Sep 06 07:57

This Normal-Looking Lightning Cable Actually Steals All of Your Data

Here’s some Mr. Robot-level intrigue for you: Imagine an innocuous-looking USB-to-Lightning cable that, once plugged into your machine, actually helps hackers steal all of the data from your iPhone and inject malware onto your device. If that sounds like something from a far-fetched TV show, it is, surprise, actually a thing.

Motherboard recently wrote about just such a tricky little product, sold by cybersecurity company Hak5 and dubbed the “OMG cable” after its inventor, security researcher MG. The cord, which looks almost exactly like an Apple Lightning cable and is sold in a USB-C or USB-A format, is loaded with a hidden chip and gives a user the ability to remotely steal data or deploy malicious software onto MacBooks, iPads, and iPhones. The product, which was previously demoed at the cyber conference DEFCON in 2019, is used as a penetration testing tool, Vice reports.

Sep 05 04:54

Russia Blocks VPN Providers in Ongoing Internet Crackdown

Russia has blocked access to six VPN services which authorities say allow access to illegal online content in violation of Russian law.

The country’s communications regulator Roskomnadzor said Friday it had blocked access to some of the world’s largest VPN providers, including Nord VPN and Express VPN, following an investigation.

“The use of such services leads to the preservation of access to prohibited information and resources and creates the conditions for illegal activities, including those related to the distribution of drugs, child pornography, extremism and suicide,” Roskomnadzor said in a statement.

Virtual private networks (VPNs) allow internet users a greater level of anonymity online and can provide access to material which has been blocked by internet service providers.

Sep 04 11:35

Facebook Sorry Its A.I. Software Labeled Black Men as “Primates” in Network Video

By B.N. Frank

Embarrassing and tragic examples of Artificial Intelligence (A.I.) faux-pas and inaccuracies continue to be reported. There is even an A.I. “Hall of Shame”. This recent example from Facebook seems to qualify...

Sep 04 07:04

World Economic Forum (WEF) Warns of Cyberattack Leading to Systemic Collapse of the Global Financial System

A report published last year by the WEF-Carnegie Cyber Policy Initiative calls for the merging of Wall Street banks, their regulators and intelligence agencies as necessary to confront an allegedly imminent cyber attack that will collapse the existing financial system.

In November 2020, the World Economic Forum (WEF) and Carnegie Endowment for International Peace co-produced a report that warned that the global financial system was increasingly vulnerable to cyber attacks. Advisors to the group that produced the report included representatives from the Federal Reserve, the Bank of England, the International Monetary Fund, Wall Street giants likes JP Morgan Chase and Silicon Valley behemoths like Amazon.

Sep 04 06:58

Facebook Admits 'Unacceptable Error' As AI-Generated ‘Keep Seeing Primates’ Prompt Targets Black Men

Tech giants’ algorithms have previously been blamed for embarrassing errors. In 2015, Google's AI reportedly tagged two Black people's faces with the word "gorilla". The company apologised and promptly censored the words “gorilla”, “chimp”, “chimpanzee”, and “monkey” from Google Lens, “blinding” the algorithm.

A contrite Facebook rushed to issue an apology on Friday after its AI software generated “keep seeing” prompts that labeled videos showing black men with the term "primates".

A Facebook spokesperson told The New York Times, which first reported the story, that it was a "clearly unacceptable error" of its auto-generated recommendation system.

Sep 03 18:08

Ohio State University Tests Out Grubhub Food Delivery Robots

By B.N. Frank

Warnings about Artificial Intelligence (A.I.) and robots replacing human jobs have been ongoing for years. Delivery drivers and/or aspiring ones certainly have less employment opportunities now at a growing number of American college campuses...

Sep 03 13:02

Delays Aren’t Good Enough—Apple Must Abandon Its Surveillance Plans

By Cindy Cohn

Apple announced today that it would “take additional time over the coming months to collect input and make improvements” to a program that will weaken privacy and security on iPhones and other products. EFF is pleased Apple is now listening to the concerns of customers, researchers, civil liberties organizations, human rights activists, LGBTQ people, youth representatives, and other groups, about the dangers posed by its phone scanning tools. But the company must go further than just listening, and drop its plans to put a backdoor into its encryption entirely...

Sep 03 08:50

FBI warns of ransomware attacks targeting food and agriculture sector as White House pushes for proactive measures

The FBI sent out a notice warning companies in the the food and agriculture sector to watch out for ransomware attacks aiming to disrupt supply chains. The FBI note said ransomware groups are seeking to "disrupt operations, cause financial loss, and negatively impact the food supply chain."

"Ransomware may impact businesses across the sector, from small farms to large producers, processors and manufacturers, and markets and restaurants. Cybercriminal threat actors exploit network vulnerabilities to exfiltrate data and encrypt systems in a sector that is increasingly reliant on smart technologies, industrial control systems, and internet-based automation systems," the FBI said.

Sep 03 05:51

Exclusive-Amazon to proactively remove more content that violates rules from cloud service -sources Inc plans to take a more proactive approach to determine what types of content violate its cloud service policies, such as rules against promoting violence, and enforce its removal, according to two sources, a move likely to renew debate about how much power tech companies should have to restrict free speech.

Over the coming months, Amazon will hire a small group of people in its Amazon Web Services (AWS) division to develop expertise and work with outside researchers to monitor for future threats, one of the sources familiar with the matter said.

Webmaster's Commentary: 

Another reason to stay off of the cloud and keep your data safe at home!

Sep 03 05:34

Computer Error: Tesla Showing Just How Much Humans Still Need To Drive

A Tesla vehicle operating on autopilot slammed into a Florida police cruiser on a highway near Orlando on Saturday, only days after CEO Elon Musk admitted faults with the experimental self-driving software amid a federal investigation into the system.

The crash happened just before 5 a.m. on Saturday when the trooper had activated his cruiser’s emergency lights on the way to assist a disabled vehicle.

The Tesla hit the cruiser on its left side and then crashed with the disabled vehicle, highway patrol spokeswoman Lt. Kim Montes explained to the Orlando Sentinel.

Sep 02 15:35

‘Like remote-controlling your arm against you’: Snowden says Apple WON’T DECIDE what it scans the phones for – governments will

NSA whistleblower Edward Snowden has dissected Apple's phone-scanning plan, saying it not only blurs the line between what is and isn't private, but will eventually enable governments to meddle into intimate details of one's life.

Snowden has been among vocal critics of Apple's plan to scan content on all iPhones for criminal evidence. The tech giant says it wants to identify child pornography stored on devices, but skeptics see it as the latest corporate move to encroach of people's privacy under the guise of protecting children. It goes one step further from what many companies already do when they scan files that users store in cloud storage on the providers' servers.

"Fundamentally, the distinction here is they are taking away that separation between what they own and what you own. And now they are telling your device what to look for," Snowden said on Thursday in an interview with Russian media.

Sep 02 11:37

Coinbase seeds panic among users with erroneous 2FA change alerts

Coinbase, the world's second-largest cryptocurrency exchange with approximately 68 million users from over 100 countries, has scared a significant amount of its users with erroneous 2FA warnings.

As the crypto exchange revealed over the weekend in a Twitter thread, it accidentally alerted roughly 125,000 customers that their 2FA settings had have been changed on August 28, between 1:45 pm PST and 3:07 pm PST.

In a Friday incident report, Coinbase explained that the notifications were sent in error and that customers are not required to take any action to restore their 2FA settings.

Sep 02 11:26

Data breach in Indonesian COVID-19 tracking app exposes data of over 1 million people

A data breach in Indonesia has exposed the personal records of more than a million Indonesians who were required by the government to use a Wuhan coronavirus (COVID-19) tracking app.

The leak came from the electronic health alert card (eHAC) app. eHAC was mandatory for anyone entering Indonesia from abroad and for anybody who wanted to board domestic flights. Travelers were required to download the app and provide the app with personal data, including contact details and their latest COVID-19 test results.

Researchers from encryption and cybersecurity firm vpnMentor informed the Indonesian government that eHAC became accessible to hackers “due to the lack of protocols put in place by the app’s developers.”

Sep 02 11:22

This simple trick can make your iPhone feel faster in just a few seconds

Even though Apple’s mobile hardware is best in class, it’s only inevitable that your iPhone will start to feel a bit more sluggish as the years pass by. With that said, there is a simple iPhone trick that can make your device feel a lot snappier within seconds.

Clearing the cache on your browser is something people do regularly on desktops, but not as often on their mobile devices. Still, clearing the cache on your iPhone can be just as effective. Put simply, clearing the cache on mobile Safari will remove useless files — such as images and scripts — that have piled up over the years. In turn, you’ll likely notice some speed and performance improvements when you clear out the Safari cache.

Sep 02 11:15

This Seemingly Normal Lightning Cable Will Leak Everything You Type

It looks like a Lightning cable, it works like a Lightning cable, and I can use it to connect my keyboard to my Mac. But it is actually a malicious cable that can record everything I type, including passwords, and wirelessly send that data to a hacker who could be more than a mile away.

This is the new version of a series of penetration testing tools made by the security researcher known as MG. MG previously demoed an earlier version of the cables for Motherboard at the DEF CON hacking conference in 2019. Shortly after that, MG said he had successfully moved the cables into mass production, and cybersecurity vendor Hak5 started selling the cables.

Sep 02 11:05

US states to accept driver's licence on iPhones

Arizona, and Georgia will introduce the system first, with Connecticut, Iowa, Kentucky, Maryland, Oklahoma, and Utah also signed up.

Sep 02 11:02

Want to see just how bad Google Chrome is? Try this simple trick!

My love/hate relationship with Google Chrome shifted into a hate/hate relationship a few months ago when I decided it was time to ditch the browser.

Since the split, I've been using a combination of Firefox and Brave. They're both very capable browsers that do what I think every good browser should do -- let you browse the web without getting in the way.

Sep 02 09:55

According to New Systematic Review and Updated Meta-Analysis of 18 Studies Cell Phone Use Harms Sperm

By B.N. Frank

Cell phones, laptops, and other wireless radiation emitting products include warnings in their manuals that carrying and holding these devices against the body may cause users to expose themselves to radiation levels that exceed federal RF safety limits. Nevertheless – both telecom and tech companies often advertise unsafe use of their products to people of all ages. Unfortunately, there are countless examples of businesses and organizations that also do this.

Articles, research, and warnings about radiation exposure from cell phones and other wireless devices affecting fertility are NOT new. Thanks to Environmental Health Trust for posting additional science about cell phone use affecting sperm...

Sep 02 06:30

What Biden Told Afghan President To Do Should Be Criminal

President Joe Biden asked the now-departed Afghan president to establish the "perception" that his government was capable of holding off the Taliban - a sign he knew it was only a matter of time before the US ally fell to the Islamic group even while reassuring Americans at home that it would not happen.

In the last phone call between Biden and his Afghan then-counterpart Ashraf Ghani, the American president said they needed to shift the attention of the Taliban's rapid advance "whether it is true or not," according to citations published on Tuesday.

The call took place on July 23 - weeks before the downfall of Kabul - but Biden on Tuesday restated his statement that his team was caught flat-footed by the fast Taliban takeover of the country.

Sep 02 05:06

Australia: New Law Allows Feds to Hack and Control Online Accounts of Political Dissidents Without a Warrant

The Australian parliament has recently passed one of the most egregious attacks on privacy rights and civil liberties in the world.

The Surveillance Legislation Amendment (Identify and Disrupt) Bill 2021 was rapidly snuck through with little debate or fanfare in a 24 hour window. The piece of legislation has the support of both the Liberal and Labour parties.

The law is a radical departure from due process. The new powers allow Australian Federal Police (AFP) to hack and take over the personal accounts of targets they label as “terrorists,” which in recent years has meant white people who advocate for nationalist beliefs, as well as other dissenting opinions.

Sep 01 08:00

Outlook and Gmail users hit by alarming new email threat and it's worrying experts

Scammers are now sending out emails that appear to have come from big named brands - such as Amazon or Paypal - that claim a large purchase has just been made on the victim's account.

It all looks very convincing with the messages using official fonts and logos - and this is where the scam gets clever and hugely concerning. The email contains no easy way of stopping the purchase from going through with the only option to cancel things coming via a telephone number and a message that reads, “If you didn’t make this purchase, please call us.”

Anyone tricked into dialling the contact details will then be put through to a real person on the other end of the phone.

Of course, this isn't a representative from Amazon or Paypal, instead it's a scammer who will try and steal as much information as possible including account names, passwords and bank details.

Sep 01 06:20


The Army wants to use facial recognition and advanced machine learning algorithms to monitor kids at base Children Development Centers and plans to launch a pilot program at Fort Jackson in the near future.

Army contracting officers posted a solicitation to for a vendor capable of developing a facial recognition and video analytics system and integrating that with the Fort Jackson CDC’s closed-circuit television system.

If successful, the system will be used for “monitoring the health and well-being of children in the CDC,” according to the performance work statement.

“The use of close-circuit television video-recording is common in CDCs for security purposes, however these feeds are not continually monitored during all hours of operation in live time,” the solicitation notes. “Instead, CDC staff log scheduled hours by watching the live video feeds periodically throughout the day for the mandated metrics.”

Webmaster's Commentary: 

Another good reason to home school.

Sep 01 05:16

Digital documentation of COVID-19 certificates: vaccination status: technical specifications and implementation guidance, 27 August 2021

This is a guidance document for countries and implementing partners on the technical requirements for developing digital information systems for issuing standards-based interoperable digital certificates for COVID-19 vaccination status, and considerations for implementation of such systems, for the purposes of continuity of care, and proof of vaccination.

Aug 31 17:36

Increase in Girls Admitted to the E.R. with Motor and Vocal Tics May Be Linked to Social Media Use; Level of Disability “Extremely High”

By B.N. Frank

Over the years, tech insiders (aka “Silicon Valley Parents”) have taken steps to limit their kids’ use and exposure to screens. This includes sending them to private low-tech or no-tech schools, requiring nannies to sign “No Screens” contracts, and spying on nannies to make sure they don’t break their contracts. Furthermore over the years, experts have warned about symptoms and long term adverse effects from screen use.

Recently, The Wall Street Journal published an article claiming that digital addictions were “drowning us in dopamine”. Now another publication has reported an increase of tic-like behaviors in girls and young women from social media use...

Aug 31 14:55

Instagram Disables Account of Fallen Marine's Mother After She Blamed Biden For Son's Death

Who could have predicted this?

"Facebook temporarily deleted the Instagram account of the mother of one of the Marines killed in Afghanistan by an ISIS bomb last week after she publicly blamed President Biden for his death and the deaths of the other servicemembers killed."

Aug 31 12:53

Facebook’s VR Workrooms Experience Includes Heavy and Hot Headsets, Dull Rooms, Floating Avatar Bodies, Other Distractions

By B.N. Frank

Research has proven that using VR headsets can cause behavioral changes, balance issues, cognitive problems, eye problems (soreness, vision changes), headaches, and MORE. In fact, last month, Facebook recalled millions of VR face liners due to users reporting rashes and hives!

Despite all of this, tech companies continue to create, promote and sell VR products for educational, employment, medical, and recreational purposes. Facebook is one of them and its Horizon Workrooms technology is already getting bad reviews...

Aug 31 10:36

1984: Biden Admin Turning Into Big Brother, Will Freedoms Suffer?

A recent Government Accountability Office (GAO) poll reveals that at least 10 federal agencies have intentions to expand their use of facial recognition technology over the next two years—a prospect that alarms privacy advocates who have concerns about a lack of oversight.

The GAO published the results of a survey of 24 federal agencies, finding that 18 of them use facial recognition technology. Fourteen of those agencies practice the tech for routine activity, like unlocking agency-issued smartphones, while six reported using facial recognition software for criminal investigations and five others use the technology for surveillance, the Aug. 24 report discovered.

Aug 31 10:34

Apple's crumbling wall of silence

Long-quiet Apple employees are beginning to speak their minds. In recent weeks they've talked publicly about experiences with harassment and discrimination, concerns about business decisions, and objections to policies that some feel open their personal lives to corporate scrutiny.

Why it matters: Employee activism has been on the rise across Silicon Valley, but until recently, Apple workers have largely avoided public criticism of their employer.

Aug 31 10:34

Woman credits Apple Watch with saving life after AFib alert

Apple Watch continues a streak of assisting wearers facing potentially life-threatening situations, with the device recently credited with alerting a 70-year-old user of a serious heart condition.

In June, Yolie De Leon of Arizona said she was about to head out for a walk when she received an alert on her Apple Watch, reports La Crosse Tribune.

"It said my heart rate was at 174," De Leon said. "It said, You are an AFib,' and said, Call your doctor immediately.'"

AFib, or atrial fibrillation, is an irregular heart rate often characterized by rapid beats that can lead to heart failure or stroke.

Doctors at a local hospital confirmed the diagnosis provided by De Leon's Apple Watch.

Aug 31 10:13

US judge rules biometric processing of public data not protected by First Amendment

An Illinois state court has rejected Clearview AI’s motion to dismiss a biometric data privacy suit against it on grounds its construction of a database of photos for facial recognition comparison from publicly available images on the internet is protected by the First Amendment.

Cook County Circuit Judge Pamela McLean Meyerson ruled that the restrictions BIPA places on Clearview’s First Amendment freedoms are limited to those essential for protecting the privacy and security of Illinois citizens, Law360 reports. The judge noted that sharing information publicly does not make it free for any use by a third party.

The suit was brought by the American Civil Liberties Union and other advocacy groups under Illinois’ Biometric Information Privacy Act (BIPA). They are seeking a court order forcing Clearview to delete all face biometrics collected from Illinois residents without consent.

Webmaster's Commentary: 

And it is certainly prohibited by the Fourth Amendment!

Aug 31 10:12

Webtool changes headshots just enough to trick face biometrics scrapers

Researchers say they have created software that protects social media posters from unwanted biometric surveillance. The evasion tool, called LowKey, reportedly fends off commercial facial recognition APIs by Amazon and Microsoft.

The computer scientists, from the University of Maryland and the U.S. Naval Academy, say Lowkey prevents facial recognition algorithms from matching harvested photos with new ones that might come from, for instance, surveillance cameras.

In a research paper yet to be peer reviewed, the authors claim LowKey can alter a posted image enough to throw face scrapers off the scent while maintaining a degree of resemblance to a person’s actual appearance that allows humans to make the connection.

Example images published in the paper demonstrate the perturbation. The effect resembles sub-par digital aging. Applying Gaussian smoothing to the image in pre-processing made the images look like those of people facing into a government wind tunnel.

Aug 31 10:09

This phishing attack is using a sneaky trick to steal your passwords, warns Microsoft

Microsoft has warned Office 365 customers that they're being targeted by a widespread phishing campaign aimed at nabbing usernames and passwords.

The ongoing phishing campaign is using multiple links; clicking on them results in a series of redirections that lead victims to a Google reCAPTCHA page that leads to a bogus login page where Office 365 credentials are stolen.

This particular attack relies on the email sales and marketing tool called 'open redirects', which has been abused in the past to redirect a visitor to a trustworthy destination to a malicious site. Google doesn't rate open redirects for Google URLs as a security vulnerability, but it does display a 'redirect notice' in the browser.

Aug 30 10:15

Vaccine Exemption Data Leak Publicizes Students’ Private Information

By Kate Anderson

Students who had applied for vaccine exemptions at CSU Chico had their personal information leaked online.

The university has launched an investigation into the incident.

A spreadsheet containing the names and phone numbers of 130 students from California State University, Chico was leaked onto the internet Monday. Several students were named in the leak, which revealed personal information included in their COVID-19 vaccine exemption forms...

Aug 30 09:46

"Old" developers are in demand at this tech company. You'll never believe the job post

After a year of hiring freezes and layoffs, companies have ramped up hiring in recent months and developers are in high demand. An active job post for a software developer has stirred up a conversation surrounding ageist hiring practices in the tech sector; specifically, and not-so-subtly, calling out Silicon Valley. Turns out, one company is looking for experienced developers regardless of age; yes, even the "old" ones.

"Older workers often get left behind, especially when it comes to fast-changing tech roles as very few organizations actively engage this talent demographic," said Jamie Kohn, research director in the Gartner HR practice.

Aug 30 08:14

Security Expert: Microsoft Suffers ‘Worst Cloud Vulnerability You Can Imagine’

Microsoft has warned customers of its Azure cloud computing service that major vulnerabilities in the company’s systems have left user data completely exposed for the last two years. The CTO of the security company that discovered the massive flaw commented: “This is the worst cloud vulnerability you can imagine. This is the central database of Azure, and we were able to get access to any customer database that we wanted.”

The Verge reports that tech giant Microsoft has warned users of its Azure cloud computing service that their data has been exposed online for the last two years. Microsoft recently revealed that an error in its Azure Cosmos DB database product left more than 3,300 Azure customers’ data completely exposed.

Aug 29 19:26

The Internet of Bodies Ends Bodily Autonomy

By Matt

Our interconnected globalized world runs on the Internet. Not that long ago, connecting to the Internet required accessing a computer that was physically connected to a router. Then things went wireless and the rise of the smartphone put the Internet in everyone’s pocket. On top of this was built the so-called Internet of Things (IoT) which was comprised of things ranging from home appliances to munitions with sensors, software, and other technologies to connect to and exchange data with other devices and systems over the Internet wirelessly. The same technologies and concepts which underpin the IoT are entering a new arena called the Internet of Bodies where the human body itself will be online, potentially ending the concept of bodily autonomy as we know it.

Aug 29 17:26

Alex Berenson Perma-Banned From Twitter For Highlighting Big Pharma's Failures

Former New York Times reporter Alex Berenson revealed Saturday that he was perma-banned from Twitter for sharing "entirely accurate" information on the failure of Big Pharma's experimental shots.

Aug 29 10:02

What Are The Best Privacy Coins?

What are privacy coins sometimes also called anonymity enhanced cryptocurrencies (AEC)? They are digital cash alternatives that seek to recreate cash’s anonymity in a world of digital payments.

Why would anyone need privacy or anonymity in their transactions? In today’s world who doesn’t shred their important documents to protect themselves from identity thieves?

Every government, corporation, website, and ecommerce store is collecting more and more metadata on everyone they interact with. All this metadata is sold, bartered and traded so you can be advertised out of your last penny and so your friends, hobbies and patterns can be analyzed to manipulate you in a myriad of ways...

Aug 28 17:09

VR Headsets Being Used to Train American Emergency Responders, Gov’t Workers Despite Health Risks, Recalls

By B.N. Frank

It’s really not surprising that complaints from Virtual Reality (VR) users are increasing. Research has proven that using VR headsets can cause behavioral changes, balance issues, cognitive problems, eye problems (soreness, vision changes), headaches, and MORE.

Last month, Facebook recalled millions of VR face liners due to users reporting rashes and hives. Got kids? Research has determined that children absorb 2-5 times more harmful radiation than adults while wearing VR headsets.

Despite all of this, tech companies continue to create, promote and sell VR products for a variety of purposes other than recreational. Of course, they wouldn’t be doing this if everybody stopped buying and using these dangerous products...

Aug 27 19:01

A.I. “ShotSpotter” Conviction Overturned Due to “Scant Evidence” After Man Spends Almost One Year in Prison

By B.N. Frank

Artificial Intelligence (A.I.) is NOT always accurate. Examples continue to be reported. There is even an A.I. “Hall of Shame”. Experts frequently warn about using this technology and rightfully so. Some have been accused and convicted of crimes based on inaccuracies and “scant evidence”. A new report from Associated Press exposes more...

Aug 27 10:38

Microsoft reveals thousands of cloud database customers were vulnerable to data breach

Microsoft has warned thousands of its business customers this week that a vulnerability left their cloud databases exposed and susceptible to edits.

The company told thousands of Microsoft Azure customers on Thursday that the security firm Wiz was able to access private Azure databases earlier this month, where they could then read, edit, and delete data at will. No other party is believed to have gained access to the databases through the flaw, however.

Microsoft told Reuters that it “fixed this issue immediately to keep our customers safe and protected” after the vulnerability was pointed out. Wiz was reportedly paid $40,000 for discovering the flaw and reporting it to Microsoft.

Aug 27 10:36

School District Pilots Extracurricular Drone Club

By B.N. Frank

Despite crashes, privacy invasiveness, and other complaints about drones, they seem to be getting more popular with businesses who want to use them for delivering orders and for people who want to use them recreationally. Now one school district is partnering with a university to start a drone club for students...

Aug 27 10:28

iPhone 12 and Apple Watch 6 can interfere with pacemakers and defibrillators, study warns as experts urge patients to keep devices at least six inches away

Researchers at the US Food and Drug Administration conducted an investigation into Apple's devices, which were released in autumn last year.

The experts found they emit powerful magnetic fields that can change how implanted devices work and could result in 'life-threatening' situations.

People should keep any consumer electronic devices that may create magnetic interference, including cell phones and smart watches, at least six inches away from implanted medical devices, in particular pacemakers and cardiac defibrillators.

Aug 27 10:17

Ragnarok ransomware releases master decryptor after shutdown

Ragnarok ransomware gang appears to have called it quits and released the master key that can decrypt files locked with their malware.

The threat actor did not leave a note explaining the move; all of a sudden, they replaced all the victims on their leak site with a short instruction on how to decrypt files.

Aug 27 07:21

Lithium-metal battery with capacity retention of 88% over 1,000 cycles

German scientists have applied a new combination of cathodes and electrolytes to improve the stability of lithium-metal batteries. They fabricated a device with an energy density of 560 watt-hours per kilogram and a Coulombic efficiency of 99.94%.

Aug 27 06:26

The slippery slope into conspiracy: Apple's neuralhash reverse engineered?

Aug 27 05:59

NSA whistleblower Edward Snowden warns Apple program that scans iPhones for child porn will ultimately be used to spy on owners and opt-out will be axed

NSA whistleblower Edward Snowden has issued a chilling warning about Apple's plans to begin scanning iPhone photos of users, saying the proposal will give governments terrifying access to citizen's private data.

Snowden, a former computer intelligence consultant, who in 2013 leaked classified documents to show the scale of government snooping on U.S. citizens, condemned the new plans in strong terms, and says they set a precedent which will ultimately be abused by corrupt politicians to destroy individual privacy.

He said that Apple had chosen a dangerous path with their scheme to access users' photos, and that governments will manipulate the rule to give them greater access to data they claim they need access to - such as a phone owner's presence at a protest.

Aug 26 18:04

U.S. Navy Asks Sailors to Wear Smart Watches and Rings for Sleep Monitoring Despite Health Risks from “Wearables”

By B.N. Frank

Over the years, smart watch (aka activity tracker) owners have reported burns, rashes, shocks, and other undesirable symptoms while wearing these devices. Some complaints have led to recalls. In 2020 IEEE recommended that people avoid wearing both smart watches (aka activity trackers) and wireless earphones unless absolutely necessary because of harmful radiation exposure. Nevertheless, the U.S. Navy is asking some sailors to wear smart watches and rings in order to monitor their sleep...

Aug 26 12:26

Planned Expansion of Facial Recognition by US Agencies Called “Disturbing”

By Julia Conley

Digital rights advocates reacted harshly Thursday to a new internal U.S. government report detailing how ten federal agencies have plans to greatly expand their reliance on facial recognition in the years ahead.

The Government Accountability Office surveyed federal agencies and found ten have specific plans to increase their use of the technology by 2023—surveilling people for numerous reasons including to identify criminal suspects, track government employees’ level of alertness, and match faces of people on government property with names on watch lists...

Aug 26 09:45

TSA Controls Public Transit: Orders Americans To Wear Masks On Buses And Trains

By MassPrivateI

Last week, the San Francisco Chronicle reported that the TSA is requiring Americans to wear masks on public transit.

“Passengers will be required to wear masks on the nation’s trains, buses, airplanes and airports through Jan. 18 under a federal mandate extended Tuesday by the Biden administration.”

This is a privacy advocate’s worst fear. What was once considered “fake news” by our mass media is now a reality. This is not a CDC request, it is a TSA federal mandate, which essentially means that the TSA is now in control of America’s public transit...

Aug 26 06:37

REVEALED: Naturalized Americans could have their citizenship revoked if secret DHS program hosted by Amazon flags their social media or other personal data as a threat

Naturalized Americans could have their citizenship revoked thanks to a computer program that searches for concerning activity - with broad categories including anything deemed 'derogatory'.

The program, called ATLAS, is used by the Department of Homeland Security (DHS), and is hosted on servers owned by web e-commerce giant Amazon.

DHS stated on their website in a November update that ATLAS was created 'to automate, streamline, and support accurate exchange of data' among immigration authorities and the DHS, and 'to support biometric and biographic-based screening and vetting of immigration requests.'

Aug 25 12:35

Steve Wozniak Says Apple Is Turning Into Microsoft

here would be no Apple without Steve Wozniak.

Wozniak, who co-founded Apple over 40 years ago with the late Steve Jobs, remains a revered figure in Silicon Valley. Although he is no longer connected with Apple, he keeps busy making appearances at big tech conferences to inspire inventors, serves as chief scientist for the enterprise data storage startup Primary Data, and even found time to cha-cha-cha on the TV show Dancing With The Stars a few years ago.

On Friday, Wozniak returns to the upcoming Silicon Valley Comic Con event where pop culture fans, celebrities, and technologists will celebrate “the nerd side of things,” as he put it. In this edited interview with Fortune, Wozniak discusses how his former company is acting like Microsoft, the influence of money in Silicon Valley, and being an introvert in the social networking era.

Aug 25 12:02

Webcams, Baby Monitors, and More: Flaw on 83 Million Devices Allows Hackers to Eavesdrop and Take Over Devices

By B.N. Frank

Internet of Things (IoT) technology has been described as the “Internet of Vulnerable Things” for good reason. So far its vulnerability has compromised hundreds of millions of critical devices and infrastructure.

Thanks to Threatpost for reporting another unfortunate situation...

Aug 25 10:42

Chicago Inspector General: Police Use ShotSpotter to Justify Illegal Stop-and-Frisks

By Matthew Guariglia and Adam Schwartz

The Chicago Office of the Inspector General (OIG) has released a highly critical report on the Chicago Police Department’s use of ShotSpotter, a surveillance technology that relies on a combination of artificial intelligence and human “acoustic experts” to purportedly identify and locate gunshots based on a network of high-powered microphones located on some of the city’s streets. The OIG report finds that “police responses to ShotSpotter alerts rarely produce evidence of a gun-related crime, rarely give rise to investigatory stops, and even less frequently lead to the recovery of gun crime-related evidence during an investigatory stop.” This indicates that the technology is ineffective at fighting gun crime and inaccurate. This finding is based on the OIG’s quantitative analysis of more than 50,000 records over a 17-month period from the Chicago Police Department (CPD) and the city’s 911 dispatch center.

Aug 25 10:05

Linux turns 30: Celebrating the open source operating system

It’s time to party. Linux is 30 years old. What started as a student project by a young Linus Torvalds studying computer science at the University of Helsinki, has become an open source operating system that enterprise businesses around the globe depend on.

It’s massive. It’s crucial. And without Linux, most businesses wouldn’t be nearly as agile, flexible, and reliable.

To wish Linux a 30th birthday, Jack Wallen describes how the operating system changed his life and the business landscape in this free TechRepublic PDF download.

Aug 25 08:52

Hacker gets 500K reward for returning stolen cryptocurrency

The saga of what has been dubbed the biggest hack in the world of decentralized finance appears to be over as Poly Network recovered more than $610 million in cryptocurrency assets it lost two weeks ago and the hacker received a $500,000 bounty for returning the money.

Today, the hacker, referred to as Mr. White Hat, gave Poly Network access to the last tranche of stolen digital assets in their wallet, worth about $141 million.

Aug 25 08:49

CISA warns admins to urgently patch Exchange ProxyShell bugs

The US Cybersecurity and Infrastructure Security Agency (CISA) issued its first alert tagged as "urgent," warning admins to patch on-premises Microsoft Exchange servers against actively exploited ProxyShell vulnerabilities.

"Malicious cyber actors are actively exploiting the following ProxyShell vulnerabilities: CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207," CISA warned over the weekend.

"CISA strongly urges organizations to identify vulnerable systems on their networks and immediately apply Microsoft's Security Update from May 2021—which remediates all three ProxyShell vulnerabilities—to protect against these attacks."

Aug 25 08:48

Botnet targets hundreds of thousands of devices using Realtek SDK

A Mirai-based botnet now targets a critical vulnerability in the software SDK used by hundreds of thousands of Realtek-based devices, encompassing 200 models from at least 65 vendors, including Asus, Belkin, D-Link, Netgear, Tenda, ZTE, and Zyxel.

The security flaw that IoT Inspector security researchers found is now tracked as CVE-2021-35395 and was assigned a 9.8/10 severity rating.

It impacts many Internet-exposed wireless devices ranging from residential gateways and travel routers to Wi-Fi repeaters, IP cameras, and smart lightning gateways or connected toys.

Aug 25 08:45

Windows 10 KB5005932 fixes devices that can't install new updates

Microsoft has released the Windows 10 KB5005932 setup update to fix '"PSFX_E_MATCHING_BINARY_MISSING" errors when attempting to install the latest cumulative updates.

After installing the May 25, 2021 (KB5003214) and June 21, 2021 (KB5003690) cumulative updates, some Windows 10 21H1, 20H2, and 2004 users have been unable to install the latest cumulative updates (LCU) released as a preview or on Patch Tuesday.


Microsoft recommends users perform an in-place upgrade to automatically install the latest cumulative update as part of the installation process to resolve this issue.

Aug 24 13:20

A new NSO zero-click attack evades Apple’s iPhone security protections, says Citizen Lab

ABahraini human rights activist’s iPhone was silently hacked earlier this year by a powerful spyware sold to nation-states, defeating new security protections that Apple designed to withstand covert compromises, say researchers at Citizen Lab.

The activist, who remains in Bahrain and asked not to be named, is a member of the Bahrain Center for Human Rights, an award-winning nonprofit organization that promotes human rights in the Gulf state. The group continues to operate despite a ban imposed by the kingdom in 2004 following the arrest of its director for criticizing the country’s then-prime minister.

Aug 24 12:13

Same Story, Different Decade: WSJ Reports “Digital Addictions Are Drowning Us in Dopamine”

By B.N. Frank

Over the years, tech insiders (also referred to as “Silicon Valley Parents”) have gone to great lengths to protect their kids’ use and exposure to screens. This includes sending them to private low-tech or no-tech schools, requiring nannies to sign “No Screens” contracts, and spying on nannies to make sure they don’t break these contracts. Additionally over the years, experts have warned about symptoms and long-term adverse effects from screen use.

Regardless, even before COVID, screens were heavily endorsed for other people’s kids as well as for everyone else for business, education, medical, and recreational purposes. This includes Virtual Reality (VR) headsets which are being increasingly being promoted despite serious side effects...

Aug 23 17:54

The Dangers of Going Back to School After a Year of COVID-19 Lockdowns

By John W. Whitehead and Nisha Whitehead

“Every day in communities across the United States, children and adolescents spend the majority of their waking hours in schools that have increasingly come to resemble places of detention more than places of learning.”—Investigative journalist Annette Fuentes

Once upon a time in America, parents breathed a sigh of relief when their kids went back to school after a summer’s hiatus, content in the knowledge that for a good portion of the day their kids would be gainfully occupied, out of harm’s way and out of trouble.

Aug 23 10:57

Apple, Google, and Samsung move to normalize vaccine passports with wallet function

Apple, Samsung, and Google want to make it possible for users to store their vaccination status in the phones’ digital wallet, a scenario that would make vaccination verification simpler. However, the developments raise concerns for privacy and civil liberties advocates and the Big Tech support will further normalize the invasive practice.

Google, Samsung, and Apple have announced such plans.

Samsung, on Wednesday, announced that it was partnering with the Commons Project, the developer of CommonHealth, a vaccine verification app. The partnership would enable users to verify their vaccination status using the digital wallet Samsung Pay.

“Rather than having to pull up CommonHealth — which is a personal health records app, which isn’t really designed for walking into a grocery store and showing a QR code — now you can store this in a much more convenient place,” said JP Pollak, CommonHealth’s chief architect.

Aug 23 08:47

Beijing Considers Making US Listed Companies Hand Over Data Control To Chinese State Firms

On Friday, Chinese tech stocks swooned for the nth time, sending the Hang Seng index into bear market territory, after Beijing approved a new privacy law to prevent data collection by domestic technology companies. As we reported then, China's most powerful legislative body, the Standing Committee of the National People's Congress, passed the Personal Information Protection Law that will go into effect on Nov.1. The move sent tech stocks plunging and leaving investors bewildered over the intensity of Beijing's regulatory crackdown that has slammed countless sectors.

It turns out that when it comes to control over data, Beijing is nowhere near done and late on Friday Reuters reported that as part of Beijing's unprecedented scrutiny of private sector firms, Chinese regulators are considering pressing data-rich companies "to hand over management and supervision of their data to third-party firms" if they want to list in the U.S.

Aug 22 11:35

American Local, State, and National Parks Provide Wi-Fi to Visitors at Expense of Wildlife

By B.N. Frank

Decades of peer-reviewed published research has determined that wireless “Wi-Fi” radiation is biologically and environmentally harmful. Despite this, parks across the U.S have installed it, continue to install it, and also use it as a “selling point” to attract visitors. A Wisconsin resident has asked for this to stop...

Aug 21 05:45

90 Policy Groups Call On Apple To "Abandon" '1984'-Style Surveillance Tool

More than 90 civil society organizations wrote an open letter to Apple, demanding the company abandon its surveillance tool that plans to be integrated into iPhones, iPads, and other Apple products that will scan images before they are uploaded to iCloud for child pornography.

"Though these capabilities are intended to protect children and to reduce the spread of child sexual abuse material (CSAM), we are concerned that they will be used to censor protected speech, threaten the privacy and security of people around the world, and have disastrous consequences for many children," the open letter wrote, which was organized by the US-based nonprofit Center for Democracy & Technology (CDT).

Aug 21 05:44


To be clear, wireless carrier app stores have always kind of sucked. Verizon's efforts to create its own app store were shut down in 2012, after underwhelming consumers for years. At the time, the narrative was that Verizon just didn't find it worth the trouble in the face of Google domination and innovation. And while that's still largely true (wireless carriers are utterly unfamiliar with competition and therefore historically suck at innovation and adaptation), it turns out there was another reason.

Namely, that Google was paying Verizon and other major wireless companies a big chunk of money to not compete with the Android marketplace. And they were paying smartphone manufacturers to ship devices without competing app stores installed. Both nuggets were buried in a freshly unredacted copy of Epic's antitrust complaint (pdf) against Google, first spotted by Jeremy Owens:

Aug 20 17:55

Vietnam Issuing 50 Million Chip-based Digital ID Cards with Embedded Biometrics in 2021

By Chris Burt

Vietnam began to issue 50 million chip-based digital ID cards with embedded biometrics to eligible citizens beginning in February of this year, and Entrust has been revealed as a provider of issuance systems and software for the project, along with strategic partner MK Group.

The new national digital ID cards replace versions issued in 1999, 2012, and 2016 with 9-digit numbers, 12-digit numbers and barcodes respectively. The biometric chip version is expected to provide more secure and standardized authentication. The card can be used to log into government and private services, for authentication to government entities and banks, and for digital signing...

Aug 20 10:25

“Disinformation Dozen”: A “Faulty Narrative” With No Evidence, Says Facebook, Despite 16,000 News Headlines

By Sayer Ji, Founder, GreenMedInfo

In an unexpected turn of events, Facebook has called out The Center for Countering Digital Hate (CCDH) for manufacturing a “faulty narrative” without “any evidence” against the 12 individuals it has repeatedly defamed and labeled as the “disinformation dozen.”

Facebook has had enough of CCDH and is now pushing back. After months of accusations that it is allowing 12 “super spreaders of misinformation” on its platform to cause serious harm to the public health, it now alleges that CCDH’s report titled, The Disinformation Dozen: Why platforms must act on twelve leading online anti-vaxxers has no real factual basis...

Aug 20 08:45

Notorious ‘joker virus’ that subscribes you to paid services back on Android devices, Belgian police warn

Belgium’s Police Fédérale released a statement on Friday morning warning people that the joker virus is back for Android. The announcement reported the malware has been spotted on eight different apps on Google Play Store.

The police say Google has since deleted the infectious apps from the Play Store but warned Belgium citizens that if they had downloaded one of them already, to delete it as soon as possible.

The following applications were noted as corrupted with the Joker virus:

Auxiliary Message
Element Scanner
Fast Magic SMS
Free CamScanner
Go Messages
Super Message
Super SMS
Travel Wallpapers

According to cybersecurity company Quick Heal Security Lab, the malware can infiltrate your text messages, contacts, and other sensitive information on your smartphone, and subscribe you to websites offering paid services.

“You risk a big surprise at the end of the month on your bank account or your credit card,” wrote the Belgian police.

Aug 20 08:31

Critical Flaw Found in Older Cisco Small Business Routers Won't Be Fixed

A critical vulnerability in Cisco Small Business Routers will not be patched by the networking equipment giant, since the devices reached end-of-life in 2019.

Tracked as CVE-2021-34730 (CVSS score: 9.8), the issue resides in the routers' Universal Plug-and-Play (UPnP) service, enabling an unauthenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition.


The issue impacts the following products —

RV110W Wireless-N VPN Firewalls
RV130 VPN Routers
RV130W Wireless-N Multifunction VPN Routers
RV215W Wireless-N VPN Routers

In the absence of a patch, Cisco recommends customers to disable UPnP on the LAN interface.

Aug 20 08:24

New unofficial Windows patch fixes more PetitPotam attack vectors

Due to the critical nature of this attack, Microsoft released a security update as part of the August 2021 Patch Tuesday that attempted to fix the PetitPotam vulnerability, tracked as CVE-2021-36942.

"An unauthenticated attacker could call a method on the LSARPC interface and coerce the domain controller to authenticate against another server using NTLM," explains Microsoft in the CVE-2021-36942 advisory.

Unfortunately, Microsoft's update is incomplete, and it is still possible to abuse PetitPotam.

See also:

Windows PetitPotam attacks can be blocked using new method

Aug 20 08:21

AT&T denies data breach after hacker auctions 70 million user database

AT&T says that they did not suffer a data breach after a well-known threat actor claimed to be selling a database containing the personal information of 70 million customers.

The threat actor, known as ShinyHunters, began selling this database yesterday on a hacking forum with a starting price of $200,000 and incremental offers of $30,000. The hacker states that they are willing to sell it immediately for $1 million.

From the samples shared by the threat actor, the database contains customers' names, addresses, phone numbers, Social Security numbers, and date of birth.

A security researcher who wishes to remain anonymous told BleepingComputer that two of the four people in the samples were confirmed to have accounts on

Other than these few details, not much is known about the database, how it was acquired, and whether it is authentic.

Aug 20 07:58

Elon Musk Unveils Humanoid Robot to Take Over ‘Boring’ Work

As Elon Musk stood in the wings at Tesla Inc.’s AI day, a person dressed in a skintight white suit and black helmet did a jerky robot dance across the stage.

And with that, Musk flagged a move into a new realm of science fiction: life-like humanoid robots designed to take the drudgery out of everyday life.

The Tesla Bot, a prototype of which should be available next year, is designed to eliminate “dangerous, repetitive and boring tasks,” like bending over to pick something up, or go to the store for groceries, Musk said. “Essentially, in the future, physical work will be a choice.”

“Tesla is arguably the world’s biggest robotics company,” Musk said. “Our cars are basically semi-sentient robots on wheels.”

Aug 19 13:23

Mob Rule? Twitter Rolls Out New Tools For Speedy Reporting Of COVID "Misinformation"

Big Tech and big social media have already tried censorship by committee with Facebook's oversight board and the decision to permanently bar former President Trump from the platform. Now, they're circling back to good old fashioned mob rule.

Twitter on Tuesday announced that it's preparing to test a new feature that will allow users to report any COVID misinformation they spot on the platform. Users can already flag content they deem inappropriate (including misinformation). This new feature will allow them to specify the type of misinformation (is it political, perhaps COVID related?). All of this information will help twitter's algorithms justify its removal from the platform more expeditiously, saving more readers from being exposed to harmful information that might lead them to question the official narrative.

Aug 19 10:46

iOS 14.7.1 users complain about ‘No service’ bug after updating their iPhones

A few weeks ago, Apple introduced iOS 14.7.1 with a fix for Apple Watch unlock bug and addressed a security vulnerability that may have been actively exploited. Now, some iPhone users in this version are experiencing a “No Service” coverage message from their carriers.

Users are saying that restarting the phone, removing the SIM, and even resetting network settings didn’t help. As you can see in Apple’s Developer Forum and Discussion forum, this problem is occurring for at least a couple of weeks.

One of the users on iOS 14.7.1 writes:

After I update my iPhone 11 to iOS 14.7.1 I lost signal. Carrier is not found. No service is flashing on upper screen.

Users with an iPhone 6s, iPhone 7, iPhone 8, and iPhone 11 reported similar complaints. One of the users wrote:

Same problem. iPhone 6S, despite doing all the ons and offs, resetting the network settings, my phone is no longer a phone. This is great.

Aug 19 10:40

US Senate bill would legally require Apple to build a backdoor into iPhones

Update: This bill did not get as far as a vote.

This bill was introduced on June 23, 2020, in a previous session of Congress, but it did not receive a vote.

Although this bill was not enacted, its provisions could have become law by being included in another bill. It is common for legislative text to be introduced concurrently in multiple bills (called companion bills), re-introduced in subsequent sessions of Congress in new bills, or added to larger bills (sometimes called omnibus bills).

A bill proposed in the US Senate would effectively make it a legal requirement for Apple to build a backdoor into iPhones. It would make it illegal for Apple and other tech giants to use strong encryption for either devices or cloud services …

It would force Apple to have a means of accessing customer data on both the devices it sells and the cloud services it operates.

Dave Mark drew my attention to The Lawful Access to Encrypted Data Act.

Aug 19 10:37

Deepfakes Are Now Making Business Pitches

NEW WORKPLACE TECHNOLOGIES often start life as both status symbols and productivity aids. The first car phones and PowerPoint presentations closed deals and also signaled their users’ clout.

Some partners at EY, the accounting giant formerly known as Ernst & Young, are now testing a new workplace gimmick for the era of artificial intelligence. They spice up client presentations or routine emails with synthetic talking-head-style video clips starring virtual body doubles of themselves made with AI software—a corporate spin on a technology commonly known as deepfakes.

The firm’s exploration of the technology, provided by UK startup Synthesia, comes as the pandemic has quashed more traditional ways to cement business relationships. Golf and long lunches are tricky or impossible, Zoom calls and PDFs all too routine.

Aug 19 10:30

SOTN Hacked Right After Posting This Blockbuster, Further Posting Being Prevented

With the advent of the COVID-19 Super Vaccination Agenda, it has become apparent to every rational and righteous U.S. citizen that the nation has been completely taken over by an incorrigible cabal of criminally insane psychopaths.

Given this indisputable reality, there is only one way to right the ship of state: We the People must act decisively — POST-HASTE — to take back the American Republic.

It ought to be evident by now that only the U.S. Citizenry can forever terminate the genocidal OPERATION COVID-19.

There are no leaders anywhere in sight who are capable of, or courageous enough, to shut down the Covid juggernaut rolling across the 50 states. This stark reality must be faced head-on if the Republic is to be saved.

In view of this swiftly unfolding predicament, PROJECT TAKE BACK THE REPUBLIC (PTBTR) has been inaugurated.


Aug 19 06:24

DHS Secret Terror Watchlist With Nearly 2 MILLION People On It Exposed Online With NO PASSWORD

The Department of Homeland Security under Alejandro Mayorkas earlier this year revealed plans to declare their political opposition "suspected domestic extremists" and strip them of their rights by placing them on the No Fly List.

Every indicator suggests Mayorkas has followed through on those plans and has been rapidly expanding the regime's No Fly List and terror watchlist by adding dissidents such as America First talk show host Nick Fuentes to them.

According to a newly released report from security researcher Volodymyr Diachenko, DHS last month had their highly-secretive terror/no fly watchlist with nearly 2 million so-called "suspected terrorists" on it exposed on the open internet "without a password or any other authentication required to access it."

Webmaster's Commentary: 

Anyone know where that list can be found?

Aug 19 05:55

Audit Exposes Cybersecurity Lapse in US Pacific Submarine Fleet

A recent internal audit of the US Navy revealed that Pacific Fleet submarines and their tenders have not received internal and external cybersecurity inspections in recent years.

The audit — conducted by the Institute for Defense Analyses and obtained by Navy Times through a Freedom of Information Act request — detailed “the specter of cyber vulnerability among some of the sea service’s most potent platforms,” exposing lapses in the cybersecurity standards of the Naval fleets.

For example, the Navy’s Fleet Cyber Command did not inspect and assess the cybersecurity of 41 SUBPAC submarines and its two sub tenders. This was a requirement from 2016 to 2018. Furthermore, the fleet command failed to submit a proper explanation as to why the units were not inspected.

Aug 19 05:51

Background Check Agency Wants a Social Media Search Tool

The Defense Counterintelligence and Security Agency wants a tool to automatically cull social media and other public websites to create a searchable database of posts, actions and interactions that can be used in insider threat investigations.

Along with conducting background investigations for all of government, DCSA also manages the insider threat program for the Defense Department. The DOD Threat Management and Analysis Center, or DITMAC, “provides an enterprisewide capability to identify, assess, and mitigate risk from insiders; to oversee and manage unauthorized disclosures; and to integrate, manage, mature, and professionalize insider-threat capabilities.”

When a DOD employee or contractor is flagged as a potential threat—to information or physical security—DITMAC analysts are charged with investigating, including using digital evidence contained within DOD networks.

Aug 19 04:54

Crash! France’s repeated health pass system fails are leaving citizens without the QR codes needed for daily life

France has gone authoritarian in inept fashion, as its bid to control the movement of its citizens failed TWICE in a week when the platform that generates government QR codes was overwhelmed. The result, predictably, was chaos.

France and other budding authoritarian countries with ambitions to lord over their citizens’ movements by introducing health passes have eyes that are bigger than their stomachs. They have proven repeatedly that they’re far too incompetent to practice proper authoritarianism. Events last week are a case in point.

Aug 18 18:40

Non-Profits Score Huge Victory In Battle Against 5G Technology

By Derrick Broze

In a landmark decision, the U.S. Court of Appeals for the DC Circuit has ruled that the Federal Communications Commission failed to consider evidence of adverse health impacts from wireless technology, including 5G.

On August 13, circuit judges with the United States Court of Appeals for the District of Columbia ruled in favor of environmental health groups and petitioners, finding that the Federal Communications Commission (FCC) ignored thousands of public comments and evidence of adverse harm from wireless technology...

Aug 18 11:35

Cyber Hacks Stealing People’s Home Loans

Aug 18 09:44

Do you trust Apple?

Apple is a business.

This is the first thing you should know about it. It's a company that exists to make money.

It's not your friend. It's not a superhero. It's not a religion.

As a company, it invites you to buy its products and services. If you don't like what it has to offer, you're free to move on.

And I think that this confusion is at the heart of a lot of the criticism that Apple has received over the new child safety features that it is introducing. It's quite a complicated and charged subject, and both Apple's messaging, along with how the media have reported those messages, have created more confusion.

Add to that the fact that some people get very upset when Apple does something that doesn't fit in with how they see the company, and it's a recipe for disaster.

Aug 18 09:37

Boston Dynamics releases video of Atlas robot doing parkour — and behind-the-scenes footage of crashes

Much has been said about the possibility robots from Boston Dynamics will chase down humans in some hypothetical android apocalypse, and new video suggests they'd have no issue navigating obstacles while doing so.

But what the latest demonstration of the prototypical humanoid Atlas's abilities doesn't show is they also crash.

A lot.

In fact, the US-based company estimates they still crash about half the time while performing the parkour routine filmed to showcase Atlas's nimbleness.

Aug 18 09:35

T-Mobile Admits Data On Over 48 Million People Stolen By Hackers

The stolen data includes customer names, dates of birth, social security numbers, and driver’s license information...

Aug 18 07:29

DHS Secret Terror Watchlist With Nearly 2 Million People On It Exposed Online With NO PASSWORD

The Department of Homeland Security under Alejandro Mayorkas earlier this year revealed plans to declare their political opposition "suspected domestic extremists" and strip them of their rights by placing them on the No Fly List.

Every indicator suggests Mayorkas has followed through on those plans and has been rapidly expanding the regime's No Fly List and terror watchlist by adding dissidents such as America First talk show host Nick Fuentes to them.

According to a newly released report from security researcher Volodymyr Diachenko, DHS last month had their highly-secretive terror/no fly watchlist with nearly 2 million so-called "suspected terrorists" on it exposed on the open internet "without a password or any other authentication required to access it."

Aug 17 19:19

The War In Afghanistan Comes Home

By Matt

The story of the “end” of the U.S. occupation of Afghanistan isn’t just about the end of the conflict there, it’s also about where it’s headed next. The Pentagon didn’t spend $2 trillion over 20 years to just walk away from one of the most valuable squares on the geopolitical chessboard empty handed. The possibility for full-scale re-entry into the country is always there, but in the meantime, there are plenty of lessons the Pentagon learned there that they’ll be employing stateside...