Jan 23 16:00

Daily Mail demands browser warning U-turn

The Daily Mail is calling for a web browser alert that criticises its journalism to be changed.

The NewsGuard plug-in currently brings up a warning that says the newspaper's website "generally fails to maintain basic standards of accuracy and accountability".

It has given this advice since August.

But the matter came to prominence last week, after Microsoft updated its Edge browser app for Android and iOS devices and built in NewsGuard.

This prompted several other media outlets to report the story.

"We have only very recently become aware of the NewsGuard start-up and are in discussions with them to have this egregiously erroneous classification resolved as soon as possible," said a spokesman for Mail Online.

Jan 23 13:59

No need to install: Microsoft has controversial fake news filter NewsGuard built into mobile browser

Corporate and neocon-backed startup NewsGuard is one step closer to its vision of bringing its “unreliable” news rater to every screen after Microsoft makes it an integral part of its Edge mobile browser.
Rather than having to download an app as before, Edge users on Android and Apple devices can now just click one button to enable its “green-red rating signal if a website is trying to get it right or instead has a hidden agenda or knowingly publishes falsehoods or propaganda.”

Among the green-rated websites: Voice of America, CNN, Buzzfeed, the Guardian, New York Times and the Washington Post, as well as left-leaning upstarts such as Vice News and Refinery 29. Ones that are given the red warning label of “failing to maintain basic standards of accuracy and accountability”: RT and Sputnik (obviously enough) and the right-wing Daily Mail, Breitbart and the Drudge Report, in addition to hundreds of other non-mainstream news websites such as Wikileaks.

Webmaster's Commentary: 

Now, I'm insulted that WRH didn't even make the list!!!!

Jan 23 10:46

Orwell’s ‘Facecrime’ is Here in Insane America

Be careful that you don’t get caught engaging in Facecrime in insane America.

Jan 23 09:28

Look Out, Porn Users: AZ Legislator Has Unique Idea For Funding The Wall

The funds accrued would be deposited in a fund titled the “John McCain Human Trafficking and Child Exploitation Fund." The money would fund the border wall as well as physical and mental health services, temporary and permanent housing placements, and the prevention and protection of victims of human trafficking, domestic violence, prostitution, divorce, child abuse, and sexual assault.

Jan 23 08:54

Wow, fancy that. Web ad giant Google to block ad-blockers in Chrome. For safety, apparently

Google engineers have proposed changes to the open-source Chromium browser that will break content-blocking extensions, including various ad blockers.

Adblock Plus will most likely not be affected, though similar third-party plugins will, for reasons we will explain. The drafted changes will also limit the capabilities available to extension developers, ostensibly for the sake of speed and safety. Chromium forms the central core of Google Chrome, and, soon, Microsoft Edge.

In a note posted Tuesday to the Chromium bug tracker, Raymond Hill, the developer behind uBlock Origin and uMatrix, said the changes contemplated by the Manifest v3 proposal will ruin his ad and content blocking extensions, and take control of content away from users.

Jan 23 08:53


One of the reasons identify theft is considered by the Treasury Inspector General for Tax Administration to be the crime of the century is because of the IRS. The Internal Revenue Service makes growing demands for information about people’s businesses and private lives every day. There is no such thing as personal privacy these days. That the IRS sends citizens a so-called “Privacy Act Notice” in all its mailings is a farce. The IRS lays claim to your data without court authority more so than any other government agency. And to make matters worse, they share the data with any other federal, state or local government agency claiming an interest, including foreign governments.

A river of data

Webmaster's Commentary: 

With so much data, how does one make it meaningful and intelligent to pursue, and how does one know what is actually worth pursuing?!?

Jan 23 08:47


After WikiLeaks documents provided irrefutable evidence that the Democratic National Committee had violated its charter by rigging its primary for Hillary Clinton against Bernie Sanders, what should have happened is this:

The DNC apologizing profusely to the public for violating the promises it had made to the electorate.
Massive, sweeping changes to bring transparency and public accountability to the DNC’s inner workings, including a complete overhaul of staff and leadership.
If at all possible, a complete do-over of the primary vote.
A dedication to attacking Trump’s right-wing policies from the left, showing the public that a progressive approach works better than a conservative one.

Webmaster's Commentary: 

Speaker Pelosi, a word, please.

Primary rigging,just in case this is a foreign concept for you, us utterly immoral, because at the end of the day, the People do not get a chance to fully express their political preferences, because at the end of the day, those preferences will be well and truly flushed by the DNC's vote rigging.

So what Americans have, at the end of the day, are two very carefully culled and chosen candidates who will continue the wars, make sure that the dictats issued by their corporate masters, are obeyed; that the military complex will be worshipped, with obscenely "fat" contracts, and change utterly nothing for
We the People, except to throw more regulative barriers in our way; 24/7 surveillance; and a tax code which virtually guarantees our continued poverty.

At this point, the American political process is a highly ritualized, Kabuki-like process where the monied get everything they want from the government, because that government represents only those are already monied, leaving you and me, my friends, thrown under the proverbial bus, without any meaningful choice in leadership, or true representation.

Jan 23 08:18

Someone Hacked PHP PEAR Site and Replaced the Official Package Manager

Beware! If you have downloaded PHP PEAR package manager from its official website in past 6 months, we are sorry to say that your server might have been compromised.

Last week, the maintainers at PEAR took down the official website of the PEAR ( after they found that someone has replaced original PHP PEAR package manager (go-pear.phar) with a modified version in the core PEAR file system.

Though the PEAR developers are still in the process of analyzing the malicious package, a security announcement published on January 19, 2019, confirmed that the allegedly hacked website had been serving the installation file contaminated with the malicious code to download for at least half a year.

Jan 22 13:04

Arizona Lawmaker Wants to Tax Internet Porn to Pay for Border Wall

Arizona state Senator Gail Griffin, a Republican, has introduced a new bill that would force computer and phone retailers to install porn-blocking software, which could only be removed for a fee of at least $20. The weirdest part? The money that was collected by the state would be used to help build President Donald Trump’s infamous wall along the U.S.-Mexico border, among other things.

First reported by the Arizona Mirror, the bill would require retailers to install porn-filter software on all new internet-capable devices sold in Arizona. The filter would only be removed if the customer asked for it, they could prove that they were at least 18 years old, and paid at least $20. The $20 fee would be sent to the state, but retailers would be allowed to charge more on top of that.

Jan 22 11:41

Hotel fires half its robot staff for sucking at their jobs

Humans worried about the robot revolution threatening their jobs can relax. Japan's Henn na Hotel prided itself on its all-robot staff, but it turns out they weren't up to the job.

Henn na's robot staff was first employed in 2015 with the aim of becoming "the most efficient hotel in the world." But four years later, it seems that the 243 robots are less of a novelty and more of a nuisance. As a result, the Henn na Hotel has fired half of them, according to a report from The Wall Street Journal.

Jan 22 11:37

How to Buy Bitcoin Anonymously

By Kai Sedgwick

Buying bitcoin is not a revolutionary act. Nor should it be. And yet the way statists, apparatchiks and politicians bang on, you’d think the mere act of acquiring digital currency was akin to receiving the keys to a Pandora’s box in which lurks every illicit artifact known to man. One day, these dinosaurs will begrudgingly concede that buying bitcoin is no more seditious than buying a soda with a $20 bill. But until then, you’ll want to preserve your privacy when acquiring cryptocurrency...

Jan 22 11:32

Huawei or the West's way: Which kind of spying comes with your phone?

Keeping in mind that there is actually no definitive proof against Huawei at this point, phone owners are left to ponder whether they want a cheaper Chinese phone which could possibly be used to spy on them, or a more expensive Western made one which definitely will be.

If Edward Snowden, Cambridge Analytica and Jennifer Lawrence have taught us one thing, it's that if you're the proud owner of a smartphone, or have ever used a WiFi network (I'm told they've grown quite popular), someone can get you if they want to.

Jan 22 11:30

Downdetector - Whatsapp

Whatsapp is having issues since 1:17 PM EST. Are you also affected? Leave a message in the comments.

Jan 22 11:29

Whatsapp down: Messenger not working across the world on Iphone and Android

Webmaster's Commentary: 

Just now breaking.

Jan 22 10:52

Critical RCE Flaw in Linux APT Allows Remote Attackers to Hack Systems

Since APT is being used by many major Linux distributions including Debian and Ubuntu, who have also acknowledged and released security patches for the vulnerability, it is highly recommended for Linux users to update their systems as soon as possible.

Jan 22 09:20


One of the reasons identify theft is considered by the Treasury Inspector General for Tax Administration to be the crime of the century is because of the IRS. The Internal Revenue Service makes growing demands for information about people’s businesses and private lives every day. There is no such thing as personal privacy these days. That the IRS sends citizens a so-called “Privacy Act Notice” in all its mailings is a farce. The IRS lays claim to your data without court authority more so than any other government agency. And to make matters worse, they share the data with any other federal, state or local government agency claiming an interest, including foreign governments.

A river of data

Webmaster's Commentary: 

The problem with data is, without a real capability to sort and identify what your "data streams" pull in, you become awash with data which makes no sense, and cannot be intelligently, interpreted.

Jan 22 08:55

Windows 7 versus Windows 10: Here comes the final showdown

Microsoft is certainly keen for businesses to upgrade, touting the security of Windows 10 over Windows 7 as a good reason to make the move. It's also keen to get as many users onto Windows 10 as possible because that will help it build momentum behind Windows-as-a-Service, which means regular feature updates rather than massive upgrade projects every few years.

But enterprises, which are often cautious about new technology, will have noted Microsoft's buggy recent Windows 10 upgrades and will worry about the impact on their infrastructure.

So what happens now?

Jan 22 05:25

Zimbabwe court says internet shutdown illegal as more civilians detained

Zimbabwe’s government exceeded its mandate in ordering an internet blackout during civilian protests last week, a court ruled on Monday, as authorities pressed on with rounding up opposition figures blamed for the unrest.

In his interim ruling, High Court Judge Owen Tagu told mobile operators to immediately and unconditionally resume full services. The biggest, Econet Wireless, compiled with the order late on Monday, it said in a message to subscribers.

The sporadic blackout began on Tuesday following the start of protests against a rise in fuel prices that turned violent.

With evidence growing that the country is slipping back into authoritarian rule, critics of President Emmerson Mnangagwa’s government had accused it of shutting off the internet to prevent a security clampdown being broadcast to the world.

Mnangagwa was due back in Zimbabwe late on Monday after cutting short a foreign trip.

Webmaster's Commentary: 

It looks like it is only a matter of time before the current government of Zimbabwe cannot hold this country together.

Jan 22 04:36

Death Of Russiagate? Mueller Team Tied To Mifsud's Network

In April last year, Disobedient Media broke coverage of the British involvement in the Trump-Russia collusion narrative, asking why All Russiagate Roads Lead To London, via the quasi-scholar Joseph Mifsud and others.

The issue was also raised by WikiLeaks's Julian Assange, just days before the Ecuadorian government silenced him last March. Assange's Twitter thread cited research by Chris Blackburn, who spoke with Disobedient Media on multiple occasions covering Joseph Mifsud's ties to British intelligence figures and organizations, as well as his links to Hillary Clinton's Presidential campaign, the FBI, CIA and the private cyber-security firm Crowdstrike.

Webmaster's Commentary: 

The corporate press should be standing for the people, not for those elements of the government it primarily represents; the American deep state lives, breathes, and moves, and if there was ever a more glaring example of that, it was the "Russiagate" Fiction, which has gobbled up time, money, and expense from the American people, and still has nothing to show for it, I would like to find it!!

Jan 21 17:53

Websites can steal browser data via extensions APIs

Malicious websites can exploit browser extension APIs to execute code inside the browser and steal sensitive information such as bookmarks, browsing history, and even user cookies.

The latter, an attacker can use to hijack a user's active login sessions and access sensitive accounts, such as email inboxes, social media profiles, or work-related accounts.

Furthermore, the same extension APIs can also be abused to trigger the download of malicious files and store them on the user device, and store and retrieve data in an extension's permanent storage, data that can later be used to track users across the web.

Jan 21 17:47

'There's no place to hide': Shocking study reveals how Twitter and Facebook learn private information about you - even if you DON'T have an account

'There's no place to hide in a social network,' study co-author Lewis Mitchell said in a statement.

From political affiliation to purchasing practices and favorite television series, information shared online by friends and contacts could potentially be used to deduce many aspects of a person's life, Bagrow said.

'Information is so strongly embedded in a social network that, in principle, one can profile an individual from their available social ties even when the individual forgoes the platform completely,' the researchers wrote in the study.

Jan 21 17:35

New Android Malware Apps Use Motion Sensor to Evade Detection

Even after so many efforts by Google for preventing its Play Store from malware, shady apps somehow managed to fool its anti-malware protections and get into its service to infect Android users with malware.

Two such Android apps have recently been spotted on the Google Play Store by security researchers with the Trend Micro malware research team, infecting thousands of Android users who have already downloaded them with banking malware.

The apps in question masquerade as a currency exchange app called Currency Converter and battery saver app called BatterySaverMobi, and are using motion-sensor inputs of infected Android devices to monitor them before installing a dangerous banking Trojan called Anubis.

Jan 21 17:23

Apple hardware priced so high that no one wants to buy it? It's 1983 all over again

As the today’s Apple continues to push its prices ever higher, the company might want to look at its own past as well as the present for the consequences.

Jan 21 15:51

France hits Google with $57 million fine for violating EU’s new consumer privacy rules

French regulators on Monday hit Google with a $57 million penalty—the first fine targeting a U.S. technology giant under Europe’s strict new data privacy rules.

Jan 21 12:11

Study: On Facebook And Twitter Your Privacy Is At Risk—Even If You Don’t Have An Account

By University of Vermont

A new study shows that privacy on social media is like second-hand smoke. It’s controlled by the people around you.

Individual choice has long been considered a bedrock principle of online privacy. If you don’t want to be on Facebook, you can leave or not sign up in the first place. Then your behavior will be your own private business, right?

The new study presents powerful evidence that the answer to that question is no...

Jan 21 10:19

Bitcoin Mass Adoption Through Chaos and Order

By Vin Armani

In this article – the first in a two-part series – I will explore the ways that the Bitcoin community can leverage the adoption strategies of existing digital payment networks, through profit-seeking, to incentivize mass adoption. My next article, part two, will explore the communication standards, known as Payment Protocols, that I believe hold great promise for delivering profits to those companies most highly incentivized to increase global use of Bitcoin as peer-to-peer electronic cash...

Jan 21 10:09

Is Labour’s anti-Semitism row fuelled by pro-Israel online ‘guerrilla warriors’?

The Labour Party in Britain has been dogged by allegations of anti-Semitism ever since Jeremy Corbyn’s victory in the 2015 leadership contest. The crisis has since threatened to tear the party apart. Now, though, what appears to be an organised campaign to fuel the row has been uncovered, raising concerns that the party is being targeted by a network of social media trolls with the intent of harming Britain’s democratic process.

An investigation by the Electronic Intifada discovered fake online accounts being used when the crisis was at its peak. A report by the online publication documented 10 fake Twitter profiles posing as Corbyn supporters and issuing virulent anti-Semitic posts. The accounts are said to share sufficient similarities to indicate that the same person – or group – is running them, in what appears to be an organised campaign to discredit Corbyn and smear Labour as an anti-Semitic party.

Jan 21 09:06

REVEALED: Facebook 'deliberately duped' children into racking up bills into the thousands playing online games - even referring to them as 'whales'

Facebook has been ordered to unseal a trove of documents related to a 2012 lawsuit against the social media giant in which children, often unwittingly, racked up massive bills on their parents accounts playing games on the site.

The United States District Court on Monday gave Facebook ten days to file unredacted documents in response to a request from Reveal, the news agency of The Center for Investigative Reporting (CIR).

Announcing its victory last week, Reveal wrote: 'A glimpse into the soon-to-be-released records shows Facebook's own employees worried they were bamboozling children who racked up hundreds, and sometimes even thousands, of dollars in game charges.

'And the company failed to provide an effective way for unsuspecting parents to dispute the massive charges, according to internal Facebook records.'

Jan 21 08:58

Google is hit with $57 MILLION fine by France’s data watchdog for its murky use of personal information

France's data watchdog slapped a 50m Euro ($57m) fine on search giant Google today, using the EU's new General Data Protection Regulation (GDPR) rules for the first time.

Google was handed the record fine from CNIL for failing to provide transparent and easily accessible information on its data consent policies, a statement said.

They said Google had made it too difficult for users to understand and manage preferences on how their personal information is used, in particular with regards to targeted advertising.

Jan 20 11:13

Future A.I. Won’t Need Facial Recognition to Identify Individuals in a Crowd: Claim

By Nicholas West

People of the future will apparently be no more significant than zebrafish and flies, according to new studies in tracking and surveillance being conducted on those species...

Jan 20 10:37

This Is The Reason Smart TVs Are So Cheap 

A significant reason why a smart TV, or perhaps a new 65-inch 4K smart TV with HDR capability, can be purchased for about $500, is because some manufacturers are harvesting data from users.

Vizio’s Chief Technology Officer, Bill Baxter, outlined the strategy to The Verge during the Consumer Electronics Expo in Las Vegas, Nevada last Monday.

Jan 20 10:11


Richard Skellett, a founder of Digital Anthropologist and an expert for Future of Work, has warned of a future in which British workers have chips inserted underneath their skin.The process has already been trialled with company BioTeq fitting 150 implants in the UK.

Jan 19 09:41

Rock Pi 4: A closer look at the new Raspberry Pi challenger

This is the Rock Pi 4, the latest rival to the Raspberry Pi in the low-cost computing space.

Check out TechRepublic's full review to find out how the Rock Pi 4 measures up to the Raspberry Pi, and why the Rock Pi isn't a necessarily a better choice, despite its superior specs.

This is the 4GB of the Rock Pi 4 Model B, a board whose $75 price tag is more than twice that of the $35 Raspberry Pi 3 Model B+.

Jan 19 09:28

Artificial Intelligence: it will kill us | Jay Tuck

Jan 18 15:30

Website Exposed Mossad Chief’s Personal Data to Lure Media Victims - Report

The two “white hat” hackers who discovered the website believe it was used to lure specific victims – presumably journalists – in order to collect their data in preparation for a future attack on their computers.

Israeli hackers have exposed a website that published personal data about high-ranking Israeli military and intelligence officials, a report by The Times of Israel says, citing Hadashot TV.

In particular, the website — the name of which remains undisclosed — has published personal details and pictures of the home and family of Mossad chief Yossi Cohen.

Avichai Adraee, the Arabic spokesperson for the Israeli Defense Forces, also had his personal data leaked via the website, the report says.

The website was reportedly advertised via social media in an apparent attempt to lure journalists, the report says. Any person visiting the website also had their personal data collected.

Jan 18 11:35

Don’t Put Robots in Charge of the Internet

By Elliot Harmon

Last year, YouTube’s Content ID system flagged Sebastian Tomczak’s video five times for copyright infringement. The video wasn’t a supercut of Marvel movies or the latest Girl Talk mashup; it was simply ten hours of machine-generated static. Stories like Tomczak’s are all too common: Content ID even flagged a one-hour video of a cat purring as a likely infringement.

But those are only a small glimpse of a potential Internet future...

Jan 18 11:30


Zimbabwe has blocked Facebook, Twitter and WhatsApp messaging amid a deadly crackdown on days of violent protests.

A coalition of local human rights groups says at least 12 people have been killed and many more beaten and tortured by security forces this week.

The Zimbabwe Human Rights NGO Forum accused the authorities of cutting off the internet "to mask the massive human rights violations".

The protests were sparked on Monday by a sharp rise in the price of fuel.

Africa Live: More on this story and others from the continent
Despair, anger and anxiety in Zimbabwe's fuel queue
The government has blamed the opposition and political rights groups for the protests, which has seen riot police clashing with protesters in the capital, Harare, and the southern city of Bulawayo after they lit fires and blocked roads using rocks.

Webmaster's Commentary: 

One has to wonder: how long Zimbabwe's military will continue to take the government's side, or will there be a moment, when alliances will shift?!?

Jan 18 10:02

What’s That Buzzing Overhead? It’s An OSHA Drone

By Walter Olson

“That buzzing noise over a construction site could be an OSHA drone searching for safety violations,” notes Littler Mendelson lawyer Tammy McCutchen in a piece for the Federalist Society. Quoting a U.S. Department of Labor memorandum from May of last year obtained by Bloomberg Law, McCutchen writes that “your friendly neighborhood OSHA inspector is now authorized by the Labor Department ‘to use camera-carrying drones as part of their inspections of outdoor workplaces.’”

What about the Fourth Amendment, you may ask? Well, court review is unlikely because current procedures call for the agency to obtain employer consent before sending the spycams aloft. Which makes everything okay, right?...

Jan 18 09:02

Hackers using fake ‘Flash Player’ Google Chrome extension to steal credit card data

Cybersecurity researchers are warning unsuspecting internet users about a year-old Chrome extension which steals credit card data from infected users via web forms on visited websites.

The surreptitious extension is spread by means of JavaScript injection attacks i.e. “You don’t have Flash installed, use this Chrome extension instead,” or something to that effect. When unsuspecting or careless users click on these links, it triggers an automated redirect to the malicious extension.

Jan 17 19:41

Airbnb Patrons Are Finding More and More Cameras In Their Rooms -- Here's How To Check For Cameras

By Aaron Kesel

Airbnb is having more and more of its hosts hiding security cameras in rooms, and it doesn’t seem to be worried about the practice if innkeepers are disclosing the cameras and they aren’t in the bathrooms or bedrooms, according to a report by Fast Company...

Jan 17 19:04

Trump Plans Missile Interceptors, Sensors And Radars "To Shield Every City"

Thursday's presidential visit to the Pentagon for the long awaited Missile Defense Review — the first such congressionally mandated assessment of the state of the nation's defense systems since 2010 — gave Trump yet another chance to chastise NATO allies on his as yet unmet demand that they "step up" defense spending. He also hinted that he plans to stick by his recent deeply controversial decision to pull out of the Reagan-era Intermediate-Range Nuclear Forces (INF) Treaty with Russia.

“We are committed to establishing a missile defense program that can shield every city in the United States and we will never negotiate away our right to do this,” President Trump said.

Webmaster's Commentary: 

The problem is not that we cannot develop military technology; unfortunately, the cold, hard facts are that China and Russia do, and appear to be way ahead of the US right now in this weapons technology.

The lead time from developing to testing these can be intense, but I am certain that both President Putin and China's President Xi Jinping could tell you, probably to the day, how long it takes.

But first, this Country desperately need a foreign policy which doesn't turn heads of states away from dealing with the US as an equal partner and friend; and that, my friends, is the most depressing thing about US foreign policy right now.

Jan 17 19:02

This is what Google says search will look like under EU copyright laws

One of the most controversial segments of the Copyright Directive is Article 11, which gives publishers the right to demand paid licenses for using snippets of their stories. From Google’s point of view, that gives it two choices: start paying for licenses or don’t show snippets at all.

In “test” screenshots (first shared with Search Engine Land) the tech giant demonstrated what the latter approach might look like. If a user in the EU searches for “latest news,” they would simply see links to media outlets’ sites alongside some tantalizingly useless timestamps. No summaries of stories, no headlines or pictures — no nothing.

Jan 17 18:58

Zimbabwe Government Blocks Internet to Suppress Protests, Cuts Power as a Result

According to the Irish Times, the government ordered the Postal and Telecommunications Regulatory Authority of Zimbabwe to block Internet access provided by Zimbabwe’s two largest ISPs, Econet and TelOne. The intention was to prevent citizens from using social media to organize protests similar to those that erupted on Monday.

What happened next is a case study of the impact of unintended consequences and humanity’s ever-increasing reliance on the Internet. A Bloomberg story reports that because Zimbabweans use the Internet to pay for their electricity on a daily basis, many homes lost their electricity along with Internet access.

Jan 17 12:06

The Keys to Keeping Your Crypto Safe

By Philip Martin

Keeping your crypto safe doesn’t have to be daunting. In this piece. Coinbase VP of Security, Philip Martin, offers some best practices to stay one step ahead of hackers and scammers.

One of the primary benefits of cryptocurrencies is that they allow people to engage in online transactions without the need for an intermediary like a bank or credit-card company. Instead, anyone who wants to send or receive cryptocurrency creates a “cryptographic key”?—?a file containing a random secret code?—?that can then be used to authorize transactions from their cryptocurrency wallets. If an attacker gets access to that key, they instantly gain control the cryptocurrency wallet as if they were the owner. That’s why it’s critical to protect your keys if you manage them yourself, and lock down your accounts at trusted third-party services like Coinbase that help manage your keys for you.

Jan 17 12:05

Over 770 million email addresses shared online in largest data breach in history

A security researcher has blown the lid off the largest data breach in history as over 770 million emails and 21 million unique passwords have been exposed, eclipsing the Equifax and Yahoo hacks by a significant margin.

The breach is being dubbed ‘Collection #1’ and contains a raw data set of email addresses and passwords totalling 2,692,818,238 rows from potentially thousands of different sources, according to digital security expert Troy Hunt.

Jan 17 11:55

[CENSORSHIP] Lindsay Shepherd suspended from Twitter for posting about the transwoman

who demanded Brazilian wax from women-only estheticians

Jan 17 09:46

Biggest EVER collection of breached data including more than a BILLION email addresses and passwords is posted online to a hacking forum

A security researcher found the 87GB dump of data hidden on a hacker forum and says many of them have been previously included in other leaks such as the infamous MySpace and LinkedIn breaches.

Troy Hunt, who runs the 'Have I Been Pwned' breach-notification service, found the leak on cloud-service MEGA and called it 'Collection #1'.

He said: 'If you're in this breach, one or more passwords you've previously used are floating around for others to see.'

Users can use this site to see if their email has been made available in the leak and this link to check their passwords are still safe.

Jan 16 17:54

Veteran MD Drops a Bombshell about 5G and the Effect it Will Have on Your Health

Dr. Sharon Goldberg, an internal medicine physician & professor, is one of many professionals and concerned humans who are speaking a very important truth to power right now.

Jan 16 16:46

Fortnite security flaw allows hackers to SPY on young players and steal the in-game currency

A security flaw with gaming sensation Fortnite has exposed player accounts to hackers.

Gaming security experts found a vulnerability which allowed criminals to obtain log-in information and cease control.

This includes accessing personal information and use of card details to buy in-game currency.

Jan 16 11:49

Alexa DOWN – Amazon helper stopped working, ‘ignored users’ and wouldn’t turn off

AMAZON'S virtual assistant Alexa stopped working for some users around the world on Wednesday morning.

The mysterious outage meant that Alexa – typically controlled by voice – was "ignoring" user requests.

Jan 16 11:40

A New Tactic To Suppress Online Speech: Taxing Social Media

Aware of the threat that social media poses to their power, repressive regimes in Africa have employed various methods to stifle internet-based mobilization.

These include internet shutdowns, targeted social media applications shutdowns, website takedowns, extensive surveillance of digital communications, online propaganda, and the detention of online critics, writes Babatunde Okunoye for Foreign Affairs.

According to Okunoye, in 2018, repressive governments adopted yet another tactic: taxes on social media usage.

In countries such as Uganda, Benin, Tanzania and Zambia, there are now laws in place which impose daily taxes on social media and other over-the-top services.

Jan 16 11:39

Ukrainian Hackers Broke Into The SEC's EDGAR Database, Made $4.1 Million From Insider Trades

On Tuesday, United States authorities charged numerous mostly Ukrainian hackers for a scheme to trade on press releases that had not yet been released. The Ukrainians breached the SEC's EDGAR database to receive access to the nonpublic information.

The scheme netted over $4 million for fraudsters from the U.S., Russia and Ukraine. Using 157 corporate earnings announcements, the group was able to execute trades on material nonpublic information. Most of those filings were "test filings," which corporations upload to the SEC's website.

Jan 16 11:16

The Transportation Department is Funding Autonomous Drones

The Transportation Department is funding research to build artificial intelligence-powered drones and trying to get a better understanding of how autonomous vehicles could be manipulated to harm the public.

The agency’s Volpe National Transportation Systems Center on Thursday began soliciting teams to develop open-source artificial intelligence tools that allow drones to fly without a human operator. The team would ultimately build a drone capable of locating targets and dodging obstacles without outside intervention.

Selected vendors would also need to provide secure facilities where government engineers can store and test autonomous drones and cars. The 12-month contract is only open to companies and universities located within 25 miles of Arlington, Va., according to the solicitation.

While the vendors would primarily explore ways AI could augment drones, officials said they’re also curious how the tech might be manipulated to threaten the public.

Jan 16 11:13

You can lace Nike's Adapt BB shoes with a smartphone app, but that's just the beginning

Nike provided a glimpse of what the future of footwear could look like by introducing the first self-lacing smart basketball shoe on Tuesday.

The Adapt BB, priced at $350, does more than just lace itself. Using a power lacing system called Fit Adapt, users can adjust to find the perfect fit whether it's manually or digitally, using the Nike Adapt mobile app. A custom motor and gear train tighten or loosen to customize to your foot.

For Nike, this opens a new world of smart data insights into athletes' workouts. For athletes, it represents a new era and way they interact with sneakers.

Jan 16 09:37

Apple's digital health plan puts the iPhone and Apple Watch at the heart of your wellbeing

Digital health is where big tech firms want to be right now: from Amazon to IBM, Microsoft to Google, hardware and software companies are scrambling to up their presence in the healthcare sector. Apple has been quietly expanding into the space for a number of years as its devices and its CEO Tim Cook even recently said that in future the company's greatest contribution to humanity would be considered to be 'about health'.

The first signs of Apple's burgeoning interest in health came with the launch of its HealthKit platform and Health app, which debuted alongside the first Apple Watch. Back then, it was consumer wellness that Apple was talking about, helping users track their exercise, diet, and other lifestyle metrics, with the idea that if you know how much you're doing, you might be encouraged to do more.

Jan 15 21:53

There's a simple reason your new smart TV was so affordable: It's collecting and selling your data

A recent interview on The Verge's podcast with Vizio's chief technology officer, Bill Baxter, did a great job illuminating how this works.

"This is a cutthroat industry," Baxter said. "It's a 6% margin industry. The greater strategy is I really don't need to make money off of the TV. I need to cover my cost."

More specifically, companies like Vizio don't need to make money from every TV they sell.

Smart TVs can be sold at or near cost to consumers because Vizio is able to monetize those TVs through data collection, advertising, and selling direct-to-consumer entertainment (movies, etc.).

Or, as Baxter put it: "It's not just about data collection. It's about post-purchase monetization of the TV."

Jan 15 21:50

Four out of five Americans distrust mainstream social media sites like Facebook

Americans are so disillusioned by social media, that many are turning to forums for trustworthy information.

Jan 15 19:19

Anonymous, Pirates and Activists Challenge Articles 11, 12a, 13 With Stop ACTA 2 Protests January 19th Across Europe

By Aaron Kesel

The European Union is attempting to censor the Internet with several new initiatives called Article 11, 12a, and 13 while numerous other Articles are pending to be drafted that could affect your Internet freedom rights.

These Articles will have legal implications that will break the Internet as we know it. Not only will they include an “upload filter” if passed to block copyrighted (or unwanted) content from being uploaded on the Internet, it will also be impossible to link to source material, including educational content and even memes...

Jan 15 18:59

Device “Ownership” Is a Civil Liberties Issue

By Kit Walsh

The technology you rely on to interact with the world and express yourself should ultimately obey you, not the company that made it. If the devices in our pockets, on our bodies, and all around us are going to help us advance our own values, it has to be possible to control and customize them so they don’t just do whatever their manufacturer envisioned...