COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED

COMPUTERS/INTERNET/SECURITY

Aug 06 11:41

HERDICTWEB

Have you ever come across a web site that you could not access and wondered,"Am I the only one?" Herdict Web aggregates reports of inaccessible sites, allowing users to compare data to see if inaccessibility is a shared problem. By crowdsourcing data from around the world, we can document accessibility for any web site, anywhere.

Aug 06 10:35

Urgent - Google's Blogger Blocks Politically Sensitive Sites!

Aug 06 07:56

Murdoch vows to charge for all online content

However, they resulted in a $3.4bn net loss for the full year, down from net income of $5.4bn a year earlier, reflecting $8.9bn in impairment charges.

The sweeping decision by the owner of titles including The News of the World and The Australian to abandon the practice of giving away news in exchange for attracting a large audience for advertisers could embolden other publishers warily examining paid content models.

"We intend to charge for all our news websites," Mr Murdoch said.

"If we're successful, we'll be followed by all media," he added, predicting "significant revenues" from charging for differentiated news online.

Webmaster's Commentary: 

Rupe, ol' boy; the reason you are losing audience and ad revenue has nothing to do with your business model and everything to do with the bias, slant, and deception regularly peddled by your rags as "News."

It doesn't matter if you change how you sell your lies; people still will not buy them.

People want the truth, and they will go where they need to to get it.

Aug 06 06:41

Internet firms condemn plans for GCHQ email access

A proposal to allow Cheltenham listening post GCHQ to monitor any email, phone call or website visit of people in the UK has been condemned by internet firms.

The London Internet Exchange, which represents more than 330 companies, including BT, Virgin and Carphone Warehouse, says the Government's surveillance proposals are an "unwarranted" invasion of people's privacy.

n/a
Aug 05 20:37

Critical Windows 7 bug risks derailing product launch

Oh boy! It appears that Microsoft’s glowing track record with Windows 7 is about to come to an abrupt and unceremonious end. According to various Web sources, the RTM build 7600.16385 includes a potentially fatal bug that, once triggered, could bring down the entire OS in a matter of seconds.

The bug in question -- a massive memory leak involving the chkdsk.exe utility -- appears when you attempt to run the program against a secondary (that is, not the boot partition) hard disk using the "/r" (read and verify all file data) parameter. The problem affects both 32- and 64-bit versions of Windows 7 and is classified as a "showstopper" in that it can cause the OS to crash (Blue Screen of Death) as it runs out of physical memory.

Aug 05 13:32

Hundreds Of ISPs Refuse To Go Along With Big Brother Spy System

A group of over 300 internet service providers and telecommunications firms is fighting back against the British government’s plans to monitor all emails, phone calls and internet activity nationwide.

The London Internet Exchange (LINX), which represents some 330 companies, including BT, Virgin and Carphone Warehouse, says that the government is misleading the public about the extent to which it plans to monitor their communications and internet activity.

Aug 05 13:28

$200 Billion Broadband Scandal

Broadband Scandals is a well-documented expose, 406 pages and 528 footnotes. Using the phone companies' own words (and well as other sources), the book outlines a massive nationwide scandal that affects every aspect of state of the Internet. Not only the web but broadband, municipalities laying fiber or building wifi networks, not to mention related issues such as such as VOIP, cable services, the cost of local phone service, net neutrality, the new digital divide, and even America's economic growth.

The fiber optic infrastructure you paid for was never delivered.

Aug 05 08:26

You Tube Pulls Hundreds Of Ron Paul Videos

You Tube has expanded its zealous copyright crusade by suspending the popular C-Span Junkie user channel, and in doing so has pulled hundreds of viral Ron Paul videos, which are now completely dead.

Aug 04 14:20

White House launches counteroffensive over Drudge Report link

New president, old headline: the White House fired back at the Drudge Report Tuesday, part of a fresh "viral" pushback over what it called a "campaign of misstatements and outright falsehoods" on health care.

Aug 04 14:05

Researchers hijack computer during software update

Two researchers from Israeli security firm Radware have worked out a way to trick computers into downloading malware or take over a computer by hijacking the communications during the update process for Skype and other applications.

Webmaster's Commentary: 

How wonderful that Israelis are figuring out how to do things like this to all our computers!!!!!!!!!!!

Aug 04 09:06

White House Cybersecurity Aide Quits

Aide quits after saying she is unable to be effective since a higher post she wanted has been left vacant for two months.

Aug 04 08:45

Jewish leader arrested for child porn

A director for a Holocaust museum and member of the Anti-Defamation League has been arrested for possessing more than 23 child pornography videos.
Webmaster's Commentary: 

I love the way that Rob tries to talk up what a swell guy this pervert is if you just ignore that itty bitty problem of 23 child porn videos on his computer.

Aug 03 18:32

Fake ATM, skimmers found in Las Vegas hotels

Chris Paget, an RFID security expert who now works on Google’s security team, said he lost $200 to a rigged ATM that also claimed several other victims. Inexplicably, Paget said he got no help from hotel security or local police in Las Vegas when he reported the problem.

Aug 02 19:48

'Fake UK sites' trick customers

Trading standards officers say that consumers are being tricked into buying fake goods on the internet by companies pretending to be based in the UK.

The websites are often based in China, but use "co.uk" as part of their domain name, giving shoppers a false sense of security, they say.

Aug 02 09:14

Obama passing new law to allow searching of PC's, Laptops, and media devices

Webmaster's Commentary: 

"Iss your mp3 player in order, schwine?!?"

Folks, here is the answer to the current copyright and copying issue.

1. Learn a musical instrument.

2. Write your own music.

3. Feel free to give it away.

I am not being smug here. One of the downsides of modern digital players is that fewer and fewer people learn to play musical instruments or to create their own music.

Playing a musical instrument is great exercise for your brain. Writing your own music means not having to be slaves to the thoughts of the corporate-owned lyrics. And since you own the music, you can do what you want with it, including giving away copies.

Being a content creator myself, I empathize with the holders of copyrights with regard to the file copying problem. But given the terror-tactics of the RIAA/MPAA and this new invasive attitude by the government, I an seriously disinclined to purchase any more commercial content and ready to toss all my digital players into the trash.

Silence can indeed be golden. If the government intends to make commercial entertainment too complicated and difficult to use, let us all agree to stop using it.

On a purely practical point, the latest iPhone has a 32 Gig memory. Some of the high end digital players go even higher. Are they really planning to slow down the airport lines even further by doing a 15 minute download on every single media player going through the gate?

Second practical point; Who pays for all this protection for the record and movie industry? The movie and music industries won't want to bear the costs because that would raise the price of product and further erode sales already in dire trouble from the declining economy. So the taxpayers will get screwed for this as well, which means WE THE PEOPLE will have even less money to spend for pleasures like music, which means record and film sales are still going to go down anyway because of this, but the record and movie companies will refuse to see that their draconian solutions are only accelerating the problem.

Third practical point; MP3 players are cheap these days. Just as I have a cheap laptop to travel with (since TSA destroyed a really expensive one a while back) those who are into pirated content will have a cheap MP3 player in their pockets when they go through security checkpoints while their "real" players are hidden somewhere else. Many smart phones that double as media players have removable memory cards. How hard is it to conceal one of those tiny gigabyte chips?

Fourth practical point; How does a scan of our media players know if the content is legally owned or not? Downloaded content has a DRM license tag on it, but what of music transferred from a legally-owned CD into the player; a feature supported by every current playing system. There is no way to know if the CD sitting in that drive is an original disk or not.

Fifth practical point; what if the MP3 player is borrowed, bought at a yard sale, a hand me down, or shared among multiple users in the family? Reasonable doubt exists that any one user of the device is the "criminal."

As scary as this new law sounds, it is on a practical level just flat out not enforceable.

In the end, content theft, like any crime, is a moral issue. All populations inherit the moral qualities of their leaders. In a nation where the government is stealing other nations' wealth, it is hard to convince kids that copying a file is any big deal.

Aug 01 15:15

You twitter! Civil servant's instructions to ministers on how to send 140-character messages are 20 pages long

With the economy in a hole, you might have thought the Whitehall mandarins of the Business Department had enough to do.

But one senior civil servant has found time to produce a 20-page strategy paper - on how to use Twitter.

Aug 01 15:12

Hacking threat 'exposes every iPhone in the world' to takeover by criminals

Criminals could take control of every iPhone in the world via text message, owners are being warned.

Hackers could exploit a newly discovered flaw in Apple's handset to control its key functions - stealing data, making calls, surfing the internet and sending texts.

Security experts warn that hackers could soon hijack any of the world's 21million iPhones for identity theft and other crimes.

Aug 01 10:14

Big Content: ludicrous to expect DRMed music to work forever

Rightsholders can't understand why people who bought DRMed music only to have the authentication servers go dark might demand the right to crack the DRM. Big Content believes the idea that rightsholders "are required to provide consumers with perpetual access to copyrighted works" is laughable.

Aug 01 10:09

Skype could be cut off for good over dispute

Skype might have to shut down because of a dispute over the core technology used to make the internet telephone system work.

EBay, which paid $2.6 billion (£1.6 billion) for the voice-over-the-internet system in 2005, is facing a court battle with the original founders of the company who retained the rights to the technology at the heart of the system.

EBay admitted in a regulatory filing that it might have to close down the company. It said it was trying to develop alternative software but if that did not work, or if eBay lost the right to the original software: "Skype would be severely and adversely affected and the continued operation of Skype's business as currently conducted would likely not be possible."

Aug 01 07:59

MIT's 'bokode' chip said to outperform bar codes

The new tag, which can be read by consumers with a cellphone camera, looks like a 1-mm-high raised bump. Called a "bokode," the Massachusetts Institute of Technology invention consists of an illuminated microdot behind a plastic lens. It will use flat, reflective holograms in future versions.

MIT's bokode is named after the Japanese term "bokeh," which refers to the image of a round blob that results when a camera is out of focus. MIT researchers reversed that process by encoding the microdot's blob-like image based on the angles at which rays emerge from the lens--an encoding that allows the out-of-focus camera to recombine the rays into the original.

Aug 01 07:47

Card PINs traded at two for a dollar

It is here, in this polite, super-exclusive online marketplace, that the world’s most dangerous cybervillains plot to make your life a misery and get fabulously rich in the process. This is where your debit card PIN is bought and sold, your e-mail inbox engorged with spam, your identity touted to the highest bidder and the company you work for blackmailed or incapacitated.

From here, a rogue IT engineer can sell access to the tills of 50 high street stores or a Taiwanese factory worker can be bribed to install spy software in a dozen credit card readers. Botnets, trojans, worms — and worse — are fomented here.

Webmaster's Commentary: 

These hackers cause far more damage than terrorists, yet the US Government seems to remain totally unconcerned, probably because security software is now a huge business that tithes the appropriate congressional campaigns

Aug 01 07:06

What Happened to 'Kenny's Sideshow?'

Webmaster's Commentary: 

kennysideshow.blogspot.com cannot be found at the internet archive, either!

Jul 31 17:30

Student Must Pay $675,000 in Downloading Case

Jul 31 06:46

Busted on MySpace: 2 FL men face charges over gang photos on Web sites

Elvis Rodriguez, 30, flashed Latin Kings hand signals on his MySpace.com page and called himself “King Kamel,” according to his arrest report.

Richard Figueroa-Santiago, 22, used his MySpace page to post pictures of friends making “Eastside” hand gestures, detectives said.

Webmaster's Commentary: 

I guess the police don't have any real crimes to worry about down there in Florida!

n/a
Jul 30 15:44

Damaged cable causes Internet blackout in four West African countries

Five days ago, the Appfrica tech blog reported an Internet blackout in Benin, a West African country roughly the size of Ohio. The outage, which also affected neighboring Togo, Niger and Nigeria, was caused by damage to the SAT-3 submarine communications cable, which links Portugal and Spain to South Africa via the West African coastline.

Jul 30 11:52

Warning:Electronically Cloning Cellular Phone Numbers

Your cellular telephone has three major security vulnerabilities:
* Vulnerability to monitoring of your conversations while using the phone.
* Vulnerability of your phone being turned into a microphone to monitor conversations in the vicinity of your phone while the phone is inactive.
* Vulnerability to "cloning," or the use of your phone number by others to make calls that are charged to your account.
Cloning is the process whereby a thief intercepts the electronic serial number (ESN) and mobile identification number (MIN) and programs those numbers into another telephone to make it identical to yours. Once cloned, the thief can place calls on the reprogrammed telephone as though he were the legitimate subscriber.

Jul 30 10:09

Air Force on the Hunt for ‘Subversive’ Behavior Online

Webmaster's Commentary: 

Subversive activity?

Start with this link

Jul 30 10:08

Vulnerabilities Allow Attacker to Impersonate Any Website

“This is a vulnerability that would affect every SSL implementation,” Marlinspike told Threat Level, “because almost everybody who has ever tried to implement SSL has made the same mistake.”

Webmaster's Commentary: 

Waterboard the hackers computers.

Make 'em watch!

:)

Jul 30 10:05

Told You So. And I Told You Over Several Years - Hal Turner is a Snitch

Bear in mind that Apollonian, the dumb ass extraordinaiire defended this piece of shit for the entire time I condemned him. Hal Turner is, was, and has always been an FBI snitch period. His actions betrayed him long ago, but most of you never paid any attention. Bill White, alleged uber Nazi and Alex Linder [Webmaster of VNN and VNNforum] are also snitches and informants, and you can take that to the bank. This cunting bastard Turner was the one behind having my first blog the Politically Correct Apostate shut down.

You may not like me, but Curt Maynard does NOT lie....

Jul 30 09:21

2 Ga. officers suspended for investigating Obama

That investigation was prompted after the Secret Service contacted the county telling them that someone had accessed two police databases on July 20 around 4:40 a.m. to perform a background check on the president.
Edwards said that the Secret Service is leaving the investigation up to the county.

Webmaster's Commentary: 

So, all the databases are being watched as well.

Everybody watching everybody.

No wonder we can't get any work done!

And why is Obama so nervous about his background being checked? I thought we all had to tolerate this kind of intrusion to save us all from Osama whatsisname!

Jul 30 08:28

Manna

"So", he said, "they have you working the drive-thru I see. Is that a step up or a step down?"

"It's not the drive-thru," I replied, "it's a new system they've installed called Manna. It manages the store."

"How so?"

"It tells me what to do through the headset."

"Who, the manager?"

"No, it's a computer."

He looked at me for a long time, "A computer is telling you what to do on the job? What does the manager do?"

"The computer is the manager. Manna, manager, get it?"

"You mean that a computer is telling you what to do all day?", he asked.

"Yeah."

Jul 30 08:12

Order to Show Kos: How to survive banning, bureaucracy & trolls on the Daily Kos

Posting a diary on the Daily Kos can sometimes be a truly humbling experience. And it is definitely a blood sport.

Webmaster's Commentary: 

The Rangers at WRH are far more civilized! :)

Jul 29 21:25

Microscam Vista is garbage

Listening to Mike talk about Microsoft(c)Vista... Mike, erase the hard drive and install XP, or better (if the particular PC hasn't been "fixed" to disallow it) install an open-source operating system. I find myself servicing PCs with Vista, and what you describe is highly common. Personally, I buy from a local Chinese PC dealer and wouldn't trust anyone else; I buy cheap used computers from them installed with XP and stick them on my LAN to use the hard-drive capacity. As for HP printers: they're to sell, not to use. I'll never buy another HP printer in my life. I use to rehabilitate older ones and never had a problem with HP printers, but these days they're fit for the landfill shortly after you buy them.

Jul 29 21:23

Microscam Vista is garbage

Listening to Mike talk about Microsoft(c)Vista... Mike, erase the hard drive and install XP, or better (if the particular PC hasn't been "fixed" to disallow it) install an open-source operating system. I find myself servicing PCs with Vista, and what you describe is highly common. Personally, I buy from a local Chinese PC dealer and wouldn't trust anyone else; I buy cheap used computers from them installed with XP and stick them on my LAN to use the hard-drive capacity. As for HP printers: they're to sell, not to use. I'll never buy another HP printer in my life. I use to rehabilitate older ones and never had a problem with HP printers, but these days they're fit for the landfill shortly after you buy them.

Jul 29 14:17

P2P Network Exposes Obama's Safehouse Location

Along with the safe house location, the LimeWire networks also disclosed presidential motorcade routes, as well as sensitive but unclassified document that listed details on every nuclear facility in the country. Now lawmakers are considering a bill to ban P2P use on government, contractor networks."

Webmaster's Commentary: 

This feels like a manufactured incident to justify further government suppression of the internet.

n/a
Jul 29 09:12

Games That Design Themselves

This is a game that designs its own AI agents by observing the behavior of humans.

Jul 29 05:05

How it feels to be sued for $4.5m

To a certain extent, I'm afraid to write this. Though they've already seized my computer and copied my hard drive, I have no guarantee they won't do it again. For the past four years, they've been threatening me, making demands for trial, deposing my parents, sisters, friends, and myself twice – the first time for nine hours, the second for seven. I face up to $4.5m in fines and the last case like mine that went to trial had a jury verdict of $1.92m.

When I contemplate this, I have to remind myself what I'm being charged with. Investment fraud? Robbing a casino? A cyber-attack against the federal government? No. I shared music. And refused to cave.

Jul 29 04:58

Network Solutions breach exposes 573,928 credit cards

More than half a million credit cards could have been compromised after unauthorised code was discovered on major merchant website host servers.

Network Solutions is nothing less than a huge web hosting outfit, with a global customer base covering some 7 million domains and more than 350,000 web sites.

Which is why, when it announces that some of its servers have been breached and unauthorised codes uncovered upon them, it's potentially a huge concern. Especially given the average cost to a company of a single breach is put at more than USD 6 million.

Jul 29 04:57

Jane Burgermeister Blog Goes Down

I don’t know what the hell is going on, but in the past 6 hours I have done everything in my power to preserve the research, links, documents and related that were in her blog from yesterday. I don’t believe that what took place in the last 6 hours was a wordpress.com server belch. More math to be done. They most likely figured out that it wreaked of GUILTY as charged to yank that blog. So they let it go back up. At this point, I don’t care. My credibility as a writer is at stake here.

Jul 28 16:15

Obama declining approval reflected in reduced website traffic

Although the White House has redesigned its website at a cost of $18 million, hoping to bring in more traffic, it has now declined to that of George W. Bush during the waning days of his presidency.

Webmaster's Commentary: 

7 months on the job, and already down to the Bush Leagues!

Jul 28 10:29

Check your connection speed

This page provides information on your broadband connection speed.

Jul 28 09:05

Has Evony become the most despised game on the web?

On the surface, Evony is a pretty standard online strategy game – a simulation in which players take the role of a medieval noble who must build up an empire. But the way the game has been marketed has created a bit of a stir: the games marketer Bruce Everiss has charted the volume of spam being sent by its creators, while Jeff Atwood, a US programmer and blogger, has documented the ads' increasingly racy nature – from a simple medieval warrior promising the game would be "free forever", through a string of increasingly racy images ... until, finally, it was simply advertising itself by showing a pair of breasts.

Jul 28 08:44

Online petition stalls plan to ban violent videogames in Germany

German government plans to ban violent videogames will have to be put on hold, after a successful internet petition by German gamers.

Officials had hoped to bring in a ban before federal elections in September, but the level of online opposition means the Bundestag must now examine and discuss gamers' demands. With more than 67,000 signatures, the e-petition calls for a ruling against the ban of violent video games and an increased focus on keeping such games out of children's hands. German gamers also want more government promotion of the videogame industry.

Jul 28 08:05

Apple jettisoning Google Voice from App Store

The systematic disappearances don't have a larger official explanation but, given the common thread of their using the same service, is now thought less to a matter of Apple guarding its built-in features and more cellular carriers pushing it to keep the service out. Google Voice not only lets users provide one virtual phone number to call multiple real phones but greatly reduces the cost of outbound long-distance and messaging, all of which potentially deprive AT&T and eventually other carriers of possible extra revenue.

Apple and AT&T have some explaining to do.

Jul 27 16:20

Hackers may slip through hole found in Adobe tools

Cybercriminals may have a clear path to spread mayhem on computers this week by taking advantage of a newly discovered vulnerability in Adobe's (ADBE) ubiquitous Flash video player and Acrobat Reader, the widely used tool for opening PDF documents.

Jul 27 15:00

Censorship comes to America: AT&T blocks 4chan /b/

Jul 27 08:54

BEATING YOUTUBE AT ITS OWN GAME OF CENSORSHIP

Jul 27 08:07

How Wired Gadgets Encroach on Privacy

With every high-tech gadget we buy, we give up a little more privacy. Many devices today are in constant communication with their manufacturer. And it's not just consumers who are losing their rights -- the technology gives authoritarian states whole new ways of keeping tabs on individuals.

Webmaster's Commentary: 

Consumer rights are being trampled here. Capabilities and features we have already paid for are being deleted from our devices by court order and we the purchasers seem to have no recourse.

We have reached a stage where we cannot trust that the device we buy will keep working as it did when we got it. Never mind outright technical failures, the software that came with the device can be altered remotely at will and without our permission.

The IP debacle has reached a ridiculous stage when lawyers are fighting inside our smart phones and we the people pay the price.

Jul 26 09:23

More ADL on YOUTUBE

Under the guise of fighting "antisemitism" the ADL is out to remove channels on youtube not just videos but channels for speaking out against Israel. You so much as show a picture in war it's removed under the gross clause, you use music the wrong way its removed for that, you get flagged enough even for no reason at all and they remove it for that. And there are groups that just mass email one another and go around and flag videos that criticize Israel. The ones they leave alone are actual racist because it only helps their cause. Meanwhile they can support racial cleansing and colonization as Zionism because you see it's OK to be racist so long at it's your religion.

n/a
Jul 25 08:07

Who Is Cyveillance And Why Should You Care?

So who exactly is Cyveillance? According to their website, they are a company that claims to be “Minding your business on the net” with their “comprehensive internet monitoring technology.”

Who are their clients? From what I can gather, the U.S. Government has used their services and Cyveillance also claims that half of the Fortune 50 companies are counted among their customers. As well, the RIAA is reportedly a client, presumably for information on illegal music sharing. However, Cyveillance won’t say who exactly their clients are. Who knows who they are sharing your data, posts, and comments with?

Jul 25 07:55

Fraudsters have you in their sights with five new scams

Phishing (also known as 419 scams), where criminals attempt to elicit payments or personal details by e-mail, are now well known, so practitioners are turning to telephone-based variants. The principal method is “vishing” (voice phishing), where the perpetrators call victims posing as their bank and ask them to verify their identities by divulging personal details, often using an automated system. In the most convincing version, the target is not asked for details on the spot, but told to call the bank’s “fraud department” on a specified security number. “Smishing” (SMS phishing) is the latest adaptatation, where initial contact is made by text message.

Jul 24 15:30

Exposed: Repair Shops Hack Your Laptops

Some computer repair shops are illegally accessing personal data on customers' hard drives - and even trying to hack their bank accounts, a Sky News investigation has found.

In one case, passwords, log-in details and holiday photographs were all copied onto a portable memory stick by a technician.

In other shops, customers were charged for non-existent work and simple faults were misdiagnosed.

Jul 24 15:26

Musician angry after BPI forces YouTube to pull his video

YouTube takedown drama is back this week, thanks to British musician Calvin Harris and the British Phonographic Industry (BPI). The organization, which represents the recording industry in the UK, apparently had one of Harris' music videos removed from YouTube due to a copyright claim. The problem, however, was that the video was created and posted by Harris himself.

After his discovery that the video was missing, Harris had many colorful words for BPI in his Twitter stream (hat tip to The Music Magazine). "The BPI are the worst organisation to ever walk the earth and their setup is shambolic," Harris wrote in one tweet. "There are videos up there that other people have uploaded of the same song, and they haven't been removed!? But mine does!"

Jul 24 07:56

GamaSec & Data Clone Labs announced Zero Day Project To Fight Explosion in Web Attacks

Jul 24 07:10

New tool uses Facebook to improve Israel's image

The realization that young people are increasingly living life through their Facebook accounts recently gave birth to a new and potentially powerful tool in the fight for Israel's image. Observing this phenomenon, a group of 23 students from Jerusalem's Hebrew University came up with a small application which uses the Facebook "status line" to inform hundreds of thousands of users at any given moment about positive facts about Israel.

Webmaster's Commentary: 

And what if the users and creators of facebook need the status line for something else? Or does what they want simply not figure into this?

The arrogance displayed here; that Facebook exists for their personal benefit and use, is astounding, and lies right at the heart of why so many people are becoming angry with Israel.

Frankly, if my Facebook starts spouting Israeli propaganda at me, I will probably stop using it.

n/a
Jul 23 17:35

WARNING: Adobe Acrobat, Flash and Reader Zero Day Vulnerability

Adobe has issued a security advisory following the discovery of what it describes as a "critical vulnerability" which exists within the current versions of Flash Player (v9.0.159.0 and v10.0.22.87) across all platforms, Windows, Macintosh and Linux operating systems, The same vulnerability can be found within the authplay.dll component that ships with Adobe Reader and Acrobat v9.x for Windows, Macintosh and UNIX operating systems and has the potential to cause a crash which could then allow an attacker to take control of the system. Well, I say potential, but Adobe admits that there are "reports that this vulnerability is being actively exploited in the wild via limited, targeted attacks against Adobe Reader v9 on Windows".

Jul 23 17:02

Microsoft profits plunge again

Microsoft shocked investors yesterday by announcing another plunge in revenues and profits, sending the group's shares tumbling and leaving some analysts questioning the technology giant's prospects.

In its latest quarterly financial results, the world's biggest software company announced revenues of $13.1bn, down from almost $16bn over the same period last year. Profits for the last three months fell 29% to $3.05bn, down from $4.3bn for the fourth quarter of 2008.

Jul 22 08:12

That NSA Spy in your Wallet and Purse

Climbing into his Volvo, outfitted with a Matrics antenna and a Motorola reader he’d bought on eBay for $190, Chris Paget cruised the streets of San Francisco with this objective: To read the identity cards of strangers, wirelessly, without ever leaving his car.

It took him 20 minutes to strike hacker’s gold.

Zipping past Fisherman’s Wharf, his scanner downloaded to his laptop the unique serial numbers of two pedestrians’ electronic U.S. passport cards embedded with radio frequency identification, or RFID, tags. Within an hour, he’d “skimmed” four more of the new, microchipped PASS cards from a distance of 20 feet...

Jul 21 17:30

New Technology to Make Digital Data Self-Destruct

Webmaster's Commentary: 

VISTA!

Jul 21 11:18

Internet surfers paid to spread Israeli propaganda

The passionate support for Israel expressed on talkback sections of websites, internet chat forums, blogs, Twitter and Facebook may not be all that it seems.

Israel’s Foreign Ministry is reported to be establishing a special undercover team of paid workers whose job it will be to surf the internet 24 hours a day spreading positive news about Israel.

Internet-savvy Israeli youngsters, mainly recent graduates and demobilized soldiers with language skills, are being recruited to pose as ordinary surfers while they provide the government’s line on the Middle East conflict.

Webmaster's Commentary: 

So, from now on, ANY positive news about Israel must be assumed to be paid propaganda!

Jul 21 08:05

“Blogs Are Best at Debunking Myths That Can Slip Through a Lot of the Traditional Media Outlets"

Guess who just said:

Blogs are best at debunking myths that can slip through a lot of the traditional media outlets.

?

Some rabbid blogger?

A radical proto-terrorist?

A neo-nazi?

Some loser who lives in his mom's basement?

Wrong. Obama just said it.

Webmaster's Commentary: 
Jul 20 07:51

YOU TUBE~ Under Zionist Control

Let’s play a little game. Let’s pretend you found a vile video that is very insulting to people of the Muslim faith. Let’s say you then decided to do as the Zio-Jihadists do and report this video under the terms and conditions of you tube as being hateful against a religious group. Ok, go to you tube here ,then scroll down to the bottom and click on where it says, “Safety Center” here, then select the radio button that says “hateful content” and click “enter” SURPRISE, it’s the ADL telling you how to remove videos and content that is “anti-Semitic” This begs the question, why is ONLY a “Zionist Jewish” group represented, why are the NAACP not included, what about African Americans? They constitute a far greater number of Americans than the 2% of Jews who make up the population.

Jul 19 09:51

That commenter on your blog may actually be working for the Israeli government

Straight out of Avigdor Lieberman’s Foreign Ministry: a new Internet Fighting Team! Israeli students and demobilized soldiers get paid to pretend they are just regular folks and leave pro-Israel comments on Twitter, Facebook, YouTube and other sites.

Webmaster's Commentary: 

Relinked in order to remind everyone that the people posting anything pro-Israel should be assumed to be paid propagandists.

Jul 19 09:48

Suspiciously Prescient Man Files Patent for iPod-Like Device in 1979

Kane Kramer, an inventor by trade, came up with a gadget and music distribution service almost eerily similar to the iPod-iTunes relationship that predates it by three decades. The guy predicted details down to DRM and flash memory's dominance.

Kramer's device, the IXI, was flash-based, even though flash memory in 1979 only could have held about three minutes of audio, and featured a screen, four-way controls, and was about the size of a cigarette pack. Even weirder, he envisioned the creation and sale of digital music and foresaw all the good and bad that would come from this: No overhead, no inventory, but a great push for independent artists, with the risk of piracy looming large.

Jul 19 09:40

Another Critical Firefox Vulnerability Emerges

It has been only a few days ago that the Mozilla Firefox team released an update for Firefox 3.5 to Firefox 3.5.1 that would close a recently disclosed critical security vulnerability that allowed attackers to execute arbitrary code on the attacked computer system. Earlier today another Firefox vulnerability was disclosed to the public that affects the latest version of Firefox. The vulnerability can be remotely exploited and uses an stack based buffer overflow that is triggered by an overly long string of Unicode data. It can lead to remote code execution or to crashes, freezes or the allocation of a lot of computer memory.

Jul 19 08:52

GAG THE INTERNET!

When it comes to the First Amendment, Team Obama believes in Global Chilling.

Cass Sunstein, a Harvard Law professor who has been appointed to a shadowy post that will grant him powers that are merely mind-boggling, explicitly supports using the courts to impose a "chilling effect" on speech that might hurt someone's feelings. He thinks that the bloggers have been rampaging out of control and that new laws need to be written to corral them.

Jul 18 08:23

Four million British identities are up for sale on the internet

Highly sensitive financial information, including credit card details, bank account numbers, telephone numbers and even PINs are available to the highest bidder.

At least a quarter of a million British bank and credit card accounts have been hacked into by cybercriminals, exposing consumers to huge financial losses. Most of the personal data has been gathered as a result of “phishing” — a process whereby members of the public are duped into handing over their key details, such as user names, passwords and credit card details.

Jul 18 07:44

Some E-Books Are More Equal Than Others

As one of my readers noted, it’s like Barnes & Noble sneaking into our homes in the middle of the night, taking some books that we’ve been reading off our nightstands, and leaving us a check on the coffee table.

You want to know the best part? The juicy, plump, dripping irony?

The author who was the victim of this Big Brotherish plot was none other than George Orwell. And the books were “1984” and “Animal Farm.”

Webmaster's Commentary: 

That this capability of remote deletion has been built into the Kindle raises a very important question of what other remote access and alteration functions are built into other personal electronic devices without our knowledge and consent.

n/a
Jul 18 06:41

CANADA: ISPs must help police snoop on internet under new bill

Internet service providers would have to make it possible for police and intelligence officers to intercept online communications and get personal information about subscribers, under bills tabled Thursday.

"We must ensure that law enforcement has the necessary tools to catch up to the bad guys and ultimately bring them to justice. Twenty-first century technology calls for 21st-century tools," said Justice Minister Rob Nicholson as he announced the new bills with Public Safety Minister Peter Van Loan at a news conference in Ottawa.

Jul 17 10:27

Facebook 'breaches Canadian law'

Popular social networking site Facebook is breaching Canadian law by holding on to users' personal information indefinitely, a report has concluded.

Jul 17 06:45

Laptop Security While Crossing Borders

Jul 17 04:13

Ex-Boeing engineer convicted of spying for China

The former employee of Rockwell International's space and defense unit, which was taken over by Boeing in 1996, was convicted of multiple counts related to his decades-long espionage.

After a three week trial, Judge Cormac Carney "found Chung guilty of conspiracy to commit economic espionage...

Jul 16 13:51

Censorship in the Internet age

Australia’s government nannies have officially banned 1,370 web sites. They’ve drawn up a blacklist, just like the medieval index of banned books. Right now it’s a voluntary pilot project to which Internet service providers can submit. But if the trial run is deemed a success and made law, anyone who links to a blacklisted site can be fined $11,000 a day. That means it will be a crime not just to provide the contents of a web site, but to merely reproduce its address.

That’s not just like banning books. It’s like banning books, and banning saying the banned book’s title. It’s a lot of banning.

Jul 16 12:38

TRY OUT THE APOLLO FLIGHT COMPUTER!

Webmaster's Commentary: 

Okay, it doesn't support the full set of commands and programs, but there is enough here to let you get the idea of what the state of the art in spaceflight computers was 40 years ago.

Jul 16 09:28

Microsoft Versus Chavez

Yesterday, Microsoft MSN (Spain) featured a montage photo of Venezuelan president Hugo Chavez and the ex president of Cuba, Fidel Castro, wearing king's crowns, accompanied by the colourful title, "When power corrupts: Striving to be kings." The Venezuelan government and a grassroots technology movement here are both promoting the use and creation of open source (free) software, so it's no surprise that software tyrant, Microsoft, is lambasting Chavez.

Jul 16 07:57

Police chief denounces 'cowardly' iPhone users monitoring speed traps

The greater D.C. area has 290 red-light and speed cameras -- comprising nearly 10 percent of all traffic cameras in the U.S., according to estimates by a camera-tracking database called the POI Factory

n/a
Jul 15 19:04

Experts: Cyberstrikes originated from Britain, not North Korea

Jul 15 17:48

RFID passports: a tragedy waiting to happen

Even if it were encryption works best on unstructured data. What’s in a passport? Name, birthdate, birthplace, date of issue, height, weight, eye color, photo.

Gosh, who could break the code for that? It took security pros using a PC two hours to crack the Dutch version in 2005. Skimming your data for identity theft isn’t too hard.

Jul 15 17:47

UK data breach incidents on the rise

Seven in ten UK organisations experienced a data breach incident over the last year, up from 60 per cent in the previous year.

The third edition of an annual survey by the Ponemon Institute, sponsored by PGP, also found that 12 per cent of 615 public and private sector organisations probed were hit by five data loss incidents over the previous year. Less than half of these breaches (43 per cent) were disclosed publicly, while disclosure of the remainder was neither a legal or regulatory requirement.

Jul 15 17:32

Highly Critical Security Vulnerability Found in Firefox 3.5

Secunia reports of a new, unpatched, and highly critical security hole in Firefox 3.5 (possibly in other versions, too) that allows attackers to execute arbitrary code on the victim’s computer.

The vulnerability is caused due to an error when processing JavaScript code handling; for example, one could use simple HTML “font” tags to cause a memory corruption and then run arbitrary code.

Until Mozilla addresses this vulnerability, here’s a temporary fix: Type about:config in Firefox‘ address bar, and set “javascript.options.jit.content” to “false.”

Jul 15 16:55

The Foreign Ministry presents: talkbackers in the service of the State

Members of the new unit will work at the Ministry (“They will punch a card,” says Shturman) and enjoy the full technical support of Tahila, the government’s ISP, which is responsible for computer infrastructure and Internet services for government departments. “Their missions will be defined along the lines of the government policies that they will be required to defend on the Internet.

Webmaster's Commentary: 

So, every person you see posting in support of Israel may be assumed to be paid to do so.

Jul 14 13:42

Computer attack may not have originated in North Korea after all

Bkis Security has just disclosed analysis showing that 166,908 botted PCs from 74 countries were used in the attacks. Commands were routed through eight control servers, tied into a master server located in the United Kingdom and running the Windows Server 2003 operating system, says Bkis research director Nguyen Minh Duc.

n/a

n/a
Jul 14 07:19

NSW Jewry goes ahead with Internet Censorship

Jul 13 20:47

Startpage - A search engine that does not record your IP.

Jul 13 13:06

Best Buy calls Twitter a job qualification

A recent job posting on Best Buy Co Inc.’s Web site for a Senior Manager – Emerging Media Marketing position based out of the company’s corporate headquarters in Richfield, Minn. listed two preferred job qualifications: a graduate degree and 250+ followers on Twitter.

Basic qualifications for the position include a Bachelor’s degree, “two plus years of mobile or social media marketing experience” at the director or strategist level, “four plus years people or resource leadership experience” and “one plus years of active blogging experience."

Webmaster's Commentary: 

Well, it's Best Buy!

n/a
Jul 13 08:39

Power sockets can be used to eavesdrop on what people type on a computer.

The attack has been demonstrated to work at a distance of up to 15m, but refinement may mean it could work over much longer distances.

Jul 12 22:53

Does Google Know Too Much About You?

Recently, at the Aspen Ideas Festival, WNYC talk show host Brian Lehrer asked Google CEO Eric Schmidt if Google's constantly growing importance to users in the United States and around the world meant that Google needed to be regulated as a utility by the Federal Government. The surprise wasn't in Schmidt's response (which was "no"), but the fact that everyone in the room laughed at Lehrer's suggestion.

Webmaster's Commentary: 

Yeah, I kinda lean towards "no" myself.

Jul 12 09:36

ISRAELI ‘THOUGHT POLICE’ DECLARE ALL OUT WAR ON THE WEB

The Foreign Ministry unveiled a new plan this week: Paying talkbackers to post pro-Israel responses on websites worldwide. A total of NIS 600,000 (roughly $150,000) will be earmarked to the establishment of an “Internet warfare” squad.

Webmaster's Commentary: 

This will backfire, because the web will now simply assume that ALL pro-Israel commentary is paid propaganda.

Jul 12 09:24

Computers in U.S. Linked to Cyber Attack

The countries include South Korea, the United States, Japan and Guatemala, Chung Chin-sup, a member of the parliamentary intelligence committee, told reporters.

But the spy agency cautioned it was too early to conclude that North Korea was responsible as the investigations were still under way, according to Park Young-sun, another member of the intelligence committee.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA