COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED X-Frame-Options: SAMEORIGIN

COMPUTERS/INTERNET/SECURITY

Aug 04 07:24

Google will kill off very old versions of Android next month

Google has started emailing users of very old Android devices to tell them it's time to say goodbye.

Starting September 27, devices running Android 2.3.7 and lower will no longer be able to log in to Google services, effectively killing a big portion of the on-rails Android experience. As Google puts it in an official community post, "If you sign in to your device after September 27, you may get username or password errors when you try to use Google products and services like Gmail, YouTube, and Maps."

Aug 03 13:40

British navy group: ‘Potential hijack’ of ship off UAE coast

The British navy warned Tuesday of a "potential hijack" of a ship off the coast of the United Arab Emirates in the Gulf of Oman, without elaborating.

The incident comes amid heightened tensions between Iran and the West over its tattered nuclear deal and as commercial shipping in the region has found itself in the crosshairs over it. Most recently, the U.S., the U.K. and Israel have blamed Iran for a drone attack on an oil tanker off Oman that killed two people. Iran has denied being involved.

The British military's United Kingdom Maritime Trade Operations initially warned ships Tuesday that "an incident is currently underway" off the coast of Fujairah. Hours later, they said the incident was a "potential hijack." They did not elaborate.

The U.S. military's Mideast-based 5th Fleet and the British Defense Ministry did not immediately return calls for comment. The Emirati government did not immediately acknowledge the incident.

Aug 03 13:05

Warship positions faked including UK aircraft carrier

A carrier strike group led by HMS Queen Elizabeth had its automatic identification system (AIS) position faked, researchers discovered.

AIS is a key maritime safety system used to track vessel movements.

Nearly 100 naval ships may have had their AIS position altered, environmental groups SkyTruth and Global Fishing Watch found.

The ships included vessels from European and US navies, including 11 from the Royal Navy.

The Ministry of Defence (MOD) said there was no "operational impact" on the strike group, which also featured smaller vessels from the Dutch and Belgian navies, but any manipulation of AIS "could result in a serious incident".

"We are aware of manipulation of AIS tracking data placing carrier strike group vessels in areas where they were not", the MOD said.

Aug 03 11:52

Warship positions faked including UK aircraft carrier

A carrier strike group led by HMS Queen Elizabeth had its automatic identification system (AIS) position faked, researchers discovered.

AIS is a key maritime safety system used to track vessel movements.

Nearly 100 naval ships may have had their AIS position altered, environmental groups SkyTruth and Global Fishing Watch found.

The ships included vessels from European and US navies, including 11 from the Royal Navy.

The Ministry of Defence (MOD) said there was no "operational impact" on the strike group, which also featured smaller vessels from the Dutch and Belgian navies, but any manipulation of AIS "could result in a serious incident".

"We are aware of manipulation of AIS tracking data placing carrier strike group vessels in areas where they were not", the MOD said.

Aug 03 09:00

THE PENTAGON IS EXPERIMENTING WITH USING ARTIFICIAL INTELLIGENCE TO “SEE DAYS IN ADVANCE”

“Remember the one about better broadband Internet options for rural customers? haha”

And now…

Global Information Dominance Experiments (GIDE) use Starlink.

Aug 03 07:57

Caitlin Johnstone: How long before we humans are being policed by robots?

The elites are seeking to normalize the use of police robots by calling them ‘dogs’ – but the machines are the vanguard of a dystopian future that will see them cement their power in place forever.

Hawaii police are defending their use of pandemic relief funds for a robotic “police dog” made by Boston Dynamics which scans homeless people’s eyes to see if they have a fever.

“If you’re homeless and looking for temporary shelter in Hawaii’s capital, expect a visit from a robotic police dog that will scan your eye to make sure you don’t have a fever,” a new report from AP says. “That’s just one of the ways public safety agencies are starting to use Spot, the best-known of a new commercial category of robots that trot around with animal-like agility.”

Aug 03 06:16

Pentagon is using artificial intelligence to predict the future and give it 'days of advanced warning' on attacks on sensitive sites like the Panama Canal

The Pentagon is stealing a page from Minority Report with an experimental artificial-intelligence program that can look 'days in advance' and predict possible attacks on vulnerable locations.

The Global Information Dominance Experiments, or GIDE, use machine learning to sift through vast amounts of data to notice tiny changes that humans might miss - such as the number of cars increasing or decreasing in a parking lot - which might indicate an evolving threat.

The program can then alert human agents who can take a closer look at the location.

Webmaster's Commentary: 

So, all the enemy has to do is set the date for the attack with a pair of dice and the system breaks down?

Aug 02 18:33

The Cryptocurrency Surveillance Provision Buried in the Infrastructure Bill is a Disaster for Digital Privacy

By Rainey Reitman

The forthcoming Senate draft of Biden’s infrastructure bill—a 2,000+ page bill designed to update the United States’ roads, highways, and digital infrastructure—contains a poorly crafted provision that could create new surveillance requirements for many within the blockchain ecosystem. This could include developers and others who do not control digital assets on behalf of users.

While the language is still evolving, the proposal would seek to expand the definition of “broker” under section 6045(c)(1) of the Internal Revenue Code of 1986 to include anyone who is “responsible for and regularly providing any service effectuating transfers of digital assets” on behalf of another person. These newly defined brokers would be required to comply with IRS reporting requirements for brokers, including filing form 1099s with the IRS. That means they would have to collect user data, including users’ names and addresses...

Aug 02 10:14

PwnedPiper PTS Security Flaws Threaten 80% of Hospitals in the U.S.

Cybersecurity researchers on Monday disclosed a set of nine vulnerabilities known as "PwnedPiper" that left a widely-used pneumatic tube system (PTS) vulnerable to critical attacks, including a possibility of complete takeover.

The security weaknesses, disclosed by American cybersecurity firm Armis, impact the Translogic PTS system by Swisslog Healthcare, which is installed in about 80% of all major hospitals in North America and in no fewer than 3,000 hospitals worldwide.

"These vulnerabilities can enable an unauthenticated attacker to take over Translogic PTS stations and essentially gain complete control over the PTS network of a target hospital," Armis researchers Ben Seri and Barak Hadad said. "This type of control could enable sophisticated and worrisome ransomware attacks, as well as allow attackers to leak sensitive hospital information."

Aug 02 07:43

SCIENCE WRITER SUSPENDED FROM TWITTER FOR QUOTING RESULTS OF PFIZER CLINICAL TRIAL

Twitter suspended the account of science writer and former New York Times reporter Alex Berenson for sharing the newly-released results of the "pivotal" Pfizer clinical trial which completely undermine the narrative of our medical establishment

Aug 02 07:28

FLORIDA SHERIFF’S OFFICE NOW NOTIFYING PEOPLE IT WILL BE INFLICTING ITS PRE-CRIME PROGRAM ON THEM

The Pasco County (FL) Sheriff’s Office has been swamped with negative press coverage centering on its predictive policing program. The Office claims it’s not "predictive policing," but rather "intelligence-led policing." Whatever you call it, it sucks.

Aug 02 06:42

3D Printed Soft Robo-Hand Can Play Nintendo Super Mario Bros. And Win

What if Americans become too obese and lazy that they had robots play video games for them one day?

University of Maryland researchers have 3D printed a soft robotic hand capable of playing Super Mario Bros. on the Nintendo Entertainment System (NES). The soft robotic hand is flexible and powered by air rather than electricity.

The breakthrough in soft robotics is led by University of Maryland assistant professor of mechanical engineering Ryan D. Sochol and his team, who 3D print a fully functional soft robotic hand with "integrated fluidic circuits" that allowed it to be programmed and play NES.

"Previously, each finger of a soft robotic hand would typically need its own control line, which can limit portability and usefulness," said co-first author Joshua Hubbard. "But by 3D printing the soft robotic hand with our integrated fluidic transistors, it can play Nintendo based on just one pressure input."

Aug 02 06:37

Need A Divorce? There's An App For That, And They Just Raised $2 Million

750,000 divorces happen, on average, every year in the U.S.

While some call that a shame, others see it as a total addressable market. Take, for example, online divorce startup Hello Divorce. They have just raised $2 million to help couples streamline to the inevitable: splitting up. The company provides a combination of software and legal services that start at $99 and average at about $2,000.

The company's seed rounding of funding was "led by CEAS, with additional funds coming from Lightbank, Northwestern Mutual Future Ventures, Gaingels and a group of individuals including Clio CEO Jack Newton, WRG’s Lisa Stone and Equity ESQ led by Ed Diab," according to TechCrunch.

Aug 02 05:39

The War on Freedom: How Tyranny Overran the United States

The super-rich already had their consultants come up with detailed studies on how to divide up citizens by religion, by ethnic identity, by cultural signifiers, and by class so that they are incapable of unity even in the face of the complete takeover of the economy, the media, education and the political process. -- Nothing will get better until citizens recognize the cause of this nightmare was not the legacy of the Bushes, the Clintons, the Obamas or the Trumps, although they all played their role, but rather the end of the self-reliant and informed citizen with access to the writings of experts with a deep commitment to the scientific method and to ethical principles.

Aug 01 13:35

SpaceX and Other Internet Service Providers Asked to Return Money Former FCC Chair Shouldn’t Have Given Them

By B.N. Frank

According to a group of telecom experts (The Irregulators) who filed a lawsuit filed against the Federal Communications Commission (FCC), Americans have been overcharged for decades for telecommunications services that millions still haven’t received. Over the years, Irregulator Bruce Kushnick has written dozens of articles about how the corrupt and “captured” Federal Communications Commission (FCC) made this possible. Of course legislators made this possible too. Now the current acting FCC chair has accused the previous FCC chair of “mismanaging” taxpayer money...

Aug 01 11:35

Remote print server gives anyone Windows admin privileges on a PC

A researcher has created a remote print server allowing any Windows user with limited privileges to gain complete control over a device simply by installing a print driver.

In June, a security researcher accidentally revealed a zero-day Windows print spooler vulnerability known as PrintNightmare (CVE-2021-34527) that allowed remote code execution and elevation of privileges.

While Microsoft released a security update to fix the vulnerability, researchers quickly figured out ways to bypass the patch under certain conditions.

Since then, researchers have continued to devise new ways to exploit the vulnerability, with one researcher creating an Internet-accessible print server allowing anyone to open a command prompt with administrative privileges.

Aug 01 05:40

Pegasus: Flying on the wings of Israeli ‘cyber-tech diplomacy’?

What was the role of the Israeli state in the spread of an insidious piece of malware? Plus, PR companies and the work they do with controversial governments.

A global cyber-surveillance scandal – spyware developed in Israel – has put the government there under the media microscope, and its story does not add up.

Jul 31 08:24

Have The Social Media Companies Become Way Too Powerful?

Do you remember the early days of the Internet? It was like “the wild west”, and that could be bad, but in many ways it was also very good. The Internet was very decentralized at that time, and information could flow very freely. For the very first time, ordinary people could communicate with others all over the globe on a massive scale, and I believe that was an incredibly positive development for humanity. Unfortunately, the elite were absolutely horrified by this free flow of information and they became obsessed with restricting it. Today, highly advanced algorithms have been designed to shape our behavior online. We are increasingly being funneled to just a handful of immensely powerful corporate-owned websites, and information on those sites is heavily monitored, controlled and censored.

Jul 31 08:23

27 Groups Urge Congress To Close FBI ‘Backdoor Search’ Loophole

Over two dozen advocacy groups on Monday sent a letter urging members of Congress to back a measure that, if enacted, would close the so-called “backdoor search” loophole that allows warrantless surveillance of U.S. citizens’ data by government agencies including the FBI and CIA.

The letter (pdf), led by Demand Progress and signed by 27 groups, calls on House leaders to support an amendment to H.R. 4505 – the Commerce, Justice, Science, and Related Agencies Appropriations Act for Fiscal Year 2022 – proposed by Reps. Zoe Lofgren (D-Calif.), Pramila Jayapal (D-Wash.), Thomas Massie (R-Ky.), and Warren Davidson (R-Ohio).

If passed, the amendment would prohibit the use of funds for the warrantless search of Americans’ communications acquired under Section 702 of the Foreign Intelligence Surveillance Act of 1978 (FISA), which the letter’s authors call a “controversial foreign intelligence authority that acquires an untold number of Americans’ Fourth Amendment-protected information.”

Jul 31 07:37

Big Tech Is Out of Control and Threatens to Annihilate Our Liberties

Big Tech is out of control — and the time to save our liberties and freedoms is quickly running out.

This month, White House press secretary Jen Psaki made a stunning admission: the Federal Government is directly colluding with Facebook to flag "problematic" social media content on its platform.

"In terms of actions that we have taken or we’re working to take, I should say, from the federal government, we’ve increased disinformation research and tracking,” she revealed during a press conference. “Within the Surgeon General’s Office, we’re flagging posts for Facebook that spread disinformation."

Jul 31 07:28

Robotic police dogs: Useful hounds or dehumanizing machines?

If you’re homeless and looking for temporary shelter in Hawaii’s capital, expect a visit from a robotic police dog that will scan your eye to make sure you don’t have a fever.

That’s just one of the ways public safety agencies are starting to use Spot, the best-known of a new commercial category of robots that trot around with animal-like agility.

The handful of police officials experimenting with the four-legged machines say they’re just another tool, like existing drones and simple wheeled robots, to keep emergency responders out of harm’s way as they scout for dangers. But privacy watchdogs — the human kind — warn that police are secretly rushing to buy the robots without setting safeguards against aggressive, invasive or dehumanizing uses.

In Honolulu, the police department spent about $150,000 in federal pandemic relief money to buy their Spot from robotics firm Boston Dynamics for use at a government-run tent city near the airport.

Jul 30 23:36

Home car charger owners urged to install updates

Security researchers have discovered failings in two home electric car chargers.

The researchers were able to make the chargers switch on or off, remove the owner's access, and show how a hacker could get into a user's home network.

Most of the faults have now been fixed but owners are being told to update their apps and chargers, to be safe.

Jul 30 11:50

How Amazon’s $10 Billion Contract Squabble with the Pentagon Reveals the Shady Nature of Military Contracts

By Peter Jacobsen

Earlier this month the US Department of Defense (DOD) canceled a $10 billion Joint Enterprise Defense Infrastructure (JEDI) contract awarded to Microsoft in 2019. The goal of the contract was to modernize the Department’s IT operations using cloud computing.

The JEDI cancellation occurred following a lawsuit from Amazon after the company was denied the contract. Amazon alleges that they were rejected because the Department of Defense was pressured by then President Donald Trump to “screw Amazon.” The motivation for this move, it was claimed, was driven by Trump’s personal animus for then-CEO Jeff Bezos, who also owns The Washington Post.

Jul 29 19:23

DHS’s Flawed Plan for Mobile Driver’s Licenses

By Adam Schwartz and Alexis Hancock

Digital identification can invade our privacy and aggravate existing social inequities. Designed wrong, it might be a big step towards national identification, in which every time we walk through a door or buy coffee, a record of the event is collected and aggregated. Also, any system that privileges digital identification over traditional forms will disadvantage people already at society’s margins...

Jul 29 13:52

New destructive Meteor wiper malware used in Iranian railway attack

In a new report by SentinelOne, security researcher Juan Andres Guerrero-Saade revealed that the cyberattack on Iran utilized a previously unseen file wiper called Meteor.

A wiper is malware that intentionally deletes files on a computer and causes it to become unbootable.

Unlike ransomware attacks, destructive wiper attacks are not used to generate revenue for the attackers. Instead, their goal is to cause chaos for an organization or to distract admins while another attack is taking place.

Jul 29 13:50

NSA shares guidance on how to secure your wireless devices

Hijacked wireless devices, including laptops, tablets, mobile, and wearable accessories, can lead to the compromise of personal and corporate data, such as credentials and sensitive documents.

To mitigate these risks, the NSA recommends avoiding public Wi-Fi networks as they expose traffic data to theft or manipulation, disabling Bluetooth and NFC radios while in public and not in use to avoid exposing info that can be used to hack the device.

"Users should consider additional security measures, including limiting/disabling device location features, using strong device passwords, and only using trusted device accessories, such as original charging cords," the NSA added.

Jul 29 13:07

Fighting the Urban Surveillance Infrastructure

By Amanda Bowers

The government uses a vast multi-layered system of surveillance to keep tabs on people. From cell phones to traffic cameras – big brother is always watching (and listening). It is also generally believed that there is collusion between the government and big tech.

So what do we do about it?...

Jul 29 11:44

Video game allows player to “disinfect” cities of anti-lockdown protesters and “save lives” by blowing them up with thermite grenades

Video gamers who support the government’s fascist Wuhan coronavirus (Covid-19) dictates have a new opportunity to murder those who oppose lockdowns, face masks, and “vaccines” – at least digitally.

The Steam gaming platform has made available to its users a three-minute, first-person-shooter video game called “STAYHOMER” that has one simple objective: to blow up as many anti-lockdown protesters as you can with thermite grenades.

The setting is cast in the streets of Tokyo, where a large contingent of protesters has gathered to oppose the government’s stay-at-home orders for the Fauci Flu. The job of the protagonist is to blast the crowd with “disinfectant,” also known as deadly grenades that will “purify” them all into non-existence.

Jul 29 11:32

MEMORY HOLE: USA Today buries its own report that says vaccinated individuals have “higher levels” of coronavirus than the unvaccinated

After earlier reporting that people who have been “vaccinated” for the Wuhan coronavirus (Covid-19) can still become infected with and spread deadly disease, USA Today reportedly scrubbed this information from its website, effectively memory holing its own reporting.

Jul 29 11:29

Apple broke bad news to iPhone fans

We've known this was a problem.

I expected that if there was any time when Apple top brass would mention it, it would be during the earnings call.

And that's when it happened.

Read More

Apple, like most other tech firms, is feeling the pinch due to component shortages.

A word that came up a lot during the call was "constraints." It was up to Apple CFO Luca Maestri to break the bad news.

Jul 29 05:44

Report: ‘Extensive’ Gay Hookup App Usage Compromises Vatican Security

Location-based homosexual and heterosexual hookup apps are widely used within Vatican walls, an investigative report revealed late Tuesday, which can open the Holy See to blackmail and other security risks.

The report by the Pillar, an online Catholic news agency, raised particular concerns of vulnerability to China, which until 2020 owned the gay hookup app Grindr, one of the services whose use in the Vatican was uncovered.

The Pillar revealed that at least 16 different mobile devices emitted signals from Grindr on at least four days between March and October 2018 within the areas of the Vatican City State not open to the public.

Jul 29 05:24

Mexico says officials spent $61 million on Pegasus spyware

Mexico’s top security official said Wednesday that two previous administrations spent $61 million to buy Pegasus spyware that has been implicated in government surveillance of opponents and journalists around the world.

Public Safety Secretary Rosa Icela Rodríguez said records had been found of 31 contracts signed during the administrations of President Felipe Calderón in 2006-2012 and President Enrique Peña Nieto in 2012-18. Some contracts may have been disguised as purchases of other equipment.

The government said many of the contracts with the Israeli spyware firm NSO Group were signed with front companies, which are often used in Mexico to facilitate kickbacks or avoid taxes.

Last week, the government's top anti-money laundering investigator said officials from the two previous administrations had spent about $300 million in government money to purchase spyware. But that figure may reflect all spyware and surveillance purchases, or may include yet-unidentified contracts.

Jul 28 08:50

Get patching: US, UK, and Australia issue joint advisory on top 30 exploited vulnerabilities

At the end of almost seven months in 2021, one of the 30 most exploited vulnerabilities dates from 2017, according to the US Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Centre (ACSC), the United Kingdom's National Cyber Security Centre (NCSC), and the US FBI.

CVE-2017-11882 is the holder of the dubious honour, and it is due to a stack buffer overflow in the equation editor of Microsoft Office, which can lead to remote code execution (RCE). It is an exploit that vendors have been banging on about for years already.

The quartet of agencies said on Wednesday that the easiest way to fix this hole, and the 29 others listed, would be to patch systems.

Jul 28 08:17

Facebook-owned apps can track and harvest your data even if you aren’t actively using them

Many smartphone apps track people’s data, including their current locations, even when they are not actively using them. Experts say one of the worst offenders is Facebook Messenger, the social media company’s dedicated messaging app.

Experts are now encouraging people to do their research and think about what personal data they could be giving away by downloading and signing up to apps like Facebook Messenger.

“I am mindful about who to invite into my home so I’d think the same about what I have on my phone and be conservative with the apps you download,” said Michael Huth, chief research officer and co-founder of a personal privacy-oriented browser with its own search engine and app.

Huth advised people to downgrade what Facebook Messenger can access from their smartphones. The Facebook app can harvest all sorts of data from its users if they do not do so, especially if they are unaware of what the app can access.

Jul 28 05:52

"Greatest Danger To National Security" - Ed Snowden Exposes The 'Insecurity' Industry

Prior to this week’s Pegasus Project, a global reporting effort by major newspapers to expose the fatal consequences of the NSO Group—the new private-sector face of an out-of-control Insecurity Industry—most smartphone manufacturers along with much of the world press collectively rolled their eyes at me whenever I publicly identified a fresh-out-of-the-box iPhone as a potentially lethal threat.

Jul 28 05:49

Biden Says Cyberattacks Could Lead to a ‘Real Shooting War’ With a Major Power

The US is constantly accusing countries like Russia and China of carrying out cyberattacks, and comments from President Biden on Tuesday suggest he could use these claims as a pretext for military intervention. He warned that if Washington ended up in a “real shooting war with a major power,” it could be the result of a cyberattack on the US.

“You know, we’ve seen how cyber threats, including ransomware attacks, increasingly are able to cause damage and disruption to the real world,” Biden said in a speech during a visit to the Office of the Director of National Intelligence. “I think it’s more likely we’re going to end up — well, if we end up in a war, a real shooting war with a major power, it’s going to be as a consequence of a cyber breach of great consequence.”

Webmaster's Commentary: 

Setting the stage for a false-flag "Cyber Pearl Harbor?"

Jul 27 13:29

EFF Sues U.S. Postal Service For Records About Covert Social Media Spying Program

Washington D.C.—The Electronic Frontier Foundation (EFF) filed a Freedom of Information Act (FOIA) lawsuit against the U.S. Postal Service and its inspection agency seeking records about a covert program to secretly comb through online posts of social media users before street protests, raising concerns about chilling the privacy and expressive activity of internet users.

Under an initiative called Internet Covert Operations Program, analysts at the U.S. Postal Inspection Service (USPIS), the Postal Service’s law enforcement arm, sorted through massive amounts of data created by social media users to surveil what they were saying and sharing, according to media reports. Internet users’ posts on Facebook, Twitter, Parler, and Telegram were likely swept up in the surveillance program...

Jul 27 13:17

BREAKING: Arizona Senate Serves Maricopa County With Subpoena for Routers, Ballot Envelopes, Voter Databases

The Arizona Senate have served Maricopa County with another subpoena relating to the forensic audit of the 2020 election, asking for ballot envelopes, routers, and voter databases, among other requests.

The news about the subpoena was broken late Monday on CNN by Bill Gates, one of the RINO members of the Maricopa Board of Supervisors. “Right before I came on here, the board of supervisors received another subpoena from the state Senate ordering us to turn over the routers, in addition to some other information,” Gates said. “And they threaten us in these papers that if we do not turn those over by August 2nd, so that’s next Monday, then we could be held in contempt,” he continued. The subpoena, posted to Twitter by ABC15’s Garrett Archer, included requests to Maricopa County for:

Jul 27 13:14

World Bank Funded Digital Identity Scheme in Nigeria Leads 60m to Link National ID to SIM Cards

(Biometric Update) – Nigeria’s federal government says well over 59 million people have now been biometrically enrolled for the National Identification Number (NIN) as deadline for the linkage of the IDs to SIM cards has been extended yet again. The new deadline is now October 31, 2021.

The decision for mobile phone users in Nigeria to link their digital ID numbers to their SIM cards went effective in December and there have been at least six deadline extensions since then...

Jul 27 10:36

Biden Gives “Five Eyes” What It Always Wanted: Access To Everyone’s Social Media

By MassPrivateI

For years, Americans have largely ignored corporate social media surveillance. But that all of that is about to change, thanks to President Biden.

No one has taken the White House’s plan to turn Big Tech into a quasi-Five Eyes censorship program seriously despite repeated warnings from journalists and news websites.

Reuters revealed some of America’s biggest tech companies will let “Five Eyes” and the U.N. decide whose stories the “Global Internet Forum to Counter Terrorism” should censor.

“Until now, the Global Internet Forum to Counter Terrorism’s (GIFCT) database has focused on videos and images from terrorist groups on a United Nations list and so has largely consisted of content from Islamist extremist organizations such as Islamic State, al Qaeda and the Taliban.”

Big Tech’s GIFCT is essentially a Five Eyes censorship program, masquerading as a Big Tech social media forum to stop terrorism and extremism...

Jul 27 09:55

Key South African ports declare ‘force majeure’ after cyberattack

South Africa’s state-owned ports and freight rail operator Transnet has declared “force majeure” at the country’s main container terminals because of “an act of cyberattack, security intrusion and sabotage” that struck last week.

The measure, which releases a company from fulfilling contractual obligations, affects key container terminals in Durban, Ngqura, Port Elizabeth and Cape Town, Reuters reported Tuesday, citing a note dated Monday that Transnet sent to customers.

“Transnet, including Transnet Port Terminals, experienced an act of cyberattack, security intrusion and sabotage, which resulted in the disruption of TPT normal processes and functions or the destruction or damage of equipment or information,” the note reads, according to Bloomberg.

Jul 27 08:50

IBM's newest quantum computer is now up-and-running: Here's what it's going to be used for

IBM has unveiled a brand-new quantum computer in Japan, thousands of miles away from the company's quantum computation center in Poughkeepsie, New York, in another step towards bringing quantum technologies out of Big Blue's labs and directly to partners around the world.

A Quantum System One, IBM's flagship integrated superconducting quantum computer, is now available on-premises in the Kawasaki Business Incubation Center in Kawasaki City, for Japanese researchers to run their quantum experiments in fields ranging from chemistry to finance.

Most customers to date can only access IBM's System One over the cloud, by connecting to the company's quantum computation center in Poughkeepsie.

Jul 27 08:49

Malware developers turn to 'exotic' programming languages to thwart researchers

Malware developers are increasingly turning to unusual or "exotic" programming languages to hamper analysis efforts, researchers say.

According to a new report published by BlackBerry's Research & Intelligence team on Monday, there has been a recent "escalation" in the use of Go (Golang), D (DLang), Nim, and Rust, which are being used more commonly to "try to evade detection by the security community, or address specific pain-points in their development process."

In particular, malware developers are experimenting with loaders and droppers written in these languages, created to be suitable for first and further-stage malware deployment in an attack chain.

BlackBerry's team says that first-stage droppers and loaders are becoming more common in order to avoid detection on a target endpoint, and once the malware has circumvented existing security controls able to detect more typical forms of malicious code, they are used to decode, load, and deploy malware including Trojans.

Jul 27 05:58

EVIDENCE| Secret Emails Used By Obama and Biden Are Hosted By German Intelligence

The biggest concern every American should have is that the Bidens and his staff did not use official emails to communicate about events, gatherings, meet and greets, policies both foreign and domestic. Using unofficial and non-secure modes of communications means a significant concern regarding National Security but more so regarding CORRUPT- under the table antics. More incredible is the TYPE of email SERVICE used. GMX mail which is widely known for being the “GERMAN INTELLIGENCE’S Backyard” to all cyber traffic, was what President Obama, Vice President Biden, and “President” Biden used as an incognito email which meant that he was EVADING COMMUNICATION DETECTION. As President or Vice President, you don’t get PRIVACY; you get discretion. As President or Vice President, you represent our nation, and therefore every time you fart, text, hiccup, or swallow, you are being monitored or recorded.

Jul 27 05:37

US blamed for global chip shortage and rising electronics prices

Huawei Technologies blamed the U.S. for a chip shortage that shook the global industry, saying Washington’s sanctions against Chinese companies sparked panic purchases of semiconductors and other materials.

Due to the US sanctions against Huawei, we have witnessed a panic build-up of stocks among global companies, especially Chinese ones. In the past, companies had little to no stockpiling, but now they are stockpiling for three or six months. This caused the entire system to malfunction.

Chairman of the Board Eric Xu

The US has placed Huawei and other Chinese tech companies on trade blacklists that restrict their access to US technology, citing national security risks.

Jul 27 05:22

Deepfakes: Microsoft and others in big tech are working to bring authenticity to videos, photos

Great (or terrifying) moments in deepfake history: The argument about whether a video of President Joe Biden talking to reporters on the South Lawn of the White House was real (it was). The Dutch, British and Latvian MPs convinced their Zoom conference with the chief of staff of the Russian opposition leader Alexei Navalny was a deepfake. A special effects expert who made their friend look exactly like Tom Cruise for a TikTok video ironically designed to alert people to the dangers of fake footage. Product placement being digitally added to old videos and movies, and Anthony Bourdain's recreated voice speaking in a documentary. A mother creating fake videos of the other members of her daughter's cheerleading squad behaving badly in an attempt to get them kicked off the team. How do you know you can trust what you're looking at anymore?

Jul 27 05:02

59 Million Americans Prohibited From Buying High-End Dell Gaming PCs

Approximately 59 million Americans spanning five states can't buy Dell's high-end Alienware brand desktop PCs "due to power consumption regulations."

When one goes to the Dell Alienware online configurator to buy an Aurora R12 gaming desktop, a special notice appears which reads:

This product cannot be shipped to the states of California, Colorado, Hawaii, Oregon, Vermont or Washington due to power consumption regulations adopted by those states. Any orders placed that are bound for those states will be canceled.

Jul 27 04:49

UK Media Report on 'Iranian Secret Cyber Files' Casts More Doubt Than Confidence, Experts Say

On Monday, Sky News published a story suggesting that Iran has been conducting clandestine research on the possible impact of cyber attacks on civilian infrastructure, including petrol stations, cargo ships and programmable logic controllers, citing what the media outlet claimed were "classified" documents compiled by Iranian intelligence.

The authenticity of the alleged "Iranian secret cyber files" cited by Sky News, on how cyber attacks could be used against civilian infrastructure objects, is debatable, experts said, shortly after the UK media outlet published so-called 'classified documents' said to have been acquired from Iranian intelligence.

Jul 27 04:36

U.S. WEIGHS DEPLOYING BALLOONS TO PROVIDE INTERNET ACCESS TO CUBANS DURING CRACKDOWN

In the aftermath of the Cuban government's response to protests throughout the country, the United States government is weighing what options it has for restoring communication services on the island nation. Internet service is currently suspended throughout Cuba, and some ham radio frequencies are even being jammed in Florida, preventing even rudimentary communications with the island.

In an attempt to remedy the situation and reestablish communication networks in the one-party socialist republic, some officials in the United States government have proposed launching sophisticated high-altitude balloons made by Raven Aerostar over Cuba to provide wireless internet access from above. While the plan sounds good on paper, there are some doubts about how well it could work.

Jul 27 04:30

I Was Targeted by NSO Spyware. Here's How Israel Is Helping Modi Undermine India's Democracy

India loves to describe herself as the world’s largest democracy, and Israel as the only democracy in the Middle East. Yet opaque officials and executives in both countries have come together in a dark dance against democracy.

Indian journalists, top political leaders, judges and civil servants sworn to protect our constitution were subjected to an intrusive surveillance campaign, a "hijacking" of our phones, by military grade surveillance spyware sold by the Israeli company NSO.

I am an investigative journalist, and for two years, I was one of the targets of that invasive Pegasus spyware. In other words, for two years, aided by Israeli

Jul 26 11:27

Militaries Plunder Science Fiction for Technology Ideas, But Turn a Blind Eye to the Genre’s Social Commentary

By Will Slocombe, University of Liverpool

Military planning is a complicated endeavour, calling upon experts in logistics and infrastructure to predict resource availability and technological advancements. Long-range military planning, deciding what to invest in now to prepare armed forces for the world in thirty years’ time, is even more difficult.

One of the most interesting tools for thinking about future defence technology isn’t big data forecasting and the use of synthetic training environments, but narrative and imagination. And we get this from science fiction.

Jul 26 10:39

Malware Can Be Hidden Inside A.I. Models “with near-identical accuracy”

By B.N. Frank

Complaints about Artificial Intelligence technology inaccuracies and misuse are reported frequently. In fact, there’s even a “Hall of Shame”. More bad A.I. news has come out regarding an A.I. malware connection...

Jul 26 10:26

COVID-Tracker App Installs Itself Without User Consent, Including On Parental-Locked Devices.

Massachusetts state officials recently announced the launch of the “voluntary” MassNotify app, which monitors the spread of COVID-19 in the state. The only problem is the app appears to be installing itself on residents’ and their kids’ smartphones, unbeknownst to users, and without their consent.

The news creates a disturbing new dimension to privacy laws and even private property concerns as hundreds of users have reported their Android phones have had the app surreptitiously installed, without their prior knowledge.

“Thank you MA/Google for silently installing #MassNotify on my phone without consent. But I have a request: Can you also silently install an app that makes my phone explode and k*ll me?” wrote Twitter user Justin Jacobs. Others have taken to the Android app store to register their complaints.

Jul 26 09:54

Get those ROUTERS!!

Jul 26 09:41

Ransomware: Here's how much victims have saved in ransom payments by using these free decryption tools

Ransomware gangs been prevented from making over a billion dollars following ransomware attacks by free decryption tools made available by the No More Ransom scheme.

The project, founded by Europol, the National High Tech Crime Unit of the Netherlands' police, Europol's European Cybercrime Centre, Kaspersky, and McAfee, launched five years ago and has grown to involve 170 partners across law enforcement, cybersecurity companies, academia, and others.

The No More Ransom portal now offers 121 free ransomware decryption tools which can decrypt 151 ransomware families. They've helped more than six million ransomware victims recover their encrypted files for free – all without the need to give into the demands of cyber extortionists.

Jul 26 07:49

Pegasus spyware and the consequences for privacy

It's not that long ago that people were preoccupied with the hacking of some social media sites, including those believed to be immune from such things, such as Facebook, Twitter and WhatsApp, for example. Now we have Pegasus spyware.

Pegasus is a programme produced by an Israeli company, NSO, through which mobile telephones can be hacked into and monitored. An investigation has identified around 50,000 phones that have been infected with the programme, which was bought by Arab regimes to spy on their opponents and other parties. The story has been well covered in the media.

However, this is the tip of the iceberg. There is no doubt that security and military agencies in developed countries are already developing advanced generations of Pegasus. When available, they will probably be very cheap.

Jul 26 07:43

Fake Windows 11 installers now used to infect you with malware

Scammers are already taking advantage of the hype surrounding Microsoft's next Windows release to push fake Windows 11 installers riddled with malware, adware, and other malicious tools.

While Windows 11 will start rolling out worldwide during early 2022, Microsoft has already made it available for install to all customers enrolled in the Insider program after officially unveiling it as the next version of Windows last month.

However, hundreds of users have already downloaded installers from unnoficial sources are getting infected with malware, as Kaspersky security researchers discovered.

Jul 26 06:21

MICROSOFT, “WE CAN PROGRAM COMPLEX BEHAVIORS USING DNA”. 3-STRAND DNA CONFIRMED

Jul 26 06:07

BEX ALERT - FBI: China Is Behind Past Oil & Gas Pipeline Cyberattacks

State-sponsored Chinese actors targeted U.S. oil and gas pipeline companies in a spearphishing and intrusion campaign between 2011 and 2013, a Joint Cybersecurity Advisory, coauthored by the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI), said this week.

Jul 26 06:04

THE FBI IS LOCATING CARS BY SPYING ON THEIR WIFI

The FBI is using a controversial technology traditionally used to locate smartphones as a car tracking surveillance tool that spies on vehicles’ on-board WiFi.

Known as a Stingray or a cell-site simulator, the tool masquerades as a cell tower in order to force all devices in a given area to connect into it. Agents can then pick the number they’re interested in and locate the device. Normally that would be a mobile phone, but a search warrant application discovered by Forbes shows it can also be used to find vehicles, as long as they have onboard Wi-Fi. That’s because car Wi-Fi systems act like a phone, in that they reach out to mobile networks to get their data. So it makes sense that police would use it to find a car, though this appears to be the first case on record of it happening.

Jul 26 06:03

PEGASUS IS JUST THE TIP OF THE ISRAELI CYBER SPYING ICEBERG, WITH WHITNEY WEBB

Edward Snowden has called it “the story of the year.” An Israeli spying company has been caught selling software to authoritarian regimes that have used it to surveil more than 50,000 people worldwide.

That company is NSO, founded in 2010 by former members of Unit 8200, the Israeli military’s notorious intelligence squad. Their product is called Pegasus, and it was sold to military, law enforcement, and intelligence agencies in 40 countries, among them some of the world’s worst human rights abusing governments.

Jul 26 05:54

WhatsApp chief: US allies' national security officials targeted with NSO malware

High-ranking government officials around the world were targeted by governments using spyware from NSO Group, according to WhatsApp head Will Cathcart.

Speaking to The Guardian, Cathcart discussed the spyware attacks that were revealed by the Project Pegasus investigation, saying they had parallels with a 2019 attack against 1,400 WhatsApp users.

“The reporting matches what we saw in the attack we defeated two years ago, it is very consistent with what we were loud about then,” Cathcart said. "This should be a wake-up call for security on the internet … mobile phones are either safe for everyone or they are not safe for everyone.”

Jul 26 05:45

A man used AI to bring back his deceased fiancé. But the creators of the tech warn it could be dangerous and used to spread misinformation.

After Joshua Barbeau's fiancé passed away, he spoke to her for months. Or, rather, he spoke to a chatbot programmed to sound exactly like her.

In a story for the San Francisco Chronicle, Barbeau detailed how Project December, a software that uses artificial intelligence technology to create hyper-realistic chatbots, recreated the experience of speaking with his late fiancé. All he had to do was plug in old messages and give some background information, and suddenly the model could emulate his partner with stunning accuracy.

It may sound like a miracle (or a Black Mirror episode), but the AI creators warn that the same technology could be used to fuel mass misinformation campaigns.

Jul 25 21:12

The Big Antivirus Lie in 2021

Do you need an Antivirus? Surprisingly, my answer is an emphatic NO. I lay out the problems with Antivirus software and how in 2021, they actually detract from security and privacy and not enhance it.

We will also talk about alternate solutions for cyber security that does not require paying for any antivirus.

Jul 25 19:54

The White House versus Fakebook – As we watch them eat their own with playing the blame game we note Press Sec admitted to violating constitution

The U.S. government has no business colluding with social media companies, otherwise those companies become nothing more than a government mouthpiece and entity and should be labeled and advertised as such. -- In their original sign up pages, Facebook should be forced to inform their possible new users that they are a government controlled website, so people have the truth before deciding to sign up.

Jul 25 07:28

Spyware for sale: The booming trade in surveillance tech

Israel’s NSO Group is in the eye of a storm over its Pegasus spyware — but it is far from the only company helping governments with their covert surveillance operations.

Explosive claims that Pegasus was used to spy on activists and even heads of state have shone a spotlight on the software, which allows highly intrusive access to a person’s mobile phone.

But NSO is merely one player in an industry that has quietly boomed in recent years, arming even cash-strapped governments with powerful surveillance technology.

Jul 25 06:31

Pegasus Project: Why I was Targeted by Israeli Spyware

The Orwellian prediction finally came true. I knew it was only a matter of time before the Saudi regime tried to hack my phone, using Pegasus software manufactured by the private Israeli security company NSO Group.

This development highlights the consolidation of a new axis of evil: Israel, Saudi Arabia and the UAE have become a chorus of malicious powers aiming to stifle activism and the quest for democracy in the region. Israel provides knowledge; the others provide funds.

“I have spent more than half my life writing, researching and teaching. You wouldn’t expect me to be hacked. But such professional activities are a crime in Saudi Arabia”

The privatisation of the Israeli security apparatus, and the mushrooming of private companies founded by ex-defence and ex-Mossad agents, is a threat not only to Palestinians in Israel, Gaza and the occupied West Bank, but also to all Gulf citizens, with Israeli spyware sold to dictatorships across the Arab world.

Jul 25 06:16

Blinken: Message that There’s New Sheriff on Cyberwarfare ‘Has Been Sent’ to China, Russia

On Friday’s broadcast of MSNBC’s “Morning Joe,” Secretary of State Antony Blinken argued that the message that there’s a new sheriff in town on cyber warfare “has been sent” to countries like Russia and China, “and, as necessary, will be sent again.”

Co-host Mika Brzezinski asked, “Let’s jump to Russia, and the issue of cyberwarfare, which I think also then ends us up in China. What is the United States prepared to do to make sure this doesn’t happen again? What’s next when the next attack happens to kind of send the message to Vladimir Putin that there’s a new sheriff in town?”

Jul 25 06:15

‘Pegasus’ Spyware Targeted 10 Prime Ministers, 3 Presidents, and a King

Spies looking to gain information on world leaders reportedly used the “Pegasus” smartphone spyware to target world leaders including three presidents, ten prime ministers, and a king.

The Washington Post reports that governments worldwide are facing allegations that they used malware developed by the Israeli firm NSO Group to spy on the mobile devices of activists, journalists, corporate executives, and politicians. An international investigation has scrutinized the spyware, named Pegasus, and a list of more than 50,000 phone numbers that included the numbers of hundreds of politicians and government officials.

Jul 25 05:50

This Biden Proposal Could Make US a ‘Digital Dictatorship’

A “new” proposal by the Biden administration to create a health-focused federal agency modeled after DARPA is not what it appears to be. Promoted as a way to “end cancer,” this resuscitated “health DARPA” conceals a dangerous agenda.

Jul 23 18:53

Drive with On-Board Wi-Fi? It’s Allowing The FBI To Spy On Your Vehicle

By B.N. Frank

Even if you’re not worried about health risks – it might bother you to know that the FBI can spy on your car via your on-board Wi-Fi...

Jul 23 13:12

2nd Recall of Chevy EVs Due to Battery Fires; “life with an affected car is going to be a lot less convenient than it used to be.”

By B.N. Frank

Battery fires have led to a recalls in Hyundai Electric Vehicles (EVs) and also General Motors models. Now GM has issued a second recall regarding the Chevrolet Bolt...

Jul 23 11:14

Microsoft issues warning to ALL Windows 10 users: You need to follow these steps now

Windows 10 users have been put on high alert over a dangerous new flaw found lurking inside the popular desktop operating system. Dubbed SeriousSAM, it allows bad actors to gain administrator rights on vulnerable systems – enabling them to install malware, applications, delete files, and much more. SeriousSAM is a so-called "zero-day vulnerability", which means that attackers are already aware of how to leverage the flaw. That means Microsoft is in a race against the hackers – to fix the problem before too many people fall victim to hackers exploiting the issue.

Thankfully, Microsoft is working on a fix. However, these things take some time. And while the Redmond-based company is hard at work on a permanent patch for the problem, which it refers to as CVE-2021-36934, Microsoft has shared a workaround to protect your laptop, desktop PC, or tablet from these attacks.

Jul 23 11:11

Nasty macOS Malware XCSSET Now Targets Google Chrome, Telegram Software

A malware known for targeting macOS operating system has been updated once again to add more features to its toolset that allows it to amass and exfiltrate sensitive data stored in a variety of apps, including apps such as Google Chrome and Telegram, as part of further "refinements in its tactics."

XCSSET was uncovered in August 2020, when it was found targeting Mac developers using an unusual means of distribution that involved injecting a malicious payload into Xcode IDE projects that's executed at the time of building project files in Xcode.

The malware comes with numerous capabilities, such as reading and dumping Safari cookies, injecting malicious JavaScript code into various websites, stealing information from applications, such as Notes, WeChat, Skype, Telegram, and encrypting user files.

Jul 23 10:10

Botswana Police use Israeli Cellebrite Tech to Search Another Journalist’s Phone

Tsaone Basimanebotlhe was not expecting security agents to appear at her home in a village outside Gaborone, Botswana’s capital, in July 2019, she told CPJ in a recent interview. But they didn’t come to arrest or charge her, she recalled – they came for her devices, hunting for the source for an article published by her employer, Mmegi newspaper.

Basimanebotlhe, a politics reporter, said she surrendered her phone and password to the agents after they presented a warrant and could not find her computer. A senior officer then used technology sold by the Israel-based company Cellebrite to extract and analyze thousands of her messages, call logs, and emails, and her web browsing history, according to an affidavit from the police forensics laboratory.

The affidavit, which CPJ reviewed, was submitted during a related court case.“They’re looking for people that are divulging information to the media,” Basimanebotlhe told CPJ.

Jul 23 09:44

Microsoft warns over this unusual malware that targets Windows and Linux

Microsoft is warning customers about the LemonDuck crypto mining malware which is targeting both Windows and Linux systems and is spreading via phishing emails, exploits, USB devices, and brute force attacks, as well as attacks targeting critical on-premise Exchange Server vulnerabilities uncovered in March.

The group was discovered to be using Exchange bugs to mine for cryptocurrency in May, two years after it first emerged.

Notably, the group behind LemonDuck is taking advantage of high-profile security bugs by exploiting older vulnerabilities during periods where security teams are focussed on patching critical flaws, and even removing rival malware.

"[LemonDuck] continues to use older vulnerabilities, which benefit the attackers at times when focus shifts to patching a popular vulnerability rather than investigating compromise," the Microsoft 365 Defender Threat Intelligence Team note.

Jul 23 09:39

To Protect Yourself, Never Give Your DNA Or Biometric Data

So many companies now are requesting people's biometric data. Things like fingerprints, iris scans, voice scans, DNA, etc. are not pieces of information that you should freely give to a company. These are immutable identifiers and could potentially be a security risk and privacy nightmare.

Jul 23 08:20

Facebook steps up censorship: People can no longer have online conversations without potentially getting censored

Facebook’s censorship has gone out of control in the recent past. Now, users can no longer discuss their hobbies on the platform without potentially getting censored.

The social media giant reportedly censored discussion of gardening tools in a group about gardening. “Facebook’s censors are digging deep – flagging the word ‘hoe’ in a western New York gardening group because they apparently confused the tool for a disparaging term for women,” the New York Post reported.

A group called WNY Gardeners has been repeatedly flagged by Facebook for “violating community standards” when its more than 7,500 members discussed the long-handled gardening tool – which is spelled with an “e,” unlike the offensive term.

Jul 23 08:10

Kaseya gets master decryption key after July 4 global attack

The Florida company whose software was exploited in the devastating Fourth of July weekend ransomware attack, Kaseya, has received a universal key that will decrypt all of the more than 1,000 businesses and public organizations crippled in the global incident.

Kaseya spokeswoman Dana Liedholm would not say Thursday how the key was obtained or whether a ransom was paid. She said only that it came from a “trusted third party” and that Kaseya was distributing it to all victims. The cybersecurity firm Emsisoft confirmed that the key worked and was providing support.

Ransomware analysts offered multiple possible explanations for why the master key, which can unlock the scrambled data of all the attack’s victims, has now appeared. They include: Kaseya paid; a government paid; a number of victims pooled funds; the Kremlin seized the key from the criminals and handed it over through intermediaries — or perhaps the main attacker didn’t get paid by the gang whose ransomware was used.

Jul 23 06:23

Pegasus scandal: Are we all becoming unknowing spies?

The allegations that spy software known as Pegasus may have been used to carry out surveillance on journalists, activists - and even perhaps political leaders - highlights that surveillance is now for sale.

The company behind the tool, NSO Group, has denied the allegations and says its customers are carefully assessed.

But it is another sign that high-end spy techniques, which used to be the exclusive preserve of a few states, are now spreading more widely and challenging the way we think about privacy and security in an online world.

In the not-too-distant past, if a security service wanted to find out what you were up to, it took a fair degree of effort. They might get a warrant to wiretap your phone. Or plant a bug in your house. Or send a surveillance team to follow you.

Finding out who your contacts were and how you lived your life would take patience and time.

Jul 23 06:02

Russia disconnected from global internet in tests - RBC daily

Russia managed to disconnect from the global internet during tests in June and July, the RBC daily reported on Thursday, citing documents from the working group tasked with improving Russia's internet security.

Russia adopted legislation, known as the "sovereign internet" law, in late 2019 that seeks to shield the country from being cut off from foreign infrastructure, in answer to what Russia called the "aggressive nature" of the United States' national cyber security strategy.

The legislation tightened Moscow's control over the global network and caused consternation among free speech activists, who feared the move would strengthen government oversight of the country's cyberspace.

Tests involving all Russia's major telecoms firms were held from June 15 to July 15 and were successful, according to preliminary results, RBC cited a source in the working group as saying.

Jul 23 06:01

NSA Whistleblower Says All Telecom Imports Must Be Scanned for Pegasus-Like Implants

All communications technology products from any foreign country need to be checked for potential hardware and software surveillance implants in the wake of the Pegasus scandal, former US National Security Agency (NSA) Technical Director and whistleblower William Binney told Sputnik.

Pegasus spyware, developed by Israel's NSO Group, was used to hack some 50,000 smartphones of human rights activists, lawyers, journalists and business executives around the world, a journalist-NGO consortium revealed last week. Among those targeted were high-level officials from Pakistan, France, Iraq, Egypt and the European Council.

Jul 23 05:45

Pegasus: Israeli spyware scandal explained

Jul 23 05:44

Israeli spyware is a threat to all freedoms everywhere

In 1974, Richard Nixon was impeached after being caught bugging his opponents at the Watergate Hotel in one of the twentieth century's most explosive scandals. In comparison, the Pegasus Project — a far-reaching and shocking exposé by seventeen media outlets and Amnesty International — is a thermonuclear warhead to Nixon's firecracker.

Pegasus is a product of an Israeli company, the NSO Group. Heads of state and opposition leaders from France to South Africa to Pakistan have the Pegasus spyware on their phones. As well as politicians, the list of 50,000 Pegasus targets provided by Amnesty include human rights defenders, activists and journalists. NSO Group's clients range from known human rights abusers to states that regard themselves as liberal democracies.

Jul 22 19:08

Eric Clapton Won’t Perform at Venues Requiring Proof of COVID Vax; Experienced Severe Side Effects from AstraZeneca Jab

By B.N. Frank

Vaccine side effects, injuries and deaths have been reported for decades. They continue to be reported about COVID vaccines as well, including by celebrity recipients Eric Clapton and Ben Stein. Clapton has now announced that he will not perform in venues that require proof of COVID vaccination. Go figure...

Jul 22 12:16

Japan breaks internet speed record with a 319Tbps data transfer

The many-gigabit internet speed records of a decade ago now seem downright inadequate. Motherboard reports that scientists at Japan's National institute of Information and Communications Technology (NICT) have smashed the internet transfer record by shuffling data at 319Tbps. For context, that's almost twice as fast as the 179Tbps a team of British and Japanese researchers managed in August 2020.

Jul 22 12:14

Pegasus Spyware is a 'Big Black Hole', No Escape From Its Attack: Cyber Expert

Pegasus keeps updating its malware. Even if experts crack one, the spyware designs a new one. It is an ongoing war.

Jul 22 12:13

HP patches vulnerable driver lurking in printers for 16 years

On Tuesday, SentinelLabs published an analysis of the vulnerability, tracked as CVE-2021-3438 and issued a CVSS score of 8.8.

The security issue is described as a "potential buffer overflow in the software drivers for certain HP LaserJet products and Samsung product printers could lead to an escalation of privilege."

According to the researchers, some HP, Xerox, and Samsung printer models contained vulnerable driver software, sold worldwide since 2005.

The driver in question, SSPORT.SYS, is automatically installed and activated, whether the model was wireless or cabled. The driver is also loaded automatically by Microsoft's Windows operating system on PC boot.

"This makes the driver a perfect candidate to target since it will always be loaded on the machine even if there is no printer connected," the researchers say.

Jul 22 11:14

Internet down: Huge outage takes some major sites offline

It’s not just you, it’s Steam, PlayStation, Disney, GoDaddy, Amazon, UPS, LastPass, and a whole bunch of other websites that are out-of-commission right this minute. One part of the problem appears to be an issue with the content distribution network (CDN) Akamai. Tracking for the service suggests that they’re experiencing an “emerging issue with the Edge DNS service.”

Major issues have occurred with this down-time, giving us a glimpse into the world of “what if” when it comes to our reliance on the internet at large. Take for example UPS, whose down time will result in users’ inability to check for tracking information on important deliveries.

The Delta webpage down-time means Delta flights cannot be checked from home or from smart devices with the internet. The same is true of British Airways. Capital One appears to be down at the moment, meaning users with money with the bank cannot check their balance or access documents until the outage is fixed.

Jul 22 11:11

Google employees listen in on private conversations between users and Google Assistant

Google representatives told India’s Parliamentary Standing Committee on Information Technology that the company’s employees listen to some recordings of conversations between users and Google Assistant. It was the first time the tech giant acknowledged in front of Indian officials that its employees listen to a portion of conversations that users have with Google Assistant.

Jul 22 10:19

Taking Action Against 5G—Advice from a People’s Lobbyist

Op-Ed by Jenny Miller

Perhaps you have been already convinced by reading articles on this site about the devastating effects of the ongoing rollout of massive numbers of 4G/5G so-called small cells (short for cell towers) throughout cities in the U.S. If you’re not up to speed about why you should be extremely, extremely alarmed, you can read my previous article on the subject (“The 5G Juggernaut, Coming Soon to a Utility Pole Outside Your Home”).

This article explains how you can be effective in convincing legislators to oppose the ubiquitous 5G streamlining bills. My advice is based on my past experience as a lobbyist representing a statewide human rights organization, when on more than one occasion, a tiny group of us were able to win extraordinary victories against bills being strongly pushed by powerful corporate interests. I also was very involved in the 2017 successful campaign to defeat California 5G bill...

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA