfere with a criminal investigation.

May 24 12:04

Sources: Democratic Aide Suspected Of Major Security Breach Under Government Protection In Pakistan

A criminal suspect in an investigation into a major security breach on the House of Representatives computer network has abruptly left the country and gone to Pakistan, where her family has significant assets and VIP-level protection, a relative and others told The Daily Caller News Foundation’s Investigative Group.

May 24 11:58

U.N.’S NORTH KOREA INVESTIGATORS HIT BY [likely false-flag] CYBER ATTACK

U.N. Security Council's North Korea sanctions committee comes under "sustained" cyber attack

May 24 11:30

WannaCry ransomware decryptor brings hope to victims

Security researchers uncovered more info on how WannaCry spread, and a ransomware decryptor emerged to save files for those affected.

May 24 10:25

DID SEVERAL DEMOCRATIC IT STAFFERS UNDER INVESTIGATION JUST FLEE TO PAKISTAN?

First a little background. Politico reported the following back in March.

Two House Democrats this week fired technology staffers linked to an ongoing criminal investigation, more than a month after the couple in question was barred from House computer networks.

Rep. Gregory Meeks (D-N.Y.) confirmed to Politico that Hina Alvi’s last day as an IT support staffer in his office was Tuesday. Her husband, Imran Awan, was working for Rep. Marcia Fudge (D-Ohio) as of Tuesday evening, but a spokeswoman for Fudge said midday Wednesday that Awan was no longer an employee.

As of Wednesday, Awan was still working as a technology adviser for Rep. Debbie Wasserman Schultz (D-Fla.), although he’s been blocked from accessing the House computer system since early February.

Alvi, Awan and three other House aides, including Abid Awan and Jamal Awan, relatives of Imran Awan, and Rao Abbas, are all linked to the criminal investigation being conducted by the U.S. Capitol Police.

Webmaster's Commentary: 

This...could get interesting! :-)

Apparently, Democrats, as a class, have difficulty in vetting their IT professionals.

And BTW, DNC and Secretary Clinton, where in the world is Brian Pagliano, your IT guy who has "disappeared" (either been murdered, or fled to a country with which the US has no extradition treaty), and is contempt of Congress for refusing to testify?!?

Republicans Hold Hillary’s IT Guy in Contempt of Congress for Refusing to Testify

May 24 10:16

If You Care About Privacy, You Should Change Your Twitter Settings Right Now

The new policy, which goes into effect on June 18, includes changes to data collection, data sharing, and digital advertising. The policy is being run on an ‘opt-out’ basis, meaning that if users do not actively change their settings, these policies will automatically be applied to their accounts.

May 24 09:33

Intel Core i9: It's not whether you need 12 cores, but whether you'll pay for them

The processor market is heating up once again, with AMD and Intel back to having "core and speed" wars. But if the latest leak is accurate, Intel's next-generation silicon is likely to be out of most people's budget.

May 24 09:33

Now tech support scams are exploiting WannaCry ransomware fears

Police issue warning over fake support scams using WannaCry to scare PC users into paying up.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA