COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED

COMPUTERS/INTERNET/SECURITY

Jan 12 14:00

Third malware strain discovered in SolarWinds supply chain attack

Cyber-security firm CrowdStrike, one of the companies directly involved in investigating the SolarWinds supply chain attack, said today it identified a third malware strain directly involved in the recent hack.

Named Sunspot, this finding adds to the previously discovered Sunburst (Solorigate) and Teardrop malware strains.

Jan 12 11:50

Twitter blacklists European MEDICAL JOURNAL after it published study on ivermectin treatment for Covid-19

Twitter has blocked a link to an article in a peer-reviewed scientific journal that suggested the antiparasitic drug ivermectin could be useful against Covid-19. The platform claims the journal's website is “potentially unsafe.”

Twitter user Karl Denninger (@TickerGuy) posted a link to an observational study in the European Journal of Medical and Health Sciences that found healthcare workers in Dhaka, Bangladesh who were treated with ivermectin as pre-exposure prophylaxis (PreP) were markedly less likely to become infected with Covid-19. Just 6.9 percent of those given the drug tested positive for Covid-19, while a whopping 73.3 percent of those who did not became infected.

Jan 12 11:27

DarkSide ransomware decryptor recovers victims' files for free

Romanian cybersecurity firm Bitdefender has released a free decryptor for the DarkSide ransomware to allow victims to recover their files without paying a ransom.

Jan 12 06:51

Google My Business Post | All You Need to Know

The Google My Business Posts feature helps you collaborate with current and potential customers via your Google Search Business Profile and Maps via posts. You can create and share directly with your customer's updates, deals, new or popular products in stock, or event information.

Advantages of Google My Business Post

When clients have more access to your business information and news, they then make better choices while browsing.

It enables you to:

  • Communicate with your regular consumers directly.
  • Enhance customer experience with timely and accurate information.
  • Promote sales, offers, events, news, and deals for you.
  • Engage your customers via videos and photos.
  • How does it work?

    For the promotion of business profiles, posts often include text, photographs, or videos.

    They're visible for users by:

    Jan 11 18:27

    Elon Musk: People Are Going to be 'Super Unhappy' With Big Tech As 'The De Facto Arbiter of Free Speech'

    Elon Musk, who became the world's richest man last week, is against Big Tech censorship.

    Jan 11 17:51

    Millions of WhatsApp users ABANDON the app and switch to rivals Telegram or Signal ahead of privacy policy update that will force them to share their personal data with Facebook

    The update, which will be released on February 8, affects WhatsApp users in all countries outside of Europe and the UK, where there are strict data protection laws.

    Users in these regions will be required to give their consent for Facebook to access their data, including their phone numbers and information about how they interact with others, in order to continue using the app.

    The requirement will apply regardless of whether or not the WhatsApp user has a Facebook account.

    The news has led many people to jump ship to rival apps, according to data from Sensor Tower.

    When the privacy policy changes were announced on January 7, Telegram picked up nearly 1.7 million downloads and Signal gained 1.2 million downloads, while WhatsApp, which usually dominates, gained just 1.3 million downloads.

    WhatsApp installations also fell approximately 13 per cent to 10.3 million downloads in the first seven days of January, compared to the seven days prior.

    Jan 11 16:18

    Free Speech Platform Gab Reports 750% Increase in Traffic

    In response to the surge in traffic, Gab founder and CEO Andrew Torba gave a concise comment simply stating:

    “Checkmate, Silicon Valley.”

    Jan 11 15:54

    AR15.com, The World's Largest Gun Forum, Knocked Offline After Being 'Booted' From GoDaddy

    The world's largest gun forum was knocked offline on Monday after reportedly being "booted" from the domain registrar GoDaddy.

    Jan 11 14:41

    Google vs DuckDuckGo

    Jan 11 13:30

    Using the internet without the Amazon Cloud

    Amazon servers make up so much of the internet that it can be hard to separate the two. As of last year, Amazon Web Services controlled roughly 40 percent of the cloud market, running the backend for Netflix, Pinterest, Slack and dozens of other services with no visible connection to the company. Because the Amazon partnership is rarely explicit, AWS becomes a kind of invisible infrastructure, like water mains, submarine cables, or any of the other hidden pipes we rely on without seeing.

    When AWS starts to fail — like it did in March and again in June — it can seem like the entire internet is collapsing. Unless you know which services in particular are running on AWS servers, you won’t know difference between an cloud failure and a submarine cable break.

    Jan 11 08:45

    Hacker reveals massive Parler data leak: ALL users’ messages, location info and even driver’s licenses may have been exposed

    Recently shutdown social media app Parler is at the center of a yet another controversy, after allegations surfaced that the totality of its users' personal data was leaked in the wake of the network going offline.

    Parler, a social network popular with conservative audiences, was removed from the internet on Monday, after Amazon kicked the site off its hosting service, citing"a steady increase in this violent content" in the wake of Wednesday's riot at the US Capitol. The decision to pull support came after Apple and Google blocked the social network from their online marketplaces over the weekend.

    Shortly before Amazon's move, a self-described hacker from Austria, going by 'Donk Enby' on Twitter, claimed to have gained access to all of the "unprocessed, raw" video files uploaded to Parler "with all associated metadata." The hacker even included a link to the file library in order to prove that the data leak was real.

    Jan 11 08:44

    IPFS: Interplanetary file storage!

    Jan 11 08:27

    The Guy Who Built The World Wide Web Is Building A 'New Internet', Where You Control Your Data

    Unless you've been living under a rock, you know Tim Berners-Lee is a pretty important dude in the technology world. He's the father of the Internet, responsible for the birth of the World Wide Web as we know it.

    And he hates what it has become. So he's taking some action to fix it.

    You see, for years now Berners-Lee has expressed his distaste at how major corporations have taken what was supposed to be a free environment and placed restrictions on it. He doesn’t like how groups like Facebook, Google, and Amazon have effectively centralized the Internet, nor how they control people’s data. So he’s instead working on a new platform and startup that’s declaring war on Big Tech.

    Jan 11 08:12

    Twitter Plunges After Trump Ban; Parler Site Taken Offline

    As it turns out, Wall Street isn't happy with Twitter's decision to permanently ban President Trump, one of the service's high-profile users. Analysts are afraid the decision could expose Twitter to more regulation, as Mirabaud analyst Neil Campling said the ban could open Twitter up to more regulation under the next administration now that the platform is clearly making editorial decisions about what type of political content is, and isn't, appropriate.

    Traders are clearly worried, as Twitter shares are down 7% in premarket trade, building on losses from after-hours trading on Friday, as well as Sunday night.

    Jan 11 03:38

    Executive Order on Imposing Certain Sanctions in the Event of Foreign Interference in a United States Election

    "By the authority vested in me as President by the Constitution and the laws...". (Issued on: September 12, 2018)

    Jan 11 03:32

    Situation Update, Dec. 3rd – Trump invokes foreign interference provision of his 2018 executive order, authorizing military response to cyber warfare, see NSPM 13

    And under the 2018 EO, each of the entities engaging in this behavior will have all their assets seized by the U.S. Treasury. Translated into plain language, this means that Twitter, Facebook, CNN, the Washington Post, Google, MSNBC, etc., are all now able to be completely seized, shut down or taken over by the Trump administration, as they all engaged in the defined behaviors outlined in the 2018 EO, which Trump just cited. (12/4/20)

    Jan 10 12:16

    AS CONSERVATIVES FLOCK TO ITS PLATFORM, PARLER KICKED OFF AMAZON SERVERS AND APPLE STORE

    Parler’s chief executive said Saturday night that the social media app was suspended from Apple’s store and will be thrown off Amazon’s servers in a standoff over censoring content.

    Jan 09 17:17

    Parler Faces Extinction As Amazon Employees Demand AWS Stop Hosting

    A coalition of Amazon corporate employees have demanded that the Seattle-based megacorp kick Parler off the Amazon Web Services (AWS) platform unless 'posts inciting violence' are removed, which would force the Trump-friendly Twitter competitor to find another host.

    According to CNBC, an employee advocacy group - Amazon Employees for Climate Justice - said in a Saturday tweet that AWS should "deny Parler services until it removes posts inciting violence, including at the Presidential inauguration."

    Jan 09 08:58

    Convicted Pedophile Marty Weiss Meets Twitter's Standards

    Twitter has standards. Many registered Republicans don't meet these standards. Convicted child rapists like Marty Weiss meet Twitter's community standards.

    Jan 08 12:51

    How Often Should You Reboot Your Computer?

    It’s probably the first thing you try when your computer is acting up: turn it off and back on again. But should you restart or shut down? Well that actually depends on what kind of computer you are using. Shutting down your computer will close out of all the programs you’ve been running and clear the cache, so that when you power back up, the machine is running fresh, as there may have been something in the background that was causing it to move sluggishly (or worse).

    Jan 08 11:52

    Cybersecurity: This 'costly and destructive' malware is the biggest threat to your network

    A spam campaign which targeted over 100,000 users a day over Christmas and New Year has seen Emotet secure its spot as the most prolific malware threat.

    Analysis by cybersecurity company Check Point suggests that Emotet was used to target seven percent of organisations around the world during December.

    Emotet has been active since 2014 and is regularly updated by its authors in order to maintain its effectiveness. The malware started life as a banking trojan but has evolved to become much more than that, providing a complete backdoor onto compromised machines which can then be sold on to other cyber criminals to infect victims with additional malware – including ransomware.

    Jan 07 12:33

    Major ISP Cox Begins Throttling Entire Neighborhoods for 'Excessive Usage'

    Major ISP Cox Communications has begun throttling the connections of entire neighborhoods for what the ISP deems "excessive usage." More specifically, the ISP has begun severely throttling the upstream connections of internet users who consume too much bandwidth for the ISP's liking, even if those users have paid the company extra for faster, unrestricted service.

    Despite ISPs making it repeatedly clear that their networks are handling COVID-19 related strain very well, complaints about the new restrictions have been popping up at Reddit over the last month. While Cox confirmed to Ars Technica that it had started throttling the upstream speeds of entire neighborhoods, it wasn't willing to clarify how many neighborhoods are impacted and just how much data is deemed "excessive" by the cable giant:

    Jan 07 09:54

    SolarWinds fallout: DOJ says hackers accessed its Microsoft O365 email server

    The US Department of Justice confirmed today that the hackers behind the SolarWinds supply chain attack targeted its IT systems, where they escalated access from the trojanized SolarWinds Orion app to move across its internal network and access the email accounts of some of its employees.

    "At this point, the number of potentially accessed O365 mailboxes appears limited to around 3-percent and we have no indication that any classified systems were impacted," DOJ spokesperson Marc Raimondi said in a short press release published earlier today.

    With DOJ employee numbers estimated at around 100,000 to 115,000, the number of impacted DOJ employees is currently believed to be around 3,000 to 3,450.

    The DOJ said it has now blocked the attacker's point of entry.

    Jan 07 07:21

    The Deep State Will Not Dial Down Hacking

    The events surrounding the SolarWinds supply chain breach raise questions about the efficacy of American intelligence services. But going down that rabbit hole is the last thing that the Deep State wants to do. Those intrepid souls who do poke around and ask hard questions typically end up like Congressman Otis Pike; quashed and condemned to obscurity. So maybe it’s no surprise that voices in the commentariat are performing an op-ed kabuki which positions the debate atop a neatly conscribed set of assumptions. Thus avoiding topics that elites might find threatening.

    Full of Sound and Fury

    Jan 05 17:25

    TalkRadio: YouTube reverses decision to ban channel

    YouTube has reinstated TalkRadio's channel on its platform hours after saying it had been "terminated" for breaking the tech firm's rules.

    It said the broadcaster had posted material that contradicted expert advice about the coronavirus pandemic.

    But it explained its U-turn saying it sometimes made exceptions to guidelines that state repeat offenders face a permanent ban.

    TalkRadio said it had yet to be given a full explanation for the affair.

    Jan 05 11:21

    Microsoft plans 'sweeping' design changes to show that Windows 'is back'

    A Microsoft job posting for a Windows software engineer backs up hints that the company is planning a major overall of the Windows interface that's expected to arrive in the second half of 2021.

    Windows Latest spotted the job posting this week, which was posted by Microsoft in October, around the time rumors of its major Sun Valley update for Windows 10 started circulating.

    The job description appears to support reports that the Windows 10 20H2 update will indeed be as major as reported with plans at Microsoft to tell the world that "Windows is BACK".

    Jan 05 05:44

    Not even a ‘highly likely’? Cybersecurity group admits SolarWinds hack came FROM WITHIN THE US, but doubles down on blaming Russia

    Internet security firm FireEye has revealed the enormous SolarWinds hack that left upwards of 250 agencies and businesses unprotected for weeks was launched from inside the US – but that hasn’t stopped them from blaming Moscow.

    The mega-hack, which affected 250 networks including US government agencies, went undetected by Washington’s security systems because it originated within the US, FireEye told the New York Times. But while one might expect this revelation to pour cold water on the metastasizing, baseless claims that Russia was responsible for the intrusion, speculation about the country’s role has only increased.

    Jan 04 12:02

    Five iOS bugs and annoyances Apple needs to fix in 2021

    With every iOS update, I become increasingly convinced that the platform has outgrown Apple's ability to manage it.

    It feels like Apple is more focused on new features than actually fixing and streamlining the platform, and there are aspects of the platform that have seen little to no love in years.

    Jan 04 11:13

    Beware: PayPal phishing texts state your account is 'limited'

    A PayPal text message phishing campaign is underway that attempts to steal your account credentials and other sensitive information that can be used for identity theft.

    When PayPal detects suspicious or fraudulent activity on an account, the account will have its status set to "limited," which will put temporary restrictions on withdrawing, sending, or receiving money.

    A new SMS text phishing (smishing) campaign pretends to be from PayPal, stating that your account has been permanently limited unless you verify your account by clicking on a link.

    Jan 04 11:06

    Backdoor account discovered in more than 100,000 Zyxel firewalls, VPN gateways

    More than 100,000 Zyxel firewalls, VPN gateways, and access point controllers contain a hardcoded admin-level backdoor account that can grant attackers root access to devices via either the SSH interface or the web administration panel.

    The backdoor account, discovered by a team of Dutch security researchers from Eye Control, is considered as bad as it gets in terms of vulnerabilities.

    Jan 04 10:45

    New Video Shows Dominion’s Eric Coomer Admitting Their Voting Machine Systems Are Wireless and Support All Networks

    Dr. Eric Coomer who is responsible for the strategy and Security at Dominion Voting Systems.

    Coomer is a staunch Never-Trumper and Antifa supporter. His Facebook page was littered with Trump-hating propaganda before it was shut down.

    In 2016 Coomer told the Illinois States Board of Elections that it was possible to bypass election systems software.

    Jan 03 10:23

    Adobe Flash Player is finally dead, for real this time

    The Adobe Flash Player plug-in has been officially discontinued, more than a decade after its death warrant was issued by Apple at the original iPhone launch.

    The web browser tool, which brought games, videos, animations and a whole lot of advertisements to the web has now been laid to rest by the software maker.

    Jan 03 10:22

    ELASTIC DIAMONDS COULD HELP QUANTUM COMPUTERS RUN AT ROOM TEMPERATURE

    DIAMONDS ARE ABOUT to have a new best friend.

    Prized by jewelers for its hard exterior and sparkling interior, engineers also fancy them for their electronic properties. Now, scientists have found a way to grow diamonds in the lab that can be stressed and strained — without losing their shape — to give them special, electricity-conducting properties.

    A hundred times thinner than a human hair, these stretchy diamonds can bend up to 10 percent its original shape before springing back — all at a balmy room temperature.

    WHY IT MATTERS — In addition to being tough, diamonds are highly conductive when it comes to both electricity and heat. By creating stretchy diamonds in the lab, the scientists hope to improve upon these features and get them into next-gen electronics — including quantum computer chips.

    Their findings were published Thursday in the journal Science.

    Dec 31 06:50

    BREAKING: DOMINION MACHINES HACKED LIVE IN GEORGIA RUNOFF! Voter Fraud Senate Hearing 12/30/2020

    Dec 31 06:38

    THE CYBERPANDEMIC HAS BEGUN: SOLARWINDS + FIREEYE - ANYTHING CAN HAPPEN NOW

    Dec 31 06:35

    Germany: 'Colossal' cyberattack knocks out Funke news group

    Hackers knocked out one of Germany's biggest news organizations over the Christmas holiday. Such criminal attacks, which often come with ransom demands, have become a lucrative business model.

    One of the biggest media organizations in German-speaking territories has become the victim of a sustained cyberattack over the Christmas holiday, forcing several newspapers to cancel or offer severely curtailed "emergency" editions. The attack, which is still ongoing, began last Tuesday.

    The Funke Media Group, which publishes dozens of newspapers and magazines and runs several local radio stations and online news portals, said on Monday that some 6,000 of its computers had been "potentially infected" in the attack, which had affected several central computer systems at all its locations in Germany.

    Dec 30 08:53

    US Future Military Robots - DARPA Boston Dynamics - SKYNET TODAY

    Webmaster's Commentary: 

    Definitely not as cool as the dancing robots below.

    Dec 30 08:52

    3 Cool Military Robots You Didn't Know Existed.

    Webmaster's Commentary: 

    Not as cool as the dancing robots below.

    Dec 30 07:37

    Do You Love Me?

    Webmaster's Commentary: 

    They seems so playful and harmless....

    Dec 29 08:48

    Advanced Israeli malware: no interaction, no trace

    There is advanced Israeli malware that can hack into your device without requiring you to interact with it or leaving a visible trace.

    In earlier versions, the malware produced by Israeli spy firm NSO Group required a target to click a link or open a document.

    In more recent versions, the targeted person may still receive a message or phone call containing the malware, but their device can be infected without them having to click on anything.

    None of that is required any longer.

    The phones of dozens of media personnel have been infected with the advanced spyware, the Canadian cybersecurity organization Citizen Lab has revealed.

    Dec 29 07:15

    THE INTERNET OF BODIES (IOB) AND HACKING YOUR DNA

    The technology that Hollywood has presented over the years in dystopian sci-fi fantasies is now a reality. In the very near future, the technocratic overlords of science, health, finance, and Big Tech desire humanity to go from wearable devices to devices embedded within our bodies.

    Dec 27 09:05

    The Curious Case of Seth Rich: Why DNC Staffer's Murder Continues to Stir Up Political Controversy

    DNC staffer Seth Rich's unresolved murder case is still raising questions on both sides of the US political aisle. An American investigative journalist has shed light on the efforts to get to the bottom of the case and the FBI's potential role in investigating the 27-year-old's death.

    Earlier this month, American attorney Ty Clevenger announced on his blog that his years-long search of documents concerning the mysterious murder of 27-year-old DNC employee Seth Rich had eventually borne fruit: after repeated denials, the FBI reportedly admitted that it has over 20,000 pages of records mentioning the victim and, more importantly, his personal laptop currently being under examination by the bureau.

    Dec 25 08:40

    Microsoft, Google join Whatsapp lawsuit vs. Israeli spyware developer

    Israeli spyware developer NSO Group, already under fire for allegedly providing the software used to spy on Jamal Khashoggi before his murder, is now being pursued by multiple US tech giants for its sale of hacking tools to foreign governments. The software was allegedly used to hack the mobile phones of journalists, diplomats and human rights workers.

    Dec 24 17:40

    Free Speech Reddit Alternative Voat Is Shutting Down On Christmas

    The free speech Reddit alternative Voat announced on Tuesday that the site is going to shut down for good on Christmas Day after being up for six years.

    Dec 23 18:41

    Now They Censor Anyone Explaining the Great Reset of Schwab

    These people act like the worse tyrants in history. They will eliminate elections and impose George Soros’ one-world government with the United Nations at the helm.

    Anyone who still refuses to believe the election was rigged simply because they hate Trump, well, you better start paying attention to the people who convinced you to hate Trump, for they have a far worse future in mind for you. The problem is simple. They know that the longer they can prevent people from rising up, the more small businesses will be destroyed, and small businesses employ 70% of the civil workforce. You better wake up, for your children are being condemned, and these people will not allow you to know their evil intentions. These people are committing outright treason against the United States and free society.

    Dec 23 18:15

    A “Brave School World” of Tracking Student Data for “Social Credit”

    By John Klyczek

    From Bill Gates to BigQuery, From Blockchain to Hashgraph

    In my recent article series, I document how the US Department of Education’s emergency COVID rules for “Distance Learning and Innovation” (85 FR 18638) have deregulated the federal requirements for “adaptive learning” and other ed-tech forms of “artificial intelligence” that are now being bankrolled by floods of stimulus money from the Coronavirus Aid, Relief, and Economic Security (CARES) Act.

    I’ve also documented how such CARES-financed ed-tech, including adaptive-learning and socioemotional-feedback technologies, are set up to be data-mined through public-private partnerships that are being funded by the Bill and Melinda Gates Foundation’s campaign to “Reimagine Education.”

    Dec 22 19:35

    EXMO cryptocurrency exchange hacked, loses 5% of total assets

    British cryptocurrency exchange EXMO has disclosed that unknown attackers withdrew almost 5% of its total assets after compromising its hot wallets.

    Hot wallets are Internet-connected and are used by exchanges to temporarily store assets for ongoing transactions and transfers unlike cold wallets (also known as offline or hardware wallets) which have no Internet connection.

    The crypto exchange had a 2273 BTC (nearly $52 million) 24-hour trading volume and 27,795 active traders according to EXMO's website.

    Dec 22 18:58

    U.S. Cryptocurrency Exchange Coinbase Asks FINCEN To Extend Comment Period For Wallet Rules

    By Aaron Kesel

    U.S. cryptocurrency exchange Coinbase has asked the U.S. Treasury Department to extend the comment period on implementation of stringent know-your-customer (KYC) requirements from 15 days to the normal 60 days.

    Coinbase expressed that the Financial Crimes Enforcement Network (FinCEN), an arm of the U.S. Treasury, asked for comments on 24 questions, each requiring detailed analysis and extensive cost assessments. The U.S. based exchange that recently applied for an IPO stated that 15 days wasn’t long enough to provide an adequate response...

    Dec 22 11:08

    Law enforcement take down three bulletproof VPN providers

    Law enforcement agencies from the US, Germany, France, Switzerland, and the Netherlands have seized this week the web domains and server infrastructure of three VPN services that provided a safe haven for cybercriminals to attack their victims.

    The three services were active at insorg.org [2014 snapshot], safe-inet.com [2013 snapshot], and safe-inet.net before the domains were seized and replaced with law enforcement banners on Monday.

    The services have been active for more than a decade, are believed to be operated by the same individual/group, and have been heavily advertised on both Russian and English-speaking underground cybercrime forums, where they were sold for prices ranging from $1.3/day to $190/year.

    Dec 22 10:31

    Cybersecurity expert: SolarWinds hack 'equivalent to nuclear bomb'

    Dec 22 08:08

    Report: gov’t spyware targets phones of Al-Jazeera reporters

    Dozens of journalists at Al-Jazeera, the Qatari state-owned media company, have been targeted by advanced spyware in an attack likely linked to the governments of Saudi Arabia and the United Arab Emirates, a cybersecurity watchdog said Sunday.

    Citizen Lab at the University of Toronto said it traced malware that infected the personal phones of 36 journalists, producers, anchors and executives at Al-Jazeera back to the Israel-based NSO Group, which has been widely condemned for selling spyware to repressive governments.

    Most unnerving to the investigators was that iMessages were infecting targeted cellphones without the users taking any action — what’s known as a zero-click vulnerability. Through push notifications alone, the malware instructed the phones to upload their content to servers linked to the NSO Group, Citizen Lab said, turning journalists’ iPhones into powerful surveillance tools without even luring users to click on suspicious links or threatening texts.

    Dec 22 08:07

    Cyber Attacks by Israeli Spy Firm NSO Group Are a Modern-Day Marketing Campaign

    Spyware and hack tools are not the kind of products that you can advertise on TV or in newspapers, at least not with paid commercials and paid advertisements.

    The only way to really effectively advertise your spyware is by having others talk and write about it in news stories.

    Dec 22 07:49

    Biden’s Chief of Staff Says Response to Hack Will Go Beyond Sanctions

    The incoming White House chief of staff for Joe Biden said on Sunday that the next administration’s response to a recently discovered cyberattack that targeted several government agencies will be more than “just sanctions.”

    “In terms of the measures that a Biden administration would take in response to an attack like this — I want to be very clear — it’s not just sanctions,” Ron Klain told CBS. “It’s also steps and things we could do to degrade the capacity of foreign actors to repeat this sort of attack.”

    Since the hack on the software company SolarWinds was first reported, many in the media and in Congress were quick to blame Russia. Despite a lack of evidence that Moscow was involved, the Biden administration is reportedly mulling ways to retaliate against Russia. Sources told Reuters that options being considered are financial penalties and hacks on Russia’s infrastructure.

    Dec 22 07:20

    Another "Pre-Crime" AI System Claims It Can Predict Who Will Share Disinformation Before It's Published

    We previously have covered the many weighty claims made by the progenitors of A.I. algorithms who claim that their technology can stop crime before it happens. Similar predictive A.I. is increasingly being used to stop the spread of misinformation, disinformation and general “fake news” by analyzing trends in behavior and language used across social media.

    However, as we’ve also covered, these systems have more often that not failed quite spectacularly, as many artificial intelligence experts and mathematicians have highlighted. One expert in particular — Uri Gal, Associate Professor in Business Information Systems, at the University of Sydney, Australia — noted that from what he has seen so far, these systems are “no better at telling the future than a crystal ball.”

    Dec 21 12:41

    US House Intelligence Panel Chief Slams Trump For Blaming China Instead of Russia for Massive Hack

    Several lawmakers on both sides of the aisle previously reiterated accusations levelled by Secretary of State Mike Pompeo, who claimed that it was "pretty clear" that Russia was behind the cyberattack on several government institutions. However, Trump appeared to disagree with him, suggesting that China might be the culprit.

    The chairman of the House Committee on Intelligence, Democrat Adam Schiff, has blasted President Donald Trump in an interview with MSNBC over POTUS’ alleged downplaying of Russia's supposed role in the recent cyberattacks on the US government and pointing the finger at China instead.

    "It [is] just uniformly destructive and deceitful, and injurious [...] to our national security", Schiff said, commenting the president's earlier tweets on the matter.

    Dec 21 12:38

    The Russian ‘Cyber Pearl Harbor’ That Wasn’t

    For almost three decades, we have awaited a mythical “cyber Pearl Harbor,” the harbinger of digital doom that the U.S. cybersecurity community assumes to be inevitable. Strangely enough, some believe this cyber Pearl Harbor already happened twice within the last two months.

    Though warnings of cyber Pearl Harbor emerged as early as 1991, former defense secretary Leon Panetta is perhaps best known for promoting the idea, warning in 2012 of an impending “cyber-Pearl Harbor that would cause physical destruction and the loss of life, an attack that would paralyze and shock the nation.” Such a grand event would be tough to miss.

    Dec 21 12:32

    New SUPERNOVA backdoor found in SolarWinds cyberattack analysis

    While analyzing artifacts from the SolarWinds Orion supply-chain attack, security researchers discovered another backdoor that is likely from a second threat actor.

    Named SUPERNOVA, the malware is a webshell planted in the code of the Orion network and applications monitoring platform and enabled adversaries to run arbitrary code on machines running the trojanized version of the software.

    Dec 21 11:29

    ‘Former’ Communist Comey Got SCORECARD Election Hacking Source Code And Knew SolarWinds Was Not Secure

    The following information was breaking news first revealed LIVE on WVW-TV on Friday night with Lt. General Thomas McInerney, Mary Fanning and Alex Newman.

    FBI Director James Comey demanded that the FBI be given the source code to SCORECARD, the election-hacking application that operates on THE HAMMER surveillance supercomputer platform, as a condition of CIA contractor-turned-whistleblower Dennis L. Montgomery’s 2015 FBI and DOJ immunity agreements, according to Montgomery.

    SCORECARD is an election-hacking cyberweapon designed to monitor and engineer elections. SCORECARD is one of the HAMR exploits designed to run on THE HAMMER framework.

    The American Report was the first news organization to report on SCORECARD, in an article titled “Biden Using SCORECARD and THE HAMMER To Steal Another U.S. Presidential Election — Just Like Obama And Biden Did In 2012,” published on October 31, 2020, three days before the 2020 election.

    Dec 21 11:28

    A second hacking group has targeted SolarWinds systems

    As forensic evidence is slowly being unearthed in the aftermath of the SolarWinds supply chain attack, security researchers have discovered a second threat actor that has exploited the SolarWinds software to plant malware on corporate and government networks.

    Details about this second threat actor are still scarce, but security researchers don't believe this second entity is related to the suspected Russian government-backed hackers who breached SolarWinds to insert malware inside its official Orion app.

    The malware used in the original attack, codenamed Sunburst (or Solorigate), was delivered to SolarWinds customers as a boobytrapped update for the Orion app.

    Dec 21 11:16

    How to check who can access your iPhone, iPad, and Apple accounts

    Apple continues its focus on privacy and security with some new resources on how to protect your devices, accounts, and personal safety. Let’s look at the recommended steps to check who can access your iPhone, other Apple devices, and Apple accounts.

    Apple published its new 20-page support guide called “Device and Data Access When Personal Safety is at Risk.” And whether you’ve got some specific personal safety concerns or are just ready for a privacy and security checkup, following along with the steps below is a great idea.

    We also have a guide on checking the privacy details of iOS apps.

    Dec 21 11:15

    A Massive Fraud Operation Stole Millions From Online Bank Accounts

    RESEARCHERS FROM IBM Trusteer say they’ve uncovered a massive fraud operation that used a network of mobile device emulators to drain millions of dollars from online bank accounts in a matter of days.

    The scale of the operation was unlike anything the researchers have seen before. In one case, crooks used about 20 emulators to mimic more than 16,000 phones belonging to customers whose mobile bank accounts had been compromised. In a separate case, a single emulator was able to spoof more than 8,100 devices.

    The thieves then entered usernames and passwords into banking apps running on the emulators and initiated fraudulent money orders that siphoned funds out of the compromised accounts. Emulators are used by legitimate developers and researchers to test how apps run on a variety of different mobile devices.

    Dec 21 06:44

    Proof-Of-Fraud: Study Shows Biden Won The 'Dominion Machine Vote' By 5.6% Consistently

    Democratic presidential nominee Joe Biden outperformed in counties that use the Dominion or HART InterCivic voting machines, according to a data analyst.

    “Analysis evidence suggests the use of the Dominion X/ICX BMD (Ballot Marking Device) machine, manufactured by Dominion Voting Systems, and machines from HART InterCivic appear to have abnormally influenced election results,” the data analyst wrote in a report that was published on Thursday.

    The data analyst, who wished to remain anonymous for safety reasons, has 30 years of practice in data analysis.

    Dec 21 06:38

    UK defence chief says he wants to beat Russia & China ‘at their own game’ with focus on ‘?yber escalation’ below war threshold

    The UK needs to “beat” Russia and China “at their own game”, General Sir Nick Carter, Britain’s defence chief, told the Times newspaper after outlining an ‘up-to-date’ strategy that appears to be rooted in Cold War mentality.

    Cyber attacks, asymmetric conflicts and digital surveillance – the list of “threats” and “challenges” posed to the UK and its allies by an assertive Russia and China appears to be long, at least in the mind of the British top brass. General Sir Nick Carter defined Moscow as an “acute threat” and called China a “chronic challenge” in an interview with the Times.

    Dec 21 06:36

    Bill Gertz: Leaked Database Suggests Widespread CCP Infiltration; China Silences Hong Kong Activists

    Dec 20 07:18

    Trump Says Voting Machines May Have Been Breached by SolarWinds Hack During Election

    President Donald Trump said on Saturday that voting machines may have been hacked during the November election.

    “There could also have been a hit on our ridiculous voting machines during the election,” he wrote in a Twitter post.

    The president apparently was referring to the SolarWinds hack which caused a number of government agencies to be compromised.

    He said the hack is not as big as it’s reported.

    “The Cyber Hack is far greater in the Fake News Media than in actuality,” he wrote. “I have been fully briefed and everything is well under control.”

    Dec 20 06:34

    Some German Companies Made Use of SolarWinds’ Hacked Software, Report Says

    Reuters reported earlier that hackers said to be backed by a foreign state stole data from several government agencies, as many, including US authorities, rush to claim that Russia is behind the sophisticated hack. Moscow has hit back, observing that there is no proof to this end and bringing up earlier calls for cooperation in the cyber sphere.

    German companies and institutions use software developed by the American firm SolarWinds, whose clients, including US federal agencies, recently fell victim to hacking attacks, a representative for Germany’s Federal Office for Information Security (BSI) shared with the tabloid Bild.

    According to the German agency’s estimates, the number of those German firms currently suffering from the cyber attack is “insignificant”.

    Dec 20 06:29

    Trump lashes out at media for blaming ‘Russia, Russia, Russia’ for hacking, says it ‘may be China’

    President Donald Trump has broken with the media and his own Secretary of State, brushing aside allegations that Russia was behind a massive computer hack. Trump instead claimed that the real culprit could be Beijing.
    “The Cyber Hack is far greater in the Fake News Media than in actuality,” Trump tweeted on Saturday, adding that “everything is well under control.”

    Dec 19 09:25

    Latest iOS update shows all the ways Facebook tracks you. There are a lot.

    Knowing Facebook tracks everything you do is one thing, but actually seeing it? Oof.

    Apple officially launched iOS 14.3 Monday, and with it came an update to the App Store that promises to forever change the way you look at your downloads. Now, when you pull up an app, Apple offers a detailed list of "how developers may handle your data[.]" And when it comes to Facebook's family of apps, oh, man, do they ever handle it.

    Facebook, of course, owns both Instagram and WhatsApp (as well as Oculus and scores of other name-brand services). But let's look at just the main Facebook app first. Here, for your viewing pleasure, is user data which Facebook confirmed to Apple its "privacy practices may include handling[.]"

    Fair warning: It's a lot. From the (hopefully) obvious like your phone number and contacts, to the more eyebrow raising like your "precise location," "sensitive info," "audio data," and "emails or text messages," Facebook has its fingers in a lot of your pies.

    Dec 18 12:41

    Senators Liken Hack To "Russian Invasion" As Biden Vows Retaliation

    Despite the lack of evidence that Russia was behind a massive hack that appears to have targeted several US government agencies, US senators are calling for retaliation against Moscow, even likening the cyberattack to an "invasion".

    "This is virtually a declaration of war by Russia on the United States and we should take that seriously," Senator Dick Durbin (D-IL) said in an interview with CNN on Wednesday. On Thursday, Durbin called for a response against Moscow on the Senate floor, describing the hack as a "virtual invasion."

    "No, I’m not calling for an invasion myself or all-out war. I don’t want to see that happen, but it’s no longer a buddy-buddy arrangement between the United States and Vladimir Putin," he said on Thursday. "When adversaries such as Russia torment us, tempt us, breach the security of our nation, we need to respond in kind."

    Dec 18 09:58

    Nuclear weapons agency breached amid massive cyber onslaught

    The Energy Department and National Nuclear Security Administration, which maintains the U.S. nuclear weapons stockpile, have evidence that hackers accessed their networks as part of an extensive espionage operation that has affected at least half a dozen federal agencies, officials directly familiar with the matter said.

    On Thursday, DOE and NNSA officials began coordinating notifications about the breach to their congressional oversight bodies after being briefed by Rocky Campione, the chief information officer at DOE.

    Dec 18 09:53

    Microsoft says it identified 40+ victims of the SolarWinds hack

    Microsoft said it identified more than 40 of its customers that installed trojanized versions of the SolarWinds Orion platform and where hackers escalated intrusions with additional, second-stage payloads.

    The OS maker said it was able to discover these intrusions using data collected by Microsoft Defender antivirus product, a free antivirus product built into all Windows installations.

    Dec 18 08:51

    Hackers use fake media domains to trick North Korea researchers

    In a fresh attempt to steal passwords from researchers working on North Korea, hackers have registered domains that resemble web addresses from legitimate media organizations in order to send highly targeted emails to selected victims. An email obtained and analyzed by NK News on Thursday was sent from VOAKoreas.com — a domain that was registered less than four months ago and is not affiliated with Voice Of America (VOA). The email had a subject line of “[VOA Media] Inquiry” and claimed to come from VOA anchor Eunjung Cho. The email, which was sent to a DPRK expert who requested anonymity

    Dec 18 08:15

    Senators Liken Hack to Russian Invasion Despite Lack of Proof Moscow Was Involved

    Despite the lack of evidence that Russia was behind a massive hack that appears to have targeted several US government agencies, US senators are calling for retaliation against Moscow, even likening the cyberattack to an invasion.

    “This is virtually a declaration of war by Russia on the United States and we should take that seriously,” Senator Dick Durbin (D-IL) said in an interview with CNN on Wednesday. On Thursday, Durbin called for a response against Moscow on the Senate floor, describing the hack as a “virtual invasion.”

    “No, I’m not calling for an invasion myself or all-out war. I don’t want to see that happen, but it’s no longer a buddy-buddy arrangement between the United States and Vladimir Putin,” he said on Thursday. “When adversaries such as Russia torment us, tempt us, breach the security of our nation, we need to respond in kind.”

    Dec 18 08:06

    Israeli spy firm suspected of accessing global telecoms via Channel Islands

    The Israeli private intelligence company Rayzone Group appears to have had access to the global telecommunications network via a mobile operator in the Channel Islands in the first half of 2018, potentially enabling its clients at that time to track the locations of mobile phones across the world.

    Invoices seen by the Guardian and the Bureau of Investigative Journalism suggest Rayzone, a corporate spy agency that provides its government clients with “geolocation tools”, used an intermediary in 2018 to lease an access point into the telecoms network via Sure Guernsey, a mobile operator in the Channel Islands.

    Such access points, known in the telecoms industry as “global titles”, provide a route into a decades-old global messaging system known as SS7, which allows mobile operators to connect users around the world. It is not uncommon for mobile companies to lease out such access.

    Dec 18 07:46

    ANOTHER "PRE-CRIME" AI SYSTEM CLAIMS IT CAN PREDICT DISINFORMATION BEFORE IT'S EVEN SHARED

    We previously have covered the many weighty claims made by the progenitors of A.I. algorithms who claim that their technology can stop crime before it happens. Similar predictive A.I. is increasingly being used to stop the spread of misinformation, disinformation and general “fake news” by analyzing trends in behavior and language used across social media.

    However, as we’ve also covered, these systems have more often that not failed quite spectacularly, as many artificial intelligence experts and mathematicians have highlighted. One expert in particular — Uri Gal, Associate Professor in Business Information Systems, at the University of Sydney, Australia — noted that from what he has seen so far, these systems are “no better at telling the future than a crystal ball.”

    Dec 18 07:44

    AI TAKES AUTONOMOUS CONTROL TO FLY U-2 SPY PLANE MISSION

    On December 15, the United States Air Force successfully flew an AI copilot on a U-2 spy plane in California, marking the first time AI has controlled a U.S. military system. In this Popular Mechanics exclusive, Dr. Will Roper, the Assistant Secretary of the Air Force for Acquisition, Technology and Logistics, reveals how he and his team made history.

    For Star Wars fans, an X-Wing fighter isn’t complete without R2-D2. Whether you need to fire up converters, increase power, or fix a broken stabilizer, that trusty droid, full of lively beeps and squeaks, is the ultimate copilot.

    Teaming artificial intelligence (AI) with pilots is no longer just a matter for science fiction or blockbuster movies. On Tuesday, December 15, the Air Force successfully flew an AI copilot on a U-2 spy plane in California: the first time AI has controlled a U.S. military system.

    Dec 18 07:29

    A microchip-based program backed by Bill Gates is tracking the COVID status of millions

    Dec 18 06:58

    The worst bugs in the top programming languages

    Veracode has released the 11th volume of its annual State of Software Security report, and its findings reveal that flawed applications are the norm, open-source libraries are increasingly untrustworthy, and it's taking a long time to patch problems.

    The report found a full 76% of apps contained flaws, and 24% of apps have flaws considered highly severe. Some 70% of apps are inheriting security flaws from their open-source libraries, but it's important to note that only 30% of apps have more security bugs in their open-source libraries than in code written in-house, suggesting that it isn't solely open-source projects that are to blame.

    Open-source libraries are a massive attack surface due to their ubiquity, Veracode said in the report. It also pointed out that there's no correlation between the quality of in-house code and open-source bugs, highlighting that developers should be verifying the safety of open-source libraries no matter how good they think their own code is.

    Dec 18 03:24

    White House activates cyber emergency response

    The action is rooted in a presidential directive issued during the Obama administration known as PPD-41, which establishes a Cyber Unified Coordination Group (UCG) that is intended to help the U.S. government coordinate multiple agencies’ responses to the significant hacking incident.

    Dec 17 13:42

    Computer Memory Can Be Made to Speak in Wifi, Researcher Discovers

    A new theoretical exploit called Air-Fi can turn a secure, air-gapped computer into a wifi transmitter that can help a hacker exfiltrate secure data.

    An air-gapped computer is a computer that is completely disconnected from any network. Many air-gapped machines have every possible network feature removed, from wifi to Bluetooth, but this exploit shows that hackers can use DDR SDRAM buses “to generate electromagnetic emissions in the 2.4 GHz Wi-Fi bands and encode binary data on top of it,” according to the researcher Mordechai Guri of the Ben-Gurion University of the Negev, Israel.

    “This technique required high levels of skills from the attacker, in both design and implementation,” said Guri in an email. “However, there are simpler covert exfiltration channels for conventional IT environments in the wild. This one is focusing on leaking data from air-gapped computers where the traditional network-based covert channels fail.”

    Dec 17 13:42

    40 GirlsDoPorn victims sue Pornhub for hosting “sex trafficking” videos

    Forty Jane Does who say they were victims of GirlsDoPorn sued Pornhub yesterday for at least $2 million each, alleging that Pornhub hosted videos despite knowing that "GirlsDoPorn was a sex trafficking venture."

    The lawsuit was filed against Pornhub and Pornhub owner MindGeek in US District Court for the Southern District of California. The complaint asks for "compensatory damages in an amount that exceeds one million dollars for each plaintiff," plus another $1 million or more, each, in punitive damages.

    While they were separate businesses, many of the videos produced by GirlsDoPorn were uploaded to and hosted on Pornhub. The lawsuit alleges that "as early as 2009, and definitely by fall 2016, MindGeek knew GirlsDoPorn was trafficking its victims by using fraud, coercion, and intimidation as part of its customary business practices to get the women to film the videos."

    Dec 17 13:41

    How and when to shoot with Apple’s hidden new photo format

    This week, Apple introduced iOS 14.3. Tucked in with its typical array of bug fixes and new features, the company rolled out its new ProRAW photo format for the iPhone 12 Pro and Pro Max. It’s not on by default—you’ll have to go into Settings > Camera > Formats > Apple ProRAW to enable it—but it could open up a lot more potential from your smartphone photos once enabled.

    What is a raw photo?

    Dec 17 13:36

    Twitter Says It Will REMOVE All Posts Claiming Vaccines Can Harm People

    Twitter has declared that it will remove all posts that suggest there are any “adverse impacts or effects of receiving vaccinations,” despite reports already emerging of health workers getting sick from taking Pfizer’s coronavirus shot.

    Twitter announced that beginning next week it will memory-hole any posts that “invoke a deliberate conspiracy” or “advance harmful, false, or misleading narratives” about vaccines.

    “Using a combination of technology and human review, we will begin enforcing this updated policy on December 21, and expanding our actions during the following weeks,” the company proclaimed.

    Twitter added that it will be monitoring posts about vaccinations “in close consultation with local, national, and global public health authorities around the world.”

    Dec 17 13:23

    Part human, part machine: is Apple turning us all into cyborgs?

    At the beginning of the Covid-19 pandemic, Apple engineers embarked on a rare collaboration with Google. The goal was to build a system that could track individual interactions across an entire population, in an effort to get a head start on isolating potentially infectious carriers of a disease that, as the world was discovering, could be spread by asymptomatic patients.

    Delivered at breakneck pace, the resulting exposure notification tool has yet to prove its worth. The NHS Covid-19 app uses it, as do others around the world. But lockdowns make interactions rare, limiting the tool’s usefulness, while in a country with uncontrolled spread, it isn’t powerful enough to keep the R number low. In the Goldilocks zone, when conditions are just right, it could save lives.

    Dec 17 13:04

    Major Google outage highlights company’s influence, prompts questions of Great Reset cyber attack

    In the last two days, Google services have suffered major outages, rendering users across the world unable to use the platform. The system failures highlight the manner in which people have come to rely on the platform, despite it spying on its users, along with raising questions about cyber attack relating to the globalist “Great Reset.”

    On Monday, Google services dropped for about an hour shortly before 7am EST, as the company’s various online services underwent a huge outage. The Google Workspace Dashboard outlines the extent of the issue, with popular services such as Gmail, Google Drive, Maps, Classroom, and YouTube unusable.

    Dec 17 13:03

    German Cabinet Passes 5G Security Bill Avoiding Huawei Ban

    The German government approved an IT security bill on Wednesday that does not explicitly ban Huawei from supplying components for its 5G high-speed internet.

    The legislation, which will now go to parliament, requires that suppliers guarantee their equipment will not be used for spying. Washington has threatened to stop sharing intelligence with Germany if it does not bar the Chinese tech giant from its 5G rollout plan.

    Dec 17 12:43

    “Evil mobile emulator farms” used to steal millions from US and EU banks

    Researchers from IBM Trusteer say they’ve uncovered a massive fraud operation that used a network of mobile device emulators to drain millions of dollars from online bank accounts in a matter of days.

    The scale of the operation was unlike anything the researchers have seen before. In one case, crooks used about 20 emulators to mimic more than 16,000 phones belonging to customers whose mobile bank accounts had been compromised. In a separate case, a single emulator was able to spoof more than 8,100 devices, as shown in the following image:

    Dec 17 12:31

    Ultra-thin designer materials unlock quantum phenomena

    A team of theoretical and experimental physicists have designed a new ultra-thin material that they have used to create elusive quantum states. Called one-dimensional Majorana zero energy modes, these quantum states could have a huge impact for quantum computing.

    SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA