COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED

COMPUTERS/INTERNET/SECURITY

Jul 13 12:47

Fusion Centers Enter Kids As Young As 1 Year Old In Secret Gang Databases

By MassPrivateI

Recent documents from the Metropolitan Police Department in D.C. (MPD) and the Boston Police Department (BPD) show that Regional Intelligence Centers (RIC) are encouraging police officers to put children and adults in secret gang databases.

Last month an article in The Intercept showed that police gang databases are riddled with civil rights violations and errors. It revealed how police used civilian analysts to create flawed RIC (Fusion Center) gang member databases...

Jul 13 09:47

Chinese quantum computer ‘sets record’ in processing test

Scientists in China have claimed another benchmark in computing, saying their quantum device takes just 72 minutes to do a task that would take the most powerful supercomputer at least eight years.

In a non-peer-reviewed paper released late last month, the team led by Pan Jianwei, a physicist from the University of Science and Technology of China in Hefei, said the Zuchongzhi quantum processor set a record to challenge “classical computing”.

“Our experiment unambiguously established a computational task that can be completed by a quantum computer in 1.2 hours but will take at least an unreasonable time for any supercomputers,” the team said in the paper published on pre-print service ArXiv.org.

Jul 13 09:12

Cuba’s internet cutoff: A go-to tactic to suppress dissent

Cubans facing the country’s worst economic crisis in decades took to the streets over the weekend. In turn, authorities blocked social media sites in an apparent effort to stop the flow of information into, out of and within the beleaguered nation.

Restricting internet access has become a tried-and-true method of stifling dissent by authoritarian regimes around the world, alongside government-supported disinformation campaigns and propaganda. On the extreme side, regimes like China and North Korea exert tight control over what regular citizens can access online. Elsewhere, service blockages are more limited, often cutting off common social platforms around elections and times of mass protests.

Jul 13 09:09

‘Bay of Tweets’: Twitter Permits Anti-Cuba Bot Army Despite ‘Coordinated Inauthentic Behavior’ Rules

The United Nations has voted every year since 1992 to condemn the US 60-year embargo of Cuba, which is responsible for shortages in fuel, medicine, and essential parts on the island that have affected the life of every one of its 11.5 million people. Despite the suffering, the US maintains “sanctions are tools for democracy.”

Even before protests broke out in Cuba on Sunday, a coordinated online campaign to spread anti-Cuban messages had begun circulating on Twitter. Not only does the social media giant appear to be uninterested in stopping it, but it has a history of arbitrarily shutting down Cuban government and media accounts as well.

Jul 13 09:08

All Websites Associated With Hacking Group REvil Are Reportedly Down

All of the websites associated with the cybercriminal group REvil are down, CNBC reported citing multiple sources on Tuesday.

The report said multiple cybersecurity experts confirmed that all known websites associated with REvil are down.

Last week, the White House said the United States would take action against REvil in response to the ransomware attack against the IT management software company Kaseya, which affected a number of US companies.

On Monday, the automation software provider Kaseya said it had fully restored services after partially shutting down as a result of a ransomware cyberattack earlier this month.

Jul 12 19:36

Big Tech Tells You Fairy Tales - Fake Privacy Moves

Apple is implementing the iCloud Private Relay. Apple has taken steps to block trackers just like Brave and Firefox. Google has taken steps to block unauthorized device fingerprinting. Google is making the biggest move of all, blocking the biggest threat which is browser fingerprinting. All with a new technology called Federated Learning of Cohorts.

Has Apple and Google seen the light and are making positive moves towards privacy?

This unfortunately is just a fairy tale. Their motives are not what you think. This video tears down the fairy tale and shows you the real goal which is domination and money.

Jul 12 12:34

War Games In California And Florida Linked To Test Massive "Kill Web"

AU.S. Air Force’s latest large force test event has once again pushed the boundaries of modern aerial warfare, leveraging long-range “kill web” technology and integration of an autonomous drone. A test pilot at the center of the work told The War Zone how ranges in the east and west of the United States came together to prove-out data link fusion, while the Air Force’s Skyborg program gave an early, but important, demonstration of how it can operate safely and effectively in complex aerial battlespace.

“This was another test event as part of a series that is focused on kill web integration, event survivability and — new for this iteration — two new focus areas: autonomy integration and very long range kill chain integration in that we actually linked up the respective four-hour Orange and Emerald Flag VULs [Vulnerability Periods] for about an hour via a system under test,” Major Brandon “Siphon” Burfeind, the Orange Flag Director, told The War Zone during an exclusive interview.

Jul 12 10:18

Google bans 9 popular Android apps! It's vital you now delete them from your phone

Here is a full list of the applications users need to remove without delay.

• PIP Photo - Over 5.8 million downloads

• Processing Photo - Over than 500,000 downloads

• Rubbish Cleaner - Over 100,000 downloads

• Inwell Fitness - Over 100,000 downloads

• Horoscope Daily - Over 100,000 downloads

• App Lock Keep - Over 50,000 downloads

• Lockit Master - Over 5,000 downloads

• Horoscope Pi - Over 1,000 downloads

• App Lock Manager - Over 10 downloads

Jul 12 10:12

There's a new word that can break ANY iPhone, and this time there's no fix

Security researcher Carl Schou shared his finding on Twitter, posting that if an iPhone comes into range of a Wi-Fi network named %secretclub%power, you'll lose the ability to connect to Wi-Fi, stream music over AirPlay, and more. Worse still, the latest bug is even more damaging than the previous discovery by Schou.

While the first Wi-Fi name, %p%s%s%s%s%n, caused the iPhone to reboot and left it unable to connect to the internet... resetting the network settings usually fixed the bug. Of course, that's an annoying process.

Resetting network settings means you'll need to enter all Wi-Fi network passwords again.

But the latest Wi-Fi network name – %secretclub%power – can't be fixed by resetting your network settings. Ouch.

Jul 12 09:35

Biden Wants the FCC to Fix Net Neutrality—but It Can't Yet

ON FRIDAY, PRESIDENT Biden urged the Federal Communications Commission to restore net neutrality rules and take steps to boost price transparency and competition in broadband—but the FCC can't do most or all of that yet, because Biden hasn't nominated a fifth commissioner to break the 2-2 deadlock between Democrats and Republicans.

Consumer advocacy groups have been urging Biden to nominate a third Democrat to the deadlocked FCC for months, but he still hasn't done so. What's causing the holdup isn't clear. The delay could wipe out the FCC's ability to do anything opposed by Republicans for all of 2021, because it can take the Senate months to approve FCC nominations, and the FCC process for complicated rulemakings is also lengthy.

Jul 12 09:14

Ransomware: This new ransom tracker reveals how much bitcoin gangs have been paid

A security expert has launched a site to keep a publicly trackable record of bitcoin payments to key ransomware gangs, such as REvil.

The ransomwhe.re site has been created by Jack Cable, a security researcher who works with the Krebs Stamos Group cyber consultancy and the US Defense Digital Service.

The Ransomwhere site is an open, crowdsourced ransomware payment tracker, offering a breakdown of victim payments in bitcoin to wallets linked to a dozen major ransomware variants. The payment figures can be broken down by 'all time', this year, this month, and this week.

Jul 12 08:32

Kaseya Releases Patches for Flaws Exploited in Widespread Ransomware Attack

Florida-based software vendor Kaseya on Sunday rolled out urgent updates to address critical security vulnerabilities in its Virtual System Administrator (VSA) solution that was used as a jumping off point to target as many as 1,500 businesses across the globe as part of a widespread supply-chain ransomware attack.

Following the incident, the company had urged on-premises VSA customers to shut down their servers until a patch was available. Now, almost 10 days later the firm has shipped VSA version 9.5.7a (9.5.7.2994) with fixes for three new security flaws —

CVE-2021-30116 - Credentials leak and business logic flaw
CVE-2021-30119 - Cross-site scripting vulnerability
CVE-2021-30120 - Two-factor authentication bypass

Jul 12 08:27

SolarWinds patches critical Serv-U vulnerability exploited in the wild

SolarWinds is urging customers to patch a Serv-U remote code execution vulnerability that was exploited in the wild by "a single threat actor" in attacks targeting a limited number of customers.

The vulnerability (tracked as CVE-2021-35211) impacts Serv-U Managed File Transfer and Serv-U Secure FTP, and it enables remote threat actors to execute arbitrary code with privileges following successful exploitation.

The bug found by Microsoft in the latest Serv-U 15.2.3 HF1 released in May 2021 also affects all prior versions. SolarWinds has addressed the security issue in Serv-U version 15.2.3 hotfix (HF) 2.

Jul 12 07:43

Flashback: Center for Strategic and International Studies - Dismissing Cyber Catastrophe

To qualify as a catastrophe, an event must produce damaging mass effect, including casualties and destruction. The fires that swept across California last summer were a catastrophe. Covid-19 has been a catastrophe, especially in countries with inadequate responses. With man-made actions, however, a catastrophe is harder to produce than it may seem, and for cyberattacks a catastrophe requires organizational and technical skills most actors still do not possess. It requires planning, reconnaissance to find vulnerabilities, and then acquiring or building attack tools—things that require resources and experience. To achieve mass effect, either a few central targets (like an electrical grid) need to be hit or multiple targets would have to be hit simultaneously (as is the case with urban water systems), something that is itself an operational challenge.

Jul 12 07:41

District council declares Germany's first-ever 'cyber-catastrophe'

Hackers knocked out the IT operations of the municipality of Anhalt-Bitterfeld, in the state of Saxony-Anhalt, on Tuesday (Jul 6), a spokesperson confirmed to Reuters on Saturday.

"We are almost completely paralysed," the spokesperson said, adding its offices would probably remain offline next week and giving no indication of when services would resume.

The municipality declined comment on the identity of the attacker or whether they had made a ransom demand, citing a police investigation.

The municipality declined comment on the identity of the attacker or whether they had made a ransom demand, citing a police investigation. Security sources say German local governments often run outdated and poorly maintained software systems that could be wide open to cyberattack.

Jul 11 12:12

The Great Semiconductor Shortage

By Peter C. Earle

Silicon is the crude oil of the Digital Age. Millions of metric tons are mined every year in China, Russia, Norway, the US and elsewhere, much of which is used in the $500 billion global market for semiconductors. In turn, the manufactured silicon chips, wafers, and integrated circuits power tens of trillions of dollars worth of hardware running personal and business software, wired and wireless communication devices, consumer electronics, automotive components, industrial technology, and other critical processes worldwide.

Jul 10 17:03

European Data Protection Supervisor and Board Demand Total Ban on Automatic Recognition via A.I. Technology

By B.N. Frank

It’s overwhelming to think about how much we are all being watched and tracked. This happens often without our knowledge or consent. A few years ago, the term “Surveillance Capitalism” was introduced. It’s the perfect name for a perfectly creepy practice.

Despite opposition, “Surveillance Capitalism” is only increasing since a growing number of businesses and other entities insist on tracking us for targeted advertising and other purposes. Artificial Intelligence and other technologies are being used for this.

Complaints about A.I. inaccuracies and misuse are reported frequently – there’s even a “Hall of Shame”. In Europe, data protection experts and agencies are endorsing bold steps to better protect citizens...

Jul 10 13:28

A Country That Has Lost Its Way: U.S. Government and Corporations Combine to Strip Citizens of Their Rights

The whole issue of the government spying illegally on its own citizens has again made the news with the claims by conservative commentator Tucker Carlson that NSA has been spying on him, presumably because he has connections that the government regards either as subversive or, in the new reckoning, as “extremists” who are potential “domestic terrorists.” Given the reasonable assumption that anyone who voted for Donald Trump might well fall under those categories, that means that something like half the U.S. population could be under suspicion.

Jul 10 12:05

Alleged Cyberattack Creates "Unprecedented Chaos" For Iran's National Rail Network

Iranian state TV on Friday afternoon (local time) reported "unprecedented chaos" at train stations across the country, leading to cancelations, immense delays and confusion impacting hundreds of lines after what's being reported as a potential cyber attack.

Reuters reports as evidence of a hack that a phone number for the Ayatollah's office was posed in place of a national train services hotline: "Train services in Iran were delayed by apparent cyberattacks on Friday, with hackers posting the phone number of the country's supreme leader as the number to call for information, state-affiliated news outlets reported."

Jul 09 08:28

US Threatens to Act If Russia Fails to Deal With Ransomware Hackers on Its Territory

The message follows a bilateral summit between the presidents of the US and Russia, during which they agreed to start a dialogue on security in the cybersphere. The Russian Foreign Ministry said that since the meeting, there has been no meaningful response from Washington to Russian proposals on the matter.

If Russia fails to act against actors responsible for ransomware attacks conducted from its territory, then the US will, White House Press Secretary Jen Psaki assured. She declined to go into detail regarding how Washington is planning to act against the hackers.

Jul 09 08:14

Microsoft: PrintNightmare security updates work, start patching!

Microsoft says the emergency security updates released at the start of the week correctly patch the PrintNightmare Print Spooler vulnerability for all supported Windows versions and urges users to start applying the updates as soon as possible.

This clarified guidance comes after security researchers tagged the patches as incomplete after finding that the OOB security updates could be bypassed in specific scenarios.

"Our investigation has shown that the OOB security update is working as designed and is effective against the known printer spooling exploits and other public reports collectively being referred to as PrintNightmare," the Microsoft Security Response Center explains.

Jul 09 07:53

COVID WITCH HUNT: DC AG subpoenas Facebook for data on ALL users that have spread “COVID-19 misinformation”

The District of Columbia (DC) Attorney General (AG) Karl Racine, a Democrat, has subpoenaed Facebook for a wide range of records related to “COVID-19 misinformation” on the platform.

The subpoena was filed on June 21 and demands that Facebook identify all groups, pages, and accounts that have violated the platform’s far-reaching COVID-19 misinformation rules.

It also calls for Facebook to release an internal study that looked at vaccine hesitancy among its users. Media reports on this study in March claimed that it showed that non-rule breaking Facebook content may be causing “substantial” harm.

If Facebook were to comply with this subpoena, it would likely impact millions of users.

Jul 09 07:19

CYBER SECURITY EVENT?!

Jul 09 06:33

The best browser for Linux, Windows and Mac isn't Google Chrome

Of all the browsers I've used, those based on the WebKit and Blink rendering engines seem to have the biggest problems with longer documents on Google Drive. And for me, that's a big issue. I work in Google Drive about seven to nine hours a day. And that the Blink rendering engine has the biggest issue with Google Drive should come as a shock, seeing as how both were created (and are maintained) by Google.

But since my switch to Firefox (on Linux and macOS), I've not had a single problem with memory issues. And, much to my surprise, Firefox is no longer a battery vampire on macOS. Prior to my M1 MacBook Pro, Firefox drained the very will to live from my MacBook Pro 2016 battery. When using Firefox, I was lucky to get two to three hours of battery life. With the M1 and Firefox 89, battery life is just as good as it is when using Safari.

Jul 08 11:05

America’s Largest Police Department: “Come Have Fun In The NYPD Game Trailer”

By MassPrivateI

Four years ago, when I wrote an article about police department ice cream trucks I thought only kids would be fooled by them. I didn’t think tone-deaf police departments would come up with another disturbing PR move portraying them as ‘officer friendly’ to minorities.

Now the largest police department in the country, the New York Police Department (NYPD), has unveiled their latest neighborhood propaganda tool — a government-sponsored gaming trailer. Even the most ardent police supporters would be hard-pressed to find a more culturally insensitive thing to happen to minority youths in recent memory...

Jul 08 11:03

Google “bought off Samsung” to limit app store competition, 36 states allege

Yesterday, dozens of state attorneys general sued Google on antitrust grounds, alleging that the company worked to “preemptively quash” competing app stores (most notably the Samsung Galaxy Store) and maintain its monopoly on Android app distribution.

The lawsuit alleges that Google engaged in a range of anticompetitive practices, including offering large app developers profit-sharing agreements in exchange for exclusivity, creating unnecessary hurdles for sideloading, and attempting “to buy off Samsung to limit competition from the Samsung Galaxy app store.”

Google says the lawsuit is “meritless.” “It’s strange that a group of state attorneys general chose to file a lawsuit attacking a system that provides more openness and choice than others,” Wilson White, Google’s senior director of public policy, wrote in a blog post.

FURTHER READING
Google’s iron grip on Android: Controlling open source by any means necessary

Jul 08 10:02

DO MORE EVIL: Google turns Android phones into vaccine passports

Android phones can now save and display coronavirus (COVID-19) vaccination cards, essentially making them a digital vaccine passport.

Jul 08 08:41

Get updating: Microsoft delivers PrintNightmare patch for more Windows versions

Microsoft has released patches for more versions of Windows affected by the PrintNightmare bug, but researchers claim the patches don't provide complete protection.

Microsoft released out-of-band patches for Windows systems affected by two critical bugs being tracked as CVE-2021-1675 and CVE-2021-34527, and has advised admins to disable the print spooler service until patches are applied. One is a remote code execution flaw, while the second is a local privilege escalation bug.

"Microsoft identified a security issue that affects all versions of Windows and have expedited a resolution for supported versions of Windows that will automatically be applied to most devices," it said in an update on Wednesday.

Jul 08 07:47

FLASHBACK - AT&T engineer: NSA built secret rooms in our facilities

The EFF's case against AT&T has barely begun, yet it has already brought to light some fascinating details about the methods behind the NSA's alleged wiretapping abilities. Mark Klein, a retired AT&T engineer who is now participating in the case as a witness, has released a statement to the media in which he outlines many of the allegations that are currently under seal. Chief among them is his claim that AT&T installed powerful traffic monitoring equipment in a "secret room" in their San Francisco switching office at the behest of the NSA.

"In 2002, when I was working in an AT&T office in San Francisco, the site manager told me to expect a visit from a National Security Agency agent, who was to interview a management-level technician for a special job. The agent came, and by chance I met him and directed him to the appropriate people.

Webmaster's Commentary: 

Looks like Tucker Carlson is right!

Jul 08 06:30

Cyber attacks against Russia carried out from US, Germany, the Netherlands, expert says

Hackers carried out cyber attacks on Russia’s infrastructure mainly from the territory of the United States, Germany and the Netherlands, National Coordination Center for Computer Incidents Deputy Director Nikolai Murashov said on Wednesday.

"In 2020, most cyber attacks on Russia’s information space were conducted from overseas, mainly from the territory of the US, Germany and the Netherlands," Murashov told Infoforum in Russia’s Black Sea resort of Sochi.

According to the expert, the Russian coordination center is ready to respond to all requests for assistance within the framework of cooperation. However, many foreign states - participants of a network of contact points - don’t ask Russia for assistance in thwarting harmful activity, nor do they respond to Russia’s requests.

Jul 07 19:17

The Best Windows Utility

This is an open source utility I have been working on for years now. It can install, tweak, fix, and control windows updates.

Jul 07 14:45

mRNA Vaccine Inventor Erased From History Books

June 11, 2021, the inventor of the mRNA vaccine technology,1 Dr. Robert Malone, spoke out on the DarkHorse podcast about the potential dangers of COVID-19 gene therapy injections, hosted by Bret Weinstein, Ph.D. The podcast was quickly erased from YouTube and Weinstein was issued a warning. -- To censor a scientific discussion with the actual inventor of the technology used to manufacture these COVID-19 shots is beyond shocking. But the censorship of Malone goes even further than that. As reported in the video above, Malone’s scientific accomplishments are also being scrubbed.

Jul 07 14:41

Revisionist historians “cancel” Dr. Robert Malone, creator of mRNA technology in latest memory hole PURGE of truth

The man behind mRNA (messenger RNA) “vaccine” technology is being scrubbed from the digital history books for daring to publicly speak out about its dangers. -- But wait: The government has been saying for the past year that mRNA technology is completely safe and does not turn a person’s cells into spike protein factories. It turns out that the government is lying, hence why Wikipedia is trying to erase Malone and his experiment from existence.

Jul 07 13:46

RED ALERT: Deranged tyrant nominated to head ATF says anyone uttering “hate speech” online should have all their guns confiscated by armed federal agents

It’s bad enough that a guy like Chipman has even been nominated to lead one of those armed federal agencies, but this guy literally would have jailed our founding fathers for their “hate speech” about liberty and freedom against the British Crown’s tyranny while at the same time confiscating their firearms.

Jul 07 09:56

RULERS PREPARE TO EXECUTE “CYBER POLYGON” DRILL ON FRIDAY

Cyber Polygon is a unique cybersecurity event that combines the world’s largest technical training exercise for corporate teams and an online conference featuring senior officials from international organizations and leading corporations. The global elitists are going to test what a massive cyberattack that takes down infrastructure and the power grid worldwide would look like.

For those who think this is not a big deal, please remember event 201, which was a simulation of a coronavirus pandemic in which the media was used to constantly push the fear manipulating the public into obedient compliance with any amount of ridiculous commands. What will cyber polygon bring? Nothing good since it a part of the World Economic Forum’s agenda for totalitarian global domination.

Jul 07 09:23

Kaspersky Password Manager's random password generator was about as random as your wall clock

In March 2019, security biz Kaspersky Lab shipped an update to KPM, promising that the application could identify weak passwords and generate strong replacements. Three months later, a team from security consultancy Donjon found that KPM didn't manage either task particularly well – the software used a pseudo-random number generator (PRNG) that was insufficiently random to create strong passwords.

From that time until the last few months of 2020, KPM was suggesting passwords that could be easily cracked, without flagging the weak passwords for users.

"The password generator included in Kaspersky Password Manager had several problems," the Donjon research team explained in a blog post on Tuesday.

"The most critical one is that it used a PRNG not suited for cryptographic purposes. Its single source of entropy was the current time. All the passwords it created could be bruteforced in seconds."

Jul 07 09:08

Microsoft patches PrintNightmare — even on Windows 7 — but the terror isn’t over

No fixes yet for Windows 10 version 1607, Windows Server 2016, or Windows Server 2012

Jul 07 08:55

Install immediately: Microsoft delivers emergency patch for PrintNightmare security bug

Microsoft has released an out-of-band patch for the security flaw known as PrintNightmare that is under attack already and lets attackers take control of a PC.

The PrintNightmare bug is being tracked as CVE-2021-1675 and CVE-2021-34527. It's a critical bug in the Windows print spooler with exploit code in the public domain before Microsoft had a chance to release a patch for it. Admins were advised to disable the Print Spooler service until a patch was made available.

Jul 07 06:28

Top programming languages: C and Java remain tops as Python surges

"The TIOBE index is celebrating its 20th anniversary this month. Back in 2001, the first TIOBE index was published as a personal hobby project to see what languages were in demand. The top 3 of the first TIOBE index were Java, C, and C++. Today's story looks strikingly similar," said Paul Jansen CEO TIOBE Software in a blog post.

The top of the rankings features a tight race with slims margins separating C, Java and Python.

"It is interesting to see that these 3 languages are getting closer than ever before. The difference between position 1 and position 3 is only 0.67%. This means that the next few months will be exciting," Jansen said.

Jul 06 21:15

Fake Chips Flood China Market, Fill Overseas Supply Chains

Counterfeit products have been circulated in China’s electronics market for a long time. However, as the global chip shortage intensifies, a large amount of refurbished, substandard fake chips are flood the market, exposing major deficiencies in China’s quality control standards.

China Economic Observer reported a chip agent revealed that to meet the growing demand, suppliers were no longer keeping their counterfeiting practices secret. Instead, they are openly creating separate production lines to expedite the sales of counterfeit or refurbished chips. Furthermore, businesses are no longer offering the shoddy products at half price. Many are being sold at full market value.

The agent identified two types of counterfeit chips. The first involves recycling used chips from e-waste by removing the logo and cleaning them for resale with new packaging. The second involves packaging the substandard chips from the regular production line and selling them as good products.

Jul 06 18:50

Healthcare Cyberattacks Increased Since Adoption of Electronic Health Records, Wireless Medical Devices, Telemedicine

By B.N. Frank

Hackers can cause catastrophic and sometimes even deadly results no matter who or what is targeted – businesses, community governments, hospitals, medical devices personal devices, security systems and other “Smart” home devices, utility companies, and/or utility “Smart” Meters. One researcher explains how cyberattacks are affecting the healthcare industry more than ever and why patients should be concerned (especially those with medical implants)...

Jul 06 13:38

Pentagon Cancels $10 Billion JEDI Cloud Deal Awarded To Microsoft

The Department of Defense on Tuesday announced the cancellation of a $10 billion 'JEDI' cloud services contract awarded to Microsoft in 2019, instead of Amazon - which thought it was a shoe-in before the Trump administration told Bezos and crew to pound sand.

According to the Pentagon, "due to evolving requirements, increased cloud conversancy, and industry advances, the JEDI Cloud contract no longer meets its needs."

Jul 06 13:34

Attorney Matt DePerno: A Security Breach of Election Registration Servers in Arizona Occurred on Nov. 3 – Sec of State Hobbs Knew About It But Kept It Hidden

Attorney Matt DePerno reported this morning on the Bannon War Room that there was a security breach of the registration servers in Arizona on November 3, 2020. The corrupt Secretary of State Katie Hobbs knew about this as well as the Maricopa County Board of Supervisors but they kept it hidden.

Jul 06 12:05

Your Older iPhone Won't Get These iOS 15 Features

The public beta of iOS 15 is out and available to install for anyone who wants to try it. Every handset that could run iOS 14 is eligible for the upgrade—that’s everything back to the iPhone 6s and 6s Plus from September 2015. However, not every compatible iPhone will get every iOS 15 feature. Here’s the small print in full.

What it really comes down to is the amount of power your iPhone has under the hood. Certain iOS 15 features require the A12 Bionic chip or something more powerful, and that chip made its debut in the iPhone XS, the iPhone XS Max, and the iPhone XR in 2018. Not only did it bring better performance than the A11 Bionic, it also had an improved Neural Engine for AI processing.

There are also a couple of features that only apply to newer models but that aren’t related to the A12 Bionic processor. If you don’t have an iPhone from 2018 or later, here’s what you’re going to miss out on—and why.

Jul 06 12:05

There’s a bizarre new iPhone bug you need to watch out for

Even though Apple devotes a lot of resources towards bolstering iPhone security, every so often a bizarre bug emerges out of nowhere. The most recent example was unearthed by security researcher Carl Schou a few weeks ago. Posting on Twitter, Schou relayed how something funky happened to his iPhone when he connected to a WiFi network named “%p%s%s%s%s%n”. Upon doing so, the WiFi on his iPhone stopped working and couldn’t be restored.

Beyond WiFi connectivity issues, Schou noticed that other network-oriented activities like AirDrop stopped working as well.

Jul 06 12:04

Fraudsters Use SpaceX's Starlink to Scam Desperate Internet Users in Iran

Desperate for Starlink? Well, watch out for fake websites pretending to offer the service.

The massive demand for SpaceX’s satellite internet system is starting to attract scammers out to exploit the need for high-speed broadband.

A look-alike Starlink website written in Persian has gone up at the domain Starlinkiran[.]com, which was noticed by users on Twitter and Reddit. The site is targeting Iranians with claims you can place an order for the beta version of the internet service.

Jul 06 10:07

Bitcoin “HOT TUB”?? New York power plant FURY as mining hub powered by 8,000 computers - and more could be coming…

Bitcoin “HOT TUB”?? New York power plant FURY as mining hub powered by 8,000 computers - and more could be coming…

Residents near Seneca Lake in New York were RAGING outside environmental offices over at a power plant used to power a massive Bitcoin mining operation that pumps 135MN gallons PER DAY back into the lake after cooling the computers.

NY State has a target of reducing carbon emissions by 40% by 2030, but a former EPA regional admin claimed “the state will not reach that goal” if the Greenidge Bitcoin mining operation continues.”

Jul 06 09:59

Actively exploited PrintNightmare zero-day gets unofficial patch

Free micropatches addressing the actively exploited PrintNightmare zero-day vulnerability in the Windows Print Spooler service are now available through the 0patch platform.

Jul 06 08:47

Critical flaws in Windows Print spooler service could allow for remote attacks

Microsoft is grappling with a couple of security holes in its Windows Print spooler service that could allow attackers to remotely control an affected system. Anyone able to exploit the more recent vulnerability of the two would be able to run code on the compromised computer with full system privileges. That attacker could then install software, modify data and create new user accounts, according to Microsoft.

The flaws affect all versions of Windows for clients and servers, including Windows 7, 8.1 and 10, as well as Server 2004, 2008, 2012, 2016 and 2019.

Webmaster's Commentary: 

The more complex these systems become, the easier it is for criminals (and government agencies) to break in.

Jul 06 08:34

Smart Devices Could Expose Homes to Thousands of Cyber Attacks a Week: New Report

By City AM

A home filled with smart devices could be exposed to thousands of hacking or unknown scanning attacks from around the world in a single week, according to a new report.

A real-world study carried out by consumer group Which recorded more than 12,000 attack attempts in a week, including 2,435 specific attempts to maliciously log into the devices with a weak default username and password.

This equates to 14 attempts every hour by real hackers to infiltrate the devices.

UK households now have more than 10 different connected devices on average, ranging from TVs to thermostats...

Jul 06 08:20

Kaseya ransomware attack: 1,500 companies affected, company confirms

Enterprise tech firm Kaseya has confirmed that around than 1,500 businesses were impacted as a result of an attack on its remote device management software, which was used to spread ransomware.

It appears that the attackers carried out a supply chain ransomware attack by leveraging a vulnerability in Kaseya's VSA software against multiple managed service providers (MSP) – and their customers.

"To date, we are aware of fewer than 60 Kaseya customers, all of whom were using the VSA on-premises product, who were directly compromised by this attack. While many of these customers provide IT services to multiple other companies, we understand the total impact thus far has been to fewer than 1,500 downstream businesses. We have not found evidence that any of our SaaS customers were compromised," Kaseya said in an update on the attack.

Jul 06 05:44

World Economic Forum (WEF) Announces Creation of Orwellian ‘Global Coalition for Digital Safety’

The World Economic Forum announced June 29 it will initiate a new “public-private partnership” with Big Tech and governments around the world to identify and uproot all opinions from the Internet that it considers “harmful.”

The WEF is one of those elitist organizations that wields enormous influence over the elected leaders of Western nations but which almost nobody in the general population has heard of.

Its members are internationalist corporate honchos and technocrats who meet once a year in Davos with the stated goal of working to “shape global, regional and industry agendas.”

It made a big splash last year with its highly touted “Great Reset,” which promises to use the pandemic as an “opportunity” to crash the world’s dollar-based, capitalist economic system and “build back better” under a more socialist and globally integrated system that mirrors the United Nations Agenda 2030 goals for Sustainable Development.

Webmaster's Commentary: 

I am not reassured.

Jul 05 11:19

More Satellites Launched for Low Earth Orbit for 5G/Internet of Things, Drones, Smart Cars, Agriculture, Asset Tracking, etc.

By B.N. Frank

Cybersecurity and privacy experts have been warning for many years about risks associated with all Internet of Things (IoT), “Smart”, and wireless “Wi-Fi” technology.

Additional experts have been warning against launching more telecommunication satellites for other significant reasons. Nevertheless, companies are still getting approval to launch more telecom satellites in the U.S. and worldwide except for in South Africa where they discovered 5G satellites were causing dangerous interference issues...

Jul 05 10:20

Microsoft Urges Azure Users to Update PowerShell to Patch RCE Flaw

Microsoft is urging Azure users to update the PowerShell command-line tool as soon as possible to protect against a critical remote code execution vulnerability impacting .NET Core.

The issue, tracked as CVE-2021-26701 (CVSS score: 8.1), affects PowerShell versions 7.0 and 7.1 and have been remediated in versions 7.0.6 and 7.1.3, respectively. Windows PowerShell 5.1 isn't impacted by the flaw.

Jul 05 09:00

Serious Warning Issued For Millions Of Apple iPhone Users

Following revelations last month that all iPhones are vulnerable to a simple WiFi hack, new research from Amichai Shulman, CTO of wireless security specialist AirEye, has claimed this type of threat is potentially more dangerous than was first reported and can also spread to macOS.

“Our response research on the format string flaw revealed that the vulnerability is not only restricted to the iOS operating system,” states Shulman. “It also has the potential to affect the macOS operating system used by many corporations for employee stations.”

Jul 05 08:52

Russia's parliament votes to unplug internet from world

Russian Duma deputies on Tuesday overwhelmingly supported a bill allowing Russia to create its own autonomous internet. The law will create an independent infrastructure for the Russian internet, or "Runet," which will essentially allow Russia to pull up its virtual drawbridges in case of attack.

A total of 307 lawmakers voted in favor of the law, while only 68 voted against it. In the coming days it will likely be approved by the upper house of parliament — the Federation Council — and signed into law by Russian President Vladimir Putin. It will then come into force on November 1, 2019.

The law has consistently received near unanimous backing from Duma deputies. Its authors say Russia's national security is at stake. The project will allow the domestic internet to continue working even when it is disconnected from non-Russian root servers. That means that the country would be prepared should other countries attempt to cut Russia off from the internet.

Jul 05 08:41

Cyber Polygon 2021: Globalists Run Simulation Of a Coming “Cyber Pandemic” To Prepare For Economic Reset

The globalists are setting the stage for the Great Reset with an upcoming high-profile simulation targeting cyber attacks against major financial institutions.

The World Economic Forum (WEF) will team up with the Russian government and global banks this July to simulate a major supply-chain “cyberpandemic” that could potentially “bring down the entire system.”

The simulation, called Cyber Polygon 2021, was announced by Russia’s largest state-run bank Sberbank in February.

“The key message voiced by experts at WEF and other international platforms is that supply chain security is to become a major cybersecurity issue in 2021,” Sberbank stated. “The ever-expanding digitalization tightens the interconnectivity between people, devices, companies and countries. Thus, the resilience of an entire system depends on the ability of each link within a chain to withstand threats of various grades.”

Jul 05 08:17

Ransomware Group REvil Strikes Again, Demands $70M in Bitcoin From 200 US Firms

Ransomware hacking group REvil brought the networks of at least 200 U.S. companies to their knees on Friday and is now demanding $70 million in bitcoin.

Australia’s ABC News reported on Saturday REvil had targeted software supplier Kaseya and used its network-management package to spread the ransomware via the cloud.
Over 1 million machines are said to be infected according to various other reports.
The Russian-based ransomware group is now demanding the bitcoin in exchange for a decrypter for the infected machines.

Webmaster's Commentary: 

This may be a false-flag to demonize Russia, or bring about more draconian control of the internet, or both!

Jul 05 07:59

Netflix may be forced to make a controversial change and you are not going to like it

Netflix has always been adamant that it won't force its users to watch adverts with CEO Reed Hastings saying last year: “We’ve got a much simpler business model, which is just focused on streaming and customer pleasure.

"There’s much more growth in the consumer market than there is in advertising, which is pretty flat.”

However, financial pressures and the growing list of streaming rivals may mean Netflix is forced to change its mind.

“Although Netflix management continues to strongly dismiss the idea of advertising, we think that view will be seen as a strategic mistake if future rates of subscriber growth start to fall short of Street expectations,” said Nathanson.

Jul 04 12:31

Massive DATA BREACH exposes personal data of 700 million users of Microsoft-owned LinkedIn

The data breach was discovered on June 22 when the hacker responsible advertised the sale of the data on a forum on the dark web. The hacker posted a sample of one million records on the dark web. From this sample, the data was confirmed to be genuine and up to date. Some of the personal information the hacker obtained include:

Email addresses
Full names
Phone numbers
Physical addresses
Geolocation records
LinkedIn usernames and profile URLs
Personal and professional experience and background
Genders
Connected social media accounts and usernames
Inferred salaries

The hacker was not able to obtain the LinkedIn passwords of the users nor any financial records. But the above-mentioned data is still valuable as it exposes LinkedIn users to a higher risk of exploitation by bad actors.

Jul 04 09:58

Concerned about Cybersecurity and Privacy? Deleting Data from Alexa, Echo, Smart Home/IoT Devices Isn’t Easy

By B.N. Frank

Privacy and security experts have been warning for many years about risks associated with all Internet of Things (IoT), “Smart”, and wireless devices and infrastructure. Warnings have been issued specifically for “home assistants” and security devices from Amazon, Google, and other companies as well. For those who want to dispose of these devices, it’s important to learn how to properly delete all data they have collected while operating in your home. According to a new article from Ars Technica, this is a lot harder than most people think...

Jul 03 17:22

Homes filled with smart devices could be exposed to thousands of hacking attacks in a week

Homes in the UK have an average of more than 10 different connected devices, from televisions to thermostats.

But, while these products have benefits, they can also be a potential target for hackers.

Consumer publication Which? set up a fake home with connected products bought online, including smart TVs, printers, wireless security cameras, and wifi kettles.

They were then connected to the internet, exposing them to cyber threats and malware.

Working with cyber security specialists NCC Group and the Global Cyber Alliance, Which? saw 1,017 unique scans or hacking attempts from around the world in just the first week, with at least 66 of these being malicious.

Jul 03 10:42

Agency Seeks Public Comments on How Much Americans Trust Artificial Intelligence (A.I.)

By B.N. Frank

Artificial Intelligence (A.I.) is NOT fail-safe – hence the creation of an A.I. “Hall of Shame” with a backlog of submissions that still need to be processed. In fact, complaints about Artificial Intelligence (A.I.) algorithm inaccuracies and misuse are reported fairly often.

Warnings about Artificial Intelligence and robots replacing human jobs are also reported fairly often. Amazon has been criticized for using this technology to fire flex workers as well. Even though a 2019 survey already revealed that 82% of Americans believed that A.I. was more harmful than helpful, one agency wants to know how much Americans trust it. Maybe it’s because President Biden recently committed to incorporating more A.I. into our lives. Of course, “Without trust…adoption of AI will slow or halt.” ...

Jul 03 10:30

Canada’s Orwellian “pre-crime” Hate Speech Bill – And Other Weekly News from the Global Dystopia

By Simon Black, Sovereign Man

Are you ready for this week’s absurdity? Here’s our Friday roll-up of the most ridiculous stories from around the world that are threats to your liberty, risks to your prosperity… and on occasion, inspiring poetic justice.

Canada plans to punish hate speech pre-crime

If passed, a bill in the Canadian legislature will punish online or in-person “hate speech” with a fine up to C$20,000 (about $16,000 USD) if it targets a specific person.

The law states that “hate speech means the content of a communication that expresses detestation or vilification of an individual or group of individuals on the basis of a prohibited ground of discrimination.”

Nice and vague, just the way they like it...

Jul 03 05:21

Arizona Auditors "Still Waiting" For "Missing Items" Subpoenaed From Maricopa County: Senate Leader

The Arizona state Senate will need to request routers and passwords that are being withheld by Maricopa County election officials to complete the audit of the 2020 election results, said an audit spokesman, while State Senate Leader Karen Fann said county executives still haven’t delivered several “missing items” related to a court-ordered subpoena issued earlier this year.

Former Arizona Secretary of State Ken Bennett (second from left) moves ballots during an election audit at Veterans Memorial Coliseum in Phoenix, Ariz., on May 1, 2021. (Courtney Pedroza/Getty Images)
Randy Pullen, a spokesman and liaison for the effort, said Thursday that after speaking with state Senators, they will determine the next steps to take. Some electronic data stored by Maricopa County needs to be evaluated by the audit team.

Jul 02 19:37

Windows 10 fans angry and confused as Windows 11 won't work with their PCs

Windows 11 will require eighth generation Intel chips or AMD Ryzen 2000 processors at the very least.

Machines will also need to support Secure Boot and TPM 2.0.

The long and short of it is if your PC shipped before 2017 it's unlikely you'll be able to install Windows 11.

Jul 02 15:10

Victory! Fourth Circuit Rules Baltimore’s Warrantless Aerial Surveillance Program Unconstitutional

By Saira Hussain and Hannah Zhao

The U.S. Court of Appeals for the Fourth Circuit ruled last week that Baltimore’s use of aerial surveillance that could track the movements of the entire city violated the Fourth Amendment.

The case, Leaders of a Beautiful Struggle v. Baltimore Police Department, challenged the Baltimore Police Department’s (BPD) use of an aerial surveillance program that continuously captured an estimated 12 hours of coverage of 90 percent of the city each day for a six-month pilot period...

Jul 01 18:01

John Deere Exec Says Population is Growing Quickly; Supports 5G for Farming Despite Cybersecurity, Biological, and Environmental Risks

By B.N. Frank

Research continues to be published that there are significant and potentially catastrophic cybersecurity, biological, and environmental associated with 5G. In fact, experts have warned specifically about cybersecurity risks with “Smart Farms” and Internet of Things (IoT) connected agriculture. Nevertheless, proponents still laud its use. Two green thumbs down...

Jul 01 12:28

Spot's On It

Jul 01 10:26

WHEN WILL THEY SHUT DOWN THE INTERNET? BY DR. VERNON COLEMAN

Jul 01 09:46

Amazon Uses Artificial Intelligence (A.I.) Algorithms to Fire Workers

By B.N. Frank

Warnings about Artificial Intelligence (A.I.) and robots replacing human jobs are nothing new. Complaints about algorithm inaccuracies and misuse continue to be reported as well. Nevertheless, Amazon is using algorithms to fire some of its workers...

Jul 01 06:09

Here are the 5 Steps to Optimize Your Magento Application for Better Performance

Following are the top 5 optimization that can help you to achieve the best Magento application performance:

Use Varnish
Magento 2 comes with a built-in Varnish solution that offers a perfect performance with ultimate best results.

In the previous versions of Magento 1, users had to install modules like “Phoenix” or “Turpentine” to integrate Varnish with the Magento platform. With Magento 2, Varnish integration is provided by default that concludes best Magento 2 page load speed optimization and performance.

Update the Magento Version
Magento regularly releases new version updates, focusing mostly on the platform’s security bugs and Magento optimization. There, the most basic and essential tip for improving Magento 2 speed optimization is to update your Magento store to the latest version.

Jul 01 05:53

The Cost of “Smart” Cities Include Cybersecurity, E-Waste, Environment and Pollution

A new meta-integrative qualitative research paper published in the journal Buildings presents the multi-level problems that could arise from the implementation of smart building structures, especially with 5G and IoT devices. Researchers found cybersecurity threats and radiation effects, “especially from 5G cells that can directly affect the individual, biologically and mentally.” The paper also focuses on e-waste and energy consumption.

The authors challenge the rhetoric that 5G is energy saving. The paper documents that because so many additional cell towers and antennas are required for 5G “the generic notion that wireless data transfer is energy-conserving or can act as a CO2 eliminator can be challenged.” The authors recommend a thorough analysis of the carbon emissions and environmental impacts of massive data centers and undersea optic cabling.

Jul 01 04:05

The Future of Internet Censorship? Comcast Cuts Off User's Internet Connection For Downloading Torrents

Comcast under CEO Brian Roberts is reportedly now cutting off their users' internet for allegedly downloading copyright-infringing torrents.

Jun 30 18:34

Maine Sets Example With “Country’s Strongest” Facial Recognition Ban

By Brett Wilkins

Civil liberties advocates on Wednesday cheered as Maine enacted what that state’s ACLU chapter called “the country’s strongest statewide facial recognition law.”

The new law—which sailed unanimously through both chambers of the state Legislature and was passed without any action from Democratic Gov. Janet Mills—bans the use of facial recognition technology by most state agencies and for the purpose of surveillance...

When the law goes into effect this October, it will prohibit the use of facial surveillance in schools...

Jun 30 09:55

Underground Fiber Optics Cables Allow People and Cars to Be Tracked. Did You Know?

By B.N. Frank

Some experts have raised concerns about underground fiber optics cables being used for unsafe “last mile wireless” with 5G and/or Wi-Fi. Some experts have raised concerns about fiber optics causing health issues in certain people. But what about privacy?

The U.S. Military seems to have been aware of fiber’s potential for surveillance since at least 1999. Activist Post has reported before about this before too.

"Vibrations from cars and pedestrians create unique signals in cables. Now scientists have used the trick to show how Covid-19 brought life to a halt."...

Jun 29 10:46

Apple Extends iPhone 12 Warning to AirPods, Apple Watch, iPads, Accessories and More

By B.N. Frank

Got medical implants? The warnings keep coming. Let’s recap:

- In 2016, the American Heart Association (AHA) warned that cell phones and other electronics could interfere with pacemakers and ICDs.

- Last month, the Food and Drug Administration (FDA) warned that both cell phones and smart watches could cause interference issues with medical implants.

- Earlier this month, the Journal of American Heart Association warned that Apple iPhone12 models could cause interference issues with pacemakers and other implants. Earlier this year, Apple had issued warnings as well.

Now Apple has issued the potential for interference issues with even more of their products...

Jun 29 10:32

Principal Brief Filed in Case Against FCC “OTARD” Rule Amendment Which Allows 5G/IoT Antennas on Private Property

By B.N. Frank

The Federal Communications Commission (FCC) has catered to the telecom and cable industries for decades. Lawsuits have been filed against it for NOT protecting the public from unsafe levels of cell phone and WiFi radiation as well as 5G on Earth and in space.

Children’s Health Defense (CHD) filed a lawsuit and emergency injunction against the agency’s amended “OTARD Rule” which allows private property owners to install 5G and WiFi antennas that broadcast into neighborhoods without obtaining a permit or notifying anybody. Unfortunately, in March a court ruled in favor of the amended rule. Earlier this week CHD filed a brief against this...

Jun 29 10:11

Knightscope’s Robots Have Scanned Billions Of Cellphones, Millions Of People And License Plates

By MassPrivateI

During the height of the pandemic, Knightscope posted a blog titled “By The Numbers” with the above image.

Their blog is basically a primer into everything that is wrong with unchecked corporate surveillance masquerading as public safety...

Jun 29 08:44

Malaysian activists hack into Israeli recruitment database

A Malaysian organisation calling itself DragonForce has said that it hacked into the database of an Israeli recruitment company, giving access to the details of hundreds of thousands of university students, local media outlets have reported.

i24 quoted Israeli sources as saying that the hackers collected the information from the website of AcadeMe which works with leading higher education institutions in Israel. They include Ben Gurion University, Tel Aviv University, the Open University, Bar-Ilan University, the Technion, and the University of Haifa, as well as many colleges.

According to cybersecurity expert May Brooks-Kempler in the Times of Israel, the hackers have so far leaked the details of some 280,000 students from 2014 to the present along with some 100,000 email addresses.

Jun 29 08:41

Ransomware: Paying up won't stop you from getting hit again, says cybersecurity chief

Ireland's Health Service Executive (HSE) has been praised for its response after falling victim to a major ransomware attack and for not giving into cyber criminals and paying a ransom.

HSE was hit with Conti ransomware in May, significantly impacting frontline health services. The attackers initially demanded a ransom of $20 million in bitcoin for the decryption key to restore the network.

While the gang eventually handed over a decryption key without receiving a ransom, they still published stolen patient data – a common technique by ransomware attackers, designed to pressure victims into paying.

Jun 28 18:17

Supreme Court Says You Can’t Sue the Corporation that Wrongly Marked You A Terrorist

By Cindy Cohn

In a 5-4 decision, the Supreme Court late last week barred the courthouse door to thousands of people who were wrongly marked as “potential terrorists” by credit giant TransUnion. The Court’s analysis of their “standing” —whether they were sufficiently injured to file a lawsuit—reflects a naïve view of the increasingly powerful role that personal data, and the private corporations that harvest and monetize it, play in everyday life. It also threatens Congressional efforts to protect our privacy and other intangible rights from predation by Facebook, Google and other tech giants...

Jun 28 16:26

Trump Joins Rumble, Rumble Changes Terms Of Service to Ban 'Anti-Semitic' And 'Hateful' Speech

Gab CEO Andrew Torba revealed earlier this month that Donald Trump never joined Gab because Jared Kushner "specifically had problems with people [on the site] criticizing Jewish people, and Zionism, and policies related to Israel."

"I mean, that's specifically what I was told, is 'You have to do something about these people.'" Torba said during an interview with TruNews. "He called them Jew haters, I call them Jew criticizers."

Torba said his refusal to "sell out" and "compromise on Gab's free speech policies" was a deal-breaker for Kushner and Trump's handlers.

Jun 28 15:28

Microsoft will require all Windows 11 laptops to have a webcam from 2023

Last night, Microsoft finally unveiled the much-anticipated Windows 11 update. The new update comes with an updated UI, performance, and productivity improvements. Microsoft also released the minimum system requirements for Windows 11 which includes Secure Boot and TPM 2.0 among other things, but the latter can be bypassed for now.

However, buried deep inside Microsoft's documentation was the webcam requirement. For now, Microsoft notes that both front and rear webcams are optional. However, the company adds that all devices (except desktop PCs) will be required to have a forward-facing webcam. This condition will kick in from January 1, 2023 and should force manufacturers to include a webcam in devices like laptops or tablets.

Jun 28 14:23

Document dump shows that Big Tech is most definitely censoring Americans at the behest of Big Government

It’s not just a left-right issue. Whether Republicans or Democrats, there is an actual written agreement between Big Tech and at least one state government to censor people who are critical of politicians. The Deep State documents are now a matter of public court record, made available by Dr. Shiva Ayyadurai. And according to the court record, the judge presiding over the case has insisted on the documents being entered into the public record because they are absolutely revolutionary.

Jun 28 11:44

Will your PC run Windows 11? Even Microsoft can't say for sure

You might think it's a simple, straightforward task to find out whether your current PC will run Windows 11. You also might think that if you went to Microsoft.com and paid nearly $5000 for a top-of-the-line Surface PC today, you'd be assured of being able to upgrade to Windows 11 in a few months, when it's ready for general release.

Think again. Microsoft can't quite get its upgrade story straight. And the clash between the company's engineering decisions and its marketing plan is about to cause screams of outrage from customers who will discover that their new or nearly new hardware just isn't good enough, in Microsoft's eyes.

Jun 28 06:56

Officials raised concerns for years about security of U.S. voting machines, software systems

The Dominion Voting Systems, which has been used in multiple states where fraud has been alleged in the 2020 U.S. Election, was rejected three times by data communications experts from the Texas Secretary of State and Attorney General’s Office for failing to meet basic security standards.

Unlike Texas, other states certified the use of the system, including Pennsylvania, where voter fraud has been alleged on multiple counts this week.

Dominion Voting Systems, a Canadian company headquartered in Denver, is one of three companies primarily used in U.S. elections. The others are Election Systems and Software and Texas based-Hart InterCivic.

The Dominion system was implemented in North Carolina and Nevada, where election results are being challenged, and in Georgia and Michigan, where a “glitch” that occurred reversed thousands of votes for Republican President Donald Trump to Democrat Joe Biden.

Jun 27 06:19

Read this and you won't click 'I agree' ever again: We're being spied on by phones, computers, TVs, cars – even the doorbells. Worse, argues Oxford professor CARISSA VELIZ, we're doing it to ourselves by giving away our data

Most of us know that our personal data is being collected, stored and analysed thanks to our relationship with our mobile phones, computers and the internet. But are we really aware of the full extent of the privacy invasions into our daily lives?

Let's start at dawn. What is the first thing you do when you wake up? You probably check your phone.

By doing that, you are informing a whole host of busybodies – your smartphone manufacturer, app developers and your mobile company, as well as intelligence agencies (if they happen to be watching you) – what time you wake up, where you've been sleeping and who you share a bed with, providing they keep their phone with them too.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA