COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

May 29 08:34

Hypocrisy: Facebook REFUSES to delete videos and images of “violent death,” abortions and self-harm

The incoherent way that Facebook chooses to police the content published on its social media platform is getting stranger and more controversial by the day. New reports indicate that the tech giant will no longer block videos and imagery of extreme violence, including gory death and abortion, because doing so represents a form of “censorship” that supposedly violates the rights of its users (but Facebook is happy to censor content over political views it doesn’t like).

May 28 15:32

Calls To Ban Bitcoin Grow Louder After Ransomware Attack

In this video, Vin Armani covers the predictable fallout from the WannaCry ransomware attack. First they blame North Korea and bitcoin. Then an establishment think tank connects bitcoin to terrorism and presses Congress to ban it.

May 28 08:18

British Airways Cancels All Flights From London After Global IT Outage

British Airways canceled all flights from London's Heathrow and Getwick airports scheduled before 6 pm, after a global computer system outage caused massive delays and left planes stuck on runways. Earlier on Saturday, there were reports of BA staff telling disgruntled passengers trying to get away for the Bank Holiday weekend that the company was under cyber attack but this was denied by the airline.

May 28 07:36

De Blasio Employee Arrested, Charged With Possessing Child Pornography

A leading young Democrat and de Blasio administration employee has a secret taste for sickening kiddie porn that involves baby girls as young as 6 months old, court papers revealed Friday.
Jacob Schwartz, 29, was busted for allegedly keeping more than 3,000 disgusting images and 89 videos on a laptop after downloading the filth from the internet.

May 28 03:55

SUIT AGAINST HILLARY CLINTON OVER BENGHAZI DEATHS & EMAILS DISMISSED

A federal judge in Washington has dismissed a lawsuit alleging that Hillary Clinton's lax security surrounding her emails led to the deaths of two of the Americans killed in the 2012 attack on the U.S. diplomatic compound in Benghazi, Libya.

In a ruling Friday, U.S. District Court Judge Amy Berman Jackson tossed out the wrongful death claims as well as allegations that Clinton essentially slandered the parents of the deceased by contradicting accounts the parents gave of events related to their children's deaths.

>>>

SUIT AGAINST HILLARY CLINTON OVER BENGHAZI DEATHS & EMAILS DISMISSED
(*While America Was Distracted http://us.pressfrom.com/news/us/-52713-818-hot-dogs-eaten-every-second... ?)

May 27 11:33

Over 8,600 Security Flaws Found in Pacemaker Systems

Security researchers from WhiteScope have uncovered over 8,600 vulnerabilities in pacemaker systems and the third-party libraries used to power various of their components.

These issues are broad in nature and range from simple code bugs to terrible design choices that risk the life of their patients.

May 27 11:31

Google Boots 41 Apps Infected with "Judy" Malware off the Play Store

Google has removed 41 Android apps from the official Play Store. The apps were infected with a new type of malware named Judy, and experts estimate the malware infected between 8.5 and 36.5 million users.

According to researchers from Check Point, the apps were available on the Play Store for years, but have been clean and virus-free for most of the time. It appears that starting with April 2016, the apps were slowly updated with malicious code.

The purpose of this code was to launch a browser app, load an URL, and use JavaScript to locate and click on specific banners that would bring profits to the malware's creators.

May 27 10:47

Internet providers have backdoor access to customers' modems

A back door has been built into modems sent to customers of major internet service providers allowing the companies' staff to access settings and potentially create a security hole.

The discovery alarmed a computer expert who contacted the Herald, saying the remote access could provide a pathway to the contents of people's computers by employees of the company.

Vodafone is not the only major ISP with a "back door" into its modems - Spark has confirmed it also has built-in "remote access" in modems it supplies to customers.

...

While the Vodafone support person was able to remotely access and change settings in an effort to fix the problem, the capacity for the back door to be exploited by a rogue company employee was concerning.

He said the access was managed through sending a line of code to the modem which then reset it and allowed access by entering a generic password.

May 27 09:15

Declassified memos show FBI illegally shared spy data on Americans with private parties

The FBI has illegally shared raw intelligence about Americans with unauthorized third parties and violated other constitutional privacy protections, according to newly declassified government documents that undercut the bureau’s public assurances about how carefully it handles warrantless spy data to avoid abuses or leaks.

Webmaster's Commentary: 

Absoflippinglutely unbelievable!!

May 26 15:46

Recently redpilled PewDiePie, along with Tim Pool, JonTron, and Sargon, have been placed on Sweden's hate list

Sweden recently published a database of twitter account they thought as harmful or hateful.

May 26 13:12

Internet providers have backdoor access to customers' modems (NZ)

A back door has been built into modems sent to customers of major internet service providers allowing the companies' staff to access settings and potentially create a security hole.

The discovery alarmed a computer expert who contacted the Herald, saying the remote access could provide a pathway to the contents of people's computers by employees of the company.

Vodafone is not the only major ISP with a "back door" into its modems - Spark has confirmed it also has built-in "remote access" in modems it supplies to customers.

The companies say the ability for its staff to access modems remotely is a huge benefit to customers who might find it technically challenging.

May 26 11:13

MICROSOFT WARNS OF ‘ORWELLIAN FUTURE’ AS WIKILEAKS EXPOSES PARTICIPATION WITH SURVEILLANCE

Recently, an installment of WikiLeaks’ Vault7 documents came to light that exposed two CIA malware programs that specifically infect Microsoft computers with the purpose of carrying out tasks on infected computers, checking for scheduled events, and collecting data.

The revelation put Microsoft in the hot seat, with people speculating that the tech giant may have been aware that the CIA works with features specifically built into Microsoft computers to collect data and perform tasks.

Microsoft’s history would suggest the worst, from Edward Snowden’s 2013 leaks that revealed Microsoft had “collaborated closely with US intelligence services to allow users’ communications to be intercepted, including helping the National Security Agency to circumvent the company’s own encryption,” to the NSA bragging about their newly acquired ability to triple the amount of Skype video calls being collected through Prism just nine months after Microsoft bought Skype.

Webmaster's Commentary: 

Why am I not surprised?!?!

May 26 10:48

Airline Begins Testing Augmented Reality Smart Glasses To Read Travelers’ Emotions

By Nicholas West

It appears that air travel is going to be the new frontier for high-tech privacy invasion taking place in the name of security, efficiency and convenience … and now “customer service.”...

May 26 10:19

FBI probing attempted hack of Trump Organization, officials say

The FBI is investigating an attempted overseas cyberattack against the Trump Organization, summoning President Donald Trump’s sons, Don Jr. and Eric, for an emergency session with the bureau’s cybersecurity agents and representatives of the CIA, officials tell ABC News.

Law enforcement officials who spoke to ABC News on the condition of anonymity confirmed the attempted hack and said the subsequent meeting took place at the FBI’s New York headquarters on May 8, the day before Trump fired FBI director James Comey. Spokesmen for the FBI, CIA and Secret Service all declined to comment.

Reached by phone, Eric Trump, an executive vice president of the family company, would not confirm or deny that he and his brother had met with the FBI but told ABC News that the company had ultimately not been infiltrated.

“We absolutely weren’t hacked,” Eric Trump said during the brief call. “That’s crazy. We weren’t hacked, I can tell you that.”

May 26 07:07

Controversial Reddit Rival Voat May Be Shutting Down Because of Money Problems

Voat was designed as a substitute for Reddit: At time when Reddit is getting criticized for scrubbing “problematic” comments and conversations, Voat was supposed to a freer-speech alternative.

But now it may be shutting down because of financial difficulties. The site racked up $6,600 in hosting costs in April. Donations, advertisements and merchandise “only put a dent” in the costs, and the company doesn’t feel comfortable running a donation campaign to help. Voat has been unable to secure outside funding and struggles with accepting donations after PayPal cut it off for hosting “obscene” content.

May 26 07:00

In a throwback to the ’90s, NTFS bug lets anyone hang or crash Windows 7, 8.1

Those of you with long memories might remember one of the more amusing (or perhaps annoying) bugs of the Windows 95 and 98 era: certain specially crafted filenames could make the operating system crash. Malicious users could use this to attack other people's machines by using one of the special filenames as an image source; the browser would try to access the bad file, and Windows would promptly fall over.

It turns out that Windows 7 and 8.1 (and Windows Vista, but that's out of support anyway) have a similar kind of bug. They can be taken advantage of in the same kind of way: certain bad filenames make the system lock up or occasionally crash with a blue screen of death, and malicious webpages can embed those filenames by using them as image sources. If you visit such a page (in any browser), your PC will hang shortly after and possibly crash outright.

May 26 06:56

UK Government Using Manchester Attacks As An Excuse To Kill Encryption

Again, in case you're just joining us, requiring that internet companies "break their own security so that messages can be read by intelligence agencies" is the nice way of saying "kill real encryption." It means that these companies will be deliberately forced to leave vulnerabilities in encryption that will be a goldmine for hackers of all kinds, from foreign surveillance to online criminals.

And, so far, there is zero evidence that the Manchester attack had anything to do with encryption. And, even if it did, so what? If the UK forced companies to break encryption, people planning terrorist attacks would just switch to other encryption products that don't have corporate entities in the UK. Or they'd come up with other ways to communicate. It will do basically nothing to stop terrorist attacks, but will instead make it much, much easier for all sorts of people with nefarious intent to hack into the private communications of everyone.

May 26 06:54

All Android Phones Vulnerable to Extremely Dangerous Full Device Takeover Attack

Researchers have discovered a new attack, dubbed 'Cloak and Dagger', that works against all versions of Android, up to version 7.1.2.

Cloak and Dagger attack allows hackers to silently take full control of your device and steal private data, including keystrokes, chats, device PIN, online account passwords, OTP passcode, and contacts.

The attack doesn't exploit any vulnerability in Android ecosystem; instead, it abuses a pair of legitimate app permissions that is being widely used in popular applications to access certain features on an Android device.

Researchers at Georgia Institute of Technology have discovered this attack, who successfully performed it on 20 people and none of them were able to detect any malicious activity.

May 25 20:15

Eugene Kaspersky hits back at US cyber espionage claims

Russian cybersecurity expert Eugene Kaspersky has offered to hand over his global company’s code to US authorities as he fights to clear his company of claims of cyber espionage.

Several US authorities reportedly have stopped using Kaspersky Lab security software whose use is under review following claims that Russia could use coding “backdoors” to spy on US agencies.

Mr Kaspersky says no one has offered any evidence to support the claim which was totally unfounded. He has offered to testify in the US and says he is willing to hand over code to authorities so that his software can be scrutinised.

May 25 20:12

Major ISPs accused of deliberately throttling traffic

Five major internet service providers in the US and one in Europe have been accused of abusing their market share to interfere with the flow of the internet for end users. The accusations come from Level 3, a communications company that helps connect large-scale ISPs like Comcast or AT&T to the rest of the internet. According to the company, these six unnamed ISPs are deliberately degrading the quality of internet services using the Level 3 network, in an attempt to get Level 3 to pay them a fee for additional traffic caused by services like Netflix, a process known as paid peering.

May 25 19:59

Orwellian audio editing breakthrough allows your audio recordings to be edited like text to insert words you never said

New technology produced by computer scientists at Princeton University will have the ability to add words into a voice recording by editing the transcript of the recording. So let’s say you record the sentence “I like to drink coffee early in morning,” leaving out the word “the” between “in” and “morning.” The software, officially called VoCo, would automatically synthesize your voice and add the word “the” in the sentence, so that the recording never misses a beat.

“VoCo provides a peek at a very practical technology for editing audio tracks, but it is also a harbinger for future technologies that will allow the human voice to be synthesized and automated in remarkable ways,” explained Adam Finkelstein, a professor of computer science at Princeton.

May 25 16:57

Bitcoin plummets nearly $400 just HOURS after Health Ranger warned of “catastrophic correction”

File this under the “I told you so” category: Earlier today, I posted a detailed mathematical analysis and warning that spoke of a “catastrophic collapse” that will occur in Bitcoin. I was immediately called an “idiot” by Bitcoin cultists who have become delusional in their faith that Bitcoin can only go up forever. Yet in less than two hours, Bitcoin crashed by almost $400, plummeting from almost $2750 to nearly $2350.

Meanwhile, Coinbase has become a total joke, seizing up private accounts and denying people access to their Bitcoins for days on end (possibly WEEKS, for all we know). The blockchain is being overrun with unprecedented trading volume, and the confirmation transaction premium keeps rising. It now costs an average of nearly $17 just to send any amount of Bitcoin to anyone, and many transactions are taking DAYS to get confirmed. In a panic selloff, it will easily cost you $100 just to sell any amount of Bitcoin.

May 25 11:16

Wasserman Schultz Threatened Police Chief For Gathering Evidence On Her IT Staffer’s Alleged Crimes [VIDEO]

Rep. Debbie Wasserman Schultz threatened the chief of the U.S. Capitol Police with “consequences” for holding equipment that she says belongs to her in order to build a criminal case against a Pakistani staffer suspected of massive cybersecurity breaches involving funneling sensitive congressional data offsite.

The Florida lawmaker used her position on the committee that sets the police force’s budget to press its chief to relinquish the piece of evidence Thursday, in what could be considered using her authority to attempt to interfere with a criminal investigation.

May 25 10:20

TRANSIT POLICE ARE SECRETLY SPYING ON COMMUTERS TRAVEL PLANS, TEXTS AND EMAILS.

A class action lawsuit in California, reveals that Transit Police are using a free 'Bart Watch' app and Stingray surveillance to secretly spy on commuters texts and emails. (For more info. read pages 5-15 of the suit.)

Transit Police take their cues from other police departments, claiming they're only interested in the public's safety and security,

Safety and security is our top priority.. BART Watch allows you to quickly and discreetly report criminal or suspicious activity directly to BART Police.

Unfortunately, these 'See Something, Say Something' apps allow police to spy on everyone.

According to ABC7 News at least 10,000-50,000 people have downloaded the Elerts spying app. The lawsuit reveals that Transit Police are using Elerts to secretly collect everyone's cellphone identification number, otherwise known as International Mobile Equipment Identity number (IMEI).

Webmaster's Commentary: 

I hope this lawsuit is successful; whose business is it, anyway, to know the fact that I am looking for an easy zucchini bread recipe to take to a church social in a couple of weeks?!?

Mike and I have long felt that any electronic surveillance against us, by any "alphabet soup" US agency is simply punishment duty; everything we have to say, either in an email, or cell phone, is pretty vanilla!

May 25 09:51

Plot thickens in probe of House IT contractors

A police spokesman, while declining to go into detail, told Fox News this week that the case remains opens and focuses on “the actions of House IT support staff.”

But a high-level House staffer acknowledged Monday to Fox News that the probe has raised concerns about emails being hacked.

Official documents and multiple sources say at least five contractors -- including brothers Imran, Jamal and Abid Awan -- are the focus of the probe but that as many as six people could be involved.

The others purportedly involved are Imran’s wife, Hina Alvi, and Rao Abbas, who is not part of the family.

They allegedly removed hundreds of thousands of dollars of equipment from offices, including computers and servers, and ran a procurement scheme in which they bought equipment, then overcharged the House administrative office that assigns such contractors to members.

May 25 07:30

Google bans hundreds of Android apps that use ultrasonic sounds to secretly SPY on users

Google has banned an army of Android apps that use ultrasonic sounds to spy on users without their knowledge.

The moves comes after researchers revealed that hundreds of Android applications are embedded with ultrasonic cross-device tracking technology that pick up inaudible 'beacons' emitted from advertisements.

May 25 07:24

Bitcoin Explodes, Trades Above $4,000 In South Korea

In recent weeks it has been Japanese demand (and notable premia) that has driven the exponential rise in Bitcoin, but recently, as CoinTelegraph reports, it has been South Korea. Overenight saw Bitcoin prices explode once again, smashing through $2500, $2600, and $2700 for the first time...

May 25 07:11

DO THE MATH: Here’s the rational analysis why 99% of current Bitcoin owners will never be able to sell Bitcoins for anything close to its imagined current value

The very fact that Bitcoin needs new people buying into the system in order to support its rapidly advancing prices is almost the classic definition of a Ponzi framework. The simultaneous fact that even very tiny selloffs cause the price of Bitcoin to substantially nosedive means that very few people can “get out” of Bitcoin at anywhere near the current high price. Imagine a rave club filled to maximum capacity with all exit doors blocked except one. Then imagine an electrical fire setting off a massive blaze, as recently happened in California. In such scenarios, not everybody gets out alive for the simple reason that the exits become choke points. Bitcoin suffers the same structural problem, but almost nobody realizes it yet because they are caught up in the Bitcoin hype that causes them to irrationally believe that Bitcoin can never go down. It’s the dot-com bubble all over again, for a whole new generation.

May 25 06:46

Ransomware hits Australian hospitals after botched patch

Hospitals connected to Australian State of Queensland's integrated electronic medical record system (ieMR) are suffering outages attributed to patching against a ransomware attack.

Since the ransomware-de-jour is WannaCry/WannaCrypt, it's a fair bet that's what Queensland Health was working to patch, but somewhere along the line things have gone wrong.

The Cairns Post identifies Cairns Hospital as having system problems, and The Register has been told at least Townsville Hospital and Brisbane's Princess Alexandra Hospital are also affected.

May 25 06:38

7-Year-Old Samba Flaw Lets Hackers Access Thousands of Linux PCs Remotely

The maintainers of Samba has already patched the issue in their new versions Samba versions 4.6.4/4.5.10/4.4.14, and are urging those using a vulnerable version of Samba to install the patch as soon as possible.

But if you can not upgrade to the latest versions of Samba immediately, you can work around the vulnerability by adding the following line to your Samba configuration file smb.conf:

nt pipe support = no

May 25 06:35

Wanna Cry Again? NSA’s Windows 'EsteemAudit' RDP Exploit Remains Unpatched

Brace yourselves for a possible 'second wave' of massive global cyber attack, as SMB (Server Message Block) was not the only network protocol whose zero-day exploits created by NSA were exposed in the Shadow Brokers dump last month.

Although Microsoft released patches for SMB flaws for supported versions in March and unsupported versions immediately after the outbreak of the WannaCry ransomware, the company ignored to patch other three NSA hacking tools, dubbed "EnglishmanDentist," "EsteemAudit," and "ExplodingCan."

May 24 15:53

U.S. Government Using Secret Surveillance Tech to Track Undocumented Immigrants

By Derrick Broze

Newly released documents detail how U.S. Border Patrol used ‘Stingray’ cellphone surveillance tools to catch an undocumented immigrant.

The Detroit News has obtained a federal search warrant affidavit which details how border patrol agents are using secretive surveillance technology to locate individuals who have entered the U.S. illegally...

May 24 15:33

Top hacker conference to target voting machines

Hackers will target American voting machines—as a public service, to prove how vulnerable they are.

When over 25,000 of them descend on Caesar’s Palace in Las Vegas at the end of July for DEFCON, the world’s largest hacking conference, organizers are planning to have waiting what they call “a village” of different opportunities to test how easily voting machines can be manipulated.

Some will let people go after the network software remotely, some will be broken apart to let people dig into the hardware, and some will be set up to see how a prepared hacker could fiddle with individual machines on site in a polling place through a combination of physical and virtual attacks.

May 24 15:28

Manchester attack could lead Theresa May's government to launch huge internet crackdown

The government may use the deadly attack in Manchester to launch a crackdown on internet securities.

Government officials appear to have briefed newspapers that they will put many of the most invasive parts of the relatively new Investigatory Powers Act into effect after the bombing at Manchester Arena.

The specific powers being discussed – named Technical Capability Orders – require big technology and internet companies to break their own security so that messages can be read by intelligence agencies. Government will ask parliament to allow the use of those powers if Theresa May is re-elected, senior ministers told The Sun.

May 24 15:20

Feeling Locky, punk? Ransomware grew eight-fold last year

Ransomware saw a more than eight-fold (752 per cent) increase as a mode of attack in 2016, according to Trend Micro.

The infosec firm estimates file-scrambling malware families such as Locky and Goldeneye raked in $1 billion in 2016.

2016 was the year when ransomware ruled, and this danger has been maintained by recent WannaCrypt attacks and the latest threat Eternal Rocks, which has no kill switch and continues to grow.

May 24 15:18

Beware! Subtitle Files Can Hack Your Computer While You're Enjoying Movies

In the above video, the researchers demonstrated that how a maliciously crafted subtitle file for a movie added to Popcorn Time media player can hijack a Windows PC. On the right-hand side of the screen, an attacker, running Kali Linux, gained the remote access of the system as soon as the victim added the subtitle file.

Since text-based subtitles for movies and TV shows are created by writers and then uploaded to Internet stores, like OpenSubtitles and SubDB, hackers could also craft malicious text files for same TV shows and movies.

"Our researchers were also able to show that by manipulating the website’s ranking algorithm, we could guarantee crafted malicious subtitles would be those automatically downloaded by the media player, allowing a hacker to take complete control over the entire subtitle supply chain, without resorting to a Man in the Middle attack or requiring user interaction," CheckPoint researchers said.

May 24 13:22

Wasserman Schultz Threatened Police Chief For Gathering Evidence On Her IT Staffer’s Alleged Crimes

Rep. Debbie Wasserman Schultz threatened the chief of the U.S. Capitol Police with “consequences” for holding equipment that she says belongs to her in order to build a criminal case against a Pakistani staffer suspected of massive cybersecurity breaches involving funneling sensitive congressional data offsite.

The Florida lawmaker used her position on the committee that sets the police force’s budget to press its chief to relinquish the piece of evidence Thursday, in what could be considered using her authority to attempt to interfere with a criminal investigation.

May 24 12:04

Sources: Democratic Aide Suspected Of Major Security Breach Under Government Protection In Pakistan

A criminal suspect in an investigation into a major security breach on the House of Representatives computer network has abruptly left the country and gone to Pakistan, where her family has significant assets and VIP-level protection, a relative and others told The Daily Caller News Foundation’s Investigative Group.

May 24 11:58

U.N.’S NORTH KOREA INVESTIGATORS HIT BY [likely false-flag] CYBER ATTACK

U.N. Security Council's North Korea sanctions committee comes under "sustained" cyber attack

May 24 11:30

WannaCry ransomware decryptor brings hope to victims

Security researchers uncovered more info on how WannaCry spread, and a ransomware decryptor emerged to save files for those affected.

May 24 10:25

DID SEVERAL DEMOCRATIC IT STAFFERS UNDER INVESTIGATION JUST FLEE TO PAKISTAN?

First a little background. Politico reported the following back in March.

Two House Democrats this week fired technology staffers linked to an ongoing criminal investigation, more than a month after the couple in question was barred from House computer networks.

Rep. Gregory Meeks (D-N.Y.) confirmed to Politico that Hina Alvi’s last day as an IT support staffer in his office was Tuesday. Her husband, Imran Awan, was working for Rep. Marcia Fudge (D-Ohio) as of Tuesday evening, but a spokeswoman for Fudge said midday Wednesday that Awan was no longer an employee.

As of Wednesday, Awan was still working as a technology adviser for Rep. Debbie Wasserman Schultz (D-Fla.), although he’s been blocked from accessing the House computer system since early February.

Alvi, Awan and three other House aides, including Abid Awan and Jamal Awan, relatives of Imran Awan, and Rao Abbas, are all linked to the criminal investigation being conducted by the U.S. Capitol Police.

Webmaster's Commentary: 

This...could get interesting! :-)

Apparently, Democrats, as a class, have difficulty in vetting their IT professionals.

And BTW, DNC and Secretary Clinton, where in the world is Brian Pagliano, your IT guy who has "disappeared" (either been murdered, or fled to a country with which the US has no extradition treaty), and is contempt of Congress for refusing to testify?!?

Republicans Hold Hillary’s IT Guy in Contempt of Congress for Refusing to Testify

May 24 10:16

If You Care About Privacy, You Should Change Your Twitter Settings Right Now

The new policy, which goes into effect on June 18, includes changes to data collection, data sharing, and digital advertising. The policy is being run on an ‘opt-out’ basis, meaning that if users do not actively change their settings, these policies will automatically be applied to their accounts.

May 24 09:33

Intel Core i9: It's not whether you need 12 cores, but whether you'll pay for them

The processor market is heating up once again, with AMD and Intel back to having "core and speed" wars. But if the latest leak is accurate, Intel's next-generation silicon is likely to be out of most people's budget.

May 24 09:33

Now tech support scams are exploiting WannaCry ransomware fears

Police issue warning over fake support scams using WannaCry to scare PC users into paying up.

May 24 09:02

One in five ad-serving websites is visited exclusively by fraud bots

A growing part of the internet is devoted entirely to fraudulent advertising. According to a new report by White Ops, ad-fraud sites make up roughly 20 percent of ad-serving sites on the web, despite having no human traffic whatsoever. The sites make money entirely from traffic bots, designed to mimic human visits to generate ad revenue for the sites’ creators.

Traffic bots have long been a problem for web advertising, also known as “click fraud.” The good news is that, while it remains a billion-dollar industry, advertisers are slowly getting wise to the tricks. According to White Ops, ad-fraud sites are on track to make $6.5 billion in 2017, down from $7.2 billion the previous year.

The problem is particularly acute for desktop video ads, which draw criminals through high prices and a relative scarcity of legitimate inventory. The survey found that 22 percent of desktop video ads were viewed only by traffic bots, a figure that’s held steady from year to year.

May 24 08:58

Microsoft says its best not to fiddle with its Windows 10 group policies (that don't work)

MICROSOFT HAS RESPONDED to claims that its Windows 10 Enterprise operating system ignores user preferences in Group Policy with the advice that, basically, it does and you shouldn't meddle with it.

May 23 18:49

After being caught spying on viewers through their TVs, creepy Samsung unveils new way to track the locations of your FRIENDS through your TV

Samsung has added a location tracking app to its TVs that will allow you – and them – to keep track of other people’s real-time locations. They make it easy for you to expose your friends and family to their tracking: Simply type in the person’s phone number, and they will receive a text they can use to add themselves to your group. Perhaps your mom is happy for you to see what route she’s taking to get to your house, but it’s important to note that once someone is added, everyone else in the group can also see where they are in real time using any type of screen equipped with the Glympse app.

May 23 17:32

Suspect in House Democrat IT Scandal ALSO Had Access to Leaked DNC Emails

The Daily Caller News Foundation reported in February that three brothers who managed office IT for government officials were relieved of their duties on suspicion that they accessed specific computer networks without permission, also known as hacking.

Brothers Abid, Imran, and Jamal Awan were barred from computer networks at the House of Representatives. One of the brothers has a criminal record.

The three brothers funneled House data to an external server.

Now this…

Imran Awan possessed the password to DNC Chair Debbie Wasserman Shultz’s ipad when DNC emails were leaked to Wikileaks.

May 23 16:35

Freetards left wide open to malware fired from booby-trapped subtitles

Hackers have gone back to the future by attempting to infect targets with booby-trapped subtitle files.

By crafting malicious subtitle files for films and TV programmes, which are then downloaded by viewers, attackers can hope to take complete control of any device running the vulnerable platforms. Hackers have pushed trojans under the guise of subtitle files as far back as 2003.

This time around vulnerabilities in particular media player software packages are playing a role in facilitating the attack. Users of popular players – including VLC, Kodi, Popcorn Time and Stremio – are most at risk, according to researchers at security firm Check Point.

The vendors involved all addressed the reported issues before Check Point went public with a warning on Tuesday. Stremio and VLC have also released new software versions incorporating the fix.

May 23 16:32

Redmond puts wall around Windows 10 for Chinese government edition

"The Windows 10 China Government Edition is based on Windows 10 Enterprise Edition, which already includes many of the security, identity, deployment, and manageability features governments and enterprises need," said Windows boss Terry Myerson.

"The China Government Edition will use these manageability features to remove features that are not needed by Chinese government employees, like OneDrive, to manage all telemetry and updates, and to enable the government to use its own encryption algorithms within its computer systems."

Details are very thin about what else is missing compared to the Windows 10 builds available in the West. Presumably a lot less information is collected by the notoriously data-hungry OS, and little of it is likely to flow to Redmond's servers. Any info that is extracted is almost certainly staying in China.

May 23 15:56

Snooper’s Charter: Majority of public unaware of government online surveillance

Civil liberties group Liberty described the introduction of the measures as a “beacon for despots everywhere”.

Theresa May is also planning to regulate the internet, allowing the government to decide what web users can post, share and publish online.

“The Snooper’s Charter recently passed without fuss from the public,” said Douglas Crawford, digital privacy expert at BestVPN.com.

“Now British intelligence agencies and law enforcement organisations have the power to survey data and digital communications, and online security experts have determined the government now has the ability to spy on us at any time.

“It’s clear the British public has a long way to go in order to become fully informed about the realities of online monitoring. Taking steps to ensure personal privacy is censored should be the first port of call.”

May 23 15:50

Regardless of your privacy settings, Windows 10 Creators Update phones home

Another research done by an independent IT security analyst shows a number of privacy issues in Windows 10. Even after you have properly configured Windows 10 Creators Update using Group Policy in the Enterprise edition, the operating system may disregard these settings and continue to utilize your bandwidth and "phone home" to send data.

...

Windows 10's Privacy related settings are just a ruse to throw unsuspecting users offguard so they think their privacy is being maintained. Repeatedly, it has been demonstrated by various researchers that they are meaningless and do not fully prevent your PC from doing unwanted communications with numerous Microsoft and third party computers.

May 23 15:44

Broken Windows Theory

Microsoft’s Windows 10 is a privacy nightmare. Here’s how to protect yourself.

May 23 15:42

Samsung S8 'eye security' fooled by photo

Samsung's eye-scanning security technology, used on the new Galaxy S8 smartphone, has been fooled with a photograph and a contact lens.

The iris-scanner can be used to unlock the phone simply by looking at it, which Samsung says provides "airtight security".

But researchers at Chaos Computer Club had easily tricked the device with a picture of an eye, Motherboard said.

Samsung told the BBC it was "aware of the issue".

May 23 15:40

Scientists have found a way to photograph people in 3D through walls using Wi-Fi

Wi-Fi can pass through walls.

This fact is easy to take for granted, yet it's the reason we can surf the web using a wireless router located in another room.

But not all of that microwave radiation makes it to (or from) our phones, tablets, and laptops. Routers scatter and bounce their signal off objects, illuminating our homes and offices like invisible light bulbs.

Now, German scientists have found a way to exploit this property to take holograms, or 3D photographs, of objects inside a room — from outside it.

May 23 15:39

Robots could wipe out another 6 million retail jobs

Robots have already cost millions of factory jobs across the nation. Next up could be jobs at your local stores.

Between 6 million to 7.5 million existing jobs are at risk of being replaced over the course of the next 10 years by some form of automation, according to a new study this week from by financial services firm Cornerstone Capital Group.

That represents at least 38% of the current retail work force, which consists of 16 million workers. Retail could actually lose a greater proportion of jobs to automation than manufacturing has, according to the study.

May 23 13:39

Fiber Cut Causing Wireless Service Issues and Outages for AT&T

If you're experiencing some issues with your wireless service in Jonesboro, it could be tied to a fiber cut.

That is according to a representative with AT&T.

May 23 10:50

Dubai’s first ‘Robocop’ begins patrolling streets

The world’s first robot policeman has officially joined Dubai’s police force. While it’s not exactly the Robocop from the movie, officers in the United Arab Emirates may want to get used to them, as the bots may soon account for a quarter of their colleagues.

The autonomous Robocop entered the line of duty on Sunday by greeting guests and patrolling the halls at the three-day Gulf Information Security Expo and Conference (GISEC). Plans are in place to have the machine on the streets in popular Dubai areas when the expo ends on Tuesday evening.

May 23 10:23

Facebook founder Mark Zuckerberg says “Global superstructure” needed to advance humanity under totalitarian control

How do you go from a nerd who developed a popular social media website to master decider of the universe and the future of Humankind? Easy: You turn that social media site creation into a multi-billion dollar platform and presto, instant credibility.

To my knowledge, Facebook founder and Harvard dropout Mark Zuckerburg doesn’t have any advanced training or education in sociology and government. But because his social media site is the world’s biggest, he does have incalculable terabytes’ worth of personal data from 1.8-plus billion active users. And he obviously believes that qualifies him to plan the future of the planet.

In a piece from New York Magazine headlined, “Can Facebook Fix It’s Own Worst Bug?” Zuckerberg says he believes that the world needs a “global superstructure to advance humanity,” and that he feels qualified to help make that happen. And, of course, Facebook is the vehicle for that.

May 23 09:20

Hacker ring busted before going global after stealing from Russian bank customers

The Russian Ministry of Internal Affairs (MVD) has announced the arrest of a hacker group, which installed viruses on smartphones to steal money from customers' bank accounts.

To steal the money, the hackers used the SMS-banking system, with money transfers taking place without notification. The police did not specify which banks were involved but said over a million smartphones were hacked smartphones and over 50 million rubles (about $900,000) stolen.

Webmaster's Commentary: 

Why is it that the Russians can find and arrest the cyber criminals .... and the US Government cannot?

May 23 09:08

Kim Dotcom Goes All In: ‘I Knew Seth Rich… I Was Involved’ – Sean Hannity Offers Platform

Kim Dotcom, an actual hacker, serial entrepreneur – and for a while the #1 ranked Call of Duty: Modern Warfare 3 player in the world – may be the key to the entire Seth Rich saga. From testimony in the Wikileaks investigation to Rich’s still unsolved murder – and facing extradition – Dotcom is ready to go nuclear…

May 23 07:46

Heads Up! New EternalRocks Worm More Dangerous Than WannaCry, Has No Kill-Switch

Seven cyber exploits purportedly stolen from the US National Security Agency (NSA) have been identified in 'EternalRocks', a new type of malware detected by a Croatian tech security advisor.

May 22 16:40

Video: What The Hack: Cyberattacks, The Plague Of The 21st Century?

Some of the world’s biggest nuclear powers are under threat from a notorious hacker group.

May 22 10:29

Russian Embassy Implicates Hillary In Tweet Asking: “Who Killed Seth Rich?”

r the past several months, Democrats have based their “Resist 45” movement on unsubstantiated assertions that the Trump campaign coordinated with Russian intelligence officials to undermine the 2016 Presidential Election thereby ‘stealing’ the White House from Hillary Clinton. Day after day we’ve all suffered through one anonymously sourced, “shock” story after another from the New York Times and/or The Washington Post with new allegations of the ‘wrongdoing’.

But, new evidence surfacing in the Seth Rich murder investigation may just quash the “Russian hacking” conspiracy theory. According to a new report from Fox News, it was former DNC staffer Seth Rich who supplied 44,000 DNC emails to WikiLeaks and not some random Russian cyber terrorist, as we’ve all been led to believe.

May 22 09:51

Newt Calls for Seth Rich Investigation, 1642

May 22 09:33

EMP And Martial Law TEST?! UNDENIABLE PROOF WannaCry Ransomware Cyber Attack Is Only The Beginning!

It's More Than Just A Cyber Attack!

On the morning of Fri., May 12th, 2017, an unprecedented ‘‘ransomware’’ cyber attack struck tens of thousands of victims in 150 countries.

WannaCry, the ransomware program, also known as WannaCrypt, WanaCrypt0r 2.0, Wanna Decryptor, and others similar, began with infecting one computer, until infecting all others in a local area network (LAN).

The ransomware encrypts the infected computer's hard disk drive, then attempts to gain access so it can further spread on random computers connected to the internet via TCP port 445.

May 22 08:45

Breaking: ‘Complete Panic’ at Highest Levels of DNC Over Kim DotCom’s Seth Rich Announcement

Saturday, an anonymous person who works in Washington DC, alleged on 4Chan’s /pol/ subgroup that high-ranking current and former Democratic Party officials are terrified of the Seth Rich murder investigation.

This comes after internet entrepreneur and hacker, Kim DotCom, admitted on Saturday that he was part of an operation along with Seth Rich to get stolen DNC emails to Wikileaks.

May 22 08:33

GREEK AUTHORITIES TO LAUNCH MASS CONFISCATION OF SAFE DEPOSIT BOXES, SECURITIES, HOMES IN TAX-EVASION CRACKDOWN

Last week, the Greek parliament once again approved more austerity to unlock withheld Greek bailout funds in Brussels: a symbolic move, which has little impact without any actual follow through, like for example, actually imposing austerity. And while Greeks have been very good in the former (i.e. promises), they have been severely lacking in the latter (i.e. delivery).

That may be changing. According to Kathimerini, Greek Finance Ministry inspectors are about to start seeking out the owners of all local undeclared properties, while the law will be amended to allow for financial products and the content of safe deposit boxes to be confiscated electronically. The plan for the identification of taxpayers who have “forgotten” to declare their properties to the tax authorities is expected to be ready by year-end, according to the timetable of the Independent Authority for Public Revenue.

Webmaster's Commentary: 

It is instructive to watch what is going on with the governments of Greece and Venezuela, as this is precisely how the US government will be looting the property and assets of its citizens when the financial excrement hits the ventilation system once the US economy has crashed.

David Stockman sounds the alarm: Fiscal blooddbath and market crash to occur between August and November, 2017

May 22 08:11

WikiLeaks says the CIA’s Athena malware can be used to spy on Windows XP through to Windows 10 computers.

The latest file revealed in WikiLeaks’ Vault 7 catalog of CIA hacking toolkit is Athena, a surveillance tool apparently designed to capture communications from Windows XP to Windows 10 machines.

Details of the Athena malware are available in a document allegedly created by the CIA in November 2015. The malware is said to have been made in conjunction with US cybersecurity firm Siege Technologies, which was acquired by Nehemiah Security late last year.

Tech companies will be offered additional technical details to help fix flaws, said Julian Assange.

May 22 07:07

Bitcoin Blows Through $2100

Bitcoin is now up over 135% year-to-date, having screamed above $2000 and $2100 overnight as the dollar limped to 6-month lows...

May 22 06:31

Exposed: Facebook rules that allow death threats, pictures of animal torture and videos of self-harm

Facebook is allowing users to share death threats, videos of self-harm and pictures of animal torture, it emerged yesterday.

Leaked company documents reveal staff moderating the social media website are told not to delete such content.

Secret slides detailing ‘permissible’ posts also suggest videos of violent deaths do not always need to be deleted because they can help create awareness of issues such as mental illness.

May 22 06:10

3 iPhone features that are eating up your battery

Small changes can have a big impact...

May 22 06:07

WannaCry Ransomware: North Korea Denies Role in Global Cyber-Attacks

The code used in the latest attack is similar to that used in past hacks blamed on Kim Jong-Un’s regime, leading some to point the finger at Pyongyang.

But the North has now denied the claims, notably but not exclusively advanced by South Korean experts, and hit back Friday to accuse its opponents of spreading propaganda.

“It is ridiculous,” Kim In-Ryong, North Korea’s deputy ambassador to the United Nations, told reporters, suggesting Washington and Seoul were behind the allegation.

“Whenever something strange happens, it is the stereotyped way of the United States and the hostile forces to kick off a noisy anti-DPRK campaign.”

May 21 10:29

Breaking: Seth Rich witness to come forward

Kim Dotcom has offered written testimony and evidence that Set Rich was the source of a massive email leak to Wikileaks under the condition that the Seth Rich case is made part of the Russian probe.

May 21 10:20

Ransomware & ER Doc Who Operated on Seth Rich Says He Was OK Until …

May 21 07:52

The Cyber Threat to Your Savings Now More Serious than Ever

Last week, another round of cyber-attacks crippled computer systems across the world. As these attacks become more frequent, Americans need to understand what it means for their financial security.

For better or worse, a huge portion of what we do today happens online. And that includes our banking and investing.

May 20 20:32

NHS mulling Ubuntu switch after Windows XP fail?

The NHS could be considering switching its software infrastructure from Windows to Ubuntu, after Windows XP vulnerabilities were exploited in the recent cyber attack that crippled the National Health Service. Or is it just an elaborate gag?

The NHSbuntu platform came to our attention via Dr Dean Jenkins, a Fellow of the Royal College of Physicians and editor-at-large of BMJ Case Reports, who writes about it on Differential Diagnosis, his blog.

According to Dr Jenkins, the Linux-based NHSbuntu is a "modern, secure, open source, operating system being considered by Jeremy Hunt for the NHS."

He adds that as NHSbuntu is built on the "industrial strength Ubuntu desktop," it offers a full-fat security feature set to meet the NHS's needs, including secure email, smartcard authentication and whole disk encryption, plus support for modern web browsers and popular office software.

May 20 14:12

Cyber Attacks Are the Perfect Trigger for a Stock Market Crash

The world has been stunned over the past few days by the advent of “Ransomware;” the use of sophisticated cyber attacks on vital systems in order to (supposedly) extort capital from target businesses and institutions. I am always highly suspicious whenever a large scale cyber incident occurs, primarily because the manner in which these events are explained to the public does not begin to cover certain important realities. For example, the mainstream media rarely if ever discusses the fact that many digital systems are deliberately designed to be vulnerable.

May 20 08:38

UK Government Moves Aggressively to Censor and Control the Internet

Senior Tories confirmed to BuzzFeed News that the phrasing indicates that the government intends to introduce huge restrictions on what people can post, share and publish online.

The plans will allow Britain to become “the global leader in the regulation of the use of personal data and the internet”, the manifesto claims.

It comes just soon after the Investigatory Powers Act came into law. That legislation allowed the government to force internet companies to keep records on their customers’ browsing histories, as well as giving ministers the power to break apps like WhatsApp so that messages can be read.

The government now appears to be launching a similarly radical change in the way that social networks and internet companies work. While much of the internet is currently controlled by private businesses like Google and Facebook, Theresa May intends to allow government to decide what is and isn’t published, the manifesto suggests.

May 20 08:36

AI puts words in your mouth

Webmaster's Commentary: 

Another reason not to trust what you see on the TV news!

May 20 08:25

Seth Rich, Craig Murray and the Sinister Stewards of the National Security State

Former-DNC employee, Seth Rich, not only had access to the emails, but also a motive. He was pissed about the way the Clinton crowd was “sandbagging” Bernie Sanders. In contrast, there’s neither evidence nor motive connecting Russia to the emails. On top of that, WikiLeaks founder, Julien Assange (a man of impeccable integrity) has repeatedly denied that Russia gave him the emails which suggests the government investigation is completely misdirected. The logical course of action, would be to pursue the leads that are most likely to bear fruit, not those that originate from one’s own political bias. But, of course, logic has nothing to do with the current investigation, it’s all about politics and geopolitics.

May 19 15:59

'Ok Google, send money': Google's voice assistant will soon be able to pay your friends directly using your debit card

Google is set to let users pay off their debts without lifting a finger.

The tech giant has announced a new feature that will allow users to transfer funds to friends or family via Google Assistant.

Those living in the US will just say 'Ok Google, send $10 to Jane for pizza', and the AI will pull money from a linked debit card and forward it to the recipient.

What could possibly go wrong?

May 19 15:28

WikiLeaks Reveals 'Athena' CIA Spying Program Targeting All Versions of Windows

WikiLeaks has published a new batch of the ongoing Vault 7 leak, detailing a spyware framework – which "provides remote beacon and loader capabilities on target computers" – allegedly being used by the CIA that works against every version of Microsoft's Windows operating systems, from Windows XP to Windows 10.

Dubbed Athena/Hera, the spyware has been designed to take full control over the infected Windows PCs remotely, allowing the agency to perform all sorts of things on the target machine, including deleting data or uploading malicious software, and stealing data and send them to CIA server.

May 19 15:25

WannaCry Ransomware Decryption Tool Released; Unlock Files Without Paying Ransom

Good news is that another security researcher, Benjamin Delpy, developed an easy-to-use tool called "WanaKiwi," based on Guinet's finding, which simplifies the whole process of the WannaCry-infected file decryption.

All victims have to do is download WanaKiwi tool from Github and run it on their affected Windows computer using the command line (cmd).

WanaKiwi works on Windows XP, Windows 7, Windows Vista, Windows Server 2003 and 2008, confirmed Matt Suiche from security firm Comae Technologies, who has also provided some demonstrations showing how to use WanaKiwi to decrypt your files.

Although the tool won't work for every user due to its dependencies, still it gives some hope to WannaCry's victims of getting their locked files back for free even from Windows XP, the aging, largely unsupported version of Microsoft's operating system.

May 19 15:12

Crooks use WannaCrypt hysteria as hook for BT-branded phishing emails

Scoundrels have latched on to the WannaCrypt outbreak as a theme for scam emails. Coincidentally some consumers are receiving seemingly genuine warnings from their ISPs related to suspected infection during last week's worldwide ransomware outbreak.

Action Fraud warned about a dodgy email trying to trick BT customers on Thursday.

Alert: We have fresh reports about this fake BT email that takes advantage of the global #WannaCry ransomware attack https://t.co/mOgZ3y9JY3 pic.twitter.com/ZyuhEO3sdC

— Action Fraud (@actionfrauduk) May 18, 2017

Recipients, who were falsely warned that they would be locked out of their account unless they completed a bogus "security check", commented that the emails were convincing.

May 19 15:06

Wondering why the office is so productive? Yep, Twitter's knackered

Meanwhile, former Twitter property Vine has begun to warn users after it discovered a vulenrability that exposed some user account details.

"The bug had the potential to expose the email address or phone number associated with a Vine account to third parties under certain circumstances," the ex-video sharing site said.

"We have already notified all affected account holders for whom we have a verified email address on file, so if you weren’t notified, you most likely weren’t affected."

May 19 10:37

London Police Say They're Still Obligated to Arrest Assange

On Friday, Swedish prosecutors announced that they have dropped their suspected rape investigation into Wikileaks founder Julian Assange. But the Metropolitan Police Service (MPS), which serves London, says it is still obligated to arrest Assange if he does decide to leave the Ecuadorian embassy, where he has been holed up for over half a decade.

"Westminster Magistrates' Court issued a warrant for the arrest of Julian Assange following him failing to surrender to the court on the 29 June 2012," the MPS said in a statement published Friday. "The Metropolitan Police Service is obliged to execute that warrant should he leave the Embassy."

As the MPS acknowledges, this is a much less serious crime than the one Swedish prosecutors were investigating. As legal commentator David Allen Green pointed out on Twitter, Assange may face up to a year in prison for breaching bail if convicted.

Webmaster's Commentary: 

Those in the Bowels of Power in the Unhinged Surveilled States of America are furious with Assange, because he embarrassed them, demonstrating very openly their foul ups, bleeps, and blunders.

IF, in fact the London Metropolitan Police arrest him, that arrest will most likely lead to extradition to the US, followed by a grisly assassination, to discourage others from becoming whistle-blowers.

May 19 09:38

Russian Embassy Implicates Hillary In Tweet Asking: "Who Killed Seth Rich?"

Earlier this week, Fox News dropped a bombshell report officially confirming, via anonymous FBI sources, what many had suspected for quite some time, that murdered DNC staffer Seth Rich was the WikiLeaks source for leaks which proved that the DNC was intentially undermining the campaign of Bernie Sanders. In addition to exposing the utter corruption of the DNC, the leaks cost Debbie Wasserman Shcultz her job as Chairwoman.

At the time, we mockingly wondered why the mainstream media seemingly overlooked a huge new development in a highly suspicious unsolved murder case.

Finally, we find it 'shocking' that while the New York Times, Washington Post, CNN, etc are all too eager to regurgitate each others anonymously sourced stories that are critical of Trump, not a single one of them had a single reference of this Fox News bombshell on their website at the time this article was published.

May 19 09:33

#WannaCry Ransomware Exposed as a False Flag Attack on Bitcoin

In this video, software and blockchain developer Vin Armani examines the WannaCry ransomware that the corporate media acted like it was the end of the world. Ultimately it appears to be an amateurish false flag attack on bitcoin. But upon digging into the bitcoin addresses used in the attack, Vin discovers a potentially much more nefarious attack on bitcoin.

May 19 09:20

Should We Believe The NSA About Stopping Its Unconstitutional “About Searches”?

By Catherine J. Frompovich

Recently, the NSA announced it no longer will conduct “about searches” as part of its Upstream Surveillance. That sounds great, but can we really believe them.

According to the Electronic Frontier Foundation (EFF), who has filed lawsuits against NSA regarding the unconstitutional and warrantless searches it conducts, NSA’s statement is a win in the fight against surveillance, but more reforms still are needed.

So really, what freedom prize did citizens win?...

May 19 08:54

Malware Protection Protocol - blame Microsoft for malware

May 19 08:53

GOOGLE GIVES FAKE RESULTS - PROOF

May 19 07:55

Windows XP hit by WannaCry ransomware? This tool could decrypt your infected files

Windows XP wasn't vulnerable to the WannaCry worm but still could be infected with the ransomware. Now there's a tool to decrypt Windows XP machines attacked by WannaCry.

May 19 07:43

Anthony Weiner expected to plead guilty to transferring obscene material to a minor

Anthony Weiner, the disgraced former New York congressman and estranged husband of top Hillary Clinton aide Huma Abedin, is expected to plead guilty today to a single count of transferring obscene material to a minor for allegedly texting an underage girl.

Weiner, who turned himself into the FBI, is due in federal court later this morning.

The emails that prompted the FBI to reopen its review of Clinton’s private email server days before the 2016 presidential election emerged from the 2016 federal investigation into whether Weiner sent explicit messages to an underage girl in North Carolina.

May 19 07:09

Samsung to sell refurbished Galaxy Note 7 as “Galaxy Note FE”

Wondering whatever happened to all the Galaxy Note 7 devices that did not catch on fire and were returned to Samsung? Well there are reports coming out that they are refurbishing these phablets and will be selling them to what they hope is a forgiving and forgetful market. Of course they will have to undergo and pass all the safety standards all over again but would you be willing to still get this device if it hits the market?

May 19 07:07

Windows 10 S is crippleware

The best thing I can say about Windows 10 S is that it’s not Windows RT. RT ran on ARM processors, so you couldn’t run any of your existing applications on it. At least with Windows 10 S, you can run a few older Windows apps: Evernote, Slack, Photoshop Elements and Autodesk Sketch. But serious programs, such as Microsoft Office? Nope. Full Photoshop? Hardly! Full Autodesk? Don’t make me laugh! Heck, you can’t even run Office 365 on it — at least not yet, anyway.

This is not a small office/home office PC operating system.

So tell me, why would you ever want to run Windows 10 S?

May 19 07:05

More Chaos On the Way? WannaCry Hack Sends Ominous New Message to Victims

Last week's WannaCry ransomware attack led to worldwide cyber chaos, crippling vital computer systems such as those used by the NHS.
Now victims of the hack are reporting they have received a chilling new message from the cyber criminals behind the scheme.
Infected computers have received a pop-up encouraging users to send the attackers cash in exchange for their files.

May 19 06:56

BBC fools HSBC voice recognition security system

Security software designed to prevent bank fraud has been fooled by a BBC reporter and his twin.

BBC Click reporter Dan Simmons set up an HSBC account and signed up to the bank's voice ID authentication service.

HSBC says the system is secure because each person's voice is "unique".

But the bank let Dan Simmons' non-identical twin, Joe, access the account via the telephone after he mimicked his brother's voice.

The bank said it would "review" ways to make the ID system more sensitive following the BBC investigation.

May 19 06:54

THERESA MAY TO CREATE NEW INTERNET THAT WOULD BE CONTROLLED AND REGULATED BY GOVERNMENT

Theresa May is planning to introduce huge regulations on the way the internet works, allowing the government to decide what is said online.

Particular focus has been drawn to the end of the manifesto, which makes clear that the Tories want to introduce huge changes to the way the internet works.

"Some people say that it is not for government to regulate when it comes to technology and the internet," it states. "We disagree."

Senior Tories confirmed to BuzzFeed News that the phrasing indicates that the government intends to introduce huge restrictions on what people can post, share and publish online.

May 19 06:49

Don't gripe if you hand your PC to Geek Squad and they rat you out to the Feds – judge

A judge has ruled that people who give their knackered computers to Best Buy's Geek Squad for repairs have no comeback if technicians find and report any illegal material to the Feds.

May 19 06:47

Phishing scum going legit to beat browser warnings

Browser-makers' decision to put big red warning lights in the faces of users when they hit sites too slack to use HTTPS is backfiring a little, as crooks are accelerating their use of encryption.

So says Netcraft, which has turned its web server probes onto phishing sites in the wake of Chrome 56 and Firefox 51 adding warnings about insecure sites that request passwords.

The firm's data shows that since the two browsers started to berate HTTP-only operations, phishing sites added an extra layer of credibility by adding HTTPS.

May 19 06:45

?There's a ransom-free fix for WannaCry?pt. Oh snap, you've rebooted your XP box

Windows XP PCs infected by WannaCrypt can be decrypted without paying ransom by using a new utility dubbed Wannakey.

Wannakey offers in-memory key recovery for Win XP machines infected by the infamous ransomware strain. The fix can be used to dump encryption keys from memory. This RSA private key, once recovered, can be used to restore encrypted files on infected computers.

Caveats and limitations apply. Compromised machines must not have been rebooted after being infected, otherwise the crucial keys will already have been discarded from volatile memory. That's quite a big ask a week after the devastating WannaCrypt outbreak, especially since initial advice centred on turning off machines to stop the further spread of infection across corporate networks.

May 18 17:55

Facebook Adds Another New Censorship Tool To Stop “Conspiracies” and “Misinformation”

In the video below, Vin Armani gives an update about YouTube and Facebook’s latest attempt to censor content on their platforms. He discusses a brand new Facebook tool to further censor conspiracy theories, and misleading and sensational content. Well, that’s subjective.

Facebook posted a press release to announce the new tool, writing:

"We want to help people build an informed community on Facebook. That’s why we’re always working to understand which posts people consider misleading, sensational and spammy so we can show fewer of those and show more informative posts instead.

"We hear from our community that they’re disappointed when they click on a link that leads to a web page containing little substantive content and that is covered in disruptive, shocking or malicious ads. People expect their experience after clicking on a post to be straightforward.

May 18 15:38

Proposed PATCH Act forces US snoops to quit hoarding code exploits

Two US senators have proposed a law limiting American intelligence agencies' secret stockpiles of vulnerabilities found in products.

The Protecting our Ability To Counter Hacking (PATCH) Act [PDF] would set up a board chaired by an Department of Homeland Security (DHS) official to assess security flaws spies have found in code and hardware, and decide if manufacturers should be alerted to the bugs so they can be fixed for everyone.

May 18 14:30

Mainstream media conspiring with Google to rig all search results and silence dissenting views… Google becomes “fake search”

What does Google have in common with traditionally liberal news networks like MSNBC, ABC and CNN? On the surface, nothing much at all – the former is an Internet search engine and the latter are a couple of national broadcasting corporations with political hosts and commentators. If you dig a little deeper, however, it becomes clear that both the search engine and the liberal news networks have something in common after all, and it has to do with a vicious assault on the freedom of speech.

May 18 11:57

Delta Airlines Introducing Facial Recognition For Travelers

By Nicholas West

The desire for security, efficiency and convenience is a narrative that continues to incrementally condition the population to accept the erosion of privacy and civil liberties on a number of fronts. The modern-day airport can certainly test the patience of even the most saintly, so it’s somewhat understandable that people have come to hope for anything that promises to deliver them to the exit as rapidly as possible, and preferably with the least amount of contact with airport personnel.

The concurrent fear surrounding terrorists and immigrants (apparently understood now to be one and the same) further greases the slippery slope as we accelerate to a full-on police state where “papers please” is set to be replaced by a less-intrusive biometric scan...

May 18 11:26

Tech Support Scams Pop-Ups on the Rise

The Internet Crime Complaint Center (IC3) has issued a public service announcement warning about a “new twist to the telephone tech support scam“.

In its message, it advises users to be particularly cautious about fake pop-ups telling them that their computers are infected and urging to call a toll free number for assistance:

May 18 09:41

Second Large-Scale Cyber-Attack Is Underway Now! May 18, 2017

Here we go again. We are under Version 2 cyber-attack. This one is different from the first WannaCry attack. The experts are saying this attack will be worse. The new attack targets the same vulnerabilities as the WannaCry ransomware worm exploited, but there will be no freezing of files this time.

May 18 09:25

You think your day was bad? OS X malware hackers just swiped a Mac dev's app source

Steven Frank, founder of Portland, Oregon-based Panic Inc, said he fell victim to a poisoned download of the Handbrake video transcoder that resulted in the installation of a backdoor on his Mac.

"HandBrake had been nagging me for some time to install an update. I finally decided, for whatever reason, to do the update," Frank explained. "There was a note in HandBrake's update dialog that the incremental update was not available, and that I'd have to download an entirely fresh copy from their server."

By the time he heard the news about the HandBrake infection, Frank said, his machine had not only been accessed by a hacker via the backdoor, but had been harvested for Git server credentials that were then used to access and copy the code for several of the company's closed-source products. Panic develops a number of games and utilities for both macOS and iOS.

May 18 09:22

Bloke charged under UK terror law for refusing to cough up passwords

British police have charged a man under antiterror laws after he refused to hand over his phone and laptop passwords.

Muhammad Rabbani, international director of CAGE, was arrested at Heathrow in November after declining to unlock his devices, claiming they contained confidential testimony describing torture in Afghanistan as well as information on high-ranking officials. CAGE positions itself as a non-profit organization that represents and supports families affected by the West's TWAT (aka The War On Terror).

On Wednesday this week, he was charged under Schedule 7 of the Terrorism Act 2000: specifically, he is accused of obstructing or hampering an investigation by refusing to cough up his login details.

May 18 09:20

Dell BIOS update borks PCs

Dell's latest BIOS update is bricking some machines – apart from a power light, they refuse to boot up at all, say users.

The Texan tech titan's own support forums are filling up with frustrated users who took the support assistant’s advice to download the latest program.

Many of those who installed the update now cannot boot up their machines. One typical explanation posted was: "Add me to the list Dell Inspiron 20 model 3052, updated on the weekend, woke up to a solid amber/orange light and a dead computer. Contacted Dell on facebook and this is what I was told "The updates Dell releases don't affect the system. But it would enhance the performance of the system" ummmm no....if they broke they need to fix it."

May 18 09:20

Cyber Attacks Are The Perfect Trigger For A Stock Market Crash

The world has been stunned over the past few days by the advent of “Ransomware;” the use of sophisticated cyber attacks on vital systems in order to (supposedly) extort capital from target businesses and institutions. I am always highly suspicious whenever a large scale cyber incident occurs, primarily because the manner in which these events are explained to the public does not begin to cover certain important realities. For example, the mainstream media rarely if ever discusses the fact that many digital systems are deliberately designed to be vulnerable.

Webmaster's Commentary: 

An electronic 9/11 could do incredible damage to the global financial infrastructure; the question is, how does this possibility get stopped?!?

May 18 09:17

Three home security systems found to be vulnerable – if hackers were hiding in bushes

Three home security systems were riddled with bugs, according to new research made public this week.

Rapid7 found 10 vulnerabilities after putting Comcast XFINITY, ADT, and AT&T Digital Life systems through their paces. The issues range from a "fail open" condition on the external door and window sensors, to weak, pre-shared Wi-Fi access passwords on to cleartext (unencrypted) network communications. It's a not unfamiliar list given the lamentable state of IoT security more generally.

Potential hackers would need to be physically close to their target to attempt to abuse any of these vulnerabilities, according to Rapid7. Remote hacks over the internet would not be possible but with proximity all manner of mischief is possible.

May 18 07:59

Brandon Smith Warns: ‘All Global Banking Systems And Stock Exchanges Are Open To Attack With These Same NSA Exploits’

It should be noted that the Ransomware attacks which struck systems around the world used “Wannacrypt,” derived from an NSA exploit called “Eternalblue.” This program was designed to specifically target Microsoft Windows machines, no doubt using vulnerabilities which MicrosoftENGINEERED into their own software. Now, interestingly, a batch of NSA exploits was published online by a hacker group called “the shadow brokers” only last month. From the information I have gathered so far, it seems that “Eternalblue” was part of that data dump and that the Ransomware incident is directly connected.

May 18 07:24

EU files request with Kiev on blocking Russian websites, social networks

Among the blacklisted entities are Russian social networking sites Vkontakte and Odnoklassniki, and also e-mail services Mail.ru and Yandex

May 18 07:20

Another large-scale cyberattack underway: experts

he new attack targets the same vulnerabilities the WannaCry ransomware worm exploited but, rather than freeze files, uses the hundreds of thousands of computers believed to have been infected to mine virtual currency.

Following the detection of the WannaCry attack on Friday, researchers at Proofpoint discovered a new attack linked to WannaCry called Adylkuzz, said Nicolas Godier, a researcher at the computer security firm.

"It uses the hacking tools recently disclosed by the NSA and which have since been fixed by Microsoft in a more stealthy manner and for a different purpose," he said.

May 18 06:51

WIKILEAKS PUBLISHES DOCUMENTS SHOWING HOW GOOGLE HELPED AL-QAEDA IN SYRIA

Google has helped Al-Qaeda and other Salafist groups like the Muslim Brotherhood gain new members at the dawn of the Syrian conflict, secret documents and e-mails published by Wikileaks show.

The then director of Google Ideas, Jared Cohen coordinated actions to support the groups often dubbed as rebels with then U.S. Foreign Minister Hillary Clinton and Deputy U.S. State Secretary William Burns. Google employed it’s expertise in the IT sector to help the conflict in Syria gain traction.

Webmaster's Commentary: 

Welcome to a "We have met the enemy, and he is us." moment, courtesy of former Secretary of State Hillary Clinton and her advisors in the Obama administration.

May 18 06:29

WIKILEAKS PUBLISHES DOCUMENTS SHOWING HOW GOOGLE HELPED AL-QAEDA IN SYRIA

Google has helped Al-Qaeda and other Salafist groups like the Muslim Brotherhood gain new members at the dawn of the Syrian conflict, secret documents and e-mails published by Wikileaks show. The then director of Google Ideas, Jared Cohen coordinated actions to support the groups often dubbed as rebels with then U.S. Foreign Minister Hillary Clinton and Deputy U.S. State Secretary William Burns. Google employed it’s expertise in the IT sector to help the conflict in Syria gain traction.

May 17 16:00

11-Year-Old Activist Warns About The Internet Of Things By “Weaponizing” A Teddy Bear

By Kevin Samson

The new “smart world” that we are embarking upon as an increasing number of our computerized devices and objects become part of The Internet of Things has promised more convenience and more efficiency. And, yet, not a day seems to pass without a report about hacking.

11-year-old Reuben Paul took the stage at the World Forum cyber security conference in The Hague to give a demonstration of the threat...

May 17 15:32

SETH RICH Family Investigator ROB WHEELER Told By DC POLICE “Stand Down” – Orders From High Up

The Rich family hired Investigator Rob Wheeler to privately investigate his death, as the DC Police was not making any progress. His death was not a robbery, and it had been declared a homicide…the family wanted answers.

Wheeler found out right away that Seth Rich was the DNC leaker, which the firm hired by the DNC to investigate the leaks: Crowdstrike, immediately blamed on Russia. In fact, the DNC would not allow the FBI to investigate, hiring Crowdstrike instead.

Crowdstrike is supported by Eric Schmidt of Google, and Schmidt contributed to the Hillary Clinton campaign. The DNC clearly had a conflict of interest here, and the FBI looked the other way. This is how the Russian hacking story began. The biggest setup in history has been pulled on the American people, and it is still being played on President Trump.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA