Feeds:
Posts
Comments

Archive for the ‘technology’ Category


Yesterday we reported that an international group of hackers claim they have breached Apple’s iCloud user database and stolen 300 million usernames and passwords. The group has threatened to initiate a widespread factory reset on April 7th, 2017, potentially wiping out data on tens of millions of iPhones and iCloud accounts should Apple fail to pay a ransom.

But that breach by nefarious hackers, while serious, is nothing compared to what your trusted operating system provider may be doing on your personal computer.

According to a recent report, if you are a Windows 10 user then every single keystroke you have ever typed on your computer may have been logged and sent to Microsoft.

MORE HERE

Read Full Post »


‘If you thought that your search engine history was private, think again. It’s not. Or, at least, it may not be, depending on whether or not you’re under police investigation.

According to The Free Thought Project, a court in Minnesota has recently ruled that an entire city’s search history should be made available to police, an Orwellian first as far as anyone can tell. It may well mark the beginning of the end of Internet freedom.

Cops in Edina, Minn., were granted a warrant that requires search giant Google to provide search history information and the names of everyone in the city who utilized specific search terms between Dec. 1, 2016, and Jan. 7, 2017.’

Read more: Everything you search for on Google is now easily obtained by police

Read Full Post »


‘Hats off and plaudits to the mayors and managers of the following Ohio cities: Bexley, Canal Winchester, Columbus, Dublin, Delaware, Gahanna, Grandview Heights, Grove City, Hilliard, New Albany, Pickerington, Powell, Reynoldsburg, Upper Arlington, Westerville, Whitehall and Worthington for the legal actions they took to stop “wireless companies to place facilities, including towers up to 50 feet high and equipment of 28 cubic feet (the size of a small refrigerator), in the local public right-of-way.” [1] Those towers and equipment would roll out and implement 5G Wi-Fi, which allegedly was unlawfully signed into Ohio law December 19, 2016 – as alleged in the lawsuit – to become effective March 21, 2017!

Seems like Ohio, its governor and SB331 went the exact way Pennsylvania’s governor and HB2200/Act 129 did in rolling out AMI Smart Meters, i.e., ramrod illegal implementation by state agencies. Why are both those laws illegal?’

Read more: Seventeen Ohio Cities File Lawsuit To Stop 5G Cell Towers Everywhere

Read Full Post »


‘A new malicious application tries to disguise itself as the Google Chrome browser to fool victims into entering their payment card details. The app is still active at the time of writing and sends collected user details to an AOL email address.

Discovered today by MalwareHunter, this application goes above and beyond of what other card stealers have attempted, most of which are half-baked efforts, often easy to recognize as malicious applications thanks to their quirky graphics and misaligned designs.

This app, named “Betaling – Google Chrome.exe”, tries to pass as the Google Chrome browser and does a good job at it. Betaling uses the standard Chrome icon and window layout, complete with an address bar, and even an HTTPS lock icon to trick users they’re on a real website.’

Read more: Credit Card Stealer Disguises as Google Chrome Browser

Read Full Post »


McAfee specifically pointed to the following key arguments in the Grizzly Steppe report:

  1. Russian language was found in the malware – which would make them borderline retarded.
  2. A Cyrillic (Russian language) keyboard was used to create the malware.
  3. The compiler (piece of software that finalizes the malware) time stamped the malware during Russian business hours.
  4. IP address pointed to Russia – again, they’d have to be fairly new at hacking to do something like that.

All of which are the hallmarks of a 15 year old kid acting alone, or a poorly fabricated body of evidence.

MORE HERE W/VIDEO


Support us, Help Cover Equipment and Hosting Costs. We accept donations of any amount through PayPal. Our competition is the major mainstream media giants.

DONATE NOW

…………………………………………………

Read Full Post »


 

  • A nationwide customs computer outage caused nightmare lines for travelers at major airports in New York, Houston, Atlanta and Miami
  • People were flying on the US public holiday and were stuck in queues for up to two hours
  • Twitter users questioned whether there had been a cyber attack but US Customs and Border Protection said there is no evidence that the computer malfunction signified hacking

 

On one of the busiest travel days of the year, many airplane passengers were trapped in hours-long lines because of a nationwide customs computer outage.

Major airports in New York, Houston, Atlanta and Miami were affected by these delays on the US public holiday. There were also long lines in Boston’s Logan Airport and Los Angeles International Airport.

The traveling snafu caused delays ranging from 30 minutes to two hours and hundreds of people got off flights and into motionless queues.

 

Crowds were packed at Miami International Airport because of the customs glitch

Crowds were packed at Miami International Airport because of the customs glitch

Read Full Post »


‘A bill meant to help those with developmental disabilities would allow government agencies to locate people with tracking devices, which has some concerned the measure gives the federal government too much authority and power…

…The legislation would permit the Justice Department to award grants to law enforcement agencies and non-profits for training and tracking devices to find individuals with autism or seniors with Alzheimer’s who have wandered away…

…The bill has garnered the support of Democrats who say it would promote public safety and address the critical need of being able to locate these individuals.

However, some are concerned the measure goes too far. The bill’s original language authorized the Attorney General to insert tracking chips into individuals involuntarily.’

Read more: Bill Would Allow Government to Locate People With Tracking Devices

Read Full Post »


‘Tooling around the Internet. This is literally the least amount of effort one could exert to make the world a better place. Seriously – unless you can feed people while watching TV, there is nothing less you can possibly do to plant trees and improve the world.

So, allow us to introduce Ecosia – the search engine that plants trees for every Web search you conduct.

It’s not like someone is out on the field waiting for one more person’s search in order to plop another tree in the ground. Oh no, that would be just weird. Ecosia has partnered with other companies that will plant the trees. We hope!

According to the homepage, over 5 million trees have been planted.’

Read more: This Search Engine Plants A Tree Every Time You Search

Read Full Post »


 

Read Full Post »


Yahoo Inc last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter.

The company complied with a classified U.S. government demand, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI, said three former employees and a fourth person apprised of the events.

Some surveillance experts said this represents the first case to surface of a U.S. Internet company agreeing to an intelligence agency’s request by searching all arriving messages, as opposed to examining stored messages or scanning a small number of accounts in real time.

It is not known what information intelligence officials were looking for, only that they wanted Yahoo to search for a set of characters. That could mean a phrase in an email or an attachment, said the sources, who did not want to be identified.

Reuters was unable to determine what data Yahoo may have handed over, if any, and if intelligence officials had approached other email providers besides Yahoo with this kind of request.

MORE HERE

Read Full Post »


‘Another harbinger of the end of civilization as we once knew it. If you are considering downloading this app and getting into this new apocalyptic pastime, we urge you to stop and check yourself.

Mindless lemmings chasing after digital illusions. This is the true dystopia…

Police in New Hampshire’s largest city are using Pokémon Go in an attempt to lure fugitives into their clutches.’

Read more: US Police Dept Uses ‘Pokémon Go’ to Lure Fugitives to Police Station

Read Full Post »


The Internet – founded by the Pentagon under the guise of “liberating the information flow for a more democratic world” – is in fact creating a world of character-devoid monoculture machines who think and talk the same and with only the vaguest resemblance to their former humanity.

Life-experience has been tossed over the side in favor of whatever Wikipedia or Ask Jeeves says about it. Everyone knows everything about…well…everything. People are talk too much. No one listens. The information overload produces indecision, isolation, fragmentation and confusion in people.

All the while the “expert drones” who have positioned themselves as Internet gatekeepers get dumber, more detached from reality, and frighteningly amoral.

The most recent example of this was the black women in Minneapolis whose boyfriend had been shot by a white supremacist cop during a routine traffic stop. It was creepy enough to watch the cop screaming like the demented psychopath that he is on the video from the women’s all-important “smart” phone.

Far more disturbing was the fact that the woman was so busy narcissistically filming the situation for her fake Facebook friends and sycophants – that she neglected to help her dying boyfriend in any way. He died, but hey, she’s famous. Isn’t that what really matters?

MORE HERE

Read Full Post »


F-35

The Lockheed Martin F-35 Lightning II is the most advanced aircraft in the Pentagon’s arsenal, but Russia’s powerful over-the-horizon Podsolnukh (Sunflower) radar is capable of detecting and tracking the stealth fifth-generation plane or any other fighter jet that was designed to avoid detection, Svobodnaya Pressa reported.

READ MORE HERE

Read Full Post »


-Daily Mail Online investigation reveals how firm which stored her backed up emails was dogged by security lapses

| 30 June 2016 | Hillary Clinton is facing damaging new revelations about the lax security surrounding her emails. A Daily Mail Online investigation has found that a second firm – hired to store a back-up of Clinton’s secret server – was so lax in its security employees failed to change passwords frequently and left computers logged in, unattended for extended periods and its own clients stumbled upon other clients data. Datto Inc, the company in question, was hired to store Hilary’s emails by Platte River, the mom-and-pop company contracted to maintain her ‘homebrew’ email system. Speaking exclusively to Daily Mail Online on condition of anonymity, one former employee at Datto, said the company was woefully exposed to being hacked.

Hillary Clinton’s emails packed with America’s secrets were stored by company ‘wide open to hackers’ and run by ‘morons’ whistleblowers reveal

Read Full Post »


‘Yesterday’s mystery meeting on the tarmac between former President Bill Clinton and Attorney General Loretta Lynch has now been clarified.

Obviously, it wasn’t a social visit as Lynch publicly claimed, but an arrangement clarifying how the powerful Clinton dynasty would be kept above the law in the face of heated publicly scrutiny as Hillary Clinton seeks the presidency.

Instead, the Justice Department filed a motion that would keep from release thousands of emails potentially exposing conflicts of interest on the part of the Clinton Foundation and overlapping state department officials, such as Hillary’s chief of staff Huma Abedin.’

Read more: After Lynch’s Mystery Meeting With Bill, Justice Department ‘Shields Clinton Foundation Emails’

Read Full Post »

Older Posts »

%d bloggers like this: