COMPUTERS/INTERNET/SECURITY

Dec 17 05:55

Insurgents Hack U.S. Drones

Militants in Iraq have used $26 off-the-shelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations.

Dec 16 21:21

Sexy Facebook Subliminal Message

Subliminal Message From Facebook's Front Page

Found this one today, hiding in plain sight. Of course its no accident or coincidence, advertisers do this all the time.

No wonder the site is so popular.

Dec 16 10:45

Unpatched PDF flaw harnessed to launch targeted attacks

Adobe is investigating reports of unpatched flaws in its Reader and Acrobat software packages.

Zero-day bugs in Adobe Reader and Acrobat have reportedly been exploited by hackers to attack vulnerable systems, in a series of limited (presumably) targeted attacks since 11 December. Adobe Reader and Acrobat 9.2 or below are potentially vulnerable to attacks. Successful exploitation creates a means for hackers to inject hostile code onto vulnerable systems, security notification firm Secunia warns.

Dec 16 10:40

Every Windows user to get pop-up menu of internet browsers

Every person who owns a computer with Microsoft Windows is to be offered their choice of internet browsers in an automatic pop-up menu following an agreement today between the software company and the European Union.

In March next year all PCs will be sent a software update that will cause a window to appear on screen offering them options to the pre-installed Microsoft Explorer.

All new PCs will also offer a selection of browser options including Mozilla’s Firefox and Google’s Chrome.

Following the deal the EU today dropped anti-trust charges against Microsoft.

Dec 16 09:34

"World's worst" spammer in court

Webmaster's Commentary: 

WATERBOARD HIS COMPUTER!!!!!!!!!

Dec 15 17:46

Australia: Internet censorship plan gets the green light

The Federal Government has announced it will proceed with controversial plans to censor the internet after Government-commissioned trials found filtering a blacklist of banned sites was accurate and would not slow down the internet.

But critics, including the online users’ lobby group Electronic Frontiers Australia and the Greens communications spokesman Scott Ludlam, said the trial results were not surprising and the policy was still fundamentally flawed.

The Communications Minister, Stephen Conroy, said today he would introduce legislation just before next year’s elections to force ISPs to block a blacklist of “refused classification” (RC) websites for all Australian internet users...

Dec 14 20:32

Google Chrome bug outs users seeking anonymity

A bug in the latest version of the Google Chrome browser could leak the identity of users trying to surf anonymously, developers warn.

Dec 14 06:16

US and Russia in 'secret' cyber warfare talks

The talks, which are taking place between the US, Russia and a United Nations arms control committee, are aimed at finding ways of strengthening internet security and limiting the military use of cyberspace, according to a report in the New York Times.

Online attacks against government websites, corporate computer systems and other business-critical infrastructures have increased in the last two years. Anonymous hackers have managed to access the Pentagon's computers and overwhelm government websites, and President Obama has ordered an urgent review of the United States' internet security.

Dec 12 09:53

Windows 7 has definite backlight problems (”Black Screen of Death”)

There is definately a problem in Windows 7 RTM with the “Black Screen of Death” despite MS propaganda stating otherwise. This one has nothing to do with 3rd party antivirus software.

The particular problem I am having and see lots of reports on forums is that the backlight is not turning on after an LCD DPMS standby. What’s particularly bad is that some people are blaming their hardware and buying new inverters for their displays. My problematic system dual boots Arch Linux and no amount of LCD power on/off sequences will trigger this in Arch.

Dec 12 07:29

Google spyware will help vigilantes save rainforests

Environmentalists across the world are to be enlisted as armchair detectives to monitor satellite images of rainforests and report any illegal logging.

The images will be frequently updated and anyone with internet access will be able to make instant comparisons with historical images and spot destruction of rainforest almost as soon as it happens.

Webmaster's Commentary: 

I have two questions.

1. Doesn't the owner of those lands get to decide what to do with them?

2. Why can't we get the same real-time image updates to keep an eye on the politicians?

Dec 12 06:15

Google Demonstrates Quantum Algorithm Promising Superfast Search

Quantum computing has long dangled the possibility of superfast, super-efficient processing, and now search giant Google has jumped on board that future. Google has spent the past three years developing a quantum algorithm that can automatically recognize and sort objects from still images or video.

Dec 12 06:03

Americans consume 3,600,000,000,000,000,000,000 bytes of information per year, not counting work

The average American sucks down 34 gigabytes of data per day, half of that from video games, says the latest update of a study by two researchers at the University of California in San Diego. That’s enough to fill 7 DVD discs. Every day.

Dec 11 14:02

Google Sues to Stop Work-From-Home Scams

"At the heart of the scheme is a false representation that consumers can participate in a Google-sponsored program that will allow them to make hundreds of dollars a day working at home performing a simple task that requires no particular experience or qualifications," the search engine giant wrote in a 26-page claim filed in U.S. District Court in Utah.

The lawsuit names Nevada-based Pacific WebWorks and 50 other defendants referred to only as "Does 1 through 50."

Pacific WebWorks did not immediately return calls for comment from ABCNews.com. According to the Google claim, Pacific WebWorks operates a credit card processing site.

Webmaster's Commentary: 

Yes, this is the reason we are having to cancel one of our ad clients.

Dec 11 06:39

Judge affirms $675k verdict in RIAA music piracy case

A federal judge in Boston today formally signed off on a $675,000 fine that a jury assessed against Boston University doctoral student Joel Tenenbaum for illegally sharing 30 copyrighted songs.

But in an unusual decision, U.S. District Court Judge Nancy Gertner expressed "very, very" deep concerns at the "astronomical penalties" available to music companies under copyright laws. Gertner said the court would have been willing to consider Tenenbaum's fair use defense in the case but concluded that the manner in which the arguments were presented by the defense counsel made it all but impossible for her to do so.

Dec 11 06:28

Spying begins on UK web users

We reported last week on plans to enforce copyright law by forcing internet service providers to spy on consumers to detect and report every piece of copied music, movies, e-books, games and software.

Now one UK ISP, Virgin Media, is trialling some of the technology needed to do that on about 1.6 million of its customers.

Dec 10 12:26

How to make a faraday cage wallet - Protect the private info on all your rfid chips.

You already have your tin foil hat, and you're pretty sure no one can find you on the Google. However, there's one detail you may not have thought of, and that's those pesky RFID chips.

RFID tags identifying who and -- gasp! —- where you are can be found in passports, ATM cards, credit cards and some state-issued ID cards. The same technology will possibly even be used in paper money in the near future.

With the right equipment, these chips can be read from afar by data snoops or your friendly government official. A Faraday cage is sufficient for blocking such eavesdropping.

Here's how to hide yourself from both the baddies and The Man.

Dec 10 11:50

Children as young as five 'to be taught about the dangers of the internet'

Every primary school child in the country will be taught about the dangers of the internet and how to safely surf online, Gordon Brown has announced.

Webmaster's Commentary: 

"Only visit websites that end in .gov!"

Dec 10 10:44

Homeland Security Aiming For Big Brother Programs to Read Minds and Emotions

n the sci-fi thriller Minority Report, Tom Cruise plays a D.C. police detective, circa 2054, in the department of “pre-crime,” an experimental law enforcement unit whose mission — to hunt down criminals before they strike — relies on the psychic visions of mutant “pre-cogs” (short for precognition) who can see the future. It may be futuristic Hollywood fantasy, but the underlying premise — that we can predict (if not see) a person’s sinister plans before they follow through — is already here.

Dec 10 09:25

Private Contractor Posted Secret TSA Screening Manual Online

When Leahy asked if the individual involved was a contractor, Napolitano said yes, but also noted that "some of the supervisors ultimately were at TSA."

Dec 10 09:21

WHY YOUTUBE CENSORS

Just in case you are wondering why YouTube removes videos critical of zionism…. just look at this….. and wonder no more.

Dec 09 16:30

How fake sites trick search engines to hit the top

Even search engines can get suckered by Internet scams.

With a little sleight of hand, con artists can dupe them into giving top billing to fraudulent Web sites that prey on consumers, making unwitting accomplices of companies such as Google, Yahoo and Microsoft.

Online charlatans typically try to lure people into giving away their personal or financial information by posing as legitimate companies in "phishing" e-mails or through messages in forums such as Twitter and Facebook. But a new study by security researcher Jim Stickley shows how search engines also can turn into funnels for shady schemes.

Dec 09 16:29

Pop-ups on computer screen set back performance

Although pop-ups on a computer screen may only last a few seconds, they tend to set back our performance, say researchers.

Helen Hodgetts and Dylan Jones, professor of psychology at Cardiff University, examined the cost of such interruptions in terms of the time taken to complete a simple seven-step computer task.

Dec 09 15:45

Google now tracking you even after you log out

Anyone who's a regular Google search user will know that the only way to avoid the company tracking your online activities is to log out of Gmail or whatever Google account you use. Not any more.

As of last Friday, even searchers who aren't logged into Google in any way have their data tracked in the name of providing a 'better service'.

Dec 09 13:21

TSA Blows Smoke (re: Sensitive Screening Document)

It may be that TSA has relocated the Screening solicitation to some other FBO location with a "secure version" of the Screening SOP. Even so, the insecure version remains available on the FBO site.

TSA offered a version in the original Screening solicitation which redacted in two manners, one insecure, one secure, mirrored here:

http://cryptome.org/tsa-screening-original.zip

http://cryptome.org/tsa-screening-secure.zip

[N.B.: John Young (at Cryptome.org) rocks the quote Free World unquote!! Take a moment, appreciate this man, his website, and what remains of Freedom, Justice, &c. You can order the entire seven gig, 13-year, 43,000 file collection on DVD even! Keep up the Great Work, Mr. Young!]

Dec 08 23:09

CLIMATEGATE - Revenge of the Computer Nerds

Turns out that these claims are absolutely false and that the computer models have been rigged.

Dec 08 14:10

Yahoo Sells All Its Users Private Email Contents to U.S. Agencies for Small Price

The 17-page guide, which Yahoo has tried to suppress via legal letters to the Cryptome.org site run by freedom of information champion John Young, describes Yahoo’s policies on keeping the data of Yahoo Email and Yahoo Groups users, as well as the surveillance and spying capabilities it can give to the U.S. government and its agencies.

The Yahoo document is a price list for these spying services and has already resulted in many people closing down their accounts in protest. However, closing a Yahoo account is not as easy as one might expect: users have reported great difficulty in finding the link to delete their account, and, Yahoo will still keep data for another 90 days.

Webmaster's Commentary: 

Free email is worth what you pay for it.

Dec 08 12:38

Accidental Child Porn Download Leads to Jail Time

Matthew White, of Sacramento, California, has found himself in a rather unfortunate situation; he's been accused of downloading child pornography. On the advice of his public defender, White is pleading guilty in hopes of cutting his potential 20-year sentence down to three and a half years. After serving his time, White will have to serve 10 years of probation and register as a sex offender.

Webmaster's Commentary: 

So, just HOW did the FBI know that this totally random individual had downloaded this particular "Girls Gone Wild" video, and more to the point, how did the FBI know that this particular "Girls Gone Wild" was really child porn?

Just how is it that they knew to knock on his particular door?

Where is the crime? There was no intent to acquire the child porn. The file in question did not reveal its contents ahead of time. The computer user deleted the file. So there was no intent.

In other words, there seems to be no probable cause and no way for the FBI to know about this "crime" unless the FBI itself planted the file at LimeWire.

What is next, emailing child porn to everyone in the USA to generate arrest numbers? I guess real crime in the USA is so non-existent that the FBI has time to spend hunting for online porn abusers. On the other hand, given that the FBI's advice is to notify it when you recieve child porn and let them take your computer, then by the simple expedient of emailing you a child porn image, the FBI gains access to your entire computer WITHOUT A COURT WARRANT!

Not quite the image J. Edgar Hoover worked so hard to craft in Jimmy Stewart's "The FBI Story", is it?

Dec 08 10:22

The future of WiFi: gigabit speeds and beyond

In a couple of years, crossing the 1Gbps threshold with a WiFi access point will be routine. That access point will likely have two radios, one for each major spectrum band, and support a host of older flavors for compatibility. Eventually, WiFi will approach the robustness and speed needed to make it a completely viable replacement for Ethernet for most users.

Dec 08 10:21

Five ways to revolutionise computer memory

Once upon a time, not so long ago, the idea that you might store your entire music collection on a single hand-held device would have been greeted with disbelief. Ditto backing up all your essential computer files using a memory stick key ring, or storing thousands of high-resolution holiday snaps in one pocket-sized camera.

Dec 08 08:13

MIT team wins Darpa's treasure hunt in less than one day

The winning team has not explained precisely how they came to discover the location of all 10 balloons, but the process detailed on the team website explains that they created a viral campaign to encourage people to put forward information they gleaned about the locations.

Dec 08 06:30

MySpace and Facebook sign real-time search deals with Google

These partnerships have now been formalised and are understood to be going live on Google across all English language domains (both .com and .co.uk) “over the coming days” according to a Google spokesperson.

This means that when somebody searches for a particular topic on Google they will receive real-time updates from a variety of social media sites, as well as the usual list of search results.

Dec 07 20:34

Google chief: only miscreants worry about net privacy

If you're concerned about Google retaining your personal data, then you must be doing something you shouldn't be doing. At least that's the word from Google CEO Eric Schmidt.

"If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place," Schmidt tells CNBC, sparking howls of incredulity from the likes of Gawker.

But the bigger news may be that Schmidt has actually admitted there are cases where the search giant is forced to release your personal data.

Dec 07 18:54

Google launches Google Goggles visual search

Google has launched a new application for Google Android mobile phones that will allow people to search for more information about a famous landmark or work of art simply by taking a photo of that object.

Google Goggles can recognise tourist attractions, famous paintings and even company logos. Users focus their phone's camera on an object, and Google compares elements of that picture against its database of images. When it finds a match, Google will tell you the name of what you're looking at, and provide a list of results linking through to the relevant web pages and news stories.

Dec 07 15:29

CLIMATEGATE - A SysAdmin’s Perspective

An excellent analysis of whether the CRU zipfile was “hacked” or “leaked” here, arguing for a combination of a dossier prepared by the university in relation to potential FOI responsibilities (though not necessarily FOI requests in hand) and discovery of the dossier by someone at the university who released it to the outside world – very much along the lines hypothesized by Charles the Moderator of WUWT, but substantially fleshed out.

This is a detailed analysis, unlike IPCC allegations of attacks by the Russian secret service (their version of “A miracle occurred”).

Dec 07 11:50

Anyone Know When the Internet's Real Birthday Is?

But it’s complicated. Some would argue that it was the fear of the Russians, after their’ launch of Sputnik in October of 1957, that motivated the US government to begin building this decentralized network.

Dec 07 06:59

Copenhagen climate summit: 1,200 limos, 140 private planes and caviar wedges

Webmaster's Commentary: 

"Limit our lifestyles????? clearly you have not studied the science which proves that it is POOR people who causes global warming!!!!!"

Dec 06 07:08

The 101 most useful websites

1. The Daily Beast (thedailybeast.com) is a busy bluffer’s dream. This news and opinion website features a daily Cheat Sheet with summaries of must reads from all over.

2. Slate (slate.com) has news, politics, arts, business and science with a host of high-profile contributors.

3. Salon (salon.com) has a glossy dollop of lifestyle and two busy comment boards atop its core of news and culture.

Dec 05 07:55

Whether it's on or off, your mobile phone can act as a microphone without you knowing it

Dec 03 22:06

CRU's Source Code: Climategate Uncovered

As the evidence of fraud at the University of East Anglia's prestigious Climatic Research Unit (CRU) continues to mount, those who've been caught green-handed continue to parry their due opprobrium and comeuppance, thanks primarily to a dead-silent mainstream media. But should the hubris and duplicity evident in the e-mails of those whose millennial temperature charts literally fuel the warming alarmism movement somehow fail to convince the world of the scam that's been perpetrated, certainly these revelations of the fraud cooked into the computer programs that create such charts will.

Dec 03 20:16

Net piracy: The people vs the entertainment industry

"THIS is the kind of snooping you'd expect in China, not a modern western democracy. It raises huge questions over privacy invasion and freedom of expression." So says Andrew Heaney - who is not, as you might imagine, a civil liberties campaigner, but a senior executive at TalkTalk, one of the UK's largest internet service providers. Along with other ISPs, his company faces the prospect of being forced to spy on its customers' downloads for signs of potential copyright infringement.

Dec 03 14:20

Secret copyright treaty leaks. It's bad. Very bad.

That the whole world must adopt US-style "notice-and-takedown" rules that require ISPs to remove any material that is accused -- again, without evidence or trial -- of infringing copyright. This has proved a disaster in the US and other countries, where it provides an easy means of censoring material, just by accusing it of infringing copyright.

Dec 03 08:22

European ISPs attack secret Acta copyright talks

Europe's ISP industry body has attacked a global copyright agreement, currently being negotiated in secret, that could lead to the disconnection of internet users who are accused of persistent copyright infringement.

The European ISP Association (EuroISPA) said in a statement on Monday that the Anti-Counterfeiting Trade Agreement (Acta) threatened the openness of the internet and would not, in any case, be effective in fighting copyright infringement. The organisation also criticised the fact that citizens' representatives are not involved in the negotiations.

Dec 03 06:28

8 Facebook misfires that ruined lives

Michaele Salahi didn't hesitate to post snapshots of her White House gatecrashing on Facebook, but perhaps she should have. According to the New York Daily News, many of Salahi’s 11,914-and-counting "fans" have rained insults on the "Desperate Housewives of D.C." hopeful, calling her a "fame whore," a "gold digger," and a "silly, old cow." (Watch Obama advise caution when posting on Facebook) Here, 7 more Facebookers who paid a heavy price for reckless posts:

Dec 02 20:23

Google Trends: climategate, climate change

Climategate has caught up with climate change even though it hasn't had any news references.

Dec 02 17:03

Google trends on “climategate” show public interest increasing – but troubling questions loom

Does Al Gore’s position on Google’s senior advisory board have any bearing? In Al’s bio at http://www.algore.com/about.html he says:

“A member of the Board of Directors of Apple Computer, Inc. and a Senior Advisor to Google, Inc. Gore is also Visiting Professor at Middle Tennessee State University in Murfreesboro, Tennessee.”

It seems he has done some “advising” of Google’s search quality in the past. Here’s a story from the New Yorker via Newsbusters about that very subject. There is some history there that has some bearing on the current situation.

Dec 02 17:00

Anti-Piracy Group Refuses Bait, DRM Breaker Goes To Police

Henrik Anderson told TorrentFreak that in order to force his government’s hand on laws which allow him to copy DVDs for his own personal use, but forbid him to remove the DRM in order to do so, he decided to turn himself in.

Henrik informed the Danish anti-piracy outfit Antipiratgruppen that he had broken the DRM on more than one hundred legally-purchased DVD movies and TV shows for use on his home media center, an act forbidden – but seemingly also allowed – under Danish laws, both detailed below;

Dec 02 15:39

Al Gore Got Rich From Owning Google Stock

Webmaster's Commentary: 

That may explain why Google is "unenthusiastic about climategate.

Good reason to switch to startpage.com for your search engine.

Dec 02 14:42

FTC explores future of journalism in Internet age

The federal government is wading into deliberations over the future of journalism as printed newspapers, television stations and other traditional media outlets suffer from Americans' growing reliance on the Internet.

Webmaster's Commentary: 

Translation: "If we can't lie to them any more, we can't take their money, labor, and children! What good ARE the people to us if we can't take their money, labor, and children? That @#$%ing internet, with its tubes and blobs and crap is making our job of swindling the people danged near IMPOSSIBLE! We have to shut it down, somehow. Maybe we can tell them that reptilian space aliens are stealing their brain cells over the internet every time they read whatreallyhappened.com!!!"

Dec 02 11:04

In the thick of it: how the Digital Economy bill is trying to kill open Wi-Fi networks

A professor of internet law explains how the government apparently wants to kill off open Wi-Fi as a corollary of its Digital Economy bill

Dec 02 10:26

8 Million Reasons for Real Surveillance Oversight

Cox Communications, the third largest cable provider in the United States, is the only company I've found that has made its surveillance price list public. Thus, we are able to learn that the company charges $2,500 for the first 60 days of a pen register/trap and trace, followed by $2,000 for each additional 60 days, while it charges $3,500 for the first 30 days of a wiretap, followed by $2,500 for each additional 30 days. Historical data is much cheaper -- 30 days of a customer's call detail records can be obtained for a mere $40.

Webmaster's Commentary: 

Seems that those skyrocketing telecom bills aren't the major source of income for those CEOs; selling you out to the government is where their bonuses are coming from!

Dec 02 09:12

European ISPs attack secret Acta copyright talks

Europe's ISP industry body has attacked a global copyright agreement, currently being negotiated in secret, that could lead to the disconnection of internet users who are accused of persistent copyright infringement.

The European ISP Association (EuroISPA) said in a statement on Monday that the Anti-Counterfeiting Trade Agreement (Acta) threatened the openness of the internet and would not, in any case, be effective in fighting copyright infringement. The organisation also criticised the fact that citizens' representatives are not involved in the negotiations.

Dec 02 08:59

Yahoo: Our spying policy would ’shock’ customers

A little-noticed letter from Yahoo! to the US Marshals Service offers troubling insight into the surveillance policies of one of the Internet's largest email providers.

In response to a Freedom of Information Act request seeking details of Yahoo's! policies allowing the Justice Department to request wiretaps of its users and the amount they charge US taxpayers per wiretap -- the search engine leviathan declared in a 12-page letter that they couldn't provide information on their approach because their pricing scheme would "shock" customers.

Dec 02 08:07

Cold facts about the hot topic of global temperature change after the Climategate scandal - by Christopher Monckton of Brenchley | PDF

THE WHISTLE BLOWS FOR TRUTH
The whistleblower deep in the basement of one of the ugly, modern tower-blocks of the dismal, windswept University of East Anglia could scarcely have timed it better.
In less than three weeks, the world’s governing class – its classe politique – would meet in Copenhagen, Denmark, to discuss a treaty to inflict an unelected and tyrannical global government on us, with vast and unprecedented powers to control all once-free world markets and to tax and regulate the world’s wealthier nations for its own enrichment: in short, to bring freedom, democracy, and prosperity to an instant end worldwide, at the stroke of a pen, on the pretext of addressing what is now known to be the non-problem of manmade “global warming”.

Dec 02 05:45

Google to limit free online news searches

Google, under fire from Rupert Murdoch and some other newspaper owners, said it will let publishers set a limit on the number of articles people can read for free through its search engine.

Google's announcement came as the News Corp. chairman, who has threatened to block the Internet giant from indexing his newspapers, and other US media heavyweights gathered here to discuss journalism in the Internet age.

Dec 01 17:30

Feds ‘Pinged’ Sprint GPS Data 8 Million Times Over a Year

Sprint Nextel provided law enforcement agencies with customer location data more than 8 million times between September 2008 and October 2009, according to a company manager who disclosed the statistic at a non-public interception and wiretapping conference in October.

The manager also revealed the existence of a previously undisclosed web portal that Sprint provides law enforcement to conduct automated “pings” to track users. Through the website, authorized agents can type in a mobile phone number and obtain global positioning system (GPS) coordinates of the phone.

Dec 01 17:14

Malware suspected of 'Black Screen' issue

Microsoft says that a problem with its Windows operating system, dubbed the 'Black Screen of Death' is not due to its latest security update.

Some Windows users are confronted by a totally black screen after they log on to their system.

It was thought that a security update on 10 November had been the cause, although this has now been discounted.

Dec 01 14:18

New ACTA Leak Confirms Major Threat to Internet

The internet is under attack by our very own US Government, working on behalf of corporate interests in the entertainment and content industries. What does this mean for you?

1. You can be banned from the internet, fined and even jailed if a copyright holder ACCUSES you of wrongdoing three times. Whether you violated their copyright or not.

2. Internet Service Providers (ISPs) will be forced to invest heavily in intrusive monitoring infrastructure. Guess who'll end up covering those costs?

Dec 01 10:33

ISRAELI ARMY OPENS ‘NEW FRONT’ ON THE INTERNET

The IDF is not content with the two major fronts it already operates in, the Occupied West Bank and the Gaza Strip. They have ‘moved their troops’ onto the Internet and will be “fighting enemies on Facebook and Twitter”.

Webmaster's Commentary: 

"Greetings.

I am the son of the late Nigerian dictator whose recent death has left me with $420 million dollars which I need your assistance to transfer ..."

Dec 01 09:34

Video reconstructed from brainscans of viewers

Pulling an image out of a person's brain is a feat that is hard to believe, but Dr. Jack Gallant of the UCB psychology department seems to have gone this accomplishment one better. In a recent experiment, Dr. Gallant claims to have made it possible to reproduce video images from human brain activity...

"Finally, the software was used to monitor the two patients’ brains as they watched a new film and to reproduce what they were seeing based on their neural activity alone.

"Remarkably, the computer program was able to display continuous footage of the films they were watching — albeit with blurred images."...

Dec 01 09:02

Microsoft Windows 7 problem 'could affect millions'

Users have been complaining on internet forums about the "black screen of death", which causes the screen of their Windows 7 machine to turn black and the computer to crash when a user logs on.

Microsoft confirmed that it was investigating the possibility that a security update, released on Thursday, could be the root of the problem.

...

The "black screen of death" also appears to affect other Windows operating systems, including Windows 7's predecessor, Windows Vista, as well as Windows XP. When users log on, they see a completely black screen instead of the usual start menu, desktop icons and system tray.

Dec 01 08:41

ClimateGate E-Mails Released by Whistleblower, Not Hacker

The information included e-mails, computer codes, annotations to code and the like. They were all of a part, not rife with "How's the wife?"-type correspondence but apparently the documents responding to a long-frustrated series of requests under the United Kingdom's freedom of information law.

This is only one of numerous factors indicating that the disclosures were not the work of a "hacker," as the media parrot without evidence, but a whistleblower on the inside.

Webmaster's Commentary: 

This makes far more sense. As I pointed out when the story first broke, the emails were sent to BBC, which sat on the story for more than a month. At that point the files were posted to a pro-warmist website. Only after the files were erased from that site were the files posted to the Russian server and announced globally.

This is a clear pattern of someone trying to correct the problem from within, first by going to BBC, then posting to the "community" and going fully public only as a last resort.

Dec 01 08:30

Google hosts energy experts amid climate talks

"Energy experts from Stanford University, the University of California at Berkeley, and MIT joined Google's Dan Reicher, director of climate and energy initiatives and energy venture capitalist Tim Woodward of Nth Power in a wide-ranging discussion on a very timely topic: how to transition the world toward a more sustainable form of energy consumption and production. They were later joined via video conference by Kristina Johnson, undersecretary of energy at the U.S.
Department of Energy."

Webmaster's Commentary: 

Yeah, that just might explain why Google is unenthusiastic about searches for "Climategate."

Dec 01 06:13

Google announces UK's 2009 search trends

Google has announced the biggest trends in UK search for the year, with celebrities, and swine flu joined by Facebook, Ebay and Spotify in the British search zeitgeist.

Bing has just released its US-centric search trends, but Google has published UK searches to give us a more British look at exactly what has caught our interest.

Dec 01 06:11

How To Remove Your Most Embarrassing Moments from Google

“Mighty” is the operative word, as these same search engines (usually the one that starts with a "G" and ends with an "oogle") can also curse us all. If you think about it, any schmuck can find out more about you than you’d like by typing only your first and last name.

Different folks certainly have different tolerance levels for their online persona and how public they want it to be, but thankfully, there are tips to ensure that your boss, your ex, or your mildly interested former friends can keep tabs on you on your terms.

Dec 01 06:08

Harvard study: Computers don't save hospitals money

Hospital computer systems are often built for administrators, not doctors

A Harvard Medical School study that looked at some of the nation's "most wired" hospital facilities found that computerization of those facilities hasn't saved them any money or improved administrative efficiency.

The recently released study evaluated data on 4,000 hospitals in the U.S over a four-year period and found that the immense cost of installing and running hospital IT systems is greater than any expected cost savings. And much of the software being written for use in clinics is aimed at administrators, not doctors, nurses and lab workers.

Nov 30 21:54

CLIMATEGATE - Forget the emails, the real evidence of Climategate is in the code

Here’s the code. The programmer has written in helpful notes that us non-programmers can understand, like this one: “Apply a very artificial correction for decline”. You get the feeling this climate programmer didn’t like pushing the data around so blatantly. Note the technical comment: “fudge factor”.

; Apply a VERY ARTIFICAL correction for decline!!
;
yrloc=[1400,findgen(19)*5.+1904]
valadj=[0.,0.,0.,0.,0.,-0.1,-0.25,-0.3,0.,- 0.1,0.3,0.8,1.2,1.7,2.5,2.6,2.6,$
2.6,2.6,2.6]*0.75 ; fudge factor
if n_elements(yrloc) ne n_elements(valadj) then message,’Oooops!’

Nov 30 13:45

New iPhone worm found in the wild

It’s difficult to tell if your iPhone has been compromised, but one symptom is that battery life becomes very, very short when the device is connected to WiFi, because the worm is generating so much network activity. The recommended method to remove this malware from your iPhone is to restore the Apple factory firmware using iTunes.

If you’ve jailbroken your phone and are running SSH, change the default password.

Nov 30 10:26

Report: FBI paid controversial NJ blogger for help

A New Jersey blogger about to stand trial on charges he made death threats against federal judges apparently was paid by the FBI in its battle against domestic terrorism, according to a published report.

The Record of Bergen County reported Sunday that Hal Turner received thousands of dollars from the FBI to report on neo-Nazis and white supremacist groups and was sent undercover to Brazil.

Turner also claims the FBI coached him to make racist, anti-Semitic and other threatening statements on his radio show, but the newspaper also found many federal officials were concerned that his audience might follow up on his violence rhetoric.

Nov 30 09:15

Climategate: Googlegate?

Nov 30 08:11

Search Engines Censoring ClimateGate?

A fantastic article written by Christopher Brooker of the London Telegraph exposing the climate change fraud rocketed to the very top of a Google News search for “global warming,” only to disappear hours later.

“What is going on at Google? I only ask because last night when I typed “Global Warming” into Google News the top item was Christopher Booker’s superb analysis of the Climategate scandal,” writes James Delingpole.

“It’s still the most-read article of the Telegraph’s entire online operation – 430 comments and counting – yet mysteriously when you try the same search now it doesn’t even feature. Instead, the top-featured item is a blogger pushing Al Gore’s AGW agenda. Perhaps there’s nothing sinister in this. Perhaps some Google-savvy reader can enlighten me.”

Webmaster's Commentary: 

As I mentioned last eek, there are billions of dollars on the line for the carbon traders and trillions in global taxes on the line for the UN< plus the justification for the UN to take over control of national infrastructure.

The globalists have been at work on this plan since the late 1980s. There is nothing, and I do mean nothing to protect their agenda and the promise of wealth beyond Midas!

No crime will be too extreme, no lie too bold, no sabotage too hateful to carry out, if it serves the New World Order.

Nov 30 07:33

Pub 'fined £8k' for Wi-Fi copyright infringement

A pub owner has been fined £8,000 because someone unlawfully downloaded copyrighted material over their open Wi-Fi hotspot, according to the managing director of hotspot provider The Cloud.

Nov 30 05:33

Don't bet newspapers will get rich shunning Google

There's an intriguing idea floating around the media: Microsoft Corp. wants to undercut Google so badly in Internet search that it might pay newspapers to withhold their content from Google.

Nov 30 05:32

Would you have brain surgury to give up your mouse and keyboard? Intel is betting you will

Computer chip maker Intel wants to implant a brain-sensing chip directly into the brains of its customers to allow them to operate computers and other devices without moving a muscle.

Nov 29 16:23

Climate email hackers had access for more than a month

The full data – covering 1,000 emails and 3,000 documents in which the most recent document and email is dated 12 November – came to wider notice when a copy was posted on a web server in Russia on 19 November.

But a month earlier a BBC weatherman who had expressed doubts about climate change on his blog was sent a sample of the email exchanges, suggesting the hackers already had access to the private system.

... [S]ecurity experts say there are only three tenable explanations for how the server was hacked: a determined break-in by an external hacker; that one of the CRU or university systems was accidentally "compromised" by a computer virus or other "malware"; or it was an "inside job" by a disaffected member of university staff.

Nov 29 10:10

Software developer looks at CRU code

I discuss the actual source code that was released in the recent hack of the CRU. The source code confirms the manipulation of climate data by climate scientists.

Follow up Video: http://www.youtube.com/watch?v=Gp4sMasX-_8&feature=related

Nov 28 16:57

“Climategate” surpasses “Global Warming” on Google – autosuggest still blocked

Webmaster's Commentary: 

But BING puts climategate right at the top!

I just switched over!

Nov 28 16:54

CLIMATEGATE - GOOGLE PULLS "CLIMATEGATE" OUT OF THEIR AUTOSUGGESTION LIST!

Webmaster's Commentary: 

Funny, it was there just a moment ago! :)

Nov 28 11:21

Pub 'fined £8k' for Wi-Fi copyright infringement

A pub owner has been fined £8,000 because someone unlawfully downloaded copyrighted material over their open Wi-Fi hotspot, according to the managing director of hotspot provider The Cloud.

Nov 28 08:46

Lawyers target thousands of 'illegal' file-sharers

Around 15,000 suspected pirates may soon get legal letters accusing them of illegally sharing movies and games.

ACS:Law plans to send notes to the accused in the new year offering a chance to settle out of court for "several hundreds of pounds".

A lawyer who has defended people who have received similar letters described it as a "scattergun approach" that would catch "innocent people".

ACS:Law said it was "unaware" of anyone who had been wrongly sent a letter.

Webmaster's Commentary: 

A big thanks a whole fucking lot to the music/video pirates out there.

Meanwhile, if you are an INNOCENT victim of this latest extortion scheme, click HERE

Nov 27 12:26

Update - Climategate - CRU Source Code Explained

Webmaster's Commentary: 

The Global Warming Cult insists that their computer models prove that humans are causing global warming. In point of fact a computer model doesn't prove anything. It can validate or disprove the assumptions of the model at best.

Programmers call it GIGO. Garbage in, garbage out. If you feed a load of bovine excrement into a computer, what comes out is just as aromatic.

In the case of the Global Warming Cult, comments within the actual source code for their much vaunted computer models, it is clear that the code was being ALTERED to force the results to be in accord with the outcome desired (and paid for) by the promoters of a one-world government.

Nov 27 11:03

Virgin Media to monitor filesharers

Virgin Media is trialling a deep packet inspection system that will see 40% of the ISP's network being monitored for file sharing activity. The network plans not to inform customers that they're being monitored.

The system is called CView and is being provided by a subsidiary of BAE called Deltica, which specialises in large volume data collection and processing and usually works with intelligence agencies across the world.

Nov 27 09:21

Obama Wants Computer Privacy Ruling Overturned

The Obama administration is seeking to reverse a federal appeals court decision that dramatically narrows the government’s search-and-seizure powers in the digital age.

Nov 26 11:22

Teeth-Whitening Company Sues Google, Microsoft, Yahoo, Others

A dental whitening company that admittedly used deceptive ad campaigns to trick users into signing up for expensive subscriptions is now suing Google, Yahoo and Microsoft for letting competitors run similar ads using its trademarked name.

Nov 26 11:20

This Computer Gave Birth to the Internet

1969. Charles Manson started a killing rampage, the Mets won, a man walked on the Moon, Woodstock left a generation stoned for years. Also, the internet was born.

Nov 26 08:00

9/11 re-enacted: Wikileaks publishes September 11 pager messages

Wikileaks would not reveal the source for the leak, but hinted: "It is clear that the information comes from an organisation which has been intercepting and archiving US national telecommunciations since prior to 9/11.

Webmaster's Commentary: 

Wikileaks would not reveal the source for the leak, but hinted: "It is clear that the information comes from an organisation which has been intercepting and archiving US national telecommunciations since prior to 9/11.

Nov 26 07:52

CRU's Source Code: Climategate Uncovered

Skimming through the often spaghetti-like code, the number of programs which subject the data to a mixed-bag of transformative and filtering routines is simply staggering. Granted, many of these "alterations" run from benign smoothing algorithms (e.g., omitting rogue outliers) to moderate infilling mechanisms (e.g., estimating missing station data from that of those closely surrounding). But many others fall into the precarious range between highly questionable (removing MXD data which demonstrate poor correlations with local temperature) to downright fraudulent (replacing MXD data entirely with measured data to reverse a disorderly trend-line).

Webmaster's Commentary: 

CRU relied on 8 papers linking tree ring growth to temperatures in historical times. However, these papers were full of errors despite being approved by the (now known to be compromised) peer-review process.

These papers and indeed the entire CRU methodology was to express tree ring thickness solely in terms of temperature while ignoring or minimizing the effects of variations in water availability, nutrients, disease patterns, and the fact that increased CO2 would trigger more robust plant growth even though the actual temperature might remain constant or even decline.

Nov 26 06:13

Fannie Mae to tighten lending standards

Starting Dec. 12, the automated system that Fannie Mae uses to approve loans will reject borrowers who have at least a 20 percent down payment but whose credit scores fall below 620 out of 850. Previously, the cut-off was 580.

Webmaster's Commentary: 

Remember when science fiction writers warned that computers w9ould control your lives?

You're looking at it.

"Starting Dec. 12, the automated system that Fannie Mae uses to approve loans will reject borrowers "

Nov 25 22:08

Thankful on Thanksgiving

While many Americans attempt to be thankful for anything in these trying and evil times, I am truly thankful there are people like Mike, who has created this site to fight for truth and decency against the murderous, hateful, worst examples of our species.

As we remember and reflect upon the gratitude we feel for the wonder that is in our lives, and the people whose talent, love, and inspiration guides us, this is for Mike Rivero, a true American hero and a beacon for the world.

Thanks MIke.

Joe

Nov 25 22:08

Thankful on Thanksgiving

While many Americans attempt to be thankful for anything in these trying and evil times, I am truly thankful there are people like Mike, who has created this site to fight for truth and decency against the murderous, hateful, worst examples of our species.

As we remember and reflect upon the gratitude we feel for the wonder that is in our lives, and the people whose talent, love, and inspiration guides us, this is for Mike Rivero, a true American hero and a beacon for the world.

Thanks MIke.

Joe

Nov 25 10:19

Denying Email Deletion

Phil Jones, Dec 3, 2008:

About 2 months ago I deleted loads of emails, so have very little – if anything at all.

Phil Jones, Nov 24, 2009 Guardian

We’ve not deleted any emails or data here at CRU.

Nov 25 08:19

"Godfather of Spam" goes to prison for four years

Alan Ralsky, the so-called "Godfather of spam" was yesterday sentenced by a federal judge in Detroit to spend the next 51 months of his life in prison for wire fraud, mail fraud, and violations of the CAN-SPAM act.

Webmaster's Commentary: 

This clown ripped off millions of people for millions of dollars, his stock scams probably aided the economic decline, and he only gets four years?

Nov 25 07:23

Wikileaks publishes 500,000 pager messages sent on 9/11

The release began at 8am GMT and will continue for 24 hours. The majority of the messages posted in the first four hours offer little illumination, with most either automatic alerts sent by computers or anodyne personal memos.

Wikileaks has not revealed how it obtained the records. The site has an impressive track record of securing and publishing confidential documents, but has been criticised for taking a reckless approach to privacy.

Nov 25 05:46

Google sorry for offensive pic in Obama search

Google Inc. is apologizing for a racially offensive image of the first lady that appears at the top of the list when users search for pictures of Michelle Obama on its site.

Nov 25 05:43

Google to put ancient Iraq artifacts online

Google is putting thousands of images of ancient artifacts at Iraq's National Museum online, the Web search leader said on Tuesday, part of a U.S. bid to entice foreign firms to invest in Iraq.

Nov 24 14:47

“these will be artificially adjusted”

People are talking about the emails being smoking guns but I find the remarks in the code and the code more of a smoking gun. The code is so hacked around to give predetermined results that it shows the bias of the coder. In other words make the code ignore inconvenient data to show what I want it to show. The code after a quick scan is quite a mess. Anyone with any pride would be to ashamed of to let it out public viewing.

Webmaster's Commentary: 

In other words, the actual computer software used by Hadley CRU was hacked to alter the results it produces.

Nov 23 11:53

Second iPhone worm behaves like botnet

A second iPhone exploit has been identified by security vendor F-Secure, which claims the new worm has botnet capability and is more threatening than its predecessor.

Nov 23 11:23

NSA helped with Windows 7 development

Privacy expert voices 'backdoor' concerns, security researchers dismiss idea

By Gregg Keizer
November 18, 2009 04:09 PM ET

Computerworld - The National Security Agency (NSA) worked with Microsoft on the development of Windows 7, an agency official acknowledged yesterday during testimony before Congress.

Nov 23 07:36

IE users warned to disable JavaScript

Security experts have warned anyone using Internet Explorer 6 or 7 on a Windows XP or Windows Vista PC to take immediate steps to ensure their security.

This is because an exploit for a previously unknown flaw in the browser has been spotted in circulation.

The flaw could enable a hacker to take over a computer if a surfer visited a compromised website using a vulnerable version of the IE browser.

Nov 21 18:47

How heavy is the Internet?

Using publicly available information, for the first time in the world, we have precisely and scientifically calculated the weight of the Internet. Obviously this information is only really useful to someone attempting to work out the cost of posting the Internet somewhere, perhaps to North Korea. Still, the casual reader -- hi there! -- may still enjoy learning just how damn heavy the thing is.

Nov 21 16:03

Britain's new Internet law -- as bad as everyone's been saying, and worse. Much, much worse.

The real meat is in the story we broke yesterday: Peter Mandelson, the unelected Business Secretary, would have to power to make up as many new penalties and enforcement systems as he likes. And he says he's planning to appoint private militias financed by rightsholder groups who will have the power to kick you off the internet, spy on your use of the network, demand the removal of files or the blocking of websites, and Mandelson will have the power to invent any penalty, including jail time, for any transgression he deems you are guilty of. And of course, Mandelson's successor in the next government would also have this power.

Nov 21 08:38

Leaked UK government plan to create "Pirate Finder General" with power to appoint militias, create laws

Secretary of State Peter Mandelson is planning to introduce changes to the Digital Economy Bill now under debate in Parliament. These changes will give the Secretary of State (Mandelson -- or his successor in the next government) the power to make "secondary legislation" (legislation that is passed without debate) to amend the provisions of Copyright, Designs and Patents Act (1988).

What that means is that an unelected official would have the power to do anything without Parliamentary oversight or debate, provided it was done in the name of protecting copyright.

Nov 21 07:36

CAMERA DISTORTS THE PICTURE

A Zionist hasbara (propaganda) body based in North America is trying to recruit “volunteers” whose main job is to distort the input of the internet’s most visited websites in Israel’s favor.

Propaganda efforts are reportedly focused on popular sites such as Wikipedia, the huge on-line encyclopedia which can be edited by anyone

CAMERA, which calls itself a “committee for accuracy in Middle East reporting in America,” already has a team of dozens of paid Jewish propagandists who regularly and often scandalously distort basic data pertaining to such themes as Israeli apartheid, Zionism and its ideological similarity to Nazism, Israeli state terror and ill-treatment of Palestinians as well as other issues related to the Israeli Palestinian conflict.

Webmaster's Commentary: 

So when you encounter a blogger standing next to the smoldering remains of a Palestinian child covered in white phosphorus, and that blogger insists he cannot smell any smoke, you are dealing with a paid propagandist.

Nov 21 05:57

Jaguar becomes world’s fastest supercomputer

Reports indicate that an upgrade to a Cray XT5 high-performance computing system deployed by the US Department of Energy has made the “Jaguar” supercomputer the world’s fastest.

Located at Oak Ridge National Laboratory, Jaguar is the scientific research community’s most powerful computational tool for exploring solutions to some of today’s most difficult problems.

Nov 20 11:40

Climate sceptics claim leaked emails are evidence of collusion among scientists

Climate change sceptics who have studied the emails allege that they provide "smoking gun" evidence that some of the climatologists colluded in manipulating data to support the widely held view that climate change is real and is being largely caused by the actions of mankind.

Nov 20 09:54

Hadley CRU hacked with release of hundreds of docs and emails

The University of East Anglia's Hadley Climatic Research Centre appears to have suffered a security breach earlier today, when an unknown hacker apparently downloaded 1079 e-mails and 72 documents of various types and published them to an anonymous FTP server. These files appear to contain highly sensitive information that, if genuine, could prove extremely embarrassing to the authors of the e-mails involved. Those authors include some of the most celebrated names among proponents of the theory of anthropogenic global warming (AGW).

Nov 20 09:00

Internet Explorer 9: what you need to know

Microsoft showed Internet Explorer 9 for the first time at its Professional Developer Conference, but a technical preview won't be available before next year (perhaps at CES 2010 in January).

Instead, Windows Senior Vice President Steven Sinofsky demonstrated the latest test version, with the Trident rendering engine running on DirectX instead of GDI - to show that IE development is still going on, and making progress on performance and support for standards.

Nov 20 08:06

Check every day? … Geesh, the identity thieves have won

Here's tip No. 4 from that company's collection: "Check your bank and credit card statements and accounts every day to make sure each transaction is yours."

Every day? You mean 365 days a year? Weekends and holidays? That kind of every day?

Don't know about anyone else, but this strikes me as blowing right on by excessive and diving headlong into the paranoia pool. I mean if you are checking all of your bank and credit card accounts every day -- EVERY DAY! -- I would suggest that the prospect of identity theft ranks somewhere below the likelihood of Obsessive Compulsive Disorder on your list of problems.

But that's just me.

Webmaster's Commentary: 

Shoot the identity thieves.

Twice!

Where it hurts real bad!!!

Nov 20 07:55

Internet Under Siege

It is ironic that President Barack Obama would travel to China and speak against government control over the internet. If the American Department of Homeland Security has its way new cybersecurity laws will enable Obama’s administration to take control of the internet in the event of a national crisis. How that national crisis might be defined would be up to the White House but there have been some precedents that suggest that the response would hardly be respectful of the Bill of Rights.

Nov 20 06:20

Say no to asbos for downloaders

Lord Mandelson is seeking to grant himself significant powers in the fight against copyright infringement – the ability to do just about anything so long as it's in the interest of protecting copyright, and without having to go through parliament.

This is disturbing not just because it represents a triumph of executive power over the normal democratic process, but also because it also reflects the increasing hunger our politicians have to control the internet. For the politicians that's a hopeless dream, but the damage they can do in the trying is real.

Nov 19 14:04

UK’s Terrifying Anti-Piracy Plans Leak

Cory Doctorow has the scoop on BoingBoing and if accurate, the new legislation will be a disaster for the privacy of all Internet users while giving unprecedented powers to the entertainment industry. Under the new bill the Secretary of State would be able to pass secondary legislation without Parliamentary oversight in order to protect rights holders.

Nov 19 12:03

LET THE INTERNET FIX AMERICA

Thanks to the internet, Americans do not need a revolutionary junta, or an armed uprising, or a ballot obliging them to usher in a government through corrupt and compromised political parties. For a start, we need an easily organized independent online panel to provisionally appoint smart honest people who are willing to be replacements. Then We the People will know exactly what to do. We are Americans.

Nov 19 11:10

How we discovered Verizon’s Spamdetector could be twisted into a disguise for censorship!

1. Verizon uses an unnamed third party who decides what is spam.

2. This unnamed third party also reviews complaints like ours.

3. We were told to send the “offending” email to spamdetector.update@verizon.net.

4. The unnamed third party would make a secret decision within 24 hours.

5. If the unnamed third party decides it is spam, regardless of our complaint we will not hear back.

That’s it. There is no recourse to challenge the decision. There isn’t even a confirmation that the email we sent to this third party was received at all. Of course, after 24 hours we still couldn’t send out an email containing the link

Webmaster's Commentary: 

Quit using Verizon.

Nov 19 09:25

FAA: System back up after causing flight delays

Webmaster's Commentary: 

There is no truth to the rumor that the FAA had just upgraded from VISTA to Windows 7.

Nov 19 09:09

Internet Under Siege

Many countries already monitor and censor the internet on a regular basis, forbidding access to numerous sites that they consider to be subversive. During recent unrest, the governments of both Iran and China effectively shut down the internet by taking control of or blocking servers. Combined with switching off of cell phone transmitters, the steps proved effective in isolating dissidents. Could it happen here? Undoubtedly. Once the laws are in place a terrorist incident or something that could be plausibly described in those terms would be all that is needed to have government officials issue the order to bring the internet to a halt.

Webmaster's Commentary: 

Don't throw away that telephone modem card just yet.

Dial-up BBS systems might just come back into vogue!

Nov 19 09:01

Facebook refuses to embed ‘report abuse’ button

Reports indicate that social networking sites like Facebook and MySpace have refused to embed a “report button” that would allow users to report abuse.

According to a report in New Scientist, the Child Exploitation and Online Protection Centre (CEOP) has devised the free “abuse button” that would link children and teenagers to advice and put them in contact with counsellors and law enforcement officers.

Nov 19 08:44

UK police make Zeus Trojan arrests

The Metropolitan Police Central e-Crime Unit made two arrests earlier this month for suspected use of the Zeus Trojan.

A man and a woman, both 20, were apprehended in Manchester on 3 November in Europe's first arrests with regard to Zeus, according to a Met Police statement on Wednesday.

A Met Police spokesperson told ZDNet UK on Thursday that a man and a woman had been arrested for suspected criminal distribution of the Trojan, which is also known as Zbot.

Nov 19 05:22

Two arrests in Zeus internet inquiry

Two suspected computer hackers have been arrested by detectives investigating a sophisticated virus which steals personal details from people using the internet.

Thousands of computer users have been struck by the Zeus or Zbot Trojan that bypasses security software and downloads banking details.

Investigators believe the information could be used to compromise accounts, enabling organised crime gangs to steal ''substantial'' sums of cash.

Nov 18 14:15

Thousands of web sites compromised, redirect to scareware

The compromised sites are using legitimately looking templates using automatically generated bogus content, with a tiny css.js (Trojan-Downloader.JS.FraudLoad) uploaded on each of them which triggers the scareware campaign only if the visitor is coming a search engine listed as known http referrer by the gang - in this case Google, Yahoo, Live, Altavista, and Baidu :

Nov 18 12:15

Can the law keep up with technology?

For example, how should a libel case be handled when it comes to social media? How can society balance accountability with free speech? And if information -- from private thoughts to public data -- is so readily available, how do we define what constitutes privacy?

Webmaster's Commentary: 

And how do we protect free speech against large corporations which may knowingly file lawsuits to silence legitimate and fair criticism?

Nov 18 07:46

Your ISP, if Net Neutrality disappears

Your ISP, if Net Neutrality disappears

Nov 18 07:43

Google More Intelligent vs. Less Intelligent

Google More Intelligent vs. Less Intelligent

Nov 18 07:43

5 Windows 7 Features You Probably Didn't Know About

5 Windows 7 Features You Probably Didn't Know About

Nov 18 07:13

For iPhone owners who can't find Macy's without an app

Silly iPhone apps don't get much sillier, so this one will probably be a big hit

Nov 17 09:33

Verizon to AT&T: "Our ads are true and the truth hurts"

AT&T seeks emergency relief because Verizon’s side-by-side, apples-to-apples comparison of its own 3G coverage with AT&T’s confirms what the marketplace has been saying for months: AT&T failed to invest adequately in the necessary infrastructure to expand its 3G coverage to support its growth in smartphone business, and the usefulness of its service to smartphone users has suffered accordingly.

Webmaster's Commentary: 

That is the truth.

AT&T may not double-bill me the way Sprint used to, but the service is problematic.

Nov 17 06:57

Apple Patents Technology That Would Force Users to Interact with Ads

Its distinctive feature is a design that doesn’t simply invite a user to pay attention to an ad — it also compels attention. The technology can freeze the device until the user clicks a button or answers a test question to demonstrate that he or she has dutifully noticed the commercial message. Because this technology would be embedded in the innermost core of the device, the ads could appear on the screen at any time, no matter what one is doing.

Nov 17 05:46

World's first universal quantum computer 'unveiled'

Scientists have unveiled the world's first universal programmable quantum computer, capable of processing two quantum bits or qubits which store more data than the simple "on" or "off" bits of conventional computing.

But, the test programme has revealed significant hurdles which the scientists claim must be overcome before it is ready for real work, the 'New Scientist' reported.

Nov 16 16:00

Microsoft allows advertising on PC desktops

Microsoft has opened up its Windows 7 operating system to advertising, allowing brands to advertise on PC desktops.

The technology company has struck a series of deals with the likes of Porsche, Pepsi and Twentieth Century Fox, which will allow users to add the branding of each company on their desktop.

It is pilot scheme which will run until next October and will be extended to Windows 7 borders and sounds – as well as Internet Explore 8 add-ons, which will direct people back to each advertisers’ homepage.

Nov 16 15:36

Violent Video Games Can Increase Aggression

Playing violent video games like Doom, Wolfenstein 3D or Mortal Kombat can increase a person's aggressive thoughts, feelings and behavior both in laboratory settings and in actual life, according to two studies appearing in the April issue of the American Psychological Association's (APA) Journal of Personality and Social Psychology. Furthermore, violent video games may be more harmful than violent television and movies because they are interactive, very engrossing and require the player to identify with the aggressor, say the researchers.

Nov 16 14:53

SCAM ALERT www.skype.com INTERNET LU

Nov 16 09:17

Netbooks are dead. Long live the notebook.

Netbooks — those underpowered mini laptops with 7-inch screens and unusable little keyboards — are a dying fad. However, the legacy of the netbook will be that inexpensive notebook computers are here to stay, and they are lighter and thinner than ever.

Analysts and pundits will continue to use the term “netbook” but I’m going to argue that the device that we originally called the netbook is being phased out — and thankfully so.

Nov 16 08:08

Cray blows by IBM to regain supercomputing crown

A Cray supercomputer at Oak Ridge National Laboratory has regained the title of the world's most powerful supercomputer, overtaking the installation that was ranked at the top in June, while China entered the Top 10 with a hybrid Intel-AMD system.

Webmaster's Commentary: 

Make a great animation system!

Nov 15 06:04

Hey, Google! There’s Another Programming Language Called Go!

When you’re a huge web company, and you choose a name for something as important as a new programming language, you should take great care to investigate whether the name is already taken.

Nov 14 11:02

Windows 7 Fail Japanese TV Show

The hosts of ''Tokudane'' a morning show on Japan's Fuji TV giggle as the guy demonstrating Microsoft Windows 7 struggles with the new operating system.

1 out of 3 ain't bad.

Nov 14 08:54

Microsoft confirms first Windows 7 zero-day bug

Urges users to block ports until a patch is ready, but workaround cripples browsers.

Nov 13 19:49

Can a mere domain name be defamation? Glenn Beck says yes

Hugely popular conservative talker Glenn Beck has sicced his lawyers on a satirical website that's been up for a week, but the attorneys may have a point on this one. The site, called glennbeckrapedandmurderedayounggirlin1990.com, toes the line on defamation—and may have stepped across it.

Nov 13 12:05

Liberals cry ‘unfair’ after Fox orders unbalanced YouTube purge

Liberal bloggers are accusing Fox News of launching an Internet war against them in a campaign to selectively remove Fox clips from YouTube.

On Wednesday, YouTube shut down the popular News1News channel, which featured news clips that many progressive bloggers and news sites would add to their stories.

Nov 13 11:49

Windows Marketplace's newest anti-piracy measures already thwarted

Yar, that was fast. Less than a day after Microsoft updated its Windows Marketplace for Mobile with new advanced anti-piracy measure, some apt xda-developers community member has managed to crack the new code -- in under two hours, according to Chainfire's posting.

Nov 13 11:34

N.J. official arrested in online child sex sting

An assistant Jersey City comptroller has been arrested on charges of trying to entice children online into having sex with him.

The children were really undercover police officers.

Webmaster's Commentary: 

There are some very sick people in government.

That being said, how is this NOT entrapment?

Nov 12 19:34

GCN links for WRH are wrong

Mike,

I wanted to be sure you got this. The GCN links for WRH On Demand and podcasts are for the WRONG DATES. For instance, this Thursday's podcast is a show broadcast last Friday. I sent you and e-mail about it.

REPLY: GCN is playing some earlier shows in my absence this week, so the dates for the podcasts are current, but the dates on te shows are, of course, repeats.

Nov 12 15:16

ACTA: Internet Users Guilty Until Proven Innocent

There's much more to this - read more (some of the things I *wish* I had said during the interview) & take action here:
http://bytestyle.tv/node/190

Nov 12 07:23

War beneath the web

Hacking websites used to be a way to show off. Now, as Charles Arthur reports in our series about online security, it's a lucrative crime – committed on an industrial scale.

Nov 12 07:09

Citizens On Patrol: The Blogosphere As Regulator

Najarian’s revelation was immediately followed by separate but equally incisive comments from some of the biggest and most influential market commentators out there. None of this was coordinated by a producer at CNBC nor was it orchestrated by the editorial staff at the Wall Street Journal.

Rather, it was an organic meme that spread around the financial web by means of Twitter, WordPress, Blogspot and Typepad.

The mainstream media picked up on this insider trading angle only AFTER the bloggers nailed it, at least from what I’ve seen based on the times of the articles and posts.

Nov 12 07:07

Blackout: Military Personnel Banned From H1N1 Vaccine Sites

If you want to draw attention to a problem, try hiding it. That's the strategy of several military bases when it comes to the H1N1 vaccine.

Shortly after the Pentagon announced that all Armed Services personnel would soon be facing a mandatory H1N1 vaccination program, I started receiving email from soldiers, airmen, marines and sailors because of a previous story I had written on the anthrax vaccine. Mandatory vaccine programs are a sensitive subject in the military, so it's not a huge surprise that swift and visceral reactions to the program gained speed.

Nov 11 15:41

Justice Dept. Asked For News Site's Visitor Lists

The subpoena (PDF) from U.S. Attorney Tim Morrison in Indianapolis demanded "all IP traffic to and from www.indymedia.us" on June 25, 2008. It instructed Clair to "include IP addresses, times, and any other identifying information," including e-mail addresses, physical addresses, registered accounts, and Indymedia readers' Social Security Numbers, bank account numbers, credit card numbers, and so on.

Nov 11 09:33

Google and Facebook teach Vatican the mysteries of the internet

During a four-day conference which starts on Thursday, representatives from the social network Facebook, the search engine Google, the YouTube video sharing website and the online encyclopedia Wikipedia will explain the importance of "new media" in the lives of young people.

The bishops will also learn how to combat the threat of hacking, with advice from a young hacker from Switzerland and an Interpol expert on cybercrime.

Nov 11 06:32

Finlike design can create powerful computer chips

Purdue University researchers are making progress in developing a new type of transistor that uses a finlike structure instead of the conventional flat design, possibly enabling engineers to create faster and more compact circuits and computer chips.

The fins are made not of silicon, like conventional transistors, but from a material called indium-gallium-arsenide.

Nov 11 06:31

Call of Duty: Modern Warfare 2

Webmaster's Commentary: 

Getting the next generation ready for endless warfare?

Kids, there is no reset button on a real war. You die, you die. You don't start over. You don't pass go and collect $200. You don't go to heaven. Dead is dead. Dead is forever.

Nov 10 09:32

Google Caffeine ready for roll out

The secret project first came to light in August 2009, when the Google’s search engineers publicly invited web developers to test the new version of the search engine and give their feedback. However, the company has now taken down the developer preview web page and replaced it with an announcement declaring Google Caffeine will go live in its first data centre soon.

The statement thanks all the people who have tested out the new back end technology, intended to speed up indexing and reduce the time between new content being published online and it then appearing in a Google search result.

Nov 10 08:05

Framed for child porn — by a PC virus

Of all the sinister things that Internet viruses do, this might be the worst: They can make you an unsuspecting collector of child pornography.

Heinous pictures and videos can be deposited on computers by viruses — the malicious programs better known for swiping your credit card numbers. In this twist, it's your reputation that's stolen.

Nov 09 13:32

China's 'netizens' hold authorities to new standard

A severed finger sparked an online uproar that went viral. And very quickly, rattled authorities here took note.

The story of Sun Zhongjie, a 19-year-old driver who chopped off his finger to decry police entrapment, shows how the Internet has become an effective tool of public protest in this tightly controlled country

Webmaster's Commentary: 

We are trying to do the same thing here!

:)

Nov 09 09:38

Worm attack bites at Apple iPhone

The self-propagating program changes the phone's wallpaper to a picture of 80s singer Rick Astley with the message "ikee is never going to give you up".

Webmaster's Commentary: 

The iPhone operating system, OSX, is based on LINUX.

UPDATE: I am getting a ton of emails arguing over whether OSX is LINUX or BSD or SYSTEM 5, but the fact is that they are all flavors of UNIX. Even the Amigados was a UNIX derivative.

Put down the swords; we all begin with Abraham!

My point being that the chorus of windows bashers who scream that the hackers will never bother you if you switch to a MAC need to realize that it is not the computers that are the problem, but the criminals.

Nov 09 09:04

AP IMPACT: Framed for child porn — by a PC virus

An Associated Press investigation found cases in which innocent people have been branded as pedophiles after their co-workers or loved ones stumbled upon child porn placed on a PC through a virus. It can cost victims hundreds of thousands of dollars to prove their innocence.

Their situations are complicated by the fact that actual pedophiles often blame viruses — a defense rightfully viewed with skepticism by law enforcement.

"It's an example of the old `dog ate my homework' excuse," says Phil Malone, director of the Cyberlaw Clinic at Harvard's Berkman Center for Internet & Society. "The problem is, sometimes the dog does eat your homework."

Webmaster's Commentary: 

Planting child porn on a victim's computer has become a favorite trick of political operatives to destroy opponents.

One pro-Israel hacker up in Canada was breaking into the computers of Israel critics and planting child porn on them, then reporting them anonymously, but last I heard this backfired and the hacker got arrested, and the Canadians take child porn VERY seriously!

Nov 09 08:12

News Corp Sites 'To Be Removed From Google'

News Corp chairman Rupert Murdoch has suggested the company's online newspaper pages will be invisible to Google users when it launches its new paid content strategy.

Webmaster's Commentary: 

That will be a good thing since News Corp content tends to include the worst of the pro-war propaganda.

Nov 09 05:11

Giveaway: Win a Lynnfield Core i7 System

OK there is no Joke here
Do you need a new computer ?
this is NOT a sweepstakes like Pepsi, Coke and Frito-lay's dose where no one really wins!

this is From Anandtech.com the biggest and most trusted Internet computer hardware review site on the Internet !!!!

When he (Anand) Gives something away people really win it !!!!

SO ENTER TODAY AND WIN BY Friday !!!
Entries will be accepted from 11/4/09 - 11/11/09. The winner will be selected, at random, by 11/13/09.
You are only allowed to enter once. Multiple entries will disqualify you.
http://www.anandtech.com/cpuchipsets/showdoc.aspx?i=3670

Nov 08 09:48

Hitler bypasses Apple censors: Mein Kampf for your iPhone

An iPhone application that recently made its way into the Apple App Store has sparked some controversy - a digital version of Adolf Hitler's book Mein Kampf translated to Spanish.

Webmaster's Commentary: 

I've read Mein Kampf. It is not the "Necronomicon" it is made out to be. I think the reason that there is such an objection to it being made available is that if people actually read it, they will start to understand just how badly the history of Germany has been distorted over time.

Nov 08 06:05

Windows 7 and Vista offer best file search

Ever wonder where you stored a certain file on your computer? If you have the new Windows 7 or even Windows Vista on your computer, you won't need any extra software to answer that question. The functionality already built into Windows 7 and Vista beats the performance offered by four free search programmes, the experts at Germany's Computer Bild magazine found.

Nov 07 13:35

Secret Anti-Piracy Treaty Turns ISPs into Pirates

A leaked draft of the Internet chapter of the controversial Anti-Counterfeiting Trade Agreement (ACTA) reveals that ISPs will be held liable for the infringements of their customers, unless they disconnect those accused. The draft aims to strengthen the power of the entertainment industries and other copyright holders, at the cost of the public.

Nov 06 06:44

Windows 7 Still Vulnerable to Viruses — Durr, Really?

Windows 7 is a valuable upgrade delivering an awesome new user interface, but don’t expect any major improvements in security.

Anti-virus software vendor Sophos tested Windows 7’s built-in anti-virus capabilities by feeding a clean system 10 pieces of the newest malware. Eight out of the 10 samples ran successfully, claims Sophos.

Nov 06 06:42

Google Dashboard to help control of data

The Google Dashboard brings together the host of popular services now offered by Google, and displays them in a simpler fashion.

"We think of this as a great step towards giving people transparency and control over their data, and we hope this helps shape the way the industry thinks about these issues," said Alma Whitten, Software Engineer on Privacy and Safety.

Nov 06 06:36

CIA Buys Another Front Company

In-Q-Tel, the investment arm of the CIA and the wider intelligence community, is putting cash into Visible Technologies, a software firm that specializes in monitoring social media. It’s part of a larger movement within the spy services to get better at using “open source intelligence” – information that’s publicly available, but often hidden in the flood of TV shows, newspaper articles, blog posts, online videos and radio reports generated every day.

Webmaster's Commentary: 

AP is reporting that Maj. Nidal Malik Hasan's internet postings were being monitored by the US Government for 6 month's before yesterday's attacks and that the posts attributed to him were a "cause for concern."

Yet the shooting still happened!

The US Government insists that We The People go along with the loss of our civil rights, the reading of our emails, the tapping of our phones, the looting of our computers, and all with warrants, because it will make us safe.

What Maj. Nidal Malik Hasan did yesterday was prove that none of this tyrannical and costly spying on the American people can accomplish the stated goal. They were watching him. They were aware of some posts that caused concern. And still Maj. Nidal Malik Hasan was able to open fire on a crowd.

Just as the government climatologists blew the call on global warming, just as the government health authorities blew the call on "When Pigs Fly" flu, the government's state security apparatus totally failed in using all this data collected on Americans to prevent a mass killing.

Nov 06 06:18

Posthuman Nuclear Doomsday Maneuvers

We no longer worry about World War III. Our future nuclear exchanges will be skirmishes, yes, but the Internet is far more dangerous than anyone ever realized. It becomes something that eats the world defensively.

Nov 05 18:55

AP sources: Authorities had concerns about suspect

Federal law enforcement officials say the suspected Fort Hood, Texas, shooter had come to their attention at least six months ago because of Internet postings that discussed suicide bombings and other threats.

Webmaster's Commentary: 

So, what today's shooting demonstrates is that all the constant surveillance of our mails and internet postings is totally useless.

I mean, isn't the justification for the destruction of the Bill of Rights, the spying, the reading of our emails and net posts, the eavesdropping of our phone calls, based on the premise that we will be safe from acts of terror?

And doesn't today's shooting prove that none of it works?

Restore the Bill of Rights!

Nov 05 15:22

Ron Paul on Alex Jones Tv:Copenhagen Treaty & Cyber Security Act = Control Over The People!!

Dr. Ron Paul speaks on the U.N. trying gain global power through climate control and internet.

Nov 05 08:09

43% of Taxpayers Risk Identity Theft When IRS Makes Copies of Their Tax Returns

TIGTA today publicly released its audit report of the IRS's processing of taxpayer requests for copies of tax returns and transcripts.

TIGTA's audit concluded that the IRS needs to strengthen its controls over taxpayer requests for copies of tax returns and transcripts in order to prevent unauthorized disclosure of taxpayer information. Tax transcripts provide most of the information contained in a tax return. Taxpayers request copies of their tax returns or transcripts for many reasons -- to obtain a loan to start a business, to buy a home, to attend college or to verify income for child support. In addition, third parties such as financial institutions, insurance companies or universities could also submit requests for tax returns or transcripts to the IRS on behalf of taxpayers.

Nov 05 06:37

Growing PayPal may one day overshadow eBay

While parent company struggles with change, payment service flourishes

Most people know eBay Inc. for its online marketplace, where deals abound on everything from gadgets to antique furniture. But soon, eBay's biggest business will likely be PayPal, the online payments service that has been growing steadily even as the economy has stumbled.

Nov 04 14:36

Our Dwindling Email Privacy

What sort of privacy do you expect when you send an email? As Americans increasingly rely on the Internet for communication, Justice Department lawyers increasingly argue that Americans have no right to privacy there—notwithstanding repeated congressional efforts to bolster these rights. A recent case out of Oregon shows how the privacy expectation associated with emails and other Internet communications is being frittered away.

Nov 04 14:10

DRM Breaker Reports Himself To Anti-Piracy Group

A citizen is so tired of his country’s copyright laws he has reported himself to an anti-piracy group. In his written confession, the ‘pirate’ admits to copying more than one hundred purchased movies and TV shows for his own use – legal in Denmark – but breaking DRM on the same is an act forbidden under Danish law.

Nov 04 10:08

Newly discovered Safari bug could mean big fees for some iPhone users

The flaw, as discovered by Estonian Apple Site AppleSpot: If the user visits a site which uses Motion-JPEG (most commonly used for security cams and live feeds) in Safari, Safari will continue to gobble up bandwidth even after Safari is closed. Safari is one of the few apps that Apple allows to process in the background, and Motion-JPEG streams appear to continue streaming, even if the stream is in another tab or in the “closed” application.

Nov 04 08:50

Secret copyright treaty leaks. It’s bad. Very bad.

Mandatory prohibitions on breaking DRM, even if doing so for a lawful purpose (e.g., to make a work available to disabled people; for archival preservation; because you own the copyrighted work that is locked up with DRM)

Webmaster's Commentary: 

Thanks a load, music pirates.

Nov 04 08:39

Leaked ACTA Internet Provisions: Three Strikes and a Global DMCA

Negotiations on the highly controversial Anti-Counterfeiting Trade Agreement start in a few hours in Seoul, South Korea. This week’s closed negotiations will focus on “enforcement in the digital environment.” Negotiators will be discussing the Internet provisions drafted by the US government. No text has been officially released but as Professor Michael Geist and IDG are reporting, leaks have surfaced. The leaks confirm everything that we feared about the secret ACTA negotiations. The Internet provisions have nothing to do with addressing counterfeit products, but are all about imposing a set of copyright industry demands on the global Internet, including obligations on ISPs to adopt Three Strikes Internet disconnection policies, and a global expansion of DMCA-style TPM laws.

Webmaster's Commentary: 

"Protect the money!"

Nov 03 15:36

Senate Bill Would Give President Obama Authority to Pull the Plug on Your Internet

CNET News has obtained a summary of a proposal from Senators Jay Rockefeller (D-W.V.) and Olympia Snowe (R-Maine) that would create an Office of the National Cybersecurity Advisor, part of the Executive Office of the President. That office would receive the power to disconnect, if it believes they’re at risk of a cyberattack, “critical” computer networks from the Internet.

Nov 03 09:33

iHacked: jailbroken iPhones compromised, $5 ransom demanded

Yesterday, a “Your iPhone’s been hacked because it’s really insecure! Please visit doiop.com/iHacked and secure your phone right now!” message popped up on the screens of a large number of automatically exploited Dutch iPhone users, demanding $4.95 for instructions on how to secure their iPhones and remove the message from appearing at startup.

Nov 03 08:24

Tone-deaf Unisys official on why cloud computing rocks

Here's Richard Marcello of Unisys extolling one of what he sees as the virtues of cloud computing yesterday at the Cloud Computing Conference and Expo in Santa Clara:

"We were able to eliminate a whole bunch of actually U.S.-based jobs and kind of replace them with two folks out of India."

Those actually U.S.-based jobs presumably were held by actual Americans trying to feed actual U.S.-based families.

Webmaster's Commentary: 

And Richard's bragging about this?

Nov 03 06:04

The future of Google?

Schmidt, of course, didn’t quite it put it this way. According to him, in five years time, a real-time, broadband intensive, video and app-centric web will be overrun by Chinese-language content. No surprises there, especially since he wrapped up his prophesy in the orthodoxy of the social web, arguing that user-generated networked information would increasingly replace professionally created content as the backbone of the online knowledge economy.

Nov 03 06:01

Web could run out of addresses next year, warn web experts

Businesses urgently need to upgrade to IPv6, a new version of the internet's addressing protocol that will hugely increase the number of available addresses.

A survey, conducted by the European Commission, found that few companies are prepared for the switch from the current naming protocol, IPv4, to the new regime, IPv6. Web experts have warned that we could run out of internet addresses within the next two years unless more companies migrate to the new platform.

Nov 02 10:22

NSA To Build $1.5 Billion Cybersecurity Data Center

The NSA is building the facility to provide intelligence and warnings related to cybersecurity threats, cybersecurity support to defense and civilian agency networks, and technical assistance to the Department of Homeland Security, according to a transcript of remarks by Glenn Gaffney, deputy director of national intelligence for collection, who is responsible for oversight of cyber intelligence activities in the Office of the Director of National Intelligence.

Webmaster's Commentary: 

Isn't it cheaper to shoot the hackers?

Nov 01 10:24

Illegal downloaders spend MORE on music than those who obey the law

People who illegally download music spend more on official releases than anyone else, according to a new survey.

The study, published today by think-tank Demos, found those who admit to file sharing spent an average £77 a year on singles and albums - £33 more than those who claim never to have wrongly accessed music for free.

Researcher Peter Bradwell said the findings should force companies and politicians to 'wake up to the changing nature' of the music industry as the Government plans to disconnect illegal downloaders from the internet in a 'three strikes and you're out' rule.

Nov 01 05:57

15 Free Guides That Really Teach You USEFUL Stuff

15 Free Guides That Really Teach You USEFUL Stuff

Oct 31 11:32

Trick or Tweet? Malware Abundant in Twitter URLs

As many as one in every 500 web addresses posted on Twitter lead to sites hosting malware, according to researchers at Kaspersky Labs who have deployed a tool that examines URLs circulating in tweets.

The spread of malware is aided by the popular use of shortened URLs on Twitter, which generally hide the real website address from users before they click on a link, preventing them from self-filtering links that appear to be dodgy.

Oct 31 06:27

Security center opens to battle computer attacks

Meanwhile, Sen. Lieberman says U.S. is still behind in cybersecurity efforts

The United States is well behind the curve in the fight against computer criminals, Sen. Joe Lieberman said , as Homeland Security officials opened a $9 million operations center to better coordinate the government's response to cyberattacks.

Oct 31 06:26

Secure computers aren’t so secure

Even well-defended computers can leak shocking amounts of private data. MIT researchers seek out exotic attacks in order to shut them down

Oct 31 06:25

The 3 Phases of Owning a Computer

The 3 Phases of Owning a Computer

Oct 31 06:25

5 free tools to bypass Internet region restrictions

A large number of web services are geographically restricted, such as Hulu, Pandora and Spotify. The reasons are usually to do with content licensing restrictions, or because US visitors (or visitors from other advanced economies) are of a higher value from a monetization perspective.

Oct 30 14:04

Israel's new online disinformation project pays bloggers for pro-Israel comments

"The Foreign Ministry unveiled a new plan this week: Paying talkbackers to post pro-Israel responses on websites worldwide. A total of NIS 600,000 (roughly $150,000) will be earmarked to the establishment of an “Internet warfare” squad.

Oct 30 09:27

ISP Threatens Legal Action Against UK Over Anti-Piracy Plans

Peter Mandelson confirmed yesterday that illicit file-sharers could have their Internet connections severed as part of the government’s aims to reduce piracy by 70% in 2 years. TalkTalk, the UK’s second largest ISP, is said to be dismayed at the decision and is now threatening legal action over what it claims is a breach of human rights.

Oct 30 09:00

Fake Security Software is present in millions of Computer

Symantec found 250 varieties of scam security software with legitimate sounding names like Antivirus 2010 and SpywareGuard 2008, and about 43 million attempted downloads in one year but did not know how many of the attempted downloads succeeded, said Weafer.

Oct 30 08:24

US-CERT warns of Blackberry snooping software

An application called PhoneSnoop can configure the phone's speakerphone function to enable a hacker to listen to surrounding conversations remotely. The software uses a Blackberry API to intercept incoming calls. Once the software is downloaded and installed, the software is triggered by a simple phone call, placing the device into speakerphone mode.

Webmaster's Commentary: 

The government spooks can do this for all speakerphone equipped phones, but I guess when ordinary people do it, it's a problem!

Oct 30 07:14

District Judge Concludes E-mail Not Protected by Fourth Amendment (But See Correction)

CORRECTION: In the course of re-reading the opinion to post it, I recognized that I was misreading a key part of the opinion. As I read it now, Judge Mosman does not conclude that e-mails are not protected by the Fourth Amendment. Rather, he assumes for the sake of argument that the e-mails are protected (see bottom of page 12), but then concludes that the third party context negates an argument for Fourth Amendment notice to the subscribers. I missed this because the reasoning closely resembles the argument for saying that the Fourth Amendment doesn’t apply at all, and I didn’t read the earlier section closely enough. That’s obviously a much narrower position, and I apologize for misunderstanding it the first time in the quick skim I gave it.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA