COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED

COMPUTERS/INTERNET/SECURITY

Aug 01 13:35

SpaceX and Other Internet Service Providers Asked to Return Money Former FCC Chair Shouldn’t Have Given Them

By B.N. Frank

According to a group of telecom experts (The Irregulators) who filed a lawsuit filed against the Federal Communications Commission (FCC), Americans have been overcharged for decades for telecommunications services that millions still haven’t received. Over the years, Irregulator Bruce Kushnick has written dozens of articles about how the corrupt and “captured” Federal Communications Commission (FCC) made this possible. Of course legislators made this possible too. Now the current acting FCC chair has accused the previous FCC chair of “mismanaging” taxpayer money...

Aug 01 11:35

Remote print server gives anyone Windows admin privileges on a PC

A researcher has created a remote print server allowing any Windows user with limited privileges to gain complete control over a device simply by installing a print driver.

In June, a security researcher accidentally revealed a zero-day Windows print spooler vulnerability known as PrintNightmare (CVE-2021-34527) that allowed remote code execution and elevation of privileges.

While Microsoft released a security update to fix the vulnerability, researchers quickly figured out ways to bypass the patch under certain conditions.

Since then, researchers have continued to devise new ways to exploit the vulnerability, with one researcher creating an Internet-accessible print server allowing anyone to open a command prompt with administrative privileges.

Aug 01 05:40

Pegasus: Flying on the wings of Israeli ‘cyber-tech diplomacy’?

What was the role of the Israeli state in the spread of an insidious piece of malware? Plus, PR companies and the work they do with controversial governments.

A global cyber-surveillance scandal – spyware developed in Israel – has put the government there under the media microscope, and its story does not add up.

Jul 31 08:24

Have The Social Media Companies Become Way Too Powerful?

Do you remember the early days of the Internet? It was like “the wild west”, and that could be bad, but in many ways it was also very good. The Internet was very decentralized at that time, and information could flow very freely. For the very first time, ordinary people could communicate with others all over the globe on a massive scale, and I believe that was an incredibly positive development for humanity. Unfortunately, the elite were absolutely horrified by this free flow of information and they became obsessed with restricting it. Today, highly advanced algorithms have been designed to shape our behavior online. We are increasingly being funneled to just a handful of immensely powerful corporate-owned websites, and information on those sites is heavily monitored, controlled and censored.

Jul 31 08:23

27 Groups Urge Congress To Close FBI ‘Backdoor Search’ Loophole

Over two dozen advocacy groups on Monday sent a letter urging members of Congress to back a measure that, if enacted, would close the so-called “backdoor search” loophole that allows warrantless surveillance of U.S. citizens’ data by government agencies including the FBI and CIA.

The letter (pdf), led by Demand Progress and signed by 27 groups, calls on House leaders to support an amendment to H.R. 4505 – the Commerce, Justice, Science, and Related Agencies Appropriations Act for Fiscal Year 2022 – proposed by Reps. Zoe Lofgren (D-Calif.), Pramila Jayapal (D-Wash.), Thomas Massie (R-Ky.), and Warren Davidson (R-Ohio).

If passed, the amendment would prohibit the use of funds for the warrantless search of Americans’ communications acquired under Section 702 of the Foreign Intelligence Surveillance Act of 1978 (FISA), which the letter’s authors call a “controversial foreign intelligence authority that acquires an untold number of Americans’ Fourth Amendment-protected information.”

Jul 31 07:37

Big Tech Is Out of Control and Threatens to Annihilate Our Liberties

Big Tech is out of control — and the time to save our liberties and freedoms is quickly running out.

This month, White House press secretary Jen Psaki made a stunning admission: the Federal Government is directly colluding with Facebook to flag "problematic" social media content on its platform.

"In terms of actions that we have taken or we’re working to take, I should say, from the federal government, we’ve increased disinformation research and tracking,” she revealed during a press conference. “Within the Surgeon General’s Office, we’re flagging posts for Facebook that spread disinformation."

Jul 31 07:28

Robotic police dogs: Useful hounds or dehumanizing machines?

If you’re homeless and looking for temporary shelter in Hawaii’s capital, expect a visit from a robotic police dog that will scan your eye to make sure you don’t have a fever.

That’s just one of the ways public safety agencies are starting to use Spot, the best-known of a new commercial category of robots that trot around with animal-like agility.

The handful of police officials experimenting with the four-legged machines say they’re just another tool, like existing drones and simple wheeled robots, to keep emergency responders out of harm’s way as they scout for dangers. But privacy watchdogs — the human kind — warn that police are secretly rushing to buy the robots without setting safeguards against aggressive, invasive or dehumanizing uses.

In Honolulu, the police department spent about $150,000 in federal pandemic relief money to buy their Spot from robotics firm Boston Dynamics for use at a government-run tent city near the airport.

Jul 30 23:36

Home car charger owners urged to install updates

Security researchers have discovered failings in two home electric car chargers.

The researchers were able to make the chargers switch on or off, remove the owner's access, and show how a hacker could get into a user's home network.

Most of the faults have now been fixed but owners are being told to update their apps and chargers, to be safe.

Jul 30 11:50

How Amazon’s $10 Billion Contract Squabble with the Pentagon Reveals the Shady Nature of Military Contracts

By Peter Jacobsen

Earlier this month the US Department of Defense (DOD) canceled a $10 billion Joint Enterprise Defense Infrastructure (JEDI) contract awarded to Microsoft in 2019. The goal of the contract was to modernize the Department’s IT operations using cloud computing.

The JEDI cancellation occurred following a lawsuit from Amazon after the company was denied the contract. Amazon alleges that they were rejected because the Department of Defense was pressured by then President Donald Trump to “screw Amazon.” The motivation for this move, it was claimed, was driven by Trump’s personal animus for then-CEO Jeff Bezos, who also owns The Washington Post.

Jul 29 19:23

DHS’s Flawed Plan for Mobile Driver’s Licenses

By Adam Schwartz and Alexis Hancock

Digital identification can invade our privacy and aggravate existing social inequities. Designed wrong, it might be a big step towards national identification, in which every time we walk through a door or buy coffee, a record of the event is collected and aggregated. Also, any system that privileges digital identification over traditional forms will disadvantage people already at society’s margins...

Jul 29 13:52

New destructive Meteor wiper malware used in Iranian railway attack

In a new report by SentinelOne, security researcher Juan Andres Guerrero-Saade revealed that the cyberattack on Iran utilized a previously unseen file wiper called Meteor.

A wiper is malware that intentionally deletes files on a computer and causes it to become unbootable.

Unlike ransomware attacks, destructive wiper attacks are not used to generate revenue for the attackers. Instead, their goal is to cause chaos for an organization or to distract admins while another attack is taking place.

Jul 29 13:50

NSA shares guidance on how to secure your wireless devices

Hijacked wireless devices, including laptops, tablets, mobile, and wearable accessories, can lead to the compromise of personal and corporate data, such as credentials and sensitive documents.

To mitigate these risks, the NSA recommends avoiding public Wi-Fi networks as they expose traffic data to theft or manipulation, disabling Bluetooth and NFC radios while in public and not in use to avoid exposing info that can be used to hack the device.

"Users should consider additional security measures, including limiting/disabling device location features, using strong device passwords, and only using trusted device accessories, such as original charging cords," the NSA added.

Jul 29 13:07

Fighting the Urban Surveillance Infrastructure

By Amanda Bowers

The government uses a vast multi-layered system of surveillance to keep tabs on people. From cell phones to traffic cameras – big brother is always watching (and listening). It is also generally believed that there is collusion between the government and big tech.

So what do we do about it?...

Jul 29 11:44

Video game allows player to “disinfect” cities of anti-lockdown protesters and “save lives” by blowing them up with thermite grenades

Video gamers who support the government’s fascist Wuhan coronavirus (Covid-19) dictates have a new opportunity to murder those who oppose lockdowns, face masks, and “vaccines” – at least digitally.

The Steam gaming platform has made available to its users a three-minute, first-person-shooter video game called “STAYHOMER” that has one simple objective: to blow up as many anti-lockdown protesters as you can with thermite grenades.

The setting is cast in the streets of Tokyo, where a large contingent of protesters has gathered to oppose the government’s stay-at-home orders for the Fauci Flu. The job of the protagonist is to blast the crowd with “disinfectant,” also known as deadly grenades that will “purify” them all into non-existence.

Jul 29 11:32

MEMORY HOLE: USA Today buries its own report that says vaccinated individuals have “higher levels” of coronavirus than the unvaccinated

After earlier reporting that people who have been “vaccinated” for the Wuhan coronavirus (Covid-19) can still become infected with and spread deadly disease, USA Today reportedly scrubbed this information from its website, effectively memory holing its own reporting.

Jul 29 11:29

Apple broke bad news to iPhone fans

We've known this was a problem.

I expected that if there was any time when Apple top brass would mention it, it would be during the earnings call.

And that's when it happened.

Read More

Apple, like most other tech firms, is feeling the pinch due to component shortages.

A word that came up a lot during the call was "constraints." It was up to Apple CFO Luca Maestri to break the bad news.

Jul 29 05:44

Report: ‘Extensive’ Gay Hookup App Usage Compromises Vatican Security

Location-based homosexual and heterosexual hookup apps are widely used within Vatican walls, an investigative report revealed late Tuesday, which can open the Holy See to blackmail and other security risks.

The report by the Pillar, an online Catholic news agency, raised particular concerns of vulnerability to China, which until 2020 owned the gay hookup app Grindr, one of the services whose use in the Vatican was uncovered.

The Pillar revealed that at least 16 different mobile devices emitted signals from Grindr on at least four days between March and October 2018 within the areas of the Vatican City State not open to the public.

Jul 29 05:24

Mexico says officials spent $61 million on Pegasus spyware

Mexico’s top security official said Wednesday that two previous administrations spent $61 million to buy Pegasus spyware that has been implicated in government surveillance of opponents and journalists around the world.

Public Safety Secretary Rosa Icela Rodríguez said records had been found of 31 contracts signed during the administrations of President Felipe Calderón in 2006-2012 and President Enrique Peña Nieto in 2012-18. Some contracts may have been disguised as purchases of other equipment.

The government said many of the contracts with the Israeli spyware firm NSO Group were signed with front companies, which are often used in Mexico to facilitate kickbacks or avoid taxes.

Last week, the government's top anti-money laundering investigator said officials from the two previous administrations had spent about $300 million in government money to purchase spyware. But that figure may reflect all spyware and surveillance purchases, or may include yet-unidentified contracts.

Jul 28 08:50

Get patching: US, UK, and Australia issue joint advisory on top 30 exploited vulnerabilities

At the end of almost seven months in 2021, one of the 30 most exploited vulnerabilities dates from 2017, according to the US Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Centre (ACSC), the United Kingdom's National Cyber Security Centre (NCSC), and the US FBI.

CVE-2017-11882 is the holder of the dubious honour, and it is due to a stack buffer overflow in the equation editor of Microsoft Office, which can lead to remote code execution (RCE). It is an exploit that vendors have been banging on about for years already.

The quartet of agencies said on Wednesday that the easiest way to fix this hole, and the 29 others listed, would be to patch systems.

Jul 28 08:17

Facebook-owned apps can track and harvest your data even if you aren’t actively using them

Many smartphone apps track people’s data, including their current locations, even when they are not actively using them. Experts say one of the worst offenders is Facebook Messenger, the social media company’s dedicated messaging app.

Experts are now encouraging people to do their research and think about what personal data they could be giving away by downloading and signing up to apps like Facebook Messenger.

“I am mindful about who to invite into my home so I’d think the same about what I have on my phone and be conservative with the apps you download,” said Michael Huth, chief research officer and co-founder of a personal privacy-oriented browser with its own search engine and app.

Huth advised people to downgrade what Facebook Messenger can access from their smartphones. The Facebook app can harvest all sorts of data from its users if they do not do so, especially if they are unaware of what the app can access.

Jul 28 05:52

"Greatest Danger To National Security" - Ed Snowden Exposes The 'Insecurity' Industry

Prior to this week’s Pegasus Project, a global reporting effort by major newspapers to expose the fatal consequences of the NSO Group—the new private-sector face of an out-of-control Insecurity Industry—most smartphone manufacturers along with much of the world press collectively rolled their eyes at me whenever I publicly identified a fresh-out-of-the-box iPhone as a potentially lethal threat.

Jul 28 05:49

Biden Says Cyberattacks Could Lead to a ‘Real Shooting War’ With a Major Power

The US is constantly accusing countries like Russia and China of carrying out cyberattacks, and comments from President Biden on Tuesday suggest he could use these claims as a pretext for military intervention. He warned that if Washington ended up in a “real shooting war with a major power,” it could be the result of a cyberattack on the US.

“You know, we’ve seen how cyber threats, including ransomware attacks, increasingly are able to cause damage and disruption to the real world,” Biden said in a speech during a visit to the Office of the Director of National Intelligence. “I think it’s more likely we’re going to end up — well, if we end up in a war, a real shooting war with a major power, it’s going to be as a consequence of a cyber breach of great consequence.”

Webmaster's Commentary: 

Setting the stage for a false-flag "Cyber Pearl Harbor?"

Jul 27 13:29

EFF Sues U.S. Postal Service For Records About Covert Social Media Spying Program

Washington D.C.—The Electronic Frontier Foundation (EFF) filed a Freedom of Information Act (FOIA) lawsuit against the U.S. Postal Service and its inspection agency seeking records about a covert program to secretly comb through online posts of social media users before street protests, raising concerns about chilling the privacy and expressive activity of internet users.

Under an initiative called Internet Covert Operations Program, analysts at the U.S. Postal Inspection Service (USPIS), the Postal Service’s law enforcement arm, sorted through massive amounts of data created by social media users to surveil what they were saying and sharing, according to media reports. Internet users’ posts on Facebook, Twitter, Parler, and Telegram were likely swept up in the surveillance program...

Jul 27 13:17

BREAKING: Arizona Senate Serves Maricopa County With Subpoena for Routers, Ballot Envelopes, Voter Databases

The Arizona Senate have served Maricopa County with another subpoena relating to the forensic audit of the 2020 election, asking for ballot envelopes, routers, and voter databases, among other requests.

The news about the subpoena was broken late Monday on CNN by Bill Gates, one of the RINO members of the Maricopa Board of Supervisors. “Right before I came on here, the board of supervisors received another subpoena from the state Senate ordering us to turn over the routers, in addition to some other information,” Gates said. “And they threaten us in these papers that if we do not turn those over by August 2nd, so that’s next Monday, then we could be held in contempt,” he continued. The subpoena, posted to Twitter by ABC15’s Garrett Archer, included requests to Maricopa County for:

Jul 27 13:14

World Bank Funded Digital Identity Scheme in Nigeria Leads 60m to Link National ID to SIM Cards

(Biometric Update) – Nigeria’s federal government says well over 59 million people have now been biometrically enrolled for the National Identification Number (NIN) as deadline for the linkage of the IDs to SIM cards has been extended yet again. The new deadline is now October 31, 2021.

The decision for mobile phone users in Nigeria to link their digital ID numbers to their SIM cards went effective in December and there have been at least six deadline extensions since then...

Jul 27 10:36

Biden Gives “Five Eyes” What It Always Wanted: Access To Everyone’s Social Media

By MassPrivateI

For years, Americans have largely ignored corporate social media surveillance. But that all of that is about to change, thanks to President Biden.

No one has taken the White House’s plan to turn Big Tech into a quasi-Five Eyes censorship program seriously despite repeated warnings from journalists and news websites.

Reuters revealed some of America’s biggest tech companies will let “Five Eyes” and the U.N. decide whose stories the “Global Internet Forum to Counter Terrorism” should censor.

“Until now, the Global Internet Forum to Counter Terrorism’s (GIFCT) database has focused on videos and images from terrorist groups on a United Nations list and so has largely consisted of content from Islamist extremist organizations such as Islamic State, al Qaeda and the Taliban.”

Big Tech’s GIFCT is essentially a Five Eyes censorship program, masquerading as a Big Tech social media forum to stop terrorism and extremism...

Jul 27 09:55

Key South African ports declare ‘force majeure’ after cyberattack

South Africa’s state-owned ports and freight rail operator Transnet has declared “force majeure” at the country’s main container terminals because of “an act of cyberattack, security intrusion and sabotage” that struck last week.

The measure, which releases a company from fulfilling contractual obligations, affects key container terminals in Durban, Ngqura, Port Elizabeth and Cape Town, Reuters reported Tuesday, citing a note dated Monday that Transnet sent to customers.

“Transnet, including Transnet Port Terminals, experienced an act of cyberattack, security intrusion and sabotage, which resulted in the disruption of TPT normal processes and functions or the destruction or damage of equipment or information,” the note reads, according to Bloomberg.

Jul 27 08:50

IBM's newest quantum computer is now up-and-running: Here's what it's going to be used for

IBM has unveiled a brand-new quantum computer in Japan, thousands of miles away from the company's quantum computation center in Poughkeepsie, New York, in another step towards bringing quantum technologies out of Big Blue's labs and directly to partners around the world.

A Quantum System One, IBM's flagship integrated superconducting quantum computer, is now available on-premises in the Kawasaki Business Incubation Center in Kawasaki City, for Japanese researchers to run their quantum experiments in fields ranging from chemistry to finance.

Most customers to date can only access IBM's System One over the cloud, by connecting to the company's quantum computation center in Poughkeepsie.

Jul 27 08:49

Malware developers turn to 'exotic' programming languages to thwart researchers

Malware developers are increasingly turning to unusual or "exotic" programming languages to hamper analysis efforts, researchers say.

According to a new report published by BlackBerry's Research & Intelligence team on Monday, there has been a recent "escalation" in the use of Go (Golang), D (DLang), Nim, and Rust, which are being used more commonly to "try to evade detection by the security community, or address specific pain-points in their development process."

In particular, malware developers are experimenting with loaders and droppers written in these languages, created to be suitable for first and further-stage malware deployment in an attack chain.

BlackBerry's team says that first-stage droppers and loaders are becoming more common in order to avoid detection on a target endpoint, and once the malware has circumvented existing security controls able to detect more typical forms of malicious code, they are used to decode, load, and deploy malware including Trojans.

Jul 27 05:58

EVIDENCE| Secret Emails Used By Obama and Biden Are Hosted By German Intelligence

The biggest concern every American should have is that the Bidens and his staff did not use official emails to communicate about events, gatherings, meet and greets, policies both foreign and domestic. Using unofficial and non-secure modes of communications means a significant concern regarding National Security but more so regarding CORRUPT- under the table antics. More incredible is the TYPE of email SERVICE used. GMX mail which is widely known for being the “GERMAN INTELLIGENCE’S Backyard” to all cyber traffic, was what President Obama, Vice President Biden, and “President” Biden used as an incognito email which meant that he was EVADING COMMUNICATION DETECTION. As President or Vice President, you don’t get PRIVACY; you get discretion. As President or Vice President, you represent our nation, and therefore every time you fart, text, hiccup, or swallow, you are being monitored or recorded.

Jul 27 05:37

US blamed for global chip shortage and rising electronics prices

Huawei Technologies blamed the U.S. for a chip shortage that shook the global industry, saying Washington’s sanctions against Chinese companies sparked panic purchases of semiconductors and other materials.

Due to the US sanctions against Huawei, we have witnessed a panic build-up of stocks among global companies, especially Chinese ones. In the past, companies had little to no stockpiling, but now they are stockpiling for three or six months. This caused the entire system to malfunction.

Chairman of the Board Eric Xu

The US has placed Huawei and other Chinese tech companies on trade blacklists that restrict their access to US technology, citing national security risks.

Jul 27 05:22

Deepfakes: Microsoft and others in big tech are working to bring authenticity to videos, photos

Great (or terrifying) moments in deepfake history: The argument about whether a video of President Joe Biden talking to reporters on the South Lawn of the White House was real (it was). The Dutch, British and Latvian MPs convinced their Zoom conference with the chief of staff of the Russian opposition leader Alexei Navalny was a deepfake. A special effects expert who made their friend look exactly like Tom Cruise for a TikTok video ironically designed to alert people to the dangers of fake footage. Product placement being digitally added to old videos and movies, and Anthony Bourdain's recreated voice speaking in a documentary. A mother creating fake videos of the other members of her daughter's cheerleading squad behaving badly in an attempt to get them kicked off the team. How do you know you can trust what you're looking at anymore?

Jul 27 05:02

59 Million Americans Prohibited From Buying High-End Dell Gaming PCs

Approximately 59 million Americans spanning five states can't buy Dell's high-end Alienware brand desktop PCs "due to power consumption regulations."

When one goes to the Dell Alienware online configurator to buy an Aurora R12 gaming desktop, a special notice appears which reads:

This product cannot be shipped to the states of California, Colorado, Hawaii, Oregon, Vermont or Washington due to power consumption regulations adopted by those states. Any orders placed that are bound for those states will be canceled.

Jul 27 04:49

UK Media Report on 'Iranian Secret Cyber Files' Casts More Doubt Than Confidence, Experts Say

On Monday, Sky News published a story suggesting that Iran has been conducting clandestine research on the possible impact of cyber attacks on civilian infrastructure, including petrol stations, cargo ships and programmable logic controllers, citing what the media outlet claimed were "classified" documents compiled by Iranian intelligence.

The authenticity of the alleged "Iranian secret cyber files" cited by Sky News, on how cyber attacks could be used against civilian infrastructure objects, is debatable, experts said, shortly after the UK media outlet published so-called 'classified documents' said to have been acquired from Iranian intelligence.

Jul 27 04:36

U.S. WEIGHS DEPLOYING BALLOONS TO PROVIDE INTERNET ACCESS TO CUBANS DURING CRACKDOWN

In the aftermath of the Cuban government's response to protests throughout the country, the United States government is weighing what options it has for restoring communication services on the island nation. Internet service is currently suspended throughout Cuba, and some ham radio frequencies are even being jammed in Florida, preventing even rudimentary communications with the island.

In an attempt to remedy the situation and reestablish communication networks in the one-party socialist republic, some officials in the United States government have proposed launching sophisticated high-altitude balloons made by Raven Aerostar over Cuba to provide wireless internet access from above. While the plan sounds good on paper, there are some doubts about how well it could work.

Jul 27 04:30

I Was Targeted by NSO Spyware. Here's How Israel Is Helping Modi Undermine India's Democracy

India loves to describe herself as the world’s largest democracy, and Israel as the only democracy in the Middle East. Yet opaque officials and executives in both countries have come together in a dark dance against democracy.

Indian journalists, top political leaders, judges and civil servants sworn to protect our constitution were subjected to an intrusive surveillance campaign, a "hijacking" of our phones, by military grade surveillance spyware sold by the Israeli company NSO.

I am an investigative journalist, and for two years, I was one of the targets of that invasive Pegasus spyware. In other words, for two years, aided by Israeli

Jul 26 11:27

Militaries Plunder Science Fiction for Technology Ideas, But Turn a Blind Eye to the Genre’s Social Commentary

By Will Slocombe, University of Liverpool

Military planning is a complicated endeavour, calling upon experts in logistics and infrastructure to predict resource availability and technological advancements. Long-range military planning, deciding what to invest in now to prepare armed forces for the world in thirty years’ time, is even more difficult.

One of the most interesting tools for thinking about future defence technology isn’t big data forecasting and the use of synthetic training environments, but narrative and imagination. And we get this from science fiction.

Jul 26 10:39

Malware Can Be Hidden Inside A.I. Models “with near-identical accuracy”

By B.N. Frank

Complaints about Artificial Intelligence technology inaccuracies and misuse are reported frequently. In fact, there’s even a “Hall of Shame”. More bad A.I. news has come out regarding an A.I. malware connection...

Jul 26 10:26

COVID-Tracker App Installs Itself Without User Consent, Including On Parental-Locked Devices.

Massachusetts state officials recently announced the launch of the “voluntary” MassNotify app, which monitors the spread of COVID-19 in the state. The only problem is the app appears to be installing itself on residents’ and their kids’ smartphones, unbeknownst to users, and without their consent.

The news creates a disturbing new dimension to privacy laws and even private property concerns as hundreds of users have reported their Android phones have had the app surreptitiously installed, without their prior knowledge.

“Thank you MA/Google for silently installing #MassNotify on my phone without consent. But I have a request: Can you also silently install an app that makes my phone explode and k*ll me?” wrote Twitter user Justin Jacobs. Others have taken to the Android app store to register their complaints.

Jul 26 09:54

Get those ROUTERS!!

Jul 26 09:41

Ransomware: Here's how much victims have saved in ransom payments by using these free decryption tools

Ransomware gangs been prevented from making over a billion dollars following ransomware attacks by free decryption tools made available by the No More Ransom scheme.

The project, founded by Europol, the National High Tech Crime Unit of the Netherlands' police, Europol's European Cybercrime Centre, Kaspersky, and McAfee, launched five years ago and has grown to involve 170 partners across law enforcement, cybersecurity companies, academia, and others.

The No More Ransom portal now offers 121 free ransomware decryption tools which can decrypt 151 ransomware families. They've helped more than six million ransomware victims recover their encrypted files for free – all without the need to give into the demands of cyber extortionists.

Jul 26 07:49

Pegasus spyware and the consequences for privacy

It's not that long ago that people were preoccupied with the hacking of some social media sites, including those believed to be immune from such things, such as Facebook, Twitter and WhatsApp, for example. Now we have Pegasus spyware.

Pegasus is a programme produced by an Israeli company, NSO, through which mobile telephones can be hacked into and monitored. An investigation has identified around 50,000 phones that have been infected with the programme, which was bought by Arab regimes to spy on their opponents and other parties. The story has been well covered in the media.

However, this is the tip of the iceberg. There is no doubt that security and military agencies in developed countries are already developing advanced generations of Pegasus. When available, they will probably be very cheap.

Jul 26 07:43

Fake Windows 11 installers now used to infect you with malware

Scammers are already taking advantage of the hype surrounding Microsoft's next Windows release to push fake Windows 11 installers riddled with malware, adware, and other malicious tools.

While Windows 11 will start rolling out worldwide during early 2022, Microsoft has already made it available for install to all customers enrolled in the Insider program after officially unveiling it as the next version of Windows last month.

However, hundreds of users have already downloaded installers from unnoficial sources are getting infected with malware, as Kaspersky security researchers discovered.

Jul 26 06:21

MICROSOFT, “WE CAN PROGRAM COMPLEX BEHAVIORS USING DNA”. 3-STRAND DNA CONFIRMED

Jul 26 06:07

BEX ALERT - FBI: China Is Behind Past Oil & Gas Pipeline Cyberattacks

State-sponsored Chinese actors targeted U.S. oil and gas pipeline companies in a spearphishing and intrusion campaign between 2011 and 2013, a Joint Cybersecurity Advisory, coauthored by the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI), said this week.

Jul 26 06:04

THE FBI IS LOCATING CARS BY SPYING ON THEIR WIFI

The FBI is using a controversial technology traditionally used to locate smartphones as a car tracking surveillance tool that spies on vehicles’ on-board WiFi.

Known as a Stingray or a cell-site simulator, the tool masquerades as a cell tower in order to force all devices in a given area to connect into it. Agents can then pick the number they’re interested in and locate the device. Normally that would be a mobile phone, but a search warrant application discovered by Forbes shows it can also be used to find vehicles, as long as they have onboard Wi-Fi. That’s because car Wi-Fi systems act like a phone, in that they reach out to mobile networks to get their data. So it makes sense that police would use it to find a car, though this appears to be the first case on record of it happening.

Jul 26 06:03

PEGASUS IS JUST THE TIP OF THE ISRAELI CYBER SPYING ICEBERG, WITH WHITNEY WEBB

Edward Snowden has called it “the story of the year.” An Israeli spying company has been caught selling software to authoritarian regimes that have used it to surveil more than 50,000 people worldwide.

That company is NSO, founded in 2010 by former members of Unit 8200, the Israeli military’s notorious intelligence squad. Their product is called Pegasus, and it was sold to military, law enforcement, and intelligence agencies in 40 countries, among them some of the world’s worst human rights abusing governments.

Jul 26 05:54

WhatsApp chief: US allies' national security officials targeted with NSO malware

High-ranking government officials around the world were targeted by governments using spyware from NSO Group, according to WhatsApp head Will Cathcart.

Speaking to The Guardian, Cathcart discussed the spyware attacks that were revealed by the Project Pegasus investigation, saying they had parallels with a 2019 attack against 1,400 WhatsApp users.

“The reporting matches what we saw in the attack we defeated two years ago, it is very consistent with what we were loud about then,” Cathcart said. "This should be a wake-up call for security on the internet … mobile phones are either safe for everyone or they are not safe for everyone.”

Jul 26 05:45

A man used AI to bring back his deceased fiancé. But the creators of the tech warn it could be dangerous and used to spread misinformation.

After Joshua Barbeau's fiancé passed away, he spoke to her for months. Or, rather, he spoke to a chatbot programmed to sound exactly like her.

In a story for the San Francisco Chronicle, Barbeau detailed how Project December, a software that uses artificial intelligence technology to create hyper-realistic chatbots, recreated the experience of speaking with his late fiancé. All he had to do was plug in old messages and give some background information, and suddenly the model could emulate his partner with stunning accuracy.

It may sound like a miracle (or a Black Mirror episode), but the AI creators warn that the same technology could be used to fuel mass misinformation campaigns.

Jul 25 21:12

The Big Antivirus Lie in 2021

Do you need an Antivirus? Surprisingly, my answer is an emphatic NO. I lay out the problems with Antivirus software and how in 2021, they actually detract from security and privacy and not enhance it.

We will also talk about alternate solutions for cyber security that does not require paying for any antivirus.

Jul 25 19:54

The White House versus Fakebook – As we watch them eat their own with playing the blame game we note Press Sec admitted to violating constitution

The U.S. government has no business colluding with social media companies, otherwise those companies become nothing more than a government mouthpiece and entity and should be labeled and advertised as such. -- In their original sign up pages, Facebook should be forced to inform their possible new users that they are a government controlled website, so people have the truth before deciding to sign up.

Jul 25 07:28

Spyware for sale: The booming trade in surveillance tech

Israel’s NSO Group is in the eye of a storm over its Pegasus spyware — but it is far from the only company helping governments with their covert surveillance operations.

Explosive claims that Pegasus was used to spy on activists and even heads of state have shone a spotlight on the software, which allows highly intrusive access to a person’s mobile phone.

But NSO is merely one player in an industry that has quietly boomed in recent years, arming even cash-strapped governments with powerful surveillance technology.

Jul 25 06:31

Pegasus Project: Why I was Targeted by Israeli Spyware

The Orwellian prediction finally came true. I knew it was only a matter of time before the Saudi regime tried to hack my phone, using Pegasus software manufactured by the private Israeli security company NSO Group.

This development highlights the consolidation of a new axis of evil: Israel, Saudi Arabia and the UAE have become a chorus of malicious powers aiming to stifle activism and the quest for democracy in the region. Israel provides knowledge; the others provide funds.

“I have spent more than half my life writing, researching and teaching. You wouldn’t expect me to be hacked. But such professional activities are a crime in Saudi Arabia”

The privatisation of the Israeli security apparatus, and the mushrooming of private companies founded by ex-defence and ex-Mossad agents, is a threat not only to Palestinians in Israel, Gaza and the occupied West Bank, but also to all Gulf citizens, with Israeli spyware sold to dictatorships across the Arab world.

Jul 25 06:16

Blinken: Message that There’s New Sheriff on Cyberwarfare ‘Has Been Sent’ to China, Russia

On Friday’s broadcast of MSNBC’s “Morning Joe,” Secretary of State Antony Blinken argued that the message that there’s a new sheriff in town on cyber warfare “has been sent” to countries like Russia and China, “and, as necessary, will be sent again.”

Co-host Mika Brzezinski asked, “Let’s jump to Russia, and the issue of cyberwarfare, which I think also then ends us up in China. What is the United States prepared to do to make sure this doesn’t happen again? What’s next when the next attack happens to kind of send the message to Vladimir Putin that there’s a new sheriff in town?”

Jul 25 06:15

‘Pegasus’ Spyware Targeted 10 Prime Ministers, 3 Presidents, and a King

Spies looking to gain information on world leaders reportedly used the “Pegasus” smartphone spyware to target world leaders including three presidents, ten prime ministers, and a king.

The Washington Post reports that governments worldwide are facing allegations that they used malware developed by the Israeli firm NSO Group to spy on the mobile devices of activists, journalists, corporate executives, and politicians. An international investigation has scrutinized the spyware, named Pegasus, and a list of more than 50,000 phone numbers that included the numbers of hundreds of politicians and government officials.

Jul 25 05:50

This Biden Proposal Could Make US a ‘Digital Dictatorship’

A “new” proposal by the Biden administration to create a health-focused federal agency modeled after DARPA is not what it appears to be. Promoted as a way to “end cancer,” this resuscitated “health DARPA” conceals a dangerous agenda.

Jul 23 18:53

Drive with On-Board Wi-Fi? It’s Allowing The FBI To Spy On Your Vehicle

By B.N. Frank

Even if you’re not worried about health risks – it might bother you to know that the FBI can spy on your car via your on-board Wi-Fi...

Jul 23 13:12

2nd Recall of Chevy EVs Due to Battery Fires; “life with an affected car is going to be a lot less convenient than it used to be.”

By B.N. Frank

Battery fires have led to a recalls in Hyundai Electric Vehicles (EVs) and also General Motors models. Now GM has issued a second recall regarding the Chevrolet Bolt...

Jul 23 11:14

Microsoft issues warning to ALL Windows 10 users: You need to follow these steps now

Windows 10 users have been put on high alert over a dangerous new flaw found lurking inside the popular desktop operating system. Dubbed SeriousSAM, it allows bad actors to gain administrator rights on vulnerable systems – enabling them to install malware, applications, delete files, and much more. SeriousSAM is a so-called "zero-day vulnerability", which means that attackers are already aware of how to leverage the flaw. That means Microsoft is in a race against the hackers – to fix the problem before too many people fall victim to hackers exploiting the issue.

Thankfully, Microsoft is working on a fix. However, these things take some time. And while the Redmond-based company is hard at work on a permanent patch for the problem, which it refers to as CVE-2021-36934, Microsoft has shared a workaround to protect your laptop, desktop PC, or tablet from these attacks.

Jul 23 11:11

Nasty macOS Malware XCSSET Now Targets Google Chrome, Telegram Software

A malware known for targeting macOS operating system has been updated once again to add more features to its toolset that allows it to amass and exfiltrate sensitive data stored in a variety of apps, including apps such as Google Chrome and Telegram, as part of further "refinements in its tactics."

XCSSET was uncovered in August 2020, when it was found targeting Mac developers using an unusual means of distribution that involved injecting a malicious payload into Xcode IDE projects that's executed at the time of building project files in Xcode.

The malware comes with numerous capabilities, such as reading and dumping Safari cookies, injecting malicious JavaScript code into various websites, stealing information from applications, such as Notes, WeChat, Skype, Telegram, and encrypting user files.

Jul 23 10:10

Botswana Police use Israeli Cellebrite Tech to Search Another Journalist’s Phone

Tsaone Basimanebotlhe was not expecting security agents to appear at her home in a village outside Gaborone, Botswana’s capital, in July 2019, she told CPJ in a recent interview. But they didn’t come to arrest or charge her, she recalled – they came for her devices, hunting for the source for an article published by her employer, Mmegi newspaper.

Basimanebotlhe, a politics reporter, said she surrendered her phone and password to the agents after they presented a warrant and could not find her computer. A senior officer then used technology sold by the Israel-based company Cellebrite to extract and analyze thousands of her messages, call logs, and emails, and her web browsing history, according to an affidavit from the police forensics laboratory.

The affidavit, which CPJ reviewed, was submitted during a related court case.“They’re looking for people that are divulging information to the media,” Basimanebotlhe told CPJ.

Jul 23 09:44

Microsoft warns over this unusual malware that targets Windows and Linux

Microsoft is warning customers about the LemonDuck crypto mining malware which is targeting both Windows and Linux systems and is spreading via phishing emails, exploits, USB devices, and brute force attacks, as well as attacks targeting critical on-premise Exchange Server vulnerabilities uncovered in March.

The group was discovered to be using Exchange bugs to mine for cryptocurrency in May, two years after it first emerged.

Notably, the group behind LemonDuck is taking advantage of high-profile security bugs by exploiting older vulnerabilities during periods where security teams are focussed on patching critical flaws, and even removing rival malware.

"[LemonDuck] continues to use older vulnerabilities, which benefit the attackers at times when focus shifts to patching a popular vulnerability rather than investigating compromise," the Microsoft 365 Defender Threat Intelligence Team note.

Jul 23 09:39

To Protect Yourself, Never Give Your DNA Or Biometric Data

So many companies now are requesting people's biometric data. Things like fingerprints, iris scans, voice scans, DNA, etc. are not pieces of information that you should freely give to a company. These are immutable identifiers and could potentially be a security risk and privacy nightmare.

Jul 23 08:20

Facebook steps up censorship: People can no longer have online conversations without potentially getting censored

Facebook’s censorship has gone out of control in the recent past. Now, users can no longer discuss their hobbies on the platform without potentially getting censored.

The social media giant reportedly censored discussion of gardening tools in a group about gardening. “Facebook’s censors are digging deep – flagging the word ‘hoe’ in a western New York gardening group because they apparently confused the tool for a disparaging term for women,” the New York Post reported.

A group called WNY Gardeners has been repeatedly flagged by Facebook for “violating community standards” when its more than 7,500 members discussed the long-handled gardening tool – which is spelled with an “e,” unlike the offensive term.

Jul 23 08:10

Kaseya gets master decryption key after July 4 global attack

The Florida company whose software was exploited in the devastating Fourth of July weekend ransomware attack, Kaseya, has received a universal key that will decrypt all of the more than 1,000 businesses and public organizations crippled in the global incident.

Kaseya spokeswoman Dana Liedholm would not say Thursday how the key was obtained or whether a ransom was paid. She said only that it came from a “trusted third party” and that Kaseya was distributing it to all victims. The cybersecurity firm Emsisoft confirmed that the key worked and was providing support.

Ransomware analysts offered multiple possible explanations for why the master key, which can unlock the scrambled data of all the attack’s victims, has now appeared. They include: Kaseya paid; a government paid; a number of victims pooled funds; the Kremlin seized the key from the criminals and handed it over through intermediaries — or perhaps the main attacker didn’t get paid by the gang whose ransomware was used.

Jul 23 06:23

Pegasus scandal: Are we all becoming unknowing spies?

The allegations that spy software known as Pegasus may have been used to carry out surveillance on journalists, activists - and even perhaps political leaders - highlights that surveillance is now for sale.

The company behind the tool, NSO Group, has denied the allegations and says its customers are carefully assessed.

But it is another sign that high-end spy techniques, which used to be the exclusive preserve of a few states, are now spreading more widely and challenging the way we think about privacy and security in an online world.

In the not-too-distant past, if a security service wanted to find out what you were up to, it took a fair degree of effort. They might get a warrant to wiretap your phone. Or plant a bug in your house. Or send a surveillance team to follow you.

Finding out who your contacts were and how you lived your life would take patience and time.

Jul 23 06:02

Russia disconnected from global internet in tests - RBC daily

Russia managed to disconnect from the global internet during tests in June and July, the RBC daily reported on Thursday, citing documents from the working group tasked with improving Russia's internet security.

Russia adopted legislation, known as the "sovereign internet" law, in late 2019 that seeks to shield the country from being cut off from foreign infrastructure, in answer to what Russia called the "aggressive nature" of the United States' national cyber security strategy.

The legislation tightened Moscow's control over the global network and caused consternation among free speech activists, who feared the move would strengthen government oversight of the country's cyberspace.

Tests involving all Russia's major telecoms firms were held from June 15 to July 15 and were successful, according to preliminary results, RBC cited a source in the working group as saying.

Jul 23 06:01

NSA Whistleblower Says All Telecom Imports Must Be Scanned for Pegasus-Like Implants

All communications technology products from any foreign country need to be checked for potential hardware and software surveillance implants in the wake of the Pegasus scandal, former US National Security Agency (NSA) Technical Director and whistleblower William Binney told Sputnik.

Pegasus spyware, developed by Israel's NSO Group, was used to hack some 50,000 smartphones of human rights activists, lawyers, journalists and business executives around the world, a journalist-NGO consortium revealed last week. Among those targeted were high-level officials from Pakistan, France, Iraq, Egypt and the European Council.

Jul 23 05:45

Pegasus: Israeli spyware scandal explained

Jul 23 05:44

Israeli spyware is a threat to all freedoms everywhere

In 1974, Richard Nixon was impeached after being caught bugging his opponents at the Watergate Hotel in one of the twentieth century's most explosive scandals. In comparison, the Pegasus Project — a far-reaching and shocking exposé by seventeen media outlets and Amnesty International — is a thermonuclear warhead to Nixon's firecracker.

Pegasus is a product of an Israeli company, the NSO Group. Heads of state and opposition leaders from France to South Africa to Pakistan have the Pegasus spyware on their phones. As well as politicians, the list of 50,000 Pegasus targets provided by Amnesty include human rights defenders, activists and journalists. NSO Group's clients range from known human rights abusers to states that regard themselves as liberal democracies.

Jul 22 19:08

Eric Clapton Won’t Perform at Venues Requiring Proof of COVID Vax; Experienced Severe Side Effects from AstraZeneca Jab

By B.N. Frank

Vaccine side effects, injuries and deaths have been reported for decades. They continue to be reported about COVID vaccines as well, including by celebrity recipients Eric Clapton and Ben Stein. Clapton has now announced that he will not perform in venues that require proof of COVID vaccination. Go figure...

Jul 22 12:16

Japan breaks internet speed record with a 319Tbps data transfer

The many-gigabit internet speed records of a decade ago now seem downright inadequate. Motherboard reports that scientists at Japan's National institute of Information and Communications Technology (NICT) have smashed the internet transfer record by shuffling data at 319Tbps. For context, that's almost twice as fast as the 179Tbps a team of British and Japanese researchers managed in August 2020.

Jul 22 12:14

Pegasus Spyware is a 'Big Black Hole', No Escape From Its Attack: Cyber Expert

Pegasus keeps updating its malware. Even if experts crack one, the spyware designs a new one. It is an ongoing war.

Jul 22 12:13

HP patches vulnerable driver lurking in printers for 16 years

On Tuesday, SentinelLabs published an analysis of the vulnerability, tracked as CVE-2021-3438 and issued a CVSS score of 8.8.

The security issue is described as a "potential buffer overflow in the software drivers for certain HP LaserJet products and Samsung product printers could lead to an escalation of privilege."

According to the researchers, some HP, Xerox, and Samsung printer models contained vulnerable driver software, sold worldwide since 2005.

The driver in question, SSPORT.SYS, is automatically installed and activated, whether the model was wireless or cabled. The driver is also loaded automatically by Microsoft's Windows operating system on PC boot.

"This makes the driver a perfect candidate to target since it will always be loaded on the machine even if there is no printer connected," the researchers say.

Jul 22 11:14

Internet down: Huge outage takes some major sites offline

It’s not just you, it’s Steam, PlayStation, Disney, GoDaddy, Amazon, UPS, LastPass, and a whole bunch of other websites that are out-of-commission right this minute. One part of the problem appears to be an issue with the content distribution network (CDN) Akamai. Tracking for the service suggests that they’re experiencing an “emerging issue with the Edge DNS service.”

Major issues have occurred with this down-time, giving us a glimpse into the world of “what if” when it comes to our reliance on the internet at large. Take for example UPS, whose down time will result in users’ inability to check for tracking information on important deliveries.

The Delta webpage down-time means Delta flights cannot be checked from home or from smart devices with the internet. The same is true of British Airways. Capital One appears to be down at the moment, meaning users with money with the bank cannot check their balance or access documents until the outage is fixed.

Jul 22 11:11

Google employees listen in on private conversations between users and Google Assistant

Google representatives told India’s Parliamentary Standing Committee on Information Technology that the company’s employees listen to some recordings of conversations between users and Google Assistant. It was the first time the tech giant acknowledged in front of Indian officials that its employees listen to a portion of conversations that users have with Google Assistant.

Jul 22 10:19

Taking Action Against 5G—Advice from a People’s Lobbyist

Op-Ed by Jenny Miller

Perhaps you have been already convinced by reading articles on this site about the devastating effects of the ongoing rollout of massive numbers of 4G/5G so-called small cells (short for cell towers) throughout cities in the U.S. If you’re not up to speed about why you should be extremely, extremely alarmed, you can read my previous article on the subject (“The 5G Juggernaut, Coming Soon to a Utility Pole Outside Your Home”).

This article explains how you can be effective in convincing legislators to oppose the ubiquitous 5G streamlining bills. My advice is based on my past experience as a lobbyist representing a statewide human rights organization, when on more than one occasion, a tiny group of us were able to win extraordinary victories against bills being strongly pushed by powerful corporate interests. I also was very involved in the 2017 successful campaign to defeat California 5G bill...

Jul 22 10:18

Microsoft just published a workaround for this important Windows 10 flaw

Microsoft has released a workaround for a privilege elevation flaw that affects all versions of Windows 10 and could give attackers the ability to access data and create new accounts on systems.

Microsoft this week confirmed a serious elevation of privilege flaw, tagged as CVE-2021-36934, that could allow a local attacker to run their own code with system privileges.

While the bug is important, the attacker must have already gained the ability to execute code on the target system in order to exploit the flaw, according to Microsoft.

Jul 22 08:02

Wikileaks Editor-In-Chief: Pegasus leaks show nobody is safe from espionage

n this episode of Going Underground, we speak to WikiLeaks Editor-in-Chief Kristinn Hrafnsson. He discusses the leaks that showed some 50,000 people are potential targets of the Pegasus spyware that has been sold to governments around the world by NSO, an Israeli company, and the inescapable global surveillance apparatus that has now become privatized. He also discusses Julian Assange’s US extradition case, slamming the ongoing detention of the WikiLeaks founder despite a key witness in the case admitting to lying.

Jul 22 07:52

Pegasus scandal turns spotlight on Israel’s controversial military tech sector

The latest revelations that NSO Group’s Pegasus spyware is responsible for repeated worldwide violations of human rights and abuses of power are a huge embarrassment for Israel’s new government.

Following the news that a list of 50,000 numbers belonging to journalists, activists and senior officials targeted by the spyware has been uncovered, an interdisciplinary crisis management team consisting of the Mossad espionage agency and the defence and foreign ministries has been established to respond to the scandal.

But it seems that the response is too little, too late. More dramatic action is needed to clear the poisonous atmosphere, which has led to EU leaders expressing their concern about the intrusive Israeli tools.

Jul 22 07:52

Pegasus Spyware Targeted French President Macron - "Extremely Serious" Breach Under Investigation

The latest victim who was targeted using the phone hacking spyware Pegasus has been revealed to French President Emmanual Macron - part of a growing list that's said to include some 600 government officials and politicians from over 30 countries. Israeli tech firm and Pegasus-developer NSO Group is in damage control mode after an international consortium of news outlets has published dozens of stories exposing the hacks. Pakistan Prime Minister Imran Khan is also on the list.

Jul 22 07:40

Saudi Aramco Targeted In $50M Crypto Extortion Scheme After Major Data Breach

Saudi Aramco is pointing the finger at a third-party contractor for a breached data incident which has resulted in demands for $50 million in ransom from an unknown mysterious entity in what's looking like a Colonial Pipeline style cyber drama. The Saudi oil giant acknowledged to The Associated Press that it "recently became aware of the indirect release of a limited amount of company data which was held by third-party contractors."

"We confirm that the release of data was not due to a breach of our systems, has no impact on our operations and the company continues to maintain a robust cybersecurity posture," Aramco said, without specifying the contractor through which the breach happened. The language of "indirect release" reveals it was likely a leak and not the result of an external hacking operation.

Jul 22 06:20

Why isn’t Israel held accountable for spying on journalists?

Spyware made by the Israeli company NSO Group has been used far more extensively than previously known to target journalists and human rights defenders around the world.

This raises the question of why Israel, the state actor without which NSO Group would not exist and could not operate, is not being held accountable.

The extent of the spying has come to light thanks to a major investigation spearheaded by the global reporting consortium Forbidden Stories and the human rights group Amnesty International.

“An unprecedented leak of more than 50,000 phone numbers selected for surveillance by the customers of the Israeli company NSO Group shows how this technology has been systematically abused for years,” according to Forbidden Stories.

The spyware, called Pegasus, can be installed remotely on a targeted person’s smartphone without requiring them to take any action such as clicking on a link or answering a call.

Jul 22 06:18

Reporters Without Borders demands Israel stop exporting spyware

Reporters Without Borders (RSF) has urged Israel to suspend exports of spying technology amid allegations it was used to target more than a dozen heads of state and hundreds of journalists.

Earlier this week a list was leaked of some 50,000 phone numbers believed to have been chosen by clients of Israel’s NSO Group for possible surveillance, according to an international reporting effort.

Jul 22 06:17

US hackers attacked thousands of servers in China, news report claims

China has fleshed out its accusation that the US was behind a number of hacks into the networks of Chinese universities and sensitive government facilities, after Washington and its allies condemned Beijing for cyberattacks around the world.

The news website of the Global Times, a newspaper affiliated with the People’s Daily, did not specify where its information was from, but outlined three cases of “malicious cyber activities” between August and October last year which allegedly targeted the servers of sensitive facilities to prime them for later intrusion and infiltration opportunities.

In October, a US hacker group allegedly attacked 2,426 servers in China, most at government and party facilities, as well as a power train company, a steel plant and some universities, according to the report.

Jul 22 06:12

Denying mass spying claims, NSO says it’s victim of ‘an orchestrated campaign’

Pushing back against claims it has targeted more than a dozen heads of state and hundreds of journalists, Israeli spyware firm NSO Group on Wednesday denied being engaged in mass surveillance, calling the allegations against it “insinuations and slander.”

“False allegations have been published against us that ignore the facts,” the company said in a statement announcing that it would not be responding to further requests to comment on the claims. “We will not play the game of insinuations and slander.”

The company said that “an orchestrated campaign is being carried out against us.”

Webmaster's Commentary: 

"We're the victims! Boo, hoo, hoo."

Jul 22 05:42

Pegasus: Which Middle East and North Africa figures are on the target list?

A list of more than 50,000 thousand numbers suggests numerous journalists, activists and politicians from the region could have been subject to spyware hacking

The revelations this week that the Pegasus surveillance software developed by Israel's NSO Group could have been used to hack around 50,000 phones has shocked much of the world.

Although NSO Group has repeatedly denied that its software is used to target dissidents and journalists - and has said the original Forbidden Stories report on the leaks had "no factual basis" - the appearance of the numbers of hundreds of reporters, activists, politicians and even heads of state among the list acquired by a consortium of journalists has been alarming for many.

In the Middle East and North Africa, where many states are no stranger to using repressive and invasive methods against their citizens, there have been numerous high-profile figures whose numbers are listed as targets.

Jul 22 05:25

The Inevitable Weaponization of App Data Is Here

It finally happened. After years of warning from researchers, journalists, and even governments, someone used highly sensitive location data from a smartphone app to track and publicly harass a specific person. In this case, Catholic Substack publication The Pillar said it used location data ultimately tied to Grindr to trace the movements of a priest, and then outed him publicly as potentially gay without his consent. The Washington Post reported on Tuesday that the outing led to his resignation.

Jul 22 05:21

Phones of Two Dubai Princesses Reportedly Hacked by Pegasus Spyware

Last Sunday, several prominent media outlets and rights groups released a report that revealed how an Israeli cyber company's spyware programme had been used to hack the phone numbers of journalists, rights activists, and even political leaders across the world.

Two Dubai princesses – Latifa and Haya - have been named as targets of the Pegasus malware attack in a report released by Amnesty International, The Washington Post, and a number of other rights groups and media outlets.

According to investigators, Princess Latifa, the daughter of the ruler of Dubai, and Princess Haya, his former wife, were among 50,000 "people of interest" who may have been targeted by the Israeli cyber security firm NSO Group's Pegasus programme.

Jul 21 22:22

3 Best Online Promotion Course Ideas

Creating an online course is not as difficult as promoting it. While creating an online course one should focus on its marketing strategy as well. There are so many agencies that help to promote your online course. But the one which I know is Think Orion which is one of the best agencies I know who helps as an agency to promote online courses.

Why should create an Online Course?

Creating an online course is one of the best ways to reach and connect with your customers. In fact, it is one of the best ways to monetize things in the longer run. As per the stats within 20 years eLearning revenue has been increased by 900%. In 2015 eLearning market in the US (United States) is $107 billion and which was expected to grow to $325 billion in 2025.

How to Market Your Online Course: Best Strategies

Jul 21 14:57

How to Search for, Spot and Stamp Out Pegasus Spyware From Your PhoneHow to Search for, Spot and Stamp Out Pegasus Spyware From Your Phone

Governments, journalists, opposition politicians and rights groups worldwide are demanding formal investigations into Pegasus, the spyware product created by shadowy Israeli software company NSO Group. Sold to states to ‘fight terrorism and crime’, the software has been discovered to have been used in unscrupulous ways to target members of the press, lawmakers and others, helping to stamp out dissent or allow governments to get ahead of potentially embarrassing scandals.

Jul 21 12:34

Tokyo Olympics hacked: Ticketholders’ IDs, passwords posted online

The login IDs and passwords of people who purchased tickets for the Tokyo Olympics have been leaked online, according to a new report on Wednesday.

According to the Japanese news agency Kyodo, a government official said the same information belonging to those who bought Paralympic tickets, as well as individuals who used a volunteer portal for the Summer Games, was also leaked online. The official, speaking on a condition of anonymity, noted that organizers of the Tokyo Olympics have launched an investigation into the leaks.

The number of personal identifiers leaked is “not large,” the official said, adding that certain measures have already been put in place to stop the information from spreading.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA