COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED

COMPUTERS/INTERNET/SECURITY

Jun 30 09:55

Underground Fiber Optics Cables Allow People and Cars to Be Tracked. Did You Know?

By B.N. Frank

Some experts have raised concerns about underground fiber optics cables being used for unsafe “last mile wireless” with 5G and/or Wi-Fi. Some experts have raised concerns about fiber optics causing health issues in certain people. But what about privacy?

The U.S. Military seems to have been aware of fiber’s potential for surveillance since at least 1999. Activist Post has reported before about this before too.

"Vibrations from cars and pedestrians create unique signals in cables. Now scientists have used the trick to show how Covid-19 brought life to a halt."...

Jun 29 10:46

Apple Extends iPhone 12 Warning to AirPods, Apple Watch, iPads, Accessories and More

By B.N. Frank

Got medical implants? The warnings keep coming. Let’s recap:

- In 2016, the American Heart Association (AHA) warned that cell phones and other electronics could interfere with pacemakers and ICDs.

- Last month, the Food and Drug Administration (FDA) warned that both cell phones and smart watches could cause interference issues with medical implants.

- Earlier this month, the Journal of American Heart Association warned that Apple iPhone12 models could cause interference issues with pacemakers and other implants. Earlier this year, Apple had issued warnings as well.

Now Apple has issued the potential for interference issues with even more of their products...

Jun 29 10:32

Principal Brief Filed in Case Against FCC “OTARD” Rule Amendment Which Allows 5G/IoT Antennas on Private Property

By B.N. Frank

The Federal Communications Commission (FCC) has catered to the telecom and cable industries for decades. Lawsuits have been filed against it for NOT protecting the public from unsafe levels of cell phone and WiFi radiation as well as 5G on Earth and in space.

Children’s Health Defense (CHD) filed a lawsuit and emergency injunction against the agency’s amended “OTARD Rule” which allows private property owners to install 5G and WiFi antennas that broadcast into neighborhoods without obtaining a permit or notifying anybody. Unfortunately, in March a court ruled in favor of the amended rule. Earlier this week CHD filed a brief against this...

Jun 29 10:11

Knightscope’s Robots Have Scanned Billions Of Cellphones, Millions Of People And License Plates

By MassPrivateI

During the height of the pandemic, Knightscope posted a blog titled “By The Numbers” with the above image.

Their blog is basically a primer into everything that is wrong with unchecked corporate surveillance masquerading as public safety...

Jun 29 08:44

Malaysian activists hack into Israeli recruitment database

A Malaysian organisation calling itself DragonForce has said that it hacked into the database of an Israeli recruitment company, giving access to the details of hundreds of thousands of university students, local media outlets have reported.

i24 quoted Israeli sources as saying that the hackers collected the information from the website of AcadeMe which works with leading higher education institutions in Israel. They include Ben Gurion University, Tel Aviv University, the Open University, Bar-Ilan University, the Technion, and the University of Haifa, as well as many colleges.

According to cybersecurity expert May Brooks-Kempler in the Times of Israel, the hackers have so far leaked the details of some 280,000 students from 2014 to the present along with some 100,000 email addresses.

Jun 29 08:41

Ransomware: Paying up won't stop you from getting hit again, says cybersecurity chief

Ireland's Health Service Executive (HSE) has been praised for its response after falling victim to a major ransomware attack and for not giving into cyber criminals and paying a ransom.

HSE was hit with Conti ransomware in May, significantly impacting frontline health services. The attackers initially demanded a ransom of $20 million in bitcoin for the decryption key to restore the network.

While the gang eventually handed over a decryption key without receiving a ransom, they still published stolen patient data – a common technique by ransomware attackers, designed to pressure victims into paying.

Jun 28 18:17

Supreme Court Says You Can’t Sue the Corporation that Wrongly Marked You A Terrorist

By Cindy Cohn

In a 5-4 decision, the Supreme Court late last week barred the courthouse door to thousands of people who were wrongly marked as “potential terrorists” by credit giant TransUnion. The Court’s analysis of their “standing” —whether they were sufficiently injured to file a lawsuit—reflects a naïve view of the increasingly powerful role that personal data, and the private corporations that harvest and monetize it, play in everyday life. It also threatens Congressional efforts to protect our privacy and other intangible rights from predation by Facebook, Google and other tech giants...

Jun 28 16:26

Trump Joins Rumble, Rumble Changes Terms Of Service to Ban 'Anti-Semitic' And 'Hateful' Speech

Gab CEO Andrew Torba revealed earlier this month that Donald Trump never joined Gab because Jared Kushner "specifically had problems with people [on the site] criticizing Jewish people, and Zionism, and policies related to Israel."

"I mean, that's specifically what I was told, is 'You have to do something about these people.'" Torba said during an interview with TruNews. "He called them Jew haters, I call them Jew criticizers."

Torba said his refusal to "sell out" and "compromise on Gab's free speech policies" was a deal-breaker for Kushner and Trump's handlers.

Jun 28 15:28

Microsoft will require all Windows 11 laptops to have a webcam from 2023

Last night, Microsoft finally unveiled the much-anticipated Windows 11 update. The new update comes with an updated UI, performance, and productivity improvements. Microsoft also released the minimum system requirements for Windows 11 which includes Secure Boot and TPM 2.0 among other things, but the latter can be bypassed for now.

However, buried deep inside Microsoft's documentation was the webcam requirement. For now, Microsoft notes that both front and rear webcams are optional. However, the company adds that all devices (except desktop PCs) will be required to have a forward-facing webcam. This condition will kick in from January 1, 2023 and should force manufacturers to include a webcam in devices like laptops or tablets.

Jun 28 14:23

Document dump shows that Big Tech is most definitely censoring Americans at the behest of Big Government

It’s not just a left-right issue. Whether Republicans or Democrats, there is an actual written agreement between Big Tech and at least one state government to censor people who are critical of politicians. The Deep State documents are now a matter of public court record, made available by Dr. Shiva Ayyadurai. And according to the court record, the judge presiding over the case has insisted on the documents being entered into the public record because they are absolutely revolutionary.

Jun 28 11:44

Will your PC run Windows 11? Even Microsoft can't say for sure

You might think it's a simple, straightforward task to find out whether your current PC will run Windows 11. You also might think that if you went to Microsoft.com and paid nearly $5000 for a top-of-the-line Surface PC today, you'd be assured of being able to upgrade to Windows 11 in a few months, when it's ready for general release.

Think again. Microsoft can't quite get its upgrade story straight. And the clash between the company's engineering decisions and its marketing plan is about to cause screams of outrage from customers who will discover that their new or nearly new hardware just isn't good enough, in Microsoft's eyes.

Jun 28 06:56

Officials raised concerns for years about security of U.S. voting machines, software systems

The Dominion Voting Systems, which has been used in multiple states where fraud has been alleged in the 2020 U.S. Election, was rejected three times by data communications experts from the Texas Secretary of State and Attorney General’s Office for failing to meet basic security standards.

Unlike Texas, other states certified the use of the system, including Pennsylvania, where voter fraud has been alleged on multiple counts this week.

Dominion Voting Systems, a Canadian company headquartered in Denver, is one of three companies primarily used in U.S. elections. The others are Election Systems and Software and Texas based-Hart InterCivic.

The Dominion system was implemented in North Carolina and Nevada, where election results are being challenged, and in Georgia and Michigan, where a “glitch” that occurred reversed thousands of votes for Republican President Donald Trump to Democrat Joe Biden.

Jun 27 06:19

Read this and you won't click 'I agree' ever again: We're being spied on by phones, computers, TVs, cars – even the doorbells. Worse, argues Oxford professor CARISSA VELIZ, we're doing it to ourselves by giving away our data

Most of us know that our personal data is being collected, stored and analysed thanks to our relationship with our mobile phones, computers and the internet. But are we really aware of the full extent of the privacy invasions into our daily lives?

Let's start at dawn. What is the first thing you do when you wake up? You probably check your phone.

By doing that, you are informing a whole host of busybodies – your smartphone manufacturer, app developers and your mobile company, as well as intelligence agencies (if they happen to be watching you) – what time you wake up, where you've been sleeping and who you share a bed with, providing they keep their phone with them too.

Jun 26 19:56

Microsoft admits to signing rootkit malware in supply-chain fiasco

Microsoft has now confirmed signing a malicious driver being distributed within gaming environments.

This driver, called "Netfilter," is in fact a rootkit that was observed communicating with Chinese command-and-control (C2) IPs.

G Data malware analyst Karsten Hahn first took notice of this event last week and was joined by the wider infosec. community in tracing and analyzing the malicious drivers bearing the seal of Microsoft.

This incident has once again exposed threats to software supply-chain security, except this time it stemmed from a weakness in Microsoft's code-signing process.

Jun 26 18:15

Collapsed Miami Condos’ Rooftop Cell Tower Also Being Investigated in Class-Action Lawsuit

By B.N. Frank

Cell towers and antennas can and do collapse and/or catch fire. The Electronic Silent Spring website provides a list of incidents. Activist Post has reported about this as well. In fact, there was a cell tower fire earlier this year on top of an apartment building roof.

It’s too soon to tell whether the cell tower on the roof of the Miami Surfside building had anything to do with what happened there, but it's definitely being investigated...

Jun 26 14:02

Decoding California’s New Digital Vaccine Records and Potential Dangers

By Alexis Hancock, Adam Schwartz, and Jon Callas

The State of California recently released what it calls a “Digital COVID-19 Vaccine Record.” It is part of that state’s recent easing of public health rules on masking within businesses. California’s new Record is a QR code that contains the same information as is on our paper vaccine cards, including name and birth date. We all want to return to normal freedom of movement while keeping our communities safe. But we have two concerns with this plan:

First, with minimal effort, businesses could use the information in the vaccination record to track the time and place of our comings and goings, pool that information with other businesses, and sell these dossiers of our movements to the government. We shouldn’t have to submit to a new surveillance technology that threatens pervasive tracking of our movements in public places to return to normal life...

Jun 26 11:44

The Switched-On, Censorious Billionaires of Silicon Valley Are Now The Greatest Threat To Free Speech And The Pursuit of Truth

George Orwell would have congratulated the framers of this for its open-ended vacuity. Here we have Facebook brazenly setting out how it will determine what the public interest is, who and what they can censor, and more chillingly, what they deem to be harmful. -- The arrogance is beyond comprehension. How a prominent scientist trying to politely educate the public about a controversial science issue in 2015 constitutes any transgression of these guidelines is truly unfathomable.

Jun 26 08:26

MEET JIGSAW: GOOGLE’S INTELLIGENCE AGENCY

It’s no secret that Google regularly collaborates with intelligence agencies. They are a known NSA subcontractor. They launched Google Earth using a CIA spy satellite network. Their executive suite’s revolving door with DARPA is well known.

Jun 26 05:48

How An Obscure App Turned Millions Into Unwitting Spies For The US Military

According to WSJ, Premise is one of a growing number of companies that are straddling "the divide between consumer services and government surveillance and rely on the proliferation of mobile phones as a way to turn billions of devices into sensors that gather open-source information useful to government security services."

Premise's CEO even hinted that the company had been tapped by foreign governments to help with setting policy about how to deal with "vaccine hesitancy".

"Data gained from our contributors helped inform government policy makers on how to best deal with vaccine hesitancy, susceptibility to foreign interference and misinformation in elections, as well as the location and nature of gang activity in Honduras," Premise Chief Executive Officer Maury Blackman said. The company declined to name its clients, citing confidentiality.

Jun 26 05:37

"I'm Totally Screwed": Western Digital Tells Customers To Unplug Web-Connected Hard Drives After Data Mysteriously Deleted

Hard drive manufacturer Western Digital recommended that My Disk external hard drive owners unplug them from the internet until further notice, after a flood of customers complained in a support forum that all their data had been mysteriously deleted, according to Ars Technica.

"I have a WD mybook live connected to my home LAN and worked fine for years," wrote the person who started the thread. "I have just found that somehow all the data on it is gone today, while the directories seems there but empty. Previously the 2T volume was almost full but now it shows full capacity."

"All my data is gone too," another user responded. "I am totally screwed without that data... years of it."

Multiple users reported that the data loss coincided with a factory reset that was performed on their devices. One person posted a log that showed unexplained behavior occurring on Wednesday:

Jun 25 14:56

Smart Meters “quietly broadcasting data” That May Reveal What Infrastructure Was Protected During Texas Snowstorm

By B.N. Frank

American opposition to utility “Smart” Meters – electric, gas, and water – has been ongoing due to safety and privacy concerns. Because “Smart” Meters are 2-way wireless transmitting, they allow utility companies to collect customer usage data 24/7 which they can use to try to sell more products and services to customers and/or sell the data to 3rd parties to do whatever they want with it.

“Smart” Meters also allow them to remotely control services as well as ration customer energy use. Utilities can’t do this with traditional 1-way analog meters. Because of the 2-way wireless transmitting feature, “Smart” Meters are also at a high risk for cybersecurity issues. A hacker recently used the vulnerability of smart “Smart” Meters to learn more about what happened during the Texas snowstorm...

Jun 25 10:54

Exclusive: Hacker reveals smart meters are spilling secrets about the Texas snowstorm

Power companies across Texas have refused to disclose which areas of the state were exempt from controlled blackouts after a devastating snowstorm crippled the power grid in February—but one hacker has found that smart meters, the electrical devices on the sides of homes and businesses that monitor energy consumption, are quietly broadcasting data that could be used to determine what infrastructure may have been protected.

In the days following the historic freeze, companies tied to the state’s privately-run grid were met with pressing questions from citizens and lawmakers alike over how it was decided who would and who wouldn’t be plunged into darkness.

A Dallas-based hardware hacker and security researcher known as Hash first noticed one such refusal in early March from Austin Energy, a publicly-owned utility provider in the Texas capital.

Jun 25 09:23

Windows 11: Microsoft deletes these Windows 10 features and apps

With today's Windows 11 announcement, Microsoft focused mainly on the flashy new features it's bringing to the next version of its flagship operating system, like a new Start menu and widgets.

But Microsoft giveth, and Microsoft taketh away. A slew of once-hyped Windows 10 features and a handful of apps will vanish along with the Windows 10 upgrade. The details, in trademark Microsoft fashion, are buried in the fine print -- specifically, in a document misleadingly titled "Windows 11 Specifications."

Jun 24 14:36

The Overlapping Infrastructure of Urban Surveillance, and How to Fix It

By Matthew Guariglia

Between the increasing capabilities of local and state police, the creep of federal law enforcement into domestic policing, the use of aerial surveillance such as spy planes and drones, and mounting cooperation between private technology companies and the government, it can be hard to understand and visualize what all this overlapping surveillance can mean for your daily life. We often think of these problems as siloed issues. Local police deploy automated license plate readers or acoustic gunshot detection. Federal authorities monitor you when you travel internationally.

But if you could take a cross-section of the average city block, you would see the ways that the built environment of surveillance—its physical presence in, over, and under our cities—makes this an entwined problem that must be combated through entwined solutions.

Jun 24 14:04

Kids’ Apps That Don’t Comply with Data Collecting Regulations Make Targeted Advertising Easy

By B.N. Frank

Experts have been issuing warnings about kids’ excessive use of screens and social media since long before the COVID crisis. In fact, for many years already “Silicon Valley Parents” (including Bill Gates and the late Steve Jobs) have gone to great lengths to protect their own kids from exposure.

Unfortunately, this has not deterred Big Tech companies and its proponents from continuing to create and market products to children. Parents concerned about their kids’ privacy may be alarmed to learn how much of their personal information is being collected and used...

Jun 24 11:03

Your IoT Device is Likely Spying on You through Backdoor Security Flaws

Many people are used to trading privacy for convenience these days. After all, this is how those with nefarious agendas get people to adopt technology that continually spies on them. IoT technology is no different. A recently discovered security vulnerability from a major manufacturer of IoT devices has exposed just how dangerous this technology can be. The following article from TweakLibrary details how this sort of surveillance technology can wreak havoc upon our lives. – Truth Unmuted Editor Jesse Smith

This Security Vulnerability Could Change An IoT Device Into A Nasty Spy

Jun 24 10:54

License Plate Readers Are Ticketing Cars For Polluting The Air

By MassPrivateI

Forget all the exaggerated claims public officials told you about CCTV cameras and public safety. Move over Vision Zero proponents, because there is a new player in town.

License plate readers that can ID and fine vehicles for polluting the air will soon be coming to a city near you.

Siemens Mobility, the license plate reader company that made over €14.2 billion during the pandemic, has the audacity to try and convince the public that they are concerned about pollution in major cities.

It has taken Siemens only two years to combine license plate reading cameras with vehicle pollution sensors...

Jun 24 09:57

Dell SupportAssist bugs put over 30 million PCs at risk

Security researchers have found four major security vulnerabilities in the BIOSConnect feature of Dell SupportAssist, allowing attackers to remotely execute code within the BIOS of impacted devices.

According to Dell's website, the SupportAssist software is "preinstalled on most Dell devices running Windows operating system," while BIOSConnect provides remote firmware update and OS recovery features.

The chain of flaws discovered by Eclypsium researchers comes with a CVSS base score of 8.3/10 and enables privileged remote attackers to impersonate Dell.com and take control of the target device's boot process to break OS-level security controls.

Jun 24 06:46

The National Guard Just Simulated A Cyberattack That Brought Down Utilities Nationwide

National Guardsmen just completed a two-week training exercise which saw them respond to a simulated cyberattack that took out critical utilities across the United States. The exercises have become an annual event, but this year took on even more significance after coming on the heels of several major ransomware and cyber attacks that crippled large parts of American infrastructure in recent months.

Jun 23 19:05

Study Shows Algorithm That Predicts Deadly Hospital Infections is Far From Perfect — And Other A.I. Health Woes

By B.N. Frank

Artificial Intelligence (AI) technology operates using algorithms. This doesn’t guarantee accuracy. In fact, earlier this month, Activist Post reported about an “Artificial Intelligence Hall of Shame.” The following systems seem to qualify...

Jun 23 18:51

Theme Park Operator That Collected Customers’ Fingerprint Data to Pay $36M

By B.N. Frank

Illinois has a state law that protects residents’ biometric information. Six years ago a federal lawsuit was filed against Facebook for violating this law by using Facial Recognition technology in its “tag suggestion” services. Eventually, the company agreed to pay $650M to settle the lawsuit. Now Six Flags has to pay for being creepy...

Jun 23 13:51

Antivirus software pioneer John McAfee dead after prison suicide: report

Antivirus software tycoon John McAfee died by an apparent suicide in a Spanish jail cell Wednesday evening — hours after reports surfaced that he would be extradited to face federal charges in the US, according to local media. 

Jun 23 12:43

Samsung Networks, Intel And Ericsson Driving 5G Network Transformation Effort

Intel kicked things off with an event it dubbed Edge of Wonderful, during which the company described the ongoing evolution of 5G networks and the possibilities for powering critical edge computing applications. As part of the bigger picture discussion, Intel also unveiled a number of specific new products targeted at enabling some of these new capabilities. The latest addition to its Agilex line of FPGA chips accelerates cryptography for keeping data encrypted over 5G networks, and a new Synchronous Ethernet (SyncE) network card, part of the company’s Ethernet 800 Series, is designed for timing sensitive network applications.

Jun 23 11:55

Democrats now demand all “hate speech” be banned from the internet… but THEY get to define hate speech, of course

The left-wing would love for nothing more than to abolish the First Amendment in the name of fighting “hate.” -- The op-ed goes on to compare free speech that offends liberals to “shouting fire in a crowded theater” and causing panic. Both, Riggleman and Rosen contend, must be banned to keep everyone safe from “hate.”

Jun 23 06:23

DuckDuckGo draws $100M from Internet pioneers, but don’t expect a fancy HQ

DuckDuckGo, the Paoli-based search engine that vows not to track users or sell their data, is preparing to launch a full-scale desktop browser, among other products, now that a squad of internet pioneers has bet $100 million on its success.

Founder Gabriel Weinberg started the firm in 2008 with capital raised by the sale of the social-media firm he ran as an MIT student. DuckDuckGo has grown to 129 employees, many of them software developers who work remotely, away from the company’s modest headquarters in a rowhouse-sized office building on Paoli Pike, a block from an Amtrak-SEPTA station.

As a private firm, DuckDuckGo doesn’t publish financials. But last week Weinberg posted online a brief report: The company “has been profitable since 2014 and today our revenue [from site advertising sales] exceeds $100 million a year, giving us the financial resources to continue growing rapidly.”

Jun 23 06:12

Brave launches Google Search alternative that gives users ‘ultimate privacy’

Google excels at creating internet apps and services that users absolutely love. The best part about it is that the vast majority of Google apps are available for free to anyone with a computer or a phone. But that’s also the worst part about it. Google customers do pay for the apps they use for free. Whether they realize it or not, and whether they accept it or not, they pay with their data. All Google apps collect massive amounts of information about the user, and all the separate data points are used to build profiles that are then served personalized ads. It’s how Google makes money and how it’s able to keep updating its services.

Jun 22 19:17

Understanding Amazon Sidewalk

By Jon Callas

Just before the long weekend at the end of May, Amazon announced the release of their Sidewalk mesh network. There are many misconceptions about what it is and what it does, so this article will untangle some of the confusion...

Jun 22 18:16

A Long Overdue Reckoning For Online Proctoring Companies May Finally Be Here

EFF Legal Intern Haley Amster contributed to this post.

Over the past year, the use of online proctoring apps has skyrocketed. But while companies have seen upwards of a 500% increase in their usage, legitimate concerns about their invasiveness, potential bias, and efficacy are also on the rise. These concerns even led to a U.S. Senate inquiry letter requesting detailed information from three of the top proctoring companies—Proctorio, ProctorU, and ExamSoft—which combined have proctored at least 30 million tests over the course of the pandemic. Unfortunately, the companies mostly dismissed the senators’ concerns, in some cases stretching the truth about how the proctoring apps work, and in other cases downplaying the damage this software inflicts on vulnerable students...

Jun 22 18:05

Billions of CVS patient records exposed due to “cloud storage misconfiguration”

More than one billion customer records at CVS Health were released to the public due to what experts believe was an accidental “cloud storage misconfiguration.”

Once again highlighting the serious risks involved with electronic medical records, a vendor of CVS Health apparently uploaded the records into the system without creating any type of password or authentication firewall, effectively exposing them all to the world.

Researchers say that the data points can easily be strung together to create an “extremely personal snapshot of someone’s medical situation. CVS Health is now on the hook for this massive breach of private medical records.

Jun 22 15:22

SiFive’s brand-new P550 is one of the world’s fastest RISC-V CPUs

Today, RISC-V CPU design company SiFive launched a new processor family with two core designs: P270 (a Linux-capable CPU with full support for RISC-V's vector extension 1.0 release candidate) and P550 (the highest-performing RISC-V CPU to date).

A quick RISC-V overview
For those not immediately familiar with RISC-V, it is a relatively new CPU architecture which takes advantage of Reduced Instruction Set Computer (RISC) principles. RISC-V is an open standard specifically designed to be forward-looking and evade as much legacy cruft as possible. One example of this design is RISC-V's dynamic width vector instruction set, which allows developers to execute vector instructions on data of arbitrary size with maximum efficiency.

Jun 22 14:30

AG Merrick Garland Declares War On The Open Internet: Seizes Domains Of Press TV And MidEast News Sites

Biden-appointed Attorney General Merrick Garland on Tuesday seized the domains of Iranian state media outlet Press TV as well as a bunch of other media outlets from throughout the Middle East.

The mass seizure of Middle East news websites comes just weeks after Israel decidedly lost the propaganda war in their latest bombing campaign in Gaza.

Jun 22 13:28

Intel is embracing an open-source chip design from SiFive, a startup it's rumored to want to buy for $2 billion. It could reshape the whole chip industry.

  • A growing number of companies are using open-source licenses to develop RISC-V-based processors.
  • SiFive recently released two of the new chip designs and is rumored to be in acquisition talks with Intel.
  • The SiFive P270 and P550 are faster and have more features than previous-gen products and are more economical to produce.

SiFive, a prominent player in the chip industry, just announced a new family of processor cores that push the feature set and performance of RISC-V to new heights — and industry giant Intel is already on board.

At this very moment, the device you're using to read this text most likely uses x86 or Arm instructions, the most commonly used in chips across the processor industry. In recent years, however, the open-source RISC-V instruction set architecture has been making waves - thanks to SiFive.

Jun 22 12:54

The U.S. Wakes Up To China’s AI Threat

I was talking to a friend who is an expert in AI and he told me that he thought the U.S. was at a major inflection point, similar to the one we had after the U.S.S.R. launched its Sputnik satellite.

He reminded me that in 1957, the Soviet Union launched the first artificial satellite that took about 98 minutes to orbit the earth. According to Nasa’s History Division, “That launch ushered in new political, military, technological, and scientific developments. While the Sputnik launch was a single event, it marked the start of the space age and the U.S.-U.S.S.R space race.”

My friend believes the U.S. needs to have another Sputnik moment, but this time the threat comes from a high-tech challenge from China. China has emerged as a powerhouse in AI and ML research and is raising its tech R&D spending by 7% per year.

Jun 22 12:04

A hacker tried to poison the water supply in another major US city

... the way a hacker nearly poisoned the water supply of another major US city, this time San Francisco, earlier this year.

NBC News revealed details of the heretofore unreported incident a few days ago, as part of a larger deep-dive into the disastrously porous state of the security associated with water supply systems around the US. In brief: On January 15, the week after the insurrection at the US Capitol that was still dominating national news headlines, a hacker embarked on this mission. Armed with a password and username for an employee’s TeamViewer account, this hacker logged into the San Francisco water system’s computer network remotely and started deleting programs associated with the treatment of drinking water.

Jun 22 09:18

'I was humiliated': The continuing trauma of South Korea's spy cam victims

It took another three years before the shocking truth about the TV personality was presented to a judge.

Police received a tip-off about videos on his phone in 2019 and finally issued a warrant to seize it. They found he had secretly filmed images of 12 women, including Kyung-mi, and had shared them on a chatroom with his celebrity friends.

Jun 22 09:11

Have we reached peak ransomware? How the internet's biggest security problem has grown and what happens next

Ransomware has become such a significant problem that now even leaders of the global superpowers are discussing these attacks at high-profile summits.

The cyberattacks – which involve criminals encrypting networks and demanding payments that can reach millions of dollars in exchange for the decryption key – were one of the key discussion points during the first face-to-face meeting of US President Joe Biden and Russian President Vladimir Putin.

Ransomware was on the agenda following several high-profile campaigns against US targets, which caused significant disruption.

Jun 22 07:51

Facebook welcomes Team Trump back with open arms and wallets

Throw Zuck' 16.8 million bones and you can do whatever you want, apparently

Facebook is doing a terrible job of banning Donald Trump from its platform.
From its failure to hold the former president accountable for the myriad misinformation campaigns conducted on his behalf by members of his campaign team from 2015 through 2018, to the most recent nonsense, it’s apparent that Facebook’s somehow vested in keeping Trump on the social network.

Up front: Facebook’s allowing “Team Trump,” a Page directly associated with numerous leadership and conservative PACs run by Donald Trump, to remain up and advertising on the site as of today, 21 June.

According to a report from FWIW:
The official Team Trump page is now owned by the former President’s political action committee, Save America. Save America is an entity directly controlled by Donald Trump, and Team Trump has not posted on Facebook since March 17th.

Jun 22 05:47

China Crackdown On Bitcoin Sends Retail Graphics-Card Prices Lower Despite Ongoing Scalping

Bitcoin, Ether, and most other crypto tokens tumbled to their lowest levels in more than a week Monday morning amid a continued crackdown on cryptocurrency miners by China, as the PBOC, China's central bank, requested a meeting with Alipay and several local banks over providing services to crypto traders.

As of 1400 ET, BTC was trading around $32,292, a plunge of more than 9% over the past 24 hours and a halving since its all-time high of nearly $65,000 in mid-April.

The continuing crackdown on crypto and mining in China has sent shockwaves worldwide - most of them are bad for the crypto community as miners may have to relocate. But there may be a near-term silver lining, as the most critical component in mining operations, graphics cards, saw prices plunge from record highs - at least for those fortunate enough to score one from retailers at MSRP.

Jun 21 17:05

This real estate billionaire will invest $ 100 million to replace Facebook

Real estate billionaire Frank McCourt is determined to replace Facebook and will invest about $ 100 million to do so. The former owner of the Los Angeles Dodgers baseball team, has created Project Liberty with which he intends to take power away from Mark Zuckerberg's social network and other dominant apps with respect to the social connection data of Internet users.

McCourt's idea is to build a publicly accessible database of people's social connections, Bloomberg reports. This would allow users to have control over their records and move them between different social networks, instead of being limited to a few dominant applications.

Jun 21 13:19

New Windows 10 Security Shock As 1,000 Vulnerabilities Revealed

According to research from Beyond Trust, the total number of vulnerabilities relating to Microsoft products had risen by 48% comparted to 2019. To break the numbers down, I looked to my go-to for vulnerability statistics, Stack Watch.

This is where things get interesting for Microsoft watchers, with the company taking top place, by vendor, with 1,188 published security vulnerabilities in 2020 compared to Google, in second place, on 950. Apple, for the record, came in at number eight with 381 vulnerabilities.

At the time of writing, the 2021 statistics are similar in terms of positioning: Microsoft at number one with 510 vulnerabilities, Google just behind on 507 and Apple down in ninth with 147.

How does Windows 10 compare to Android or iOS in security vulnerability terms?
What if we were to look at product rather than vendor? Would Microsoft fare any better? Erm, no is the answer.

Jun 21 11:00

China Chips Away at the US Chip Wall

China’s output of integrated circuits (IC) in May reached an all-time, single-month high as the country pulled out all stops to produce chips amid a severe global shortage of semiconductors, according to data released by the central government on Wednesday.

China’s IC output in May surged 37.6 per cent from a year ago to 29.9 billion units, the National Bureau of Statistics data showed.

Separately, the nation’s automobile output for last month slid by 5 per cent year on year, according to the bureau’s data. Carmakers have been particularly hard hit by the chip shortage.

May’s output of chips marked an increase from 28.7 billion units in April and 29.1 billion in March, showing that Chinese IC producers have been running at full capacity.

Jun 21 10:43

IBM quits facial recognition, joins call for police reforms

IBM is getting out of the facial recognition business, saying it's concerned about how the technology can be used for mass surveillance and racial profiling.

Ongoing protests responding to the death of George Floyd have sparked a broader reckoning over racial injustice and a closer look at the use of police technology to track demonstrators and monitor American neighborhoods.

IBM is one of several big tech firms that had earlier sought to improve the accuracy of their face-scanning software after research found racial and gender disparities. But its new CEO is now questioning whether it should be used by police at all.

“We believe now is the time to begin a national dialogue on whether and how facial recognition technology should be employed by domestic law enforcement agencies,” wrote CEO Arvind Krishna in a letter sent Monday to U.S. lawmakers.

Jun 21 10:29

Google force installs Massachusetts MassNotify Android COVID app

Google is force-installing a Massachusetts COVID-19 tracking app on residents' Android devices without an easy way to uninstall it.

For the past few days, users have reported that Google silently installed the Massachusetts 'MassNotify' app on their devices without the ability to open it or find it in the Google Play Store.

"This installed silently on my daughter's phone without consent or notification. She cannot have installed it herself since we use Family Link and we have to approve all app installs. I have no idea how they pulled this off, but it had to involve either Google, or Samsung, or both," a user wrote in a review on the Google Play Store.

"Normal apps can't just install themselves. I'm not sure what's going on here, but this doesn't count as "voluntary". We need information, and we need it now, folks."

Jun 21 09:35

Amazon dumps Frontline Doctors site for 'misinformation about vaccines'

Amazon's internet hosting service took down the website of the group of doctors known for promoting proven treatments for COVID-19 such as hydroxychloroquine and ivermectin.

America's Frontline Doctors was accused of "hosting misinformation about vaccines and was reported as objectionable content to AWS."

The Gateway Pundit reported Amazon shut down the site on about May 31. The doctors' website has since been restored through another host.

Jun 21 07:36

See the light: Philips Hue smart bulbs can be hacked and used to install malware

Researchers ... revealed how a bug enabled them to infiltrate the bulbs with a drone that hovers outside a building. They were able to gain access to the bulbs as well as the control bridge that leads to the users’ network, which means it is possible to compromise a person’s home network or even that of a business or smart city using the bulbs.

To infiltrate the users’ network, the researchers exploited a previously discovered bug that Philips hadn’t fixed that allowed them to control aspects of the bulb like brightness and color. After lowering and raising the brightness or changing the color to trick the user into believing the bulb had a glitch, the user would then reset the product by deleting it from their app and then attempting to rediscover it. However, once they rediscovered the compromised bulb, it was able to offload malware onto the control bridge. The users’ home network is linked to this central hub, which means the malware or spyware could infect the entire network.

Jun 21 06:59

Rogue Hotspot Can "Permanently" Break iPhone WiFi Functionality

Security researcher Carl Schou discovered a bug in Apple's iOS that can disable an iPhone's ability to connect to hotspots after joining a WiFi with the SSID "%p%s%s%s%s%n."

Schou tweeted, "after joining my personal WiFi with the SSID "%p%s%s%s%s%n", my iPhone permanently disabled its WiFi functionality. Neither rebooting nor changing SSID fixes it :~)."

Schou told BleepingComputer that he conducted the test on an iPhone XS, running iOS version 14.4.2. BleepingComputer confirmed the test on an iPhone running iOS 14.6. They said the iPhone's wireless functionality would break after connecting to %p%s%s%s%s%n.

What this looks like is a format string bug issue, which is unusual these days. After the iPhone connected to the strangely worded hotspot, the smartphone failed at connecting to other hotspots. Android devices connected to the hotspot but didn't experience the same problem as iPhones.

Jun 21 06:46

Why Are US Mobile Internet Speeds So Slow Compared to Other Countries?

The US leads the world in tech, right? So why, then, are mobile internet speeds unbearably slow?

Time and time again, research has shown that mobile internet speed in the US lags behind other nations. But how bad is the signal on your cell phone, and why is this the case? This article will explore three possible reasons.

According to the April 2021 Speed Test Global Index, the US ranked 18th in mobile internet download speeds.

Despite moving up one and having higher speeds than the global average, the country still ranks below a whole list of developed nations. Some countries with higher average mobile speeds than the US in that month include Bulgaria, Greece, and Cyprus.

When it comes to 5G, the US also doesn’t rank well. Research published in 2020 by OpenSignal revealed that 5G speeds in the country were a meager 52 megabytes per second when tested. That was slower than some nations’ 4G speeds, including the Netherlands, Canada, and South Korea.

Jun 20 18:31

Exposed and Unprotected: 1.1 Billion Records of CVS Health Customers Posted Online

By B.N. Frank

CVS seems rather dismissive of the magnitude of this situation. Of course, situations like this have become so common, maybe we’ve all become somewhat desensitized to our personal information ending up where it’s not supposed to be...

Jun 20 01:50

Why You Should Stop Texting From Your Android Messages App

We’re talking end-to-end encryption, of course. The major differentiation that sets good messengers apart from the rest. It’s why you should use Signal, iMessage and WhatsApp, while avoiding Telegram, Facebook Messenger and especially SMS.

But Google’s issue is that Android Messages doesn’t really serve a market-need, it doesn’t really have a place. Yes, Android needs a stock SMS client, and the fact that RCS brings updated chat and media features is useful. But Android users are well-served by cross-platform alternatives, particularly WhatsApp, which is much more skewed to its Android user-base than those on iOS.

Jun 19 12:12

It’s Getting Hot in Here! When Utility Companies Remotely Control “Smart” Thermostats Installed in Customers’ Homes

By B.N. Frank

Has your utility company generously and persistently offered to install a “Smart Thermostat” inside your home in order to help you conserve energy and lower your bills? Here’s what might happen if you let them...

Jun 19 09:34

‘Every step we take’ could be monitored and analysed if facial recognition tech isn’t reined in, UK data watchdog warns

The head of the UK’s Information Commissioner’s Office (ICO) has raised alarm over the potential abuses of facial recognition software, after several investigations found that the technology was not being properly deployed.

UK Information Commissioner Elizabeth Denham noted in a blog post published on Friday that facial recognition technology can be harnessed to make our lives more efficient and secure, but said there was a clear danger that it could be misused.

Live facial recognition (LFR) technology capable of scanning people’s faces in real time as they walk down the street or enter a shop can be used “inappropriately, excessively or even recklessly,” the head of the UK data watchdog said, noting that there could be “significant” consequences if sensitive personal data were collected on a mass scale without people even knowing they were being monitored.

Jun 18 19:51

80,606 Accounts Shut Off in 2020; Media Outlet Seeks Detroit Residents Struggling to Pay Their Electric Bills

By B.N. Frank

COVID mandates and restrictions have made it difficult and sometimes impossible for countless Americans to afford their bills. ProPublica wants to hear from Detroit residents who are struggling to pay for their electricity...

Jun 18 18:54

$450M More for Company to Turn U.S. Troops into “Invincible Technomancers” via Artificial Intelligence

By B.N. Frank

Expert warnings about Artificial Intelligence (A.I.) continue to increase. For one thing – it’s not always accurate. Nevertheless, employers continue to incorporate it into their businesses. Some companies are training U.S. military personnel to use it for defense purposes...

Jun 18 11:17

FCC proposes ban on Chinese surveillance cameras, other products

U.S. regulators proposed a ban on products from Huawei Technologies Co. and four other Chinese electronics companies, including surveillance cameras widely used by schools but linked to oppression in western China, stepping up pressure on tech suppliers alleged to be security risks.

Hangzhou Hikvision Digital Technology Co. and Dahua Technology Co., whose cameras can be found in U.S. schools and local government facilities, were targeted in an order the Federal Communications Commission adopted in a 4-0 vote on Thursday. Also named in the order were telecom giant ZTE Corp. and two-way radio maker Hytera Communications Corp

The order would forbid U.S. sales of specified telecommunications and surveillance equipment from the companies. The action begins a period of review before a final vote on the matter.

"We are taking direct action to exclude untrusted equipment and vendors from communications networks," said FCC Acting Chairwoman Jessica Rosenworcel.

Jun 18 11:13

EXCLUSIVE Pacific undersea cable project sinks after U.S. warns against Chinese bid

  • HMN Tech's bid priced at more than 20% below rivals - sources
    World Bank said all bids deemed non-compliant
  • U.S. warned Chinese firms posed a security threat
  • Undersea cables emerged as sensitive area of Pacific diplomacy


SYDNEY/BEIJING, June 18 (Reuters) - A World Bank-led project declined to award a contract to lay sensitive undersea communications cables after Pacific island governments heeded U.S. warnings that participation of a Chinese company posed a security threat, two sources told Reuters.

The former Huawei Marine Networks, now called HMN Technologies and majority owned by Shanghai-listed Hengtong Optic-Electric Co Ltd, submitted a bid for the $72.6 million project priced at more than 20% below rivals Alcatel Submarine Networks (ASN), part of Finland’s Nokia, and Japan’s NEC, the sources said.

Jun 18 08:56

Google fixes seventh Chrome zero-day exploited in the wild this year

Google has released Chrome 91.0.4472.114 for Windows, Mac, and Linux to fix four security vulnerabilities, with one of them a high severity zero-day vulnerability exploited in the wild.

This version, released today, June 17th, 2021, to the Stable desktop channel, has started rolling out worldwide and will become available to all users over the next few days.

Google Chrome will automatically attempt to upgrade the browser the next time you launch the program, but you can perform a manual update by going to Settings > Help > 'About Google Chrome'.

Jun 18 06:26

Hackers are using an old but devious trick to spread new malware

icrosoft security experts are sounding the alarm on a new malware threat that uses an old but devious method to implant its code onto victims’ computers

It seems that the malware operators behind SolarMarker are finding new success with an old trick called “SEO poisoning.” Basically, according to Microsoft, this involves “stuffing” thousands of PDF documents with SEO keywords and links which start a cascade of redirections that eventually leads the unsuspecting user to malware. “The attack works by using PDF documents designed to rank on search results,” Microsoft Security Intelligence explained on Twitter in recent days. “To achieve this, attackers padded these documents with >10 pages of keywords on a wide range of topics, from ‘insurance form’ and ‘acceptance of contract’ to ‘how to join in SQL’ and ‘math answers

Jun 17 14:53

Russian hackers attacking organizations through system used by USAID, says Microsoft

Russia-linked hackers behind the SolarWinds attack have been targeting government agencies, think tanks and non-governmental organizations through the email system of the U.S. Agency for International Development, Microsoft said late Thursday.

The wide-scale attack was uncovered this week by the Microsoft Threat Intelligence Center who on Thursday identified the group responsible in a statement as Nobelium, which has been blamed for the November attack through widely used SolarWinds software that aided the breach of at least nine U.S. federal agencies as well as dozens of companies, including Fortune 500 businesses.

Jun 17 12:53

Peloton Bug Could Give Hackers Control of Exercise Equipment

Threat Post reports that the popular Peloton Bike+ and Peloton Tread exercise equipment contain a security vulnerability that could expose gym users to a number of cyberattacks ranging from personal data theft to secret video recording.

According to research from McAfee’s Advanced Threat Research (ATR) team, the bug would allow a hacker to gain remote root access to the tablet installed on the Peloton devices. This tablet is the touch screen installed on the device to deliver streaming content including workout coaching and even allowing video calls using an integrated camera.

Jun 17 11:15

Demand for developers is soaring - and employers are struggling to hire

Tech jobs have rarely been hotter: job search engine Adzuna has reported that for the past few months, there have been consistently over 100,000 tech job offers per week live on the platform, with one week in May even seeing an unprecedented peak of 132,000 offers.

The data, which was compiled for the UK government's digital economy council, suggests that the industry is recovering from the impact of the COVID-19 pandemic at pace. In comparison, last June saw tech vacancies fall to less than 44,000 offers.

But according to the council, the new figures aren't only reflective of a strong come-back from a year of crisis. Tech hiring hasn't been this high since 2016.

Jun 17 09:58

Pelotons can be hacked letting creeps install malware and SPY on you, security firm says

After Peloton riders' private data was exposed by a software bug earlier this year, researchers have found some of the tech company's products are vulnerable to malware, letting hackers spy on unsuspecting riders.

Cybersecurity firm McAfee said cybercriminals could trick Bike+ users into logging into nefarious apps disguised to look like Netflix or Spotify with their credentials, and spy on them through their webcams.

It can be done by inserting a USB key at any time (in the gym, somewhere in the supply chain) with a boot file image containing the dangerous code and allowing criminals remote access to the Bike+, Peloton's $2,495 bike.

'They can enable the bike’s camera and microphone to spy on the device and whoever is using it,' McAfee wrote in the report.

Jun 17 08:27

Emails from 2016 Show Amazon Ring’s Hold on the LAPD Through Camera Giveaways

By Matthew Guariglia and Karen Gullo

In March 2016, “smart” doorbell camera maker Ring was a growing company attempting to market its wireless smart security camera when it received an email from an officer in the Los Angeles Police Department (LAPD) Gang and Narcotics Division, who was interested in purchasing a slew of devices.

The Los Angeles detective wanted 20 cameras, consisting of 10 doorbell cameras and 10 “stick up” cameras, which retailed for nearly $3,000. Ring, headquartered in nearby Santa Monica, first offered a discount but quickly sweetened the deal: “I’d be happy to send you those units free of charge,” a Ring employee told the officer, according to emails released in response to California Public Records Act (CPRA) requests filed by EFF and NBC’s Clark Fouraker. These emails are also the subject of a detailed new report from the Los Angeles Times...

Jun 17 06:32

Knee-Deep in the LED: Hackers Get Doom Running on Ikea Smart Bulb (with an external display)

A group of hackers has gotten Doom up and running on an unusual platform: an Ikea smart bulb. The group wrote up its project on Next-Hack and shared details of the implementation.

The team originally planned to deploy an Ikea Trådefri lamp. While the modest 40MHz Cortex M4 was plenty powerful, the chip only had 32KB of RAM. This was deemed impossible. Then, some months later, Ikea updated with a new model. These new lamps featured an 80MHz Cortex-M33 and 108KB of RAM in total with 1MB of NAND flash. The team also attached an additional 8MB of NAND flash.

Jun 17 06:03

Elon Musk's Starlink is Ready to Offer Satellite Internet for Commercial Flights

With each new initiative, Elon Musk proves that his limits are beyond the skies. Now he seeks to solve a big problem for travelers: using WiFi on the plane. Musk's company Starlink announced that it is ready to offer satellite internet on commercial flights, and they are negotiating with several airlines to provide the service in the near future.

With more than 1,500 satellites in orbit, Starlink currently offers internet in hard-to-reach and rural areas in several countries.

In a panel at the Connected Aviation Intelligence summit, Jonathan Hofeller, vice president of Starlink, revealed that Starlink was in talks with commercial airlines to provide them with internet service.

Jun 16 19:01

Bombshell! Manipulated Google Search Results PROVED

If you think Google Search gives you organic search results, here's proof that Google Search is out to win your heart and mind with manipulated data. Search results that are modified to induce a change of opinion. Search results that are specifically programmed for each cohort. Search results that are designed to control a population.

In this Red-Pill video, we will dig deep into the next stage of data collection. From Federated Learning of Cohorts, you will see how this is used with a Big Tech agenda. And Google is not alone.

Jun 16 18:28

Facial Recognition Apps for Anyone Who Wants to Identify People Without Their Knowledge or Consent: What Couldn’t Go Wrong?

By B.N. Frank

The use of Facial Recognition technology continues to be controversial. Why wouldn’t it be? It’s privacy invasive and it’s NOT always accurate. These inaccuracies can and have had life-altering as well as life-threatening consequences. Despite this, apparently some tech companies still want to sell it to anybody and everybody, in some cases for just $30 per month...

Jun 16 12:16

Judicial Watch: Documents Show CA State Officials Coordinated with Big Tech to Censor Americans’ Election Posts

“Judicial Watch announced today that it received 540 pages and a supplemental four pages of documents from the office of the Secretary of State of California revealing how state officials pressured social media companies (Twitter, Facebook, Google (YouTube)) to censor posts about the 2020 election. Included in these documents were “misinformation briefings” emails that were compiled by communications firm SKDK, that lists Biden for President as their top client of 2020. The documents show how the state agency successfully pressured YouTube to censor a Judicial Watch video concerning the vote by mail and a Judicial Watch lawsuit settlement about California voter roll clean up.”

Jun 16 12:10

A Study Analyses The Top 100 Data Breaches Over The Past 15 Years, Demonstrating How The Online Security Landscape Has Changed

A major highlight of the study ended up detailing how frequent major data breaches were becoming. While 2004 saw only a single significant breach, 2018 by comparison witnessed 21 separate incidents. That number itself is also a 250% increase from 22017s recorded 6. While it should be noted that 2020 actually witnessed a down swing in breaches, at a total of 12, cyber attacks have seemed to become a norm of the internet space.

Jun 16 11:47

Gaming Giant CD Projekt Red Admits Ransomware Hackers Are Leaking Data

Polish game developer CD Projekt Red, the popular company behind the Witcher series and Cyberpunk 2077, has revealed this week that proprietary data taken in a ransomware attack disclosed four months ago is circulating online.

Ars Technica reports that CD Projekt Red, the Polish game developer behind the Witcher series and Cyberpunk 2077, has revealed that data stolen during a ransomware attack it disclosed four months ago is being circulated online.

Company officials said in a statement:

Today, we have learned new information regarding the breach and now have reason to believe that internal data illegally obtained during the attack is currently being circulated on the Internet.

We are not yet able to confirm the exact contents of the data in question, though we believe it may include current/former employee and contractor details in addition to data related to our games.

Jun 16 10:33

Congress unveils new laws to curb power of Big Tech, but NONE of them address viewpoint discrimination censorship and assaults on free speech

It is important to note that none of the proposed bills in any way address Big Tech’s free speech violations and censorship practices. All of them center around tech industry monopolies while completely sidestepping the First Amendment issue. -- The obvious reason, of course, is that Congress is completely bought off by Big Tech, Big Pharma and other oppressive industries that could not care less about our Constitution and will do anything they can to destroy it.

Jun 16 10:07

Critical ThroughTek Flaw Opens Millions of Connected Cameras to Eavesdropping

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday issued an advisory regarding a critical software supply-chain flaw impacting ThroughTek's software development kit (SDK) that could be abused by an adversary to gain improper access to audio and video streams.

"Successful exploitation of this vulnerability could permit unauthorized access to sensitive information, such as camera audio/video feeds," CISA said in the alert.

ThroughTek's point-to-point (P2P) SDK is widely used by IoT devices with video surveillance or audio/video transmission capability such as IP cameras, baby and pet monitoring cameras, smart home appliances, and sensors to provide remote access to the media content over the internet.

Jun 16 09:03

Windows 11: Is Microsoft having its Spinal Tap moment?

I can't get that scene from the classic comedy This Is Spinal Tap out of my head. You know, the one where dimwitted rocker Nigel Tufnel explains why the numbers on his amp all go to 11. "Well, it's one louder, isn't it? It's not ten."

In its long history, Microsoft has never been afraid to go full Nigel Tufnel.

Throughout the first three decades of Windows, Microsoft cranked up its Hype Machine™ every two or three years to get the buying public excited about a new Windows version. Sometimes that hype served as a power washer to wipe away the stains of a previous, unloved version, like Windows 7 successfully cleaning up the mess left by Windows Vista. Sometimes it marked a genuine sea change, like the merging of the consumer and business lines in Windows XP. And sometimes it was just a pure cash grab.

Jun 16 08:20

Smart IoT Devices Can Be Weaponized By Hackers To Launch Even Larger DDoS Attacks

DDoS threats are immensely harmful to the day-to-day operational activities of targeted networks operated by corporations and or governments and can cause considerable damage.

This means billions of smart home devices could be susceptible to cyberattacks and silently weaponized to launch DDoS attacks in a simultaneous fashion.

The proliferation of IoT devices has increased the number of devices a malicious actor can weaponize. The combination of IoT and DDoS may result in a devastating cyberattack using armies of IoT devices.

A problem we notice is that much of the world's electronic devices are produced in China. As a result, the communist government may have the ability to backdoor these devices and weaponize them against the US.

Jun 16 08:20

Smart Tech Expert: Future “Smart Homes” Will Include Sensors in Clothing, Furniture, etc. Connected to Hazardous “Smart” Meters

By B.N. Frank

It’s amusing as well as alarming when industry folks go to great lengths to depict “Smart Homes” as something desirable now and in the future. For many years already, experts have warned about privacy and cybersecurity risks associated with ALL “Smart” and wireless technology including “Smart Home” appliances and technology. In fact, Samsung has discontinued its Smart Home “SmartThings Ecosystem”.

In regard to utility “Smart” Meters – electric, gas, and water – they are also privacy invasive and at a high risk for cybersecurity issues. Additionally, they have been associated with HIGHER bills, fires, explosions, and other inconveniences including health problems which have led to lawsuits...

Jun 16 05:13

EU-bankrolled cybersecurity firm develops intrusive tech that allows ‘anonymous’ snooping & remote control of net devices – media

Flush with EU funds, a shadowy Spain-based cyberintelligence firm has reportedly created invasive surveillance tech that enables clients to take “remote and invisible control” of net-connected devices while evading detection.

The “anonymous interception” products, branded as ‘Invisible Man’ and ‘Night Crawler’, can remotely access files on a target’s device, discern their location, and even discreetly switch on cameras and microphones, according to WIRED magazine.

The developer, Mollitiam Industries, is also reportedly hyping up a tool that allows for the “mass surveillance of digital profiles and identities” across social media and even the dark web – which sounds strikingly similar to its work on a data-harvesting project funded in part by the EU’s Regional Development Fund.

Jun 15 19:00

SUPPRESSING THE CURES: YouTube suspends Sen. Ron Johnson for uploading videos about hydroxychloroquine

Sen. Ron Johnson of Wisconsin has been suspended by YouTube for uploading videos that the Google-owned platform says are contributing to the spread of “misinformation” about the Wuhan coronavirus (Covid-19).

Johnson had uploaded several videos about the benefits of hydroxychloroquine (HCQ) in the treatment of the Chinese Virus, which is not allowed because Tony Fauci and Rochelle Walensky say so. Consequently, Johnson’s channel has been struck from uploading any more videos for the next seven days.

“YouTube’s arrogant Covid censorship continues,” Johnson wrote. “How many lives will be lost as a result? How many lives could have been saved with a free exchange of medical ideas? This suppression of speech should concern every American.”

Jun 15 15:22

Roger Waters turns down ‘huge money’ for FACEBOOK ad: ‘No f–kin’ way’…

Roger Waters has revealed that Facebook honcho Mark Zuckerberg offered him big bucks to use Pink Floyd’s classic 1979 anthem “Another Brick in the Wall, Part 2” in an Instagram ad. -- However, the co-founding member of the iconic rock band turned the “little p–k” down flat — with a cantankerously foulmouthed touch.

Jun 15 13:02

Censorship: Facebook Has Removed 16 Million Pieces of Content & Added ‘Warnings’ On 167 Million

The censorship of information is at an all time high, but do people really recognize the extent to which it has been and is being carried out? A recent article published in the British Medical Journal by journalist Laurie Clarke has highlighted the fact that Facebook has already removed at least 16 million pieces of content from its platform and added warnings to approximately 167 million others. YouTube has removed nearly 1 million videos related to, according to them, “dangerous or misleading covid-19 medical information.”

Jun 15 12:04

Twitter now censoring all criticism of Critical Race Theory in latest “thought police” crackdown to protect the racist, bigoted Left

Rachel Bovard, Senior Director of Policy for the Conservative Partnership Institute, explained that Twitter silenced CRA for merely sharing a toolkit that parents can use to try to combat the use of CRT at their children’s public schools.

Jun 15 10:42

Hackers Can Exploit Samsung Pre-Installed Apps to Spy On Users

Multiple critical security flaws have been disclosed in Samsung's pre-installed Android apps, which, if successfully exploited, could have allowed adversaries access to personal data without users' consent and take control of the devices.

"The impact of these bugs could have allowed an attacker to access and edit the victim's contacts, calls, SMS/MMS, install arbitrary apps with device administrator rights, or read and write arbitrary files on behalf of a system user which could change the device's settings," Sergey Toshin, founder of mobile security startup Oversecured, said in an analysis published Thursday.

Jun 15 10:38

Apple Issues Urgent Patches for 2 Zero-Day Flaws Exploited in the Wild

Both CVE-2021-30761 and CVE-2021-30762 were reported to Apple anonymously, with the Cupertino-based company stating in its advisory that it's aware of reports that the vulnerabilities "may have been actively exploited." As is usually the case, Apple didn't share any specifics on the nature of the attacks, the victims that may have been targeted, or the threat actors that may be abusing them.

One thing evident, however, is that the active exploitation attempts were directed against owners of older devices such as iPhone 5s, iPhone 6, iPhone 6 Plus, iPad Air, iPad mini 2, iPad mini 3, and iPod touch (6th generation).

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA