COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Jul 27 10:16

'Get Her iPad For Imran': Wikileaks Email Connects Nancy Pelosi to Imran Awan

Wikileaks' Julian Assange dug up an interesting leaked email showing Debbie Wasserman Schultz's crooked former IT aide Imran Awan may be connected to Nancy Pelosi.

Awan was caught attempting to flee the US on Monday night and transfer around $300,000 to his house in Pakistan after an investigation by The Daily Caller found the FBI seized a host of smashed up hard drives from his home.

Jul 27 10:16

Big Three Networks Completely Ignore Arrest Of Wasserman Schultz's Crooked IT Aide

The FBI's arrest of Debbie Wasserman Schultz's IT aide Imran Awan as he attempted to flee the country for Pakistan was one of the biggest stories on the internet yesterday, but NBC, CBS, and NBC completely ignored it.

Jul 27 10:11

Arrested DNC Staffer Awan Retains Long-Time Clinton Associate For Legal Help

After getting arrested Monday night at Dulles Airport in Northern Virginia while attempting to flee the country on a flight to Qatar, Debbie Wasserman-Schultz' IT staffer, according to Conservative Review, has decided to hire a lawyer with longstanding connections to the Clinton family for legal help.

Chris Gowen, a founding partner at Gowen, Rhoades, Winograd and Silva, apparently did a little bit of everything for the Clintons over the course of multiple years including working in the Clinton White House, helping President Bill Clinton write his book, "My Life", and serving on Hillary's 2008 presidential campaign.

Jul 27 10:03

Seth Rich case P.I. Rod Wheeler hints arrest of Dems congressional tech guy Imran Awan may link back to Seth Rich case

Arrested tech staffer Imran Awan was still employed by Rep. Wasserman Schultz as of Tuesday morning, the day he was arrested while attempting to leave the country, according to a senior House Democratic aide. There must some really interesting stuff on that laptop that Awan hid and Her Debbieness wanted back so badly.

Jul 27 10:02

Imran wired almost $300,000 to Pakistan before attempting to flee, and some flashback articles from Daily Caller

Remember, Imran Awan had access to the DNC emails that found their way to WikiLeaks (see the last tweet below). They probably had to shield him rather than bumping him off because he allegedly had lots of blackmail-worthy material on Debbie and lots of other Dems, which would make an excellent dead man switch.

Jul 27 09:46

AUSTRALIAN POLICE SEEK THE RIGHT TO INSTALL MALWARE ON HOME DEVICES DURING "EMERGENCIES"

The Queensland Police have asked the Australian Parliament to give them the right to covertly install malicious software on your home devices in order to conduct mass surveillance during times of "national emergency" The plan neatly demonstrates the ignorance and indifference of law enforcement to the realities of information security and civil liberties. Australia has emerged as a world leader in bad information policy, seeking a worldwide ban on working cryptography, with Australian Prime Minister Malcolm Turnbull insisting that "The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia."

Jul 27 09:32

GOOGLE REVEALED AN ISRAELI SPYWARE COMPANY THAT HAS QUIETLY SOLD ITS WARES FOR YEARS

Researchers claim to have uncovered a new Android spying tool linked to a relatively unknown Israeli company. The findings come as part of ongoing investigations by the researchers into commercial, surveillance-focused malware, and suggest that a booming mobile spyware industry shows no sign of slowing down.

Jul 27 09:03

Bitcoin SCAM warning: Currency is ‘pyramid scheme’ says top investor who predicted crash

CRYPTOCURRENCY Bitcoin is a nothing more than a fad or pyramid scheme style scam, according to billionaire investor Howard Marks.

...

He told clients: "In my view, digital currencies are nothing but an unfounded fad (or perhaps even a pyramid scheme), based on a willingness to ascribe value to something that has little or none beyond what people will pay for it."

The investor compared cryptocurrencies to the Tulip mania of 1637, the South Sea bubble of 1720 and the internet bubble of 1999.

He added: "Serious investing consists of buying things because the price is attractive relative to intrinsic value.

"Speculation, on the other hand, occurs when people buy something without any consideration of its underlying value or the appropriateness of its price."

Jul 27 09:03

CIA ABILITY TO TROJAN APPLE OS EXPOSED IN LATEST HACKING RELEASE

‘Achilles’ is detailed by WikiLeaks in a statement as producing one or more operators to access an OS X disk image, and execute operations one time. The OS X disk image contains the contents and structure of the device’s storage.

Intel Core 2 Processor and OS X are required on the target's computer for ‘Achilles’ to operate, according to a user guide.

‘Imperial’ is part of a series by the whistleblowers named ‘Vault 7’ which began in March and has seen releases from WikiLeaks on an almost weekly basis.

WikiLeaks claims the leaks, which detail hacking exploits, come from a computer within the CIA, who would not comment on their alleged origin.

Also detailed in ‘Imperial’ is ‘SeaPea’ which targets Apple devices, providing stealth and tool-launching capabilities to the OS X Rootkit. Running on Mac OSX 10.6 and 10.7 it hides files and directories, socket connections and processes, according to WikiLeaks.

Jul 27 08:36

Car Wash Hack Can Strike Vehicle, Trap Passengers, Douse Them With Water

A group of security researchers have found vulnerabilities in internet-connected drive-through car washes that would let hackers remotely hijack the systems to physically attack vehicles and their occupants. The vulnerabilities would let an attacker open and close the bay doors on a car wash to trap vehicles inside the chamber, or strike them with the doors, damaging them and possibly injuring occupants.

"We believe this to be the first exploit of a connected device that causes the device to physically attack someone," Billy Rios, the founder of Whitescope security, told Motherboard.

Jul 27 08:34

Twitter added zero users last quarter

The company’s user growth is still a problem after all.

Jul 26 17:33

Why building a better browser doesn’t translate to a better marketshare

The Desktop market is not growing much any more, so Google can’t acquire new users easily which threatens Google’s revenue growth. Instead, Google is going after Firefox and other browsers to grow. Chrome allows Google to lock in a user and make sure that that user heads to Google services first. No wonder Google is so aggressively converting everyone to Chrome, especially if the marketing for that is essentially free to them.

This explains why the market share decline of Firefox has accelerated so dramatically the last 12 months despite Firefox getting much better during the same time window. The Firefox engineering team at Mozilla has made amazing improvements to Firefox and is rebuilding many parts of Firefox with state of the art technology based on Mozilla’s futuristic rendering engine Servo. Firefox is today as good as Chrome in most ways, and better in some (memory use for example). However, this simply doesn’t matter in this market.

Jul 26 17:27

Apple has to pay $506 million for using processor technology patented by a school

A US judge ruled that Apple must pay the University of Wisconsin-Madison $506 million for infringing on its patent. This amount is more than double the amount originally decided on by a jury, according to Reuters. The ruling continues a two-year-old patent-infringement battle, which may not be over.

In October 2015, a jury ruled that Apple committed patent infringement when creating mobile chips used in its iPhone, iPad Mini, and iPad Air. The A7, A8, and A8X processors used in the iPhone 5S, 6, and 6 Plus were found to have benefited from the university’s patented technology. Apple was ordered to pay $234 million in damages, although the company maintained its innocence and claimed that it had its own patent for the technology in question.

The increased amount of $506 million is punishment for Apple’s continual infringement of the patent following the 2015 ruling, said district judge William Conley.

Jul 26 17:07

Italy’s largest bank HACKED in major security breach as data from 400,000 accounts stolen

ITALY'S top bank UniCredit has been targeted in a huge hacking attack in Europe’s largest banking security breach this year.

Biographical and loan data from 400,000 client accounts was stolen in the hack as the bank insisting it "immediately took all necessary actions" to tackle the breach.

Jul 26 16:03

Declassified Memos Show Obama's NSA Spied On Americans Way More Than You Thought

"Americans should be alarmed that the NSA is vacuuming up their emails and phone calls without a warrant. The NSA claims it has rules to protect our privacy, but it turns out those rules are weak, full of loopholes, and violated again and again."

Jul 26 15:43

SEC Regulates “Initial Coin Offerings” Virtual Tokens Subject To Securities Laws

By Aaron Kesel

The Securities and Exchange Commission (SEC) has issued a press release cautioning market participants that offer “Initial Coin Offerings” or “Token Sales” that these “virtual” organizations are subject to the requirements of federal securities laws. So what does this mean for Bitcoin and other altcoins that were primarily operated inside U.S. jurisdiction?...

Jul 26 13:35

US NAVY LAB TESTS "DISPOSABLE" MICRODRONES THAT GLIDE DOWN FROM THE SKY

The US Naval Research Labs's CICADA (Close-In Covert Autonomous Disposable Aircraft) microdrones are designed to be dropped in bulk from a flying aircraft. Once airborne, the drones use autopilot to stabilize and then GPS and fins to steer to the intended location. Apparently they can glide into a safe landing within 15 feet of their targets.

Jul 26 13:31

House IT Aide’s Lawyer Is Longtime Clinton Associate

Chris Gowen, Imran Awan’s lawyer, is a longtime campaigner for former President Bill Clinton and former Secretary of State Hillary Clinton and a member of an attorney team that brought a fraudulent lawsuit against energy giant Chevron Corp.

Pakistani-born Imran was arrested late Monday at Dulles Airport in Northern Virginia before he could board a flight to Qatar and then Pakistan on bank fraud charges. Imran; his younger brothers, Abid and Jamal; his wife, Hina Alvi; and Rao Abbas, his best friend, have been subjects of a federal criminal investigation led by the U.S. Capitol Police and including the FBI since February 2017.

Jul 26 10:51

Why Smart Guns Are Incredibly Dumb: Hacker Cracks Smart Gun With $15 Magnets

Smart guns probably provide the last chance for gun control advocates to have their way. After trying and failing for decades to completely eviscerate gun rights in America, their last best hope is to simply let defiant gun owners have their weapons, but with conditions. They’ll try to compromise with gun owners, and tell them that they can have any firearm they want, so long as it is a smart gun, which is supposedly safer since it can’t be used by unauthorized individuals like children and criminals.

But as we all know, everything gun control advocates propose is a slippery slope. How long before these smart guns, like all smart gadgets, begin to spy on their owners? How long before smart guns can be disabled by authorities from a distance, which would effectively defang their role in society as determined by the Second Amendment?

Jul 26 09:27

THE REAL COSTS OF CHEAP SURVEILLANCE

The rise of social credit?

All this could spread very deeply into our lives, raising concerns about invasions of privacy. What if credit bureau ratings incorporated the creditworthiness of an applicant’s friends? Or her educational background, the make of her car or whether she uses all capital letters in her text messages? The U.S. Consumer Finance Protection Bureau has opened an inquiry into the dangers such practices might pose.

Jul 26 09:12

No more ransomware: How one website is stopping the crypto-locking crooks in their tracks

No More Ransom launched a year ago: here's the story of how cybersecurity firms and law enforcement are working together to bring down ransomware.

Webmaster's Commentary: 

Jul 26 09:03

U.S. Intelligence Veterans Believe the ‘Russian Hack’ of DNC Computers May Have Been an Inside Job

MEMORANDUM FOR: The President

FROM: Veteran Intelligence Professionals for Sanity (VIPS)

SUBJECT: Was the “Russian Hack” an Inside Job?

Executive Summary
Forensic studies of “Russian hacking” into Democratic National Committee computers last year reveal that on July 5, 2016, data was leaked (not hacked) by a person with physical access to DNC computers, and then doctored to incriminate Russia.

After examining metadata from the “Guccifer 2.0” July 5, 2016, intrusion into the DNC server, independent cyber investigators have concluded that an insider copied DNC data onto an external storage device, and that “telltale signs” implicating Russia were then inserted.

Jul 26 08:01

The Dangers of Cell Phones; There’s A Report

By Catherine J. Frompovich

What would you think if I told you there is deliberate, governmental suppression of important health reports and information? One normally would think federal and city/county/state health agencies would be bending over backwards to bring factual health and precautionary information to the public they serve.

Well, there’s documented proof the State of California is messing around with keeping important cell phone dangers information from public access and the residents of that state...

Jul 26 07:08

Kaspersky is giving away its antivirus for free

Kaspersky has kicked off the global launch of a free antivirus program which covers the core anti-malware capabilities, while leaving more advanced features as the domain of its paid-for products.

Kaspersky Free will be the bottom tier of the range underneath the likes of Kaspersky Anti-Virus and Internet Security, providing the bare essentials of protection at no cost.

That means antivirus for your PC, protection for your browser and email inbox, along with basic self-defence features and anti-phishing measures.

Jul 26 07:05

Here's how to avoid the Whatsapp scam that is trying to get your bank details

A new scam has originated that targets WhatsApp users by sending them fake messages and trying to get their bank details.

What appears to be a normal WhatsApp message is sent to users - and fraudsters are using it to gain access to users' personal details, reports Wales Online .

Emails and messages are being sent to phones claiming your subscription to the messaging service is ending soon.

It then asks you to update your payment information, stating that your one-year free trial period has ended.

Action Fraud said the text could trick long-term users of WhatsApp who may remember paying a 99p fee to use the service.

The original subscription fee was stopped after Facebook bought the company for £11.4bn in 2016.

Jul 25 17:28

Firefox doesn't need to be No 1 – and that's OK, 'cos it's falling off a cliff

Just in case you didn't believe Firefox was on a trajectory that should have it crash and burn into extinction in the next couple of years, former chief technology officer Andreas Gal has usage stats that confirm it. To use Gal's words: "Firefox market share is falling off a cliff." The same could be said of Firefox itself.

What's most interesting about this data and Gal's interpretation of it is that at the same time that Firefox is sliding into irrelevancy it's becoming a better browser. It's faster than it's ever been and uses less memory – less than its replacement, Chrome. Of course, as the ancient Betamax vs VHS format wars demonstrated, having a superior product does not translate to market share.

The big question is why?

Jul 25 17:21

Mozilla Firefox's Fx55 and Fx56 Versions Can Reduce Memory Usage 75 Per Cent

Dietrich Ayala, developer relationist at Mozilla, could comfortably be called a power user of Firefox, which comes with the job really. “Right now, more effort is being put into making Firefox faster than I've seen since... well, since I've been working on Firefox. And I've been at Mozilla for more than a decade.” He’s got a Firefox profile that means 1691 tabs are opened when the starts up Firefox. That’s slightly more than your average user, and as recently as the Fx51 version of Firefox, his start-up time was close to eight minutes. As of Fx56, Ayala can now start up Firefox with 1691 tabs in just 15 seconds.

As for total memory usage with 1691 tabs open, Ayala has found it consistently hovering around the 2GB mark for the last few versions of Firefox. As of Fx56, it’s now sitting at just under half a gigabyte.

Jul 25 15:45

Ransomware victims have given hackers over $25 MILLION to get their computers back in just two years, Google study finds

Researchers at Google, Chainalysis, UC San Diego, and the NYU Tandon School of Engineering came to the astounding total by following the Bitcoin transactions the victims paid their hackers through the blockchain, then comparing them against known samples to create a comprehensive overview of the ransomware ecosystem.

The study tracked 34 separate families hit by ransomware attacks and revealed that just a few strains of malicious software were responsible for the majority of the attacks and profits.

Jul 25 15:25

ALIS in Blunderland: Lockheed says F-35 Block 3F software to be done by year's end

F-35 software development will be finished by the end of this year, Lockheed Martin has said – which contradicts the view of various American government audit agencies.

...

Meanwhile, the Pentagon's director of operational test and evaluation told a US Congress committee earlier this year that the aircraft won't be ready before 2019, mentioning 158 "Category 1" software flaws that could cause death, severe injury or illness unless fixed.

...

Delays and cost overruns have been a frequent feature of the F-35 saga. Given the sheer quantity of software in not only the aircraft but its ALIS logistics suite too, it should be no surprise that costs have spiralled and unforeseen delays reared their heads. After all, since when did any Big Government IT Project run on time and within budget?

Jul 25 15:21

Wasserman-Schultz IT Aide Arrested While Attempting To Flee Country, Charged With Bank Fraud

Just a day after reports emerged that the FBI had seized a number of "smashed hard drives" and other computer equipment from the residence Imran Awan, the IT aide of Debbie Wasserman-Schultz, we learn that Awan has been captured at the Dulles airport while attempted to flee the country.

Jul 25 15:17

Facebook Files Patent That Takes Secret Photos To Detect Your Emotions

Facebook slowly has migrated onto other platforms since its launch. But a recent patent filing shows it potentially could be keeping an eye on something more significant: your webcam.

CBInsights reported the patent in question would be for a system that would use a smartphone or laptop’s front-facing camera to take brief photos of you while you’re using Facebook. According to the patent, Facebook could then use these temporary photos to determine your emotions when seeing various types of posts on the News Feed. With this information, the social media network could then provide content tailored to keep you on the service for longer.

Jul 25 15:13

Sweden Leaks the Personal Information of Millions of Its Own Citizens

A series of reports by Swedish newspaper Dagens Nyheter began to bring more information to the public in mid-July, and Pirate Party founder/privacy advocate Rick Falkvinge has been distributing the information for the English-speaking world.

From what we understand, the agency proceeded to upload all of its data to IBM and NCR’s cloud servers, where it was accessible by people outside of Sweden who didn’t have proper security clearance.

This information included all the details you’d find on a vehicle registry: the names, photos, and home addresses of millions of Swedish citizens. That’s enough of a problem in and of itself. But this info was publicly available by request. What wasn’t publicly available was the personal information on members of the military, secretive special forces, suspects wanted by police, citizens in witness protection, complete information about the model and condition of all military vehicles, and technical specs on roads and bridges.

Jul 25 15:09

Flash loses final appeal: Adobe sentences its web tech to death

The fact that it could run full-fledged programs exposed browsers to a large number of security vulnerabilities. It was responsible for a sizable percentage of browser crashes, too. It used battery power that became precious as we moved from plugged-in desktop computers to laptops and then phones.

Jul 25 15:04

Six billion records hacked so far this year: researchers

A surge in computer hacking has led to the breach of more than six billion records so far this year, topping the total for 2016, security researchers said Tuesday.

Virginia-based Risk Based Security said in its mid-year report that it identified 2,227 publicly disclosed data compromise events through June 30 affecting business, government, medical and educational data.

"It is stunning to see the steady increase in the number of breaches impacting one million or more records," said Inga Goddijn, Executive Vice President for Risk Based Security.

Jul 25 15:02

Adobe Announces Flash Distribution and Updates to End

Adobe has announced it will stop distributing and updating Flash Player at the end of 2020 and is encouraging web developers to migrate any existing Flash content to open standards.

Jul 25 14:58

About Trump's Meeting With Putin At The G20

Includes full text of the official report presented directly thereafter to the Russian Media.

The third issue is cyber security which was understandably given considerable attention. The presidents agreed that this area is becoming ever more dangerous. There are numerous threats emerging in cyber space, including a terrorist threat, threats in other areas of organised crime, such threats to the normal functioning of societies as child pornography, pedophilia, the so-called suicide networks. Of course, President Trump also mentioned that certain circles in the United States keep on spinning the issue of Russia’s interference in the US elections even though they are unable to prove that.

Jul 25 13:58

Hackers Nab $32mn In Ethereum Cryptocurrency

Some $32 million worth of ether cryptocurrency has been stolen by hackers. Ether, a digital currency, resides on the ethereum network and is now a rival to Bitcoin. The monumental theft was carried out due to a bug on a wallet software program.

Jul 25 10:51

Stanford researchers working on centralized control over autonomous cars, drones

A team of computer scientists and engineers at Stanford University are developing the infrastructure to centrally manage autonomous cars and drones.

Believing that autonomous cars and drones will be managed centrally, using applications running in large datacenters, members of the team have formed a new laboratory, called the Platform Lab, to work on infrastructure for new "Big Control" applications.

Webmaster's Commentary: 

"No, you may not go to the waffle house; I am taking you to the gym for a workout!!!" -- Car

Jul 25 10:17

Canada Claims Authority to Censor Your Internet Searches

The Canadian Supreme Court today ruled the country has the authority to demand Google censor and remove links to certain web pages or online content.

The idea that governments can force Google to deindex links to pages is unfortunately not new (see the European Union's "right to be forgotten"). What matters internationally in this case is the government is forcing Google to remove links from searches regardless of where the Internet user is. That is to say: Canada is demanding the authority to censor the internet outside of its physical borders and control what people who are not Canadian citizens can find online.

Jul 25 10:16

NSA Officials and Computer Expert: Forensic Evidence Proves DNC Emails Were LEAKED, Not Hacked

Preface by Washington's Blog: We asked top NSA whistleblower Bill Binney what he thought about a report claiming that the DNC emails were transferred too quickly to have been accessed by a hacker, and could only have been copied by a DNC leaker. This article is his response. Background here and here.

MEMORANDUM FOR: The President

FROM: Veteran Intelligence Professionals for Sanity (VIPS)

SUBJECT: Was the “Russian Hack” an Inside Job?

Executive Summary

Forensic studies of “Russian hacking” into Democratic National Committee computers last year reveal that on July 5, 2016, data was leaked (not hacked) by a person with physical access to DNC computers, and then doctored to incriminate Russia.

After examining metadata from the “Guccifer 2.0” July 5, 2016 intrusion into the DNC server, independent cyber investigators have concluded that an insider copied DNC data onto an external storage device, and that “telltale signs” implicating Russia were then inserted.

Webmaster's Commentary: 

Translation: the alleged "Russian hacking" of last November's election never actually happened; it was simply a convenient lie, concocted at the top levels of the DNC, with which the Democrats tried to spin their appalling losses in 2016.

There's no "there" there.

Jul 25 09:49

FEDS DEPLOY MASSIVE ‘PRE-CRIME’ DRAGNET ON MILLIONS OF AMERICANS

And the greatest danger of all is over the horizon. Once the government discovers a new technology to intrude on the lives of ordinary citizens, a pretext will no doubt be developed after the next terrorist incident or insider attack to use it in ever widening circles as new threats are allegedly discovered. When that happens, we can confidently expect Patriot Act III, with a provision allowing continuous surveillance of any and all possible suspects. And there is actually a precedent. Back in 2003, the Pentagon under George W. Bush was already tinkering with what if referred to as Total Information Awareness to examine predictive behavior, described at the time as the “biggest surveillance program in the history of the United States.”

Webmaster's Commentary: 

George Orwell was not just a brilliant author; he was also a prophet, and we are seeing his dystopian universe come to chilling fruition in the 21st century.

Jul 25 09:09

The 45 minutes that cost global giant Reckitt £100m: 15,000 laptops, 2,000 servers, 500 systems crippled in hacking attack

A devastating cyber-attack that cost the maker of Durex and Dettol an estimated £100million crippled the company in just 45 minutes and wiped out swathes of its global computer network, its boss has revealed.

Reckitt Benckiser chief executive Rakesh Kapoor laid bare how the Petya ransomware virus rendered 15,000 laptops, 2,000 servers and 500 computer systems unusable in three-quarters of an hour – and the company has still not fully recovered.

Jul 25 08:55

FBI and NSA outsource their harassment of Targeted Individuals and Watchlisted Individuals to private firms

Now there are a few private companies, think of Blackwater” on a cyber-level, which are also master’s of intrusion, hacking, identity theft, spoofing and 24/7 harassment of anyone who has been illegally and unconstitutionally watch-listed as a domestic threat. However NSA still has the budget, the tech-toys, the software and extra-judicial tactics which trump any of the subsequently mentioned private groups.

One of the companies which acts as a hired gun for the federal government (and thus has the luxury of operating without any oversight, is James Bimen and Associates, based in Fairfax, Virginia. This corporation is right down the street from several acronym agencies, has developed special tools for the FBI and is tasked to hack into computers and phones of watch-listed individuals (WLIs) and Targeted Individuals (TIs).

Jul 25 08:28

Intel Vets Challenge ‘Russia Hack’ Evidence

In a memo to President Trump, a group of former U.S. intelligence officers, including NSA specialists, cite new forensic studies to challenge the claim of the key Jan. 6 “assessment” that Russia “hacked” Democratic emails last year.

Jul 25 07:46

Apple Users, Beware! A Nearly-Undetectable Malware Targeting Mac Computers

An unusual piece of malware that can remotely take control of webcams, screen, mouse, keyboards, and install additional malicious software has been infecting hundreds of Mac computers for more than five years—and it was detected just a few months back.

Dubbed FruitFly, the Mac malware was initially detected earlier this year by Malwarebytes researcher Thomas Reed, and Apple quickly released security patches to address the dangerous malware.

Now months later, Patrick Wardle, an ex-NSA hacker and now chief security researcher at security firm Synack, discovered around 400 Mac computers infected with the newer strain of the FruitFly malware (FruitFly 2) in the wild.

Wardle believes the number of infected Macs with FruitFly 2 would likely be much higher, as he only had access to some servers used to control FruitFly.

Jul 25 07:44

Roombas have been busy mapping our homes, and now that data could be up for sale

Over the past couple of years, Roombas haven’t just been picking up dust and chauffeuring cats around, they’ve also been mapping the layout of your home. Now, Colin Angle, the chief executive of Roomba maker iRobot, has said he wants to sell the data from these maps in order to improve the future of smart home technology.

Jul 25 07:36

Hacker Steals $8.4 Million in Ethereum (4th Heist In A Month)

An unknown hacker has just stolen nearly $8.4 Million worth of Ethereum – one of the most popular and increasingly valuable cryptocurrencies – in yet another Ethereum hack that hit Veritaseum's Initial Coin Offering (ICO).

This incident marks as the fourth Ethereum hack this month and second cyber attack on an ICO, following a theft of $7 Million worth of Ether tokens during the hack of Israeli startup CoinDash's initial coin offering last week.

A few days ago, a hacker also stole nearly $32 Million worth of Ethereum from wallet accounts by exploiting a critical vulnerability in Parity's Ethereum Wallet software, which followed a $1 Million worth of Ether and Bitcoins heist in crypto currency exchange Bithumb earlier this month.

Jul 25 05:01

Welcome to the Era of Artificial Intelligence and Technological Deceit

The era of artificial intelligence and technological deceit is upon us.

Pretty soon, computer wizardry and artificial intelligence will allow video footage to be created that is practically indiscernible from the real deal. Add to this holograph technology, and soon, a person could appear to be speaking, live, in front of you, and you’d never even know it was all fake.

Let's look at three technologies that bring the possibility of deception to dizzying heights. If you think "fake news" and media manipulation is bad now, you ain't seen nothin' yet.

Jul 25 04:02

CHINA FORCES MUSLIM MINORITY TO INSTALL SPYWARE ON THEIR PHONES

Chinese authorities in the province of Xinjiang are forcing locals of the Uyghur Muslim minority to install an app on their phones that will allow the government to scan their device for "terrorist propaganda," local media reports. In reality, the app creates MD5 hashes for the user's files and matches them against a database of known terrorist content.

Jul 24 17:44

Net Neutrality Regulations Are Pushed by Large Corporations

In this video, Vin Armani explains why you’ve been tricked into supporting net neutrality. Some big corporations don’t want a free market. They want a protected market with barriers. Lawmakers seem hungry to regulate the Internet. It’s a dangerous combination that infects most industries. Don’t let it happen to the Internet.

Jul 24 17:24

32M Becomes First-Ever Company to Implant Micro-Chips in Employees

Marketing solution provider Three Square Market (32M) has announced that it had partnered with Swedish biohacking firm BioHax International for offering implanted microchips to all their employees on 1st August, according to the company's website.

Although the programme is optional, the company wants at least more than 50 of its employees to undergo the Biohacking procedure.

Like previous bio hacks, the chips will be implanted underneath the skin between the thumb and forefinger, and will also use near-field communications (NFC) — the same technology that makes contactless credit cards and mobile payments possible — along with radio-frequency identification (RFID).

According to the company, the implanted chips would allow its employees to log into their office computers, pay for food and drink from office vending machines, open doors and use the copy machine, among other purposes.

Jul 24 16:08

Hackers Nab $32mn In Ethereum Cryptocurrency

Some $32 million worth of ether cryptocurrency has been stolen by hackers. Ether, a digital currency, resides on the ethereum network and is now a rival to Bitcoin. The monumental theft was carried out due to a bug on a wallet software program.

Jul 24 13:22

EXCLUSIVE: FBI Says ‘Awan Brothers’ Hard Drives Were Smashed After Confiscated As Law Enforcement Evidence

Reports of the FBI seizing computer hard drives form the home of the congressional IT director and aide of Florida Democratic Rep. Debbie Wasserman Schultz are accurate, according to FBI sources: with the exception of one major detail. The computer hard drives were not damaged when they were confiscated, FBI sources said.

The FBI, who is working in some capacity to assist with the Capitol Police on the Awan investigation, confirm the hard drives and other computer equipment have been damaged but are pointing the finger at the Capitol Police’s chain of custody with the evidence. The FBI, they said, would not damage evidence and stressed if someone went to the trouble of destroying evidence before a seizure they normally would discard of it as well, federal sources said.

Capitol Police officials would not respond to requests for comment.

Jul 24 09:23

BLACKSTONE GROUP TO BUY STAKE IN ISRAELI FIRM BEHIND GOV SURVEILLANCE SOFTWARE

The Israeli company has become a world leader in cyber infiltration and has been used against activists and dissidents the world over.

Jul 24 09:18

THERE'S A REASON YOU SHOULD BE TERRIFIED OF IRIS SCANNERS AND IPHONE FACIAL RECOGNITION – BUT IT'S NOT THE REASON YOU THINK

Last week, high street lender TSB announced that it was becoming the first bank in Europe to introduce iris recognition on its mobile banking app, allowing you to transfer money, check your balance and make payments, quite literally, in the blink of an eye.

Jul 24 08:38

NSA Officials and Computer Expert: Forensic Evidence Proves DNC Emails Were LEAKED, Not Hacked

Forensic studies of “Russian hacking” into Democratic National Committee computers last year reveal that on July 5, 2017, data was leaked (not hacked) by a person with physical access to DNC computers, and then doctored to incriminate Russia.

After examining metadata from the “Guccifer 2.0” July 5, 2016 intrusion into the DNC server, independent cyber investigators have concluded that an insider copied DNC data onto an external storage device, and that “telltale signs” implicating Russia were then inserted.

Key among the findings of the independent forensic investigations is the conclusion that the DNC data was copied onto a storage device at a speed that far exceeds an Internet capability for a remote hack. Of equal importance, the forensics show that the copying and doctoring were performed on the East coast of the U.S. Thus far, mainstream media have ignored the findings of these independent studies.

Jul 24 08:34

Clinton Email Scandal: Now A Key Witness' Emails Have Mysteriously Vanished

Hillary Clintons email troubles just keep getting weirder and
weirder -- and harder for anyone but the most die-hard Clinton
fans to ignore.

The latest twist is news that four years worth of State
Department emails from Clintons top IT staffer, Bryan Pagliano,
cant be found.

The Department has searched for Mr. Paglianos email pst file
and has not located one that covers the time period of Secretary
Clintons tenure, said States Elizabeth Trudeau.

State was, however, able to find Pagliano emails for his recent
work at the Department as a contractor, but the files are from
after Secretary Clinton left the Department.

In other words, only those emails he sent after Clinton left
State can be found. How convenient.

Jul 24 08:24

FBI Seized Smashed Hard Drives From Wasserman Schultz IT Aide’s Home

FBI agents seized smashed computer hard drives from the home of Florida Democratic Rep. Debbie Wasserman Schultz’s information technology (IT) administrator, according to two sources with knowledge of the investigation.

Pakistani-born Imran Awan, long-time right-hand IT aide to the former Democratic National Committee (DNC) Chairwoman, has since desperately tried to get the hard drives back, an individual whom FBI investigators interviewed in the case told The Daily Caller News Foundation’s Investigative Group.

Jul 24 07:59

Windows 10 and a bump in the road to Windows as a Service

The discovery last week that millions of PCs that upgraded to Windows 10 might be cut off from support much earlier than expected is one unexpected consequence of Microsoft's ongoing shift to Windows as a Service.

Under the old model, it was pretty easy to understand where you stood with Windows, because Microsoft has long published the dates after which it will stop supporting various versions of its software.

Jul 24 06:40

Debian patches plenty in new version 9.1

26 security fixes for 55 packages. You know what to do!

Jul 24 06:38

Sweden leaked every car owners' details last year, then tried to hush it up

Falkvinge writes Sweden's government has been trying to handle the huge leak of sensitive data away from the public eye.

The story goes back to 2015, when Sweden's transport agency awarded IBM a contract to manage its databases and networks.

...

The leak seems to have happened over email after the transport agency e-mailed the entire database in clear text messages to marketers that subscribe to it – and when the error was discovered, the agency merely sent a new list and told subscribers to delete the old list themselves.

Jul 24 06:33

Sweden Accidentally Leaks Personal Details of Nearly All Citizens

Another day, Another data breach!

This time sensitive and personal data of millions of transporters in Sweden, along with the nation's military secrets, have been exposed, putting every individual's as well as national security at risk.

Who exposed the sensitive data? The Swedish government itself.

Swedish media is reporting of a massive data breach in the Swedish Transport Agency (Transportstyrelsen) after the agency mishandled an outsourcing deal with IBM, which led to the leak of the private data about every vehicle in the country, including those used by both police and military.

The data breach exposed the names, photos and home addresses of millions of Swedish citizen, including fighter pilots of Swedish air force, members of the military's most secretive units, police suspects, people under the witness relocation programme, the weight capacity of all roads and bridges, and much more.

Jul 24 06:27

Source Code For SLocker Android Ransomware That Mimics WannaCry Leaked Online

Bad news for Android users — Source code of for one of the oldest mobile and popular Android ransomware families has been leaked online, making it available for cyber criminals who can use it to develop more customised and advanced variants of Android ransomware.

Jul 24 05:25

Scott Adams: How “Confident” are Intelligence Agencies that Russia Interfered with the Election?

Remember when all seventeen intelligence agencies agreed that Russia interfered with our elections?

Turns out it was only four.

Do you know how you get four agencies to agree on something of this nature? It’s easy. One publishes an opinion and the other three loyal agencies assume it is credible, so they support it. Do they all do independent investigations?

I kinda doubt it.

Jul 23 21:08

Let the robots take our jobs and pay for a universal basic income

As developments in artificial intelligence and robotics advance, there is going to be a severe and swift disruption of many working classes. Large swaths of laborers are going to lose their jobs, leading to unprecedented levels of unemployment.

To account for this problem, having access to basic needs should become a right, not a privilege for the non-automated classes. It should be the responsibility of the corporations that have taken away working-class jobs to grant families this right—and the best solution would be in the form of a universal basic income.

The following video explains, amongst other things, why a universal basic income is doomed to fail:

Jul 23 09:43

‘Fight For The Future’ Offers $15K To Leftist Cells Fighting TrumpIAN MILES CHEONG

“Fight for the Future,” a progressive non-profit organization that claims to “seek to expand the internet’s transformative power for good,” is offering as much as $15,000 a month to fund leftist activism against Donald Trump. Prospective members are expected to establish “A-Teams,” or cells dedicated to specific issues.

Jul 23 08:39

REPORT: Armies of Cyber-Troops Manipulating Public Opinion

The Computational Propaganda Research Project (COMPROP) investigates the interaction of algorithms, automation and politics. This work includes analysis of how tools like social media bots are used to manipulate public opinion by amplifying or repressing political content, disinformation, hate speech, junk or fake news.

In their most recent report COMPROP have identified how organisations, often with public money, have created a system to help ‘define and manage what is in the best interest of the public.’

Webmaster's Commentary: 

Meaning the best interests of the government and corporations.

Jul 23 08:06

Facial recognition surveillance is here — but privacy protections are not

In a little publicized section of Trump’s Immigration Executive Order, the president ordered Department of Homeland Security (DHS) to “expedite the completion and implementation of a biometric entry exit tracking system.” The purpose of the tracking system is to confirm who is entering and exiting the country to, for example, identify people who have overstayed their visas. Congress has already provided up to a billion dollars over the next ten years to implement the program.

Jul 22 16:41

SCAM WARNING: Website is tricking students out of thousands in fees

Newcastle University has put out an alert over a website calling itself “Newcastle International University” which has copied its branding, colours and fonts as well as animation, blogs and photos as well as details of dozens of courses.

The site appears to target unsuspecting students to hand over online their course fees as one section allows people to apply and pay for courses with requests for their personal information and passport and bank details.

The warning from the real Newcastle University said: "We have been made aware of an unofficial website which is fraudulently using the Newcastle University brand and accepting credit card payments to apply for courses.

"The website 'newcastle international university' is in no way associated with the University and we are advising anyone who finds the website not to submit any personal details. All students should use our official website http://www.ncl.ac.uk/."

Jul 22 10:41

Wisconsin Company To Implant Microchips In Employees

"It's the next thing that's inevitably going to happen, and we want to be a part of it," Three Square Market Chief Executive Officer Todd Westby said. The company designs software for break room markets that are commonly found in office complexes.

Jul 22 09:54

PATREON BANNED MY ACCOUNT??

Jul 22 09:32

Kansas data breach gives hackers access to millions of Social Security numbers

Hackers who breached a Kansas Department of Commerce data system in March had access to more than 5.5 million Social Security numbers in 10 states, along with another 805,000 accounts that didn't include the Social Security numbers, according to records obtained from the agency.

The department will be required to pay for credit monitoring for most of the victims of the hacking, according to records obtained through an open records request by the Kansas News Service.

Besides Kansas, the other states affected by the hack are Arkansas, Arizona, Delaware, Idaho, Maine, Oklahoma, Vermont, Alabama and Illinois.

Jul 22 09:18

IBM warns of malware on USB drives shipped to customers

IBM has urged customers to destroy USB drives which shipped with some of its Storewize storage systems because they may contain malware.

In a support advisory, the company has said an unspecified number of USB flash drives containing the Storewize initialisation tool for V3500, V3700, and V5000 Gen 1 systems are infected with malicious code.

Jul 22 08:46

Windows 10 shares your files with the internet... here's how to turn it off

By default, a Windows 10 update will use your bandwidth to share files on your PC with other PCs. This walk-through shows how to disable that feature--or tone it down a bit.

Jul 22 08:42

Spend ONE EURO on referendum and we’ll CUT FUNDS: Madrid in huge threat to Catalonia

THE Spanish government has increased the pressure on Catalonia and its bid for independence by threatening to cut the funding it gives to the Spanish region.

A spokesman for Mariano Rajoy’s administration in Madrid, Méndez de Vigo, said that the government would slash funds from the FLA - the Liquidity Fund for the Autonomous Communities - in the event of any “disobedience” from the Catalan separatists.

Jul 21 17:34

Twitter comes under fire as it emerges paedophiles are using live streaming app Periscope to groom children as young as nine

Twitter has come under fire after it emerged that paedophiles are using its Periscope live streaming app to groom children as young as nine.

They are bombarding the youngsters with sexual questions and requests, asking them to lift up their shirts and take off their clothes.

The app – which has more than 10million users – allows people to film themselves on their mobile phones and broadcast to strangers over the internet.

People watching then can send the ‘broadcasters’ messages, which flash up on the screen for everyone to see.

It is supposed to be restricted to children over the age of 13, but users can simply state they are older.

Children as young as nine are broadcasting to strangers from their bedrooms and even from school, the BBC reported.

Jul 21 12:39

They See You: FBI Warns About Dangers Of Internet-Connected Toys

While many American parents think ‘smart toys’ are a great idea, the FBI has issued an unprecedented warning that internet-enabled items may pose a privacy and safety risk for children by harvesting personal information.

Jul 21 10:30

BREAKING: YouTube Sued By Creators in Class-Action Lawsuit

YouTube creators ZombieGoBoom are leading a class-action lawsuit against YouTube, claiming the streaming service intentionally demonetized and removed creator content in order to appease advertisers.

Jul 21 09:33

Rare Earth Mania And China/US Trade Spat 2.0?

Unfortunately for the rest of the world, especially the US, China has a monopoly on the rare earths market with 85-90% of global production.

REEs are strategically important due to their (small but critical) applications in products used for the defense and technology sectors - including today’s mainstay of human existence, the mobile phone. China’s dominance arose from undercutting almost every other mining and processing player in the decades prior to its WTO entry.

The current story behind the higher prices is that China is getting serious (again) about the environmental impact of REE mining, and is making renewed efforts to curb significant levels of illegal production. On Monday, managing director of Australian-based rare earth producer, Lynas Corp (who just happened to note how her company is “highly leveraged to any increase in price for NdPr”) commented.

Jul 21 09:17

“Smart” Toothbrushes Are Equipped With Interactive Wireless Displays—Radio Transmitters

By Catherine J. Frompovich

Do you brush your teeth with a ‘smart’ toothbrush?

Did you know there are ‘smart’ toothbrushes?

According to the package information that comes with the Oral-B Triaction/Precision 5000/5500, it contains an “interactive wireless display,” i.e., a radio transmitter that puts out electromagnetic frequencies. Holy moly—one more smart device to track us, even while brushing our teeth...

Jul 21 08:27

Launch Live PlayerTHE CLINTONSFBI turns over 7,000 documents from Weiner laptop in Clinton-tied case

The FBI has turned over 7,000 new documents from Anthony Weiner’s private laptop to the State Department as part of a watchdog group's lawsuit related to last year's Hillary Clinton email case.

Judicial Watch and State Department representatives appeared in federal court in Washington, D.C., on Thursday over the group's Freedom of Information Act suit seeking Clinton emails from her tenure at the State Department.

It emerged during the hearing that the 7,000 new documents were turned over. The trove is expected to contain some emails sent by Weiner’s estranged wife, Clinton aide Huma Abedin.

In this Sept. 20, 2011 file photo, Huma Abedin, top, deputy chief of staff and aide to Secretary of State Hillary Rodham Clinton, right, during a meeting with leaders for the Open Government Partnership in New York.Expand / Collapse
Huma Abedin and then-Secretary of State Hillary Clinton in New York in September 2011. (AP)

Webmaster's Commentary: 

This effectively puts Hillary Clinton out of a run for President in 2020, but she is working to establish control of the Democratic Party to insure that a Clintonista gets "anointed" as the Democrat's candidate, to attempt to keep a lid on the bigger scandals in which she is involved.

Bernie Sanders, if he has one shred of decency left in him, needs to fight against this, so the the Democrat's choice will be an authentic one in 2020; not the kind of campaign which saw the life squeezed out of it, thorough corruption, as was his Presidential campaign in 2016.

Jul 21 07:52

Feds Shut Down AlphaBay; Sessions Warns Criminals "You Cannot Hide" On Dark Web

More than three years after the FBI shut down the Silk Road, the pioneering dark-web marketplace for drugs and illegal goods, the FBI and DEA – working with international law-enforcement agencies - have busted two more dark-web marketplaces that facilitated the sales of illicit items like drugs, weapons and stolen data, according to the Department of Justice.

AlphaBay and Hansa, two of the largest illegal marketplaces on the dark web, have been shut down and their operators arrested during a collaboration between US and European police agencies, according to the BBC. Investigations were led by the FBI and DEA in partnership with Europol.

Jul 21 07:37

Hackers are using hotel Wi-Fi to spy on guests, steal data

The DarkHotel hacking group has returned -- but this time they're focusing on a different target, using a new strain of Inexsmar malware.

Webmaster's Commentary: 

Jul 20 13:05

NEW DOCUMENTS SHOW MASSACHUSETTS PROSECUTORS CONDUCT SWEEPING WARRANTLESS SURVEILLANCE

Your call records, showing who you’ve called and texted, when, and how long the calls lasted. Your IP logs, showing where you access websites from—whether it’s home, work, a friend’s house, or on the go via your mobile phone. Your banking and credit card information. The email address you used to sign up for online services. Records showing every time you’ve logged on to your favorite social networking site, and how long those sessions lasted.

Jul 20 12:31

VW's settlement in emissions scandal reaches $1.3 billion

California says Volkswagen will pay the state another $154 million in penalties and costs over the automaker's emissions scandal.

California's Air Resources Board says the increase in a consent decree filed Thursday brings VW's total settlement in California to $1.3 billion.

Volkswagen Group of America acknowledges rigging 11 million of its vehicles with software used to cheat on vehicle emissions tests.

Jul 20 08:52

Nationwide Outage Hits Bank of America: Customers Unable To Access Accounts

In an apparent nationwide system outage, Bank of America customers have been shut out from accessing their accounts and online banking on Wednesday afternoon. As of 4pm ET the outage was continuing with most online systems still frozen.

Jul 20 08:49

Wasserman Schultz May Start Cooperating With House Hacking Probe

Rep. Debbie Wasserman Schultz is “negotiating” with the Capitol Police over whether to stop blocking access to a computer seized from her as part of a criminal cybersecurity investigation, Fox News reported Wednesday.

Soon after resigning as head of the Democratic National Committee in wake of it being hacked, the Florida Democrat’s top information technology (IT) aide, Pakistan-born Imran Awan, was named as the lead suspect in a separate information breach involving House data.

But instead of cooperating with Capitol Police, she used a hearing on the law enforcement group’s budget to threaten “consequences” for Police Chief Matthew R. Verderosa unless he returns her a computer taken in the investigation. Wasserman Schultz appeared visibly distraught in the televised hearing.

Jul 20 07:51

?Millions of IoT devices hit by 'Devil's Ivy' bug in open source code library

Devil's Ivy is likely to remain unpatched for a long time: "code reuse is vulnerability reuse".

Jul 20 07:41

Your iPhone could be HACKED unless you update right now

iPhone owners should update their smartphone as soon as possible.

Apple has rolled-out a new operating system update – iOS 10.3.3 – that patches a number of vulnerabilities in the software, including some that could enable remote code execution on the device.

This would allow a hacker to take control of your iPhone, thanks to a bug in the Broadcom Wi-Fi chip.

Hackers would have complete control over the device, allowing them to access your data and features remotely.

Jul 20 07:39

WhatsApp WARNING - This new virus secretly FILMS YOU and shares your ENTIRE web history

WhatsApp users should be on the look-out for a dangerous new form of malware that disguises itself as the successful messenger.

Dubbed GhostCtrl, the malware disguises itself as a number of popular apps, including WhatsApp and Pokemon Go to trick users into downloading the virus.

As soon as the fraudulent app is downloaded, a malicious software package is installed to takeover the device.

This creates a backdoor into the device, enabling cybercriminals to siphon data, including call logs, text messages, contact details, phone numbers, GPS location data and web browser history.

GhostCtrl is also capable of gathering information about core details of the device, like software version, Wi-Fi information, battery level, and more.

Worse still, GhostCtrl can be used to secretly film and record the victim using the smartphone’s built-in camera and microphone.

Jul 20 07:13

Hackers Stole $32 Million in Ethereum; 3rd Heist in 20 Days

On Wednesday, Smart contract coding company Parity issued a security alert, warning of a critical vulnerability in Parity's Ethereum Wallet software, which is described as "the fastest and most secure way of interacting with the Ethereum network."

Exploiting the vulnerability allowed attackers to compromise at least three accounts and steal nearly 153,000 units of Ether worth just almost US$32 million at the current price.

Jul 20 07:11

Critical Code Injection Flaw In Gnome File Manager Leaves Linux Users Open to Hacking

A security researcher has discovered a code injection vulnerability in the thumbnail handler component of GNOME Files file manager that could allow hackers to execute malicious code on targeted Linux machines.

Dubbed Bad Taste, the vulnerability (CVE-2017-11421) was discovered by German researcher Nils Dagsson Moskopp, who also released proof-of-concept code on his blog to demonstrate the vulnerability.

The code injection vulnerability resides in "gnome-exe-thumbnailer" — a tool to generate thumbnails from Windows executable files (.exe/.msi/.dll/.lnk) for GNOME, which requires users to have Wine application installed on their systems to open it.

Jul 19 15:51

FLASHBACK - DNC Affiliates Increase Involvement In Seth Rich Case After Wheeler Claims

Last week, Fox 5 DC's report incited a storm of controversy after former D.C. police homicide detective Rod Wheeler stated that there was tangible evidence on murdered Democratic National Committee (DNC) staffer Seth Rich's laptop suggesting that he was communicating with Wikileaks prior to his death.

Jul 19 15:34

10 Surprising Ways the Government is Spying on You (VIDEO)

It does seem that our dystopian future is going to be (is) a mix of both 1984 and A Brave New World.

Jul 19 15:09

Targeted, custom ransomware menace rears its ugly head

Matt Hillman, a principal security researcher at MWR InfoSecurity, said the custom ransomware associated with these attacks is typically getting distributed through phishing emails rather than software exploits. The attacks are targeted against banking and infrastructure firms worldwide.

"This ransomware is targeted at big organisations because the amount they are prepared to pay is greater," Hillman explained. "Hackers are timing their attack to add pressure," for example by launching assaults just before sales quarters close or a major announcement or industry event.

The attacks are more geared at making money than causing disruption, unlike the recent NotPetya outbreak.

Jul 19 15:05

Millions of IoT systems wide open to hackers after devs drop the gSOAP

Security researchers investigating internet-connected video cameras have uncovered a bug that could conceivably leave millions of devices open to easy pwnage.

The team from embedded security specialists Senrio was looking into the code running an M3004-V network camera from Axis Communication. They found a serious hole that would allow an attacker to either shut down the camera or hijack the feed.

Cases such as this are very common in a world infected with Internet of Sh!t devices.

Jul 19 14:33

CIA Plans To Destroy Old Files Related To Leaks

A CIA proposal to destroy files deemed no longer of historical importance has been authorized. Critics are questioning how honest the agency will be when it comes to the purging of potentially serious files.

The National Archives and Records Administration (NARA) has authorized the move to dump CIA documents that include classified information that was leaked, according to the Daily Beast.

Jul 19 13:28

Facial Recognition Coming To Police Body Cameras As Artificial Intelligence And Machine Learning Takes Over

AN APPROACH TO MACHINE LEARNING INSPIRED BY THE HUMAN BRAIN IS ABOUT TO REVOLUTIONIZE STREET SEARCH. EVEN IF THE COP WHO PULLS YOU OVER DOESN’T RECOGNIZE YOU, THE BODY CAMERA ON HIS CHEST EVENTUALLY JUST MIGHT.

Jul 19 10:44

FLASHBACK 2015 - Unbeknownst to Clinton, IT firm had emails stored on cloud; now in FBI’s hands

A Connecticut company, which backed up Hillary Clinton‘s emails at the request of a Colorado firm, apparently surprised her aides by storing the emails on a “cloud” storage system designed to optimize data recovery.

The firm, Datto Inc., said Wednesday that it turned over the contents of its storage to the FBI on Tuesday.

A Republican Senate committee chairman, Wisconsin Sen. Ron Johnson, also has asked the firm to provide the committee copies of any data from Clinton’s account still in its possession.

Webmaster's Commentary: 

Apparently the FBI, under Comey, ignored this request.

Jul 19 09:58

They See You: FBI Warns About Dangers Of Internet-Connected Toys

While many American parents think ‘smart toys’ are a great idea, the FBI has issued an unprecedented warning that internet-enabled items may pose a privacy and safety risk for children by harvesting personal information.

Jul 19 09:27

CoinDash crowdfunding hack further dents trust in crypto-trading world

More than $7m was stolen by hackers on Monday from folks investing in a cryptocurrency startup.

Israel-based CoinDash – which bills itself as an "an operating system" for "interacting, handling and trading crypto assets" – launched what's called an initial coin offering. This is a process in which people buy virtual tokens from a fledgling biz, such as CoinDash. These tokens are vital to whatever service the company is offering. As the startup grows, these tokens are supposed to increase in value. Buying the tokens early is akin to buying shares during a normal business's IPO. It's a way of crowdfunding investment.

Well, on Monday, $7m of that investment, all in the Ethereum cyber-currency, went not to CoinDash in exchange of tokens, but to hackers, it's claimed. Security and financial technology experts voiced concerns that this latest online heist only serves to undermine confidence in digital currency trading platforms.

Jul 19 09:05

Segway hoverboard hijack hack could make hipsters eat pavement

The latest two-wheel transporter toy from Segway was disturbingly easy to hack, with miscreants requiring just seconds to take control of a vehicle, we're told.

Researchers at hacking house IOActive probed the Chinese Segway miniPro, and said they found the wireless link between the machine and its accompanying mobile app was insecure – allowing anyone in radio range to potentially reconfigure and commandeer passing rides.

Jul 19 09:03

New Linux Malware Exploits SambaCry Flaw to Silently Backdoor NAS Devices

Remember SambaCry?

Almost two months ago, we reported about a 7-year-old critical remote code execution vulnerability in Samba networking software, allowing a hacker to remotely take full control of a vulnerable Linux and Unix machines.

We dubbed the vulnerability as SambaCry, because of its similarities to the Windows SMB vulnerability exploited by the WannaCry ransomware that wreaked havoc across the world over two months ago.

Despite being patched in late May, the vulnerability is currently being leveraged by a new piece of malware to target the Internet of Things (IoT) devices, particularly Network Attached Storage (NAS) appliances, researchers at Trend Micro warned.

Jul 19 07:37

Troops, Trolls and Troublemakers: A Global Inventory of Organized Social Media Manipulation

Cyber troops are government, military or political party teams committed to manipulating public opinion over social media. In this working paper, we report on specific organizations created, often with public money, to help define and manage what is in the best interest of the public. We compare such organizations across 28 countries, and inventory them according to
the kinds of messages, valences and communication strategies used. We catalogue their organizational forms and evaluate their capacities in terms of budgets and staffing. This working paper summarizes the findings of the first comprehensive inventory of the major organizations behind social media manipulation.

We find that cyber troops are a pervasive and global phenomenon. Many different countries employ significant numbers of people and resources to manage and manipulate public opinion online, sometimes targeting domestic audiences and sometimes targeting foreign publics.

Jul 19 07:17

Windows 10 no longer supported? How to tell if your PC is eligible for latest version

Millions of three- and four-year-old PCs are being blocked from installing the latest Windows 10 feature update. Is your PC at risk? Here are two ways to check for potential problems.

Jul 18 17:48

They See You: FBI Warns About Dangers Of Internet-Connected Toys

While many American parents think ‘smart toys’ are a great idea, the FBI has issued an unprecedented warning that internet-enabled items may pose a privacy and safety risk for children by harvesting personal information.

Smart toys and entertainment devices for children typically contain sensors, microphones, cameras, data storage chips and multimedia capabilities such as speech recognition or global positioning (GPS).

Jul 18 13:43

Facial Recognition Coming To Police Body Cameras

Device-maker Motorola announced Monday that would partner with artificial intelligence software startup Neurala to build “real-time learning for a person of interest search” on Motorola products such as the Si500 body camera for police, the AI firm announced in a press release today.

Jul 18 10:44

Extra copyright for news sites

Anyone using snippets of journalistic online content must first get a license from the publisher. This new right for publishers would apply for 20 years after publication.

Example:
The automatic link previews social networks generate when users share links (showing the article headline, a thumbnail picture and a short excerpt) would require a license, as well as anyone analysing news content on the web like news aggregators, media monitoring services and fact checking services.

Intent:
The Commission wants to generate income for European publishers by allowing them to charge internet platforms for displaying snippets of their content to users. Stated targets are Google, Facebook, Twitter and Pinterest, who use such snippets in the course of linking to news articles.

Webmaster's Commentary: 

So, we have to stop linking to EU media sources!

Jul 18 10:11

WALMART JUST MADE SOME CHANGES DEMS ARE GOING TO HATE, THIS WILL SHAKE UP THE WAY YOU SHOP FOREVER!

Previously we reported on a robot burger flipper replacing line cooks in California. Now Walmart is replacing registers with a monolithic tower in Tulsa. Zach Ferguson for Western Journalism reports, Small-time grocery store-turned-mega-chain Walmart is rolling out massive self-serving kiosks that obtain customers’ online orders.

Jul 18 10:05

Welp, even ships are hackable now

Large shipping vessels and aircraft are often equipped with VSAT systems, allowing crewmembers to send and receive messages and access the Internet during voyages. Turns out, some of these VSAT systems are profoundly insecure, and could allow an attacker to gain access, and disrupt communications.

Security researcher x0rz discovered that many VSAT systems can be reached from the public Internet. Not only does this mean they can be tracked through services like Shodan, but some are configured in a way that could see a remote attacker gain access using default credentials.

Duuuuuude, default creds everywhere. I'm connected to a motherfucking ship as admin right now. Hacking ships is easy ???? pic.twitter.com/UmLPIveTah

— x0rz (@x0rz) July 18, 2017

Jul 18 09:30

Why you should delete your old phone number on Facebook: Simple profile recovery trick that relies on outdated details lets anyone break into your account

If someone finds one of your old phone numbers, they can easily access your account using a simple trick, a security expert has found.

A flaw in Facebook's account recovery system, which lets users log in using their phone number if they lose their password, leaves accounts exposed to hackers.

If a hacker buys an old number that is still linked to a Facebook account, they can easily gain access the profile through the account recovery system.

Jul 18 09:06

THE U.S. IS POISED TO SEPARATE MILITARY CYBER COMMAND FROM THE INTELLIGENCE COMMUNITY

After nearly a year of unsubstantiated claims that Russia hacked the U.S. election, the U.S. government is now poised to create an independent Military Cyber Command eventually splintered off from the NSA, Reuters reported.

The agency was created in 2009 under then President Barack Obama, but it seeks to stem out and become separate from the NSA while still keeping some employees of the spying agency.

This comes after President Donald Trump and Russian President Vladimir Putin agreed to create a joint cyber security force, a move that many Democrats are adamant about blocking.

The goal of separating the Military Cyber Command from the rest of the intelligence community?

To wage cyber war against the Islamic State and other individuals and groups deemed to be “enemies of the state,” according to anonymous U.S. officials not authorized to speak on the matter; further noting that the plans aren’t finalized and are subject to change.

Jul 18 08:25

The Future Of Artificial Intelligence: Why The Hype Has Outrun Reality

A panel of experts at the recent 2017 Wharton Global Forum in Hong Kong outlined their views on the future for artificial intelligence (AI), robots, drones, other tech advances and how it all might affect employment in the future. The upshot was to deflate some of the hype, while noting the threats ahead posed to certain jobs.

Their comments came in a panel session titled, “Engineering the Future of Business,” with Wharton Dean Geoffrey Garrett moderating and speakers Pascale Fung, a professor of electronic and computer engineering at Hong Kong University of Science and Technology; Vijay Kumar, dean of engineering at the University of Pennsylvania, and Nicolas Aguzin, Asian-Pacific chairman and CEO for J.P.Morgan.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA