COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Mar 24 19:45

MY LAST EVER VIDEO?

Mar 24 16:23

Google boycott over extremist content could spell the end for automated ad placements

The feud sparked by Google's failure to remove extremist content from its site Youtube could lead to the end of automated ad placement, experts have warned.

Household names including Marks and Spencer and McDonald's have pulled advertising from Google’s YouTube as part of a growing international boycott.

Now analysts have predicted that brands could turn against large internet firms that use automated ad placement based on artificial intelligence.

Mar 24 15:28

Whistleblower Reveals UK Police Hacking Emails Of Journalists, Activists

By Derrick Broze

The U.K. Metropolitan police are accused of collaborating with Indian police and hackers to illegally access the emails of hundreds of activists and journalists.

A secret unit of the Metropolitan police has been partnering with hackers to monitor the emails of hundreds of political activists and journalists, according to a whistleblower familiar with the unit. The individual claims that the secret unit worked with Indian police and hackers to steal the passwords for the emails of activists, reporters, and photographers...

Mar 24 14:15

Why do Beijing and Moscow embrace cyber sovereignty? Globalism stops here

China has called on Russia and other BRICS nations to commit themselves to the concept of cyber sovereignty, which would allow governments to control their national cyber space in a manner that only they deem appropriate. The idea for an agreement on national cyber sovereignty was proposed by Beijing following its first ever white paper spelling out the view that governments are entitled to the right to control and regulate the Internet on their national territory. Additionally, Beijing made no bones about plans to enhance its cyber warfare capacity as a counter-measure to the exponential growth of threats coming from cyber space. "Cyber attacks, cyber espionage, and surveillance have become major issues confronting all countries," said Long Zhou, coordinator for the Foreign Ministry’s cyber affairs division. The concept of cyber sovereignty, however, is not new.

Mar 24 13:57

The Narrative Has Been Set For The Collapse And The Next Event

70% of the people disprove of Comey. Nunes says the FBI not involved in the investigation. Evidence is now growing against Obama, Clapper, Brennan and Rogers. Wikileaks releases nightskies 1.2, which shows the CIA has control of Macs and Iphones.

Mar 24 11:00

CIA’s NightSkies tool can hack, remotely control iPhones without user knowing

WikiLeaks has revealed the CIA’s alleged ability to infiltrate and control iPhones through a tool called NightSkies, which is physically installed onto factory fresh iPhones and allows the CIA to monitor and download files from targets’ phones undetected.

The revelation is part of WikiLeaks’ latest Vault 7 release named ‘Dark Matter.’

NightSkies works in the background and grants “full remote command and control,” to the CIA, allowing it to upload and download files from iPhones, including details from the owner’s phonebook, text messages and call logs, and to execute actions on the phones as it wishes.

Webmaster's Commentary: 

I am going back to a pre-NSA phone!

Mar 24 10:36

General Tom McInerney

Brief mp3 interview with the General is historic.

The FISA warrants were just “a cover” - Obamas’ AG Loretta Lynch already had an archive of surveillance data on Candidate Donald Trump. and much more !

Mar 24 10:11

DoubleAgent Attack Turns Your Antivirus Into Malware And Hijacks Your PC

Cybellum security researchers have uncovered a new attack mechanism that can be used to take control of your antivirus and turn it into a malware. Called DoubleAgent, this attack exploits an old and undocumented vulnerability in Windows operating system. This Zero Day code injection technique affects all major antivirus vendors and has the power to hijack permissions.

Mar 24 09:01

Beware! Major flaws in millions of Google Nest security cameras means burglars can switch them off remotely

Installing CCTV is just one way to protect your home.

But the feeling of safety afforded by one such system could be an illusion - according to a security researcher.

Two flaws have been discovered with the Nest range of security cameras which could allow burglars to switch off the device's with ease before entering your home.

And despite reporting the issues to Google - Nest's parent company - last year, nothing appears to have been done.

Mar 24 08:53

Row over US ISP customer data sales

US politicians have voted to remove rules that demanded ISPs got permission from customers before selling their browsing histories.

The US Senate voted by a narrow majority to repeal the rules that were first approved in October 2016.

Politicians who called for the rules to be dropped said they were "harmful".

The decision was called a "crushing loss" for privacy by digital rights group the Electronic Frontier Foundation (EFF).

Mar 24 08:27

FBI has uncovered 'evidence of treason' among alt-right websites, says George W Bush's ethics lawyer

The man who served as former president George W Bush's most senior ethics lawyer has suggested that the FBI is "uncovering evidence of treason" by far right US news websites over their links with Russia.

Richard Painter tweeted a link to an article suggesting that the Bureau was looking into news outlets like Breitbart News, InfoWars and the Kremlin-backed RT News and Sputnik News, to see whether they worked with Russian-backed operatives to disseminate stories favouring Donald Trump during the presidential election. at times when his campaign appeared to be struggling.

Sources told US publisher, McClatchy that online "bots" had created created millions of social media posts linking to articles on the sites, some of which were completely false, while other contained a mixture of fact and fiction.

Webmaster's Commentary: 

This strikes me as desperation on the cusp of madness.

I have linked to all the resources indicated above, when I have been able to vet that the information came from multiple sources, and believed, to the best of my knowledge, that the information presented was factually based.

But when it becomes, "alleged treason" to tell the truth, the best you can, on a blog, you know your government has gone full tilt-boogie Orwell on you.

And that George Bush even had an "ethics layer", in his lying about the reasons reasons the US government had to war in Afghanistan and Iraq, is hysterically hypocritical, and worth a great laugh, but Richard Painter CANNOT expect to be taken seriously by any thinking American on these charges, after the dark, and brutal, legacy of Bush's presidency.

So now, this now thoroughly embarrassed, morally bankrupt, and completely irrelevant man is desperately attempting to forward the US Deep State Narrative of Russia being the "bad guy" in the geopolitical arena, and a country the US government and military needs to wagewar against.

I have to wonder just how much of Painter's stock portfolio is invested in companies which comprise the US Military/Industrial Complex, to make these accusations.

Mar 24 08:10

Security Alert: Windows 10 Has Been Quietly Logging EVERY KEYSTROKE You Type And Sending It To Microsoft (This Is How To Stop It)

Yesterday we reported that an international group of hackers claim they have breached Apple’s iCloud user database and stolen 300 million usernames and passwords. The group has threatened to initiate a widespread factory reset on April 7th, 2017, potentially wiping out data on tens of millions of iPhones and iCloud accounts should Apple fail to pay a ransom.

But that breach by nefarious hackers, while serious, is nothing compared to what your trusted operating system provider may be doing on your personal computer.

According to a recent report, if you are a Windows 10 user then every single keystroke you have ever typed on your computer may have been logged and sent to Microsoft.

Mar 23 16:23

Google Maps & Local Utilities Team Up To Fight Methane Leaks

Google Maps is about to chart out more than just streets and roads. They’re going to locate methane leaks in cities. A collaboration between scientists, advocacy groups and Google found that equipping the cars with methane sensors helped locate natural gas leaks.

Mar 23 10:57

BEX ALERT - U.S. Prepping Case Linking North Korea To $81MM New York Fed Bank Heist

As tensions between the U.S and North Korea continue to escalate, with the most recent provocation coming from Kim Jong Un last night, the Wall Street Journal has just reported that Federal prosecutors are building potential cases that would accuse North Korea of directing the theft of $81 million from Bangladesh’s account at the Federal Reserve Bank of New York last year.

Webmaster's Commentary: 

North Korea is way behind the times with regard to the internet. As of 2014 they only had one block of IP addresses, or 1024 IP addresses for the whole country!

Not exactly a hotbed of hacker activity, and let us not forget the CIA's "UMBRAGE" program, which is set up to frame third parties for hacker attacks.

Mar 23 10:54

Whistleblower Tapes: Trump Wiretapped “A Zillion Times” By ‘The Hammer,’ Brennan’s and Clapper’s Secret Computer System

President Obama’s Director of National Intelligence (DNI) James Clapper and his Central Intelligence Agency (CIA) director John Brennan oversaw a secret supercomputer system known as “THE HAMMER,” according to former NSA/CIA contractor-turned whistleblower Dennis Montgomery.

Clapper and Brennan were using the supercomputer system to conduct illegal and unconstitutional government data harvesting and wiretapping. THE HAMMER was installed on federal property in Fort Washington, Maryland at a complex which some speculate is a secret CIA and NSA operation operating at a US Naval facility.

Mar 23 10:35

The NSA & Your Data: If You Have Nothing to Hide, You Have Nothing to Fear

Welcome to the Domestic Surveillance Directorate

...

Our value is founded on a unique and deep understanding of risks, vulnerabilities, mitigations, and threats. Domestic Surveillance plays a vital role in our national security by using advanced data mining systems to "connect the dots" to identify suspicious patterns.

Mar 23 09:49

How Germany's foreign intelligence agency recruits young hackers

Amid concerns of high-profile cyberattacks and disinformation campaigns ahead of key parliamentary elections in September, Germany's Federal Intelligence Agency (BND) has made a concerted effort to recruit young hackers.

The BND's mission includes obtaining intelligence as mandated by the federal government on key areas pertaining to foreign information, and it effectively aims to protect Germany and its interests. One of the tasks is to recognize and assess potentially-damaging espionage activities and prevent or minimize the fallout.

Webmaster's Commentary: 

Or to rig the election for Merkel, whose poll numbers are falling.

Mar 23 09:39

Super Snowden Whistleblower Releases 600,000,000 Pages Of Illegal NSA Spying

Mar 23 09:12

WIKILEAKS RELEASES "NIGHTSKIES 1.2": PROOF CIA BUGS "FACTORY FRESH" IPHONES

The latest leaks from WikiLeaks' Vault 7 is titled “Dark Matter” and claims that the CIA has been bugging “factory fresh” iPhones since at least 2008 through suppliers. The full documents are expected to be released after a 10 a.m. EDT “press briefing” that WikiLeaks promoted on its Twitter.

Webmaster's Commentary: 

So, all by its lonesome, the CIA has decided to eviscerate the 4th Amendment to the Constitution; and the Judicial, Executive and Legislative portions of our government are collectively impotent to stop them?!?

Folks, here's the deal for me.

I am a Christian Witness/Pacifist Activist who never advocates violence as a response to anything this government doe, but exhorts her government to resolve its geopolitical disputes with negotiations rather than through war; I am a published composer of religious music, and a choral conductor at my local Methodist church.

So will someone please explain to me, in a way that seems reasonable, as a completely non-violent, loving, and logical human being, why I should be targeted for surveillance?!? Is the short answer, "Just because they CAN??"

And the really hysterical/ironic part of all this, is that the actual baddies have already encrypted cell and other communications to the point where they are "bullet-proof" to all of the US's "alphabet soup" intelligence agencies.

Mar 23 08:44

Israel’s propagandists shoot themselves in the foot as they shoot off their mouths

If you have ever visited a blog or on-line discussion group on the Middle East you have doubtless had the misfortune to run into them.

They are known by the language they use: depraved sexual insults, bile, bigotry, threats, disinformation and character assassination. That’s right: I’m talking about “hasbarats,” Zionist trolls who infect the Internet with hasbara, pro-Israel propaganda. Of course, mainstream media hasbarats have been around for decades, as have “hasbaratchiks,” fifth-columns in foreign governments who subvert national policies to serve Israel. The Internet, though, is the latest, some might say the greatest, propaganda playground, and Israel cannot cope with factual, passionate, well-documented stories that expose its war crimes and unrepentant criminality.

Mar 23 08:32

Wikileaks Releases "NightSkies 1.2": Proof CIA Bugs "Factory Fresh" iPhones

The latest leaks from WikiLeaks' Vault 7 is titled “Dark Matter” and claims that the CIA has been bugging “factory fresh” iPhones since at least 2008 through suppliers.

Webmaster's Commentary: 

SELL YOUR APPLE STOCK NOW!!!!!!!

Mar 23 08:28

BOMBSHELL: CIA Whistleblower Leaked Proof Trump Under "Systematic Illegal" Surveillance Over Two Years Ago: FBI Sat On It

The same day House Intelligence Committee chairman Devin Nunes gave a press conference disclosing that President Trump had been under "incidental surveillance," Attorney and FreedomWatch Chairman, Larry Klayman, sent a letter to the House Committee on Intelligence imploring them to pursue the claims and evidence presented under oath at a Washington DC FBI Field Office by his client - CIA / NSA Whistleblower Dennis Montgomery - who Klayman claims "holds the keys to disproving the false claims... ...that there is no evidence that the president and his men were wiretapped"

When Montgomery attempted to deliver this information through the appropriate channels two years ago, the former CIA and NSA contractor wasn't given the time of day:

Mar 23 08:23

Hackers Breach Apple, Threaten To Wipe Out 300 Million iPhones In April

Hackers have breached over 300 million Apple account ID’s and passwords and are threatening to wipe out the data on all of the iPhones connected to the accounts unless Apple pay them a ransom.

Mar 23 07:17

Vault 7: Projects - Dark Matter

Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.

Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

Mar 22 20:35

Malware 'disguised as Siemens firmware drills into 10 industrial plants'

Malware posing as legitimate firmware for Siemens control gear has apparently infected industrial equipment worldwide over the past four years.

The cyber-nasty is packaged as software to be installed on Siemens programmable logic controllers (PLC), we're told. At least 10 industrial plants – seven in the US – were found running the infected firmware, a study by industrial cybersecurity firm Dragos claims.

According to the Texas-based biz, this particular malware was specifically thrown at industrial control equipment. Exactly what it does, or did, is not explained, although it is described as "crimeware".

Mar 22 20:34

Unbuntu splats TITSUP bug spread in update

Ubuntu has since rolled back that fix, so sysadmins can now re-patch lib6 and associated libraries to get their DNS fixed.

Mar 22 16:57

Don’t Hide Your Gold Coins Where Your Thermostat Can See

Back in the 1990s when businesses started going online they frequently didn’t realize that their new networking gear came with simple default passwords like “admin”. So a whole generation of early hackers simply scanned the web for companies that had inadvertently exposed themselves in this way, siphoning off (probably, no one really knows) billions of dollars and causing various other kinds of mischief.

Mar 22 15:45

Google Affiliate Offers Tools To Safeguard Elections

An organization affiliated with Google is offering tools that news organizations and election-related sites can use to protect themselves from hacking.

Jigsaw, a research arm of Google parent company Alphabet Inc., says that free and fair elections depend on access to information. . To ensure such access, Jigsaw says, sites for news, human rights and election monitoring need to be protected from cyberattacks.

Mar 22 14:29

Devin Nunes CONFIRMS Surveillance Of Trump Transition Press Conference 3/22/17

Mar 22 14:04

Facebook Expands Roll-Out of Fact-Checker in ‘Fake News’ Crackdown

Facebook has expanded the roll-out of its fact-checker tool to combat ‘fake news’ as more users report the appearance of the ‘disputed’ message alert. The pop-up lets users know when a story’s accuracy is questionable before they share it.

Mar 22 13:44

Youtuber affirms F.B.I. collusion with Dems at intelligence hearing

Ranking Member of the House Permanent Select Committee on Intelligence Rep. Adam Schiff (D-CA) and F.B.I. Director James Comey colluded during the intelligence hearing on Capitol Hill Monday, according to an online report.

Mar 22 13:22

Massive Breach Threatens To Wipe Out 300 Million iPhones On April 7th Unless Apple Pays Ransom

It looks like the CIA isn’t the only organization capable of taking over your phone.

Hackers claiming to have compromised at least 300 million Apple account ID’s and passwords say they will initiate a complete wipe of iPhones and iClouds if the Cupertino, California based technology company doesn’t pay them a ransom.

The group, which goes by the name Turkish Crime Family, says Apple has until April 7th to come up with either $75,000 in BitCoin or $100,000 in iTunes gift cards.

According to Motherboard, the group posted a Youtube video proving they have compromised the credentials of millions of iCloud accounts, which could then be used to wipe an iPhone remotely and potentially locked users out of critical phone features.

Mar 22 12:31

The Multibillion-Dollar U.S. Spy Agency You Haven’t Heard of

On a heavily protected military base some 15 miles south of Washington, D.C., sits the massive headquarters of a spy agency few know exists. Even Barack Obama, five months into his presidency, seemed not to have recognized its name. While shaking hands at a Five Guys hamburger restaurant in Washington in May 2009, he asked a customer seated at a table about his job. “What do you [do]?” the president inquired. “I work at NGA, National Geospatial-Intelligence Agency,” the man answered. Obama appeared dumbfounded. “So, explain to me exactly what this National Geospatial…” he said, unable to finish the name. Eight years after that videotape aired, the NGA remains by far the most shadowy member of the Big Five spy agencies, which include the CIA and the National Security Agency.

Mar 22 12:20

GOP lawmaker: Trump communications may have been 'monitored'

One more time. It was the NSA with their net that catches everything that was the source of the leaks. Right before he left office Obama signed an E.O. that has the NSA pass what they Hoover up, to 16 other Federal Agencies.
There is where the leaks are coming from and it is on paper legal under Obama's E.O. If Trump hasn't canceled that E.O. He had better do so pronto!

WASHINGTON (AP) — The chairman of the House intelligence committee said Wednesday that the communications of Trump transition officials — possibly including President Donald Trump himself — may have been "monitored" after the election as part of an "incidental collection."

Mar 22 12:08

FBI Investigating Google & Facebook For ‘Rigging Elections’ For Democrats

The FBI’s Counterintelligence Division is leading an investigation into the Google and Facebook cyber operation that rigged the 2008 and 2012 elections for Barack Obama, and attempted to rig the 2016 election in Hillary Clinton’s favor.

Mar 22 12:06

5 congressional staffers in criminal probe over unauthorized computer access

Five people employed by members of the House of Representatives remain under criminal investigation for unauthorized access to Congressional computers. Former DNC chair Debbie Wasserman Schultz employed at least one of those under investigation.

The criminal investigation into the five, which includes three brothers and a wife of one of the men, started late last year, as reported by Politico in February. The group is being investigated by US Capitol Police over allegations that they removed equipment from over 20 members’ offices, as well as having run a procurement scheme to buy equipment and then overcharge the House.

Mar 22 11:05

A simple command allows the CIA to commandeer 318 models of Cisco switches

Cisco Systems said that more than 300 models of switches it sells contain a critical vulnerability that allows the CIA to use a simple command to remotely execute malicious code that takes full control of the devices. There currently is no fix.

WikiLeaks publishes docs from what it says is trove of CIA hacking tools
Cisco researchers said they discovered the vulnerability as they analyzed a cache of documents that are believed to have been stolen from the CIA and published by WikiLeaks two weeks ago. The flaw, found in at least 318 switches, allows remote attackers to execute code that runs with elevated privileges, Cisco warned in an advisory published Friday. The bug resides in the Cisco Cluster Management Protocol (CMP), which uses the telnet protocol to deliver signals and commands on internal networks. It stems from a failure to restrict telnet options to local communications and the incorrect processing of malformed CMP-only telnet options.

Webmaster's Commentary: 

YIKES!! And there is no "fix" for this?!?

Mar 22 10:36

California: Making ‘Misleading Political Statements’ Online Is Now Illegal

Lawmakers in California are proposing a harsh new law that will make it illegal for anybody to operate a website that makes controversial political statements to the public.

Mar 22 10:23

DOJ Found Malware in Trump Tower Servers ‘Mimicking’ Contacts to Russian Entities

Washington Free Beacon senior writer Adam Kredo on Tuesday discussed the Department of Justice finding malware on servers for Trump Tower mimicking supposed Russian ties.

Kredo was talking with One America News Network's Liz Wheeler about the FBI investigating the Trump campaign for collusion with Russian ties.

Kredo first said that the investigation should go on, before discussing a rarely mentioned point.

"It wasn't very well reported, the Department of Justice revealed just last week that in fact some of these ties that they had witnessed between Trump Tower servers and Russian entities in fact, were stooged," Kredo said.

Kredo went on to explain that malware may have been installed on these servers to mimick contacts with Russian entities in an effort to portray that the Trump campaign had the Russian contacts.

Mar 22 08:50

Microsoft forcing Windows 7 and 8.1 users to install Windows 10

Technology giant Microsoft is blocking Windows 7 and 8.1 updates on Intel's seventh generation Core i3, i5 and i7 AMD's seventh generation processor (Bristol Ridge) and Qualcomm's 8996 processors.

While trying to scan and download updates through Windows Update, error messages appear saying, "Windows could not search for new updates" and "code 80240037 Windows Update encountered an unknown error."

As explained in Microsoft Knowledge based article the errors occur as the new processor generations require the latest Windows version. For those on Windows 7 and 8.1, Microsoft recommends updating the devices to Windows 10.

Webmaster's Commentary: 

So we are back to the "You vill use ze vindows ve TELL you to use, schwein!"

Mar 22 08:47

Cyber Firm at Center of Russian Hacking Charges Misread Data

An influential British think tank and Ukraine’s military are disputing a report that the U.S. cybersecurity firm CrowdStrike has used to buttress its claims of Russian hacking in the presidential election.

The CrowdStrike report, released in December, asserted that Russians hacked into a Ukrainian artillery app, resulting in heavy losses of howitzers in Ukraine’s war with Russian-backed separatists.

But the International Institute for Strategic Studies (IISS) told VOA that CrowdStrike erroneously used IISS data as proof of the intrusion. IISS disavowed any connection to the CrowdStrike report. Ukraine’s Ministry of Defense also has claimed combat losses and hacking never happened.

The challenges to CrowdStrike’s credibility are significant because the firm was the first to link last year’s hacks of Democratic Party computers to Russian actors, and because CrowdStrike co-founder Dimiti Alperovitch has trumpeted its Ukraine report as more evidence of Russian election tampering.

Mar 22 08:33

Windows 10 is recording EVERYTHING you type, but here's how you can stop it

WINDOWS 10 has a secret keylogger that tracks what you type - and it is enabled as soon as the software is downloaded and installed.

...

Ever since Windows 10 was first launched in 2015, the software automatically enables a secret keyboard logger.

Microsoft says the feature tracks "your typing and handwriting info to improve typing and writing services".

...

To disable the feature you first need to click Start, and then select Settings.

You then have to choose Privacy and then select General.

To turn the feature off you then have to turn off "Send Microsoft info about how I write to help us improve typing and writing in the future".

Mar 22 08:31

Anti virus software could be HACKING your computer, and this is why

Windows PC users have been warned that their anti virus software may not be quite as secure as previously thought.

Researchers have discovered that anti-virus apps and services can be hijacked and turned into malware using a particularly nasty attack.

The attack, which affects some of the world’s leading anti-virus software services, can affect any computers running Windows 10, as well as past generations of Microsoft’s software.

The attack, named DoubleAgent, was discovered by researchers at security firm Cybellum, which says it exploits a 15-year old vulnerability in Windows.

Mar 22 08:16

Google's stock rating downgraded as YouTube ad boycott contagion goes global

Google has responded to a contagious YouTube advertising boycott which yesterday prompted a downgrade on Wall Street.

Pivotal Research Group downgraded Alphabet shares from "Buy" to "Hold" based on its response to the boycott, which now includes more than 200 big brands, as well as public sector ad spending. Marks & Spencer and Hargreaves Lansdown became the latest to hit pause yesterday.

The boycott follows a series of reports in The Times demonstrating that Google was running advertisements promoting big brands against jihadi and racist videos on YouTube, the world's second most popular website after Google's search page.

Mar 22 08:14

Fix crap Internet of Things security, booms Internet daddy Cerf

Vint Cerf, one of the fathers of the internet, has weighed in on Internet of Things security, warning that a Mirai botnet-style incident could happen again unless vendors start taking responsibility for their goods.

“The biggest worry I have is that people building [IoT] devices will grab a piece of open source software or operating system and just jam it into the device and send it out into the wild without giving adequate thought and effort to securing the system and providing convenient user access to those devices,” Cerf told the Association for Computing Machinery (ACM) organisation at its 50th Turing Award celebrations.

Mar 22 08:13

World's worst botnet fiends switch from ransomware to stock scam spam

Cybercriminals behind the Necurs botnet have reactivated the zombie network and returned to their original business of using compromised machines as conduits for spam distribution.

In January, Cisco Talos reported that the Necurs botnet had gone offline, taking the typical volume of Locky ransomware-tainted spam emails with it.

Security researchers have once again detected an uptick of spam email from the Necurs botnet over recent days. Rather than distributing malware in the form of malicious attachments, it has shifted back to sending high volumes of penny stock pump-and-dump messages.

Mar 22 08:11

Linux-using mates gone AWOL? Netflix just added Linux support

If your Linux-using mates suddenly disappear for a day or two, we can explain why: Netflix has just revealed it's fully and formally available on the OS.

As the streamer points out, Chrome's worked for in-browser playback since 2014. But not officially.

As of Tuesday, however, “users of Firefox can also enjoy Netflix on Linux.”

Mar 22 08:09

Plusnet slapped with £880k fine for billing ex customers

Broadband provider Plusnet has been slapped with a £880,000 fine from Ofcom for continuing to bill former customers.

More than 1,000 ex-customers were overcharged £500,000 by BT-owned Plusnet, after it continued to bill for landline and broadband services that had been cancelled.

The penalty is the result of an investigation opened last May and was caused by an error in Plusnet’s billing system meaning cancelled lines were still recognised as "live".

Mar 22 08:04

A peek into North Korea's Internet

For most North Koreans, it's nonexistent. There are only 1,024 known IP addresses in the entire country. The Internet is typically reserved for government officials, a few foreign ambassadors and outside assistance groups, according to a North Korean defector-turned-journalist.

By comparison, the United States has 1.5 billion IP addresses.

It's important to note that it's not one IP address per device, so there could be thousands of devices hooked up to the Internet in North Korea. Still, it has one of the smallest Internet presences in the world.

Mar 22 07:46

NSA Official Suggests North Korea Was Culprit in Bangladesh Bank Heist

A senior National Security Agency official appeared to confirm that North Korean computer hackers were behind a multi-million dollar heist targeting Bangladesh’s central bank last year.

Computer hackers attempted to steal $951 million, but only got away with $81 million, some of which was later recovered. After the theft, security firms quickly pointed the finger at North Korea. Other experts disputed that finding. But on Tuesday, NSA Deputy Director Rick Ledgett appeared to say North Korea was the culprit during a cryptic exchange at a Washington forum.

Webmaster's Commentary: 

So, "North Korean Hacker" has joined "Russian Hacker" on the list of boogeymen we are supposed to automatically be afraid of!

Mar 22 07:39

Microsoft Outlook, Skype, OneDrive hit by another authentication issue

Two weeks ago, a widespread authentication issue prevented a number of Microsoft users from accessing their cloud services. It looks like it's happening again

Mar 22 07:38

Fix Is In: Comey Praised DNC-Hired Cybersecurity Firm Even After Botched Report

Crowdstrike, the cybersecurity company working for the Democratic National Committee (DNC), released a report tying “Russian hacking” to an incident that never happened, yet ?even after the report had been debunked, FBI Director James Comey still referred to Crowdstrike as a “highly respected private company” at a Senate hearing.

Executives from Crowdstrike and Director Comey are both scheduled to testify in front of the House Intelligence Committee set for Monday morning at 10 am.

Mar 21 16:45

Arrest Of Twitter User Could Have Serious Implications For The World Of Internet Trolling

John Rivello was arrested Friday months after he allegedly sent a tweet that caused journalist Kurt Eichenwald to suffer a seizure.

This arrest appears to be the first of its kind and presents serious implications for the world of internet trolling, which seeks to annoy fellow users.

Mar 21 09:46

Google ‘Directly Engaged’ In Clinton Campaign, Says Julian Assange

Specifically, Assange claimed, “The chairman of Google, Eric Schmidt, set up a company to run the digital component of Hillary Clinton’s campaign.”

Eric Schmidt did in fact create a company in the last quarter of 2015 called The Groundwork whose website is empty except for a single placeholder logo. Breitbart has previously reported on The Groundwork and how it was reportedly developed to install Clinton in the Oval Office. However, whether or not Google itself is a part of Schmidts’ involvement in The Groundwork remains unclear to the public.

Mar 21 09:13

Report: Law Enforcement Leaks Database To Journalist Containing Trump Wiretap Info

According to investigative journalist Jerome Corsi reporting for Infowars, law enforcement sources out of Arizona have provided a database containing the “individual records of U.S. citizens under National Security Agency (NSA) electronic surveillance in the years 2004 through 2010,” thus proving once and for all that Donald J. Trump was, in fact, under surveillance during Barack Obama’s tenure as President.

But if that’s not enough to burst your bubble, what you are about to read next will, because the absolute bombshell report doesn’t stop there. As it turns out Infowars founder and popular radio talk show host Alex Jones was also under surveillance in Texas.

Jones said on the Sunday show that they had even listed an address in which he “secretly” does broadcasts from.

Mar 21 08:22

To The Governor: New Mexico Passes Electronic Communications Privacy Act

By Michael Maharrey

Last week, the New Mexico House gave final approval for a bill known as the Electronic Communication Privacy Act. If signed by the governor, the bill would not only protect privacy in New Mexico, but would also hinder at least two aspects of the federal surveillance state...

Mar 21 07:51

MASSIVE BACKFIRE! Comey Reveals Democrats Were Behind Hack Investigation Delay

Mar 21 06:59

Google to revamp policies, hire staff after UK ad scandal

Google has found itself at the center of a British storm in recent days after major companies from supermarkets to banks and consumer groups pulled their adverts from its YouTube site after they appeared alongside videos carrying homophobic and anti-Semitic messages.

Mar 20 21:59

Panopticlick

When you visit a website, online trackers and the site itself may be able to identify you – even if you’ve installed software to protect yourself. It’s possible to configure your browser to thwart tracking, but many people don’t know how.

Panopticlick will analyze how well your browser and add-ons protect you against online tracking techniques. We’ll also see if your system is uniquely configured—and thus identifiable—even if you are using privacy-protective software.

Mar 20 16:17

HACKING WARNING: Con-artists target gig ticket purchases and trivia quizzes in new scams

Games, quizzes and trivia are another way to make money off unsuspecting victims.

Sometimes cold-texts will comes through the the option to text ‘STOP’ to cease receiving them, but this is also a scam and will cost money, sometimes up to £2 a text.

The report said: “With trivia scams, the first few questions will be very easy.

“This is meant to encourage you to keep playing. However, the last one or two questions you need to answer in order to clim your ‘prize’ could be very difficult or impossible. Do not enter.

“If you try to claim your prize, you may have to call a premium rate number (that begins with 0906 for example).

“You may then have to listen to a long recorded messages and there’s unlikely to be a prize at the end of it. Do not phone back to claim.”

Mar 20 13:52

UN Report on Mass Surveillance: “Trying To Appear Tough On Security By Legitimising Largely Useless, Hugely Expensive And Totally Disproportionate Measures Which Are Intrusive On So Many People’s Privacy”

A White House panel has previously slammed the NSA, and said that mass spying is unnecessary.

Now, the United Nations’ Special Rapporteur on the Right to Privacy notes in a new report (with our comments)

Deeply concerning … the status of the right to privacy in the surveillance area of activity has not improved since the last [UN surveillance] report. [Indeed, it’s getting worse … and will only expand unless we fight for privacy.]

Mar 20 13:37

Mike Cernovich: Twitter — Either Go Private and be a Super PAC or Tell Shareholders the Truth about Shadow Bans

Summary?—?Twitter is shadow banning high profile accounts, generally populist accounts. Twitter has every right to “censor,” of course, with an exception. It is shareholder fraud to censor popular accounts, as this harms company growth. Jack Dorsey must take Twitter private or else tell his shareholders the truth?—?Twitter censors accounts that are critical of Hillary Clinton. (Even Bernie Sanders supporters have been shadow banned.)

Twitter is a publicly-traded corporation and thus its CEO Jack Dorsey has fiduciary obligations to his shareholders. Twitter is not Jack’s private little Super PAC. If Jack wants to censor influential and popular users, then he must disclose this to shareholders. He must tell them the truth, “I don’t care about shareholder value. I want to run Twitter like my personal blog and Super PAC.”

Mar 20 10:00

FIVE CREEPY THINGS YOUR ISP COULD DO IF CONGRESS REPEALS THE FCC’S PRIVACY PROTECTIONS

Why are we so worried about Congress repealing the FCC’s privacy rules for ISPs? Because we’ve seen ISPs do some disturbing things in the past to invade their users’ privacy. Here are five examples of creepy practices that could make a resurgence if we don’t stop Congress now.

Webmaster's Commentary: 

The examples of companies which have done this before are highly unsettling.

Mar 20 09:57

Five Creepy Things Your ISP Could Do if Congress Repeals the FCC’s Privacy Protections

Why are we so worried about Congress repealing the FCC’s privacy rules for ISPs? Because we’ve seen ISPs do some disturbing things in the past to invade their users’ privacy. Here are five examples of creepy practices that could make a resurgence if we don’t stop Congress now.

Mar 20 07:15

iPhone users - Whatever you do, do NOT take part in this DANGEROUS new Siri prank

If someone tells you to say the number 108 to Siri – the virtual assistant that ships with the Apple iPhone – whatever you do, don't do it.

The troublesome prank, which has been doing the rounds on social media throughout the last week, should be avoided at all costs.

That's because saying 108 to Siri will immediately connect you to your local emergency services.

The prank works because 108 is the Indian equivalent of the 999 emergency number in the UK.

Mar 20 07:06

Russian ATMs Spit Out Cash After Malware Attack

Russian daily Kommersant reports that the Bank of Russia detected malware that hides inside ATM’s operating memory which "forces" them to dispense cash to anyone who enters certain code on its keyboard.

Mar 19 20:08

Flashback: Dragnet NSA Spying Survives: 2015 in Review

Secret mass surveillance continued to spark global controversy this year, yet the National Security Agency’s dragnet programs unconstitutionally monitoring Americans are stretching into their second decade. Ignited by news reports in 2005, eight years before Edward Snowden’s revelations blew the lid off illegal and unconstitutional domestic spying in 2013, mounting concerns around the world about the threat to free expression made 2015 a watershed year in the battle to restore privacy.

Mar 19 13:44

Germany Threaten Facebook With ‘Huge Fines’ If They Don’t Remove Alternative News

Germany will impose fines of up to 50 million euros if Facebook don’t remove alternative news content from their platform.

Mar 19 11:49

Bloke cuffed after 'You deserve a seizure' GIF tweet gave epileptic a fit

A man suspected of maliciously tweeting a GIF to a magazine writer that induced an epileptic attack has been collared by the FBI.

In December, Kurt Eichenwald, a Newsweek journalist who has written about living with epilepsy, appeared on the US Fox News show Tucker Carlson Tonight to discuss his claims that the then-President-elect Donald Trump had spent time in a mental institution.

That evening, Eichenwald received a tweet from pseudo-anonymous Twitter user jew_goldstein that contained a strobing image and the words: "You deserve a seizure." The image, we're told, induced an epileptic fit in Eichenwald, who lives with his family in Dallas, Texas. His wife later called the police when she pieced together what had happened.

Mar 18 15:16

Advertisers Flee As Google Allows Antisemitic Youtube Videos Produced By Former Kkk Leader To Play For Profit

GOOGLE IS FAILING TO REMOVE VIRULENT ANTISEMITIC CONTENT FROM ITS YOUTUBE VIDEO PLATFORM IN AN APPARENT BREACH OF ITS OWN GUIDELINES AND THE LAW.

Google (and Facebook and Youtube etc. are losing users because of their obvious censorship, which is why they are losing advertisers.

But let's blame the anti-Semites to protect the censorship, shall we?

Mar 18 09:12

The Truth is Vault 7 is Empty! Government is Totally Incompetent!

In this video, Vin Armani takes a deep dive into Vault 7 and discovers that the CIA’s technology isn’t nearly as scary as media reports have made out. Most of their “hacking” tools require a tech-savvy agent to be physically in the same room as the target device in order to install malware. And most of their malware is wiped out by the next routine software update by the device maker.

Mar 17 14:33

NY Supreme Court Signals Support For Transparency On Cellphone Surveillance

By Derrick Broze

The New York State Supreme Court is preparing to make an important decision regarding cellphone surveillance and what New York police can legally keep a secret.

The opposition to “stingray” cellphone surveillance, and the support of transparency are both experiencing growth throughout the United States. Recent bills passed in Arizona and New Hampshire are part of a trend that has been steadily increasing in the United States. The public and the political class are becoming aware of the true level of intrusion possible as a result of arming local, state, and federal police with military grade surveillance equipment, with very little oversight...

Mar 17 14:30

Google Army To Flag ‘Conspiracy Theory’ Websites In Fight Against Alt. Media

Google has hired a 10,000 strong social justice army to flag sites from their search results that they deem “conspiracy”, “offensive”, or “fake news.”

Mar 17 09:34

Star Trek Themed Kirk Ransomware Brings us Monero and a Spock Decryptor!

Boldly going where no man has gone before, the Kirk Ransomware brings so much nerdy goodness to the table that it could make anyone in IT interested. We have Star Trek, Low Orbital Ion Cannons, a cryptocurrency payment other than Bitcoin, and a decryptor named Spock! Need I say more?

Mar 17 09:15

FLASHBACK - WHY DID THIS YOUNG APPLE SOFTWARE ENGINEER JUST COMMIT SUICIDE AT HIS COMPANY’S HQ?

A 25-year-old software engineer named Edward Mackowiak who worked for Apple has reportedly shot himself in the head at the company headquarters in Cupertino. His death was quickly ruled a suicide just hours later after police found no evidence of foul play at the scene.

What’s strange is how the company refused to give any details about what Mackowiak actually did there. The only information about his job was on a hastily removed Linkedin page. Gizmodo reports it was sparse as well, simply listing him as a software engineer at Apple. His Twitter account has also been quickly deleted. It’s as if the guy himself is being digitally erased post haste.

Webmaster's Commentary: 

Maybe he stumbled across the CIA back doors!

Mar 17 09:14

Russian bank tells DOJ mysterious Trump computer connections may have been hacker hoax

A Russian bank has reported to U.S. authorities that mysterious communications resumed recently between one of its computers and an email server tied to President Trump’s business empire, and it has developed evidence the new activity may be the work of a hacker trying to create a political hoax, Circa has learned.

Alfa Bank is asking the U.S. Justice Department for help solving the mystery and pledged its full cooperation.

Mar 17 09:11

FLASHBACK: FBI ‘Granted FISA Warrant’ Covering Trump Camp’s Ties To Russia

Two separate sources with links to the counter-intelligence community have confirmed to Heat Street that the FBI sought, and was granted, a FISA court warrant in October, giving counter-intelligence permission to examine the activities of ‘U.S. persons’ in Donald Trump’s campaign with ties to Russia.

Webmaster's Commentary: 

The Obama camp is trying to insist there was no surveillance on the Trump campaign, but the existence of a FISA warrant contradicts that!

Mar 17 08:51

A $6 Linux computer that plays Doom: Could this tiny Chinese clone challenge the Raspberry Pi Zero?

Another day, another would-be Raspberry Pi challenger, this time the tiny LicheePi Zero, which sells for as little as $6.

Like its namesake, the Raspberry Pi Zero, the single-board computer is aimed at electronics hobbyists who want to build their own gadgets.

On paper, it has a faster and more modern processor than the Raspberry Pi Zero, the cheapest Raspberry Pi board, as well as offering Wi-Fi connectivity at a lower price. However, there are also several potential drawbacks to this Chinese-made competitor.

Mar 17 07:41

Hillary's Hackers, Awan Brothers Saga Deepens

Awan Brothers From Pakistan: They Ran DNC Congress Computers, Committed Treason

Mar 17 07:23

Suspicious cellular activity in D.C. suggests monitoring of individuals' smartphones

As the discussion over wiretapping and foreign hacking still dominates the conversation in Washington, an unusually high amount of suspicious cell phone activity in the nation’s capital has caught the attention of the Department of Homeland Security, raising concerns that U.S. officials are being monitored by a foreign entity.

The issue was first reported in the Washington Free Beacon, but a source at telecom security firm ESD America confirmed the spike in suspicious activity to CBS News.

Based on the type of technology used, the source continued, it is likely that the suspicious activity was being conducted by a foreign nation.

The news comes the same week that two Democratic lawmakers wrote to Kelly saying they were “deeply concerned” about hacking vulnerabilities in U.S. cellular networks.

Webmaster's Commentary: 

Notice that this is not at all sourced, and we read that breathless statement that "...it is likely that the suspicious activity was being conducted by a foreign nation."

I have to chuckle, and ask myself, "Who are they going to blame for this"?!?

Intelligent people understand to keep their cell conversations light, fluffy, and not of any real import; in fact, Mike and I think that surveilling our phones is punishment duty for newbies at any of the alphabet soup agencies.

And the reality is, that the "baddies" already have their phones encrypted to the point where no one can mess with them.

Mar 17 07:21

GAMING company Tabcorp has been fined $45 million for breaching anti-money laundering and anti-terrorism financing laws.

AUSTRAC CEO Paul Jevtovic addressed the media in Sydney today, where he said that it sends an “unequivocal message” to gaming companies.

Mar 17 07:19

Top 15 Discoveries & Implications of Wikileaks CIA Vault 7 – So Far

Vault 7 has been the subject of a curious and cryptic set of tweets from Wikileaks over the course of the past month or so. Now we know why. In bombshell news, in the greatest leak in Wikileaks history, in the greatest leak in CIA history, a total of 8,761 documents has been released in a series that has been dubbed Vault 7. Even for seasoned conspiracy researchers, the documents are fascinating and horrible at the same time. It confirms the suspicions and knowledge of many investigators. Now we have the proof to substantiate our hunches and intuition. The CIA has been caught with its pants down: spying on its citizens, bypassing encryption to steal their messages, hacking into their electronic devices to listen on their conversations, using US consulates abroad to conduct spying operations, remotely hacking into vehicles (to perform undetectable assassinations) and much more.

Mar 17 07:14

Windows 10: Fears that Microsoft is about to force updates over metered connections

Some Windows fans are worried that the upcoming Windows 10 Creators Update could mean costly data bills.

Windows 10 currently treats Windows Updates on cellular networks differently to those over Wi-Fi because Microsoft knows these updates can be large and result in sizeable bills if they take place on a so-called metered connection, such as a cellular network.

For this reason Windows 10 only downloads 'priority updates'.

But, as SuperSite Windows reports, the latest Windows Insider fast ring build of the Windows 10 Creators update notes a change to the language used.

Mar 17 07:13

This laptop-bricking USB stick just got even more dangerous

Remember that USB stick that would destroy almost anything in its path, from laptops, photo booths, kiosks, to even cars?

Now there's a new version, and it's even more dangerous than before.

Webmaster's Commentary: 

This is another reason why you shouldn't plug in USB sticks you find on the street.

Mar 16 15:36

Tech Expert Warns That AI Could Become “A Fascist’s Dream”

In her March 12 talk at the 2017 SXSW Conference, Kate Crawford of Microsoft Research warned that artificial intelligence is ripe for abuse. Crawford, who researches the social impact of large-scale data systems and machine learning, described how encoded biases in AI systems could be abused to target certain populations and centralize power in the hands of authoritarian regimes.

“Just as we are seeing a step function increase in the spread of AI, something else is happening: the rise of ultra-nationalism, rightwing authoritarianism and fascism,” she said in Dark Days: AI and the Rise of Fascism, her SXSW session.

Crawford believes the issue is that AI is often invisibly coded with human biases that often correspond with the characteristics of fascist movements: to demonize outsiders, track populations, centralize power, and claim neutrality and authority without accountability. AI can be a potent tool in achieving those goals, especially if it is coded with human biases.

Mar 16 15:32

Have a Kaby Lake/Ryzen CPU and Windows 7 or 8? Say goodbye to Windows Updates

Microsoft really wants you to run Windows 10. So while the company continues to offer security updates and bug fixes for Windows 7 and Windows 8.1 (and Windows Vista for a few more weeks), the company announced last year that it would not support those operating systems for devices with the latest Intel and AMD chips.

Up until now that’s basically just meant that if you were running Windows 8.1 or earlier on a PC with an Intel Kaby Lake or AMD Bristol Ridge or Ryzen processor you wouldn’t get officially supported drivers.

But now Microsoft is going a step further: Windows Update won’t work on Windows 7 or Windows 8.1 computers with the most recent Intel or AMD chips.

Mar 16 15:28

Samsung Leaking Customer Information

I entrusted Samsung with my data, and that is who I hold solely responsible for safeguarding it. If Samsung’s business partner is leaking that information, Samsung needs to remedy the situation.

As I was writing this up, I was going to redact some of my information (or at least my wife’s signature) but it wouldn’t make much of a difference. Four months after I disclosed this to Samsung, the information is still there for anyone to retrieve. Please don’t try to sell me a warranty for my tv.

Mar 16 15:23

LATEST WINDOWS 10 PREVIEW BUILD MAKES IT EVEN HARDER TO DODGE UPDATES

Previously, users could opt out of downloading updates when they were on a metered connection like paid Wi-Fi or a data plan, to help protect them from accidentally blazing through their bandwidth allowance or racking up a hefty bill. Users who wanted to delay or prevent an update for other purposes could set their connection as metered to take advantage of this feature.

However, the latest build of Windows 10 makes a major change to the relationship between metered connections and new updates, according to a report from Windows Super Site. Now, updates that are “required to keep Windows running smoothly” will be downloaded whether or not the user is working with a metered connection.

There’s currently no word on which updates will be classified as essential.

Mar 16 15:19

Your YouTube habits can be tracked by third parties, Israeli expert shows

Even when they promise anonymity and encryption, video host sites can’t entirely hide users’ activities from governments, advertisers, hackers

Mar 16 14:12

After CIA Smart TV Spying Revelations, Samsung to Release New TV That “Never Turns Off”

Just like we’ve recently been seeing ads all over the place for Amazon’s Echo following the Wikileaks Vault 7 revelations that internet-connected electronics in the home can be exploited by government agencies and turned into covert spy devices, Samsung is picking a really strange time to announce the release of its upcoming new television that never turns off.

Mar 16 09:51

Dormant Linux kernel vulnerability finally slayed

A recently resolved vulnerability in the Linux kernel that had the potential to allow an attacker to gain privilege escalation or cause denial of service went undiscovered for seven years.

Positive Technologies expert, Alexander Popov, found a race condition in the n_hdlc driver that leads to double-freeing of kernel memory. This Linux kernel flaw might be exploited for privilege escalation in the operating system. The (CVE-2017-2636) bug was evaluated as dangerous with a CVSS v3 score of 7.8, towards the higher end of the scale which runs from 1-10.

The vulnerability affects the majority of popular Linux distributions including RHEL 6/7, Fedora, SUSE, Debian, and Ubuntu.

Mar 16 09:28

Female Physicist Creates World’s First Government-Approved Birth Control App

The first and only internationally certified contraceptive app is now awaiting approval by the U.S. Food and Drug Administration. If approved, Natural Cycles would provide Americans a government-approved drug-free and therefore side-effect-free alternative in a market saturated with hormonal and abortive birth control.

Mar 16 08:38

World Health Organization: Smart Meters Are Making People Ill

Smart meters cause a “cornucopia of health issues” for occupants of the 57 million American homes equipped with the new technology, according to the World Health Organization and Cancer.org.

Mar 15 16:21

This Creepy Facial Recognition App Lets Users Find Strangers On Facebook By Taking Their Picture

A facial recognition app that can identify strangers from a photograph has been created by a British entrepreneur.

Mar 15 10:59

Over 33mn US employee records, including military personnel, had their data hacked

A database containing more than 33 million records of corporate and government employees has been leaked online, including records from the Department of Defense, US Postal Service, Wal-Mart, and Ohio State University.

The database belongs to Dun & Bradstreet which licenses information on businesses and corporations for use in credit decisions, business-to-business marketing, and supply chain management. In 2013, they held over 225 million business records from companies around the globe.

The leak of the 52.2 Gigabyte corporate database from the business services firm contains millions of people’s names, work email addresses, phone numbers, and the companies they work for, along with their job titles, ZDNet reports.

Mar 15 09:36

Facebook, Twitter could pay $53 mn for hate speech, fake news in Germany

German authorities have circulated further steps aimed at fighting hate speech and so-called fake news posts on social media sites such as Facebook and Twitter proposing fines of up to 50 million euros ($53 million).

German Justice Minister Heiko Maas announced plans to introduce a new law that would oblige social networks to publish quarterly accountability reports, which would include information on how effectively cases of hate speech and fake news reported by users on social networks are being considered, the German Justice Ministry reported on Tuesday.

Apart from that, social media companies would have to take down offensive posts within 24 hours after a complaint is submitted. As of today, it takes at least a week to delete these kind of posts.

Mar 15 09:23

Russian National Extradited to US for Allegedly Developing Malware Toolkit - DOJ

"Vartanyan, also known as 'Kolypto'…allegedly developed, improved, and maintained the pernicious 'Citadel' malware toolkit, was arraigned in federal court following his extradition from Norway in December 2016," the DOJ noted. The defendent allegedly uploaded four dozen files essential for Citadel to operate.

The Justice Department explained that Citadel was designed to infect computer systems and steal financial account credentials and personal information.

Webmaster's Commentary: 

"And that's OUR job!" -- Cocaine Importation Agency

Mar 15 08:32

Google chief blasted by MPs after revealing the giant ‘NEVER tries to block terrorist or paedo content’ on its YouTube site

A HUMILIATED Google chief revealed the giant never pro-actively tries to block terrorist or paedo content from its YouTube site.

In an extraordinary Commons showdown, Google, Facebook and Twitter were accused of “commercial prostitution” and failing to protect Brits from hate crime.

Webmaster's Commentary: 

But any content that questions the official story on anything gets taken down!

Mar 15 08:30

Greetings World, We are Anonymous.

The “full wrath” of the United States Central Intelligence Agency (CIA) will soon descend upon all of America after the deadliest secret lies of this “Deep State” spy agency currently at war with President Donald Trump, have now been exposed for the entire world to see, and whose next “false flag” terror attack to cover up their crimes may come as soon this coming week.

The international whistle blowing organization Wikileaks released the largest ever in history publication of over 8,000 CIA top secret documents (Vault 7: CIA Hacking Tools Revealed) revealing that this “Deep State” spy agency has, in fact, created and cast a vast electronic surveillance net around the entire US unrivaled in modern times and that has turned even the most innocuous devices (televisions, phones, computers, smart devices, automobiles, etc.) into illegal spying tools.

Mar 15 08:26

FBI won't release iPhone hacking tool and is still using it to 'gather intelligence information'

The FBI used a third-party tool to unlock an iPhone used by San Bernardino shooter Syed Farook. Despite opposition, the FBI won't release any details of the tool.

Mar 15 07:23

What You Do On Your Cell Phone Could Come Back To Haunt You

As far as Big Brother is concerned, nothing that you do on your cell phone is ever private. And if the government really wants to see what is on your cell phone, they are going to get that information one way or another, even if that means resorting to physical violence.

Mar 15 06:56

U.S. nuclear program runs on floppy disks

Webmaster's Commentary: 

Well, that oughta give everyone a warm feeling of security!

The electronic piano at my wife's church still uses 3.5 inch floppies, and it is getting to be a pain to find those!

Mar 15 00:50

Twitter Has Been Hacked! #TwitterHack

Twitter has been hacked, although the direct cause is unknown.

Thousands of accounts per hour were posting the following message:

? #Nazialmanya????#Nazihollanda Bu size ufakbir????#OSMANLITOKADI #16Nisan da görü?mek üzere Nemi yazd?m????????Türkçe Ö?REN #RT

The hacked accounts also posted a link to a video in Turkish.

Mar 14 16:45

Kodi users will be threatened with 10 YEARS in PRISON

The Government's Digital Economy Bill could hand copyright trolls the opportunity to threaten online users with prison sentences of up to 10 years.

According to a new campaign page by the Open Rights Group – a digital campaigning organisation that aims to protect the rights to privacy and free speech online – the Bill criminalises minor copyright infringement.

Open Rights Group want to change the Digital Economy Bill so that it is more specific.

The Government wants to use the Bill to increase penalties for criminals running websites that allow people to download copyright-protected material.

However the proposed legislation will criminalise any infringement where money has not been paid for copyrighted content, or where it can be proven that there is a "risk of loss".

That could include people who fileshare, or send copyrighted material as a GIF.

Mar 14 16:34

Warning as mystery gases in Northern Lights play HAVOC with GPS systems and drones

SCIENTISTS are warning of an unknown "new instability mechanism" that could play havoc with GPS systems, mobile phones and drones following a new study.

Mar 14 15:28

The US Government Now Has Less Cash Than Google

In the year 1517, one of the most important innovations in financial history was invented in Amsterdam: the government bond.

It was a pretty revolutionary concept.

Governments had been borrowing money for thousands of years… quite often at the point of a sword.

Mar 14 12:35

If You Notice These Signs, Your Cell Could Well Be Tapped!

Whether we like it or not, most of us have grown used to the possibility of our phones being spied upon. Dystopian novels such as George Orwell's Nineteen Eighty-Four are so ingrained in our minds that a study carried out back in 2014 concluded that 74% of Americans thought that they shouldn't give up privacy for the sake of safety.

Nevertheless, there's a considerable argument that many of us have given up on their our privacy. And thanks to laws, such as the so-called "Snooper's Charter" in the UK, state surveillance is increasing. However, let's not forget that other parties can tap into your cell phones - most troublingly, hackers and extortionists, but also your employer, an ex-partner, or even, in the case of celebrities, the press. They could be listening to your calls, reading and sending texts and emails, or altering the information on your interface.

Here are six things that you should watch out for.

Mar 14 11:48

The Internet Will Soon be Under Complete Agenda Driven Control, It’s Time for an Alternative

The internet will soon be a “safe space”, free from “hatred”, free from “Fake News”, free from “hurtful rhetoric” and of course, free from any views or opinions that do not fit the “progressive narrative”.

Mar 14 10:50

List: Malware found preinstalled on millions of Android phones used by 2 companies

Galaxy Note 2
LG G4
Galaxy S7
Galaxy S4
Galaxy Note 4
Galaxy Note 5
Galaxy Note 8
Xiaomi Mi 4i
Galaxy A5
ZTE x500
Galaxy Note 3
Galaxy Note Edge
Galaxy Tab S2
Galaxy Tab 2
Oppo N3
vivo X6 plus
Asus Zenfone 2
LenovoS90
OppoR7 plus
Xiaomi Redmi
Lenovo A850

Mar 14 10:27

Vibrator maker ordered to pay out C$4m for tracking users' sexual activity

The We-Vibe 4 Plus is a £90 bluetooth connected vibrator, which can be controlled through an app. It is marketed as a way to “allow couples to keep their flame ignited – together or apart”. Its app-enabled controls can be activated remotely, allowing, for instance, a partner on the other end of a video call to interact.

But the app came with a number of security and privacy vulnerabilities, which added up to produce something that many would feel uncomfortable about using.

The app that controls the vibrator is barely secured, allowing anyone within bluetooth range to seize control of the device.

In addition, data is collected and sent back to Standard Innovation, letting the company know about the temperature of the device and the vibration intensity – which, combined, reveal intimate information about the user’s sexual habits.

Mar 14 09:18

GERMAN OFFICIAL WANTS $50M FINES FOR SOCIAL MEDIA 'HATE' POSTS...

The Central Council of Jews in Germany welcomed the new law.

Mar 14 09:09

US military leak exposes 'holy grail' of security clearance files

A unsecured backup drive has exposed thousands of US Air Force documents, including highly sensitive personnel files on senior and high-ranking officers.

Security researchers found that the gigabytes of files were accessible to anyone because the internet-connected backup drive was not password protected.

Webmaster's Commentary: 

WTF?!?

Mar 14 08:57

Trump in Danger, CIAgate, ObamaGate, Drones, and Car Control. Michael Rivero - March 13, 2017

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA