COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Jan 18 15:30

Website Exposed Mossad Chief’s Personal Data to Lure Media Victims - Report

The two “white hat” hackers who discovered the website believe it was used to lure specific victims – presumably journalists – in order to collect their data in preparation for a future attack on their computers.

Israeli hackers have exposed a website that published personal data about high-ranking Israeli military and intelligence officials, a report by The Times of Israel says, citing Hadashot TV.

In particular, the website — the name of which remains undisclosed — has published personal details and pictures of the home and family of Mossad chief Yossi Cohen.

Avichai Adraee, the Arabic spokesperson for the Israeli Defense Forces, also had his personal data leaked via the website, the report says.

The website was reportedly advertised via social media in an apparent attempt to lure journalists, the report says. Any person visiting the website also had their personal data collected.

Jan 18 11:35

Don’t Put Robots in Charge of the Internet

By Elliot Harmon

Last year, YouTube’s Content ID system flagged Sebastian Tomczak’s video five times for copyright infringement. The video wasn’t a supercut of Marvel movies or the latest Girl Talk mashup; it was simply ten hours of machine-generated static. Stories like Tomczak’s are all too common: Content ID even flagged a one-hour video of a cat purring as a likely infringement.

But those are only a small glimpse of a potential Internet future...

Jan 18 11:30

ZIMBABWE CUTS INTERNET AMID CRACKDOWN

Zimbabwe has blocked Facebook, Twitter and WhatsApp messaging amid a deadly crackdown on days of violent protests.

A coalition of local human rights groups says at least 12 people have been killed and many more beaten and tortured by security forces this week.

The Zimbabwe Human Rights NGO Forum accused the authorities of cutting off the internet "to mask the massive human rights violations".

The protests were sparked on Monday by a sharp rise in the price of fuel.

Africa Live: More on this story and others from the continent
Despair, anger and anxiety in Zimbabwe's fuel queue
The government has blamed the opposition and political rights groups for the protests, which has seen riot police clashing with protesters in the capital, Harare, and the southern city of Bulawayo after they lit fires and blocked roads using rocks.

Webmaster's Commentary: 

One has to wonder: how long Zimbabwe's military will continue to take the government's side, or will there be a moment, when alliances will shift?!?

Jan 18 10:02

What’s That Buzzing Overhead? It’s An OSHA Drone

By Walter Olson

“That buzzing noise over a construction site could be an OSHA drone searching for safety violations,” notes Littler Mendelson lawyer Tammy McCutchen in a piece for the Federalist Society. Quoting a U.S. Department of Labor memorandum from May of last year obtained by Bloomberg Law, McCutchen writes that “your friendly neighborhood OSHA inspector is now authorized by the Labor Department ‘to use camera-carrying drones as part of their inspections of outdoor workplaces.’”

What about the Fourth Amendment, you may ask? Well, court review is unlikely because current procedures call for the agency to obtain employer consent before sending the spycams aloft. Which makes everything okay, right?...

Jan 18 09:02

Hackers using fake ‘Flash Player’ Google Chrome extension to steal credit card data

Cybersecurity researchers are warning unsuspecting internet users about a year-old Chrome extension which steals credit card data from infected users via web forms on visited websites.

The surreptitious extension is spread by means of JavaScript injection attacks i.e. “You don’t have Flash installed, use this Chrome extension instead,” or something to that effect. When unsuspecting or careless users click on these links, it triggers an automated redirect to the malicious extension.

Jan 17 19:41

Airbnb Patrons Are Finding More and More Cameras In Their Rooms -- Here's How To Check For Cameras

By Aaron Kesel

Airbnb is having more and more of its hosts hiding security cameras in rooms, and it doesn’t seem to be worried about the practice if innkeepers are disclosing the cameras and they aren’t in the bathrooms or bedrooms, according to a report by Fast Company...

Jan 17 19:04

Trump Plans Missile Interceptors, Sensors And Radars "To Shield Every City"

Thursday's presidential visit to the Pentagon for the long awaited Missile Defense Review — the first such congressionally mandated assessment of the state of the nation's defense systems since 2010 — gave Trump yet another chance to chastise NATO allies on his as yet unmet demand that they "step up" defense spending. He also hinted that he plans to stick by his recent deeply controversial decision to pull out of the Reagan-era Intermediate-Range Nuclear Forces (INF) Treaty with Russia.

“We are committed to establishing a missile defense program that can shield every city in the United States and we will never negotiate away our right to do this,” President Trump said.

Webmaster's Commentary: 

The problem is not that we cannot develop military technology; unfortunately, the cold, hard facts are that China and Russia do, and appear to be way ahead of the US right now in this weapons technology.

The lead time from developing to testing these can be intense, but I am certain that both President Putin and China's President Xi Jinping could tell you, probably to the day, how long it takes.

But first, this Country desperately need a foreign policy which doesn't turn heads of states away from dealing with the US as an equal partner and friend; and that, my friends, is the most depressing thing about US foreign policy right now.

Jan 17 19:02

This is what Google says search will look like under EU copyright laws

One of the most controversial segments of the Copyright Directive is Article 11, which gives publishers the right to demand paid licenses for using snippets of their stories. From Google’s point of view, that gives it two choices: start paying for licenses or don’t show snippets at all.

In “test” screenshots (first shared with Search Engine Land) the tech giant demonstrated what the latter approach might look like. If a user in the EU searches for “latest news,” they would simply see links to media outlets’ sites alongside some tantalizingly useless timestamps. No summaries of stories, no headlines or pictures — no nothing.

Jan 17 18:58

Zimbabwe Government Blocks Internet to Suppress Protests, Cuts Power as a Result

According to the Irish Times, the government ordered the Postal and Telecommunications Regulatory Authority of Zimbabwe to block Internet access provided by Zimbabwe’s two largest ISPs, Econet and TelOne. The intention was to prevent citizens from using social media to organize protests similar to those that erupted on Monday.

What happened next is a case study of the impact of unintended consequences and humanity’s ever-increasing reliance on the Internet. A Bloomberg story reports that because Zimbabweans use the Internet to pay for their electricity on a daily basis, many homes lost their electricity along with Internet access.

Jan 17 12:06

The Keys to Keeping Your Crypto Safe

By Philip Martin

Keeping your crypto safe doesn’t have to be daunting. In this piece. Coinbase VP of Security, Philip Martin, offers some best practices to stay one step ahead of hackers and scammers.

One of the primary benefits of cryptocurrencies is that they allow people to engage in online transactions without the need for an intermediary like a bank or credit-card company. Instead, anyone who wants to send or receive cryptocurrency creates a “cryptographic key”?—?a file containing a random secret code?—?that can then be used to authorize transactions from their cryptocurrency wallets. If an attacker gets access to that key, they instantly gain control the cryptocurrency wallet as if they were the owner. That’s why it’s critical to protect your keys if you manage them yourself, and lock down your accounts at trusted third-party services like Coinbase that help manage your keys for you.

Jan 17 12:05

Over 770 million email addresses shared online in largest data breach in history

A security researcher has blown the lid off the largest data breach in history as over 770 million emails and 21 million unique passwords have been exposed, eclipsing the Equifax and Yahoo hacks by a significant margin.

The breach is being dubbed ‘Collection #1’ and contains a raw data set of email addresses and passwords totalling 2,692,818,238 rows from potentially thousands of different sources, according to digital security expert Troy Hunt.

Jan 17 11:55

[CENSORSHIP] Lindsay Shepherd suspended from Twitter for posting about the transwoman

who demanded Brazilian wax from women-only estheticians

Jan 17 09:46

Biggest EVER collection of breached data including more than a BILLION email addresses and passwords is posted online to a hacking forum

A security researcher found the 87GB dump of data hidden on a hacker forum and says many of them have been previously included in other leaks such as the infamous MySpace and LinkedIn breaches.

Troy Hunt, who runs the 'Have I Been Pwned' breach-notification service, found the leak on cloud-service MEGA and called it 'Collection #1'.

He said: 'If you're in this breach, one or more passwords you've previously used are floating around for others to see.'

Users can use this site to see if their email has been made available in the leak and this link to check their passwords are still safe.

Jan 16 17:54

Veteran MD Drops a Bombshell about 5G and the Effect it Will Have on Your Health

Dr. Sharon Goldberg, an internal medicine physician & professor, is one of many professionals and concerned humans who are speaking a very important truth to power right now.

Jan 16 16:46

Fortnite security flaw allows hackers to SPY on young players and steal the in-game currency

A security flaw with gaming sensation Fortnite has exposed player accounts to hackers.

Gaming security experts found a vulnerability which allowed criminals to obtain log-in information and cease control.

This includes accessing personal information and use of card details to buy in-game currency.

Jan 16 11:49

Alexa DOWN – Amazon helper stopped working, ‘ignored users’ and wouldn’t turn off

AMAZON'S virtual assistant Alexa stopped working for some users around the world on Wednesday morning.

The mysterious outage meant that Alexa – typically controlled by voice – was "ignoring" user requests.

Jan 16 11:40

A New Tactic To Suppress Online Speech: Taxing Social Media

Aware of the threat that social media poses to their power, repressive regimes in Africa have employed various methods to stifle internet-based mobilization.

These include internet shutdowns, targeted social media applications shutdowns, website takedowns, extensive surveillance of digital communications, online propaganda, and the detention of online critics, writes Babatunde Okunoye for Foreign Affairs.

According to Okunoye, in 2018, repressive governments adopted yet another tactic: taxes on social media usage.

In countries such as Uganda, Benin, Tanzania and Zambia, there are now laws in place which impose daily taxes on social media and other over-the-top services.

Jan 16 11:39

Ukrainian Hackers Broke Into The SEC's EDGAR Database, Made $4.1 Million From Insider Trades

On Tuesday, United States authorities charged numerous mostly Ukrainian hackers for a scheme to trade on press releases that had not yet been released. The Ukrainians breached the SEC's EDGAR database to receive access to the nonpublic information.

The scheme netted over $4 million for fraudsters from the U.S., Russia and Ukraine. Using 157 corporate earnings announcements, the group was able to execute trades on material nonpublic information. Most of those filings were "test filings," which corporations upload to the SEC's website.

Jan 16 11:16

The Transportation Department is Funding Autonomous Drones

The Transportation Department is funding research to build artificial intelligence-powered drones and trying to get a better understanding of how autonomous vehicles could be manipulated to harm the public.

The agency’s Volpe National Transportation Systems Center on Thursday began soliciting teams to develop open-source artificial intelligence tools that allow drones to fly without a human operator. The team would ultimately build a drone capable of locating targets and dodging obstacles without outside intervention.

Selected vendors would also need to provide secure facilities where government engineers can store and test autonomous drones and cars. The 12-month contract is only open to companies and universities located within 25 miles of Arlington, Va., according to the solicitation.

While the vendors would primarily explore ways AI could augment drones, officials said they’re also curious how the tech might be manipulated to threaten the public.

Jan 16 11:13

You can lace Nike's Adapt BB shoes with a smartphone app, but that's just the beginning

Nike provided a glimpse of what the future of footwear could look like by introducing the first self-lacing smart basketball shoe on Tuesday.

The Adapt BB, priced at $350, does more than just lace itself. Using a power lacing system called Fit Adapt, users can adjust to find the perfect fit whether it's manually or digitally, using the Nike Adapt mobile app. A custom motor and gear train tighten or loosen to customize to your foot.

For Nike, this opens a new world of smart data insights into athletes' workouts. For athletes, it represents a new era and way they interact with sneakers.

Jan 16 09:37

Apple's digital health plan puts the iPhone and Apple Watch at the heart of your wellbeing

Digital health is where big tech firms want to be right now: from Amazon to IBM, Microsoft to Google, hardware and software companies are scrambling to up their presence in the healthcare sector. Apple has been quietly expanding into the space for a number of years as its devices and its CEO Tim Cook even recently said that in future the company's greatest contribution to humanity would be considered to be 'about health'.

The first signs of Apple's burgeoning interest in health came with the launch of its HealthKit platform and Health app, which debuted alongside the first Apple Watch. Back then, it was consumer wellness that Apple was talking about, helping users track their exercise, diet, and other lifestyle metrics, with the idea that if you know how much you're doing, you might be encouraged to do more.

Jan 15 21:53

There's a simple reason your new smart TV was so affordable: It's collecting and selling your data

A recent interview on The Verge's podcast with Vizio's chief technology officer, Bill Baxter, did a great job illuminating how this works.

"This is a cutthroat industry," Baxter said. "It's a 6% margin industry. The greater strategy is I really don't need to make money off of the TV. I need to cover my cost."

More specifically, companies like Vizio don't need to make money from every TV they sell.

Smart TVs can be sold at or near cost to consumers because Vizio is able to monetize those TVs through data collection, advertising, and selling direct-to-consumer entertainment (movies, etc.).

Or, as Baxter put it: "It's not just about data collection. It's about post-purchase monetization of the TV."

Jan 15 21:50

Four out of five Americans distrust mainstream social media sites like Facebook

Americans are so disillusioned by social media, that many are turning to forums for trustworthy information.

Jan 15 19:19

Anonymous, Pirates and Activists Challenge Articles 11, 12a, 13 With Stop ACTA 2 Protests January 19th Across Europe

By Aaron Kesel

The European Union is attempting to censor the Internet with several new initiatives called Article 11, 12a, and 13 while numerous other Articles are pending to be drafted that could affect your Internet freedom rights.

These Articles will have legal implications that will break the Internet as we know it. Not only will they include an “upload filter” if passed to block copyrighted (or unwanted) content from being uploaded on the Internet, it will also be impossible to link to source material, including educational content and even memes...

Jan 15 18:59

Device “Ownership” Is a Civil Liberties Issue

By Kit Walsh

The technology you rely on to interact with the world and express yourself should ultimately obey you, not the company that made it. If the devices in our pockets, on our bodies, and all around us are going to help us advance our own values, it has to be possible to control and customize them so they don’t just do whatever their manufacturer envisioned...

Jan 15 17:50

UN Member: 5G Could Trigger Extinction Level Event

I did my best for two and a half years to alert the UN staff union, administration and medical service to the danger to the health of UN staff of EMR from these access points, but was ignored.

People’s first reaction to the idea that 5G may be an existential threat to all life on Earth is usually disbelief and/or cognitive dissonance. Once they examine the facts, however, their second reaction is often terror.

If 5G is built, radiation levels will increase 10- to 100-fold, virtually overnight, everywhere. There will literally be no place on Earth to hide from it.

Elon Musk is set to launch the first 4,425 5G satellites in June 2019 and “blanket” the Earth with 5G, in breach of countless international treaties. This could initiate the last great extinction, courtesy of the multi-trillion-US-dollar 5G, the biggest biological experiment and most heinous manifestation of hubris and greed in human history.

Jan 15 11:29

The Federal Government offers a case study in bad email tracking

The U.S. government sends a lot of emails. Like any large, modern organization, it wants to “optimize” for “user engagement” using “analytics” and “big data.” In practice, that means tracking the people it communicates with—secretly, thoroughly, and often, insecurely.

Jan 14 12:36

The U.S. Government Has Amassed Terabytes of Internal WikiLeaks Data

Late last year, the U.S. government accidentally revealed that a sealed complaint had been filed against Julian Assange, the founder of WikiLeaks. Shortly before this was made public, the FBI reconfirmed its investigation of WikiLeaks was ongoing, and the Wall Street Journal reported that the Department of Justice was optimistic that it would be able to extradite Assange. Soon after, portions of sealed transcripts leaked that implicate WikiLeaks and Assange in directing hackers to target governments and corporations. The charges against Assange have not been officially revealed, though it’s plausible that the offenses are related to Russian hacking and the DNC emails.

Jan 14 10:17

Change Your Phone Settings So Apple, Google Can’t Track Your Movements

By Jen King, Stanford University

Technology companies have been pummeled by revelations about how poorly they protect their customers’ personal information, including an in-depth New York Times report detailing the ability of smartphone apps to track users’ locations. Some companies, most notably Apple, have begun promoting the fact that they sell products and services that safeguard consumer privacy...

Jan 14 09:22

Sample “Municipal Code For Small Cell Infrastructure,” 5G Technology

By Catherine J. Frompovich

The group I network with, Americans for Responsible Technology regarding 5G, has formulated a “Municipal Code for Small Cell Infrastructure” or the Sample Code for Villages and Towns • Social Media Ideas • Blumenthal & Eshoo • Lobbying Basics, which I share with my readers, and ask you to do the same with your work in the push back against 5G...

Jan 14 08:43

Why is my keyboard connected to the cloud?

Everything is becoming a thing connected to the internet, but some things really shouldn't be.

First cab off that rank should be input devices, because what sort of maniac thinks the advantages of a roaming cloud-based configuration outweighs the potential explosion in surface area to attack and compromise? That maniac is called Razer, and it has been connecting keyboards to its Synapse software for years.

At last week's CES, Razer took it a step further when it announced it is adding support for users to use Alexa to control their peripherals.

Jan 13 10:37

THE U.S. GOVERNMENT HAS AMASSED TERABYTES OF INTERNAL WIKILEAKS DATA

Late last year, the U.S. government accidentally revealed that a sealed complaint had been filed against Julian Assange, the founder of WikiLeaks. Shortly before this was made public, the FBI reconfirmed its investigation of WikiLeaks was ongoing, and the Wall Street Journal reported that the Department of Justice was optimistic that it would be able to extradite Assange.

Jan 13 09:07

Scientists Explain How Digital Technology Affects the Brain

“We’re all pawns in a grand experiment to be manipulated by digital stimuli to which no one has given explicit consent.” ~ Richard Davidson, a neuroscientist at the University of Wisconsin

Jan 12 15:53

The quiet threat inside ‘internet of things’ devices

The number of these “internet of things” devices is climbing into the tens of billions. They’re creating an interconnected world with the potential to make people’s lives more enjoyable, productive, secure and efficient. But those very same devices, many of which have no real security protections, are also becoming part of what are called “botnets,” vast networks of tiny computers vulnerable to hijacking by hackers.

Botnets have caused problems on the internet, from sending vast amounts of spam mail to disrupting websites around the world. While traditionally most botnets are comprised of laptop and desktop computers, the growth of unsecured devices such as industrial sensors, webcams, televisions and other smart home devices is leading to a growing disruptive capability.

Jan 12 15:37

Facebook staff discussed cashing in on user data, reports say

Facebook staff discussed charging companies for access to user data, before ultimately deciding against such a policy, according to reports.

The internal discussions were revealed due to improperly redacted court documents, released as part of Facebook’s lawsuit against American software developer Six4Three last year. According to Ars Technica and the Wall Street Journal, an 18-page court filing contains three pages that were supposed to be blacked out because they contain “sensitive discussion of Facebook’s internal strategic analysis of third-party applications”, Facebook said in other court filings.

But while the sensitive discussions were masked with a black bar, the underlying text was not removed from digital versions of the documents, allowing it to be uncovered.

Jan 12 13:02

Scott Adams: The FBI, H1B VISAs, Steve King, Terrorist Deprogramming, and Climate

Plus bonus addendum: Quick Tutorial on Using Engineering to Take Politics Out of the Wall

CNN says Steve King said white supremacy is okay
Did he think that and say that? He clarified later, said no.
Even if true…would he have said it in public?
President Trump tweets to promote citizenship for H1B people
We want productive people, nothing to do with race
Your worldview, should be able to predict the future accurately
Look at your worldview carefully if it isn’t predictive
Social media companies change our opinions by what they feed us
In effect, they’re programming us, brainwashing us
Self-radicalized by the CNN silo
Self-radicalized by the FOX silo
Dogs for immigration patrolling
Study: White males most likely to question climate change
Study also said, the more they knew about topic…

Jan 12 10:18

This is what happens when you reply to spam email | James Veitch

Suspicious emails: unclaimed insurance bonds, diamond-encrusted safe deposit boxes, close friends marooned in a foreign country. They pop up in our inboxes, and standard procedure is to delete on sight. But what happens when you reply? Follow along as writer and comedian James Veitch narrates a hilarious, months-long exchange with a spammer who offered to cut him in on a hot deal.

Jan 11 19:19

Amazon Ring Surveillance Cameras Are Spying On You, They Want Private Watchlists; Mobile Providers Cease Selling Location Data To Third Party Apps

By Aaron Kesel

It’s not enough that Amazon is on record working with the FBI with its Facial Rekogntion biometric software … no, Amazon is also spying on its customers of its recently purchased home surveillance cameras called “Ring,” The Intercept reported.

For those unfamiliar with Amazon “Ring,” they are miniature cameras that can be placed anywhere on your property from outside your house to your garage to inside your home. Amazon acquired the “Ring” camera company in 2018, as Activist Post previously reported.

When Activist Post first reported on this shocking technology we were under the impression it was just algorithms tagging objects and people. We were so wrong; this statement by the ACLU is even more on-point now...

Jan 11 15:50

Microsoft Partners With Neocon-Backed 'Fact-Checker' Seeking To 'Wage War On Independent Media'

Microsoft has partnered with a shoddy Neocon-backed "fact checker" called NewsGuard which rates websites' "credibility" in-browser and NewsGuard's CEO says their goal is to have their software on all smartphones and computers by default.

Jan 11 11:51

The First Bendable Phone Is an Exciting Piece of Junk

Without even considering its general specs—which aren’t really notable aside from its 7.8-inch flexible AMOLED display—the Flexpai has a lot of issues. Even when its screen is fully open, the Flexpai is never truly flat. Its screen often has a bump or a slight ripple in it, a likely side effect of multiple bending sessions. Meanwhile, actually closing and opening its display is a constant struggle. And on a couple occasions, just bending that display caused the Flexpai to randomly turn off.

When it’s closed, the Flexpai is thick as hell. It reminds me of the gap you get on a Surface Book, except somehow it seems like the Flexpai has proportionally even more wasted space behind the hinge. The Flexpai’s stiff hinge is also covered in what feels like the same latex used to make cheap accordions, and on one of the units I saw, it looked like it was already dried out and starting to crack.

Jan 11 10:05

Kaspersky Spotted Leak NSA Missed as Spy Agency Lacks ‘Good Handle’ on Security

On Wednesday, Politico reported that Moscow-based Kaspersky Labs, which is banned on US government computers over spying fears, helped uncover in 2016 perhaps the single largest theft of US intelligence in history. Sputnik spoke with Kim Zetter, the author who broke the ironic story, about what happened.

Researchers at security software company Kaspersky Labs received some strange messages on Twitter in August 2016, messages that seemed connected to a huge theft of sophisticated US National Security Agency (NSA) hacking tools. After Kaspersky investigated and discovered the identity of the sender and reported their findings to the NSA, a subsequent search of the man's home uncovered two decades' worth of stolen data amounting to 50 terabytes' worth of classified material from NSA and other government offices.

Jan 11 08:36

Pennsylvanians Should Know How The State Police Is Monitoring Social Media

By Andrew Christy, Criminal Justice and Poverty Attorney, ACLU of Pennsylvania

“Sunshine is the best disinfectant.”

That’s a line that is used so much that it’s become almost trite. But it’s oft-repeated because it is so true. And here in the Keystone State, the Pennsylvania State Police is doing everything in its power to block access to its policy on monitoring social media. So we’re headed to the state Supreme Court to get it.

The ACLU of Pennsylvania’s attempt to obtain the state police’s social media monitoring policy has been a two-year odyssey that started in March 2017...

Jan 11 08:32

Brothel Offers Amazon Alexa-Powered Sex Tape Studio During CES

Sheri’s Ranch, a legal brothel in Nevada, is offering guests an Amazon Alexa-powered sex tape recording studio during the International Consumer Electronics Show (CES) in Las Vegas, Nevada, this week.

According to the Sun, which was given an exclusive tour, the room is fully automated using an Amazon Alexa-powered Echo speaker.

After guests say, “Alexa, begin the porn star experience,” the “shutters go down, the lights turn on, and the cameras start filming from all angles.”

“The cameras are linked up to a computer system that cycles through different viewpoints, cutting them into a professional-style clip,” reported the Sun. “And once punters are finished, they can collect the tape on an SD card and take it home – for strictly personal use only.”

Webmaster's Commentary: 

Ummmmm ... yeah.

Jan 11 08:24

“THE INTERNET’S OWN BOY”

On this day in 2013, the news reported that Aaron Swartz committed suicide.

Bulletin: Nearly five years to the day of Swartz’s “suicide”, we are being told that his partner in programming James Dolan has “committed suicide” too.

James was an ex-Marine and computer security expert who was part of a three-man team with Swartz on the development of SecureDrop, an open source whistleblower submission system.

Jan 10 18:46

Warning to Facebook users to IGNORE hoax message claiming photos and private information will be made public TOMORROW

A message circulating on Facebook claiming a person's personal and private information on the site will be made public tomorrow is a fake.

It claims a deadline is approaching which will make 'everything you've ever posted... public from tomorrow'.

The fictitious status then encourages gullible users to copy and paste the legal-sounding jargon and re-post it.

The message and the content it entails is a hoax as no such deadline exists and people should refrain from spreading the misinformation.

Jan 10 18:39

Is YOUR doorbell spying on you? Amazon's Ring let employees watch live footage from customers' cameras, report claims

Your smart doorbell might be spying you.

A new report from The Intercept claims Ring, the smart doorbell company owned by Amazon, allowed its employees to watch live footage from customers' cameras.

Ring engineers and executives were reportedly given access to 'unfiltered, round-the-clock' feeds of some users' footage.

Jan 10 18:33

Google Play Store spews malware onto 9 million 'Droids

Malware made it past Google's detection systems and infected some 9 million Android users, analyst Trend Micro has found. Google has removed 85 apps from the Google Play Store as a result.

The apps, purportedly TV and video players and controllers, would consistently show full-screen ads until they crashed. Developers behind such apps then racked up ad impressions from which they profited.

The batch of 85 apps removed included the "Easy Universal TV Remote", which had a high proportion of negative reviews but had managed to evade Google's security filters, Trend Micro noted.

Jan 10 18:31

Cyber-insurance shock: Zurich refuses to foot NotPetya ransomware clean-up bill – and claims it's 'an act of war'

US snack food giant Mondelez is suing its insurance company for $100m after its claim for cleaning up a massive NotPetya ransomware infection was rejected – for being "an act of war" and therefore not covered under its policy.

Zurich American Insurance Company has refused to pay out on a Mondelez policy that explicitly stated it covered "all risks of physical loss or damage" as well as "physical loss or damage to electronic data, programs, or software, including loss or damage caused by the malicious introduction of a machine code or instruction."

Jan 10 14:07

Transgender regret videos being censured by YouTube. An active LGBTQ lobby is reporting all these videos so people will not find out!

ThereAreOnly2Genders

Transgender regret videos being censured by YouTube. An active LGBTQ lobby is reporting all these videos so people will not find out!

Jan 10 14:06

BORDER PATROL AND THE TSA ALLOWED TO SECRETLY SPY ON EVERYONE'S SOCIAL MEDIA ACCOUNTS

The U.S. Border Patrol (CBP) and the TSA claim they need to secretly spy on everyone's social media accounts so they can understand a person's relationship with their friends, family and the government.

According to a DHS report published last month, nothing can stop the Border Patrol or the TSA from secretly spying on everyone's social media accounts.

"In order to conduct a complete investigation, it is necessary for DHS/CBP to collect and review large amounts of data in order to identify and understand relationships between individuals, entities, threats and events, and to monitor patterns of activity over extended periods of time that may be indicative of criminal, terrorist, or other threat."

Understanding a person's relationship with "entities" is just a euphemism for the government. The Feds want to know if you are anti-government an activist or a protester.

Webmaster's Commentary: 

I guess this government must love the fact that I am a Christian pacifist activist, who never promotes violence, then!

You're Welcome, DHS, TSA, and Border Patrol!!

Jan 10 12:15

Chinese Money Flees Silicon Valley As Trump Clamps Down On Access To US Tech

Thanks to new policies from the Trump administration aimed at cracking down at Beijing's access to strategic US technologies, China has all but halted investments in US-based tech startups, according to Reuters.

Venture funding out of China peaked last year at a record $3 billion according to the Rhodium Group, a New York economic research firm. The spike in capital is thought to have been spurred by investors and tech companies rushing to complete deals before the new regulatory measures were approved in August.

Jan 10 11:04

'I Helped Google Screw Over James Damore'

Former Google engineer James Damore on Tuesday shared a post from an anonymous Redditor claiming to be a "Google insider" who laid out in detail how the company allegedly scrambled to take him down after learning about his diversity manifesto.

The story seems a bit too good to be true, but Damore said it seemed credible because the post contained "knowledge that only a Googler would know" -- including his never-before-revealed involvement in Google's censored Chinese search engine dubbed "Dragonfly."

Jan 10 10:36

Microsoft's killer Windows 7 patch: Breaks networking, flags legit PCs as 'Not genuine'

Thankfully for Microsoft, hardworking admins continue to spot bugs that it didn't detect during pre-release testing.

This time they've found that its January security updates are bricking Windows 7 devices with an errant 'Not Genuine' Windows license error, and a bug that blocks administrator access to remote shares on Windows Server 2008 R2 and Windows 7.

The issues stem from the Monthly Rollup update, KB4480970, and the security-only update, KB4480960, for Windows 7 SP1 and Windows Server 2008 R2 SP1.

Günter Born's Borncity was first to report the Windows 7 Genuine brick and the separate network share issues bundled in these updates.

As Born notes, monthly rollup KB4480970 addresses a serious PowerShell flaw and adds extra mitigations for Meltdown and Spectre side-channel attacks.

Jan 10 09:48

15 QUOTES BY SILK ROAD’S DREAD PIRATE ROBERTS THAT SHOW WHY IDEAS ARE SO DANGEROUS TO THE STATE

The internet’s first successful global black market was Silk Road, a website founded by ‘Dread Pirate Roberts,’ the web pseudonym of Ross Ulbricht.

Currently 34 years-old, Ross is serving a double life sentence plus 40 years in federal prison as a political prisoner of the United States. At its root, his crime is that he created a place where people around the world could engage in trade with each other without the oversight of the state. It was an experiment in true privacy and voluntary association that worked so well the state shut it down and inhumanely punished Ross for thinking outside of the statist matrix.

Jan 10 09:45

15 Quotes by Silk Road’s Dread Pirate Roberts that Show Why Ideas are So Dangerous to the State

Currently 34 years-old, Ross is serving a double life sentence plus 40 years in federal prison as a political prisoner of the United States. At its root, his crime is that he created a place where people around the world could engage in trade with each other without the oversight of the state.

Jan 09 17:45

“Internet of Roads” — Colorado Goes All-in With Increased Radiation and Surveillance

By Kevin Samson

Evidently, a test run for smart pavement in Colorado that I reported on back in May 2018 was successful enough to give it the all systems go.

"A plan to turn a portion of Interstate 70 into a roadway where cars communicate with street lights, signs and other internet-connected things just tripled to more than 500 miles.

Colorado’s “internet of roads” project will now extend to highways that reach from Pueblo to Wyoming, and Sterling to Utah, after the state Department of Transportation was awarded a $20 million federal grant earlier this month."...

Jan 09 16:38

Give Up the Ghost: A Backdoor by Another Name

Government Communications Headquarters (GCHQ,) the UK’s counterpart to the National Security Agency (NSA), has fired the latest shot in the crypto wars. In a post to Lawfare titled Principles for a More Informed Exceptional Access Debate, two of Britain’s top spooks introduced what they’re framing as a kinder, gentler approach to compromising the encryption that keeps us safe online. This new proposal from GCHQ—which we’ve heard rumors of for nearly a year—eschews one discredited method for breaking encryption (key escrow) and instead adopts a novel approach referred to as the “ghost.”

But let’s be clear: regardless of what they’re calling it, GCHQ’s “ghost” is still a mandated encryption backdoor with all the security and privacy risks that come with it.

Jan 09 16:23

Hot new trading site leaked oodles of user data, including login tokens

The past few days have showered plenty of favorable attention on a new trading platform called DX.Exchange, with glowing profiles by Bloomberg News and CNBC. The only problem is that the site, which allows people to trade currencies and digitized versions of Apple, Tesla, and other stocks, has been leaking oodles of account login credentials and personal user information.

Jan 09 16:22

Some Android apps are secretly sharing your data with Facebook

Android apps have been secretly sharing usage data with Facebook, even when users are logged out of the social network – or don’t have an account at all.

Advocacy group Privacy International announced the findings in a presentation at the 35th Chaos Computer Congress late last month. The organization tested 34 apps and documented the results, as part of a downloadable report.

The investigators found that 61% of the apps tested automatically tell Facebook that a user has opened them. This accompanies other basic event data such as an app being closed, along with information about their device and suspected location based on language and time settings. Apps have been doing this even when users don’t have a Facebook account, the report said.

Jan 09 16:14

How a Russian firm helped catch alleged data thief

The US has accused Kaspersky Lab of working with Russian spies. But sources say the company exposed a massive breach that US authorities missed.

Jan 09 16:12

Facebook is the new crapware

Crapware is named crapware for a reason. Having paid to own hardware, why should people be forever saddled with unwanted software, stub or otherwise?

And while Facebook is not the only such permanent app around (Apple got a lot of historical blowback for its own undeleteable apps, for instance, finally adding the ability to delete some built-in apps with iOS 12), it’s an especially egregious example given the company’s long and storied privacy-hostile history.

Consumers who do not want their digital activity and location surveilled by the people-profiling giant will likely crave the peace of mind of not having any form of Facebook app, stub or otherwise, taking up space on their device.

But an unknown number of Android users are now finding out they don’t have that option.

Not cool, Facebook, not cool.

Jan 09 16:06

Apple has slashed production of iPhones by 10%, it is claimed, as Tim Cook calls reports of poor sales of its latest XR handset 'bologna'

Apple, which slashed its quarterly sales forecast last week, has reduced planned production for its three new iPhone models by about 10 percent for the January-March quarter, the Nikkei Asian Review reported on Wednesday.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA