COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Sep 23 19:17

Chrome Extension Embeds In-Browser Monero Miner That Drains Your CPU

The authors of SafeBrowse, a Chrome extension with more than 140,000 users, have embedded a JavaScript library in the extension's code that mines for the Monero cryptocurrency using users' computers and without getting their consent.

The additional code drives CPU usage through the roof, making users computers sluggish and hard to use.

Sep 23 15:36

Former Congressman Warns That Foreign Countries Could Bribe The Feds To “Regulate Drudge”

Consider this. As the establishment media continues to push their 24/7 anti-Trump echo chamber, real dangers poised by other countries are going unchecked, with many in the media most likely on board with the idea that top conservative news outlets need to be censored. At this point one can’t help but wonder (and worry) that some form of political censorship of the internet is on the horizon which will most likely be attempted by connecting the amazing success of someone like Matt Drudge to supposed Russian propaganda operations – all in the name of censoring non leftist voices.

Sep 23 10:36

GCHQ Warns of Massive Looming Cyberattack That Will Demand ‘National Response’

UK intelligence agency GCHQ’s National Cyber Security Center has warned the UK will fall victim to a major “preventable” cyberattack, even more severe than the WannaCry strike.

GCHQ’s National Cyber Security Center (NCSC) has warned the UK should be prepared for a major “category one” cyberattack — a major escalation from May’s WannaCry ransomware assault, that hit government servers severely.

The NCSC is aware of connections from multiple UK IP addresses to infrastructure associated with advanced state-sponsored hostile threat actors, who are known to target the energy and manufacturing sectors.

Webmaster's Commentary: 

Lemme guess; the hackers are from Iran, Russia, and North Korea.

Sep 22 15:32

Dear Apple, The iPhone X and Face ID are Orwellian and Creepy

For the company that famously used 1984 in its advertising to usher in a new era of personal computing, it is pretty ironic that 30+ years later they would announce technology that has the potential to eliminate global privacy.

Sep 22 15:16

NBD: Adobe just dumped its PRIVATE PGP key on the internet

It goes without saying that the disclosure of a private security key would, to put it mildly, ruin a few employees' Friday. Armed with the private key, an attacker could spoof PGP-signed messages as coming from Adobe. Additionally, someone (cough, cough the NSA) with the ability to intercept emails – such as those detailing exploitable Flash security vulnerability reports intended for Adobe's eyes only – could use the exposed key to decrypt messages that could contain things like, say, zero-day vulnerability disclosures.

Armed with that info, miscreants could exploit that information to infect victims with malware before Adobe had even considered deploying a patch.

Sep 22 12:49

Court rules Stingray use without a warrant violates Fourth Amendment

Today, the Washington DC Court of Appeals overturned a Superior Court conviction of a man who was located by police using a cell-site simulator, or Stingray, CBS News reports. The court ruled that the defendant's Fourth Amendment rights were violated when law enforcement tracked down the suspect using his own cell phone without a warrant.

Stingrays work by pretending to be a cell tower and once they're brought close enough to a particular phone, that phone pings a signal off of them. The Stingray then grabs onto that signal and allows whoever's using it to locate the phone in question. These sorts of devices are used by a number of different agencies including the FBI, ICE, the IRS as well as police officers.

Sep 22 09:05

One Simple Chart Proves That Facebook Thinks You're A Moron

The chart below demonstrates how the $50,000 worth of ad buys that 'MAY' have been purchased by Russian-linked accounts to run 'potentially politically related' ads compares to the $26.8 billion in ad revenue that Facebook generated in the U.S. over the same time period between 3Q 2015 and 2Q 2017....If $50,000 can swing an entire presidential election can you imagine what $26.8 billion can do?

Sep 22 08:55

Important Details About Situation With SouthFront’s YouTube Channel

Summing up the described events, it becomes clear that SouthFront has faced a preplanned illegal campaign launched by some persons from the YouTube internal team.

SouthFront is waiting results of the investigation of this case by the YouTube staff. We want to know who was responsible for re-uploading/restoration of the video “Foreign Policy Diary ‘War on Terror’ [remastered]”. How was the video restored?

This series of hostile and disingenuous actions, as well as prejudicial treatment of some members of the YouTube staff against SouthFront poses a real threat that SouthFront’s YouTube channel might soon be closed down or frozen. In this case, SouthFront informs that you can watch all SouthFront videos at the project’s website, http://southfront.org

Sep 22 08:43

Jailbreaking your connected coffee machine: The idiocy of things

Pretty much all these things -- with the exception of the Amazon Echo, which uses AWS for virtually everything -- can act as regular dumb devices that can be operated manually in the event they lose connectivity.

But, increasingly, I am starting to see smart devices that not only rely on connectivity for basic functionality but use networking and sensors in order to prevent end-users from actually getting the most out of their devices.

Specifically, I am talking about smart appliances that depend on refillable supplies. In information technology, the most notable offender is Hewlett-Packard small/home office printers, which not only use proprietary ink and toner cartridges that are specific to each model but employ validation technology to determine that the refills are in fact genuine OEM parts, and it will disable third-party cartridges if detected.

Sep 22 06:14

Harvard Study Proves Apple Slows Down old iPhones to Sell Millions of New Models

People have made the anecdotal observation that their Apple products become much slower right before the release of a new model.

Now, a Harvard University study has done what any person with Google Trends could do, and pointed out that Google searches for “iPhone slow” spiked multiple times, just before the release of a new iPhone each time.

The study was performed by student Laura Trucco. The study also compared the results to “Samsung Galaxy slow,” and found that the same spike in searches did not occur before the release of a new Samsung phone.

Sep 22 06:06

The award for worst ISP goes to... it starts with Talk and ends with Talk

Two other big brands, Sky and BT, also in the naughty corner

Sep 21 18:25

Attention adults working in the real world: Do not upgrade to iOS 11 if you use Outlook, Exchange

Kiss your Microsoft email goodbye, for now, if you update

Sep 21 18:20

ISPs May Be Helping Hackers to Infect you with FinFisher Spyware

When the target users search for one of the affected applications on legitimate websites and click on its download link, their browser is served a modified URL, which redirects victims to a trojanized installation package hosted on the attacker's server.

This results in the installation of a version of the intended legitimate application bundled with the surveillance tool.

"The redirection is achieved by the legitimate download link being replaced by a malicious one," the researchers say. "The malicious link is delivered to the user’s browser via an HTTP 307 Temporary Redirect status response code indicating that the requested content has been temporarily moved to a new URL."

This whole redirection process, according to researchers, is "invisible to the naked eye" and occurs without user's knowledge.

Sep 21 17:29

Stock Markets HACKED!

Sep 21 13:50

Computers Rule The Earth

Optional Banner: 
WRH Exclusive
Sep 21 10:28

Apple concedes new watch has connectivity glitch

Apple Inc on Wednesday conceded its latest smartwatch unveiled a week ago has problems with its most important feature: the ability to make phone calls and access data without an iPhone nearby.

Several prominent reviewers said Wednesday they could not recommend the device because of a wifi glitch that causes cellular connectivity problems.

Sep 21 10:24

Apple has confirmed that Bluetooth and Wi-Fi are not fully disabled when toggled off in Control Center on iOS 11.

Even when toggled off in Control Center on an iPhone, iPad, or iPod touch running iOS 11 and later, a new support document says Bluetooth and Wi-Fi will continue to be available for AirDrop, AirPlay, Apple Pencil, Apple Watch, Location Services, and Continuity features like Handoff and Instant Hotspot.

Toggling off Bluetooth or Wi-Fi in Control Center only disconnects accessories now, rather than disabling connectivity entirely.

...

iOS 11 users can still completely disable Wi-Fi and Bluetooth for all networks and devices by toggling them off in the Settings app.

Sep 21 10:05

Are you being watched? FinFisher government spy tool found hiding as WhatsApp and Skype

Legitimate downloads of popular software including WhatsApp, Skype and VLC Player have allegedly being hacked at an internet service provider (ISP) level to spread an dvanced form of surveillance software known as "FinFisher", cybersecurity researchers warn.

FinFisher is sold to global governments and intelligence agencies and can be used to snoop on webcam feeds, keystrokes, microphones and web browsing. Documents, previously published by WikiLeaks, indicate that one tool called "FinFly ISP" may be linked to case.

...

This week (21 September), experts from cybersecurity firm Eset claimed that new FinFisher variants had been discovered in seven countries, two of which were being targeted by "man in the middle" (MitM) attacks at an ISP level – packaging real downloads with spyware.

Companies being hit included WhatsApp, Skype, Avast, VLC Player and WinRAR, it said, adding that "virtually any application could be misused in this way."

Sep 21 09:54

Why didn’t Equifax protect your data? Because corporations have all the power.

The hack revealed how little control consumers have these days.

Sep 21 09:52

More data lost or stolen in first half of 2017 than the whole of last year

More data records were leaked or stolen by miscreants during the first half of 2017 (1.9 billion) than all of 2016 (1.37 billion).

Digital security company Gemalto's Breach Level Index (PDF), published Wednesday, found that an average of 10.4 million records are exposed or swiped every day.

During the first half of 2017 there were 918 reported data breaches worldwide, compared with 815 in the last six months of 2016, an increase of 13 per cent. A total 22 breaches in Q1 2017 included the compromise, theft or loss of more than a million records.

Gemalto estimates less than 1 per cent of the stolen, lost or compromised data used encryption to render the information useless.

Sep 21 09:49

FedEx: TNT NotPetya infection blew a $300m hole in our numbers

FedEx has estimated this year's NotPetya ransomware outbreak cost it $300m in lost business and cleanup costs.

Sep 21 09:47

CCleaner targeted top tech companies in attempt to lift IP

Cisco's security limb Talos has probed the malware-laden CCleaner utility that Avast so kindly gave to the world and has concluded its purpose was to create secondary attacks that attempted to penetrate top technology companies. Talos also thinks the malware may have succeeded in delivering a payload to some of those firms targeted.

The malware that made its way into CCleaner gathers information about its host and sends it to what Talos calls the "C2 server". Whoever is behind the malware then reviews the hosts its code has compromised. It then tries to infect some of those hosts with what Talos characterises as "specialized secondary payloads".

Those payloads sometimes seek out top tech companies: Talos said its examination of code on the C2 server lists targets including Cisco, Microsoft, Sony, Intel, VMware, Samsung, D-Link, Epson, MSI, Linksys, Singtel and the dvrdns.org domain, which resolves to dyn.org.

Sep 21 09:45

You lost your ballpoint pen, Slack? Why's your Linux version unsigned?

Slack is distributing open Linux-based versions of its technology that are not digitally signed, contrary to industry best practice.

The absence of a digital signature creates a means for miscreants to sling around doctored versions of the software that users wouldn't easily be able to distinguish from the real thing.

El Reg learned of the issue from reader Trevor Hemsley, who reported the problem to Slack back in August and only notified the media after a promised fix failed to appear.

"Slack distribute Linux packages for their app and those packages come from a yum repository that does not have a GPG key and the packages are not signed," Hemsley explained.

Sep 21 09:21

Viacom Left Sensitive Data And Secret Access Key On Unsecured Amazon Server

A security researcher working for California-based cyber resiliency firm UpGuard has recently discovered a wide-open, public-facing misconfigured Amazon Web Server S3 cloud storage bucket containing roughly a gigabyte's worth of credentials and configuration files for the backend of dozens of Viacom properties.

These exposed credentials discovered by UpGuard researcher Chris Vickery would have been enough for hackers to take down Viacom's internal IT infrastructure and internet presence, allowing them to access cloud servers belonging to MTV, Paramount Pictures and Nickelodeon.

Among the data exposed in the leak was Viacom's master key to its Amazon Web Services account, and the credentials required to build and maintain Viacom servers across its many subsidiaries and dozens of brands.

Sep 21 08:38

The biggest computer leak in history

Political data gathered on more than 198 million US citizens was exposed this month after a marketing firm contracted by the Republican National Committee stored internal documents on a publicly accessible Amazon server.

The data leak contains a wealth of personal information on roughly 61 percent of the US population. Along with home addresses, birthdates, and phone numbers, the records include advanced sentiment analyses used by political groups to predict where individual voters fall on hot-button issues such as gun ownership, stem cell research, and the right to abortion, as well as suspected religious affiliation and ethnicity. The data was amassed from a variety of sources—from the banned subreddit r/fatpeoplehate to American Crossroads, the super PAC co-founded by former White House strategist Karl Rove.

Sep 21 05:47

Government Sues Citizens for Requesting Information - #NewWorldNextWeek - corbettreport

Published on Sep 21, 2017Welcome to New World Next Week - the video series from Corbett Report and Media Monarchy that covers some of the most important developments in open source intelligence news. This week:

Story #1: Agencies Suing Citizens, Journalists Who Seek Public Records
http://bit.ly/2yf3BQ7

Entire Volume of CIA Files On Lee Harvey Oswald, Set to Be Released in October, Has ‘Gone Missing’
http://bit.ly/2fju1wx

The CIA Preps Their Next JFK Psyop
http://bit.ly/2yr6nmz

Story #2: PM May Warns Tech Firms Over Terror Content
http://bit.ly/2jMe9Eh

Facebook, Google Are ‘Surveillance States’ That Risk Regulation
http://bit.ly/2fbHBy9

Trump, Netanyahu Ready United Assault Against Iran Nuclear Deal
http://bit.ly/2wz57QR

Netanyahu Hails Trump’s ‘Courageous’ UN Speech Blasting Iran
http://bit.ly/2xor3Nx

Netanyahu: Trump Is Changing the World by Supporting Israel
http://bit.ly/2yqHCXq

Sep 20 17:17

England’s second biggest police force STILL runs Windows XP leaving it vulnerable to a Wannacry-type attack

Following a Freedom of Information request, England's second largest police force told the BBC that 1,518 of its computers – representing 20.3 per cent of all devices - ran on Window XP.

This is despite the fact that Microsoft no longer provides support for the operating system, leaving it vulnerable to hackers.

Speaking to the BBC, Dr Steven Murdoch, a cyber-security expert at University College London, said: 'Even if security vulnerabilities are identified in XP, Microsoft won't distribute patches in the same way it does for later releases of Windows.

Sep 20 15:52

For weeks, Equifax customer service has been directing victims to a fake phishing site

Earlier this month, hackers broke into Equifax's servers and stole 143 million people's personal information, including their Social Security numbers. In response to the attack, Equifax set up a website — www.equifaxsecurity2017.com — for possible victims to verify whether they're affected. Because the process involves sharing sensitive information, consumers have to trust they're entering their data in the right place, which can be tricky because the breach-recovery site itself isn’t part of equifax.com. If users end up on the wrong site, they could end up leaking the data they're already concerned was stolen.

Sep 20 11:40

UK Supermarket Becomes World’s First to Offer Cashless Checkout with Finger Vein Scan

By Nicholas West

The march toward a cashless society has now moved from the theoretical to the phase of widespread adoption. This is primarily due to developments in the tech sector that now enable the easy use of biometric recognition systems, as well as the increasing acceptance from a public who is becoming familiar with turning themselves into a password for their personal devices...

Sep 20 10:56

The War On Social Media Is Being Stepped Up

A really social media, one where we can freely express ourselves and where we alone control the content, is the problem. It must be stopped at all costs.

First, it was “fake news”: the suggestion that social media is uniquely damaging to democracy, rather than the corporately owned media that feeds us constant lies, including the egregious deception that WMD existed in Iraq, and selects self-serving political priorities, such as that Russia’s Vladimir Putin is the biggest threat to the planet’s safety (Donald Trump and climate breakdown are far bigger threats right now).

Sep 20 08:29

WAR BEX - Suspected Iranian Hackers Targeted U.S. Aerospace Sector

This time the hackers were only conducting espionage, via job-recruiting links. But researchers worry the group dubbed APT33 has a capability to launch more destructive attacks.

Sep 20 07:37

Alternative Social Network Gab Faces Domain Seizure For Violating “Anti-Discrimination Laws”

By Aaron Kesel

Alternative media social network Gab.ai, whose logo is a frog often used by the "alt right," faces domain seizure for failing to remove content that vilifies "race, religion or ethnic origin." Their registrar further implied that the site promotes hate and discrimination.

Gab’s domain registrar, Asia Registry, has given the network 5 days to transfer its domain or it will be seized according to a notice sent to the company, Andrew Torbha Gab’s CEO tweeted out...

Sep 20 07:12

Itching to stuff iOS 11 on your iPhone? You may want to hold off for a bit

Apps are gonna break. Plus of course, Apple always screws up the first iteration

Sep 20 07:05

Equifax's disastrous Struts patching blunder: THOUSANDS of other orgs did it too

The Equifax breach was the result of a vulnerable Apache Struts component. Software automation vendor Sonatype warns that 3,054 organisations downloaded the same Struts2 component exploited in the Equifax hack in the last 12 months. The affected version of Struts2 was publicly disclosed as vulnerable (CVE-2017-5638) on March 10, and was subsequently exploited at Equifax between May and late July, when the attack was finally detected.

Additionally, more than 46,000 organisations downloaded versions of Struts and/or its sub-projects with known vulnerabilities despite perfectly safe versions being available. Altogether, upwards of 50,000 organisations might be vulnerable to attack.

Sep 19 14:36

The Google Apocalypse Looms

I’ve written about the dangers of monopolies within the drug and agricultural industries on numerous occasions, but Google is perhaps one of the greatest monopolies that ever existed on the planet. The reason why I’ve decided to address Google here is because the technology giant is injecting itself ever deeper into our day-to-day lives, from childhood education to patented meat substitutes1,2 and health care, and with its internet monopoly and personal information tracking and sharing.

Sep 19 10:00

More Equifax Lies? Company Originally Hacked Five Months Earlier Than It Disclosed

Equifax Inc. learned about a major breach of its computer systems in March -- almost five months before the date it has publicly disclosed, according to three people familiar with the situation

Sep 19 10:00

Why Is Google Hiring 1,000 Journalists To Flood Newsrooms Around America?

So what do you do when you fail to elect your chosen candidate and your former political allies and mainstream media turn against you by painting you not as the 'progressive', open-minded, friendly tech company that you used to be but as an evil, racist, Russian-colluding corporate villain intent upon destroying all that is sacred in the world? Well, you just buy the media, of course.

As Poynter notes today, after a series of public relations debacles in recent weeks, from the firing of James Damore to news last week that Google's algos served up some fairly disturbing keywords to potential advertising buyers (e.g. "Why Do Black People Ruin Neighborhoods"), Google is ramping up its media presence with the announcement that the Google News Lab will be working with Report For America (RFA) to hire 1,000 journalists all around the country.

Sep 19 08:46

First they came for the Nazis and pedophiles…

I have to begin this analysis by asking for your understanding for the fact that it will include a lot of full-length quotes. Under normal circumstances, I would have simply provided links, but considering the topic I will be discussing, and how some things suddenly “disappear” on the Internet, full-length quotes is probably the best option. The topic I want to deal with is the brutal crackdown on free speech by the AngloZionist Empire by means of its ‘loyal corporations’.

Sep 19 08:38

iOS 11 release date is tomorrow. Here's how to get your iPhone or iPad ready

SHOULD I WAIT A WHILE BEFORE DOING THE UPGRADE?

There will likely be an update or two to iOS 11 coming down the pipes over the coming weeks, so you might want to wait for the dust to settle and for any last-minute bugs to be squashed before making the leap, especially if you rely on your device.

Sep 19 08:36

Double trouble: This ransomware campaign could infect your PC with two types of file-locking malware

Victims around the world hit by criminals who can switch the malicious payload of emails between Locky and FakeGlobal on a whim.

Webmaster's Commentary: 

Cybercrime is out of control, and is a clear and present danger to the nation's economy .... and the government can't do a thing about it because the cyber criminals are using the exploits mandated into our systems by the NSA and CIA.

Sep 19 08:31

Equifax aftermath: How to protect against identity theft

Who here is scrambling around in the aftermath of the recent breach at Equifax to figure out if you’ve been compromised? Who here is wondering what to do about it if you are? If you’re one of the 143 million Americans whose data was accessed by cybercriminals, then you probably raised your hand.

Even if you weren’t one of the 143 million, you might still want to take some precautions. You could instead be part of the millions of folks who’ve had their data stolen over the course of online history. Basically, if you have a social security number, have ever run a credit check, or have a pulse, you should listen up. Why? Two words: identity theft.

Webmaster's Commentary: 

I had my identity stolen. They sent it back when they saw how much it sucks to be me!

Sep 19 07:42

HP pushes third-party ink blocking printer firmware update (again)

Hewlett Packard (HP) released a new firmware for the company's Officejet printers that appears to block third-party ink from functioning correctly.

The company caused quite the uproar a year ago when it released a firmware for some of its printer families that blocked non-HP cartridges in company printers. HP released a firmware update a month later back then that restored functionality for non-HP printer ink.

The new firmware update that was released on September 13th, 2017 looks like an exact copy of the firmware update released a year ago (on the same day even).

Sep 19 07:38

Microsoft's AI is so good it steered Renault into bottom of the F1 league

Microsoft on Sunday bragged its artificial intelligence technology is behind the, er, success of a massively underperforming Renault Formula One team.

In a poorly timed bit of marketing, the Redmond software giant talked up its partnership with the racing team just as the latter finds itself sitting 433 points behind leader Mercedes.

Microsoft says the Renault team – running 7th out of 10 in the 2017 Formula One Constructor Standings – uses everything from Azure Machine Learning, to Stream Analytics, to Dynamics 365, to help it not win.

Sep 19 07:35

Google's data hoarding is like homeopathy. It doesn't work – study

Boffins find search quality unaffected no matter how much information web giant amasses

Sep 19 07:33

Black screen of death after Win10 update? Microsoft blames HP

Microsoft is pointing the finger of blame at HP's factory image for black screens of death appearing after a Windows Update.

Scores of PC owners took to the HP forums last week to report that Windows 10 updates released September 12 were slowing down the login process. Users stated that once they downloaded the updates and entered their username and password, they only saw black screens for about five to 10 minutes.

The forum members said that clean installs or disabling a service called "app readiness", which "gets apps ready for use the first time a user signs in to this PC and when adding new apps" seemed to fix the delay.

Sep 18 16:10

Equifax Suffered a Hack Almost Five Months Earlier Than the Date It Disclosed

Equifax Inc. learned about a major breach of its computer systems in March -- almost five months before the date it has publicly disclosed, according to three people familiar with the situation.

In a statement, the company said the March breach was not related to the hack that exposed the personal and financial data on 143 million U.S. consumers, but one of the people said the breaches involve the same intruders.

Sep 18 14:38

Pepe the Frog Creator Sends DMCA Take Down to Reddit

... Wants The_Donald to Police Pepe Use... SAD!

Sep 18 12:51

Exclusive: Facebook Silences Rohingya Reports of Ethnic Cleansing

The social network says it’s committed to helping the world ‘share their stories.’ But when people from Burma’s oppressed minority post, their stories have a habit of disappearing.

Sep 18 11:49

GOOGLE, TECH GIANTS THREATEN TO SHUT DOWN ‘FREE SPEECH’ SOCIAL SITE

Search engine giant Google and other tech platforms have threatened to shut down free-speech social media site Gab in the name of fighting “hate speech.”

Gab, a social media platform known as a free speech oasis, was just recently ordered to transfer their Australian domain elsewhere or face shutdown.

“Gab’s domain registrar has given us 5 days to transfer our domain or they will seize it. The free and open web is in danger,” the website tweeted.

Sep 18 10:59

John McAfee accidentally just revealed why Bitcoin is a total fraud: Behold the logic of “artificial work”

However, sir… you called Bitcoin ‘a fraud.’ I’m a Bitcoin miner. We create Bitcoins. It costs over one thousand dollars per coin to create a Bitcoin. What does it cost to create a U.S. dollar? Which one is the fraud? Because [the dollar] costs whatever the paper costs, but it costs me and other miners over a thousand dollars per coin – it’s called ‘proof of work.’

Sep 18 09:43

Vevo Music Video Service Hacked — 3.12TB of Internal Data Leaked

Although it's not clear what prompted OurMine to hack Vevo, the group noted on its website that it initially tried to alert Vevo of the breach privately, but when one of the Vevo's employees responded, "F*** off, you don't have anything," it went public with the data breach and leaked Vevo files.

According to Variety, the stolen files included notes on around 90 artists, including Britney Spears, Jennifer Lopez, Taylor Swift, Justin Bieber, Katy Perry, Madonna, Calvin Harris, Ariana Grande, Florida Georgia Line, One Direction, Sia, The Weeknd, and U2.

Sep 18 09:41

Unpatched Windows Kernel Bug Could Help Malware Hinder Detection

A 17-year-old programming error has been discovered in Microsoft's Windows kernel that could prevent some security software from detecting malware at runtime when loaded into system memory.

The security issue, described by enSilo security researcher Omri Misgav, resides in the kernel routine "PsSetLoadImageNotifyRoutine," which apparently impacts all versions of Windows operating systems since Windows 2000.

...

What's bad? It seems like Microsoft has no plans to address this issue, as the software giant does not consider it as a security vulnerability.

Sep 18 09:39

Warning: CCleaner Hacked to Distribute Malware; Over 2.3 Million Users Infected

If you have downloaded or updated CCleaner application on your computer between August 15 and September 12 of this year from its official website, then pay attention—your computer has been compromised.

...

Detected on 13 September, the malicious version of CCleaner contains a multi-stage malware payload that steals data from infected computers and sends it to attacker's remote command-and-control servers.

Sep 17 16:51

Aug 30 Flashback: Tim Cook Sure Is Selling Stock at a Weird Time

Stock-market investors are over the moon about the prospects for Apple's next iPhone. But the company's top executive isn't sending the most bullish signal.

Apple Inc. CEO Tim Cook in recent days sold about $43 million worth of company stock, according to a regulatory filing, reflecting a sale of all the net shares he was awarded last week for his job performance.

It's a nice time for Cook to get handed a big batch of Apple stock. Shares hit an all-time high on Tuesday and have climbed 41 percent so far this year. But it might not be the greatest time to sell Apple shares, if you believe the company is on the cusp of (further) greatness.

Apple CEO Tim Cook recently sold all the net shares from his annual stock award; it's only the second time in five years that he's done so.

Sep 17 12:11

This Hilarious Retweet From President Trump Has Liberals Completely Freaking Out

If there’s one thing we know about President Donald Trump it’s that he is probably the most transparent President in history insofar as sharing his personal views is concerned. If he’s thinking it, then there’s often a chance that the rest of the country will soon know about it via his social media sites. Of course, his off-the-cuff remarks are often a bit too controversial for his detractors to handle, and a recent Retweet of a meme he happened across online and shared with his 38.5 million followers is no exception:

Sep 17 09:04

This Is What Your Identity Sells For On The Dark Web

It is now easier – and cheaper – for criminals to access and abuse illicit data than ever before. In fact, a high-limit American express card with a high chance of working can be purchased online for less than $20. Criminals can buy files with thousands of low-limit card numbers for pennies on the dollar.

Sep 17 09:01

14 Cutting Edge Tech Firms Funded By The CIA

The CIA has its own investment capital firm called “In-Q-Tel,” and it’s been funding innovative tech firms for years. This is both good news and bad. One the one hand, it allows the CIA to invest in technologies they deem useful for the intelligence community; however, some of these technologies are a little creepy when it comes to personal space and privacy. In-Q-Tel has the ability to reach deep into the pockets of the U.S. government’s Black Budget, which is pretty hefty given that the Washington Post reported that a staggering $52.6 billion was set aside for Black Budget operations in fiscal year 2013. If you’re unfamiliar with the Black Budget program, that’s not very surprising; the entire point of the program is to keep these funds and the programs within it top secret.

Sep 17 08:46

Why your phone ACTUALLY has a two-year warrantee - whatever you network claims

With more and more people buying phones on 2-year contracts, the idea that your warantee only lasts 12 months might well be legal nonsense

Sep 17 08:42

iPhone X launch: Apple share price PLUNGES after iPhone 8, 10 release amid delay worries

Investors were on edge ahead of the iPhone X launch, amid hopes the new features would justify the gadget's $999 price tag (which is expected to sell for about £760 in the UK), 10 years after the first iPhone was released.

The tech giant's stock price jumped initially jumped after the release, but losses picked up on Wednesday, with the value sinking by around 1.5 per cent.

iPhone sales are hugely important for Apple's profits, so the X and 8 models are crucial for the technology giant's outlook.

But it's feared delays could dent profits.

Sep 17 08:25

Solutions: Stop Using YouTube - corbettreport


Published on Sep 16, 2017SHOW NOTES AND DISCUSSION: https://www.corbettreport.com/?p=24009

Every year come 9/11 I see my "9/11: A Conspiracy Theory" video making the rounds again. But this year something marvelous happened. I was able to point people to my BitChute.com mirror of the video. And my Dtube mirror. And my minds.com mirror. And my vid.me mirror. The YouTube crackdown is coming (exactly as I warned you it would), but the YouTube exodus is also here (just as I predicted at the beginning of the year). The only problem is there are too many platforms to keep track of.

Sep 16 10:00

Apple's New "FaceID" Could Be A Powerful Mass Spying Tool

"Apple’s new system completely changes that. For the first time, a company will have a facial recognition system with millions of profiles, and the hardware to scan and identify faces throughout the world... This could make Apple the target for a new mass surveillance order."

Sep 16 09:10

BOOM! Top Democrat Becerra Is Caught Giving Cops a Fake Server on Imran Awan Scandal

Now-indicted former congressional IT aide Imran Awan allegedly routed data from numerous House Democrats to a secret server. Police grew suspicious and requested a copy of the server early this year, but they were provided with an elaborate falsified image designed to hide the massive violations. The falsified image is what ultimately triggered their ban from the House network Feb. 2, according to a senior House official with direct knowledge of the investigation.

The secret server was connected to the House Democratic Caucus, an organization chaired by then-Rep. Xavier Becerra. Police informed Becerra that the server was the subject of an investigation and requested a copy of it. Authorities considered the false image they received to be interference in a criminal investigation, the senior official said.

Sep 16 08:48

Group Think & Google Glasses: The Coming Techno Apocalypse

As our consumer society becomes more and more obsessed with convenience and enamored with technology, the harbingers have never been clearer: man is putting his faith in machines, over himself and the divine. In this new digital technocracy, the machine will usurp both the self and the divine as man’s prime directive. Welcome to the future…

Sep 16 08:06

The NSA has all of Clinton’s “lost” emails… but James Comey rejected them in order to obstruct justice

If President Trump’s recent tweets are any indication, former Federal Bureau of Investigation (FBI) director James Comey isn’t going to be let off the hook for obstructing justice in his handling of the Hillary Clinton email scandal. And more than likely neither will Hillary Clinton herself, as it has now been revealed that the National Security Agency (NSA) has in its possession all 33,000 of Clinton’s “lost” emails, which are just waiting to be exposed.

The spy agency had reportedly attempted to hand these emails over to Comey many months back as part of his so-called investigation into the critical matter. But Comey outright rejected them before proceeding to deny a recommendation that Clinton be prosecuted for her alleged crimes – a move that, in and of itself, has become a scandal all on its own.

Sep 15 12:50

Homeland Security Faces Lawsuit Over Warrantless Searches at Border

By Derrick Broze

The Department of Homeland Security faces a federal class action lawsuit for violating the rights of people crossing the U.S. border by searching their laptops and cell phones.

Attorneys with the Electronic Frontier Foundation and the American Civil Liberties Union filed a lawsuit on Wednesday in defense of 10 U.S. citizens and one green card holder in response to warrantless searches at the U.S. border. During the Obama Administration, Customs and Border Protection agents had a bad habit of conducting warrantless searches of cellphones and laptops. Documents released to the American Civil Liberties Union under Freedom of Information Act requests revealed that Border Patrol agents searched over 6,500 people from October 2008 to June 2010...

Sep 15 11:32

High Ranking CIA Agent Blows Whistle On The Deep State And Shadow Government

Shipp had a series of slides explaining how the deep state and shadow government functions as well as the horrific crimes they are committing against U.S. citizens. Some of the revelations the former CIA anti-terrorism counter intelligence officer revealed included that “Google Earth was set up through the National Geospatial Intelligence Agency and InQtel.” Indeed he is correct, the CIA and NGA owned the company Google acquired, Keyhole Inc., paying an undisclosed sum for the company to turn its tech into what we now know as Google Earth. Another curious investor in Keyhole Inc. was none other than the venture capital firm In-Q-Tel run by the CIA according to a press release at the time.

Sep 15 11:12

Facebook "Updates" Ad Targeting Strategy After Algos Aimed At "Jew Haters"

ProPublica is reporting that Facebook's advertising algorithms inadvertently created a series of targeted-ad categories directed at anti-semites and racists. To test if these ad categories were real, ProPublica paid $30 to target those groups with three “promoted posts” — in which a ProPublica article or post was displayed in their news feeds. Facebook approved all three ads within 15 minutes.

Sep 15 09:45

Julian Assange discusses 'WikiLeaks' US Senate intelligence bill

@RonPaul conference in Virginia

CIA head declares WikiLeaks "an enemy of the United States."

Sep 15 09:31

Caught giving cops a fake server, Xavier Becerra clams up

California's illegal alien-supporting attorney general, Xavier Becerra, has been curiously silent about that fake server he handed over to cops to obstruct their Imran Awan investigation, according to a new report from the Daily Caller. The broader scandal was outlined in this piece by Thomas Lifson yesterday.

Becerra's role is worth noting because he is considered top Democratic talent, a Democratic Party star, with many Democratic leadership positions, including a seat on the House Ways and Means committee, chairmanship of the House Democratic Caucus (now at the center of the Imran Awan secret server scandal) and lately a post as the California state attorney general, where he is leading the state's effort to stop President Trump from ending the Deferred Action for Childhood Arrivals executive order.

Sep 15 09:07

Malvertising Campaign Mines Cryptocurrency Right in Your Browser

Malware authors are using JavaScript code delivered via malvertising campaigns to mine different cryptocurrencies inside people's browsers, without their knowledge.

Crooks are currently deploying this technique on Russian and Ukrainian websites, but expect this trend to spread to other regions of the globe.

The way crooks pulled this off was by using an online advertising company that allows them to deploy ads with custom JavaScript code.

The JavaScript code is a modified version of MineCrunch (also known as Web Miner), a script released in 2014 that can mine cryptocurrencies using JavaScript code executed inside the browser.

Sep 15 09:02

Another Day, Another Voter Database Exposed Online

The Kromtech Security Center has discovered a misconfigured database that contained info for 593,328 US citizens (Alaska voters) and it was exposed to the public Internet due to the misconfiguration of CouchDB instance.

Records appeared to be a part of the VoterBase, one of the market’s leading national voter file, containing the contact and voting information of over 191 million voters, and 58 million unregistered, voting age consumers, compiled and provided by TargetSmart, a leading provider of political data and technology.

Sep 15 08:51

Video nasty lets VMware guests run code on hosts

VMware's given vAdmins a busy Friday by disclosing three nasties to patch.

One's a video nasty dubbed CVE-2017-4924 and impacts VMware ESXi, and the desktop hypervisors Workstation & Fusion. This one's “an out-of-bounds write vulnerability in SVGA driver device*” , an old virtual graphics card toolkit. The bug “may allow a guest to execute code on the host.”

There's a critical patch for ESXi 6.5, and a call to upgrade Workstation 12.x to version 12.5.7. Fusion 8.x users should get to version 8.5.8 as a matter of urgency. ESXi 6.0 and 5.5 don't have the problem.

Sep 15 08:31

Another month, another malware outbreak in Google's Play Store

Google has had to pull 50 malware-laden apps from its Play Store after researchers found that virus writers had once again managed to fool the Chocolate Factory's code checking system.

The malware was dubbed ExpensiveWall by Check Point security researchers because it was found in the Lovely Wallpaper app. It carries a payload that registers victims for paid online services and sends premium SMS messages from a user's phone and leaves them to pick up the bill. It was found in 50 apps on the Play Store and downloaded by between 1 million and 4.2 million users.

Sep 15 08:27

Nearly half of Hawaii could be affected by data breach

"Initially, when people would go to the website they might have been alerted their identity was not involved. Equifax has now found some of the people in that case were actually involved," said Hawaii's Better Business Bureau Director of Marketing Jason Kama.

Why is important to find out for sure at: "www.equifaxsecurity2017.com"?
Because the information exposed wasn't credit card numbers, instead it was all the information thieves need to get lines of credit under victim's names.

"This breach involves people's social security numbers, addresses , names all things people would use to apply for a credit card or perpetuate credit fraud," said Kama.

Experts recommend those affected put a freeze on their credit. It adds an additional hurdle to opening new credit or loans, but also makes it more difficult for thieves with your personal information to do the same.

Sep 15 08:23

Equifax data breach: Find out if you were one of 143 million hacked

Equifax has set up its own program to help people find out if they were one of the millions affected in the hack. It includes a tool that lets you check to see if you were affected and a program, Trusted ID, that may help prevent identity theft. But, be aware: the checker that lets you know if you were hacked might be broken and -- per the above note -- enrolling in the program might prevent you from participating in a class-action lawsuit against the company. Finally, on Sept. 11, ZDNET reported that Equifax's credit fraud alert sign-up site is vulnerable to hacking and has been left un-patched.

Because of these circumstances, we recommend that, for now, anyone with a credit history should assume they were affected by the hack. We also recommend supplementing Trusted ID with your own due diligence.

Sep 15 08:05

Why I'm skipping the iPhone X

The downsides, unknowns and potential productivity hits outweigh the upsides.

Sep 15 07:12

LONDON TUBE EXPLOSION: DONALD TRUMP SAYS INTERNET MUST BE 'CUT OFF' TO STOP FURTHER TERROR ATTACKS

Donald Trump says that the internet must be "cut off" to stop further terror attacks.

Responding to the terror incident at Parsons Green Tube station, he said that the internet was a terrorist "recruiting tool".

"Loser terrorists must be dealt with in a much tougher manner," he wrote. "The internet is their main recruitment tool which we must cut off & use better!"

Sep 15 07:08

Facebook to Clamp Down on Who Can Cash In on Ads to Fight ‘Fake News’

Facebook said on Wednesday it would introduce tougher rules on who can make money from advertising on its network, responding to criticism that it makes it too easy for providers of fake news and sensational headlines to cash in.

With immediate effect, the world’s largest social network will launch new standards to provide clearer guidance on which publishers are eligible to earn money on Facebook and with what content, Senior Vice President for Global Marketing Solutions Carolyn Everson said in a blog post.

Sep 14 17:53

China sets up first 'hack-proof' commercial quantum network

China has set up its first “commercial” quantum network in its northern province of Shandong, state media said, the country's latest step in advancing a technology expected to enable “hack-proof” communications.

China touts that it is at the forefront of developing quantum technology. In August it said it sent its first “unbreakable” quantum code from an experimental satellite to the earth. The Pentagon has called the launch of that satellite a year earlier a “notable advance”.

Now the country's “first commercial quantum private communication network” has been setup for exclusive use by more than 200 government and official users in Shandong's provincial capital Jinan, the official Xinhua news agency said late on Tuesday.

It did not elaborate on how the system would be commercially operated.

Sep 14 17:48

Here are 6 old technologies Apple wants you to think are revolutionary

We know, we know. Apple takes its time to do new technologies “right,” not “first.” But if you watched Apple’s September 12 announcements for the iPhone 8, iPhone X, Apple TV 4K and Apple Watch Series 3, you might be wondering just how long it takes to perfect an animated 3D turd.

While Apple acolytes inside the newly minted Steve Jobs Theater breathlessly applauded new “features” paraded on stage by Apple VPs, the rest of us were feeling a wave of déjà vu. OLED screens, wireless charging, 4K … haven’t we seen this stuff before?

Yup. Even by its own standards, Apple dredged up some almost embarrassingly dated technologies for its latest round of refreshes.

Sep 14 17:34

BlueBorne threatens almost every connected device with Bluetooth-based attacks

"The BlueBorne attack vector has several qualities which can have a devastating effect when combined. By spreading through the air, BlueBorne targets the weakest spot in the networks’ defense – and the only one that no security measure protects. Spreading from device to device through the air also makes BlueBorne highly infectious. Moreover, since the Bluetooth process has high privileges on all operating systems, exploiting it provides virtually full control over the device."

...

Users can help protect themselves against attacks like Blueborne by patching their devices of all (available) software updates. They should also not leave Bluetooth enabled all the time. Whenever they're not using the protocol, they should disable it.

Sep 14 17:28

Apple’s FaceID Could Be a Powerful Tool for Mass Spying

Law enforcement is rapidly increasing use of facial recognition; one in two American adults are already enrolled in a law enforcement facial recognition network, and at least one in four police departments have the capacity to run face recognition searches . But until now, co-opting consumer platforms hasn’t been an option. While Facebook has a powerful facial recognition system, it doesn’t maintain the operating systems that control the cameras on phones, tablets, and laptops that stare at us every day. Apple’s new system changes that. For the first time, a company will have a facial recognition system with millions of profiles, and the hardware to scan and identify faces throughout the world.

Sep 14 17:23

'Your Windows Has Been Banned' malware makes an unwelcome return

"Your Windows Has Been Banned" is a nasty of piece of malware that first surfaced in 2016. It locks your computer screen and displays a message stating "This PC has been banned for terms of use violations."

It doesn’t go into specifics for the ban -- because, obviously, it’s not a real ban -- but simply says that your PC has been locked in order to "protect the Windows service and its members," adding "Microsoft does not provide details about specific PC bans."

In order to unlock the system, the malware originally stated the victim should call technicians purporting to be from Microsoft and buy a code to unlock the screen, and purchase a new Windows license.

Sep 14 12:47

The Self-Driving Vehicle Future Will Be The End of Privacy

By Derrick Broze

Will the ongoing transition to self-driving cars come at the cost of passenger privacy?

On September 6 the U.S. House of Representatives unanimously passed a bill which spurs on further development of autonomous vehicles, but civil liberties advocates fear the further erosion of privacy. The so-called “SELF DRIVE Act” has been hailed as an opportunity to improve traffic safety and reduce vehicle deaths. If the bill passes the Senate and becomes law it would prevent states from passing certain laws to regulate the technology. The Hill reports the bill would also “allow car manufacturers to deploy up to 100,000 self-driving cars a year that don’t meet normal safety standards. In the first year, however, that number will be capped at 25,000.”...

Sep 14 12:33

GOOGLE’S DEPRESSION TOOL FUNDED BY PFIZER

Google’s screening tool that enables people to check online whether they are clinically depressed could do more harm than good, one expert has warned. Last month, the tech giant released a self-assessment quiz, called the Patient Health Questionnaire-9 (PHQ-9), which pops up as a result for the search query ‘Am I depressed?’ on a computer or cell phone.

Sep 14 11:44

What an iCon! Outrage as fans ask why Apple's new iPhone X costs £250 MORE in Britain than in America

The iPhone is now substantially more expensive for UK buyers, following the launch of Apple's latest model.

The firm's 64GB iPhone X costs $999 in the US, which works out at £750 at the current exchange rate – almost £250 less than the official UK price of £999.

Sep 14 10:21

Bill in US Congress to Fund CIA and NSA with a View to Outlawing Wikileaks

SEC. 623. SENSE OF CONGRESS ON WIKILEAKS.

It is the sense of Congress that WikiLeaks and the senior leadership of WikiLeaks resemble a non-state hostile intelligence service often abetted by state actors and should be treated as such a service by the United States.

Sep 14 10:13

France shocked at iPhone X costing exactly French minimum wage

After Apple unveiled its shiny new iPhone X to the world, French media noted with wonder and consternation that the hi-tech gadget cost almost exactly the same as a worker on France’s minimum wage earns for a month’s labour.
"Is the iPhone X worth a SMIC?" asked a headline in Le Parisien newspaper, using the French abbreviation for the monthly minimum wage that is legally fixed at €1,149 after tax.

The cheapest version of the iPhone X, unveiled on Tuesday at Apple’s new "spaceship" headquarters in California, will be sold in France from November 3 priced at €1,159.

The newspaper marvelled at the new product’s technology, but rather snootily noted that buying it for that price was like buying a Porsche for a short commute to work when a low-cost Dacia car would do the job just as well.

Sep 14 09:58

EXCLUSIVE: DWS IT Guy Was Banned From House After Trying To Hide Secret Server

A secret server is behind law enforcement’s decision to ban a former IT aide to Democratic Rep. Debbie Wasserman Schultz from the House network.

Now-indicted former congressional IT aide Imran Awan allegedly routed data from numerous House Democrats to a secret server. Police grew suspicious and requested a copy of the server early this year, but they were provided with an elaborate falsified image designed to hide the massive violations. The falsified image is what ultimately triggered their ban from the House network Feb. 2, according to a senior House official with direct knowledge of the investigation.

The secret server was connected to the House Democratic Caucus, an organization chaired by then-Rep. Xavier Becerra. Police informed Becerra that the server was the subject of an investigation and requested a copy of it. Authorities considered the false image they received to be interference in a criminal investigation, the senior official said.

Sep 14 09:43

Dear Jamie Dimon: Predict the Crash that Takes Down Your Produces-Nothing, Parasitic Bank and We’ll Listen to your Bitcoin “Prediction”

By Charles Hugh Smith

This is the begging-for-the-overthrow-of-a-corrupt-status-quo economy we have thanks to the Federal Reserve giving the J.P. Morgans and Jamie Dimons of the world the means to skim and scam the bottom 95%.

Dear Jamie Dimon: quick quiz: which words/phrases are associated with you and your employer, J.P. Morgan? Looting, pillage, rapacious, exploitative, only saved from collapse by massive intervention by the Federal Reserve, the source of rising wealth inequality, crony capitalism, privatized profits-socialized losses, low interest rates = gift from savers to banks, bloviating overpaid C.E.O., propaganda favoring the financial elite, tool of the top .01%, destroyer of democracy, financial fraud goes unpunished, free money for financiers, debt-serfdom, produces nothing of value to society or the bottom 99.5%.

Jamie, if you answered “all of them,” you’re correct...

Sep 14 08:46

The Crushing of Equifax, Most Hated Company in America

Banks, credit card companies, and other Equifax customers squeal. Consumers (the product) squeal. Congress squeals. Investors squeal.

Sep 14 08:16

New iPhone face unlocking tech sparks fears owners could be forced to open their phones against their will

Experts warned that the new technology has the potential be abused by thieves, forcing iPhone X owners to unlock their phones to steal information and wipe them to sell, or even an abusive partner wanting to look through their spouses' messages.

It could also potentially allow police to unlock phones of suspects to find incriminating evidence, without having to get a court to try and force them to hand over their passcode.

Sep 14 07:52

Missed patch caused Equifax data breach

As the Apache Foundation pointed out earlier this week, it reported CVE-2017-5638 in March 2017. Doubt us? Here's the NIST notification that mentions it as being notified on March 10th.

Equifax was breached in “mid-May” 2017, realised it in July and got around to telling the world in Early September. If we take “mid-May” as the 15th of the month, Equifax had nine working weeks in which to apply the patch.

Sep 14 07:52

Equifax had 'admin' as login and password in Argentina

The credit report provider Equifax has been accused of a fresh data security breach, this time affecting its Argentine operations.

Cyber-crime blogger Brian Krebs said that an online employee tool used in the country could be accessed by typing "admin" as both a login and password.

He added that this gave access to records that included thousands of customers' national identity numbers.

Sep 14 06:19

Kaspersky Lab Antivirus Software Is Ordered Off US Government Computers

The federal government moved on Wednesday to wipe from its computer systems any software made by a prominent Russian cybersecurity firm, Kaspersky Lab, that is being investigated by the F.B.I. for possible links to Russian security services.

(*I lifted this submission from AntiWar .com , but it comes from The NYTimes , so it may digest easier with one (1) grain of salt)

Sep 13 16:41

Sacre bleu! Apple's high price, marginal gain iPhone strategy leaves it stuck in the mud

A premium works only when you have two things: the technology that drives the demand, and a sufficient number of willing buyers in the market. It isn't clear the £999 X (64GB) or the £1,149 (256GB) fulfils either.

The iPhone was unique because it could do one or two things (web and maps, but not much else) much better than the competition at the time. The best mobile web experience at the time was on Windows Mobile or Nokia tablets, and it was very clunky. Even without apps or 3G, the first iPhone hinted at greater things to come.

Does the X astonish in the same way? Does it have the same lustre? You must be kidding.

Sep 13 16:36

Apple bumps up price on iPad Pro as flash costs climb

Apple has raised the price on much of its iPad Pro tablet line.

The Cupertino giant did not say why it was bumping up the price for the 256GB and 512GB iPad Pro 10.5-inch and 12.9-inch models by $50. A Wi-Fi only 256GB iPad Pro now costs $649 for the 10.5-inch model and $799 for the 12.9-inch one.

The 64GB models for both tablets will remain the same price.

While Apple hasn't given the reason behind the price increase, speculation is that the rising cost of NAND memory chips, driven by an ongoing shortage expected to last until next year, is behind the decision.

Sep 13 16:34

Linux Subsystem on Windows 10 Allows Malware to Become Fully Undetectable

Last year, Microsoft surprised everyone by announcing the arrival of Windows Subsystem for Linux (WSL) in Windows 10, which brings the Linux command-line shell to Windows, allowing users to run native Linux applications on Windows system without virtualization.

However, security researchers from security firm Check Point Software Technologies have discovered a potential security issue with the WSL feature that could allow malware families designed for Linux target Windows computers—undetected by all current security software.

Sep 13 16:33

Immediately Patch Windows 0-Day Flaw That's Being Used to Spread Spyware

Get ready to install a fairly large batch of security patches onto your Windows computers.

As part of its September Patch Tuesday, Microsoft has released a large batch of security updates to patch a total of 81 CVE-listed vulnerabilities, on all supported versions of Windows and other MS products.

The latest security update addresses 27 critical and 54 important vulnerabilities in severity, of which 38 vulnerabilities are impacting Windows, 39 could lead to Remote Code Execution (RCE).

Affected Microsoft products include:

Internet Explorer
Microsoft Edge
Microsoft Windows
.NET Framework
Skype for Business and Lync
Microsoft Exchange Server
Microsoft Office, Services and Web Apps
Adobe Flash Player

Sep 13 15:51

A Contagious Bluetooth Flaw Makes ALL Your Connected Devices Hackable

Do you have a Bluetooth device running Windows, IoS, Android, or Linux?

If you do, a new flaw has been discovered that means it's vulnerable to a cyber-attack. A hacker can take control of everything on the device, including bank accounts and personal information. Here's what you need to do. And it's contagious, meaning it can spread to other connected devices.

Sep 13 11:27

New White House Comms Director "Suspended" From Twitter One Day After Appointment

Following a coordinated alt-left attack targeting Hope Hicks' account, Twitter has suspended the new White House Communications Director's account after a mass-reporting.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA