COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Aug 19 07:19

Trump Admin Moves Against Facebook: Files Formal Complaint Over 'Discriminatory' Policies

When President Trump said Saturday morning that his administration was going to fight back against Big Tech's discriminatory policies, he had already taken the first step.

Aug 18 23:32

If You Want to Survive this Election with Your Mental Health Intact, Turn Off the “News” and Social Media Now

If you want to preserve your sanity and avoid unhappy derangement, turn off all corporate and social media from now to Thanksgiving. -- Since elections are extremely profitable for traditional media / social media corporations, your sanity will gleefully be sacrificed in the upcoming election–if you are gullible enough to watch the “news” and tune into social media. Elections are extremely profitable because candidates spend scads of cash on media adverts. -- The greater the discord and derangement, the higher the media profits. The more outraged you let yourself become, the more time you spend online, generating insane profits for the corporations that own whatever platforms you’re addicted to.

Aug 18 21:38

Facebook 'censors' conservative education page, says it was a mistake, but few are convinced

Facebook says it had mistakenly deleted videos and limited the reach of US conservative educational organization PragerU. The content has now been restored, but PragerU supporters don't think it was an accident.

PragerU (short for Prager University, after its founder Dennis Prager) says nine of its posts reached none of its three million-odd followers, and at least two videos were deleted for "hate speech," in what many conservatives see as part of Facebook's ongoing censorship campaign. Facebook has now apologized and restored the content, but has offered no explanation beyond "we're looking into it."

Aug 18 17:05

Prenda Lawyer Pleads Guilty in Pirate Bay Honeypot Case

Paul Hansmeier, one of the lead attorneys behind the controversial law firm Prenda, has pleaded guilty to mail, wire fraud, and money laundering. The Pirate Bay provided important evidence in the case, where Hansmeier and his colleague were found creating and uploading porn movies to file-sharing sites to extract settlements from alleged pirates.

Aug 18 11:23

TRUMP: "SOCIAL MEDIA IS TOTALLY DISCRIMINATING AGAINST CONSERVATIVE VOICES"

Following the crackdown against Alex Jones and various other pundits on Twitter and other social media outlets, on Saturday morning President Trump joined the big tech censorship debate, and accused social media of "totally discriminating against Republican/Conservative voices", claiming that the Trump administration "won't let that happen", and arguing that the platforms should allow both "good and bad" content online amid an escalating debate over social media’s growing censorship and role in policing content online.

"Social Media is totally discriminating against Republican/Conservative voices. Speaking loudly and clearly for the Trump Administration, we won’t let that happen. They are closing down the opinions of many people on the RIGHT, while at the same time doing nothing to others," Trump tweeted.

Webmaster's Commentary: 

As a Christian Pacifist Activist, I have no patience for people advocating death, even for people whose life track record (in this case, that of Senator Mc Cain, who has never encountered any potential war he didn't love) has been one of creating misery for third world people who were simply "in the way" of resources the US wanted or wants to expropriate.

I thoroughly believe in documenting the truth as I see it; then letting people decide where they stand on the issue.

That is what, I believe, a true journalist does, even if it is on a blog, like this one.

This is also why I refuse to be silent on the US enabling of Saudi war crimes in Yemen, as well as other war crimes, such as those committed against Palestinians by the Israelis.

In reading what Johnstone wrote, I feel that she should have documented the specific acts in which McCain engaged, in terms of his support for these endless, unrelenting wars for resources, rather than advocating for his death; but should Twitter have electronically shunned her for this, when there is much more objectionable content in many of the tweets which are allowed to go forward?!?

Aug 18 11:00

FEDS ASK COURT TO FORCE FACEBOOK TO BREAK MESSENGER'S END-TO-END VOICE ENCRYPTION FOR MS-13 GANG PROBE

In secret court proceedings, the U.S. government is trying to force Facebook to help wiretap Messenger. Facebook has declined, so the Justice Department is asking a judge for an order of contempt.

From the Reuters story:

The U.S. government is trying to force Facebook Inc (FB.O) to break the encryption in its popular Messenger app so law enforcement may listen to a suspect’s voice conversations in a criminal probe, three people briefed on the case said, resurrecting the issue of whether companies can be compelled to alter their products to enable surveillance.

The previously unreported case in a federal court in California is proceeding under seal, so no filings are publicly available, but the three people told Reuters that Facebook is contesting the U.S. Department of Justice’s demand.

Webmaster's Commentary: 

What is surprising to me here, is that the Department of Justice, for all the money thrown at it annually, to keep its communications capabilities current, has no better tools for surveillance here other than Facebook Messenger; and my question here is, why?!?

Aug 18 10:43

Exclusive: U.S. government seeks Facebook help to wiretap Messenger - sources

The U.S. government is trying to force Facebook Inc (FB.O) to break the encryption in its popular Messenger app so law enforcement may listen to a suspect’s voice conversations in a criminal probe, three people briefed on the case said, resurrecting the issue of whether companies can be compelled to alter their products to enable surveillance.

Webmaster's Commentary: 
Aug 18 00:23

A Snapshot of the Internet Kill Switch in 2018

The crisis of Internet censorship in the West is unfolding now and just now coming into view. It appears that government agencies are heavily influencing these policies, along with monolithic tech companies who are now demonstrating the willingness to allow the political beliefs of executives to influence the business services they provide. Given that these are businesses, it stands to reason that it won’t be long before these companies suffer substantial backlash for crossing the line into censorship and thought control.

Aug 18 00:02

Censorship is the New Front in the War on Consciousness

When a group of people gets together and conspires to deliberately restrict access to points-of-view, opinions, ideas, personalities and information, then those people are engaged in a struggle to control other’s perception of the world. -- Their aim is to control awareness of the diversity of possibilities in how the world is perceived. To shut down imagination. -- To control your consciousness of the world we all share.

Aug 17 15:24

Mozilla removes 23 Firefox add-ons in security clampdown

Following the removal of Web Security, Firefox users suggested a number of other add-ons that should also be removed because they conducted similar activities. All of the add-ons removed by Mozilla have been listed by ID number and some of the more popular ones include Browser Security, SmartTube, DirtyLittleHelpers, YTTools and Quick AMZ.

After the add-ons in question were inspected by engineers, it was revealed that while they all have different names, a number of add-ons all have the same code used in Web Security.

The questionable add-ons are no longer available to download and existing users will notice that they have been disabled in their browser.

Aug 17 11:06

A Snapshot of the Internet Kill Switch in 2018

We are seeing today what the ‘kill switch’ really looks like. It really is more of corporate/government affair that targets unwanted information. This is the true form of the internet kill switch as it appears in 2018.

Aug 17 11:04

The 3 Trigger Terms Being Used to Stop Critical Thinking

Today, we find that thinking is a diminishing art, and in its place, sound bites and stop-thought terms are used to put the brakes on the mind. These terms are widely used as signals to prevent minds from looking too deeply at a topic or issue.

Aug 17 09:23

‘Too Big to Fail’: RussiaGate One Year After VIPS Showed a Leak, Not a Hack

One year later, the VIPS memo contending that the DNC emails were leaked and not hacked has yet to be successfully challenged. Meanwhile, the country sinks deeper into the morass of the new McCarthyism.

Aug 17 06:50

Has YOUR Twitter account been affected? Social media site continues to cull users in a bid to clean up the platform

Twitter has started banning a huge amount of accounts, with many users taking to the site to bemoan the loss of hundreds of followers in a single day.

The cull started yesterday and had such an impact on numbers that the 'Twitterverse' was swept with the hashtag #TwitterPurge.

The firm is ruthlessly removing accounts, with those who have been previously suspended or banned most likely to see their account deactivated.

Aug 17 00:07

Mozilla / Firefox goes all in for EVIL… pushes corporate news collusion to silence independent media

It’s time to dump Firefox. Like all the other tech giants, Mozilla is going to abuse and exploit its position of market dominance to control what you read, watch and hear. That’s pure evil, and it’s the kind of evil we’ve all now come to expect from Google, YouTube, Twitter and Facebook. Now you can add Mozilla to that list.

Aug 17 00:01

Modern Censorship Is Voluntary

Censorship is an enormous problem that the internet temporarily freed us from. Now we’re seeing the State leverage the tech giants to once again control the flow of information. All of us that are aware of this problem have the solution in our hands. Instead of worrying about it and complaining about it we should migrate off the websites that are being used as blinders and discover new platforms that are building a business around privacy and openness. These tools are available and the more quickly we all migrate to them the move value we will all receive from them. It’s time we all did our part. Just be prepared to read, see and hear ideas that one might not like.

Aug 16 17:56

RAND PAUL “I think that he (Julian Assange) should be given immunity from prosecution in exchange for coming to the United States and testifying”..

Wiki leaks played a major role in sorting out the trove of Clinton Campaign documents that were hacked During the 2016 Election and Senator Rand Paul has a Major offer for WikiLeaks founder Julian Assange.

Paul suggests that Assange be given immunity in exchange for his testimony before the Senate Intelligence Committee.

In an interview with the Gateway Pundit, Paul suggested that Assange likely has important information about the hack and that it’s unlikely he would agree to testify without immunity.

“I think that he should be given immunity from prosecution in exchange for coming to the United States and testifying,” Senator Paul told the Gateway Pundit. “I think he’s been someone who has released a lot of information, and you can debate whether or not any of that has caused harm, but I think really he has information that is probably pertinent to the hacking of the Democratic emails that would be nice to hear.”

Aug 16 17:53

Google forced to update its help page to admit it DOES still track user's location even if they turn the setting off

Google has admitted that it tracks users' location history even after they turn off location sharing.

On Thursday, the search giant revised a help page that erroneously described how its 'Location History' setting works.

The page now clarifies that Google still tracks their location even if they turn the setting off.

Aug 16 17:50

Celebrities and 'influencers' probed by competition watchdog over paid-for social media posts

The competition watchdog has written to a string of celebrities and social media 'influencers' to find out whether they are disclosing their paid-for posts properly.

Businesses grappling to advertise their wares to the biggest audience possible often harness the popularity of social media stars to promote their latest must-have item.

Celebrities can be paid huge sums of money to post about a particular brand or product range.

The problem comes when consumers are left unclear about whether that celebrity has posted as part of a paid-for promotion or simply rates a particular product themselves.

Aug 16 14:58

Westpac NZ issues 30,000 replacement cards due to fraud risk linked to Ticketmaster security breach

About 30,000 Westpac NZ customers will receive replacement cards following a data security incident related to Ticketmaster in June.

Those who purchased, or attempted to purchase, tickets between September 2017 and June 23, 2018, were potentially at risk of fraud.

Tiffany Ryan, Westpac NZ head of financial crime and security, said while the risk of fraud was low, Westpac wanted to take an extra proactive step to protect customers.

"Westpac NZ is in the process of proactively replacing around 30,000 cards, where we have concerns that a customer's card details may have been compromised," Ryan said.

"We have strong fraud controls in place, but we wanted to take an extra proactive step to protect our customers and provide them with peace of mind around this issue."

Aug 16 14:54

2015 United Nations Paper Proposed Government Licensing To “Supervise Content” Online

In recent purge, globalists are following long existing plans to censor internet.
In 2015, the Washington Post warned that the United Nations was attempting to “…transform the Web from a libertarian free-for-all to some kind of enforced social commons“.

The warning came in response to a UN report titled “Cyber Violence Against Women and Girls: A World-Wide Wake-up Call“.

The report was promptly withdrawn due to errors with “footnoting”.

Based on a campaign to promote “gender sensitive content” for women and prevent online harrassment and bullying, the report proposed a Chinese style system of government licensing.

Aug 16 10:14

A $2,000 iPhone: It's coming. It's inevitable

With Samsung pushing the envelope on the price of flagship smartphones with its $1,250 512GB Galaxy Note 9, it's only a matter of time before we have a $2,000 iPhone.

Webmaster's Commentary: 

The $1000 iPhone isn't selling so well and latest word is that the next iPhone will sell for just $500.

Aug 16 08:53

Mozilla / Firefox goes all in for EVIL… pushes corporate news collusion to silence independent media

Many of us sought out Firefox from Mozilla, an organization with a strong history supporting free speech and open access to information.

But now Mozilla has joined the dark side. They’re jumping in bed with pure evil, pushing an “Information Trust Initiative” that would block independent media sources at the browser level while favoring corporate media giants like CNN, a cesspool of deliberately fake news.

Aug 16 08:32

Google risks mega-fine in EU over location 'stalking'

Privacy campaigners say Google's obsessive collection of location markers violates Europe's privacy laws - potentially exposing the Californian giant to punitive fines.

Several privacy watchers agree that as it stands, users are misled, and can't give informed consent. That exposes the company to financial penalty under GDPR rules: which could be 2 per cent or 4 per cent of turnover.

"Burying its stalking settings, while distracting users with a deliberately crippled 'Location history' button, isn't just deceitful - it's unlawful," campaigner Phil Booth opined. "Without proper consent or legitimate purpose, Google is breaching the GDPR rights of every EU citizen it has been tracking.

"Under GDPR, such location data - associated with a Google account - is clearly personal data, breach of which could expose Google to a giant fine. The question is, will regulators act on this globalised prowling?"

Aug 16 08:25

Facebook news chief to media: ‘Work with Facebook or die’

The Australian reports that Facebook media relations chief Campbell Brown privately disclosed that Mark Zuckerberg is indifferent to publishers and offers the news media a simple choice: "Work with Facebook or die."

A senior Facebook executive has privately admitted Mark Zuckerberg “doesn’t care” about publishers and warned that if they did not work with the social media giant, “I’ll be holding your hands with your dying business like in a ­hospice”.

Aug 16 08:20

Firefox Add-On With 220,000+ Installs Caught Collecting Users’ Browsing History

A popular Firefox add-on is secretly logging users' browsing history, according to reports from the author of the uBlock Origin ad blocker and Mike Kuketz, a German privacy and security blogger.

The add-on in question is named Web Security and is currently installed by 222,746 Firefox users, according to the official Mozilla Add-ons Portal.

Aug 16 08:12

President Trump relaxes US cyber-attacks rules

President Trump has signed an order relaxing rules around the use of cyber-weapons, the Wall Street Journal reports.

It is a reversal of guidelines, drawn up under President Obama, which required a large number of federal agencies to be involved in any decision to launch a cyber-attack.

Specific details of what the new rules will be are classified information.

One official said the US was taking "an offensive step forward".

Aug 15 18:07

Can hackers tamper with your vote? Researchers show it’s possible in nearly 30 states

Top computer researchers gave a startling presentation recently about how to intercept and switch votes on emailed ballots, but officials in the 30 or so states said the ease with which votes could be changed wouldn’t alter their plans to continue offering electronic voting in some fashion.

Aug 15 13:39

Big Tech Censorship: YouTube On The Verge Of Deleting Stefan Molyneux's Entire Channel

Philosopher and popular right-wing commentator Stefan Molyneux was hit with two strikes within 24 hours Wednesday on YouTube and now faces his entire channel being deleted.

"Within 24 hours, my @YouTube channel has received two community guidelines strikes - likely as a result of a mass flagging campaign - and is now on the verge of total deletion," Molyneux announced on Twitter. "Please respectfully contact @TeamYouTube and alert them to this injustice."

Aug 15 11:32

BBC Caught Cherry-Picking Anti-Privacy Computer Scientists for Segment

The BBC was caught red-handed engaging in manipulation after it declined to invite a potential guest for a segment on computer security, turning the expert down because he refused to state why it would be a good idea to put “back-doors” into cryptographic systems.

Aug 15 07:25

Hackers can take control of MILLIONS of brand-new Android smartphones because of vulnerabilities with pre-installed apps, experts warn

Most apps can't access protected files, but this is not the case with many pre-installed apps, which often have privileged access to the Android operating system.

Because there are so many manufacturers making hardware for Google's operating system, it's hard for the company and researchers to keep tabs on all pre-installed apps.

Many firms make sure that any apps that come pre-installed are as secure as possible, but that is not always the case.

Aug 15 07:19

Update your computer NOW: Intel reveals 'Foreshadow' flaws affecting its chips could put MILLIONS of devices at risk - just months after Spectre and Meltdown scares

An international team initially identified a type of attack dubbed Foreshadow that would allow hackers to steal information from a computer’s memory, including files, pictures, and passwords.

After researchers notified Intel of the issue earlier this year, the firm identified two more related variants that could have even more ‘devastating’ consequences, allowing attackers to access information stored on a third-party cloud.

Intel says its commonly used Core and Xeon processors were among the products that were affected, putting both personal computer users and data centers at risk.

...

Intel says it began rolling out updates to the operating system and hypervisor software today to address the flaws, along with updates released earlier this year that are an ‘important component of the mitigation strategy,’ for all three iterations.

Aug 15 04:07

Taking on a Supporter of the Surveillance State

Here’s what you need to understand. If the government is allowed to conduct secret surveillance, it will eventually be used against you or people you care about.

Aug 14 12:51

Breaking: Infowars under attack, official website taken down completely

It looks like last week’s purging of Infowars content from social media sites like Facebook and YouTube is not enough the powers-that-be have now taken down Infowars.com altogether in what appears to be an outright attack.

Aug 14 12:46

George Orwell Warned us of the Most Dangerous Type of Censorship

The big tech companies are now openly censoring popular viewpoints and deleting select social media pages who supposedly ‘violate community guidelines.’

Aug 14 12:02

Twitter To "Suspend Accounts For Trying To Evade Suspension"

Having seemingly distracted the world, briefly, from being caught 'shadowbanning' conservatives (or should we say "using quality filters"), by outright-banning other right-leaning individuals (Alex Jones and Peter van Buren forever; and Candace Owen and Ron Paul Institute's Daniel McAdams temporarily), it appears Twitter's CEO Jack Dorsey has a cunning plan for purging the rest of the world's naysayers from his platform.

"This week, we are suspending accounts for attempting to evade an account suspension. These accounts were previously suspended for abusive behavior or evading a previous suspension, and are not allowed to continue using Twitter."

Webmaster's Commentary: 

With the next month, I am hoping that people, not wanting to have their websites chosen for them, with others are suppressed, will be flocking to alternatives to twitter, and that this will render Twitter thoroughly... irrelevant.

Twitter Is Dying! 7 Alternative Social Networks to Join Now

5 top Twitter Alternatives you Must Try!

Stop using the default Twitter App, and check these

Top Ten Twitter Alternatives

Aug 14 11:33

JUDICIALWATCH: More Evidence of Political Coverup in DNC IT Security Scandal

More evidence has surfaced about the disturbing political coverup of grave national security violations committed by the Pakistani who ran House Democrats’ information technology. His name is Imran Awan and last year he was arrested on bank-fraud charges at Dulles International Airport in Washington D.C. while trying to flee to his native Pakistan. Even after getting fired by some members of Congress for stealing computers and data systems, Florida’s Debbie Wasserman Schultz, then Democratic National Committee (DNC) chair, kept him and let him have access to her emails and files as well as the password to the electronic device she used for DNC business. At one point, Awan had access to the computers of dozens of members of Congress, including those on the House Intelligence and Foreign Affairs committees. Judicial Watch has launched an investigation and is pursuing public records.

Aug 14 11:06

CENSORSHIP IS WHAT HAPPENS WHEN POWERFUL PEOPLE GET SCARED

Anyone who tells you the recent escalation of censorship by U.S. tech giants is merely a reflection of private companies making independent decisions is either lying or dangerously ignorant.

In the case of Facebook, the road from pseudo-platform to willing and enthusiastic tool of establishment power players is fairly straightforward. It really got going earlier this year when issues surrounding egregious privacy violations in the case of Cambridge Analytica (stuff that had been going on for years) could finally be linked to the Trump campaign. It was at this point that powerful and nefarious forces spotted an opportunity to leverage the company’s gigantic influence in distributing news and opinion for their own ends. Rather than hold executives to account and break up the company, the choice was made to commandeer and weaponize the platform. This is where we stand today.

Webmaster's Commentary: 

There is only one thing to do with the unholy triumverate of Facebook, Twitter, and YouTube: ignore them as though they were the plague, and take a look at their upcoming competitors, like GAB! Yandex, and DuckDuckGo.

This is not to say that ultimately, these outlets won't get bought out, but at least for the time being, they are reasonably open, and don't track where you have been on these sites.

Aug 14 10:59

Ajit Pai loses in court—FCC can’t kill broadband subsidy in Tribal areas

A US appeals court has blocked the Federal Communications Commission's attempt to take a broadband subsidy away from Tribal areas.

The FCC decision, originally slated to take effect later this year, would have made it difficult or impossible for Tribal residents to obtain a $25-per-month Lifeline subsidy that reduces the cost of Internet or phone service for poor people. But on Friday, a court stayed the FCC decision pending appeal, saying that Tribal organizations and small wireless carriers are likely to win their case against the commission.

FCC stands by decision to raise broadband prices on American Indians

Webmaster's Commentary: 

Good for our First Nation Americans on this!!

Aug 14 10:57

AN 11-YEAR-OLD HACKED A MOCK FLORIDA ELECTION SITE IN 10 MINUTES

The security of the U.S. election system just lost a vote of confidence.

At the annual hacker conference DefCon, Emmett Brewer, an 11-year-old boy from Austin, Texas, was able to change the results on a mock Florida election website. It took him 10 minutes.

Though the website in question was a mere replica of the Florida Secretary of State website, the hack points to the larger vulnerabilities of the election infrastructure in the U.S. On the heels of Russian meddling in the 2016 U.S. election, Microsoft has already detected evidence of Russian interference in three races in the 2018 mid-terms.

Webmaster's Commentary: 

It took this 11 year old kid 10 minutes to change the outcome of a mock-up of Florida's electronic voting system?!?

Folks, if we ever need to give these voting machines the deep-six, and restore paper ballots, now is the time.

And particularly in the upcoming midterms, we cannot allow Voter ID to be considered criminal, in any way, shape, or form!!

Aug 14 10:32

OH LOOK, YET MORE EFFORTS TO STRANGLE BROADBAND COMPETITION

A major component of the Telecommunications Act of 1996 was the idea of line sharing, or local loop unbundling. Simply put, the rules set forth required that incumbent telcos needed to share their networks with smaller competitors, providing wholesale access to bandwidth. It was an effort to foster something vaguely resembling competition in the broadband space by letting smaller companies piggyback on existing network infrastructure. The thought was that because the barriers to market entry were so high (both politically and financially), this could help smaller competitors gain footholds that would otherwise be impossible.

The effort didn't work out for several reasons.

Webmaster's Commentary: 

Here on Oahu, we are stuck with Spectrum, which promises much, in those multi-million commercials, featuring the voice of the comedian, Ellen De Generes, but actually delivers very little of what it promises.

When cable companies do not have to compete, they don't have to give a damn about the true quality of their service, or if there is even a modicum of public satisfaction with it.

Aug 14 10:18

When's a backdoor not a backdoor? When the Oz government says it isn't

Australia's promised “not-a-backdoor” crypto-busting bill is out and the government has kept its word - it doesn't want a backdoor, just the keys to your front one.

The draft of The Assistance and Access Bill 2018 calls for anyone using or selling communications services in Australia will be subject to police orders for access to private data.

That includes all vendors of computers, phones, apps, social media and cloud services in the Lucky Country, and anyone within national borders using them. These data-tapping orders will be enforced with fines of up to AU$10m (US$7.3m) for companies or $50,000 ($36,368) for individuals

The draft legislation also wants five years in prison for anyone who reveals a data-slurping investigation is going on.

Aug 14 10:15

Three more data-leaking security holes found in Intel chips as designers swap security for speed

Intel will today disclose three more vulnerabilities in its processors that can be exploited by malware and malicious virtual machines to potentially steal secret information from computer memory.

These secrets can include passwords, personal and financial records, and encryption keys. They can be potentially lifted from other applications and other customers' virtual machines, as well as SGX enclaves, and System Management Mode (SMM) memory.

Aug 14 09:47

How Hacked Water Heaters Could Trigger Mass Blackouts

In a power network large enough to serve an area of 38 million people—a population roughly equal to Canada or California—the researchers estimate that just a one percent bump in demand might be enough to take down the majority of the grid. That demand increase could be created by a botnet as small as a few tens of thousands of hacked electric water heaters or a couple hundred thousand air conditioners.

Aug 14 09:35

RUSSIAN MILITARY SPY SOFTWARE IS ON HUNDREDS OF THOUSANDS OF HOME ROUTERS

The Russian military is inside hundreds of thousands of routers owned by Americans and others around the world, a top U.S. cybersecurity official said on Friday. The presence of Russian malware on the routers, first revealed in May, could enable the Kremlin to steal individuals’ data or enlist their devices in a massive attack intended to disrupt global economic activity or target institutions.

On May 27, Justice Department officials asked Americans to reboot their routers to stop the attack. Afterwards, the world largely forgot about it. That’s a mistake, said Rob Joyce, senior advisor to the director of the National Security Agency and the former White House cybersecurity coordinator.

“The Russian malware is still there,” said Joyce.

Webmaster's Commentary: 

Yet more demonization of Russia here in the US?!?

Because IF this is real, it appears to primarily be a problem for routers in Ukraine.

So then, how, please, did it become a problem for American computers, and what US agencies tasked with protecting Americans from this kind of problem, have failed the American people (yet again)?!?

Aug 14 00:17

George Orwell Warned Us Of The Most Dangerous Type Of Censorship

The end result of this type of censorship, however, quite likely will not bring about the feared Soviet-style clampdown on ideas that challenge the establishment. It’s more reasonable to expect that these companies have fallen prey to monopolistic hubris and will soon see massive declines in viewership, collapsing stock prices and the revolt of angry shareholders. In other words, these companies are shooting themselves in the feet. That said, the current social/political/media climate in America today is likely to bring about the rise of a far more insidious and dangerous type of censorship: self-censorship.

Aug 13 23:57

Exposed: How Google Still Tracks You Even When “Location History” Is Turned Off

Android and iPhone users may be under the impression that Google is not tracking their location data if they’ve turned off “Location History” on their devices. After all, the Google support page says, “With Location History off, the places you go are no longer stored.” -- But a new Associated Press investigation showed how that is not really the case. Some Google apps still automatically collect users’ location markers—information it can use to benefit its advertising revenue.

Aug 13 17:40

New Wi-Fi attack cracks WPA2 passwords with ease

The common Wi-Fi security standard is no longer as secure as you think.

Aug 13 17:37

New security flaw with Intel processors

A new security flaw has been detected by German researchers in relation to Intel. This comes on the back of earlier concerns from January and March 2018. The flaw means that passwords can potentially be stolen.

Aug 13 17:37

Hacker Finds Hidden 'God Mode' on Old x86 CPUs

Some x86 CPUs have hidden backdoors that let you seize root by sending a command to an undocumented RISC core that manages the main CPU, security researcher Christopher Domas told the Black Hat conference here Thursday (Aug. 9).

The command — ".byte 0x0f, 0x3f" in Linux — "isn't supposed to exist, doesn't have a name, and gives you root right away," Domas said, adding that he calls it "God Mode."

The backdoor completely breaks the protection-ring model of operating-system security, in which the OS kernel runs in ring 0, device drivers run in rings 1 and 2, and user applications and interfaces ("userland") run in ring 3, furthest from the kernel and with the least privileges. To put it simply, Domas' God Mode takes you from the outermost to the innermost ring in four bytes.

"We have direct ring 3 to ring 0 hardware privilege escalation," Domas said. "This has never been done."

Aug 13 17:34

Vulnerabilities Found in the Firmware of 25 Android Smartphone Models

Last week, at the DEF CON security conference held in Las Vegas, security researchers presented details about 47 vulnerabilities in the firmware and default apps of 25 Android smartphone models, 11 of which are also sold in the US.

These vulnerabilities, embedded in full in the table at the bottom of this article, range from simple flaws that crash devices to dangerous bugs that grant attackers the ability to get root access on users' devices.

Some of the most dangerous of these vulnerabilities allow an attacker to retrieve or send SMS texts from the user's phone, take screenshots or record videos of the phone's screen, retrieve the user's contacts list, force the installation of third-party arbitrary apps without the user's knowledge or consent, or even wipe the user's data from the device.

Aug 13 17:33

Backdoor Mechanism Discovered in VIA C3 x86 Processors

At the Black Hat 2018 and DEF CON 26 security conferences held in Las Vegas last week, a security researcher detailed a backdoor mechanism in x86-based VIA C3 processors, a CPU family produced and sold between 2001 and 2003 by Taiwan-based VIA Technologies Inc.

The affected CPU family was designed with PC use in mind but was more widely known for being deployed with point-of-sale units, smart kiosks, ATMs, gaming rigs, healthcare devices, and industrial automation equipment.

Christopher Domas, a well-known hardware security expert, says that VIA C3 x86-based CPUs contain what he referred to as a "hidden God mode" that lets an attacker elevate the execution level of malicious code from kernel ring 3 (user mode) to kernel ring 0 (OS kernel).

Aug 13 17:05

Hackers ‘to steal MILLIONS from cash machines within days’: FBI warns of imminent mass attack on world’s ATMs

America's intelligence chiefs have warned banks of a major hacking threat to cash machines worldwide in the next few days.

The FBI sent out a confidential alert on Friday to warn that cyber criminals are planning a global 'cash-out scheme' using malware to take over ATMs and steal millions of dollars.

Banks were warned that they could fall victim to an 'unlimited operation' in which millions of dollars could be withdrawn from cash machines.

Aug 13 17:03

Hackers discover vulnerability in Amazon Echo devices that could let anyone SPY on your conversations

A group of security researchers have exposed a flaw in the Amazon Echo that allows hackers to secretly listen to unsuspecting users' conversations - but only if they're savvy enough to be able to carry out the attack.

In a presentation dubbed 'Breaking Smart Speakers: We are Listening to You,' researchers from Chinese tech giant Tencent explained how they were able to build a doctored Echo speaker and use that to gain access to other Echo devices.

The researchers have since notified Amazon of the vulnerability, and the company issued a patch in July.

Aug 13 15:24

Beware the fax machine: Experts warn MILLIONS of office gadgets are at risk of being hacked - and many are too old to be updated

What could be less threatening than the old office fax machine? Nothing.

That's precisely why it's used as a backdoor for hackers to get into an organization's network.

Check Point, a cyber security firm in Israel, said Sunday that their research discovered security flaws in tens of millions of fax machines.

The hack works by sending an image file through the phone line - or a file that the fax machine thinks is an image file - and that is coded to contain malicious software.

When a company receives the photo, the image is decoded and uploaded into the fax-printer's memory, allowing the hackers to take over the device and spreading the malicious code through the network.

Aug 13 15:22

Vimeo joins Facebook, Apple, YouTube and other tech giants in banning InfoWars' Alex Jones from its platform

Vimeo has become the latest tech giant to take action against controversial radio host Alex Jones.

The video-hosting website removed InfoWars from its platform for violating the site's Terms of Service.

Aug 13 11:04

COMING SOON TO THE USA=> A Month Before Election Sweden’s Leftist Govt. Obtains Right to Silence Critics on Facebook

Sweden’s government has been given a direct hotline to Facebook to remove “unreasonable things” and “problematic campaigns”, news outlet Samhällsnytt reports, and this is just in time to silence their opponents in the upcoming elections.

“The call has been made”. Infrastructure Minister Peter Eriksson MP has described the cooperation between Facebook and the government to delete unwanted content in a candid interview.

The politician commends the willing cooperation of the social media company. At the same time, more and more of the opposition are leaving social media.

Aug 13 09:44

Flashback: Adobe Voco 'Photoshop-for-voice' causes concern

A new application that promises to be the "Photoshop of speech" is raising ethical and security concerns.

Adobe unveiled Project Voco last week. The software makes it possible to take an audio recording and rapidly alter it to include words and phrases the original speaker never uttered, in what sounds like their voice.

One expert warned that the tech could further undermine trust in journalism.

Another said it could pose a security threat.

Aug 13 09:21

New smart meter code could hand energy firms power to monitor usage, raid credit balances, hike prices and switch customers' tariffs

A little known code governing smart meters includes details of sweeping powers that could take over customer accounts.

It reveals that technology is available to the meter network that could enable suppliers to raid credit balances built up by consumers, turn off supplies remotely, raise prices and even switch problem customers on to a pre-payment scheme. Authority to use these functions has yet to be granted.

Nick Hunn, a wireless technology expert with London-based firm WiFore, fears this might eventually give energy suppliers the ability to act like the fictional Big Brother in the classic novel Nineteen Eighty-Four by George Orwell.

Aug 13 09:18

Watch out for Nectar text message scam doing the rounds asking card holders to log-in online to double points

In the text message, card holders are told that in occasion of the loyalty scheme's 10th anniversary, they will be able to double their points by just logging into their accounts via the link included in the text.

But Nectar has warned the message is not genuine and urged card holders who receive it not to click on the link and instead delete the message.

Aug 13 09:08

Google really IS recording your every movements! Search firm tracks location data using your smartphone, even when you explicitly tell it not to

Google services on Android devices and iPhones store records of your location even after you have enabled privacy settings that claim to halt the practice.

Disabling 'Location History' in the settings of Google apps should stop the company keeping track of your movements.

However, researchers discovered the search company was still keeping tabs on users' location behind their back.

Aug 13 08:43

Apple macOS vulnerability paves the way for system compromise with a single click

A security researcher uncovered a zero-day in Apple software by tweaking a few lines of code. Speaking at Defcon in Las Vegas last week, Patrick Wardle, Chief Research Officer of Digita Security, described his research into "synthetic" interactions with a user interface (UI) that can lead to severe macOS system security issues.

Synthetic events are when attackers can virtually "click" objects in order to load code without user consent. If a threat actor is able to "click" a security prompt and load a kernel extension, this could lead to the full compromise of an operating system.

"Via a single click, countless security mechanisms may be completely bypassed," the researcher says. "Run untrusted app? click ...allowed. Authorize keychain access? click ...allowed. Load 3rd-party kernel extension? click ...allowed. Authorize outgoing network connection? click ...allowed."

Webmaster's Commentary: 

Aug 13 07:50

UAE: UP TO 25 YEARS IN JAIL FOR CYBER CRIMINALS

The UAE has made an amendment to a 2012 Cyber Crime law, increasing financial penalties and extending jail terms to up to 25 years for terrorism related activity, WAM Agency reported today.

Those engaging in cybercrimes in the UAE can be sent to jail for a period not exceeding 25 years in addition to a fine up to some $1 million.

The terrorism related activity includes: “whoever establishes, manages or runs a website or publishes information on the computer network or information technology means for the interest of a terrorist group or any unauthorised group, association, organisation”, the WAM Agency statement read.

‘HATE CRIMES’

Webmaster's Commentary: 

Why does it not surprise me, that this same country, terrified of what its own people may think about its government, is torturing in Yemen?!?

That has to be part of the three-legged stool, is it not, of surveillance, threatening those who do not believe the government, posting alternative viewpoints, and then using torture to reinforce the consequences of the first two acts.

This is all as logical as it is deplorable.

Aug 13 05:40

Hacking the US mid-terms? It's child's play

Bianca Lewis, 11, has many hobbies. She likes Barbie, video games, fencing, singing… and hacking the infrastructure behind the world’s most powerful democracy.

“I’m going to try and change the votes for Donald Trump,” she tells me.

“I’m going to try to give him less votes. Maybe even delete him off of the whole thing.”

Fortunately for the President, Bianca is attacking a replica website, not the real deal.

She’s taking part in a competition organised by R00tz Asylum, a non-profit organisation that promotes “hacking for good”.

Its aim is to send out a dire warning: the voting systems that will be used across America for the mid-term vote in November are, in many cases, so insecure a young child can learn to hack them with just a few minute’s coaching.

Aug 12 23:51

In A Corporatist System Of Government, Corporate Censorship Is State Censorship

We’re going to have to find a way to keep the oligarchs from having their cake and eating it too. Either (A) corporations are indeed private organizations separate from the government, in which case the people need to get money out of politics and government agencies out of Silicon Valley so they can start acting like it, and insist that their owners can’t be dragged out on to the Senate floor and instructed on what they can and can’t do with their business, or (B) these new media platforms get treated like the government agencies they function as, and the people get all the First Amendment protection that comes with it. Right now the social engineers are double-dipping in a way that will eventually give the alliance of corporate plutocrats and secretive government agencies the ability to fully control the public’s access to ideas and information. If they accomplish that, it’s game over for humanity.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA