COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED X-Frame-Options: DENY X-Frame-Options: SAMEORIGIN

COMPUTERS/INTERNET/SECURITY

Aug 10 07:41

Blake Masters: Big Tech Is an ‘Extension of the Surveillance State’

Blake Masters, the tech leader running in the Republican senate primary in Arizona, blasted Apple for abandoning its previously robust commitment to user privacy with its announcement that it will scan users’ photo libraries for illegal imagery.

The candidate, who previously worked for conservative tech entrepreneur and early Trump supporter Peter Thiel, said users need a “new set of legal protections” to protect them from being “constantly spied on and exploited.”

Masters previously condemned PayPal for its plan to share Americans’ financial transaction data with the far-left Anti Defamation League, calling it an “obvious pretext to suppress any dissent.”

Aug 10 07:21

Apple Tries to Calm Blowback Against Intruding on iPhone Users’ Privacy

Recently, Apple announced a new addition to its upcoming iOS 15 and iPadOS 15 firmware for iPhones and iPads. The new feature will allow Apple to scan user photos stored in Apple’s iCloud service and determine if they contain sexually explicit images involving children. Following a blowback against the Masters of the Universe scanning the devices of its customers, the company is now promising it will not abuse the feature or allow governments to dictate what types of data iPhones are scanned for.

Apple claims that the way it detects CSAM (Child Sexual Abuse Material) is “designed with user privacy in mind,” and it is not directly accessing iCloud users’ photos but rather utilizing a device-local, hash-based lookup and matching system to cross-reference the hashes of user photos with the hashes of known CSAM.

Webmaster's Commentary: 

So, all the perverts need to do is slightly resize their images, and the hashing won't work.

Aug 10 06:54

FEMA and FCC Plan Nationwide Emergency Alert Test for Aug. 11 Test Messages Will be Sent to TVs and Radios Along with Select Cell Phones That Have Opted-in to Receive Test Messages

FEMA, in coordination with the Federal Communications Commission, will conduct a nationwide test of the Emergency Alert System (EAS) and Wireless Emergency Alerts (WEA) this summer.

The national test will consist of two portions, testing WEA and EAS capabilities. Both tests will begin at 2:20 p.m. ET on Wednesday, Aug. 11.

The Wireless Emergency Alert portion of the test will be directed only to consumer cell phones where the subscriber has opted-in to receive test messages. This will be the second nationwide WEA test, but the first nationwide WEA test on a consumer opt-in basis. The test message will display in either English or in Spanish, depending on the language settings of the wireless handset.

The Emergency Alert System portion of the test will be sent to radios and televisions. This will be the sixth nationwide EAS test.

Aug 10 06:46

The most secure browser for transmitting sensitive data is definitely not Chrome

Tor.

Yep, that's the answer. The most secure browser for encrypted data is Tor. But there's a catch, and it's a big one. You might work within a company LAN that doesn't allow for the Tor browser to function. And unless you can get your IT department to open up the network to allow Tor to function, you're out of luck.

But for everyone else, Tor is definitely the browser to beat when it comes to encrypted transmitted data.

Aug 10 05:56

Pegasus: Spyware scandal lays bare cracks in Israel's cyber security 'success' story

Revelations about the extent of the penetration of the NSO Group's Pegasus spyware software have sparked off a fierce debate in Israel and abroad about the workings of the country's much-vaunted cyber security sector.

Israeli cyber companies have long been able to maintain a strong brand because of the notoriety of the Israeli intelligence services, especially Mossad and the military SIGINT unit 8200, and the perceived ability of such companies to recruit graduates of these services to their ranks.

A less discussed aspect of this sector is whether it is financially successful. Former Israeli prime minister Benjamin Netanyahu spoke frequently about cyber as a cornerstone of the Israeli high-tech sector and the economy in general, but the Haaretz newspaper found extensive evidence that Israeli offensive cyber technology, and specifically NSO, played a major role in Netanyahu's foreign policy.

Aug 09 05:39

You met Pegasus, on phones, now meet Toka, on any net connected device

The abuse of the Pegasus software by autocratic regimes has been known for several years, though, through recent revelations, it appeared to gain much traction in the mainstream media, owing to the high number of civilians who have reportedly been under surveillance through its use.

The continuation of the long standing scandal surrounding the abuse of Pegasus has also brought considerable controversy and notoriety to the Israeli company that developed it, the NSO group.

While the NSO group has become infamous, other Israeli companies, with even deeper ties to Israel's intelligence apparatus have been selling software that not only provides the exact same services to governments, to intelligence agencies, but purports to go even farther than that.

Aug 09 05:06

They're Normalizing Robot Police By Calling Them "Dogs"

Hawaii police are defending their use of pandemic relief funds for a robotic “police dog” made by Boston Dynamics which scans homeless people’s eyes to see if they have a fever.

“If you’re homeless and looking for temporary shelter in Hawaii’s capital, expect a visit from a robotic police dog that will scan your eye to make sure you don’t have a fever,” says a new report from Associated Press.

“That’s just one of the ways public safety agencies are starting to use Spot, the best-known of a new commercial category of robots that trot around with animal-like agility.”

Aug 08 07:33

Serious Warning Issued For Millions Of Apple iPhone Users

While Apple is currently facing criticism for upcoming privacy changes, a more immediate financial danger to millions of iPhone and iPad users has been exposed. And it is an area where Apple is a repeat repeat, repeat, repeat, repeat offender.

Following revelations that Apple has facilitated iOS scams with profits “measured in billions”, the company has now been spotted promoting new scams in its App Store which can cost users hundreds of dollars per year. And some of the examples are jaw dropping.

As iOS developer Beau Novelle notes, “One of them doesn’t even do anything” despite the fact it charges users almost $700 per year. With fellow iOS coder Simeon doing a deep dive on one example which lets users access the app for free once they have submitted their payment details, then automatically starts charging $12.99 per week after three days.

Aug 07 05:50

Pegasus: Tunisia's Ghannouchi targeted by Saudi Arabia

Rached Ghannouchi, the speaker of Tunisia's parliament and head of the Ennahda party, was targeted by Saudi Arabia for surveillance using the NSO Group's Pegasus spyware, Middle East Eye can reveal.

Ghannouchi is one of 50,000 numbers found on a list acquired by investigative NGO Forbidden Stories and Amnesty International that is believed to be made up of phones that the Israeli tech company’s clients have targeted since 2016.

Forbidden Stories told Ghannouchi his phone was on the list two weeks ago. It is his primary number, one of two he uses, and one he has used for 10 years. The number is not in the public domain.

Aug 06 13:53

Apple to permanently scan users’ photos and messages for abusive content

Apple announced on Thursday plans to scan users’ iPhones for child sexual abuse content in an effort to “protect children from predators who use communication tools to recruit and exploit them,” in addition to limiting the spread of Child Sexual Abuse Material (CSAM).

According to Apple’s announcement, new operating system technology will allow the company to identify known CSAM images, allowing Apple to report the incidents to the National Center for Missing and Exploited Children, an agency that collaborates with law enforcement to combat child sexual abuse nationwide.

Webmaster's Commentary: 

I just put this on my iPhone.

Aug 06 11:44

Open Source Mobile OS Alternatives To Android

It’s no exaggeration to say that open source operating systems rule the world of mobile devices. Android is still an open-source project, after all. But, due to the bundle of proprietary software that comes along with Android on consumer devices, many people don’t consider it an open source operating system.

So, what are the alternatives to Android? iOS? Maybe, but I am primarily interested in open-source alternatives to Android.

I am going to list not one, not two, but several alternatives, Linux-based mobile OSes.

Aug 06 05:50

'Privacy Company' Apple Plans To Monitor All US iPhones For Evidence Of Child Porn

As the old saying goes: If you aren't doing anything illegal, then you have nothing to fear from surveillance.

Smartphones already act like tracking devices broadcasting the whereabouts of their owners, but Apple is about to open the door to far more advanced forms of smartphone-based voluntary surveillance by launching a new program designed to detect and report iPhone users who are found to have child pornography - known by the academic-speak acronym CSAM - which stands for Child Sexual Abuse Materials. According to a handful of academics who were offered a sneak preview of the company's plans - then promptly spilled the beans on Twitter, and in interviews with the press.

Aug 05 17:09

Apple’s Plan to “Think Different” About Encryption Opens a Backdoor to Your Private Life

By India McKinney and Erica Portnoy

Apple has announced impending changes to its operating systems that include new “protections for children” features in iCloud and iMessage. If you’ve spent any time following the Crypto Wars, you know what this means: Apple is planning to build a backdoor into its data storage system and its messaging system.

Child exploitation is a serious problem, and Apple isn’t the first tech company to bend its privacy-protective stance in an attempt to combat it. But that choice will come at a high price for overall user privacy. Apple can explain at length how its technical implementation will preserve privacy and security in its proposed backdoor, but at the end of the day, even a thoroughly documented, carefully thought-out, and narrowly-scoped backdoor is still a backdoor.

Aug 05 13:49

Apple plans to scan US iPhones for child abuse imagery

Apple intends to install software on American iPhones to scan for child abuse imagery, according to people briefed on its plans, raising alarm among security researchers who warn that it could open the door to surveillance of millions of people’s personal devices.

Apple detailed its proposed system—known as “neuralMatch”—to some US academics earlier this week, according to two security researchers briefed on the virtual meeting. The plans could be publicized more widely as soon as this week, they said.

Aug 05 12:52

16 Civil Society Organizations Call on Congress to Fix the Cryptocurrency Provision of the Infrastructure Bill

By Rainey Reitman and Hayley Tsukayama

The Electronic Frontier Foundation, Fight for the Future, Defending Rights and Dissent and 13 other organizations sent a letter to Senators Charles Schumer (D-NY), Mitch McConnell (R-KY), and other members of Congress asking them to act swiftly to amend the vague and dangerous digital currency provision of Biden’s infrastructure bill.

Aug 04 13:47

IT’S ALL RIGGED: Facebook’s “fact checkers” are funded by vaccine corporations

It will come as no surprise to anyone who has been paying attention that Facebook’s “fact checkers” are being paid off by vaccine corporations to censor the truth on social media about the dangers and ineffectiveness of Wuhan coronavirus (Covid-19) “vaccines.”

Aug 04 07:24

Google will kill off very old versions of Android next month

Google has started emailing users of very old Android devices to tell them it's time to say goodbye.

Starting September 27, devices running Android 2.3.7 and lower will no longer be able to log in to Google services, effectively killing a big portion of the on-rails Android experience. As Google puts it in an official community post, "If you sign in to your device after September 27, you may get username or password errors when you try to use Google products and services like Gmail, YouTube, and Maps."

Aug 03 13:40

British navy group: ‘Potential hijack’ of ship off UAE coast

The British navy warned Tuesday of a "potential hijack" of a ship off the coast of the United Arab Emirates in the Gulf of Oman, without elaborating.

The incident comes amid heightened tensions between Iran and the West over its tattered nuclear deal and as commercial shipping in the region has found itself in the crosshairs over it. Most recently, the U.S., the U.K. and Israel have blamed Iran for a drone attack on an oil tanker off Oman that killed two people. Iran has denied being involved.

The British military's United Kingdom Maritime Trade Operations initially warned ships Tuesday that "an incident is currently underway" off the coast of Fujairah. Hours later, they said the incident was a "potential hijack." They did not elaborate.

The U.S. military's Mideast-based 5th Fleet and the British Defense Ministry did not immediately return calls for comment. The Emirati government did not immediately acknowledge the incident.

Aug 03 13:05

Warship positions faked including UK aircraft carrier

A carrier strike group led by HMS Queen Elizabeth had its automatic identification system (AIS) position faked, researchers discovered.

AIS is a key maritime safety system used to track vessel movements.

Nearly 100 naval ships may have had their AIS position altered, environmental groups SkyTruth and Global Fishing Watch found.

The ships included vessels from European and US navies, including 11 from the Royal Navy.

The Ministry of Defence (MOD) said there was no "operational impact" on the strike group, which also featured smaller vessels from the Dutch and Belgian navies, but any manipulation of AIS "could result in a serious incident".

"We are aware of manipulation of AIS tracking data placing carrier strike group vessels in areas where they were not", the MOD said.

Aug 03 11:52

Warship positions faked including UK aircraft carrier

A carrier strike group led by HMS Queen Elizabeth had its automatic identification system (AIS) position faked, researchers discovered.

AIS is a key maritime safety system used to track vessel movements.

Nearly 100 naval ships may have had their AIS position altered, environmental groups SkyTruth and Global Fishing Watch found.

The ships included vessels from European and US navies, including 11 from the Royal Navy.

The Ministry of Defence (MOD) said there was no "operational impact" on the strike group, which also featured smaller vessels from the Dutch and Belgian navies, but any manipulation of AIS "could result in a serious incident".

"We are aware of manipulation of AIS tracking data placing carrier strike group vessels in areas where they were not", the MOD said.

Aug 03 09:00

THE PENTAGON IS EXPERIMENTING WITH USING ARTIFICIAL INTELLIGENCE TO “SEE DAYS IN ADVANCE”

“Remember the one about better broadband Internet options for rural customers? haha”

And now…

Global Information Dominance Experiments (GIDE) use Starlink.

Aug 03 07:57

Caitlin Johnstone: How long before we humans are being policed by robots?

The elites are seeking to normalize the use of police robots by calling them ‘dogs’ – but the machines are the vanguard of a dystopian future that will see them cement their power in place forever.

Hawaii police are defending their use of pandemic relief funds for a robotic “police dog” made by Boston Dynamics which scans homeless people’s eyes to see if they have a fever.

“If you’re homeless and looking for temporary shelter in Hawaii’s capital, expect a visit from a robotic police dog that will scan your eye to make sure you don’t have a fever,” a new report from AP says. “That’s just one of the ways public safety agencies are starting to use Spot, the best-known of a new commercial category of robots that trot around with animal-like agility.”

Aug 03 06:16

Pentagon is using artificial intelligence to predict the future and give it 'days of advanced warning' on attacks on sensitive sites like the Panama Canal

The Pentagon is stealing a page from Minority Report with an experimental artificial-intelligence program that can look 'days in advance' and predict possible attacks on vulnerable locations.

The Global Information Dominance Experiments, or GIDE, use machine learning to sift through vast amounts of data to notice tiny changes that humans might miss - such as the number of cars increasing or decreasing in a parking lot - which might indicate an evolving threat.

The program can then alert human agents who can take a closer look at the location.

Webmaster's Commentary: 

So, all the enemy has to do is set the date for the attack with a pair of dice and the system breaks down?

Aug 02 18:33

The Cryptocurrency Surveillance Provision Buried in the Infrastructure Bill is a Disaster for Digital Privacy

By Rainey Reitman

The forthcoming Senate draft of Biden’s infrastructure bill—a 2,000+ page bill designed to update the United States’ roads, highways, and digital infrastructure—contains a poorly crafted provision that could create new surveillance requirements for many within the blockchain ecosystem. This could include developers and others who do not control digital assets on behalf of users.

While the language is still evolving, the proposal would seek to expand the definition of “broker” under section 6045(c)(1) of the Internal Revenue Code of 1986 to include anyone who is “responsible for and regularly providing any service effectuating transfers of digital assets” on behalf of another person. These newly defined brokers would be required to comply with IRS reporting requirements for brokers, including filing form 1099s with the IRS. That means they would have to collect user data, including users’ names and addresses...

Aug 02 10:14

PwnedPiper PTS Security Flaws Threaten 80% of Hospitals in the U.S.

Cybersecurity researchers on Monday disclosed a set of nine vulnerabilities known as "PwnedPiper" that left a widely-used pneumatic tube system (PTS) vulnerable to critical attacks, including a possibility of complete takeover.

The security weaknesses, disclosed by American cybersecurity firm Armis, impact the Translogic PTS system by Swisslog Healthcare, which is installed in about 80% of all major hospitals in North America and in no fewer than 3,000 hospitals worldwide.

"These vulnerabilities can enable an unauthenticated attacker to take over Translogic PTS stations and essentially gain complete control over the PTS network of a target hospital," Armis researchers Ben Seri and Barak Hadad said. "This type of control could enable sophisticated and worrisome ransomware attacks, as well as allow attackers to leak sensitive hospital information."

Aug 02 07:43

SCIENCE WRITER SUSPENDED FROM TWITTER FOR QUOTING RESULTS OF PFIZER CLINICAL TRIAL

Twitter suspended the account of science writer and former New York Times reporter Alex Berenson for sharing the newly-released results of the "pivotal" Pfizer clinical trial which completely undermine the narrative of our medical establishment

Aug 02 07:28

FLORIDA SHERIFF’S OFFICE NOW NOTIFYING PEOPLE IT WILL BE INFLICTING ITS PRE-CRIME PROGRAM ON THEM

The Pasco County (FL) Sheriff’s Office has been swamped with negative press coverage centering on its predictive policing program. The Office claims it’s not "predictive policing," but rather "intelligence-led policing." Whatever you call it, it sucks.

Aug 02 06:42

3D Printed Soft Robo-Hand Can Play Nintendo Super Mario Bros. And Win

What if Americans become too obese and lazy that they had robots play video games for them one day?

University of Maryland researchers have 3D printed a soft robotic hand capable of playing Super Mario Bros. on the Nintendo Entertainment System (NES). The soft robotic hand is flexible and powered by air rather than electricity.

The breakthrough in soft robotics is led by University of Maryland assistant professor of mechanical engineering Ryan D. Sochol and his team, who 3D print a fully functional soft robotic hand with "integrated fluidic circuits" that allowed it to be programmed and play NES.

"Previously, each finger of a soft robotic hand would typically need its own control line, which can limit portability and usefulness," said co-first author Joshua Hubbard. "But by 3D printing the soft robotic hand with our integrated fluidic transistors, it can play Nintendo based on just one pressure input."

Aug 02 06:37

Need A Divorce? There's An App For That, And They Just Raised $2 Million

750,000 divorces happen, on average, every year in the U.S.

While some call that a shame, others see it as a total addressable market. Take, for example, online divorce startup Hello Divorce. They have just raised $2 million to help couples streamline to the inevitable: splitting up. The company provides a combination of software and legal services that start at $99 and average at about $2,000.

The company's seed rounding of funding was "led by CEAS, with additional funds coming from Lightbank, Northwestern Mutual Future Ventures, Gaingels and a group of individuals including Clio CEO Jack Newton, WRG’s Lisa Stone and Equity ESQ led by Ed Diab," according to TechCrunch.

Aug 02 05:39

The War on Freedom: How Tyranny Overran the United States

The super-rich already had their consultants come up with detailed studies on how to divide up citizens by religion, by ethnic identity, by cultural signifiers, and by class so that they are incapable of unity even in the face of the complete takeover of the economy, the media, education and the political process. -- Nothing will get better until citizens recognize the cause of this nightmare was not the legacy of the Bushes, the Clintons, the Obamas or the Trumps, although they all played their role, but rather the end of the self-reliant and informed citizen with access to the writings of experts with a deep commitment to the scientific method and to ethical principles.

Aug 01 13:35

SpaceX and Other Internet Service Providers Asked to Return Money Former FCC Chair Shouldn’t Have Given Them

By B.N. Frank

According to a group of telecom experts (The Irregulators) who filed a lawsuit filed against the Federal Communications Commission (FCC), Americans have been overcharged for decades for telecommunications services that millions still haven’t received. Over the years, Irregulator Bruce Kushnick has written dozens of articles about how the corrupt and “captured” Federal Communications Commission (FCC) made this possible. Of course legislators made this possible too. Now the current acting FCC chair has accused the previous FCC chair of “mismanaging” taxpayer money...

Aug 01 11:35

Remote print server gives anyone Windows admin privileges on a PC

A researcher has created a remote print server allowing any Windows user with limited privileges to gain complete control over a device simply by installing a print driver.

In June, a security researcher accidentally revealed a zero-day Windows print spooler vulnerability known as PrintNightmare (CVE-2021-34527) that allowed remote code execution and elevation of privileges.

While Microsoft released a security update to fix the vulnerability, researchers quickly figured out ways to bypass the patch under certain conditions.

Since then, researchers have continued to devise new ways to exploit the vulnerability, with one researcher creating an Internet-accessible print server allowing anyone to open a command prompt with administrative privileges.

Aug 01 05:40

Pegasus: Flying on the wings of Israeli ‘cyber-tech diplomacy’?

What was the role of the Israeli state in the spread of an insidious piece of malware? Plus, PR companies and the work they do with controversial governments.

A global cyber-surveillance scandal – spyware developed in Israel – has put the government there under the media microscope, and its story does not add up.

Jul 31 08:24

Have The Social Media Companies Become Way Too Powerful?

Do you remember the early days of the Internet? It was like “the wild west”, and that could be bad, but in many ways it was also very good. The Internet was very decentralized at that time, and information could flow very freely. For the very first time, ordinary people could communicate with others all over the globe on a massive scale, and I believe that was an incredibly positive development for humanity. Unfortunately, the elite were absolutely horrified by this free flow of information and they became obsessed with restricting it. Today, highly advanced algorithms have been designed to shape our behavior online. We are increasingly being funneled to just a handful of immensely powerful corporate-owned websites, and information on those sites is heavily monitored, controlled and censored.

Jul 31 08:23

27 Groups Urge Congress To Close FBI ‘Backdoor Search’ Loophole

Over two dozen advocacy groups on Monday sent a letter urging members of Congress to back a measure that, if enacted, would close the so-called “backdoor search” loophole that allows warrantless surveillance of U.S. citizens’ data by government agencies including the FBI and CIA.

The letter (pdf), led by Demand Progress and signed by 27 groups, calls on House leaders to support an amendment to H.R. 4505 – the Commerce, Justice, Science, and Related Agencies Appropriations Act for Fiscal Year 2022 – proposed by Reps. Zoe Lofgren (D-Calif.), Pramila Jayapal (D-Wash.), Thomas Massie (R-Ky.), and Warren Davidson (R-Ohio).

If passed, the amendment would prohibit the use of funds for the warrantless search of Americans’ communications acquired under Section 702 of the Foreign Intelligence Surveillance Act of 1978 (FISA), which the letter’s authors call a “controversial foreign intelligence authority that acquires an untold number of Americans’ Fourth Amendment-protected information.”

Jul 31 07:37

Big Tech Is Out of Control and Threatens to Annihilate Our Liberties

Big Tech is out of control — and the time to save our liberties and freedoms is quickly running out.

This month, White House press secretary Jen Psaki made a stunning admission: the Federal Government is directly colluding with Facebook to flag "problematic" social media content on its platform.

"In terms of actions that we have taken or we’re working to take, I should say, from the federal government, we’ve increased disinformation research and tracking,” she revealed during a press conference. “Within the Surgeon General’s Office, we’re flagging posts for Facebook that spread disinformation."

Jul 31 07:28

Robotic police dogs: Useful hounds or dehumanizing machines?

If you’re homeless and looking for temporary shelter in Hawaii’s capital, expect a visit from a robotic police dog that will scan your eye to make sure you don’t have a fever.

That’s just one of the ways public safety agencies are starting to use Spot, the best-known of a new commercial category of robots that trot around with animal-like agility.

The handful of police officials experimenting with the four-legged machines say they’re just another tool, like existing drones and simple wheeled robots, to keep emergency responders out of harm’s way as they scout for dangers. But privacy watchdogs — the human kind — warn that police are secretly rushing to buy the robots without setting safeguards against aggressive, invasive or dehumanizing uses.

In Honolulu, the police department spent about $150,000 in federal pandemic relief money to buy their Spot from robotics firm Boston Dynamics for use at a government-run tent city near the airport.

Jul 30 23:36

Home car charger owners urged to install updates

Security researchers have discovered failings in two home electric car chargers.

The researchers were able to make the chargers switch on or off, remove the owner's access, and show how a hacker could get into a user's home network.

Most of the faults have now been fixed but owners are being told to update their apps and chargers, to be safe.

Jul 30 11:50

How Amazon’s $10 Billion Contract Squabble with the Pentagon Reveals the Shady Nature of Military Contracts

By Peter Jacobsen

Earlier this month the US Department of Defense (DOD) canceled a $10 billion Joint Enterprise Defense Infrastructure (JEDI) contract awarded to Microsoft in 2019. The goal of the contract was to modernize the Department’s IT operations using cloud computing.

The JEDI cancellation occurred following a lawsuit from Amazon after the company was denied the contract. Amazon alleges that they were rejected because the Department of Defense was pressured by then President Donald Trump to “screw Amazon.” The motivation for this move, it was claimed, was driven by Trump’s personal animus for then-CEO Jeff Bezos, who also owns The Washington Post.

Jul 29 19:23

DHS’s Flawed Plan for Mobile Driver’s Licenses

By Adam Schwartz and Alexis Hancock

Digital identification can invade our privacy and aggravate existing social inequities. Designed wrong, it might be a big step towards national identification, in which every time we walk through a door or buy coffee, a record of the event is collected and aggregated. Also, any system that privileges digital identification over traditional forms will disadvantage people already at society’s margins...

Jul 29 13:52

New destructive Meteor wiper malware used in Iranian railway attack

In a new report by SentinelOne, security researcher Juan Andres Guerrero-Saade revealed that the cyberattack on Iran utilized a previously unseen file wiper called Meteor.

A wiper is malware that intentionally deletes files on a computer and causes it to become unbootable.

Unlike ransomware attacks, destructive wiper attacks are not used to generate revenue for the attackers. Instead, their goal is to cause chaos for an organization or to distract admins while another attack is taking place.

Jul 29 13:50

NSA shares guidance on how to secure your wireless devices

Hijacked wireless devices, including laptops, tablets, mobile, and wearable accessories, can lead to the compromise of personal and corporate data, such as credentials and sensitive documents.

To mitigate these risks, the NSA recommends avoiding public Wi-Fi networks as they expose traffic data to theft or manipulation, disabling Bluetooth and NFC radios while in public and not in use to avoid exposing info that can be used to hack the device.

"Users should consider additional security measures, including limiting/disabling device location features, using strong device passwords, and only using trusted device accessories, such as original charging cords," the NSA added.

Jul 29 13:07

Fighting the Urban Surveillance Infrastructure

By Amanda Bowers

The government uses a vast multi-layered system of surveillance to keep tabs on people. From cell phones to traffic cameras – big brother is always watching (and listening). It is also generally believed that there is collusion between the government and big tech.

So what do we do about it?...

Jul 29 11:44

Video game allows player to “disinfect” cities of anti-lockdown protesters and “save lives” by blowing them up with thermite grenades

Video gamers who support the government’s fascist Wuhan coronavirus (Covid-19) dictates have a new opportunity to murder those who oppose lockdowns, face masks, and “vaccines” – at least digitally.

The Steam gaming platform has made available to its users a three-minute, first-person-shooter video game called “STAYHOMER” that has one simple objective: to blow up as many anti-lockdown protesters as you can with thermite grenades.

The setting is cast in the streets of Tokyo, where a large contingent of protesters has gathered to oppose the government’s stay-at-home orders for the Fauci Flu. The job of the protagonist is to blast the crowd with “disinfectant,” also known as deadly grenades that will “purify” them all into non-existence.

Jul 29 11:32

MEMORY HOLE: USA Today buries its own report that says vaccinated individuals have “higher levels” of coronavirus than the unvaccinated

After earlier reporting that people who have been “vaccinated” for the Wuhan coronavirus (Covid-19) can still become infected with and spread deadly disease, USA Today reportedly scrubbed this information from its website, effectively memory holing its own reporting.

Jul 29 11:29

Apple broke bad news to iPhone fans

We've known this was a problem.

I expected that if there was any time when Apple top brass would mention it, it would be during the earnings call.

And that's when it happened.

Read More

Apple, like most other tech firms, is feeling the pinch due to component shortages.

A word that came up a lot during the call was "constraints." It was up to Apple CFO Luca Maestri to break the bad news.

Jul 29 05:44

Report: ‘Extensive’ Gay Hookup App Usage Compromises Vatican Security

Location-based homosexual and heterosexual hookup apps are widely used within Vatican walls, an investigative report revealed late Tuesday, which can open the Holy See to blackmail and other security risks.

The report by the Pillar, an online Catholic news agency, raised particular concerns of vulnerability to China, which until 2020 owned the gay hookup app Grindr, one of the services whose use in the Vatican was uncovered.

The Pillar revealed that at least 16 different mobile devices emitted signals from Grindr on at least four days between March and October 2018 within the areas of the Vatican City State not open to the public.

Jul 29 05:24

Mexico says officials spent $61 million on Pegasus spyware

Mexico’s top security official said Wednesday that two previous administrations spent $61 million to buy Pegasus spyware that has been implicated in government surveillance of opponents and journalists around the world.

Public Safety Secretary Rosa Icela Rodríguez said records had been found of 31 contracts signed during the administrations of President Felipe Calderón in 2006-2012 and President Enrique Peña Nieto in 2012-18. Some contracts may have been disguised as purchases of other equipment.

The government said many of the contracts with the Israeli spyware firm NSO Group were signed with front companies, which are often used in Mexico to facilitate kickbacks or avoid taxes.

Last week, the government's top anti-money laundering investigator said officials from the two previous administrations had spent about $300 million in government money to purchase spyware. But that figure may reflect all spyware and surveillance purchases, or may include yet-unidentified contracts.

Jul 28 08:50

Get patching: US, UK, and Australia issue joint advisory on top 30 exploited vulnerabilities

At the end of almost seven months in 2021, one of the 30 most exploited vulnerabilities dates from 2017, according to the US Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Centre (ACSC), the United Kingdom's National Cyber Security Centre (NCSC), and the US FBI.

CVE-2017-11882 is the holder of the dubious honour, and it is due to a stack buffer overflow in the equation editor of Microsoft Office, which can lead to remote code execution (RCE). It is an exploit that vendors have been banging on about for years already.

The quartet of agencies said on Wednesday that the easiest way to fix this hole, and the 29 others listed, would be to patch systems.

Jul 28 08:17

Facebook-owned apps can track and harvest your data even if you aren’t actively using them

Many smartphone apps track people’s data, including their current locations, even when they are not actively using them. Experts say one of the worst offenders is Facebook Messenger, the social media company’s dedicated messaging app.

Experts are now encouraging people to do their research and think about what personal data they could be giving away by downloading and signing up to apps like Facebook Messenger.

“I am mindful about who to invite into my home so I’d think the same about what I have on my phone and be conservative with the apps you download,” said Michael Huth, chief research officer and co-founder of a personal privacy-oriented browser with its own search engine and app.

Huth advised people to downgrade what Facebook Messenger can access from their smartphones. The Facebook app can harvest all sorts of data from its users if they do not do so, especially if they are unaware of what the app can access.

Jul 28 05:52

"Greatest Danger To National Security" - Ed Snowden Exposes The 'Insecurity' Industry

Prior to this week’s Pegasus Project, a global reporting effort by major newspapers to expose the fatal consequences of the NSO Group—the new private-sector face of an out-of-control Insecurity Industry—most smartphone manufacturers along with much of the world press collectively rolled their eyes at me whenever I publicly identified a fresh-out-of-the-box iPhone as a potentially lethal threat.

Jul 28 05:49

Biden Says Cyberattacks Could Lead to a ‘Real Shooting War’ With a Major Power

The US is constantly accusing countries like Russia and China of carrying out cyberattacks, and comments from President Biden on Tuesday suggest he could use these claims as a pretext for military intervention. He warned that if Washington ended up in a “real shooting war with a major power,” it could be the result of a cyberattack on the US.

“You know, we’ve seen how cyber threats, including ransomware attacks, increasingly are able to cause damage and disruption to the real world,” Biden said in a speech during a visit to the Office of the Director of National Intelligence. “I think it’s more likely we’re going to end up — well, if we end up in a war, a real shooting war with a major power, it’s going to be as a consequence of a cyber breach of great consequence.”

Webmaster's Commentary: 

Setting the stage for a false-flag "Cyber Pearl Harbor?"

Jul 27 13:29

EFF Sues U.S. Postal Service For Records About Covert Social Media Spying Program

Washington D.C.—The Electronic Frontier Foundation (EFF) filed a Freedom of Information Act (FOIA) lawsuit against the U.S. Postal Service and its inspection agency seeking records about a covert program to secretly comb through online posts of social media users before street protests, raising concerns about chilling the privacy and expressive activity of internet users.

Under an initiative called Internet Covert Operations Program, analysts at the U.S. Postal Inspection Service (USPIS), the Postal Service’s law enforcement arm, sorted through massive amounts of data created by social media users to surveil what they were saying and sharing, according to media reports. Internet users’ posts on Facebook, Twitter, Parler, and Telegram were likely swept up in the surveillance program...

Jul 27 13:17

BREAKING: Arizona Senate Serves Maricopa County With Subpoena for Routers, Ballot Envelopes, Voter Databases

The Arizona Senate have served Maricopa County with another subpoena relating to the forensic audit of the 2020 election, asking for ballot envelopes, routers, and voter databases, among other requests.

The news about the subpoena was broken late Monday on CNN by Bill Gates, one of the RINO members of the Maricopa Board of Supervisors. “Right before I came on here, the board of supervisors received another subpoena from the state Senate ordering us to turn over the routers, in addition to some other information,” Gates said. “And they threaten us in these papers that if we do not turn those over by August 2nd, so that’s next Monday, then we could be held in contempt,” he continued. The subpoena, posted to Twitter by ABC15’s Garrett Archer, included requests to Maricopa County for:

Jul 27 13:14

World Bank Funded Digital Identity Scheme in Nigeria Leads 60m to Link National ID to SIM Cards

(Biometric Update) – Nigeria’s federal government says well over 59 million people have now been biometrically enrolled for the National Identification Number (NIN) as deadline for the linkage of the IDs to SIM cards has been extended yet again. The new deadline is now October 31, 2021.

The decision for mobile phone users in Nigeria to link their digital ID numbers to their SIM cards went effective in December and there have been at least six deadline extensions since then...

Jul 27 10:36

Biden Gives “Five Eyes” What It Always Wanted: Access To Everyone’s Social Media

By MassPrivateI

For years, Americans have largely ignored corporate social media surveillance. But that all of that is about to change, thanks to President Biden.

No one has taken the White House’s plan to turn Big Tech into a quasi-Five Eyes censorship program seriously despite repeated warnings from journalists and news websites.

Reuters revealed some of America’s biggest tech companies will let “Five Eyes” and the U.N. decide whose stories the “Global Internet Forum to Counter Terrorism” should censor.

“Until now, the Global Internet Forum to Counter Terrorism’s (GIFCT) database has focused on videos and images from terrorist groups on a United Nations list and so has largely consisted of content from Islamist extremist organizations such as Islamic State, al Qaeda and the Taliban.”

Big Tech’s GIFCT is essentially a Five Eyes censorship program, masquerading as a Big Tech social media forum to stop terrorism and extremism...

Jul 27 09:55

Key South African ports declare ‘force majeure’ after cyberattack

South Africa’s state-owned ports and freight rail operator Transnet has declared “force majeure” at the country’s main container terminals because of “an act of cyberattack, security intrusion and sabotage” that struck last week.

The measure, which releases a company from fulfilling contractual obligations, affects key container terminals in Durban, Ngqura, Port Elizabeth and Cape Town, Reuters reported Tuesday, citing a note dated Monday that Transnet sent to customers.

“Transnet, including Transnet Port Terminals, experienced an act of cyberattack, security intrusion and sabotage, which resulted in the disruption of TPT normal processes and functions or the destruction or damage of equipment or information,” the note reads, according to Bloomberg.

Jul 27 08:50

IBM's newest quantum computer is now up-and-running: Here's what it's going to be used for

IBM has unveiled a brand-new quantum computer in Japan, thousands of miles away from the company's quantum computation center in Poughkeepsie, New York, in another step towards bringing quantum technologies out of Big Blue's labs and directly to partners around the world.

A Quantum System One, IBM's flagship integrated superconducting quantum computer, is now available on-premises in the Kawasaki Business Incubation Center in Kawasaki City, for Japanese researchers to run their quantum experiments in fields ranging from chemistry to finance.

Most customers to date can only access IBM's System One over the cloud, by connecting to the company's quantum computation center in Poughkeepsie.

Jul 27 08:49

Malware developers turn to 'exotic' programming languages to thwart researchers

Malware developers are increasingly turning to unusual or "exotic" programming languages to hamper analysis efforts, researchers say.

According to a new report published by BlackBerry's Research & Intelligence team on Monday, there has been a recent "escalation" in the use of Go (Golang), D (DLang), Nim, and Rust, which are being used more commonly to "try to evade detection by the security community, or address specific pain-points in their development process."

In particular, malware developers are experimenting with loaders and droppers written in these languages, created to be suitable for first and further-stage malware deployment in an attack chain.

BlackBerry's team says that first-stage droppers and loaders are becoming more common in order to avoid detection on a target endpoint, and once the malware has circumvented existing security controls able to detect more typical forms of malicious code, they are used to decode, load, and deploy malware including Trojans.

Jul 27 05:58

EVIDENCE| Secret Emails Used By Obama and Biden Are Hosted By German Intelligence

The biggest concern every American should have is that the Bidens and his staff did not use official emails to communicate about events, gatherings, meet and greets, policies both foreign and domestic. Using unofficial and non-secure modes of communications means a significant concern regarding National Security but more so regarding CORRUPT- under the table antics. More incredible is the TYPE of email SERVICE used. GMX mail which is widely known for being the “GERMAN INTELLIGENCE’S Backyard” to all cyber traffic, was what President Obama, Vice President Biden, and “President” Biden used as an incognito email which meant that he was EVADING COMMUNICATION DETECTION. As President or Vice President, you don’t get PRIVACY; you get discretion. As President or Vice President, you represent our nation, and therefore every time you fart, text, hiccup, or swallow, you are being monitored or recorded.

Jul 27 05:37

US blamed for global chip shortage and rising electronics prices

Huawei Technologies blamed the U.S. for a chip shortage that shook the global industry, saying Washington’s sanctions against Chinese companies sparked panic purchases of semiconductors and other materials.

Due to the US sanctions against Huawei, we have witnessed a panic build-up of stocks among global companies, especially Chinese ones. In the past, companies had little to no stockpiling, but now they are stockpiling for three or six months. This caused the entire system to malfunction.

Chairman of the Board Eric Xu

The US has placed Huawei and other Chinese tech companies on trade blacklists that restrict their access to US technology, citing national security risks.

Jul 27 05:22

Deepfakes: Microsoft and others in big tech are working to bring authenticity to videos, photos

Great (or terrifying) moments in deepfake history: The argument about whether a video of President Joe Biden talking to reporters on the South Lawn of the White House was real (it was). The Dutch, British and Latvian MPs convinced their Zoom conference with the chief of staff of the Russian opposition leader Alexei Navalny was a deepfake. A special effects expert who made their friend look exactly like Tom Cruise for a TikTok video ironically designed to alert people to the dangers of fake footage. Product placement being digitally added to old videos and movies, and Anthony Bourdain's recreated voice speaking in a documentary. A mother creating fake videos of the other members of her daughter's cheerleading squad behaving badly in an attempt to get them kicked off the team. How do you know you can trust what you're looking at anymore?

Jul 27 05:02

59 Million Americans Prohibited From Buying High-End Dell Gaming PCs

Approximately 59 million Americans spanning five states can't buy Dell's high-end Alienware brand desktop PCs "due to power consumption regulations."

When one goes to the Dell Alienware online configurator to buy an Aurora R12 gaming desktop, a special notice appears which reads:

This product cannot be shipped to the states of California, Colorado, Hawaii, Oregon, Vermont or Washington due to power consumption regulations adopted by those states. Any orders placed that are bound for those states will be canceled.

Jul 27 04:49

UK Media Report on 'Iranian Secret Cyber Files' Casts More Doubt Than Confidence, Experts Say

On Monday, Sky News published a story suggesting that Iran has been conducting clandestine research on the possible impact of cyber attacks on civilian infrastructure, including petrol stations, cargo ships and programmable logic controllers, citing what the media outlet claimed were "classified" documents compiled by Iranian intelligence.

The authenticity of the alleged "Iranian secret cyber files" cited by Sky News, on how cyber attacks could be used against civilian infrastructure objects, is debatable, experts said, shortly after the UK media outlet published so-called 'classified documents' said to have been acquired from Iranian intelligence.

Jul 27 04:36

U.S. WEIGHS DEPLOYING BALLOONS TO PROVIDE INTERNET ACCESS TO CUBANS DURING CRACKDOWN

In the aftermath of the Cuban government's response to protests throughout the country, the United States government is weighing what options it has for restoring communication services on the island nation. Internet service is currently suspended throughout Cuba, and some ham radio frequencies are even being jammed in Florida, preventing even rudimentary communications with the island.

In an attempt to remedy the situation and reestablish communication networks in the one-party socialist republic, some officials in the United States government have proposed launching sophisticated high-altitude balloons made by Raven Aerostar over Cuba to provide wireless internet access from above. While the plan sounds good on paper, there are some doubts about how well it could work.

Jul 27 04:30

I Was Targeted by NSO Spyware. Here's How Israel Is Helping Modi Undermine India's Democracy

India loves to describe herself as the world’s largest democracy, and Israel as the only democracy in the Middle East. Yet opaque officials and executives in both countries have come together in a dark dance against democracy.

Indian journalists, top political leaders, judges and civil servants sworn to protect our constitution were subjected to an intrusive surveillance campaign, a "hijacking" of our phones, by military grade surveillance spyware sold by the Israeli company NSO.

I am an investigative journalist, and for two years, I was one of the targets of that invasive Pegasus spyware. In other words, for two years, aided by Israeli

Jul 26 11:27

Militaries Plunder Science Fiction for Technology Ideas, But Turn a Blind Eye to the Genre’s Social Commentary

By Will Slocombe, University of Liverpool

Military planning is a complicated endeavour, calling upon experts in logistics and infrastructure to predict resource availability and technological advancements. Long-range military planning, deciding what to invest in now to prepare armed forces for the world in thirty years’ time, is even more difficult.

One of the most interesting tools for thinking about future defence technology isn’t big data forecasting and the use of synthetic training environments, but narrative and imagination. And we get this from science fiction.

Jul 26 10:39

Malware Can Be Hidden Inside A.I. Models “with near-identical accuracy”

By B.N. Frank

Complaints about Artificial Intelligence technology inaccuracies and misuse are reported frequently. In fact, there’s even a “Hall of Shame”. More bad A.I. news has come out regarding an A.I. malware connection...

Jul 26 10:26

COVID-Tracker App Installs Itself Without User Consent, Including On Parental-Locked Devices.

Massachusetts state officials recently announced the launch of the “voluntary” MassNotify app, which monitors the spread of COVID-19 in the state. The only problem is the app appears to be installing itself on residents’ and their kids’ smartphones, unbeknownst to users, and without their consent.

The news creates a disturbing new dimension to privacy laws and even private property concerns as hundreds of users have reported their Android phones have had the app surreptitiously installed, without their prior knowledge.

“Thank you MA/Google for silently installing #MassNotify on my phone without consent. But I have a request: Can you also silently install an app that makes my phone explode and k*ll me?” wrote Twitter user Justin Jacobs. Others have taken to the Android app store to register their complaints.

Jul 26 09:54

Get those ROUTERS!!

Jul 26 09:41

Ransomware: Here's how much victims have saved in ransom payments by using these free decryption tools

Ransomware gangs been prevented from making over a billion dollars following ransomware attacks by free decryption tools made available by the No More Ransom scheme.

The project, founded by Europol, the National High Tech Crime Unit of the Netherlands' police, Europol's European Cybercrime Centre, Kaspersky, and McAfee, launched five years ago and has grown to involve 170 partners across law enforcement, cybersecurity companies, academia, and others.

The No More Ransom portal now offers 121 free ransomware decryption tools which can decrypt 151 ransomware families. They've helped more than six million ransomware victims recover their encrypted files for free – all without the need to give into the demands of cyber extortionists.

Jul 26 07:49

Pegasus spyware and the consequences for privacy

It's not that long ago that people were preoccupied with the hacking of some social media sites, including those believed to be immune from such things, such as Facebook, Twitter and WhatsApp, for example. Now we have Pegasus spyware.

Pegasus is a programme produced by an Israeli company, NSO, through which mobile telephones can be hacked into and monitored. An investigation has identified around 50,000 phones that have been infected with the programme, which was bought by Arab regimes to spy on their opponents and other parties. The story has been well covered in the media.

However, this is the tip of the iceberg. There is no doubt that security and military agencies in developed countries are already developing advanced generations of Pegasus. When available, they will probably be very cheap.

Jul 26 07:43

Fake Windows 11 installers now used to infect you with malware

Scammers are already taking advantage of the hype surrounding Microsoft's next Windows release to push fake Windows 11 installers riddled with malware, adware, and other malicious tools.

While Windows 11 will start rolling out worldwide during early 2022, Microsoft has already made it available for install to all customers enrolled in the Insider program after officially unveiling it as the next version of Windows last month.

However, hundreds of users have already downloaded installers from unnoficial sources are getting infected with malware, as Kaspersky security researchers discovered.

Jul 26 06:21

MICROSOFT, “WE CAN PROGRAM COMPLEX BEHAVIORS USING DNA”. 3-STRAND DNA CONFIRMED

Jul 26 06:07

BEX ALERT - FBI: China Is Behind Past Oil & Gas Pipeline Cyberattacks

State-sponsored Chinese actors targeted U.S. oil and gas pipeline companies in a spearphishing and intrusion campaign between 2011 and 2013, a Joint Cybersecurity Advisory, coauthored by the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI), said this week.

Jul 26 06:04

THE FBI IS LOCATING CARS BY SPYING ON THEIR WIFI

The FBI is using a controversial technology traditionally used to locate smartphones as a car tracking surveillance tool that spies on vehicles’ on-board WiFi.

Known as a Stingray or a cell-site simulator, the tool masquerades as a cell tower in order to force all devices in a given area to connect into it. Agents can then pick the number they’re interested in and locate the device. Normally that would be a mobile phone, but a search warrant application discovered by Forbes shows it can also be used to find vehicles, as long as they have onboard Wi-Fi. That’s because car Wi-Fi systems act like a phone, in that they reach out to mobile networks to get their data. So it makes sense that police would use it to find a car, though this appears to be the first case on record of it happening.

Jul 26 06:03

PEGASUS IS JUST THE TIP OF THE ISRAELI CYBER SPYING ICEBERG, WITH WHITNEY WEBB

Edward Snowden has called it “the story of the year.” An Israeli spying company has been caught selling software to authoritarian regimes that have used it to surveil more than 50,000 people worldwide.

That company is NSO, founded in 2010 by former members of Unit 8200, the Israeli military’s notorious intelligence squad. Their product is called Pegasus, and it was sold to military, law enforcement, and intelligence agencies in 40 countries, among them some of the world’s worst human rights abusing governments.

Jul 26 05:54

WhatsApp chief: US allies' national security officials targeted with NSO malware

High-ranking government officials around the world were targeted by governments using spyware from NSO Group, according to WhatsApp head Will Cathcart.

Speaking to The Guardian, Cathcart discussed the spyware attacks that were revealed by the Project Pegasus investigation, saying they had parallels with a 2019 attack against 1,400 WhatsApp users.

“The reporting matches what we saw in the attack we defeated two years ago, it is very consistent with what we were loud about then,” Cathcart said. "This should be a wake-up call for security on the internet … mobile phones are either safe for everyone or they are not safe for everyone.”

Jul 26 05:45

A man used AI to bring back his deceased fiancé. But the creators of the tech warn it could be dangerous and used to spread misinformation.

After Joshua Barbeau's fiancé passed away, he spoke to her for months. Or, rather, he spoke to a chatbot programmed to sound exactly like her.

In a story for the San Francisco Chronicle, Barbeau detailed how Project December, a software that uses artificial intelligence technology to create hyper-realistic chatbots, recreated the experience of speaking with his late fiancé. All he had to do was plug in old messages and give some background information, and suddenly the model could emulate his partner with stunning accuracy.

It may sound like a miracle (or a Black Mirror episode), but the AI creators warn that the same technology could be used to fuel mass misinformation campaigns.

Jul 25 21:12

The Big Antivirus Lie in 2021

Do you need an Antivirus? Surprisingly, my answer is an emphatic NO. I lay out the problems with Antivirus software and how in 2021, they actually detract from security and privacy and not enhance it.

We will also talk about alternate solutions for cyber security that does not require paying for any antivirus.

Jul 25 19:54

The White House versus Fakebook – As we watch them eat their own with playing the blame game we note Press Sec admitted to violating constitution

The U.S. government has no business colluding with social media companies, otherwise those companies become nothing more than a government mouthpiece and entity and should be labeled and advertised as such. -- In their original sign up pages, Facebook should be forced to inform their possible new users that they are a government controlled website, so people have the truth before deciding to sign up.

Jul 25 07:28

Spyware for sale: The booming trade in surveillance tech

Israel’s NSO Group is in the eye of a storm over its Pegasus spyware — but it is far from the only company helping governments with their covert surveillance operations.

Explosive claims that Pegasus was used to spy on activists and even heads of state have shone a spotlight on the software, which allows highly intrusive access to a person’s mobile phone.

But NSO is merely one player in an industry that has quietly boomed in recent years, arming even cash-strapped governments with powerful surveillance technology.

Jul 25 06:31

Pegasus Project: Why I was Targeted by Israeli Spyware

The Orwellian prediction finally came true. I knew it was only a matter of time before the Saudi regime tried to hack my phone, using Pegasus software manufactured by the private Israeli security company NSO Group.

This development highlights the consolidation of a new axis of evil: Israel, Saudi Arabia and the UAE have become a chorus of malicious powers aiming to stifle activism and the quest for democracy in the region. Israel provides knowledge; the others provide funds.

“I have spent more than half my life writing, researching and teaching. You wouldn’t expect me to be hacked. But such professional activities are a crime in Saudi Arabia”

The privatisation of the Israeli security apparatus, and the mushrooming of private companies founded by ex-defence and ex-Mossad agents, is a threat not only to Palestinians in Israel, Gaza and the occupied West Bank, but also to all Gulf citizens, with Israeli spyware sold to dictatorships across the Arab world.

Jul 25 06:16

Blinken: Message that There’s New Sheriff on Cyberwarfare ‘Has Been Sent’ to China, Russia

On Friday’s broadcast of MSNBC’s “Morning Joe,” Secretary of State Antony Blinken argued that the message that there’s a new sheriff in town on cyber warfare “has been sent” to countries like Russia and China, “and, as necessary, will be sent again.”

Co-host Mika Brzezinski asked, “Let’s jump to Russia, and the issue of cyberwarfare, which I think also then ends us up in China. What is the United States prepared to do to make sure this doesn’t happen again? What’s next when the next attack happens to kind of send the message to Vladimir Putin that there’s a new sheriff in town?”

Jul 25 06:15

‘Pegasus’ Spyware Targeted 10 Prime Ministers, 3 Presidents, and a King

Spies looking to gain information on world leaders reportedly used the “Pegasus” smartphone spyware to target world leaders including three presidents, ten prime ministers, and a king.

The Washington Post reports that governments worldwide are facing allegations that they used malware developed by the Israeli firm NSO Group to spy on the mobile devices of activists, journalists, corporate executives, and politicians. An international investigation has scrutinized the spyware, named Pegasus, and a list of more than 50,000 phone numbers that included the numbers of hundreds of politicians and government officials.

Jul 25 05:50

This Biden Proposal Could Make US a ‘Digital Dictatorship’

A “new” proposal by the Biden administration to create a health-focused federal agency modeled after DARPA is not what it appears to be. Promoted as a way to “end cancer,” this resuscitated “health DARPA” conceals a dangerous agenda.

Jul 23 18:53

Drive with On-Board Wi-Fi? It’s Allowing The FBI To Spy On Your Vehicle

By B.N. Frank

Even if you’re not worried about health risks – it might bother you to know that the FBI can spy on your car via your on-board Wi-Fi...

Jul 23 13:12

2nd Recall of Chevy EVs Due to Battery Fires; “life with an affected car is going to be a lot less convenient than it used to be.”

By B.N. Frank

Battery fires have led to a recalls in Hyundai Electric Vehicles (EVs) and also General Motors models. Now GM has issued a second recall regarding the Chevrolet Bolt...

Jul 23 11:14

Microsoft issues warning to ALL Windows 10 users: You need to follow these steps now

Windows 10 users have been put on high alert over a dangerous new flaw found lurking inside the popular desktop operating system. Dubbed SeriousSAM, it allows bad actors to gain administrator rights on vulnerable systems – enabling them to install malware, applications, delete files, and much more. SeriousSAM is a so-called "zero-day vulnerability", which means that attackers are already aware of how to leverage the flaw. That means Microsoft is in a race against the hackers – to fix the problem before too many people fall victim to hackers exploiting the issue.

Thankfully, Microsoft is working on a fix. However, these things take some time. And while the Redmond-based company is hard at work on a permanent patch for the problem, which it refers to as CVE-2021-36934, Microsoft has shared a workaround to protect your laptop, desktop PC, or tablet from these attacks.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA