May 27 13:20

Scam alert: Indiana police warn of fake unemployment texts

INDIANA —Don't be fooled.

Indiana State Police put out a warning this week about a text going around that appears to be a scam.

They said there is a text phishing scam going around in reference to unemployment insurance fraud claims.

It asks the person who receives it to complete verification by clicking on a link.

"The Indiana Department of Workforce Development does not communicate via text messages, please be aware and do not click on links such as these," ISP said.

May 27 11:36

Canada Launches Digital Identity Strategy

(The Paypers) – Canada has launched a new strategy for its digital operations, which focuses on the need for trusted digital identities built in open standards for public and private sector interoperability.

The strategy also pays attention to upgraded authentication methods for citizens and government workers alike. The ‘Digital Operations Strategic Plan: 2021-2024’ outlines the context, strategy, and priorities of the government, emphasizing the importance of trusted digital identity to the country’s future delivery of government services...

May 27 10:15

UK Plans Single Digital Identity to Access all Services in an Expanding Government Website

(Biometric Update) – will continue to subsume other public-facing government sites as it creates user accounts and a digital identity solution that will allow a single sign-on for all services, from annual vehicle checks to child adoption.

A blog post by the CEO of the British Cabinet office division Government Digital Service (GDS) details a refreshed set of priorities for 2021 to 2024.

According to the post, in the decade since the GDS was formed and the government portal launched, the focus has been on bringing a plethora of government sites together (more than 2,000 so far), which had been developed separately by departments to suit their needs at the time...

May 26 17:59

European Court on Human Rights Bought Spy Agencies’ Spin on Mass Surveillance

By Katitza Rodriguez and Cindy Cohn

The Strasbourg highest human rights court this week affirmed what we’ve long known, that the United Kingdom’s mass surveillance regime, which involved the indiscriminate and suspicionless interception of people’s communications, violated basic human rights to privacy and free expression. We applaud the European Court of Human Rights (ECHR) Grand Chamber, the court’s highest judicial body of the Council of Europe, for the ruling and for its strong stance demanding new safeguards to prevent privacy abuses beyond those required by the lower court in 2018.

Yet, the landmark decision, while powerful in declaring UK mass interception powers unlawful and failing to protect journalists and employ safeguards to ensure British spy agency GCHQ wasn’t abusing its power, imprudently bought into spy agency propaganda that suspicionless interception powers must be granted to ensure national security...

May 26 07:05

Could $52 Billion In Emergency Funding End The Automotive Chip Shortage?

The auto industry may have caught a break with a new bipartisan bill that has been assembled by Senate Majority Leader Chuck Schumer, D-N.Y., that calls for $52 billion in emergency funding for semiconductor chips.

The chip shortage has put a snag in the auto industry’s ramp up after being paused for several months due to the impact of the pandemic. As the COVID crisis ceased its nonessential production, chips were diverted to tech devices as consumers stayed home and needed computer equipment to support their remote work habits.

Now that automakers are back online, chip demand is in full swing, but suppliers are unable to meet the needs of the industry, forcing Ford, GM, Honda, Toyota, and others to temporarily shut down plants, delay deliveries, and cut production.

And in some instances, vehicles are being produced without the chips, decreasing their overall gas mileage.

May 24 14:10

“AI” is Being Used to Profile People From Their Head Vibrations – But Is There Enough Evidence To Support It?

By James Wright, Alan Turing Institute

Digital video surveillance systems can’t just identify who someone is. They can also work out how someone is feeling and what kind of personality they have. They can even tell how they might behave in the future. And the key to unlocking this information about a person is the movement of their head.

That is the claim made by the company behind the VibraImage artificial intelligence (AI) system. (The term “AI” is used here in a broad sense to refer to digital systems that use algorithms and tools such as automated biometrics and computer vision). You may never have heard of it, but digital tools based on VibraImage are being used across a broad range of applications in Russia, China, Japan and South Korea.

But as I show in my recent research, published in Science, Technology and Society, there is very little reliable, empirical evidence that VibraImage and systems like it are actually effective at what they claim to do...

May 24 09:39

Report: Tech Companies Are Fighting to Kill "Right to Repair" Bills in the US

Tech companies talk a good game when it comes to sustainability, but as far as "Right to Repair" laws are concerned, they're not big fans. That's according to report from Bloomberg which claims that, despite dozens of states considering proposals intended to make it simpler to fix devices, tech companies are working overtime to stop them in their tracks.

The report notes that, in 2021 alone, 27 out of 50 states have considered Right to Repair bills. However, of these, more than 50% have already been "voted down or dismissed." That's bad news because no Right to Repair laws makes it harder to, fix devices which results in them being abandoned sooner.

Contributing to Electronic Waste Problem
This then contributes to the growing e-waste problem. If people held onto their smartphones for just one extra year this would reportedly be equivalent to taking 636,000 cars off the road in terms of the environmental damage it causes (or, in this case, wouldn't cause.)

May 24 08:47

You and your child can build a computer together with the Kano PC on sale for $150

The buildable computer comes with a 1.10GHz processor, 4GB RAM, and 64GB storage. It has an 11.6-inch touchscreen display so it can be used as a tablet or PC. It comes with Windows 10 and runs all Windows 10 programs. Has USB-C and a 10-hour battery.

May 24 08:24

Wearable “Solutions” and the Internet of Incarceration

By Jeremy Lofredo

In recent years, calls for radical prison reform and a solution to the U.S.’ opioid crisis have come to permeate national politics in the United States. With over two million people behind bars and more than 400,000 people dead from opioid misuse in the last two decades, these topics are often on the front page of major newspapers in the U.S. and abroad.

However, at the same time, the marketing of wearable technology, or wearables, as a solution to both of these hot-button issues has become promoted by key players in both the public and private sectors. Especially since COVID-19, these electronic devices that can be worn as accessories, embedded in clothes or even implanted under the skin, are frequently heralded by corporations, academics and influential think tanks as “cost effective”, technological solutions to these deeply rooted problems.

May 24 07:43

This AI makes Robert De Niro perform lines in flawless German

New deepfake technology allows Robert De Niro to deliver his famous line from Taxi Driverin flawless German—with realistic lip movements and facial expressions. The AI software manipulates an actor's lips and facial expressions to make them convincingly match the speech of someone speaking the same lines in a different language. The artificial intelligence-based tech could reshape the movie industry, in both alluring and troubling ways.

May 24 07:14

The way we teach coding is all wrong. Here's how it needs to change

These days, it seems everybody wants to be a coder. Lured by the prospects of big salaries, plentiful work and the chance to work for some of the world's most successful firms, more and more people are seeking out new opportunities in the ever-evolving field of software development.

The growing popularity of coding, which saw something of a spike in 2020 when the pandemic highlighted the demand for software skills, has led to a boom in the number of coding schools and online bootcamps.

According to Career Karma's 2020 Coding Bootcamp Market Report, 33,959 students attended one of 105 bootcamps in 2019. These schools are designed to deliver intensive courses over the period of a few months and leave students with a working, and ideally hireable, knowledge of software development when they come out the other side.

May 24 06:22

Oxford secretly used cell phone data to track millions as part of government-ordered vaccination study – media

The UK government has admitted it used phone data to analyse people’s movement patterns without their knowledge as part of a vaccination study, a new report claims. Officials are said to have preserved the subjects’ anonymity.

The Telegraph cited a report by the Independent Scientific Pandemic Insights Group on Behaviours (SPI-B) which said researchers from the University of Oxford discretely used data from mobile phones as part of their study into how vaccination affects people’s lifestyles.

SPI-B advises the Scientific Advisory Group for Emergencies (SAGE), which in turn advises the government. The University of Oxford, which developed the Covid-19 vaccine along with the British-Swedish pharmaceutical firm AstraZeneca, conducted the study on SPI-B’s behalf.

May 23 17:38

Microsoft Warns of Data Stealing Malware That Pretends to Be Ransomware

Microsoft on Thursday warned of a "massive email campaign" that's pushing a Java-based STRRAT malware to steal confidential data from infected systems while disguising itself as a ransomware infection.

"This RAT is infamous for its ransomware-like behavior of appending the file name extension .crimson to files without actually encrypting them," the Microsoft Security Intelligence team said in a series of tweets.

The new wave of attacks, which the company spotted last week, commences with spam emails sent from compromised email accounts with "Outgoing Payments" in the subject line, luring the recipients into opening malicious PDF documents that claim to be remittances, but in reality, connect to a rogue domain to download the STRRAT malware.

May 23 17:36

Google Chrome fix released for worldwide crashes on Windows 10, Linux

Google has released a minor Google Chrome update that fixes the worldwide browser crashes occurring since Thursday on Windows 10 and Linux.

May 23 10:22

The Conscious Resistance Network Presents: The Pyramid of Power Ep. 3 – Big Tech

By Derrick Broze

The Pyramid of Power is a brand-new 16-part documentary series aimed at exposing the individuals and institutions which seek to manipulate our world.

By now, most viewers will be familiar with the well-publicized problems of social media. It’s purposefully addictive, produces jealousy, insecurity, and depression (and this) in some people, and the big socials sell your data for a profit. Despite the growing awareness of these problems, companies like Facebook, Twitter, Instagram, and YouTube are still some of the most widely used platforms in the world. Billions of people download these apps and use them to stay informed about the world. (Or, so they believe.)

May 22 18:44

AT&T Creates Private 5G/Internet of Things (IoT) Network for Cancer Patients Despite 5G/IoT Health and Security Risks

By B.N. Frank

5G opposition is worldwide due to economic, environmental, health, and safety risks. The majority of scientists worldwide oppose deployment. Cities AND entire countries have taken action to ban, delay, halt, and limit installation AS WELL AS issue moratoriums.

Since 2018 there have been reports of people and animals experiencing symptoms and illnesses after it was installed. Consumer reports have also indicated that 5G has significant service problems.

In regard to Internet of Things (IoT) applications, privacy and security experts have been warning about its risks for many years as well –recently in healthcare settings. Nevertheless, AT&T wouldn’t have created a private 5G/IoT network for cancer patients if medical facilities weren’t interested in using them...

May 22 11:28

Data of 100+ million Android users exposed via misconfigured cloud services

Security researchers discovered that personal data of more than 100 million Android users has been exposed due to various misconfigurations of cloud services.

The data was found in unprotected real-time databases used by 23 apps with download counts ranging from 10,000 to 10 million and also includes internal developer resources.

While misconfigured real-time databases are not a surprise, the discovery shows that some Android developers do not follow basic security practices to restrict access to the app’s database.

The amount of mobile apps with misconfiguration issues shows that this is a widespread problem that can be easily leveraged for malicious purposes.

May 22 11:13

Promoting Covid jabs on dating apps is both preposterous and proof that govt & Big Tech are a match made in hell

Forget the accidental ‘super likes’, STDs & casual ghostings – online dating is set to get even worse, thanks to government meddling and virtue-signalling tech bosses. Clearly, there’s never been a better time to be single.

People on dating apps are looking for one of two things: romance or sex. Occasionally, they want both – ideally, from the same individual. Sometimes, they even want marriage and kids. But there’s one thing they never, ever want, and that’s a Covid-19 vaccine.

Nor do they want intervention from Big Tech and a meddling government, but that looks unavoidable for today’s modern singletons. President Joe Biden’s administration has already started pushing inoculations via the US industry’s most popular platforms Tinder, Hinge, OkCupid and Bumble.

And now the UK government is reportedly set to follow suit.

May 22 11:09

YouTube video creators lash out at corporate greed after platform forces ads on small channels, whether they like it or not

An update to YouTube’s content monetization rules has left some small creators dismayed. People watching their videos will be served ads, and the Big Tech company will take all the revenue for itself.

The Google-owned video-sharing platform is giving itself some additional space to profit from the content it hosts. Once the updated rules come into force in June, YouTube will start putting ads on channels that have too few subscribers and views to qualify for its Partner Program, a mechanism that allows owners of bigger channels to monetize popularity by splitting ad revenue with the platform.

The terms have been in place for US-based users since November 2020, but will soon be in force globally. The expansion of the rules also applies US taxation to foreign YouTubers, a move that the service announced earlier this month.

May 21 18:44

U.S. Congresswomen Introduce “Smart Cities and Communities Act” Despite Opposition and Warnings in re “Smart Cities”

By B.N. Frank

Worldwide opposition to “Smart Cities” continues to increase due to concerns about significant cybersecurity, economic, privacy, safety, health and environmental risks. In 2020, Toronto cancelled its “Smart City” plans due to public outcry.

A 2018 survey revealed that 66% of Americans did NOT want to live in a “Smart City”. Nevertheless, two congresswomen have introduced new legislation to promote and provide funding for creating more of them...

May 21 12:57

Why Australia was RIGHT to block Huawei from running the 5G network - as top spy reveals China could have SHUT DOWN the nation's entire mobile phone system

  • In 2018 Australia banned Huawei from supplying equipment for 5G network
  • There was concern its involvement would allow China to spy or hack network
  • A top spy has revealed that China could also have shut down the entire system

China could have shut down Australia's 5G network and brought the nation to its knees if Huawei was not banned, a top spy has revealed.

The Chinese telecommunications company was forbidden from supplying equipment for the network in 2018 over security concerns, a move that enraged Beijing and was copied by several Western governments

Australian spies spent eight months working out how to safely involve Huawei but concluded the risk of China spying or hacking the network could not be fully mitigated
Beijing could even have shut down the whole system, an anonymous spy has told journalist Peter Hartcher for his new book Red Zone.

May 21 11:35

Amazon, Uber And America’s Biggest Delivery Companies All Fell For Basic ‘Fake Driver’ Scam

When Frankie DiGiacco, a former prosecutor for the southern California branch of the Justice Department, saw the scam, he couldn’t believe it had worked. It was so simple, he says, he was surprised that ride-share and delivery companies hadn’t spotted it.

May 21 09:45

Apple's rivals may never be able to catch up to its powerful new chip

Early in the testing phase of Apple's M1 chipset, a milestone new product for the company, the processor was installed in a batch of Mac computers and given to staffers working on applications that demanded heavy processing power. It was a pivotal moment: the first time Apple had made its own chip for any of its computers, shifting away from years of using a one-size-fits-all option from Intel.

After multiple teams tested the devices for a few hours while working on tasks, they reported lightning-fast performance but nearly all flagged an apparent problem. The MacBook Pro's battery indicator, featured on the upper right hand corner of the computers, was broken. It had barely moved despite running power-hungry programs, the company told CNN Business.

May 21 09:26

If you haven’t installed Apple’s latest iPhone update yet, read this first

Apple’s latest update to its mobile operating software has proven to be one of the most consequential and news-making software releases in recent memory from the iPhone maker, with iOS 14.5 accomplishing everything from introducing a strict new privacy regime that users can enjoy to this software release firing a shot across the bow against Facebook — and, specifically, against its business model that involves tracking users around the web.

May 21 09:26

Beware: This dangerous malware steals your bank account info and lets hackers rob you

Internet banking is one of the key activities that hackers target on computers and smartphones. Security has increased dramatically in the past few years to minimize the risks for consumers, but the users themselves are still the weakest link in the system. Inadvertently installing a malware app is enough for hackers to attempt attacks on your digital belongings, whether it’s personal data or cash.

Bizarro is the name of a banking trojan that has been wreaking havoc in Brazil, and the hackers behind the project are widening their scope by targeting other regions. The sophisticated trojan has been discovered in Europe and parts of South America. Its purpose is very simple, to steal money from unsuspecting victims, whether it’s digital coins like bitcoin or more traditional currency from their bank accounts.

May 21 09:26

Snap debuts true AR glasses that show the potential (and limitations) of AR

Snap Inc., the company best known for the popular Snapchat social camera app, has announced its first pair of augmented reality glasses that most people would agree actually qualify as real AR glasses. Like previous glasses the company has produced, they are called Spectacles.

Spectacles will not be available to buy as a mass-market consumer product—at least not in the immediately foreseeable future. Instead, Snap is seeding units to developers and content creators so the glasses can be used to create new experiences and filters. These creators will build these with Lens Studio, a Snapchat-specific tool that is already widely in use.
Spectacles enable new ways to view and create Snapchat Lenses, which are generally simple augmented reality filters that Snapchat users apply to the videos they send each other.

May 21 09:24

Frontier knowingly sold Internet speeds it can’t deliver, FTC lawsuit says

The Federal Trade Commission and officials from six states yesterday sued Frontier Communications, alleging that the telecom provider misrepresented Internet speeds and charged many customers for higher speeds than it actually provided or was capable of providing.

The complaint was filed in US District Court for the Central District of California by the FTC and attorneys general from Arizona, Indiana, Michigan, North Carolina, and Wisconsin. California-based customers are represented in the suit by the district attorneys of Los Angeles County and Riverside County.

May 21 09:21

Vulnerabilities in billions of Wi-Fi devices let hackers bypass firewalls

One of the things that makes Wi-Fi work is its ability to break big chunks of data into smaller chunks, and vice versa, depending on the needs of the network at a given moment. These mundane network plumbing features, it turns out, have been harboring vulnerabilities that can be exploited to send users to malicious websites or exploit or tamper with network-connected devices, newly published research shows.

In all, researcher Mathy Vanhoef found a dozen vulnerabilities, either in the Wi-Fi specification or in the way the specification has been implemented in huge numbers of devices. Vanhoef has dubbed the vulnerabilities FragAttacks, short for fragmentation and aggregation attacks, because they all involve frame fragmentation or frame aggregation. Broadly speaking, they allow people within radio range to inject frames of their choice into networks protected by WPA-based encryption.

May 21 09:17

Dumping Google Chrome resulted in one colossal benefit

After a year of lockdown, I'm back on the road. Me, my laptops, my other gadgets, and my off-grid kit for keeping everything charged up.

But the faster my gadgets run down their power, the more I have to charge them, and the more I have to charge them, the more pressure I'm putting on my portable power station.

Over the past months, I've been dabbling with dumping Google Chrome. What started out as a lightweight alternative to the sluggish incumbents has, itself, become the sluggish incumbent.

It's become a bloated battery and memory hog.

Not what I want on the road.

May 21 07:49

Facebook blames a 'technical issue' for failing to stop potentially MILLIONS of child abuse images and videos from appearing on its website over the past six months

From January to March 2021, Facebook removed five million pieces of child abuse content – down from 5.4 million from October to December 2020.

But both these quarters marked a massive slump in removals from the previous quarter – 12.4 million between July and September 2020.

May 21 07:46

RIP Internet Explorer: Microsoft announces it is retiring its web browser in 2022 - almost 26 YEARS after it first launched

Microsoft is putting the final nail in the coffin of Internet Explorer, revealing that the legacy web browser will retire for good in summer next year.

The tech giant has gradually shifted away from the aging software after some 25 years on the scene, starting afresh with the new Edge browser in 2015 to coincide with the launch of Windows 10.

Support for the final version, Internet Explorer 11, has been maintained, even though most people have already moved elsewhere.

By ending support, this means important security updates and bug fixes will no longer be rolled out.

The web browser will be officially retired on June 15 2022, Microsoft said.

May 21 06:14

Healthcare organizations in Ireland, New Zealand and Canada facing intrusions and ransomware attacks

Three healthcare institutions in Canada, Ireland and New Zealand are in the midst of security incidents this week, highlighting the perilous cybersecurity landscape within some of the world's most important organizations.

Ireland's Department of Health was attacked twice in the last week, eventually shutting down their entire IT system after a ransomware attack last Thursday. The same group also hit the Health Service Executive with a ransomware attack. Chief Operations Officer of the Health Service Executive Anne O'Connor told The Journal that the office had been hit by the Conti ransomware.

May 21 05:54

As developers consider quitting, here comes the next big skills crisis

New research suggests that more than half of the UK workforce lack essential digital skills needed for work, raising fears that the country is heading toward a digital skills shortage as employers begin ramping up their post-pandemic recruitment efforts.

Data from the Office for National Statistics this week showed "early signs of recovery" in the UK jobs market as lockdown restrictions eased and businesses resumed hiring.

Ten Windows 10 network commands everyone one should know
According to the figures, the UK unemployment rate fell 4.8% between January and March 2021 – the largest quarterly decrease since 2015.

May 20 20:23

The biggest threat to Android’s dominance might launch soon

Google just unveiled Android 12, a massive software update that features a significant design makeover and notable privacy improvements. Android 12 is already available in beta form on Pixel phones and several other devices, and the update will roll out to the general public at some point in late summer. But before that happens, the biggest threat to Android should be finally available to uses, and it’s not iOS 15, which will be revealed in a few weeks at WWDC 2021.

A few years ago, The US government banned Huawei from working with US companies or companies that deal in tech made in the US. This effectively stopped Huawei from using Google’s Android version on its phones and tablets and forced it to fork Android into an operating system devoid of all the Google magic.

May 20 19:47

Shape-shifting computer chip thwarts an army of hackers

have developed and tested a secure new computer processor that thwarts hackers by randomly changing its underlying structure, thus making it virtually impossible to hack.

Last summer, 525 security researchers spent three months trying to hack our Morpheus processor as well as others. All attempts against Morpheus failed. This study was part of a program sponsored by the U.S. Defense Advanced Research Program Agency to design a secure processor that could protect vulnerable software. DARPA released the results on the program to the public for the first time in January 2021.

A processor is the piece of computer hardware that runs software programs. Since a processor underlies all software systems, a secure processor has the potential to protect any software running on it from attack. Our team at the University of Michigan first developed Morpheus, a secure processor that thwarts attacks by turning the computer into a puzzle, in 2019.

May 20 13:40

Dominion Responds After Pennsylvania Election Officials Report "Coding Error" With Voting Machines

Authored by Jack Phillips via The Epoch Times (emphasis ours),

Election officials in Luzerne County, Pennsylvania, reported issues with voting equipment at polling places on Tuesday, prompting a response from Dominion Voting Systems saying that there was a ballot screen error regarding the viewing screen’s header.

Dominion Voting Systems told The Epoch Times that “Luzerne County’s election director has confirmed that there is a ballot screen error that is confined to the header on the viewing screen of the machine, and that all ballots are printing correctly with the Republican header and the Republican primary election races.”

The firm then noted that Luzerne County officials have assured the public that “all ballots will be correctly counted,” adding: “We regret any confusion this has caused.”

Webmaster's Commentary: 

Sorry, Dominion, but the optics on this look pretty damned vile; your credibility has been well and truly flushed; and it appears obvious to any thinking human being, what is being allowed to happen here and why.

May 20 08:45

Maricopa County System Has Capability For Verizon Wireless Cards;Forensic Team Needs Password Access

May 20 07:16

Ransomware attackers are now using triple extortion tactics

Attackers are not only demanding ransom from organizations, but also threatening their customers, users and other third parties.

Cybercriminals who specialize in ransomware have already been using double extortion tactics in which they not only decrypt stolen data but also threaten to leak it publicly unless the ransom is paid. Now, some attackers have progressed to a triple extortion tactic with the intent of squeezing out even more money from their malicious activities. In a report published Wednesday, cyber threat intelligence provider Check Point Research describes how this latest tactic is playing out.

May 20 06:14

Why Trailing Edge Semiconductor Manufacturing Matters

In the last few months, much has been said about the shortage of chips developed on leading edge manufacturing nodes of 7nm, 5nm, etc. While there are some shortages in chips using these advanced manufacturing processes, it turns out the semiconductor industry’s other issue is at the trailing edge. The leading edge gets all the attention because it is the most exciting.

The leading edge powers the supercomputers in the cloud, advanced servers, desktops, and laptops, and even the computers in our pockets. But many computing devices are not just made up of leading edge microprocessors. The vast majority of other components are made up using legacy nodes. Quite often many mainstream processors, especially those created for the autos, medical monitoring equipment, and a multitude of other products are created using much larger nodes in what is called the trailing edge.

May 20 02:54


A Jeep Cherokee factory is cutting 1,600 jobs in Northern Illinois as the auto industry continues to struggle with the global shortage of semiconductors.

The U.S. arm of Stellantis announced this week is was going to cut one of its two work shifts at the Belvidere Assembly Plant as of July 26. 1,641 workers could be affected, a local NBC affiliate reported over the weekend.

Company spokeswoman Jodi Tinson claimed that the company was trying to “balance sales with production,” and that the factory’s situation “has been further exacerbated by the unprecedented global microchip shortage.”

This stands at odds with comments made by the company’s CFO earlier this month, when we reported that Chief Financial Officer Richard Palmer said the semi shortage impact would be higher in Q2, but also said it "is still very controlled".

The plant has been idled since late March, the report notes. Its re-opening has been delayed and isn’t expected until "at least" later this month.

May 19 18:24

Community Control of Police Spy Tech

By Nathan Sheard and Adam Schwartz

All too often, police and other government agencies unleash invasive surveillance technologies on the streets of our communities, based on the unilateral and secret decisions of agency executives, after hearing from no one except corporate sales agents. This spy tech causes false arrests, disparately burdens BIPOC and immigrants, invades our privacy, and deters our free speech.

May 19 17:55

Internet Service Providers Forcing Low-Income Subsidy Applicants to Switch to Costlier Plans; Is Yours One of Them?

By B.N. Frank

The Federal Communications Commission (FCC) has been given $3.2 billion to distribute among low-income Americans for broadband assistance.

Now it appears that Internet Service Providers (ISPs) are making it tougher for qualified applicants to actually save money...

May 19 05:29

Facial recognition, fake identities and digital surveillance tools: Inside the post office's covert internet operations program

The post office’s law enforcement arm has faced intense congressional scrutiny in recent weeks over its Internet Covert Operations Program (iCOP), which tracks social media posts of Americans and shares that information with other law enforcement agencies. Yet the program is much broader in scope than previously known and includes analysts who assume fake identities online, use sophisticated intelligence tools and employ facial recognition software, according to interviews and documents reviewed by Yahoo News.

May 18 19:52

Silicon Chip Shortage Leads To Potato Chip Shortage: Farmers Halt Equipment Shipments To Dealers

Readers have been briefed on the ongoing semiconductor shortage that may last a "couple of years." The auto industry has grabbed the spotlight as the hardest-hit industry, with some of the world's biggest manufacturers restricting production.

According to a new report, the worldwide chip shortage is impacting the agriculture industry that may last for a couple of years and has already impacted the price of potato chips.

Hoosier Ag Today reports, "The biggest factor impacting the ability of US farmers to produce the food we need has nothing to do with the weather, the markets, trade, regulations, or disease. The worldwide shortage of computer chips will impact all aspects of agriculture for the next two years and beyond... farm equipment manufacturers have halted shipments to dealers because they don't have the chips to put in the equipment... "

May 18 15:16

WATCH: Viral Video Confirms Your Phone Takes Secret Pictures Of You Every 5 Seconds

A TikTok video has gone viral for revealing a creepy, and potentially sinister, action that our phones are performing that may pose a seriously threat to our privacy.

According to the video our phones, or at least IPhones, are taking photos of us, without our knowledge or consent, every 5 seconds.

In the video, a girl uses an infrared camera to prove that their IPhone was taking the secret photos.

May 18 12:49

Breaking — Colonial Pipeline suffers ‘network outage’…

Colonial Pipeline, the nation’s biggest fuel system that has been working to restart since being hacked two weeks ago, is experiencing network issues that leave customers unable to access their fuel shipments.

The system that allows customers to reserve space on the line, make changes to their batches or receive updates on fuel traveling through the system has been inaccessible as of Tuesday morning, according to shippers, asking not to be identified because the information isn’t public. The pipeline appears to still be operating despite the communication outage, the shippers said.

In a subsequent notice to shippers, Colonial said “it is currently experiencing network issues impacting customers’ ability to enter and update nominations,” and that it is working to restore service. Shippers on the pipeline use a third party communication system known as Transport 4 to access Colonial’s network daily to ensure timely receipts and shipments of various grades of fuel.

May 18 00:53

DuckDuckGo, Firefox & GitHub say ‘no Flocing way’ to Google’s privacy updates

Google’s proposed method for tracking and targeting consumers without third-party cookies is being met with a growing chorus of dissent. Within the past month, a who’s who of tech players – including DuckDuckGo, GitHub and Mozilla Firefox – have vowed to block Google’s Floc API. Here’s what it means for marketers who are searching for answers.

DuckDuckGo has long been a staple of the paranoid and the privacy-obsessed. The search engine enables users to surpass the personalized search results filter employed by most major search engines. So the fact that DuckDuckGo added a tool to its Chrome extension designed to block Google’s latest update – which is meant to enable targeted advertising – may not come as a surprise. Brave, another privacy-centric browser, was also quick out of the gate to thwart Google’s changes last month.

May 17 13:27

Almost Every Wi-Fi Device Affected by Flaw Dating Back to 1997; “…any vulnerabilities that affect virtually all devices are important.”

By B.N. Frank

There have been countless horrifying news stories about hackers breaking into baby monitors, security cameras, and systems, “Smart” home assistants, smartphones, and more.

Privacy and security experts continue to warn about vulnerabilities with ALL wireless-connected devices and technologyincluding 5G and Internet of Things (IoT).

Safer and more secure internet access can be achieved with a hard-wired internet connection. Those who choose to use Wi-Fi anyway are putting their privacy, safety, and health at risk as well as their families’. A university researcher recently made public a flaw that’s existed since 1997...

May 17 11:31

Cloudflare says it’s time to end CAPTCHA ‘madness’, launches new security key-based replacement

loudflare, which you may know as a provider of DNS services or the company telling you why the website you clicked on won’t load, wants to replace the “madness” of CAPTCHAs across the web with an entirely new system.

CAPTCHAs are those tests you have to take, often when trying to log into a service, that ask you to click images of things like busses or crosswalks or bicycles to prove that you’re a human. (CAPTCHA, if you didn’t know, stands for “Completely Automated Public Turing test to tell Computers and Humans Apart.”) The problem is, they add a lot of friction to using the web and can sometimes be difficult to solve — I’m sure I’m not the only person who has frustratingly failed a CAPTCHA because I didn’t see that corner of a crosswalk in one image.


May 17 11:30

The bizarre story of the inventor of ransomware

Eddy Willems was working for an insurance company in Belgium back in December 1989 when he popped the floppy disc into his computer.

The disc was one of 20,000 sent in the mail to attendees of the World Health Organization's AIDS conference in Stockholm, and Willems' boss had asked him to check what was on it.

Willems was expecting to see medical research when the disc's contents loaded. Instead he became a victim of the first act of ransomware — more than 30 years before the ransomware attack on the US Colonial Pipeline ignited a gas shortage in parts of the US last week.

A few days after inserting the disc, Willems' computer locked and a message appeared demanding that he send $189 in an envelope to a PO Box in Panama. "I didn't pay the ransom or lose any data because I figured out how to reverse the situation," he told CNN Business.

He was one of the lucky ones: Some people lost their life's work.

May 17 10:58

Gas Shortages and Simulations

By Matt

It makes perfect sense that those in both the public and private sectors spend time training for a crisis; it is better to be prepared than unprepared. But what happens when the ones doing the preparing also have the most to gain from the disaster?...

May 16 12:21

Chicago Cops Use Asset Forfeiture Funds to Buy Drones “Off the Books”

By Mike Maharrey

Asset forfeiture funds help build the ever-growing national surveillance state.

Civil asset forfeiture is a pernicious policy in its own right. It is nothing more than legalized, institutionalized, government-sanctioned theft. Forfeiture laws flip due process on its head and create perverse “policing for profit” incentives.

On top of that, we have long suspected that police departments use forfeiture money to secretly purchase surveillance technology. Recent Chicago Police Department emails obtained from a trove of hacked documents prove this happens, revealing that cops used asset forfeiture money to buy drones off the books with no oversight or accountability...

May 16 10:14

Apple's tiny new gadget turns nightmare, -hacker breaks reveals it can be used to Spy on us

Keep losing your keys? There’s an Apple device for that: the new AirTags, which can be attached to things you frequently lose so you can find them easily.

“AirTag is a supereasy way to keep track of your stuff,” Apple’s website reads.

“Attach one to your keys, slip another in your backpack. And just like that, they’re on your radar in the Find My app, where you can also track down your Apple devices and keep up with friends and family.”

According to Apple’s website, the $30 tag “sends out a secure Bluetooth signal that can be detected by nearby devices in the Find My network. These devices send the location of your AirTag to iCloud — then you can go to the Find My app and see it on a map. The whole process is anonymous and encrypted to protect your privacy. And it?s efficient, so there?s no need to worry about battery life or data usage.”

Unfortunately, that’s not quite the only thing the AirTag can do, as Vice’s Motherboard noted in a Thursday story.

May 16 10:00

"I Upended My Life For Apple": Newly-Hired Engineer Livid After Woke Witch-Hunt Gets Him Fired

A former Facebook project manager, author, and journalist who uprooted his life in Washington to take a job with Apple is livid, after a woke mob of employees circulated a petition demanding his ouster over controversial statements from a book he wrote five years ago.

The petition took aim at Cuban-American Antonio García Martínez over his book, Chaos Monkeys (dedicated to "all my enemies") - an autobiography which traces his journey from Wall Street to Silicon Valley. Martínez has described the book as "total Hunter S. Thompson/Gonzo mode."

According to woke Apple employees, it's both racist and sexist. And of course, when it comes to Silicon Valley, divergent opinions need not apply. Except, he did apply, and was hired - despite Apple being "well aware" of his writing, according to a pissed-off Martinez.

May 16 06:14

Factbox: DarkSide hackers in focus after Toshiba attack

A unit of Japan's Toshiba Corp (6502.T) said on Friday it had been hacked in Europe by the DarkSide ransomware group widely believed to have been behind a crippling fuel pipeline attack in the United States this week. read more


Experts who have tracked DarkSide said it emerged in the middle of last year and appears to be composed of veteran cybercriminals who are focused on squeezing as much money as they can from targets.

"They're very new but they're very organized," Lior Div, the chief executive of Boston-based security firm Cybereason, said this week when asked about the Colonial Pipeline attack.

"It looks like someone who's been there, done that."

May 16 06:11

Hacker attack shuts down IT system of Ireland’s health services, badly affecting one of Europe’s busiest maternity hospitals

Ireland’s health service has temporarily shut down all of its IT systems due to a “significant ransomware attack,” and one of Europe’s busiest maternity hospitals is badly affected as most appointments have been canceled.

The Health Service Executive (HSE) took to Twitter on Friday to announce a “significant ransomware attack” on its IT systems. The HSE says it has taken the precaution of shutting down all of its IT systems in order to protect them and to be able to fully assess the situation.

May 15 05:45

Israel is deliberately obliterating media buildings in Gaza to cover up the war crimes that will follow

The destruction of two important Gaza buildings housing 20 media outlets was both shocking and predictable. History shows that if the media aren’t around to document Israel’s war crimes, it’s a lot easier for it to commit them.
On Tuesday, Israel bombed the 10-storey Al-Jawhara Tower, causing it to collapse. Before doing so, it had ‘benevolently’ warned that the airstrikes were coming. The following day, it bombed the 14-storey Al-Shorouk Tower, also giving warning it was going to do so.

Most reports have the buildings as evacuated before being levelled. But without these media offices, reporting on Israel’s other war crimes will be left largely to what little media remain and citizen journalists.

May 15 03:46

Intel Uses Machine Learning To Make GTA’s Graphics Look Scarily Photorealistic

GTA 5’s graphics are decent and it looks good considering how old the game is, but we would never ever call it realistic-looking, but that might not be a bad thing. That being said, if you’ve ever wondered what a game like GTA could look like had it been developed with photorealistic graphics in mind, then you’re in luck.
This is because thanks to researchers at Intel Labs, they have decided to try and apply machine learning techniques to rendered footage from a console game, like GTA, and make it photorealistic. The end results can be seen in the video above, and we can tell you that it looks pretty damn real.

May 14 19:01

Victory! California City Drops Lawsuit Accusing Journalists of Violating Computer Crime Law

By Aaron Mackey

The City of Fullerton, California has abandoned a lawsuit against two bloggers and a local website. The suit dangerously sought to expand California’s computer crime law in a way that threatened investigative reporting and everyday internet use.

The city’s lawsuit against the bloggers and the website Friends For Fullerton’s Future alleged, in part, that the bloggers violated the California Comprehensive Computer Data Access and Fraud Act because they improperly accessed non-public government records on the city’s file-sharing service that it used to disclose public records. But the settlement agreement between the city and bloggers shows those allegations lacked merit and badly misrepresented the city’s online security practices. It also vindicates the bloggers, who the city targeted for doing basic journalism...

May 14 18:52

FDA Warns Cell Phones and Smart Watches Can Affect Medical Implants, Pacemakers, and Defibrillators

By B.N. Frank

There have been expert warnings about medical implants being vulnerable to cyberattacks and hacking. There have also been warnings (including by Apple) that people with pacemakers and other medical implants should NOT hold or charge Apple iPhones too close to their bodies.

The Food and Drug Administration (FDA) has now issued a warning that cell phones as well as smart watches are capable of messing with medical devices...

May 14 14:52

Hacked police data reveal Boogaloo Boy ‘target’ list on eve of Biden inauguration

A document from Washington, D.C.’s Metropolitan Police Department leaked by cybercriminals details the FBI’s concerns over two extremist groups in the wake of the Jan. 6 riot at the Capito

The Babuk ransomware gang on Thursday released a large cache of files it had stolen after attempts to extort the department for $4 million fell through.

As reported by the Daily Dot on Tuesday, alleged screenshots of the group’s negotiations with police showed the department offering $100,000 in an effort to keep Babuk from releasing their files.

In their Thursday post on the dark web, the group, which released 250GB of data in total, criticized police for refusing to agree to their terms.

One folder from the cache of documents details a Jan. 18 briefing at the FBI Command Post that centered on concerns over the Boogaloo Boys, an anti-government militia group.

May 14 12:46

Use this free tool to find all the pictures of you lurking on the web

This just in: You don’t own your face. Sure, technically, no one can copyright your face. But you can’t stop shady companies from selling your features for identification purposes.

As creepy as it sounds, companies can make millions of bucks by throwing you into their enormous facial recognition databases. Just look at Clearview AI, which can identify people based on a single selfie. Now worth $109 million, the company works with government agencies as well as businesses.

Tap or click here to find out how this app can find your address with just a photo of your face. When it comes to Clearview AI, there’s one silver lining: It’s not public, which means you don’t have to worry about every Tom, Dick or Harry stalking you throughout the internet. Unfortunately, another tool has hit the scene, and it’s 100% free.

May 14 12:22

DarkSide Ransomware Gang Quits After Servers, Bitcoin Stash Seized

The DarkSide ransomware affiliate program responsible for the six-day outage at Colonial Pipeline this week that led to fuel shortages and price spikes across the country is running for the hills. The crime gang announced it was closing up shop after its servers were seized and someone drained the cryptocurrency from an account the group uses to pay affiliates.

“Servers were seized (country not named), money of advertisers and founders was transferred to an unknown account,” reads a message from a cybercrime forum reposted to the Russian OSINT Telegram channel.

May 14 11:18

DarkSide, Hacking Group Linked to Colonial Pipeline Attack, Says It Is Closing

The criminal group linked to a cyberattack that disrupted gasoline delivery across parts of the southeastern U.S. this week has told hacking associates that it is shutting down, according to security research firms.

A website operated by ransomware group DarkSide, which U.S. officials have said is believed to originate in Eastern Europe, has been down since Thursday.

DarkSide has told associates it has lost access to the infrastructure it uses to run its operation and would be shutting down, citing pressure from law enforcement and from the U.S., according to security firms FireEye and Intel 471. DarkSide didn’t respond to requests for comment earlier in the week made through its web site before it was shut down.

May 14 10:07

Cybersecurity tycoon Kaspersky claims CIA hackers could actually be behind US Colonial Pipeline attack blamed on Russian group

A cyberattack that crippled fuel supplies on the East Coast of the US and sent gas prices soaring could have been an inside job conducted by American spooks, rather than foreign hackers, a prominent Russian IT expert has claimed.

After a massive systems failure caused the Colonial Pipeline to shut down, Natalya Kaspersky, the founder and former CEO of security software firm Kaspersky Lab, as well as one of Russia’s wealthiest women, made the explosive suggestions in an interview with RIA Novosti on Friday. She alleges that the US’ top foreign intelligence agency, the CIA, has a crack team of digital warriors who are able to masquerade as overseas hacking groups.

May 14 09:37

Hackers Used Fake GPU Overclocking Software to Push Malware

Computer hardware maker MSI is warning gamers not to visit a website that's impersonating the brand and its graphics card overclocking software, Afterburner, to push malware.

On Thursday, MSI published a press release warning of "a malicious software being disguised as the official MSI Afterburner."

"The malicious software is being unlawfully hosted on a suspicious website impersonating as MSI’s official website with the domain name https://afterburner-msi[.]space," the company wrote. "MSI has no relation with this website or the aforementioned domain."

May 14 09:36

Apple is working on crazy new iPhone tech that displays 3D images without special glasses

In light of the above, it may not come as a surprise that Apple has been exploring new display technology capable of offering up an AR-inspired experience without the need for a headset or specialized glasses.

In a recently granted patent titled Split-Screen Driving of Electronic Device Displays, which was initially spotted by AppleInsider, we learn that Apple has been looking at displays capable of showing users a 3D image without the need for any type of accessory.

It certainly sounds like magic and, in turn, even Apple concedes that pulling this type of technology without specialized lenses is fraught with technical hurdles.

“It can be difficult to provide this type of content on a multi-function device such as a smartphone or a tablet,” the patent reads in part, “without generating visible artifacts such as motion blur, luminance offsets, or other effects which can be unpleasant or even dizzying to a viewer.”

May 14 08:21

Flashback: Prepping for a cyber pandemic: Cyber Polygon 2021 to stage supply chain attack simulation

The World Economic Forum (WEF) will stage another cyber attack exercise as it continues to prep for a potential cyber pandemic that founder Klaus Schwab says will be worse than the current global crisis.

May 14 08:20

Ireland's healthcare system is paralysed, with hospital appointments cancelled as hackers carry out possibly the biggest ever cyber crime against the state and officials await ransom demand

The attack comes just one week after a fuel network in the US had to shut down its systems until a $5million ransom was reportedly paid.

The Irish attack was blamed on international criminals and was said to be targeting healthcare records, but officials said patient safety was not at risk.

'We have taken the precaution of shutting down all our IT systems in order to protect them from this attack and to allow us (to) fully assess the situation with our own security partners,' the Health Service Executive (HSE) said.

May 13 12:14

The Dystopian Future in Which Almost No One Owns a Car

Op-Ed by Zachary Yost

By this point readers are more than familiar with the previously unthinkable infringements on our traditional rights and liberties due to “health and safety” lockdowns that the state has inflicted upon us over the last year. While thankfully more and more restrictions are being lifted, it is important not to forget the period of veritable universal house arrest that was enacted in many states, in which even the freedom to go for a drive was denied to us. It unfortunately seems inevitable that we will face such scenarios again when a convenient excuse comes along, though I fear that the next time will be even worse thanks to the advent of self-driving cars...

May 13 10:02

Colonial Pipeline paid hackers nearly $5 million in ransom, sources say

Colonial Pipeline Co. paid nearly $5 million to Eastern European hackers on Friday, contradicting reports earlier this week that the company had no intention of paying an extortion fee to help restore the country’s largest fuel pipeline, according to two people familiar with the transaction.

The company paid the hefty ransom in untraceable cryptocurrency within hours after the attack, underscoring the immense pressure faced by the Georgia-based operator to get gasoline and jet fuel flowing again to major cities along the East Coast, those people said. A third person familiar with the situation said U.S. government officials are aware that Colonial made the payment.

Once they received the payment, the hackers provided the operator with a decrypting tool to restore its disabled computer network. The tool was so slow that the company continued using its own backups to help restore the system, one of the people familiar with the company’s efforts said.

May 13 06:35

Southern States Out Of Fuel-Thousands Stuck

Gas stations across the East Coast are beginning to run out of fuel as one of the biggest petroleum pipelines fights to recover from a cyberattack.

The operator of the country’s largest fuel pipeline, Colonial Pipeline, fell victim to a cybersecurity attack on Friday that involved ransomware, forcing it to temporarily shut down all pipeline operations and raising concern that the outage could lead to spot shortages of gas, diesel and jet fuel.

May 13 06:15

WOW! Same FBI that Pushed Trump-Russia Hoax for 3 YEARS then Exaggerated Russia 2020 Election Threat — NOW Blames Russia for Pipeline Hack

‘The Russians did it’ is still alive and well at the FBI and DOJ.

The corrupt and dishonest FBI began illegally spying on Candidate Trump in early 2016 and then spied on his administration.

They based it all on a lie that Trump was colluding with Vlad Putin to steal the US election.

They knew this was a lie.

This went on for years.

There was NEVER ONE SINGLE lead by the FBI telling the truth to the press that the Russia hoax was all a lie.

The corrupt and dishonest Chris Wray FBI then suggested that Russia was behind crackhead Hunter Biden’s leaked emails from his laptop that he left at a computer store in a blackout.

May 13 03:22

The highly anticipated quantum internet breakthrough is finally here. Is this the end of 5G?

We’ve all heard about 5G, the 5th generation mobile. According to wireless industry group GSMA, 5G is expected to be at least 10 times faster than the fastest 4G networks, with peak data rates of up to 10 gigabytes per second. But what about if it is possible to transmit data faster than the speed of light? Welcome to the world of a quantum internet.

About a year ago, we wrote about the US Department of Energy’s (DoE) new project aimed at laying a new foundation for quantum internet in the US after 60 years of the U.S. Defense Advanced Research Projects Agency (DARPA) in 1973. You can read about it here.

However, this quantum technology startup QphoX and Delft University spinout may probably be ahead of the DOE and the vision for quantum internet is now closer to becoming a reality. QphoX is working to commercialize a quantum modem that can link quantum machines into superfast networks. QphoX is the first company to take quantum transduction beyond university labs.

May 12 12:51

'Do whatever you want': Software to manipulate totals found on voting machines, lawyer says

A lawyer fighting an election-fraud case in Antrim County, Michigan, has revealed that the voting machines there contained a software program that could have been used to manipulate vote totals.

In fact, lawyer Matthew DePerno said in a podcast interview that with the MySQL program installed on the machines, and them all being linked, someone with access could "do whatever you want."

DePerno, just a day earlier confirmed in a court hearing that there were 1,061 "phantom votes" in the county during the 2020 presidential election, because while a recount of ballots tallied 15,962, the Michigan secretary of state's database showed only 14,901 votes were cast.

His latest concerns were raised during an interview with JD Rucker at the NOQ Report.

May 12 11:21

All Wi-Fi devices impacted by new FragAttacks vulnerabilities

Newly discovered Wi-Fi security vulnerabilities collectively known as FragAttacks (fragmentation and aggregation attacks) are impacting all Wi-Fi devices (including computers, smartphones, and smart devices) going back as far as 1997.

Three of these bugs are Wi-Fi 802.11 standard design flaws in the frame aggregation and frame fragmentation functionalities affecting most devices, while others are programing mistakes in Wi-Fi products.

"Experiments indicate that every Wi-Fi product is affected by at least one vulnerability and that most products are affected by several vulnerabilities," security researcher Mathy Vanhoef (New York University Abu Dhabi), who discovered the FragAttacks bugs, said.

May 12 11:13

Billions of devices vulnerable to Wi-Fi 'FragAttacks' — what to do

Up to a dozen serious security flaws affect almost all Wi-Fi-enabled devices, including PCs, Mac, iPhones, Android phones, most routers and smart-home devices, says a Belgian security researcher. You'll want to update Windows straight away; most other devices will have to wait for patches.

Mathy Vanhoef, who in 2017 co-discovered the widespread KRACK flaws in Wi-Fi, groups these 12 new flaws under the name "FragAttacks." He's put an impressive amount of documentation online to explain the flaws, including a dedicated FragAttacks website, an academic research paper, a presentation slideshow, two YouTube videos and a software tool to detect vulnerable devices.

Simply put, the FragAttacks, some of which date back to the first version of Wi-Fi in 1997, let nearby devices "within radio range" attack your Wi-Fi network to steal information and send devices to bad places online.

May 12 10:35

Did The NSA Create Bitcoin?

Op-Ed by Insight History

The mysterious origins of Bitcoin have led to endless theories pertaining to who Satoshi Nakamoto actually is. One prominent theory, which is sometimes circulated in the liberty movement, is that Bitcoin is nothing more than a trojan horse of the establishment, designed to move people away from cash and gold, and towards digital currencies.

The basis for this argument tends to lean heavily on a paper written by three employees of the National Security Agency (NSA) Office of Information Security Research and Technology, Cryptology Division, in June 1996. The paper was titled: How to Make a Mint: The Cryptography of Anonymous Electronic Cash...

May 12 08:20

China sentences bank computer hackers to death

China has sentenced two computer hackers to death to deter the growth of computer crime.

The sentence was imposed on the brothers Hao Jinlong and Hao Jingwen, who hacked their way into a state-owned bank and transferred money into secret accounts. One of the brothers was a bank accountant.

The judge in Zhenjian, Jiangsu province, said that hacking was a new form of crime and should not be treated lightly, according to a report in the Legal Daily.

The total sum they obtained was 260,000 Renminbi (£21,500). Although a large sum by Chinese standards, the sentence is unusually severe.

China has shown increasing concern about loopholes in its computer systems, which are being exploited both by political dissidents and for financial fraud.

Webmaster's Commentary: 

Sounds reasonable!

May 12 08:00

WhatsApp Explains What Will Happen if You Reject Its New Privacy Policy

It's been all over the news recently. WhatsApp is making a controversial change to its privacy policy, and many people aren't happy about it. However, WhatsApp has now explained what will happen to your account if you don't accept the new privacy policy.

How WhatsApp Will Limit Accounts That Don't Accept Its New Privacy Policy

WhatsApp recently updated its FAQ page with an entry regarding what will happen to users who don't accept the new privacy policy. After a period of several weeks from the acceptance date, May 15, users will see the notification to accept the new privacy policy become persistent.

Once the notification becomes persistent, users will lose access to their chat list on the app. Essentially this means you'll lose most of the app's functionality. You will only be able to accept voice and video calls, call back, and reply to messages from the notifications. This means you won't be able to start conversations or make calls.

May 12 07:36

Head of US 'SWAT Team of Nerds' Steps Down After Mysterious IP Address Decision

The head of the Defence Digital Service (dubbed "SWAT Team of Nerds" by its own members) has succeeded in expanding the scope of his department's operations beyond simply solving IT problems for the Pentagon. However, this required him to cut through a tangle of red tape put in place by the department's bureaucracy.

The chief of the Pentagon's Defence Digital Service (DDS), Brett Goldstein, said in an interview with Politico that he will be stepping down in July 2021 after two years in the post.

Goldstein's term expires this year, but it is not unheard-of for the DDS chief's contract to be extended. However, for reasons unknown, Goldstein's contract has not been prolonged despite his achievements in the post. His replacement has also not been announced so far, but his deputy, Katie Olson, who focused on counter-drone operations and assembling the Department of Defence's collection of pathology specimens, will serve as acting chief.

May 12 07:27

Huawei’s ability to eavesdrop on Dutch mobile users is a wake-up call for the telecoms industry

Chinese technology provider Huawei was recently accused of being able to monitor all calls made using Dutch mobile operator KPN. The revelations are from a secret 2010 report made by consultancy firm Capgemini, which KPN commissioned to evaluate the risks of working with Huawei infrastructure.

While the full report on the issue has not been made public, journalists reporting on the story have outlined specific concerns that Huawei personnel in the Netherlands and China had access to security-essential parts of KPN’s network – including the call data of millions of Dutch citizens – and that a lack of records meant KPN couldn’t establish how often this happened.

Both KPN and Huawei have denied any impropriety, though in the years since the 2010 report, Huawei has increasingly found itself labelled a high-risk vendor for telecoms companies to work with, including by the UK’s National Cyber Security Centre.

May 12 07:19

The American Cyber Stasi Will Suppress All Digital Dissent In Biden's Dystopia

CNN's recent report that the US' security services are considering contracting the services of so-called “researchers” as a legal workaround for spying on average Americans confirms that Biden's dystopian hellhole is rapidly moving in the direction of establishing a “Cyber Stasi” for suppressing all digital dissent against the Democrats as they continuing consolidating their de facto one-party rule of the country.

May 12 06:34

How AI Will Soon Change Special Operations

When Gen. Richard D. Clarke was leading special operations forces in Afghanistan years ago, he spent 90 percent of his time thinking about moving and shooting — “the raid, the mission, the kill-capture mission, the destruction of enemy forces,” Clarke said last week at the annual SOFIC conference. But when he returned to Afghanistan last year as the commander of U.S. Special Operations Command, he found that U.S. leaders were focusing most of their mental energy on information.

Commanders now spend about 60 percent of their time mulling what the Taliban and the Afghan population are thinking, and how U.S. actions might influence that, Clarke said. “As we look at the info space and in our fight for competition...working in the information space can have the greatest impact in the coming years.”

May 12 06:31

Multiple states declare emergency, 1,000+ pumps run out of gas, as White House insists there’s NO ‘shortage’ & blames ‘hoarders’

Motorists and even airlines struggled to find fuel across the southeastern US due to the Colonial Pipeline cyberattack, but the Biden administration denied there was a “shortage” and blamed “hoarders” for the “supply crunch.”

Virginia and Florida declared a state of emergency on Tuesday, following North Carolina’s declaration the day before, as the disruption in pipeline operations led to over 1,000 gas stations across a dozen states running out of fuel, according to S&P’s Oil Price Information Service.

May 12 06:21

Florida, Virginia, Georgia and North Carolina declare states of emergency over gas shortages after Colonial Pipeline hack as 1,000 fuel stations run dry in Southeast as people panic buy

The governors of Florida, Virginia and Georgia all declared states of emergency Tuesday in a bid to protect fuel supplies, with some gas pumps already dry in Atlanta and other cities, as the impact from the Colonial Pipeline ransomware attack continues to ripple across the country - hitting the Southeast especially hard.

Panic buyers streamed into gas stations across the Southeast as the key pipeline that supplies the area was threatened by the attack.

More than 1,000 gas stations in the Southeast are now running out of fuel, according to S&P's Oil Price Information Service.

May 12 05:54

Prepping for a cyber pandemic: Cyber Polygon 2021 to stage supply chain attack simulation

The World Economic Forum (WEF) will stage another cyber attack exercise as it continues to prep for a potential cyber pandemic that founder Klaus Schwab says will be worse than the current global crisis.

The SolarWinds hack served as a wake-up call to the supply chain attack vulnerabilities still present in public and private organizations, and it served as a warning that the next breach could be exponentially worse in spreading through any device connected to the internet.

Following up on last year’s Cyber Polygon cyber attack exercise and event aimed at preventing a digital pandemic, the WEF has announced that the 2021 edition will be taking place on July 9.

“A cyber attack with COVID-like characteristics would spread faster and farther than any biological virus” — World Economic Forum

May 12 05:48

Ransomware gang says D.C. police won’t pay $4 million demand, begins leaking files

A group of cybercriminals have begun leaking what it claims to be internal law enforcement files after Washington, D.C.’s Metropolitan Police Department was targeted with ransomware last month.

In a post on the dark web Tuesday, the Babuk ransomware gang alleged that negotiations had “reached a dead end” after declining a payment offer made by police.