COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Aug 03 10:01

Global surveillance industry database helps track big brother worldwide

Offering a groundbreaking glimpse of the global surveillance industry—the tools it employs, the extent of its reach, and the accountability it largely evades—human rights watchdog organization Privacy International on Tuesday released a searchable database and accompanying report that track Big Brother worldwide.

Aug 03 09:18

Almost half of US businesses hit by ransomware, says study

The threat of ransomware is becoming widespread among corporations, with almost half of U.S. businesses suffering an attack from the nasty form of malware recently, according to a new survey.

Security firm Malwarebytes sponsored the study, which found in June that 41 percent of U.S. businesses had at least encountered between one to five ransomware attacks in the previous 12 months.

Another 6 percent saw six or more attacks.

The study surveyed corporations in the U.S., Canada, U.K. and Germany to gauge how ransomware affected their operations.

Aug 03 09:16

GLOBAL SURVEILLANCE INDUSTRY DATABASE HELPS TRACK BIG BROTHER WORLDWIDE

"Without instruments capable of restricting transfers and shining a light on the companies and the trade, surveillance technologies developed in and traded from the West will further undermine privacy and facilitate other abuses," says report. (Photo: Alan Levine/flickr/cc) Offering a groundbreaking glimpse of the global surveillance industry—the tools it employs, the extent of its reach, and the accountability it largely evades—human rights watchdog organization Privacy International on Tuesday released a searchable database and accompanying report that track Big Brother worldwide.

Aug 03 08:32

Microsoft won't fix Windows flaw that lets hackers steal your username and password

The flaw is widely known, and it's said to be almost 20 years old. It was allegedly found in 1997 by Aaron Spangler and was most recently resurfaced by researchers in 2015 at Black Hat, an annual security and hacking conference in Las Vegas.

The flaw wasn't considered a major issue until Windows 8 began allowing users to sign into their Microsoft accounts -- which links their Xbox, Hotmail and Outlook, Office, and Skype accounts, among others.

Overnight, the attack got larger in scope, and now it allows an attacker to conduct a full takeover of a Microsoft account.

Webmaster's Commentary: 

20 years old? Is it a bug, or one of those ubiquitous NSA back doors?

Aug 03 07:35

BOMBSHELL: Khizr Khan linked to Hillary’s email server!

What’s perhaps interesting is that also on this website that he has now deleted, Khan revealed that he spent nearly a decade working for the mega-D.C. law firm Hogan & Hartson—now Hogan Lovells LLP—which connects him directly with the government of Saudi Arabia and the Clintons themselves. Saudi Arabia, which has retained the firm that Khan worked at for years, has donated between $10 million and $25 million to the Clinton Foundation. Hillary Clinton, despite the repeated urging of Trump, has refused to return the Clinton Cash money to the Saudis. What’s more, Hogan Lovells also did Hillary Clinton’s taxes—and helped acquire the patents for parts of the technology she used in crafting her illicit home-brew email server that the FBI director called “extremely careless” in handling classified information.

Aug 03 07:33

Bitcoin price plummets after exchange loses $65 million to hackers

The price of the virtual currency bitcoin fell sharply Tuesday after Hong Kong-based digital-currency exchange Bitfinex said it was hacked, resulting in the possible theft of $65 million worth of bitcoin.

Aug 03 07:23

FLASHBACK - AP Fact Check: Hillary Clinton Email Claims Collapse Under FBI Investigation

Key assertions by Hillary Clinton in defense of her email practices have collapsed under FBI scrutiny.

The agency's yearlong investigation found that she did not, as she claimed, turn over all her work-related messages for release. It found that her private email server did carry classified emails, also contrary to her past statements. And it made clear that Clinton used many devices to send and receive email despite her statements that she set up her email system so that she only needed to carry one.

Webmaster's Commentary: 

Despite this, Hillary over last weekend insisted she had not only been honest with Congress and the people about the email server! Even the staunchest Hillary supporters in the media pointed out that this was a lie. Hillary then tried to backtrack, saying that her recollection was that James Comey said she was truthful, then her campaign backtracked yet again saying that Hillary didn't really lie; it was just her honest opinion that she voiced!

We understand just fine!

Click for larger image to print and share.

Aug 02 19:09

Your battery status is being used to track you online

A little-known web standard that lets site owners tell how much battery life a mobile device has left has been found to enable tracking online, a year after privacy researchers warned that it had the potential to do just that.

Aug 02 15:16

America’s Electronic Voting Machines Are Scarily Easy Targets

By now states have had plenty of warning since a damning report by the Brennan Center for Justice about our voting machine vulnerabilities came out last September. Surely matters must have improved since then. -- Well, not exactly. In fact, not really at all...

Aug 02 14:23

FBI Agent Caught Spying For China Draws Comparisons to Hillary ( China gave millions in “speaking fees” to Clinton Foundation)

An FBI employee pled guilty in court for passing along sensitive information to the Communist Chinese government even as known Chinese agent Hillary Clinton is allowed to continue running for president.

Aug 02 12:27

Whistleblower’s Stunning Claim: “NSA Has All Of Hillary’s Deleted Emails, It May Be The Leak”

It would be truly ironic if instead of the Democrat hack originating at the Kremlin, as the media and Hillary have already concluded is the case without any actual proof, the true source of Hillary’s hacked and leaked emails is none other than an unknown crusader at the NSA itself, another “Snowden”, determined to see the downfall of Clinton after her actions exposed national security to unprecedented risk for years. Alas, we will never know: as we reported yesterday, it is the NSA that has been tasked with determining if Putin was responsible. We doubt it will find anything, however, we are certain that it won’t find itself to be the culprit.

Aug 02 11:36

What to do about lawless government hacking and the weakening of digital security

In our society, the rule of law sets limits on what government can and cannot do, no matter how important its goals. To give a simple example, even when chasing a fleeing murder suspect, the police have a duty not to endanger bystanders. The government should pay the same care to our safety in pursuing threats online, but right now we don’t have clear, enforceable rules for government activities like hacking and “digital sabotage.” And this is no abstract question—these actions increasingly endanger everyone’s security.

Aug 02 11:26

Windows 10 Anniversary Update: This design needs a dictator

Windows 10 doesn’t look very "Swiss" at all, though. In fact, its predecessors, Windows 8 and 8.1 and (especially) Windows Phone were much more "Swiss": spare, bold and confident. By contrast, Windows 10 looks a nervous Nellie. The wireframe glyphs which were chosen because they scale better across devices are much harder to identify correctly.

Webmaster's Commentary: 

Beware of geeks bearing glyphs!

Aug 02 09:36

HILLARY THE SPY? - UPDATED INFO!

Let us start with an historical fact. Treason and betrayal by the highest levels is a common feature of history, whether it is Judas vs Jesus, Brutus vs Julius Caesar, Benedict Arnold, the Rosenbergs, Jonathan Pollard, Aldrich Ames, Robert Hanssen. It is just a fact of life. It does happen.

Back in 1996, when Bill Clinton was running for re-election, he authorized the transfer of highly sensitive technology to China. This technology had military applications and allowed China to close the gap in missile performance with the United States. The transfers were opposed and severely criticized by the Defense Department.

Webmaster's Commentary: 

With WikiLeaks releasing over 20,000 Hillary emails clearly marked classified, it is time for a repost!

Optional Banner: 
WRH Exclusive
Aug 02 09:27

Court Rules Whole Site Blocking Justifiable in Piracy Fight

Forcing ISPs to block entire websites to tackle Internet piracy is justifiable, a court in India has ruled. The decision by the Delhi High Court means that copyright holders will not have to target specific URLs when attempting to stop infringement on sites that are involved in widespread piracy.

Aug 02 09:25

Madame President Clinton’s Coming War on the Blogosphere, and Your Countermeasures

Now that Hillary (“Hitlery”) Rodham Clinton (HRC) has received the Democratic Party nomination for president, there is a strong likelihood that she will win the election in November and then be enthroned as president in January of 2017. I predict that she willwaste no time in launching an onslaught of punitive new policies via executive orders, presidential memoranda, and policy directives promulgated through her cabinet and Federal agencies to eviscerate our Constitutional rights (most notably the 1st and 2nd Amendments). A key goal this campaign will be silencing dissent in the alternative press and the American blogosphere. Given HRC’s history in government “service”, her outlook on life, her socialist agenda, and her vindictiveness, I anticipate that any or all of the following measures will be undertaken by the HRC Administration:

Aug 02 08:45

POLICE TO ARREST PEOPLE BASED ON ‘SENTIMENT ANALYSIS’ OF THEIR TWEETS

Researchers at the University of Salamanca (USAL) have developed a ‘Sentiment Analysis’ (SA) algorithm that monitors Twitter and Facebook.

Psychologist, Paul Ekman has worked with the CIA, DOD and DHS for years, helping develop facial emotion detection, click here to read more.

Our government is also using ‘Emotive Analytics‘ (EA), to arrest and imprison innocent people!

Ekman has provided training to a whole series of people who were guards at Abu Ghraib prison, too, in how to extract information and truth without torture. “They used my [facial analysis] work, and it was very successful,” Ekman said.

It’s only a matter of time, before police use Emotive Analytics to arrest Americans.

What is SA?

SA trains algorithms to extract subjective emotions and feelings from texts. SA is based on the ‘Bayes theorem‘ and ‘Granger causality’.

Webmaster's Commentary: 

Absoflippinglutely unbelievable.

One more reason to never tweet, ever.

And remember, folks; "dangerous sentiments", in the current police state of Amerika is anything the government has defined in those ways.

Aug 02 08:30

Did Putin Out the Dems? Did American Spooks Out Trump?

If Washington wants to blame Putin for hacking and leaking the DNC emails through Guccifer 2.0 and Julian Assange’s WikiLeaks, American intelligence agencies should present their evidence to Congress or directly to the American people. Any conscientious journalist would demand that they do this, or at least highlight that his sources have offered no proof, though I would not hold my breath waiting for anything like that to happen.

The stakes here could hardly be higher. All governments lie, as journalist I.F. Stone taught us during the first Cold War, and the untruths, half-truths, and bullshit now get deeper by the day. This should come as no surprise. In my view, which does not appear to be widely shared, this is all part of the buildup to a new period of sustained confrontation between the United States and Russia, primarily in Eastern Europe and the Middle East.

Aug 02 08:28

FBI Opts to Investigate Source of DNC Leaks, Rather Than Rigged Primary

Trump spoke to the press about his alleged involvement with the email leaks. Though he denied any involvement, he also redirected attention back to the content of the documents and their implications, going on to say he hopes they find the rest of the emails missing from Clinton’s server. He was immediately labeled a traitor and a threat to national security by the Clinton campaign, as well as by all the media outlets in her pocket.

Yet Trump is not the one who was reckless with classified information, Hillary — that was you. He’s not the one who was exposed leading his party on a mission to squash anyone in the way — that was the woman you just hired as honorary chair.

Aug 02 07:52

Assange Did It: WikiLeaks Dispenses 23,000 Hillary Emails Marked “C” for Confidential (Classified)

WikiLeaks founder Julian Assange told us a month ago that the next batch of leaked Hillary Clinton emails could lead to an indictment.

Now, over 23,000 cables were just put out for the world to see.

Webmaster's Commentary: 

Which means FBI Director Comey lied when he said only 110 e-mails in 52 e-mail chains were classified!

Aug 02 06:55

A guide to online security for activists

The last year has seen an uptick in digital threats faced by individuals and organizations around the world, and those working on the question of Palestine are no exception.

Over the past few months, there have been attacks on boycott, divestment and sanctions (BDS) movement websites, threatening emails to activists and new information emerging on Israel’s surveillance capabilities.

Aug 01 20:35

Verizon Buys Yahoo For Under $5 Billion

Yahoo, which was once worth $125 billion, sold its core operating business for $4.8 billion in what Brian Solomon from Forbes described as, “the saddest $5 billion deal in tech history.”

Aug 01 16:40

‘Brazen, Extortionate’: Photographer Sues Getty Images For $1bn After Copyright Claim On Her Work

Photographer Carol M. Highsmith is suing Getty Images for $1 billion in damages for using her images after she was slapped with a lawsuit from a company which screamed infringement after she published one of her own photos on her website.

Aug 01 13:12

Flashback 2013 -"NSA shares raw intelligence including Americans' data with Israel"

(Note: We all know who DEFINITELY has a "safe copy" of all those Hillary Clinton e-mails . . and much more!!!. . . lol)

Aug 01 12:39

EXCLUSIVE – NSA Whistleblower: Agency Has All of Clinton’s Deleted Emails

The National Security Agency (NSA) has “all” of Hillary Clinton’s deleted emails and the FBI could gain access to them if they so desired, William Binney, a former highly placed NSA official, declared in a radio interview broadcast on Sunday.

Aug 01 10:36

'Webcam hackers caught me wanking, demanded $10k ransom'

One day in Melbourne, when the sun was out and the birds were singing, Matt opened an email and was greeted with a video of a man wanking.

The man was him.

"There I was in all my glory," he told triple j's Veronica & Lewis.

He had been hacked. A 'ransomware' program had infected his computer allowing the hackers to film him through the webcam. He had been filmed in a compromising situation.

Now they wanted money.

Aug 01 10:25

Windows 10 now on over 21% of all desktops, says NetMarketShare

Looking at it from the other side, 79% of people refused the free "upgrade".

Aug 01 09:54

Hackers can remotely bug almost ANY machine: Malware hijacks office equipment to create spying devices

Your computer, phone and even printer could be spying on you.

Experts have warned everyday machines such as these may be used to bug any kind of building remotely.

A new king of malware uses circuits found on most devices and radio frequency waves to turn them into listening devices, without the hackers even accessing the machines.

The malware, named 'Funtenna' by lead researcher Ang Cui from Red Balloon Security, would be hard to detect because no traffic logs would catch data leaving the premises.

Aug 01 09:40

US Election Shocker: Is This How The Vote Will Be Rigged?

By Jon Rappoport

Votes are being counted as fractions instead of as whole numbers.

As we know, there are a number of ways to rig an election. Bev Harris, at blackboxvoting.org, is exploring a specific “cheat sheet” that has vast implications for the Trump vs. Hillary contest.

It’s a vote-counting system called GEMS...

Aug 01 09:02

Is Twitter "Shadow-Banning" Donald Trump?

While Twitter is censoring Trump, it has repeatedly been accused of gaming its algorithms in support of Hillary. Back in February, users were irate after the social media giant appeared to censor the anti-Hillary hashtag #WhichHillary after it started trending.

The revelation that Twitter is shadow banning Trump comes on the heels of Google claiming that a ‘technical bug’ was to blame for Donald Trump not appearing when users searched for “presidential candidates”.

Aug 01 08:15

Whistleblower's Stunning Claim: "NSA Has All Of Hillary's Deleted Emails, It May Be The Leak"

Speaking on Aaron Klein's Sunday radio program, “Aaron Klein Investigative Radio,” broadcast on New York’s AM 970 The Answer and Philadelphia’s NewsTalk 990 AM, Binney raised the possibility that the hack of the Democratic National Committee’s server was done not by Russia but by a disgruntled U.S. intelligence worker concerned about Clinton’s compromise of national security secrets via her personal email use.

Aug 01 08:10

How to avoid ransomware attacks: 10 tips

As ransomware increasingly targets healthcare organizations, schools and government agencies, security experts offer advice to help IT leaders prepare and protect.

Webmaster's Commentary: 

And the same government that cannot find and arrest these cyber-criminals insists you take their word for it that Russia was behind the DNC hack.

Aug 01 07:55

Israeli Intelligence Debunks Notion of Russia Hacking DNC Emails

No evidence links Russia to hacking DNC emails. Accusations suggesting otherwise are baseless – the latest bashing episode, for geopolitical purposes, shifting attention from Hillary’s disturbing record, and electoral rigging of the primaries.

Israeli military intelligence/Mossad connected DEBKAfile said “an analysis by (its) intelligence and cyber defense sources has determined that” DNC emails hacking “almost certainly (was) not carried out by (Russia’s GRU) cyber warfare branch.”

Its determination is contrary to unjustifiable assertions by senior DNC officials, Obama, the Clinton campaign, administration-connected cyber espionage experts and mainstream media – pointing fingers the wrong way.

Putin spokesman Dmitry Peskov categorically denied Russian “direct or indirect interference in (America’s) election process,” adding:

Aug 01 07:34

America's Longest War Gets Longer

Anti-Russian hysteria in America reached its apogee this week as Democrats tried to divert attention from embarrassing revelations about how the Democratic Party apparatus had rigged the primaries against Bernie Sanders by claiming Vlad Putin and his KGB had hacked and exposed the Dem’s emails.

This was rich coming from the US that snoops into everyone’s emails and phones across the globe. Remember German chancellor Angela Merkel’s cell phone being bugged by the US National Security Agency?

Aug 01 07:04

Police 3D-printed a murder victim's finger to unlock his phone

Police in Michigan have a new tool for unlocking phones: 3D printing. According to a new report from Flash Forward creator Rose Eveleth, law enforcement officers approached a professor at Michigan State earlier this year to reproduce a murder victim’s fingerprint from a prerecorded scan. Once created, the 3D model would be used to create a false fingerprint, which could be used to unlock the phone.

Jul 31 19:43

Windows 10 pain: Reg man has 75 per cent upgrade failure rate

Support for older systems less than satisfactory

Jul 31 09:48

US Cyberwar on Russia?

On Saturday, Tass reported what looks like Washington’s dirty handiwork, perhaps complicit with NATO and Israel, saying:

Russia’s “Federal Security Service (FSB) revealed virus software for cyber-spying in computer networks of about 20 organizations located in Russia.”

The attack targeted “information resources of the state authorities, scientific and defense companies, enterprises of the defense industry and other objects of the country’s critically important infrastructures.”

“(C)learly, it was a targeted virus spread, planned and made professionally. Specialists say the malicious software, judging by the style of programming, names of files, parameters of their use and by methods, is similar to the software, which was used in much-spoken-about earlier revealed cyber-spying, revealed both in territory of the Russian Federation and around the globe.”

Jul 31 09:20

Assange won't implicate Russia in DNC email leak

"We don't give any material away as to who our sources are," he added. "It's a security matter for us as to who our sources are."

Instead, Assange focused on the content of the emails, which appeared to show senior DNC officials working to undermine the presidential campaign of Vermont Sen. Bernie Sanders in favor of Democratic rival Hillary Clinton and resulted in the resignation of DNC Chairwoman Debbie Wasserman Schultz.

Webmaster's Commentary: 

"So there was vote fraud. Everybody does it! You should stop thinking about what was in those emails or else you are a Russian stooge! If you are a loyal American, all you will think is 'Evil Russians!', 'Evil Russians!', 'Evil Russians!', 'Evil Russians!', 'Evil Russians!', 'Evil Russians!', 'Evil Russians!!!!!!'" -- Shrillary

Jul 31 08:38

Russia says spyware found in state computer networks

Russia's intelligence service said on Saturday that the computer networks of 20 organizations, including state agencies and defense companies, have been infected with spyware in what it described as a targeted and coordinated attack.

The Federal Security Service, the FSB, said the malware and the way the networks were infected were similar to those used in previous cases of cyber espionage found in Russia and other countries. The agency did not say who it suspected of being behind the attacks

Webmaster's Commentary: 

Stuxnet Part deux!?!?!

Jul 30 16:53

Pokémon Go Is a Govt. Surveillance Psyop

Intelligence agencies may see Google Maps and Street View as just a skeleton of the whole picture. Getting more data, particularly off the street and inside buildings, requires tons of man hours.

Enter Pokemon GO, where if you are an intel agency and you want photos of the inside of a home or business, you just spawn desirable Pokemon or related objects there. And let totally unaware and distracted citizens take the photos for you, with devices they paid for. And those citizens pay for the experience.

Jul 30 11:26

Clinton campaign breached by hackers

Hillary Clinton’s campaign network was breached by hackers targeting several large Democratic organizations, Reuters reports.

Clinton’s campaign spokesperson Nick Merrill confirmed the hack in a statement. “An analytics data program maintained by the DNC, and used by our campaign and a number of other entities, was accessed as part of the DNC hack. Our campaign computer system has been under review by outside security experts. To date, they have found no evidence that our internal systems have been compromised,” he said.

Webmaster's Commentary: 

When Hillary tried to point at Russia over the WikiLeaks data, there was nothing to support it.

Therefore, I think this latest hack was done solely for the purpose of planting clues to frame Russia.

Jul 30 10:52

MICROSOFT FACES 2 NEW LAWSUITS OVER WINDOWS 10 UPGRADES

Microsoft is facing two more lawsuits over the company’s questionable Windows 10 upgrade tactics. Both suits are seeking class-action status.

The first suit was filed in U.S. District Court in Florida. It alleges that Microsoft’s Windows 10 upgrade prompts “violated laws governing unsolicited electronic advertisements,” as reported by The Seattle Times. The suit also says Microsoft’s tactics are against the Federal Trade Commission’s rules on deceptive and unfair practices.

The second suit was filed in June in Haifa, Israel alleging that Microsoft installed Windows 10 on users’ computers without consent. Microsoft already paid out a $10,000 award in a previous U.S. suit over similar circumstances.

Webmaster's Commentary: 

GOOD!

Jul 30 08:41

Clinton Campaign Also Hacked In Attacks On Democrats: Sources

The computer network used by Democratic presidential nominee Hillary Clinton’s campaign was hacked as part of a broad cyber attack on Democratic political organizations, people familiar with the matter told Reuters.

The hack appears to have been carried out by Russian intelligence services, a federal law enforcement official told the New York Times.

The latest attack, which was disclosed to Reuters on Friday, follows reports of two other hacks on the Democratic National Committee, or DNC, and the party’s fundraising committee for candidates for the U.S. House of Representatives.

A Clinton campaign spokesman said in a statement late on Friday that an analytics data program maintained by the DNC and used by the campaign and a number of other entities “was accessed as part of the DNC hack.”

Webmaster's Commentary: 

Forgive me, but is this the best the DNC can do?!? Accusing Russia of these hacks?!?

Either you have incontrovertible evidence, or you don't; and it looks as though they have zero evidence, whatsoever, to link Russia to these hacks.

They just made it up out of thin air, period, end of discussion, do deflect accusations of lousy computer security (just like Hillary Clinton's non-secure, non-governmental servers)!!

Jul 30 08:01

FLASHBACK - Clinton Email Scandal: Latest Batch Exposes Two Big New Problems For Hillary

As the AP reports, "the emails ... show that the State Department technical staff disabled software on their systems intended to block phishing emails that could deliver dangerous viruses."

Jul 29 17:50

Clinton campaign denies reports that its computer system was hacked

The Clinton presidential campaign said Friday that an “analytics data program” maintained by the Democratic National Committee had been hacked but that its computer system had not been compromised, denying news reports Friday that the campaign had become the third Democratic Party organization whose systems had been penetrated.

So far, campaign computer experts “have found no evidence that our internal systems have been compromised,” campaign spokesman Nick Merrill said in a statement.

Jul 29 15:48

Illinois Governor Signs Bill Requiring Warrant For “Stingray” Surveillance

By Derrick Broze

Illinois has become the latest state to pass legislation designed to limit the use of cell phone surveillance tools by requiring law enforcement to obtain a warrant before using the devices.

On Friday July 22, Illinois Governor Bruce Rauner signed legislation which creates new limits on how law enforcement can use surveillance devices known as cell site simulators, or “stingrays.” According to the Tenth Amendment Center, the new law will prohibit the use of stingrays except to locate or track the location of a communications device or to identify a communications device...

Jul 29 12:56

British Spies Used a URL Shortener to Honeypot Arab Spring Dissidents

A shadowy unit of the British intelligence agency GCHQ tried to influence online activists during the 2009 Iranian presidential election protests and the 2011 democratic uprisings largely known as the Arab Spring, as new evidence gathered from documents leaked by Edward Snowden shows. The GCHQ’s special unit, known as the Joint Threat Research Intelligence Group or JTRIG, was first revealed in 2014, when leaked top secret documents showed it tried to infiltrate and manipulate—using “dirty trick” tactics such as honeypots—online communities including those of Anonymous hacktivists, among others.

Jul 29 08:40

What Makes People Choose Hedonistic Foods Over Healthful Ones?

By Karen Foster

When hunger strikes, we often eat with our eyes and it creates a fine line between eating those foods which we consider pleasurable or healthy. This then often forms the the connection between the mind and the mouth dictating our health and weight. A series of five studies suggests that when one sees a self-indulgent food on a touch screen, the hedonistic centers of our brain are facilitated...

Jul 29 08:38

iTunes users targeted with £20 purchase refund scam - how to protect yourself

Apple's iTunes customers are being warned to delete "scam" emails that are being sent to some customers claiming they have been charged more than £20 to download a song.

Reports have surfaced on social media of iTunes users receiving an email claiming to be from Apple, detailing an alleged recent song purchase from the iTunes Store that costs £23.34.

However, the aim appears to be to encourage them to click a link within the email to 'cancel and manage subscriptions', but in fact leads to a fraudulent website that asks users to enter their personal details.

Apple customers have also reported receiving emails claiming to be from iTunes that include a bill for Netflix.

Jul 29 06:50

No, We Don’t Know Yet That Russia is Behind DNC Email Hacks. Here’s Why.

There is a strong narrative underway. It was propelled largely by Clinton’s campaign manager, Robby Mook, and members of the Democratic National Committee after news broke over the weekend that thousands of embarassing internal emails were posted to WikiLeaks. The theory goes that the Russian government is behind the hack because they want to meddle in U.S. politics to help Donald Trump (who is “cozy” with Vladimir Putin).

Different media organizations continue to cite “government sources” as confirmation of Russia’s evil intentions. (Russia has denied any involvement). And, if you actually examine the facts, you will see that we simply don’t have enough yet to prove this theory out. Yes, there are some indicators that it could be Russia. Yes, there is reportedly metadata hidden in early documents that show they were edited with Russian language settings. Yes, Crowd Strike, a cyber firm hired by the DNC, claims that they found two hacker groups associated

Jul 29 06:07

Amazon's Alexa can lock your front door if you own this smart lock

What could possibly go wrong?

Jul 29 06:01

Security experts have cloned all seven TSA master keys

The TSA, for their part, doesn’t care, telling The Intercept that “The reported ability to create keys for TSA-approved suitcase locks from a digital image does not create a threat to aviation security. These consumer products are ‘peace of mind’ devices, not part of TSA’s aviation security regime.”

In other words, you might as well not use locks at all.

Jul 29 05:58

Google search connects Trump's book to Hitler's 'Mein Kampf'

Google’s search function has been thrust into the spotlight again for connecting Donald Trump and Adolf Hitler. On Wednesday, typing the name of Trump’s 2015 book “Crippled America” into a Google image search, in addition to bringing up images of that book, displayed images of Adolf Hitler’s 1920s manifesto “Mein Kampf.” (The "Mein Kampf" images have since been removed.)

Google has been in the spotlight before for a connection between Trump and the infamous Nazi leader. In June, Googling the phrase “When was Hitler born” also produced an image of Donald Trump and listed his birthday. In that case, Google said it removed the Trump image, and a recent search confirms that the candidate’s image is no longer connected with Hitler’s birthday.

Jul 28 16:05

National Weather Service Accused Of Spying On Its Unionized Employees

It looks like the National Weather Service is observing more than just clouds and wind. Its employees have filed charges against management alleging the federal agency is conducting illegal surveillance of private discussions on the union’s Facebook page.

Jul 28 15:02

Dear Russia: Can You Find Hillary’s 30,000 Missing E-Mails? (Trump taunts humorless Hill)

‘Russia, if you’re listening, I hope you’re able to find the 30,000 emails that are missing,’ Trump said. ‘I think you’ll be rewarded mightily by our press!’

Jul 28 13:40

10K GOOGLE WI-FI KIOSKS ARE COLLECTING MILLIONS OF FACES AND MAC ADDRESSES

image credit: Cryptome According to a NYC. gov page, CityBridge was chosen in 2014 to offer free private Wi-Fi to NYC residents. CityBridge is a consortium of companies that includes Intersection, Qualcomm, and CIVIQ Smartscapes – to develop and operate the LinkNYC network. (the above pic. shows one of two surveillance cameras) These kiosks, called ‘Links,’ will provide the public with a fast, private Wi-Fi network providing free domestic calling, two USB charging ports, a tablet for accessing the internet, and a red 911 button to contact emergency services. New York city plans on installing nearly10,000 spying kiosks.

Jul 28 13:30

BEX ALERT - How Donald Trump Made the U.S. a Target For Russia’s New Brand Of Warfare

Webmaster's Commentary: 

Recall just WHO created STUXNET!

Jul 28 11:46

GESTAPO IN THE USA: FCC INTIMIDATES PRESS AND KILLS FREE SPEECH AT 5G ROLLOUT

In a public meeting at FCC headquarters on July 14, the agency which once served the people instead acted like tyrannical thugs, in an escalating series of remarkable events.

First, they prevented wireless science advocates from displaying a simple sign, violating their First Amendment rights in a public venue. Then, a security guard forcefully prevented a t-shirt from being taken out of a bag, by a former Congressional candidate with opposing views.

Next, a Bloomberg reporter had his credentials confiscated — almost unbelievably — for merely talking with the former Congressional candidate.

WHY IS THE FCC RESORTING TO GESTAPO-LIKE TACTICS OF SUPPRESSION AND OUTRIGHT INTIMIDATION?

Webmaster's Commentary: 

It's always "profits uber alles" for this country's government, at this state.

Jul 28 10:24

Banking trojan being distributed via 'legitimate' PayPal accounts

Hackers are using PayPal to distribute the Chtonic banking trojan, a variant of Zeus, according to security company Proofpoint.

The emails are ‘legitimate' but low in volume, and are not filtered by anti-spam or antivirus software because they come via genuine PayPal accounts.

"The sender does not appear to be faked. Instead the spam is generated by registering with PayPal (or using stolen accounts) and then using the portal to request money," said Proofpoint in a security advisory.

Jul 28 10:22

PetNet smart pet feeders break, leaving pets without food

The Petnet Smartfeeder, a $149 internet-connected pet food machine, has suffered server issues causing pets to go hungry as scheduled meals have failed to dispense and manual feeding from the corresponding iOS app didn't work for some users.

As tweeted by a Petnet customer, the company issued an email to users stating: “we are experiencing some difficulties with one of our third party servers.” The servers, rented by Petnet from Google, were down for about 10 hours.

As a result, the company told users: “you may experience a loss of scheduled feeds and failed remote feedings".

In a knock to confidence for early adopters of the emergent ‘Internet of Things’, the startup advised owners of Smartfeeder devices: “please ensure that your pets have been fed manually until we have resolved this issue".

Jul 28 09:35

Amazon Delivery Drones Are Just The First Step To A Highway In The Sky

By Andy Miah, University of Salford

Amazon recently announced plans to test a drone delivery system in parts of the UK that are hard to access with conventional delivery methods. While much attention has focused on the service it would provide to Amazon customers, the really interesting story is what this agreement with the British government tries to achieve on a much broader level.

If successful, it will essentially create a high-altitude floating highway between 200 and 400 feet above the ground, within which a whole range of activities could be performed...

Jul 28 07:43

DNC TITANIC

When Hillary Clinton sent classified emails from her unsecure, personal server, lied and got caught they said... Everybody does it.

When thousands of emails and documents suddenly disappeared from the IRS on hard drives conveniently eaten by the dog they said... Nothing to see... Move along.

When the CIA Director got his email hacked by a teenager who smokes pot every day they said... Dude, he smokes pot?

When the Russians (maybe) hacked the DNC showing the party to be a bunch of frat boy jerks more interested in scoring with chicks, bad mouthing Bernie Sanders and collecting cash from stupid donors they said...

ALERT! NATIONAL SECURITY BREACH! AH WOO GAA! GET THE NSA! GET THE FBI! GET THE MARINES!

Webmaster's Commentary: 

Jul 28 07:27

Siberian candidate?

Who would have thought Russia and Vladimir Putin would play such an important role in the American presidential election? The media treadmill claims Trump is under Putin’s spell. And Hillary Clinton is blaming the Russian president for yet another scandal. Russia is a one-size-fits-all political tool.

Webmaster's Commentary: 

Again, I want to remind everyone that the same government and unnamed "security experts" blamed the Sony Pictures hack on then-top villain North Korea, only to have it later come out it was an internal leak by a disgruntled employee, are the same government and unnamed "security experts" blaming Russia for the DNC leak.

Jul 28 01:26

Trump's Loophole Regarding Russia's Assistance Hacking Criminal Email

Treaty between the Government of the United States of America and the Russian Federation on Mutual Legal Assistance in Criminal Matters, signed at Moscow on June 17, 1999, and a related exchange of notes.
Date Received from President

Jul 27 14:58

Facebook Fails to Show Up for Seventh Tax Summons From IRS

Facebook Inc. officials failed to show up after getting seven summonses from the Internal Revenue Service demanding internal corporate records on one of its offshore tax strategies, according to an IRS court filing.

Webmaster's Commentary: 

"That's okay. I'll get a pardon from President Hillary for blocking all those DNC email links." -- Zookerburg

Jul 27 14:18

Assange Promises To Leak ‘A Lot More’ Materials On US Presidential Elections

WikiLeaks possesses “a lot more” documents to surprise American voters ahead of the upcoming presidential elections – and will not hesitate to make them public.

Jul 27 13:20

Federal Judge Rules Hidden Microphones in Public Do Not Violate Constitution

By Derrick Broze

A federal judge has ruled that law enforcement may continue to place recording devices in public place because it does not violate the constitutional guarantee against warrantless searches and privacy protections.

On Friday July 22, U.S. District Judge Phyllis Hamilton issued a 17-page ruling which found the practice of placing recording devices on the steps of courthouses in Oakland and Martinez, California to be “unsettling,” but not in violation of the Fourth Amendment. The four defendants in the federal criminal fraud case are accused of rigging real estate bids throughout Alameda and Contra Costa Counties...

Jul 27 11:45

Bad news for Bob the Builder: Watch Hadrian X the robo-builder create an entire house in just two days

It can lay 1,000 bricks an hour and work around the clock, 24 hours a day

A robotic 'hand' lays the brick, and applies adhesive instead of mortar, which improves the thermal efficiency

It 3D scans its surroundings to work out exactly where to place bricks - and is simply parked next to site

Webmaster's Commentary: 

Not sure I would care to live in that house, but still, pretty cool!

Jul 27 10:57

Wikileaks Assange Denies Russian Hacker Help / DNC official IT Tech shot in back and not robbed

Webmaster's Commentary: 

Reward for information on the killers is now $50,000.

Maybe Seth was the one who leaked the DNC emails to WikiLeaks?

Jul 27 10:57

KeySniffer: Hackers can snag wireless keyboard keystrokes from 250 feet away

From hundreds of feet away, attackers can see everything that is being typed as well as type directly on a PC due to flawed wireless keyboards from at least eight vendors.

Jul 27 10:37

If Russian Intelligence Did Hack the DNC, the NSA Would Know, Snowden Says

Glenn Greenwald told WNYC on Monday, while there may never be conclusive evidence that the Democratic National Committee was hacked by Russian intelligence operatives to extract the trove of embarrassing emails published by WikiLeaks, it would hardly be shocking if that was what happened.

“Governments do spy on each other and do try to influence events in other countries,” Glenn noted. “Certainly the U.S. government has a very long and successful history of doing exactly that.”

Even so, he added, given the ease with which we were misled into war in Iraq by false claims about weapons of mass destruction — and the long history of Russophobia in American politics — it is vital to cast a skeptical eye over whatever evidence is presented to support the claim, made by Hillary Clinton’s aide Robby Mook, that this is all part of a Russian plot to sabotage the Democrats and help Donald Trump win the election.

Webmaster's Commentary: 

Putin has absolutely no love of Clinton, due to her warmongering and lying; however, I seriously doubt that he would ever sign off on something so ham-fisted that it could be pointed back at Russian cyber-warfare.

Jul 27 10:12

Obama puts FBI in charge of responding to cyber attacks

A presidential directive signed by President Obama Tuesday will put the FBI in charge of responding to all cyber threats and give the federal government a more active role in investigating, preventing and mitigating attempts to hack into U.S.-based computer networks.

Obama's homeland security adviser, Lisa Monaco, said the change was necessary because it's not always clear whether those responsible for a hacking incident are other countries, terrorists or criminals.

Webmaster's Commentary: 

Given his debacle with the Clinton server issue, James Comey will NOT make this investigation fact-based in any way shape or form; it will be bent to the political will of the current administration, and to augment Hillary's chances to assume the presidency next year.

And if Russia is to be bashed and accused of something its operatives absolutely didn't do, so be it.

Never mind that the relationship between Russia and the US is on a hair-point trigger right now, with US sanctions against it still in place, again, for something it didn't do (allegedly "annexing" Crimea after the US-sponsored putsch in Ukraine).

The issues of Ukraine, Syria, and the positioning of NATO troops and weapons with which to encircle Russia, and potentially attack it, are issues where the American government needs to back away from in its hubristic, bellicose posturing, like an insolent teenager, and sit down to the negotiating table like an adult in the room with Russia, and resolve these issues in good-faith negotiations.

Of course, unfortunately, that will only happen when pigs fly; in the 20th and 21st century, the US government has always needed its "Emmanuel Goldstein" against which US citizens can unload their generally misdirected vitriol, when it is their own government which has been screwing things up both domestically, and internationally.

From the time of the cold war until now, that convenient public enemy has been Russia.

I think Trump is intelligent enough to understand that at this point in the 21st century, such enmity is pretty useless, on the cusp of a multi-polar world.

Jul 27 08:51

Julian Assange: 'A lot more material' coming on US elections

Wikileaks founder Julian Assange said Tuesday his whistleblowing website might release "a lot more material" relevant to the US electoral campaign.

Assange was speaking in a CNN interview following the release of nearly 20,000 emails stolen from the Democratic National Committee by suspected Russian hackers.

Webmaster's Commentary: 

CNN is behind the times. Even Hillary's campaign chief admits there is no actual evidence that Russia had anything to do with the hack/leak. And Assange himself, while not identifying the source, has stated it is not Russia.

Jul 27 08:38

‘Mothers Of The Movement’: DNC Guests Spark Trending Twitter War Over Black Lives Matter

Black Lives Matter gained prominent attention at the Democratic National Convention when seven mothers of infamously slain victims, including Trayvon Martin and Michael Brown, took the stage. Known as the “Mothers of the Movement,” they became a Twitter trend, but not necessarily thanks to supporters.

Jul 27 07:58

Gestapo In The USA: FCC Intimidates Press and Kills Free Speech at 5G Rollout

By Josh del Sol

In a public meeting at FCC headquarters on July 14, the agency which once served the people instead acted like tyrannical thugs, in an escalating series of remarkable events...

Jul 27 07:36

NSA Whistleblower: Not So Fast On Claims Russia Behind Hillary Clinton Email Hack

Washington’s Blog asked the highest-level NSA whistleblower in history, William Binney – the NSA executive who created the agency’s mass surveillance program for digital information, who served as the senior technical director within the agency, who managed six thousand NSA employees, the 36-year NSA veteran widely regarded as a “legend” within the agency and the NSA’s best-ever analyst and code-breaker, who mapped out the Soviet command-and-control structure before anyone else knew how, and so predicted Soviet invasions before they happened (“in the 1970s, he decrypted the Soviet Union’s command system, which provided the US and its allies with real-time surveillance of all Soviet troop movements and Russian atomic weapons”) – what he thinks of such claims:

Jul 27 07:17

Facebook admits to blocking Wikileaks links in DNC email hack

Facebook admitted Sunday that it had blocked links to the Wikileaks trove of emails hacked from the Democratic National Committee.

In a Twitter post late Saturday, WikiLeaks accused the social media giant of “censorship” and gave its followers an online workaround, saying “try using https://archive.is.”

The WikiLeaks allegation followed a firestorm of controversy that erupted earlier this year when former Facebook workers admitted routinely suppressing conservative news.

Jul 27 07:08

Pokemon GO-ZILLA: Safety fears after monsters appear in Fukushima danger zone

Japan's Tokyo Electric Power Co is upset that Pokemon Go players on the hunt for monsters are being lured into the Fukushima Nuclear Exclusion Zone.

The fictional creatures were apparently spotted close to the destroyed Daiichi nuclear reactors by Tepco officials. The presence of the collectible cyber-animals could tempt addicts into no-go areas, it is feared.

As a result, power company bosses have demanded that the land around the crippled power plants, where radiation levels remain relatively high, be removed from the hit mobile game.

Jul 27 07:06

Did the Russians really hack the DNC or is this another Sony Pictures moment? You decide

Establishing proof of a hacker's identity is notoriously difficult – indeed impossible in some cases. People can connect through systems all over the world and use tools and tricks to hide their origins and motivations. Using a Russian VPN service shouldn't necessarily mean an operation was carried out in or for Russia.

There are worrying similarities between this case and the supposed hacking of Sony by the North Koreans. Many in the security industry feel that there's little proof that Best Korea staged that hack, other than the US government saying so and, as we've seen in the case of missing weapons of mass destruction in Iraq, those sorts of claims are not bulletproof evidence.

Meanwhile, Guccifer 2.0 claims he is a lone hacker with no Russian government ties; ThreatConnect thinks that's a classic denial and deception tactic to throw people off the scent.

Jul 27 06:42

Judicial Watch Goes to Court On Clinton Testimony

JW sought Hillary Clinton’s testimony a few weeks ago after my attorney colleagues deposed seven former Clinton top aides and current State Department officials, including top Clinton aides Cheryl Mills and Huma Abedin. Judicial Watch’s legal team also took the testimony of IT official Brian Pagliano, who asserted his Fifth Amendment right not to testify during the Judicial Watch deposition.

Judge Sullivan ordered Monday’s hearing after requiring the State Department’s and Hillary Clinton’s lawyers to respond to our request for permission to depose Clinton; the Director of Office of Correspondence and Records of the Executive Secretariat (“S/ES-CRM”) Clarence Finney; and the former Director of Information Resource Management of the Executive Secretariat (“S/ES-IRM”) John Bentel.

In the oral arguments before Judge Sullivan, Judicial Watch attorney Michael Bekesha repeatedly put the issue in perspective:

Jul 27 05:44

Trump Not Included in Google Search for 'Presidential Candidates'

Google is up to their old tricks.

If you search "presidential candidates," all that shows up is Hillary Clinton, Bernie Sanders who is no longer in the race and Green Party candidate Jill Stein.

Donald Trump, according to Google, is not a presidential candidate.

Jul 26 15:32

FLASHBACK - The Real Email Question: Did Hillary Clinton Sell US Secrets?

While the media is focusing your attention on the shiny object that is her email server, the real story is not being told. The circumstantial evidence indicates that Hillary Clinton, or members of her inner circle with her connivance, purloined highly classified US intelligence and either sold it, traded it, or used it for personal gain. This is not a conspiracy theory and it is not hyperbole. Stick with me for a moment.

Jul 26 15:32

You will use Cortana, Microsoft says

Surprise, surprise. If things remain as they are, Windows 10 users who upgrade to the Anniversary Update won't be able to turn off Cortana anymore using the Cortana settings.

If you compare the start menu settings of Cortana of the current version of Windows (version 1511) with those of the Anniversary Update (version 1607) you will notice that Cortana's off switch is no longer available.

...

If you cannot or won't use the Group Policy option to disable Cortana, you may use the Registry instead to do so.

1 - Tap on the Windows-key, type regedit.exe and hit enter.
2 - Confirm the UAC prompt that is displayed.
3 - Go to the key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Windows Search
4 - If AllowCortana exists already, jump to step 7.
5 - Right-click on Windows Search and select New > Dword (32-bit) Value.
6 - Name it AllowCortana.
7 - Double-click on AllowCortana and set its value to 0 to disable the feature.

Jul 26 15:18

3D Printed and Homemade “Ghost Guns” Must Now Be Registered in California

By Everett Numbers

California law will no longer look the other way on homemade guns, or “ghost guns,” as gun control advocates call them. Building a gun from parts or a 3D printer will soon require a background check. It will also require that a state-provided serial number be permanently affixed to the weapon...

Jul 26 11:33

FCC PUTS U.S. CELL PHONE ROUTING SYSTEM IN HANDS OF EUROPEAN FIRM DESPITE SECURITY WARNINGS

The Federal Communications Commission has decided to make a European-owned company the clearinghouse for routing billions of cellphone calls and text messages across the United States, despite claims by critics that the plan poses national security risks, officials said Thursday.

The FCC’s approval, which has not been publicly announced, will give a New Jersey subsidiary of Ericsson, the Swedish technology giant, the obscure but critical job of operating a sprawling national system to track and route wireless calls and texts among hundreds of service providers.

The routing system began in the 1990s as a way for people to keep their cellphone numbers when they switched carriers, but intelligence and law enforcement agencies have come to rely on it to track and trace phone numbers in investigations.

Webmaster's Commentary: 

As reported yesterday at breitbart.com:

Just one day after the global premiere of Clinton Cash, Hans Westberg, the embattled CEO and president of telecoms company Ericsson, stepped down as the head of the Swedish wireless equipment maker. Though the telecom giant’s announcement to remove Westberg is not confirmed as a direct result of the film’s online popularity, the company’s timing is an odd coincidence. The New York Times best-selling book Clinton Cash, authored by Government Accountability Institute President and Breitbart Senior Editor-at-Large Peter Schweizer, highlighted that Ericsson — on Westberg’s watch — had come under heavy fire for selling telecom equipment to countries that were considered state sponsors of terrorism by Hillary’s State Department. The company had received a letter in late 2010 from the Securities and Exchange Commission, warning it about the sells to oppressive governments. U.S. diplomatic cables noted that State Department officials had “regularly and increasingly” raised Ericsson’s transgressions with the Swedish foreign minister.

Also, as reported at the Washingtontimes.com in June of this year:

As the money flowed to the foundation from Sweden, Mrs. Clinton’s team in Washington declined to blacklist any Swedish firms despite warnings from career officials at the U.S. Embassy in Stockholm that Sweden was growing its economic ties with Iran and potentially undercutting Western efforts to end Tehran’s rogue nuclear program, diplomatic cables show. Separately, U.S. intelligence was reporting that Sweden’s second-largest employer, telecommunications giant Ericsson AB, was pitching cellphone tracking technology to Iran that could be used by the country’s security services, officials told The Times. By the time Mrs. Clinton left office in 2013, the Clinton Foundation had collected millions of dollars inside Sweden for his global charitable efforts and Mr. Clinton personally pocketed a record $750,000 speech fee from Ericsson, one of the firms at the center of the sanctions debate.

Apparently, ultimately Ericsson's "financial association" with the Clinton Foundation hit pay dirt with this contract, big-time.

Jul 26 10:59

Julian Assange: ‘No Proof Whatsoever’ Russians Are Behind DNC Hack

During an interview with NBC’s Richard Engel, Julian Assange said that “there is no proof whatsoever” that Russian intelligence sources are responsible for hacking thousands of Democratic National Committee emails. The emails were posted by WikiLeaks over the weekend. The FBI is investigating the hack. Three cybersecurity experts told the DNC that the emails were hacked by Russian intelligence.

‘There is no proof of that whatsoever. We have not disclosed our source, and of course, this is a diversion that’s being pushed by the Hillary Clinton campaign. That’s a meta-story. The real story is what these emails contain and they show collusion. The very top of the Democratic party, Debbie Wasserman Schultz, is now being forced to resign,”Assange said during the interview.

Jul 26 09:13

Democrats Accuse Russia Of Hacking DNC Server To Help Donald Trump

In the aftermath of the fallout from the DNC server hack, the Democrats have been scrambling how to redirect public anger (especially among Bernie Sanders supporters) from the revelations that not only did the Democratic party try everything in its power to sabotage Bernie Sanders presidential bid, but also colluded with various "impartial" media outlets as well as breach fundraising rules in the process.

And, as of this morning, it appears that the solution they have decided upon is not to explain or even justify the scandalous actions, but to simply blame Russia for the hack.

Webmaster's Commentary: 

Jul 26 08:57

Marissa Mayer Made A Lot Of Money Losing The Fight To Save Yahoo

If Marissa Mayer ends up leaving Yahoo when Verizon’s deal to buy the ailing web giant closes, she could walk away having made $219 million during her four-year tenure as chief executive.

Jul 26 08:39

Ransomware 2.0 is around the corner and it's a massive threat to the enterprise

Ransomware is a top concern because it's become an area of intense focus for cybercriminals due to its effectiveness at generating revenue. Once a cybercriminal hacks into a company's files and encrypts them, victims have little option but to pay the asking price for the code to decrypt their files. Ransomware is becoming more ominous as new versions are continually being developed.

Webmaster's Commentary: 

And the same government that insist they know Russia hacked the DNC servers can't find these bozos!

Jul 26 08:28

Russia Foreign Minister Responds To Allegation It Is Behind DNC Hack: "I Don't Want To Use Four-Letter Words"

Secretary of State John Kerry says he raised the email hack of the Democratic National Committee with Russia's top diplomat but stopped short of making any allegation about who might be responsible.

According to CBS, Kerry told reporters Tuesday he brought the matter up with Russian Foreign Minister Sergey Lavrov at a meeting in Laos and explained that the FBI was investigating. He did not, however, repeat allegations or echo suspicions that Russia was responsible for the hack and said he would not draw conclusions until the probe is complete. "I raised the question and we will continue to work to see precisely what those facts are," Kerry said. He would not say if Lavrov responded

Earlier, Russia's Foreign Minister Sergey Lavrov responded to accusations that Russia was allegedly behind the DNC server hack, when he blasted a reporter over her question that Russia was behind the DNC email leaks. Lavrov had a concise reply, stating: "I don't want to use four-letter words."

Webmaster's Commentary: 

And a reminder that when Sony Pictures was hacked, FBI Director James Comey claimed to know that the hack originated in North Korea. It later turned out it was an internal leak.

Remember this pile of bovine excrement when Comey tries to claim the leaked DNC emails are an eeeeeeeevil Russian plot!!!!

Jul 26 07:56

FLASHBACK - FBI director offers new evidence to back claim North Korea hacked Sony

FBI Director James B. Comey said Wednesday that the recent cyberattack against Sony Pictures was traced back to Internet addresses “exclusively used” by North Korea, as he offered new evidence intended to rebut skeptics of the bureau’s claims.

Webmaster's Commentary: 

Ultimately, it turned out North Korea had nothing to do with the Sony Pictures hack; it was an internal leak by a disgruntled employee.

So we should take the current claims that Russia is behind the DNC emails with the usual tiny grain of salt.

Jul 26 07:42

Snowden Explains How To Get To The Bottom Of "Who Hacked The Democrats"

With the scandals plaguing the Democratic National Convention - set to start in just over an hour - get stronger, so does the narrative that it was all Russia's fault the Democratic party was hacked.

Webmaster's Commentary: 

Jul 26 07:39

Hillary Graphics FEEL FREE TO COPY AND USE

Webmaster's Commentary: 

Since I posted this yesterday I have received emails from readers confirming that Facebook, LinkedIn, etc. are erasing/blocking posts of these images. So I have put them all in a gallery which you are free to copy from and use as you see fit.

We can get past this Iron (Silicon) curtain if everyone emails these around and suggests they be forwarded.

Optional Banner: 
WRH Exclusive
Jul 25 17:25

Cell 411 Is An Activist’s Best Friend

By Derrick Broze

As more activists begin to look beyond the political arena for solutions, technology is playing a greater role in organizing and building community networks...

Jul 25 12:35

Pokémon Go Is Using Your Children For Walking Ad Revenue: Petition

By Kevin Samson

The augmented reality resurrection of 1990s’ anime sensation Pokémon continues to set download records even as disturbing consequences of gameplay are exposed.

There is of course the standard tracking that any use of a smartphone will carry with it; but even by those egregious parameters, Pokémon Go takes an extra step toward fully integrating the user (and all of their contacts) into a literal matrix of mapping and surveillance...

Jul 25 11:50

Your luggage HACKED: Group creates 3D printable master key for major line of TSA-approved luggage locks 

Three hackers have developed and released a 3D printable master key used by Transportation Security Administration, which opens Safe Skies luggage locks.

During a talk given on Saturday, the three hackers known as DarkSim905, a lock enthusiast, Nite 0wl and Johnny Xmas, showed the 3D-printable model of the Safe Skies master key.

In addition to the key, they also discussed methods of collecting intelligence, which led to the compromise of Travel Sentry master keys in 2015 and vulnerabilities in the Safe Skies lock design, according to CSO Online.

Travel Sentry and Safe Skies are TSA recommended travel locks for luggage. They became popular in 2003 to prevent theft.

Jul 25 11:42

Hillary's Campaign Manager Calls DNC Leaks a Putin Plot to Help Trump

Hillary Clinton’s campaign has decided to double down on their bid to cast Trump as a secret agent of the Kremlin propped up by Russian President Vladimir Putin despite the obvious absurdity of the narrative.

Webmaster's Commentary: 

You mean Putin wasn't behind the leaks?!? Dang. I just sent him a bottle of champagne! :)

Jul 25 11:19

The Missing Man at the Center of Hillary Clinton’s Email Scandal

Of all the characters in the political drama of Hillary Clinton’s private email server, none has been more mysterious—and potentially more important—than a 40-year-old technology specialist named Bryan Pagliano.

Pagliano didn’t just set up the now infamous “homebrew” server in the basement of Clinton’s New York home, which she used for official business while serving as secretary of state. Pagliano has been the former secretary’s go-to IT guy for the past several years. He’s also the only person in the entire investigation of Clinton’s email who got an immunity deal, protecting him from possible criminal prosecution. That was Pagliano’s demand for telling FBI investigators about Clinton’s unorthodox system—a system that he apparently knows more about than anyone else.

Webmaster's Commentary: 

Jul 25 09:50

BREAKING: FBI Just Confirmed Something Huge About DNC

So is the FBI going to investigate Donald Trump and Putin for the hack!
They wont prosecute Hillary for putting classified material on an unsecured server but the FBI is investigating the hack. This will be very interesting. Can you say HYPOCRISY!

Jul 25 08:52

WHETHER OR NOT RUSSIANS HACKED DNC MEANS NOTHING CONCERNING HOW NEWSWORTHY THE DETAILS ARE

As you almost certainly know by now, on Friday Wikileaks released a bunch of hacked DNC emails just before the Democratic Presidential convention kicked off. While Wikileaks hasn't quite said where it got the emails, speculation among many quickly pointed to Russian state sponsored hackers. That's because of the revelation last month of two sets of hackers breaching the DNC's computer system and swiping (at the very least) opposition research on Donald Trump. Various cybersecurity research firms, stating with CrowdStrike, who was hired by the DNC to investigate, pointed the fingerat the Russians.

Jul 25 07:58

Tale of Two Press Conferences

Jul 25 07:37

Could YOUR identity be stolen? Experts warn of permanent damage if biometric scanners are hacked

From unlocking your smartphone, to scanning your fingerprint at the airport, your physical attributes - or 'biometrics' - are regularly used to verify your identity.

But experts warn that using your unique features to confirm your identity could leave you susceptible to being hacked.

And unlike a password, which you can easily change, your biometrics cannot be altered.

Jul 25 07:20

Nintendo shares plummet after investors realize it doesn't actually make Pokémon Go

Nintendo shares have skyrocketed since Pokémon Go's release and instant transformation into global cultural phenomenon, but they fell dramatically today after investors realized that Nintendo doesn't actually make the game. Nintendo put out a statement after the close of trading on Friday pointing out that the bottom-line impact will be "limited" as it only owns 32 percent of The Pokémon Company, and that revenue from the game and its Pokémon Go Plus smartwatch peripheral have been accounted for in the company's current forecasts.

Pokémon Go is a collaboration between The Pokémon Company and Niantic Labs, the developer who previously created the similar AR game Ingress as part of Google.

Jul 24 18:14

Declassified Document: The U.S. Army has Weaponized a Pokemon Episode

While the Pokemon Go craze continues to spread across the world, a number of troublesome stories about the app and its GPS features are coming to light. While drivers crash into the back of police cars and teenagers mindlessly cross busy highways – whilst searching for their favorite virtual 90s creatures – others are delving into the darker mysteries surrounding the app and Pokemon franchise as a whole.

Jul 24 11:08

MoveOn.org DELETES petition to put Hillary Clinton on trial!

Webmaster's Commentary: 

I smell fear coming from the Hillary camp!

Jul 24 10:37

“Careless” is Not the Word For What Clinton Did

But even if we accept that the standard is what Comey says it is, Clinton is still guilty. Because there was nothing “careless” about the way she set up her email system. In fact, she went out of her way to cautiously and deliberately thwart State Department rules regarding the use of email. She relied on multiple private servers, warned agency IT staff to look the other way, and failed to abide by regulations requiring her to turn her emails over at the end of her term. None of this happened by accident.

Webmaster's Commentary: 

Jul 24 08:44

Leaked Bernie Sanders emails a headache for Hillary as convention gets set to kick off

A CACHE OF leaked emails from Democratic party leaders’ accounts includes at least two messages suggesting an insider effort to hobble Bernie Sanders’ upstart campaign, a revelation that threatens an uneasy truce within the party.

The release of more than 19,000 emails sent and received by seven top Democratic National Committee officials, by anti-secrecy website WikiLeaks, comes at a time when the party is anxious to project an image of unity.

Jul 24 08:17

The Hillary email scandal keeps getting uglier: 3 key aides got messages clearly marked ‘Top Secret’

Emails marked “top secret” were sent from Hillary Clinton’s private server to the email addresses of three of her top aides.

The emails were not put under a higher level of classification after the fact, according to Comey’s report.

n/a
Jul 23 09:36

European Supreme Court says “Maybe” to mass surveillance of innocents

The European Court of Justice (ECJ) says that mass surveillance of innocent people may be legal in a preliminary ruling issued today. The ECJ is the highest court in the European Union, and it issues preliminary rulings by a General Advocate about six months ahead of its final ruling. Today’s preliminary ruling allows for mass surveillance on a state-by-state basis, but only when five conditions are met.

Jul 23 09:26

WikiLeaks fights The Man by, er, publishing ordinary people's personal information

WikiLeaks prides itself on taking on The Man by finding and publishing information that the world's most powerful organizations want to keep hidden.

Unfortunately, on Friday, WikiLeaks took a swing at The Man by standing on the heads of thousands of innocent citizens whose personal details it has published, including their names, home addresses, phone numbers, and even credit card, social security and passport numbers.

Just to make it even easier for identity thieves, the veritable goldmine of personal information is provided online in plain text and is even searchable.

Jul 23 07:52

Turkish Protesters Are Spray Painting “8.8.8.8” and “8.8.4.4.” On Walls — Here’s What It Means

As hard as the Turkish government might try, shutting down Twitter isn’t as easy as it seems. At 11:30 p.m. Thursday the Turkish government officially blocked the country’s 33 million Internet users from Twitter, but clever, tech-savvy Turks are sharing a simple and effective method to help fellow citizens bypass the ban — and they’re sharing it everywhere.

Jul 23 07:00

CHAFFETZ: HAMMERS DOWN ON HILLARY CLINTON SECURITY CLEARANCE BREACHES

Jul 22 11:40

‘Big Milestone’: Facebook Test-Flies Solar-Powered, Internet-Beaming Drone

Launching its internet-beaming drone into the sky for the very first time, Facebook has reached new heights. Named Aquila, it may soon deliver internet access to billions of people in the world’s remotest corners.

Jul 22 11:38

Snowden Designs Phone Case To Show When Data Being Monitored

American surveillance whistleblower Edward Snowden says smartphones are tracking devices, and he has helped design a mobile phone case that will show when a smartphone is transmitting information that could be monitored.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA