COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

May 24 09:02

One in five ad-serving websites is visited exclusively by fraud bots

A growing part of the internet is devoted entirely to fraudulent advertising. According to a new report by White Ops, ad-fraud sites make up roughly 20 percent of ad-serving sites on the web, despite having no human traffic whatsoever. The sites make money entirely from traffic bots, designed to mimic human visits to generate ad revenue for the sites’ creators.

Traffic bots have long been a problem for web advertising, also known as “click fraud.” The good news is that, while it remains a billion-dollar industry, advertisers are slowly getting wise to the tricks. According to White Ops, ad-fraud sites are on track to make $6.5 billion in 2017, down from $7.2 billion the previous year.

The problem is particularly acute for desktop video ads, which draw criminals through high prices and a relative scarcity of legitimate inventory. The survey found that 22 percent of desktop video ads were viewed only by traffic bots, a figure that’s held steady from year to year.

May 24 08:58

Microsoft says its best not to fiddle with its Windows 10 group policies (that don't work)

MICROSOFT HAS RESPONDED to claims that its Windows 10 Enterprise operating system ignores user preferences in Group Policy with the advice that, basically, it does and you shouldn't meddle with it.

May 23 18:49

After being caught spying on viewers through their TVs, creepy Samsung unveils new way to track the locations of your FRIENDS through your TV

Samsung has added a location tracking app to its TVs that will allow you – and them – to keep track of other people’s real-time locations. They make it easy for you to expose your friends and family to their tracking: Simply type in the person’s phone number, and they will receive a text they can use to add themselves to your group. Perhaps your mom is happy for you to see what route she’s taking to get to your house, but it’s important to note that once someone is added, everyone else in the group can also see where they are in real time using any type of screen equipped with the Glympse app.

May 23 17:32

Suspect in House Democrat IT Scandal ALSO Had Access to Leaked DNC Emails

The Daily Caller News Foundation reported in February that three brothers who managed office IT for government officials were relieved of their duties on suspicion that they accessed specific computer networks without permission, also known as hacking.

Brothers Abid, Imran, and Jamal Awan were barred from computer networks at the House of Representatives. One of the brothers has a criminal record.

The three brothers funneled House data to an external server.

Now this…

Imran Awan possessed the password to DNC Chair Debbie Wasserman Shultz’s ipad when DNC emails were leaked to Wikileaks.

May 23 16:35

Freetards left wide open to malware fired from booby-trapped subtitles

Hackers have gone back to the future by attempting to infect targets with booby-trapped subtitle files.

By crafting malicious subtitle files for films and TV programmes, which are then downloaded by viewers, attackers can hope to take complete control of any device running the vulnerable platforms. Hackers have pushed trojans under the guise of subtitle files as far back as 2003.

This time around vulnerabilities in particular media player software packages are playing a role in facilitating the attack. Users of popular players – including VLC, Kodi, Popcorn Time and Stremio – are most at risk, according to researchers at security firm Check Point.

The vendors involved all addressed the reported issues before Check Point went public with a warning on Tuesday. Stremio and VLC have also released new software versions incorporating the fix.

May 23 16:32

Redmond puts wall around Windows 10 for Chinese government edition

"The Windows 10 China Government Edition is based on Windows 10 Enterprise Edition, which already includes many of the security, identity, deployment, and manageability features governments and enterprises need," said Windows boss Terry Myerson.

"The China Government Edition will use these manageability features to remove features that are not needed by Chinese government employees, like OneDrive, to manage all telemetry and updates, and to enable the government to use its own encryption algorithms within its computer systems."

Details are very thin about what else is missing compared to the Windows 10 builds available in the West. Presumably a lot less information is collected by the notoriously data-hungry OS, and little of it is likely to flow to Redmond's servers. Any info that is extracted is almost certainly staying in China.

May 23 15:56

Snooper’s Charter: Majority of public unaware of government online surveillance

Civil liberties group Liberty described the introduction of the measures as a “beacon for despots everywhere”.

Theresa May is also planning to regulate the internet, allowing the government to decide what web users can post, share and publish online.

“The Snooper’s Charter recently passed without fuss from the public,” said Douglas Crawford, digital privacy expert at BestVPN.com.

“Now British intelligence agencies and law enforcement organisations have the power to survey data and digital communications, and online security experts have determined the government now has the ability to spy on us at any time.

“It’s clear the British public has a long way to go in order to become fully informed about the realities of online monitoring. Taking steps to ensure personal privacy is censored should be the first port of call.”

May 23 15:50

Regardless of your privacy settings, Windows 10 Creators Update phones home

Another research done by an independent IT security analyst shows a number of privacy issues in Windows 10. Even after you have properly configured Windows 10 Creators Update using Group Policy in the Enterprise edition, the operating system may disregard these settings and continue to utilize your bandwidth and "phone home" to send data.

...

Windows 10's Privacy related settings are just a ruse to throw unsuspecting users offguard so they think their privacy is being maintained. Repeatedly, it has been demonstrated by various researchers that they are meaningless and do not fully prevent your PC from doing unwanted communications with numerous Microsoft and third party computers.

May 23 15:44

Broken Windows Theory

Microsoft’s Windows 10 is a privacy nightmare. Here’s how to protect yourself.

May 23 15:42

Samsung S8 'eye security' fooled by photo

Samsung's eye-scanning security technology, used on the new Galaxy S8 smartphone, has been fooled with a photograph and a contact lens.

The iris-scanner can be used to unlock the phone simply by looking at it, which Samsung says provides "airtight security".

But researchers at Chaos Computer Club had easily tricked the device with a picture of an eye, Motherboard said.

Samsung told the BBC it was "aware of the issue".

May 23 15:40

Scientists have found a way to photograph people in 3D through walls using Wi-Fi

Wi-Fi can pass through walls.

This fact is easy to take for granted, yet it's the reason we can surf the web using a wireless router located in another room.

But not all of that microwave radiation makes it to (or from) our phones, tablets, and laptops. Routers scatter and bounce their signal off objects, illuminating our homes and offices like invisible light bulbs.

Now, German scientists have found a way to exploit this property to take holograms, or 3D photographs, of objects inside a room — from outside it.

May 23 15:39

Robots could wipe out another 6 million retail jobs

Robots have already cost millions of factory jobs across the nation. Next up could be jobs at your local stores.

Between 6 million to 7.5 million existing jobs are at risk of being replaced over the course of the next 10 years by some form of automation, according to a new study this week from by financial services firm Cornerstone Capital Group.

That represents at least 38% of the current retail work force, which consists of 16 million workers. Retail could actually lose a greater proportion of jobs to automation than manufacturing has, according to the study.

May 23 13:39

Fiber Cut Causing Wireless Service Issues and Outages for AT&T

If you're experiencing some issues with your wireless service in Jonesboro, it could be tied to a fiber cut.

That is according to a representative with AT&T.

May 23 10:50

Dubai’s first ‘Robocop’ begins patrolling streets

The world’s first robot policeman has officially joined Dubai’s police force. While it’s not exactly the Robocop from the movie, officers in the United Arab Emirates may want to get used to them, as the bots may soon account for a quarter of their colleagues.

The autonomous Robocop entered the line of duty on Sunday by greeting guests and patrolling the halls at the three-day Gulf Information Security Expo and Conference (GISEC). Plans are in place to have the machine on the streets in popular Dubai areas when the expo ends on Tuesday evening.

May 23 10:23

Facebook founder Mark Zuckerberg says “Global superstructure” needed to advance humanity under totalitarian control

How do you go from a nerd who developed a popular social media website to master decider of the universe and the future of Humankind? Easy: You turn that social media site creation into a multi-billion dollar platform and presto, instant credibility.

To my knowledge, Facebook founder and Harvard dropout Mark Zuckerburg doesn’t have any advanced training or education in sociology and government. But because his social media site is the world’s biggest, he does have incalculable terabytes’ worth of personal data from 1.8-plus billion active users. And he obviously believes that qualifies him to plan the future of the planet.

In a piece from New York Magazine headlined, “Can Facebook Fix It’s Own Worst Bug?” Zuckerberg says he believes that the world needs a “global superstructure to advance humanity,” and that he feels qualified to help make that happen. And, of course, Facebook is the vehicle for that.

May 23 09:20

Hacker ring busted before going global after stealing from Russian bank customers

The Russian Ministry of Internal Affairs (MVD) has announced the arrest of a hacker group, which installed viruses on smartphones to steal money from customers' bank accounts.

To steal the money, the hackers used the SMS-banking system, with money transfers taking place without notification. The police did not specify which banks were involved but said over a million smartphones were hacked smartphones and over 50 million rubles (about $900,000) stolen.

Webmaster's Commentary: 

Why is it that the Russians can find and arrest the cyber criminals .... and the US Government cannot?

May 23 09:08

Kim Dotcom Goes All In: ‘I Knew Seth Rich… I Was Involved’ – Sean Hannity Offers Platform

Kim Dotcom, an actual hacker, serial entrepreneur – and for a while the #1 ranked Call of Duty: Modern Warfare 3 player in the world – may be the key to the entire Seth Rich saga. From testimony in the Wikileaks investigation to Rich’s still unsolved murder – and facing extradition – Dotcom is ready to go nuclear…

May 23 07:46

Heads Up! New EternalRocks Worm More Dangerous Than WannaCry, Has No Kill-Switch

Seven cyber exploits purportedly stolen from the US National Security Agency (NSA) have been identified in 'EternalRocks', a new type of malware detected by a Croatian tech security advisor.

May 22 16:40

Video: What The Hack: Cyberattacks, The Plague Of The 21st Century?

Some of the world’s biggest nuclear powers are under threat from a notorious hacker group.

May 22 10:29

Russian Embassy Implicates Hillary In Tweet Asking: “Who Killed Seth Rich?”

r the past several months, Democrats have based their “Resist 45” movement on unsubstantiated assertions that the Trump campaign coordinated with Russian intelligence officials to undermine the 2016 Presidential Election thereby ‘stealing’ the White House from Hillary Clinton. Day after day we’ve all suffered through one anonymously sourced, “shock” story after another from the New York Times and/or The Washington Post with new allegations of the ‘wrongdoing’.

But, new evidence surfacing in the Seth Rich murder investigation may just quash the “Russian hacking” conspiracy theory. According to a new report from Fox News, it was former DNC staffer Seth Rich who supplied 44,000 DNC emails to WikiLeaks and not some random Russian cyber terrorist, as we’ve all been led to believe.

May 22 09:51

Newt Calls for Seth Rich Investigation, 1642

May 22 09:33

EMP And Martial Law TEST?! UNDENIABLE PROOF WannaCry Ransomware Cyber Attack Is Only The Beginning!

It's More Than Just A Cyber Attack!

On the morning of Fri., May 12th, 2017, an unprecedented ‘‘ransomware’’ cyber attack struck tens of thousands of victims in 150 countries.

WannaCry, the ransomware program, also known as WannaCrypt, WanaCrypt0r 2.0, Wanna Decryptor, and others similar, began with infecting one computer, until infecting all others in a local area network (LAN).

The ransomware encrypts the infected computer's hard disk drive, then attempts to gain access so it can further spread on random computers connected to the internet via TCP port 445.

May 22 08:45

Breaking: ‘Complete Panic’ at Highest Levels of DNC Over Kim DotCom’s Seth Rich Announcement

Saturday, an anonymous person who works in Washington DC, alleged on 4Chan’s /pol/ subgroup that high-ranking current and former Democratic Party officials are terrified of the Seth Rich murder investigation.

This comes after internet entrepreneur and hacker, Kim DotCom, admitted on Saturday that he was part of an operation along with Seth Rich to get stolen DNC emails to Wikileaks.

May 22 08:33

GREEK AUTHORITIES TO LAUNCH MASS CONFISCATION OF SAFE DEPOSIT BOXES, SECURITIES, HOMES IN TAX-EVASION CRACKDOWN

Last week, the Greek parliament once again approved more austerity to unlock withheld Greek bailout funds in Brussels: a symbolic move, which has little impact without any actual follow through, like for example, actually imposing austerity. And while Greeks have been very good in the former (i.e. promises), they have been severely lacking in the latter (i.e. delivery).

That may be changing. According to Kathimerini, Greek Finance Ministry inspectors are about to start seeking out the owners of all local undeclared properties, while the law will be amended to allow for financial products and the content of safe deposit boxes to be confiscated electronically. The plan for the identification of taxpayers who have “forgotten” to declare their properties to the tax authorities is expected to be ready by year-end, according to the timetable of the Independent Authority for Public Revenue.

Webmaster's Commentary: 

It is instructive to watch what is going on with the governments of Greece and Venezuela, as this is precisely how the US government will be looting the property and assets of its citizens when the financial excrement hits the ventilation system once the US economy has crashed.

David Stockman sounds the alarm: Fiscal blooddbath and market crash to occur between August and November, 2017

May 22 08:11

WikiLeaks says the CIA’s Athena malware can be used to spy on Windows XP through to Windows 10 computers.

The latest file revealed in WikiLeaks’ Vault 7 catalog of CIA hacking toolkit is Athena, a surveillance tool apparently designed to capture communications from Windows XP to Windows 10 machines.

Details of the Athena malware are available in a document allegedly created by the CIA in November 2015. The malware is said to have been made in conjunction with US cybersecurity firm Siege Technologies, which was acquired by Nehemiah Security late last year.

Tech companies will be offered additional technical details to help fix flaws, said Julian Assange.

May 22 07:07

Bitcoin Blows Through $2100

Bitcoin is now up over 135% year-to-date, having screamed above $2000 and $2100 overnight as the dollar limped to 6-month lows...

May 22 06:31

Exposed: Facebook rules that allow death threats, pictures of animal torture and videos of self-harm

Facebook is allowing users to share death threats, videos of self-harm and pictures of animal torture, it emerged yesterday.

Leaked company documents reveal staff moderating the social media website are told not to delete such content.

Secret slides detailing ‘permissible’ posts also suggest videos of violent deaths do not always need to be deleted because they can help create awareness of issues such as mental illness.

May 22 06:10

3 iPhone features that are eating up your battery

Small changes can have a big impact...

May 22 06:07

WannaCry Ransomware: North Korea Denies Role in Global Cyber-Attacks

The code used in the latest attack is similar to that used in past hacks blamed on Kim Jong-Un’s regime, leading some to point the finger at Pyongyang.

But the North has now denied the claims, notably but not exclusively advanced by South Korean experts, and hit back Friday to accuse its opponents of spreading propaganda.

“It is ridiculous,” Kim In-Ryong, North Korea’s deputy ambassador to the United Nations, told reporters, suggesting Washington and Seoul were behind the allegation.

“Whenever something strange happens, it is the stereotyped way of the United States and the hostile forces to kick off a noisy anti-DPRK campaign.”

May 21 10:29

Breaking: Seth Rich witness to come forward

Kim Dotcom has offered written testimony and evidence that Set Rich was the source of a massive email leak to Wikileaks under the condition that the Seth Rich case is made part of the Russian probe.

May 21 10:20

Ransomware & ER Doc Who Operated on Seth Rich Says He Was OK Until …

May 21 07:52

The Cyber Threat to Your Savings Now More Serious than Ever

Last week, another round of cyber-attacks crippled computer systems across the world. As these attacks become more frequent, Americans need to understand what it means for their financial security.

For better or worse, a huge portion of what we do today happens online. And that includes our banking and investing.

May 20 20:32

NHS mulling Ubuntu switch after Windows XP fail?

The NHS could be considering switching its software infrastructure from Windows to Ubuntu, after Windows XP vulnerabilities were exploited in the recent cyber attack that crippled the National Health Service. Or is it just an elaborate gag?

The NHSbuntu platform came to our attention via Dr Dean Jenkins, a Fellow of the Royal College of Physicians and editor-at-large of BMJ Case Reports, who writes about it on Differential Diagnosis, his blog.

According to Dr Jenkins, the Linux-based NHSbuntu is a "modern, secure, open source, operating system being considered by Jeremy Hunt for the NHS."

He adds that as NHSbuntu is built on the "industrial strength Ubuntu desktop," it offers a full-fat security feature set to meet the NHS's needs, including secure email, smartcard authentication and whole disk encryption, plus support for modern web browsers and popular office software.

May 20 14:12

Cyber Attacks Are the Perfect Trigger for a Stock Market Crash

The world has been stunned over the past few days by the advent of “Ransomware;” the use of sophisticated cyber attacks on vital systems in order to (supposedly) extort capital from target businesses and institutions. I am always highly suspicious whenever a large scale cyber incident occurs, primarily because the manner in which these events are explained to the public does not begin to cover certain important realities. For example, the mainstream media rarely if ever discusses the fact that many digital systems are deliberately designed to be vulnerable.

May 20 08:38

UK Government Moves Aggressively to Censor and Control the Internet

Senior Tories confirmed to BuzzFeed News that the phrasing indicates that the government intends to introduce huge restrictions on what people can post, share and publish online.

The plans will allow Britain to become “the global leader in the regulation of the use of personal data and the internet”, the manifesto claims.

It comes just soon after the Investigatory Powers Act came into law. That legislation allowed the government to force internet companies to keep records on their customers’ browsing histories, as well as giving ministers the power to break apps like WhatsApp so that messages can be read.

The government now appears to be launching a similarly radical change in the way that social networks and internet companies work. While much of the internet is currently controlled by private businesses like Google and Facebook, Theresa May intends to allow government to decide what is and isn’t published, the manifesto suggests.

May 20 08:36

AI puts words in your mouth

Webmaster's Commentary: 

Another reason not to trust what you see on the TV news!

May 20 08:25

Seth Rich, Craig Murray and the Sinister Stewards of the National Security State

Former-DNC employee, Seth Rich, not only had access to the emails, but also a motive. He was pissed about the way the Clinton crowd was “sandbagging” Bernie Sanders. In contrast, there’s neither evidence nor motive connecting Russia to the emails. On top of that, WikiLeaks founder, Julien Assange (a man of impeccable integrity) has repeatedly denied that Russia gave him the emails which suggests the government investigation is completely misdirected. The logical course of action, would be to pursue the leads that are most likely to bear fruit, not those that originate from one’s own political bias. But, of course, logic has nothing to do with the current investigation, it’s all about politics and geopolitics.

May 19 15:59

'Ok Google, send money': Google's voice assistant will soon be able to pay your friends directly using your debit card

Google is set to let users pay off their debts without lifting a finger.

The tech giant has announced a new feature that will allow users to transfer funds to friends or family via Google Assistant.

Those living in the US will just say 'Ok Google, send $10 to Jane for pizza', and the AI will pull money from a linked debit card and forward it to the recipient.

What could possibly go wrong?

May 19 15:28

WikiLeaks Reveals 'Athena' CIA Spying Program Targeting All Versions of Windows

WikiLeaks has published a new batch of the ongoing Vault 7 leak, detailing a spyware framework – which "provides remote beacon and loader capabilities on target computers" – allegedly being used by the CIA that works against every version of Microsoft's Windows operating systems, from Windows XP to Windows 10.

Dubbed Athena/Hera, the spyware has been designed to take full control over the infected Windows PCs remotely, allowing the agency to perform all sorts of things on the target machine, including deleting data or uploading malicious software, and stealing data and send them to CIA server.

May 19 15:25

WannaCry Ransomware Decryption Tool Released; Unlock Files Without Paying Ransom

Good news is that another security researcher, Benjamin Delpy, developed an easy-to-use tool called "WanaKiwi," based on Guinet's finding, which simplifies the whole process of the WannaCry-infected file decryption.

All victims have to do is download WanaKiwi tool from Github and run it on their affected Windows computer using the command line (cmd).

WanaKiwi works on Windows XP, Windows 7, Windows Vista, Windows Server 2003 and 2008, confirmed Matt Suiche from security firm Comae Technologies, who has also provided some demonstrations showing how to use WanaKiwi to decrypt your files.

Although the tool won't work for every user due to its dependencies, still it gives some hope to WannaCry's victims of getting their locked files back for free even from Windows XP, the aging, largely unsupported version of Microsoft's operating system.

May 19 15:12

Crooks use WannaCrypt hysteria as hook for BT-branded phishing emails

Scoundrels have latched on to the WannaCrypt outbreak as a theme for scam emails. Coincidentally some consumers are receiving seemingly genuine warnings from their ISPs related to suspected infection during last week's worldwide ransomware outbreak.

Action Fraud warned about a dodgy email trying to trick BT customers on Thursday.

Alert: We have fresh reports about this fake BT email that takes advantage of the global #WannaCry ransomware attack https://t.co/mOgZ3y9JY3 pic.twitter.com/ZyuhEO3sdC

— Action Fraud (@actionfrauduk) May 18, 2017

Recipients, who were falsely warned that they would be locked out of their account unless they completed a bogus "security check", commented that the emails were convincing.

May 19 15:06

Wondering why the office is so productive? Yep, Twitter's knackered

Meanwhile, former Twitter property Vine has begun to warn users after it discovered a vulenrability that exposed some user account details.

"The bug had the potential to expose the email address or phone number associated with a Vine account to third parties under certain circumstances," the ex-video sharing site said.

"We have already notified all affected account holders for whom we have a verified email address on file, so if you weren’t notified, you most likely weren’t affected."

May 19 10:37

London Police Say They're Still Obligated to Arrest Assange

On Friday, Swedish prosecutors announced that they have dropped their suspected rape investigation into Wikileaks founder Julian Assange. But the Metropolitan Police Service (MPS), which serves London, says it is still obligated to arrest Assange if he does decide to leave the Ecuadorian embassy, where he has been holed up for over half a decade.

"Westminster Magistrates' Court issued a warrant for the arrest of Julian Assange following him failing to surrender to the court on the 29 June 2012," the MPS said in a statement published Friday. "The Metropolitan Police Service is obliged to execute that warrant should he leave the Embassy."

As the MPS acknowledges, this is a much less serious crime than the one Swedish prosecutors were investigating. As legal commentator David Allen Green pointed out on Twitter, Assange may face up to a year in prison for breaching bail if convicted.

Webmaster's Commentary: 

Those in the Bowels of Power in the Unhinged Surveilled States of America are furious with Assange, because he embarrassed them, demonstrating very openly their foul ups, bleeps, and blunders.

IF, in fact the London Metropolitan Police arrest him, that arrest will most likely lead to extradition to the US, followed by a grisly assassination, to discourage others from becoming whistle-blowers.

May 19 09:38

Russian Embassy Implicates Hillary In Tweet Asking: "Who Killed Seth Rich?"

Earlier this week, Fox News dropped a bombshell report officially confirming, via anonymous FBI sources, what many had suspected for quite some time, that murdered DNC staffer Seth Rich was the WikiLeaks source for leaks which proved that the DNC was intentially undermining the campaign of Bernie Sanders. In addition to exposing the utter corruption of the DNC, the leaks cost Debbie Wasserman Shcultz her job as Chairwoman.

At the time, we mockingly wondered why the mainstream media seemingly overlooked a huge new development in a highly suspicious unsolved murder case.

Finally, we find it 'shocking' that while the New York Times, Washington Post, CNN, etc are all too eager to regurgitate each others anonymously sourced stories that are critical of Trump, not a single one of them had a single reference of this Fox News bombshell on their website at the time this article was published.

May 19 09:33

#WannaCry Ransomware Exposed as a False Flag Attack on Bitcoin

In this video, software and blockchain developer Vin Armani examines the WannaCry ransomware that the corporate media acted like it was the end of the world. Ultimately it appears to be an amateurish false flag attack on bitcoin. But upon digging into the bitcoin addresses used in the attack, Vin discovers a potentially much more nefarious attack on bitcoin.

May 19 09:20

Should We Believe The NSA About Stopping Its Unconstitutional “About Searches”?

By Catherine J. Frompovich

Recently, the NSA announced it no longer will conduct “about searches” as part of its Upstream Surveillance. That sounds great, but can we really believe them.

According to the Electronic Frontier Foundation (EFF), who has filed lawsuits against NSA regarding the unconstitutional and warrantless searches it conducts, NSA’s statement is a win in the fight against surveillance, but more reforms still are needed.

So really, what freedom prize did citizens win?...

May 19 08:54

Malware Protection Protocol - blame Microsoft for malware

May 19 08:53

GOOGLE GIVES FAKE RESULTS - PROOF

May 19 07:55

Windows XP hit by WannaCry ransomware? This tool could decrypt your infected files

Windows XP wasn't vulnerable to the WannaCry worm but still could be infected with the ransomware. Now there's a tool to decrypt Windows XP machines attacked by WannaCry.

May 19 07:43

Anthony Weiner expected to plead guilty to transferring obscene material to a minor

Anthony Weiner, the disgraced former New York congressman and estranged husband of top Hillary Clinton aide Huma Abedin, is expected to plead guilty today to a single count of transferring obscene material to a minor for allegedly texting an underage girl.

Weiner, who turned himself into the FBI, is due in federal court later this morning.

The emails that prompted the FBI to reopen its review of Clinton’s private email server days before the 2016 presidential election emerged from the 2016 federal investigation into whether Weiner sent explicit messages to an underage girl in North Carolina.

May 19 07:09

Samsung to sell refurbished Galaxy Note 7 as “Galaxy Note FE”

Wondering whatever happened to all the Galaxy Note 7 devices that did not catch on fire and were returned to Samsung? Well there are reports coming out that they are refurbishing these phablets and will be selling them to what they hope is a forgiving and forgetful market. Of course they will have to undergo and pass all the safety standards all over again but would you be willing to still get this device if it hits the market?

May 19 07:07

Windows 10 S is crippleware

The best thing I can say about Windows 10 S is that it’s not Windows RT. RT ran on ARM processors, so you couldn’t run any of your existing applications on it. At least with Windows 10 S, you can run a few older Windows apps: Evernote, Slack, Photoshop Elements and Autodesk Sketch. But serious programs, such as Microsoft Office? Nope. Full Photoshop? Hardly! Full Autodesk? Don’t make me laugh! Heck, you can’t even run Office 365 on it — at least not yet, anyway.

This is not a small office/home office PC operating system.

So tell me, why would you ever want to run Windows 10 S?

May 19 07:05

More Chaos On the Way? WannaCry Hack Sends Ominous New Message to Victims

Last week's WannaCry ransomware attack led to worldwide cyber chaos, crippling vital computer systems such as those used by the NHS.
Now victims of the hack are reporting they have received a chilling new message from the cyber criminals behind the scheme.
Infected computers have received a pop-up encouraging users to send the attackers cash in exchange for their files.

May 19 06:56

BBC fools HSBC voice recognition security system

Security software designed to prevent bank fraud has been fooled by a BBC reporter and his twin.

BBC Click reporter Dan Simmons set up an HSBC account and signed up to the bank's voice ID authentication service.

HSBC says the system is secure because each person's voice is "unique".

But the bank let Dan Simmons' non-identical twin, Joe, access the account via the telephone after he mimicked his brother's voice.

The bank said it would "review" ways to make the ID system more sensitive following the BBC investigation.

May 19 06:54

THERESA MAY TO CREATE NEW INTERNET THAT WOULD BE CONTROLLED AND REGULATED BY GOVERNMENT

Theresa May is planning to introduce huge regulations on the way the internet works, allowing the government to decide what is said online.

Particular focus has been drawn to the end of the manifesto, which makes clear that the Tories want to introduce huge changes to the way the internet works.

"Some people say that it is not for government to regulate when it comes to technology and the internet," it states. "We disagree."

Senior Tories confirmed to BuzzFeed News that the phrasing indicates that the government intends to introduce huge restrictions on what people can post, share and publish online.

May 19 06:49

Don't gripe if you hand your PC to Geek Squad and they rat you out to the Feds – judge

A judge has ruled that people who give their knackered computers to Best Buy's Geek Squad for repairs have no comeback if technicians find and report any illegal material to the Feds.

May 19 06:47

Phishing scum going legit to beat browser warnings

Browser-makers' decision to put big red warning lights in the faces of users when they hit sites too slack to use HTTPS is backfiring a little, as crooks are accelerating their use of encryption.

So says Netcraft, which has turned its web server probes onto phishing sites in the wake of Chrome 56 and Firefox 51 adding warnings about insecure sites that request passwords.

The firm's data shows that since the two browsers started to berate HTTP-only operations, phishing sites added an extra layer of credibility by adding HTTPS.

May 19 06:45

?There's a ransom-free fix for WannaCry?pt. Oh snap, you've rebooted your XP box

Windows XP PCs infected by WannaCrypt can be decrypted without paying ransom by using a new utility dubbed Wannakey.

Wannakey offers in-memory key recovery for Win XP machines infected by the infamous ransomware strain. The fix can be used to dump encryption keys from memory. This RSA private key, once recovered, can be used to restore encrypted files on infected computers.

Caveats and limitations apply. Compromised machines must not have been rebooted after being infected, otherwise the crucial keys will already have been discarded from volatile memory. That's quite a big ask a week after the devastating WannaCrypt outbreak, especially since initial advice centred on turning off machines to stop the further spread of infection across corporate networks.

May 18 17:55

Facebook Adds Another New Censorship Tool To Stop “Conspiracies” and “Misinformation”

In the video below, Vin Armani gives an update about YouTube and Facebook’s latest attempt to censor content on their platforms. He discusses a brand new Facebook tool to further censor conspiracy theories, and misleading and sensational content. Well, that’s subjective.

Facebook posted a press release to announce the new tool, writing:

"We want to help people build an informed community on Facebook. That’s why we’re always working to understand which posts people consider misleading, sensational and spammy so we can show fewer of those and show more informative posts instead.

"We hear from our community that they’re disappointed when they click on a link that leads to a web page containing little substantive content and that is covered in disruptive, shocking or malicious ads. People expect their experience after clicking on a post to be straightforward.

May 18 15:38

Proposed PATCH Act forces US snoops to quit hoarding code exploits

Two US senators have proposed a law limiting American intelligence agencies' secret stockpiles of vulnerabilities found in products.

The Protecting our Ability To Counter Hacking (PATCH) Act [PDF] would set up a board chaired by an Department of Homeland Security (DHS) official to assess security flaws spies have found in code and hardware, and decide if manufacturers should be alerted to the bugs so they can be fixed for everyone.

May 18 14:30

Mainstream media conspiring with Google to rig all search results and silence dissenting views… Google becomes “fake search”

What does Google have in common with traditionally liberal news networks like MSNBC, ABC and CNN? On the surface, nothing much at all – the former is an Internet search engine and the latter are a couple of national broadcasting corporations with political hosts and commentators. If you dig a little deeper, however, it becomes clear that both the search engine and the liberal news networks have something in common after all, and it has to do with a vicious assault on the freedom of speech.

May 18 11:57

Delta Airlines Introducing Facial Recognition For Travelers

By Nicholas West

The desire for security, efficiency and convenience is a narrative that continues to incrementally condition the population to accept the erosion of privacy and civil liberties on a number of fronts. The modern-day airport can certainly test the patience of even the most saintly, so it’s somewhat understandable that people have come to hope for anything that promises to deliver them to the exit as rapidly as possible, and preferably with the least amount of contact with airport personnel.

The concurrent fear surrounding terrorists and immigrants (apparently understood now to be one and the same) further greases the slippery slope as we accelerate to a full-on police state where “papers please” is set to be replaced by a less-intrusive biometric scan...

May 18 11:26

Tech Support Scams Pop-Ups on the Rise

The Internet Crime Complaint Center (IC3) has issued a public service announcement warning about a “new twist to the telephone tech support scam“.

In its message, it advises users to be particularly cautious about fake pop-ups telling them that their computers are infected and urging to call a toll free number for assistance:

May 18 09:41

Second Large-Scale Cyber-Attack Is Underway Now! May 18, 2017

Here we go again. We are under Version 2 cyber-attack. This one is different from the first WannaCry attack. The experts are saying this attack will be worse. The new attack targets the same vulnerabilities as the WannaCry ransomware worm exploited, but there will be no freezing of files this time.

May 18 09:25

You think your day was bad? OS X malware hackers just swiped a Mac dev's app source

Steven Frank, founder of Portland, Oregon-based Panic Inc, said he fell victim to a poisoned download of the Handbrake video transcoder that resulted in the installation of a backdoor on his Mac.

"HandBrake had been nagging me for some time to install an update. I finally decided, for whatever reason, to do the update," Frank explained. "There was a note in HandBrake's update dialog that the incremental update was not available, and that I'd have to download an entirely fresh copy from their server."

By the time he heard the news about the HandBrake infection, Frank said, his machine had not only been accessed by a hacker via the backdoor, but had been harvested for Git server credentials that were then used to access and copy the code for several of the company's closed-source products. Panic develops a number of games and utilities for both macOS and iOS.

May 18 09:22

Bloke charged under UK terror law for refusing to cough up passwords

British police have charged a man under antiterror laws after he refused to hand over his phone and laptop passwords.

Muhammad Rabbani, international director of CAGE, was arrested at Heathrow in November after declining to unlock his devices, claiming they contained confidential testimony describing torture in Afghanistan as well as information on high-ranking officials. CAGE positions itself as a non-profit organization that represents and supports families affected by the West's TWAT (aka The War On Terror).

On Wednesday this week, he was charged under Schedule 7 of the Terrorism Act 2000: specifically, he is accused of obstructing or hampering an investigation by refusing to cough up his login details.

May 18 09:20

Dell BIOS update borks PCs

Dell's latest BIOS update is bricking some machines – apart from a power light, they refuse to boot up at all, say users.

The Texan tech titan's own support forums are filling up with frustrated users who took the support assistant’s advice to download the latest program.

Many of those who installed the update now cannot boot up their machines. One typical explanation posted was: "Add me to the list Dell Inspiron 20 model 3052, updated on the weekend, woke up to a solid amber/orange light and a dead computer. Contacted Dell on facebook and this is what I was told "The updates Dell releases don't affect the system. But it would enhance the performance of the system" ummmm no....if they broke they need to fix it."

May 18 09:20

Cyber Attacks Are The Perfect Trigger For A Stock Market Crash

The world has been stunned over the past few days by the advent of “Ransomware;” the use of sophisticated cyber attacks on vital systems in order to (supposedly) extort capital from target businesses and institutions. I am always highly suspicious whenever a large scale cyber incident occurs, primarily because the manner in which these events are explained to the public does not begin to cover certain important realities. For example, the mainstream media rarely if ever discusses the fact that many digital systems are deliberately designed to be vulnerable.

Webmaster's Commentary: 

An electronic 9/11 could do incredible damage to the global financial infrastructure; the question is, how does this possibility get stopped?!?

May 18 09:17

Three home security systems found to be vulnerable – if hackers were hiding in bushes

Three home security systems were riddled with bugs, according to new research made public this week.

Rapid7 found 10 vulnerabilities after putting Comcast XFINITY, ADT, and AT&T Digital Life systems through their paces. The issues range from a "fail open" condition on the external door and window sensors, to weak, pre-shared Wi-Fi access passwords on to cleartext (unencrypted) network communications. It's a not unfamiliar list given the lamentable state of IoT security more generally.

Potential hackers would need to be physically close to their target to attempt to abuse any of these vulnerabilities, according to Rapid7. Remote hacks over the internet would not be possible but with proximity all manner of mischief is possible.

May 18 07:59

Brandon Smith Warns: ‘All Global Banking Systems And Stock Exchanges Are Open To Attack With These Same NSA Exploits’

It should be noted that the Ransomware attacks which struck systems around the world used “Wannacrypt,” derived from an NSA exploit called “Eternalblue.” This program was designed to specifically target Microsoft Windows machines, no doubt using vulnerabilities which MicrosoftENGINEERED into their own software. Now, interestingly, a batch of NSA exploits was published online by a hacker group called “the shadow brokers” only last month. From the information I have gathered so far, it seems that “Eternalblue” was part of that data dump and that the Ransomware incident is directly connected.

May 18 07:24

EU files request with Kiev on blocking Russian websites, social networks

Among the blacklisted entities are Russian social networking sites Vkontakte and Odnoklassniki, and also e-mail services Mail.ru and Yandex

May 18 07:20

Another large-scale cyberattack underway: experts

he new attack targets the same vulnerabilities the WannaCry ransomware worm exploited but, rather than freeze files, uses the hundreds of thousands of computers believed to have been infected to mine virtual currency.

Following the detection of the WannaCry attack on Friday, researchers at Proofpoint discovered a new attack linked to WannaCry called Adylkuzz, said Nicolas Godier, a researcher at the computer security firm.

"It uses the hacking tools recently disclosed by the NSA and which have since been fixed by Microsoft in a more stealthy manner and for a different purpose," he said.

May 18 06:51

WIKILEAKS PUBLISHES DOCUMENTS SHOWING HOW GOOGLE HELPED AL-QAEDA IN SYRIA

Google has helped Al-Qaeda and other Salafist groups like the Muslim Brotherhood gain new members at the dawn of the Syrian conflict, secret documents and e-mails published by Wikileaks show.

The then director of Google Ideas, Jared Cohen coordinated actions to support the groups often dubbed as rebels with then U.S. Foreign Minister Hillary Clinton and Deputy U.S. State Secretary William Burns. Google employed it’s expertise in the IT sector to help the conflict in Syria gain traction.

Webmaster's Commentary: 

Welcome to a "We have met the enemy, and he is us." moment, courtesy of former Secretary of State Hillary Clinton and her advisors in the Obama administration.

May 18 06:29

WIKILEAKS PUBLISHES DOCUMENTS SHOWING HOW GOOGLE HELPED AL-QAEDA IN SYRIA

Google has helped Al-Qaeda and other Salafist groups like the Muslim Brotherhood gain new members at the dawn of the Syrian conflict, secret documents and e-mails published by Wikileaks show. The then director of Google Ideas, Jared Cohen coordinated actions to support the groups often dubbed as rebels with then U.S. Foreign Minister Hillary Clinton and Deputy U.S. State Secretary William Burns. Google employed it’s expertise in the IT sector to help the conflict in Syria gain traction.

May 17 16:00

11-Year-Old Activist Warns About The Internet Of Things By “Weaponizing” A Teddy Bear

By Kevin Samson

The new “smart world” that we are embarking upon as an increasing number of our computerized devices and objects become part of The Internet of Things has promised more convenience and more efficiency. And, yet, not a day seems to pass without a report about hacking.

11-year-old Reuben Paul took the stage at the World Forum cyber security conference in The Hague to give a demonstration of the threat...

May 17 15:32

SETH RICH Family Investigator ROB WHEELER Told By DC POLICE “Stand Down” – Orders From High Up

The Rich family hired Investigator Rob Wheeler to privately investigate his death, as the DC Police was not making any progress. His death was not a robbery, and it had been declared a homicide…the family wanted answers.

Wheeler found out right away that Seth Rich was the DNC leaker, which the firm hired by the DNC to investigate the leaks: Crowdstrike, immediately blamed on Russia. In fact, the DNC would not allow the FBI to investigate, hiring Crowdstrike instead.

Crowdstrike is supported by Eric Schmidt of Google, and Schmidt contributed to the Hillary Clinton campaign. The DNC clearly had a conflict of interest here, and the FBI looked the other way. This is how the Russian hacking story began. The biggest setup in history has been pulled on the American people, and it is still being played on President Trump.

May 17 14:34

Ex-Spy Chief Condemns Microsoft For Leaving Windows XP Users Vulnerable To Cyberattacks

A former UK spy chief has hit out at Microsoft for cutting support for its Windows XP system that could have protected public services from massive cyberattacks such as the one that paralyzed the National Health Service (NHS) last week.

May 17 12:00

FBI Says a Laptop That Held Clinton’s E-Mails Has Gone Missing

Someone whose name was redacted in the FBI report told the agency that he later deleted the e-mails from the laptop but didn’t wipe its hard drive. A computer technician can often recover such e-mails that have been deleted but not permanently erased from a laptop’s memory.

The FBI sought the laptop as part of its investigation, but it’s whereabouts remain unknown, the bureau said: The last time the laptop was seen was when it was put in the mail.

Webmaster's Commentary: 

And if you believe THAT one, I have some of Saddam's nuclear weapons to sell you!

May 17 09:05

CIA is world’s most dangerously incompetent spy agency – Assange

WikiLeaks founder Julian Assange has described the CIA as “dangerously incompetent,” in response to the US agency branding him a “friend of terrorists.” The war of words started after RT asked the CIA to comment on reports of its hacking exploits.

“Dictators and terrorists have no better friend in the world than Julian Assange, as theirs is the only privacy he protects,” CIA spokesperson Heather Fritz Horniak told RT in an email.

The scathing response came after RT asked the CIA to comment on the assessment of former agency analyst Ray McGovern. He suggested that the capability to falsify digital fingerprints, exposed by WikiLeaks as part of its ongoing Vault 7 disclosure, cast doubt on allegations against Russia in connection with the 2016 US presidential election.

May 17 09:04

Is Microsoft to blame for the largest ransomware attacks in internet history?

Writing in The New York Times over the weekend, sociologist Zeynep Tufekci placed the blame squarely on Microsoft for its decision to stop supporting older Windows versions. “Companies like Microsoft should discard the idea that they can abandon people using older software,” Tufekci wrote. “Industry norms are lousy to horrible, and it is reasonable to expect a company with a dominant market position, that made so much money selling software that runs critical infrastructure, to do more.”

ZDNet was even harsher. “The real problem here is that for decades the IT industry as a whole has been selling rubbish products,” a post argued. “It's become fabulously wealthy by making products that are broken to begin with, and often, directly or indirectly, charging customers to fix them.”

May 17 09:03

REPORT: WikiLeaks Published Documents Illustrating How Google, Hillary Helped al-Qaeda in Syria

A new report coming from Al-Masdar News involving WikiLeaks documents, illustrate the fact that Google, along with then U.S. Foreign Minister Hillary Clinton, helped al-Qaeda and other groups like the Muslim Brotherhood acquire new members at the onset of the Syrian conflict.

May 17 08:47

Ransomware decrypts Taiwanese netizen's computer due to his low income

-On May 4, a Taiwanese netizen emailed the helpline of ThunderCrypt ransomware after his PC got infected, and said that he only makes $400 monthly, and he couldn't afford the 0.345 bitcoin he was asked to pay. He later got decrypted by the helpline because they thought they have largely overestimated the nation's income.

May 17 08:43

Boy, 11, hacks cyber-security audience to give lesson on 'weaponisation' of toys

An 11-year-old “cyber ninja” has stunned an audience of security experts by hacking into their Bluetooth devices to manipulate a robotic teddy bear, showing in the process how interconnected smart toys “can be weaponised”.

Reuben Paul, who is in sixth grade at school in Austin, Texas, and his teddy bear Bob wowed hundreds at a cyber-security conference in the Netherlands.

May 17 08:42

Serious vulnerability in Google Chrome on Windows could expose user credentials

Spotted by Bosko Stankovic, an information security engineer at DefenseCode LLC, the vulnerability in the default configuration of the latest version of Chrome allows malicious websites to trick users into downloading a .scf (Shell Command File format) file without prompting the user as it would typically do with other types of downloads. By bypassing this option, the malicious .scf file lies dormant in the downloads directory until a victim opens the directory, at which point the file automatically runs without the user having to click on it.

Once up and running, the file allows the attacker to gain access to a victim’s username and Microsoft LAN Manager password hash. That leaves the victim open to attacks, including a so-called Server Message Block relay attack that allows the hacker to use the credentials to authenticate to a personal computer or network resource.

May 17 08:10

200 Years Together: Solzhenitsyn's Book on Jews in Russia - Censored by Google?

English translations have been suppressed and now that there is one (in progress) it looks like google is censoring it.

May 17 08:10

Windows 10 tip: Stop using the horribly insecure SMBv1 protocol

For years, Microsoft has been recommending that you disable the vulnerable SMBv1 protocol. The recent WannaCry ransomware outbreak underscores the need to take this important step. Here's how.

May 17 06:39

Cisco warns: Some products might have WannaCrypt vuln

To other vendors using embedded Windows: where are your warnings and patches?

May 17 06:35

Train station's giant screens showed web smut at peak hour

Commuters at Washington DC's Union Station were left unsure if they were coming or going on Monday, when streamed smut started to appear on digital signs during peak hour. And it appears there's a rash of such incidents taking place around the world.

As Twitter users like @_joannaw recorded, “The monitors at Union Station just started playing Pornhub.”

May 17 06:32

Yo, patch that because scum still wanna exploit WannaCrypt-linked vuln

Vulnerable Windows Server Message Block (SMB) shares central to last week's WannaCrypt outbreak are still widely deployed and frequently hunted, security researchers warn.

Rapid7 found over a million internet-connected devices that expose SMB on port 445. Of those, more than 800,000 run Windows, and – given that these are nodes running on the internet exposing SMB – it is likely that a large percentage of these are vulnerable versions of Windows with SMBv1 still enabled.

"While scanning for devices that expose port 445 has been observed for quite some time, the volume of scans on port 445 has increased since 2017-05-12 [Friday], and a majority of those scans are specifically looking to exploit MS17-010, the SMB vulnerability that the WannaCry[pt] malware looks to exploit," Rapid7 reports.

May 17 06:30

Police anti-ransomware warning is hotlinked to 'ransomware.pdf'

This (probably) isn't a spear phishing attack but we were too afraid to verify

May 16 16:52

This Blockchain Project is Decentralizing All The Things

In this video, Vin Armani talks with Swarm City contributor Matthew Carano about how they’re building a platform to decentralize everything. They set out to create a decentralized ride-sharing company after their town banned Uber and the project turned into so much more. Find out how it works below:

May 16 15:42

Swedish Pensioner Prosecuted For ‘Hate’ After Accusing Migrants Of Torching Cars On Facebook

A 70-year-old Swedish woman in Dalarna is being prosecuted for hate speech after claiming on Facebook she saw migrants defecating in the streets and setting fire to cars.

According to the prosecution, the woman “expressed a disparaging view of refugees” on Facebook. She stands accused of having taken to the social media website in early July 2015 to make the “derogatory” post, alleging that migrants “set fire to cars, and urinate and defecate on the streets”.

May 16 15:07

Hackers Seize Unreleased Disney Film, Demand ‘Huge’ Bitcoin Ransom – Report

The latest movies in the Disney franchises “Pirates of the Caribbean” and “Cars” are set to hit the big screen this summer, but Disney CEO Bob Iger is reportedly warning that hackers are holding an unreleased Disney film for ransom, to be paid in Bitcoin.

May 16 13:08

Victims Paid WannaCry Ransom Hackers Less Than $70k, No Data Recovered – White House

WannaCry, the global cyber ransomware attack that infected more than 300,000 computers in 150 countries, yielded the hackers less than $70,000, and no federal computer systems were infected, according to the White House.

May 16 12:06

Murdered DNC Staffer Seth Rich Shared 44,053 Democrat Emails With WikiLeaks: Report

For the past several months, Democrats have based their "Resist 45" movement on unsubstantiated assertions that the Trump campaign coordinated with Russian intelligence officials to undermine the 2016 Presidential Election thereby 'stealing' the White House from Hillary Clinton. Day after day we've all suffered through one anonymously sourced, "shock" story after another from the New York Times and/or The Washington Post with new allegations of the 'wrongdoing'.

But, new evidence surfacing in the Seth Rich murder investigation may just quash the "Russian hacking" conspiracy theory. According to a new report from Fox News, it was former DNC staffer Seth Rich who supplied 44,000 DNC emails to WikiLeaks and not some random Russian cyber terrorist, as we've all been led to believe.

May 16 11:57

The Exponential Growth of Insecurity

There is no such thing as cyber security. The only choice is more security or less security, as the recent hack of the National Security Agency demonstrates.

May 16 11:31

Claims of North Korea Links to Cyber Attack ‘Well Short of Proof’

Researchers investigating last week’s cyber attacks involving the WannaCry ransomware say that early versions of the software had some code in common with past attacks by the “Lazarus Group,” which some officials have accused of being North Korean hackers.

The Lazarus Group was behind a handful of past attacks, most notably the Sony hacking incident of 2014, which officials attributed to North Korea primarily because it came around the release of the movie The Interview, which involved a plot to kill North Korea’s leader.

The researchers who noted the similar code conceded that copying snippets of code between hacker groups is not uncommon, and that this was “well short of proof” of an actual relationship between the two. Indeed, most of the WannaCry code was a copy of exploits developed by the NSA.

Webmaster's Commentary: 

It appears that those in the bowels of power in the USSA (the Unhinged, Surveilled States of America), are desperate for ANY accusation which might "fly' in public opinion in terms of getting it to go along with a war against North Korea, which may well escalate into a war against China.

They seem to have missed the point, thank you very much, that Americans are profoundly war-weary, and war-skeptical at this point in their history.

And it is very damning that no 16 year old American teenager has ever lived through a time in their lives, when the US government hasn't been at war with SOME foreign power or another, somewhere else in the world.

May 16 10:45

CAGE director in legal battle to protect crucial evidence in torture caserrests

While flying back home Muhammad Rabbani, CAGE's International Director, was stopped by border police under Schedule 7 powers. They asked for his password and he declined. Now he's being threatened with prison.

Mr Rabbani refused in order to protect crucial evidence in a torture case and to take a stand against schedule 7.

May 16 10:29

Confirmed: DNC Emails LEAKED … Not Hacked

We’ve reportedly documented that the DNC emails were leaked … not hacked.

(And the “evidence” that it was the Ruskies has collapsed.)

The head of Wikileaks – the organization which published the leaked DNC emails – has previously hinted that the leaker was DNC insider Seth Rich.

Today, the local Washington DC Fox news channel reports that the Rich family’s private investigator – a former Homicide Detective in Washington DC and white collar criminal investigator for the Attorney General of the State of Ohio – says that evidence on Rich’s computers proves that he communicated with Wikileaks:

May 16 09:53

Facial recognition installed in female university dormitory in China – to keep out ‘strangers’

ne of China’s top universities has installed facial recognition in a female dormitory to ensure the building is off limits to non-residents.

The scanners were introduced by Beijing Normal University last month over security concerns, and will be rolled out to another nine female dormitory buildings if they prove successful.

Facial recognition is becoming increasingly common in China, where it has been installed in ATM machines, KFC restaurants and even public toilets, as a means of clamping down on loo-roll theft.

May 16 09:32

Security experts: WannaCry ransomware attack may just be getting started

The WannaCry ransomware attack that hit nations around the world over the weekend may just be warming up, according to security experts.

May 16 08:53

WannaCry ransomware shares code with North Korea-linked malware – researchers

The source for WannaCry ransomware, which has spread to 150 countries, may be Pyongyang or those trying to frame it, security analysts say, pointing to code similarities between the virus and a malware attributed to alleged hackers from North Korea.

May 16 08:49

Horrified mother, 27, discovers Google Street View had published NAKED images of her daughters, four and three, playing in a paddling pool outside their home

Google Street View published naked images of two naked children playing outside their house, leaving their mother horrified.

Laura Haslam, 27, was outraged after finding out daughters Brooke, four, and Eva, three, were snapped by internet giant Google Maps outside their fenced-off home in Poulton-Le-Fylde, Lancashire.

The youngster's faces were blurred in the images - but their naked bodies could clearly be seen using the website's 'street view' option as users trawl along the street.

May 16 07:44

DocuSign forged – crooks crack email system and send nasties

Electronic signatures outfit DocuSign has warned world+dog that one of its email systems was cracked by phisherpholk.

The company has of late reported an extensive phishing campaign that sees messages with the subject line “Completed *company name* - Accounting Invoice *number* Document Ready for Signature” land in plenty of inboxes. As is the way with such things the mail carried a link to a Microsoft Word document bearing “macro-enabled-malware.”

May 16 07:41

Military Seeks Machine Learning To Interpret Big Data For A.I. Warfare

By Nicholas West

Even as the military has downplayed its willingness to delegate lethal decision making to artificial intelligence, it appears to be developing systems which could do exactly that.

The rise of Big Data has been a boon for the military and surveillance industries, as the exponential increase in computer processing power has enabled the collection and storage of information on a scale and speed never before seen. However, with that collection and storage also comes the need to meaningfully analyze it. So far, that has been a restriction which is not proving easy to overcome.

Nowhere is this challenge better highlighted than in warfare...

May 16 07:41

Why Microsoft's Windows game plan makes us WannaCry

In the circular firing squad of WannaCrypt, the world's largest recorded ransomware outbreak, nobody looks good.

Not end-users for clinging to dated and unprotected Windows PCs despite warnings, not the government whose National Health Service saw 61 organisations compromised, and certainly not Microsoft – the actual author of Windows.

Just last night, The Register revealed that even though Microsoft had been griping about NSA exploit stockpiles at the weekend, it had also been sitting on its own stockpile ...of patches: Friday's WinXP fix was built in February.

May 16 07:38

Cryptocurrency miner found armed with same exploits as WannaCrypt

The now infamous Windows vulnerability (MS17-010) exploited by the WannaCrypt ransomware has also been abused to spread another type of malware, specifically a cryptocurrency miner.

The Adylkuzz campaign predates WannaCry by severals day and may even have limited the spread of last week’s WannaCry infection, according to security firm Proofpoint.

"Initial statistics suggest that this attack may be larger in scale than WannaCry[pt], because this attack shuts down SMB networking to prevent further infections with other malware (including the WannaCry[pt] worm) via that same vulnerability," according to Proofpoint.

Targeted machines are used to mine for the Monero cryptocurrency. Monero is an alternative to Bitcoin recently adopted by the AlphaBay darknet market to trade in drugs, stolen credit cards, and counterfeit goods.

May 15 20:05

WinAntiRansom Review

WinAntiRansom is an excellent program that provides better protection against ransomware than any of the other programs designed for that purpose.

With better functionality comes more complexity often, but this is not the case here as everything is handled automatically for the user. This does not mean that you have to give up control though, as you can monitor and manage the activity at any time, and enable advanced mode for more control.

The program has been designed to block ransomware, but there is little reason why it won't stop other malware as well dead in its tracks, especially those malicious programs that share similarities with ransomware.

It is a complementary security tool all in all that runs well alongside traditional antivirus software.

May 15 17:19

BEX ALERT - Researchers see possible North Korea link to global cyber attack

Cyber security researchers have found technical clues they said could link North Korea with the global WannaCry “ransomware” cyber attack that has infected more than 300,000 machines in 150 countries since Friday.

Symantec and Kaspersky Lab said on Monday some code in an earlier version of the WannaCry software had also appeared in programs used by the Lazarus Group, which researchers from many companies have identified as a North Korea-run hacking operation.

“This is the best clue we have seen to date as to the origins of WannaCry,” Kaspersky Lab researcher Kurt Baumgartner told Reuters.

May 15 16:33

Who’s Responsible For The Ransomware Hack?

What should we make of the global ransomware attacks which happened today?

We’ve documented that the intelligence services intentionally create digital vulnerabilities, then intentionally leave them open … leaving us exposed and insecure.

Washington’s Blog asked the highest level NSA whistleblower ever* – Bill Binney – what he thinks of the attacks.

May 15 14:55

Government Is the Cause of—Not the Solution to—the Latest Hacking Outbreak

Privacy and cybersecurity experts and activists have been warning for ages that governments have their priorities all wrong. National security interests (not just in America but other countries as well) comparatively spend much more time and money attempting to breach the security systems of other countries and potential enemies than they do bolstering their own defenses. Reuters determined, with the information from intelligence officials, that the United States spends $9 on cybersurveillance and government hacking for every $1 it sends on defending its network systems.

May 15 13:54

Ransomware Is Tip Of The Iceberg: “You Could See 90% Of Americans Die As A Result Of A Prolonged Power Outage Because The Grid Gets Hacked”

The Ransomware that began spreading across the globe on Friday is still going with more computers reportedly being affected today by new variants of the virus.

What we’ve learned is that the attack hasn’t just taken down personal computers, but core government and business networks affecting everything from health care systems and transportation in Europe, to ATM withdrawals in China.

It’s massive, to be sure. But in the grand scheme of things, up to this point, it has been a fairly minor inconvenience.

May 15 10:17

It Is Not Over - WannaCry RansomWare Attack – There Is A Version 2.0 – Kill Switch Only Slows It Down.

The update on the WannaCry RansonWare Attack is: Multiple security researchers have claimed that there are more samples of WannaCry out there, with different ‘kill-switch’ domains and without any kill-switch function, continuing to infect unpatched computers worldwide.

May 15 09:35

AMI Smart Meters Defined In Four Minute Cartoon

By Catherine J. Frompovich

To most utility customers, AMI Smart Meters may be an unknown entity, even though they have one on their electric service, and probably on their natural gas and water utilities too! The goal is to have at least 90 million AMI Smart Meters installed in the USA by 2020. Larger cities already are AMI SM-retrofitted...

May 15 09:12

Worried About 'WannaCry'? You Should Have Listened To Julian Assange

The virus does not attack modern computer operating systems, it is designed to attack the Windows XP operating system that is so old, it was likely used in offices in the World Trade Center prior to September 11 2001, when the buildings collapsed. Windows XP was first released on 25 August, 2001.

Furthermore, early vulnerabilities in modern Windows systems were almost instantly patched up by Microsoft as per the fact that such operating systems are constantly updated.

The obsolete XP system is simply out of the loop.

A child born on the release date of Windows XP is now on the verge of his or her 17th birthday. Feeling old yet?

The fact of the matter is that governments and businesses around the world should not only feel old, they should feel humiliated and disgraced.

Webmaster's Commentary: 

Let's be fair. XP was a great OS by the time Microsoft pulled the plug. All the following Windows have been disappointing. I would have stayed with XP if I could have.

May 15 09:04

Bank of China ATMs Go Dark As Ransomware Attack Cripples China

One place which seemed to have emerged relatively unscathed from the global cyber-havoc (aside from the US, which is ironic as it is the U.S. NSA that was created the hacking software) has been China. Or so it seemed due to lack of media reports from the mainland. Now, courtesy of 95cn.org, and its twitter account, we have the first visual evidence that China too was materially impacted, to the point where not only local ATMs had been taken offline, but Chinese traffic police, immigration authorities and various public security bureaus and schools have suspended normal work until the malware threat is resolved.

May 15 09:02

This Is What Scares Israel’s Army Far More Than Missile Attacks

Responding to the massive global cyberattack that used stolen NSA spying tools and affected some 200,000 Windows servers in more than 200 organizations, including large medical networks, a senior Israeli Defense Force (IDF) official suggested that hacking is more dangerous than missile attacks.

May 15 09:02

‘Like letting Tomahawk missiles get stolen’: Microsoft slams NSA mishandling of exploits

Microsoft has criticized the NSA for their major role in spreading the WannaCry ransomware epidemic which paralyzed hundreds of thousands of computers worldwide. The tech giant urged governments to use and store their cyber warfare tools responsibly.

“We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world,” Microsoft President and Chief Legal Officer Brad Smith said in a blog post on Sunday. “This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem.”

May 15 08:55

Theresa May’s Conservatives threaten social media crackdown if elected

If Theresa May and the Conservative Party retain control of the government in the June 8 U.K. elections, they vow to beef up online protections for U.K. citizens, threatening fines against social media companies who fail to safeguard their users.

They want to introduce a new measure that could fine or punish internet firms which fail to adequately flag and take down content harmful to minors or “direct users unintentionally to hate speech, pornography or other sources of harm,” according to a press release.

“The internet has brought a wealth of opportunity but also significant new risks which have evolved faster than society’s response to them,” May said. “We want social media companies to do more to help redress the balance and will take action to make sure they do.”

Webmaster's Commentary: 

Prime Minister May, a word, please: do those "other sources of harm" (a phrase so ambiguous, one could pilot a frigate through it), include telling the truth about what the British government is actually doing, which don't even get a breath's worth of of coverage at the bbc, like the following headlines?!?

Does UK’s lucrative arms trade come at the cost of political repression?

Most Britons believe selling arms to Saudis is unacceptable

href="https://www.theguardian.com/world/2017/jan/28/100m-arms-deal-turkey-blind-eye-rights-abuse">UK’s £100m weapons deal with Turkey ‘turns blind eye to rights abuse’

href="http://www.strategic-culture.org/news/2017/02/24/british-foreign-policy-and-uk-weapons-trade.html">British Foreign Policy and UK Weapons Trade

Because when foreign policy objectives (which seem to include the UK's arming some of the most repressive governments in the world)align with economic opportunity for your very lucrative weapons industry, the outcome is generally civilian slaughter and genocide, as we are seeing with Yemen.

I would imagine that these stories are those you don't want your brother and sister Brits worrying their little heads about, and would scream that these stories constitute the "other harm" to which this legislation refers.

Prime Minister May, the UK gave the world the Magna Carta; you can do far better than this horrifically worded, loose, one size fits all, legislation, which intends to repress honest, fact-checked free speech.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA