May 05 12:30

Hillary Unleashes Million-Dollar Professional Internet Troll Army

Hillary Clinton-aligned Super PAC, Correct the Record, is taking a page out of Vladimir Putin’s playbook by employing a $1 million dollar professional internet troll army to build a paid, positive consensus about the Clinton campaign.

Webmaster's Commentary: 

... or to harass and attack websites like this one, which is going on right now.

May 05 10:59

Apple can be evil, too: Don’t miss this tale of how it cleared a guy’s music files

And Apple Music seems to have been rolled out with a lot of problems. It’s not just a matter of losing a few songs: James Pinkstone lost 122 GB of music files, called Apple’s helpdesk, and was told by an employee named Amber that this is the way the program is supposed to work. Some of what he lost were his own musical compositions.

May 05 10:57

Clinton’s Email Security Procedures Won’t Be Released Until After the Election

The State Department says it won’t release any documents relating to Hillary Clinton’s email security procedures and protocol until after the November presidential election.

Webmaster's Commentary: 

So, we are free to imagine the worst! :)

May 05 10:56

How a FOIA Request into Hillary Clinton's Emails Revealed a Criminal Investigation

Clinton had characterized the FBI's investigation as "routine," but the DOJ now refers to it as a "law enforcement proceeding."

May 05 10:00


Let us start with an historical fact. Treason and betrayal by the highest levels is a common feature of history, whether it is Judas vs Jesus, Brutus vs Julius Caesar, Benedict Arnold, the Rosenbergs, Jonathan Pollard, Aldrich Ames, Robert Hanssen. It is just a fact of life. It does happen.

Back in 1996, when Bill Clinton was running for re-election, he authorized the transfer of highly sensitive technology to China. This technology had military applications and allowed China to close the gap in missile performance with the United States. The transfers were opposed and severely criticized by the Defense Department.

Webmaster's Commentary: 

Reposted in light of today's story where Guccifer admits breaking into Hillary's private server, that it was actually very easy, and more importantly, while inside, he spotted at least ten foreign-based IPs also inside the server!

Optional Banner: 
WRH Exclusive
May 05 09:26

US judge says Clinton may have to testify in email lawsuit

A federal judge in Washington on Wednesday ordered that Democratic presidential candidate Hillary Clinton may have to testify in a lawsuit related to the private email server she used while secretary of state.

U.S. District Judge Emmet Sullivan said the parties in the case, the State Department and conservative watchdog group Judicial Watch, also struck an agreement about the scope of the testimonies that some of Clinton's former top aides will give in the case.

Those testimonies, known as discovery, will take place over the next eight weeks and may yield information that would require Clinton herself to be deposed, Sullivan said in an order.

May 05 08:20

Windows 10 updates are now ruining pro-gaming streams

Perhaps there’s nothing more annoying than going in for the kill to suddenly be “pooped on” by a Windows 10 automatic installation taking out your computer mid-stream to your 130,000 or so followers.

After deciding to advertise during the weather by attempting to automatically install midway through a forecast, Windows 10 is starting to wreak havoc with gamers. Ex-professional Counter Strike player turned full-time streamer Erik Flom was rudely interrupted mid-game and live on Twitch by Windows 10 automatically installing on his PC.

“What. What!? How did this happen! Fuck you Windows 10!” Flom screamed at the PC. “Oh my God! You had one job PC. We turned off everything. Update faster you fuck!”

Initial outrage flowed into jubilation as it appeared Windows 10 was nearing completion, only for Flom to have his hopes dashed by a second installation countdown.

May 05 08:19

Hillary’s Secret Weapon (Will NOT Work)

The implication in his argument is that Mrs. Clinton’s emails were retroactively classified as confidential, secret or top-secret after she received or sent them and therefore she had no notice of their sensitivity. His argument is unavailing for two reasons. The first is that it is untrue. Emails are confidential, secret or top-secret at the time they are created, whether marked or not.

May 05 08:15

Did your UK biz just pay £1,500 to stop a DDoS? You've been had

Empty threats from faux hackers doing the rounds again

May 05 08:06

Suck on this: White hats replace Locky malware payload with dummy

Locky normally spreads using malicious and disguised JavaScript inside email attachments supposedly containing an invoice or similar. Malicious messages are sent to prospective marks in spam runs.

Those on Windows machines who open the malicious attachment are likely to become infected, a process that results in user files getting encrypted. If this happens it’s normally impractical to recover scrambled files without paying crooks a fee in exchange for the private encryption key needed to recover compromised data.

The hack by as yet unidentified white hats meant that in place of the expected ransomware, “victims” were served with a 12kb binary with the plain message “Stupid Locky” that isn’t a valid executable, anti-virus firm Avira reports.

May 05 07:21

#DropOutHillary: Twitter Blows Up With Anti-Clinton Tirade

In light of two GOP candidates dropping out of the presidential race, the Twitter community is calling on Democrat Hillary Clinton to follow suit. The hashtag #DropOutHillary has skyrocketed to No.1 in US trends, spewing funny memes and mockery.

May 05 06:21


The U.S. Navy and the Defense Advanced Research Projects Agency (DARPA) are now testing a new unmanned drone warship. The first Navy drone ship is a 132-foot ACTUV (Antisubmarine warfare Continuous Trail Unmanned Vessel) known as Sea Hunter, which cost around $120 million to build. The military says more can now be produced for $20 million or so each. But some are concerned that with no humans at the controls, these “robot ships” could be hacked, pwned remotely, and used by America's enemies to attack the United States.

May 05 06:11


Speaking on condition of anonymity to Gizmodo’s Michael Nunez, several journalists, hired by Facebook in 2014 to oversee its secretive “trending news” project, revealed new details on how the company handles the day’s news. Known internally as “news curators,” the contractors say they were given the ability to “deactivate” or blacklist any trending topic if it wasn’t being covered by minimally “three traditional news sources.” “A topic was often blacklisted if it didn’t have at least three traditional news sources covering it, but otherwise the protocol was murky—meaning a curator could ostensibly blacklist a topic without a particularly good reason for doing so,” Nunez writes, although curators insist the system wasn’t abused.

May 04 23:05

Apple loses trademark fight over 'iPhone' name in China - BBC News

The ruling comes shortly after to Apple's latest results which showed a 13% drop in revenue on slower iPhone sales. Sales in China had plunged by 26%.

Apple is also facing difficulties in other operations in China.

May 04 16:04


The infamous Romanian hacker known as “Guccifer,” speaking exclusively with Fox News, claimed he easily – and repeatedly – breached former Secretary of State Hillary Clinton’s personal email server in early 2013. -- "For me, it was easy ... easy for me, for everybody," Marcel Lehel Lazar, who goes by the moniker "Guccifer," told Fox News from a Virginia jail where he is being held.

May 04 15:23

NSA and CIA doubled warrantless searches in recent years

Public outrage certainly didn’t do much to chill U.S. intelligence agencies’ use of warrantless surveillance. In fact, in the years since the government’s extrajudicial spying became public knowledge, the NSA and CIA have doubled down.

May 04 14:32

Armada Collective: Who are the hackers extorting bitcoin ransoms and what can we do?

Move aside Anonymous – a new mysterious group of hackers is taking numerous firms and webmail providers offline using Distributed Denial of Service (DDoS) attacks, promising to stop if the victims pay bitcoin ransoms.

Webmaster's Commentary: 

I just received the following threat.



We are Armada Collective.

Your network will be DDoS-ed starting 12:00 UTC on 08 May 2016 if you don't pay protection fee - 10 Bitcoins @ 1BNfJDyC5vR3Q1NPW14wufnUp9hNB4nRmn

If you don't pay by 12:00 UTC on 08 May 2016, attack will start, yours service going down permanently price to stop will increase to 20 BTC and will go up 10 BTC for every day of attack.

This is not a joke.

Our attacks are extremely powerful - sometimes over 1 Tbps per second. And we pass CloudFlare and others remote protections! So, no cheap protection will help.

Prevent it all with just 10 BTC @ 1BNfJDyC5vR3Q1NPW14wufnUp9hNB4nRmn

Do not reply, we will not read. Pay and we will know its you. AND YOU WILL NEVER AGAIN HEAR FROM US!

Bitcoin is anonymous, nobody will ever know you cooperated.

UPDATE: My server company says this is a hoax/scam.

May 04 09:48


Let us start with an historical fact. Treason and betrayal by the highest levels is a common feature of history, whether it is Judas vs Jesus, Brutus vs Julius Caesar, Benedict Arnold, the Rosenbergs, Jonathan Pollard, Aldrich Ames, Robert Hanssen. It is just a fact of life. It does happen.

Back in 1996, when Bill Clinton was running for re-election, he authorized the transfer of highly sensitive technology to China. This technology had military applications and allowed China to close the gap in missile performance with the United States. The transfers were opposed and severely criticized by the Defense Department.

Webmaster's Commentary: 

Optional Banner: 
WRH Exclusive
May 04 09:25


The studies link cell phones to a slew of health issues in children. That’s why experts say parents and expecting mothers need to be extra careful. Cell phones are a part of our every day lives and a cause for concern for researchers who see them as a health risk — especially for infants and children. “The weight of the evidence is clear: cell phones do cause brain cancer,” said Dr. Devras Davis, president, Environmental Health Trust.

May 04 08:57

Has YOUR account been hacked? Hundreds of millions of passwords stolen from Google and Yahoo users in major security breach

If you have a Gmail, Hotmail or Yahoo email account, you may want to update your password.

A new report has found that Russia's criminal underworld is trading hundreds of millions of stolen usernames and passwords belonging to these accounts.

This is according to a Reuters investigation, which spoke to Alex Holden, founder and chief information security officer of Wisconsin-based Hold Security.

Holden, who last year uncovered the largest data breach to date, claims that the details of 272.3 million stolen accounts are now being traded.

Webmaster addition; Why? How useful is someone's Google account to a criminal? I think Hold Security is just grabbing some free publicity by cashing in on the present Russia-bashing fever.

May 03 16:56

Google Now Has Access To Millions of Patients’ Medical Records

By Michaela Whitton

A controversial deal between tech giant Google and the National Health Service (NHS) will allow artificial intelligence units access to 1.6 million confidential medical records. Since 2014, Google has partnered with several scientists in an attempt to understand human health, but a new report reveals the data gathering goes far beyond what was originally anticipated...

May 03 15:45

Security of critical phone database called into question

Federal officials fear that national security may have been jeopardized when the company building a sensitive phone-number database violated a federal requirement that only U.S. citizens work on the project.

The database is significant because it tracks nearly every phone number in North America, making it a key tool for law enforcement agencies seeking to monitor criminal or espionage targets.

Now Telcordia, a Swedish-owned firm, is being compelled to rewrite the database computer code — a massive undertaking — to assuage concerns from officials at the FBI and Federal Communications Commission that foreign citizens had access to the project. These officials fear that if other countries gain access to the code, they could reap a counterintelligence bonanza, learning the targets of U.S. law enforcement and espionage investigations.

May 03 15:42

First, there were wearables. Now, there are swallowables

In the evolution of computing, from the desktop computer to the smartphone to the watch, it seemed like just a matter of time before the technology would come to be swallowable — and now it is.

The innovation at the heart of it is an FDA-approved ingestible sensor housed in pills, designed to help patients adhere to the medications their doctors prescribe. Except the sensor isn't powered by a battery, it's powered by the gut of the patient swallowing it, using technology discovered two centuries ago.

"Make this mandatory!" - Official White Horse Souce

May 03 15:38

Windows 10 growth stalls in April

Microsoft's current OS grabbed a 14.35 percent slice of all Web traffic in April, according to Web tracker Net Market Share. That number showed almost no growth from the 14.15 percent in March and followed several months of relatively healthy gains.

May 03 15:35

Turns out that making TV sets smarter may not have been the world's brightest idea

Smart TVs are frequently plagued with confusing interfaces, buggy functions and inconsistent updates. They are sometimes mysteriously unable to run new streaming services and may never be updated to add new features to the ones they do run.

Worse, some TV makers focus on bringing new features only to their latest models in an effort to persuade people to buy new sets. Samsung's 2016 models, for instance, implicitly inform anyone who bought last year's sets that they've already been left behind. Those earlier customers won't be able to use their Samsung TVs to set mood lighting or check security cameras in a connected home.

Among the new features in LG's 2016 models: Magic Zoom, which will let viewers zoom in on video while it's playing — using a digital magnifying glass — to make out small text and other details. But LG won't say when, if ever, older TVs will get that.

May 03 15:28

Extreme photo-bombing: Bad ImageMagick bug puts countless websites at risk of hijacking

Whenever you upload a profile photo, a gallery of snaps, or a silly meme to a website, there's an extremely high chance that the site is using ImageMagick, an open-source collection of image processing tools, to resize, crop and tweak the pictures.

By feeding booby-trapped data – such as a poisoned selfie – to web services using ImageMagick, it may be possible to execute malicious code on the website's server. From there hackers can start infiltrating the system to steal secrets, snoop on people's accounts, and so on.

May 03 15:26

Yay! It's International Patch Your Scary OpenSSL Bugs Day!

Six security patches – two of them high severity – have been released today for OpenSSL 1.0.1 and 1.0.2.

Last week, the open-source crypto-library project warned that a bunch of fixes were incoming, and true enough, Tuesday’s updates address serious flaws that should be installed as soon as possible.

May 03 15:11

NSA to Spy On Own Employees Everywhere, All the Time

A National Security Agency official is seeking the ability to track employees on their personal computers, as well as at office workstations, to ensure they are not participating in illegal activities, including downloading child pornography, or leaking state secrets.

May 03 14:20

German nuclear plant infected with computer viruses, operator says

A nuclear power plant in Germany has been found to be infected with computer viruses, but they appear not to have posed a threat to the facility's operations because it is isolated from the Internet, the station's operator said on Tuesday.

Webmaster's Commentary: 

As the Iranians found out, the air-gapped computers running the systems can still be infected with flash drives. Back during Desert Storm, Iraq's military computers all crashed, even though they were not connected to the internet. The intrusion was reported to have been done via a Hewlett Packard printer that had been "modified" prior to delivery.

May 03 13:23

Snowden: "We Are Like Tagged Animals"

In a new piece out in The Intercept, whistleblower Edward Snowden has summed up what smart phones really are...

(read more)

May 03 09:48

This is what government sponsored mass surveillance is doing to your mind

Big Brother is watching you and he wants you to believe that if you have nothing to hide, then you have nothing to fear

May 03 08:55

Police Can Force You to Use Your Fingerprint to Unlock Your Phone

But they can’t make you cough up your passcode.

May 03 08:46

The ‘spying billboards’ that track you as you walk by

Anybody who walks or drives past new tracking billboards with a mobile phone in their pocket can be spied on without their knowledge or consent: a potential invasion of privacy that US Senator Charles E. Schumer wants the US Federal Trace Commission (FTC) to investigate.

May 03 08:18

World Jewish Congress slams YouTube over neo-Nazi videos

The World Jewish Congress (WJC) sent Philipp Justus, the managing director of the German unit of YouTube parent company Google, a letter demanding more decisive action to take down illegal material praising the Holocaust and Adolf Hitler.

Webmaster's Commentary: 

"But, but, but, your people posted those videos! We thought you WANTED them up there!!!!!" :)

May 03 06:19

Did you know that billboards are spying on you now?

Not only do billboards now interact with you and your smartphone to target you for marketing purposes, police are also using billboards to track you.

May 02 17:44

Court Requires Woman to Unlock iPhone Using Fingerprint

The case of a California woman who was ordered to unlock an iPhone using her fingerprint is raising questions about whether compelling a person to unlock their smartphone could infringe on their right against self-incrimination.

May 02 16:57

F-35s failed 'scramble test' because of buggy software

At Mountain View in Utah, the US Air Force decided too take the six F-35As out for a spin in a simulated scramble, but the results were disappointing:

“The Air Force attempted two alert launch procedures during the Mountain Home deployment, where multiple F-35A aircraft were preflighted and prepared for a rapid launch,” wrote Gilmore, “but only one of the six aircraft was able to complete the alert launch sequence and successfully takeoff”.

He continues: “Problems during start-up that required system or aircraft shut-downs and restarts – a symptom of immature systems and software – prevented the other alert launches from being completed”.

May 02 15:04

FBI Chooses Secrecy Over Locking Up Criminals

The Federal Bureau of Investigation’s refusal to discuss even the broad strokes of some of its secret investigative methods, such as implanting malware and tracking cellphones with Stingrays, is backfiring – if the goal is to actually enforce the law.

May 02 14:02

ISIS Releases New Kill List of 3,600 Random New Yorkers — FBI to Visit Each Personally

Now we’re supposed to believe that ISIS’ Caliphate Cyber Army has leaked the names and home and email addresses of 3,600 average people living in New York, urging terrorists to randomly target and kill them because… terror?

The info was reportedly posted on an ISIS-only channel along with the statement, “We want them #Dead” — because even terrorists know the importance of hashtags.

Meanwhile, this situation is being taken so seriously, it is being reported that police and the FBI are going to personally visit each person on the list and warn them that they have been personally threatened by ISIS… so they can… do…

What exactly?

(read more)

May 02 14:01

‘Now Live-Tweet Bay Of Pigs’: CIA Lambasted Online For Live-Tweeting Bin Laden Kill

The CIA ‘live-tweeted’ the raid on Osama bin Laden’s compound in Pakistan five years on, reporting the operation as if it were happening right now. Some found the social media exercise distasteful and arrogant.

May 02 13:43

Hillary Clinton’s Damning Emails — Ray McGovern

Last week, Fox News TV legal commentator Andrew Napolitano said the FBI is in the final stages of its investigation into Clinton and her private email server. His sources tell him that “the evidence of her guilt is overwhelming,” and that the FBI has enough evidence to indict and convict.

May 02 12:52

Scalia's Dead, Now Supreme Court Grants FBI Remote Access to Any Computer in the US

Justice Scalia, love him or hate him, was perhaps the most staunchly Constitutional Supreme Court justice we had.

Now he’s dead and not even two months later, the Supreme Court has approved new rules that would allow the FBI to not only hack any computer in the U.S., but around the globe. Legally.

And it isn’t just limited to crime suspects who they get a warrant against...

(read more)

May 02 11:46

U.S. Senator Calls For Federal Investigation Of Billboards Spying On The Public

By Nicholas West

As we move more obviously into a Minority Report-style world, it still remains to be seen just how far the public is willing to let technology intrude upon their everyday lives.

One area that seems to be generating increased concern is the use of biometrics and mobile phone location data to identify shopping habits...

May 02 11:42

Election fraud feared as hackers target voter records

A series of data breaches overseas are spurring concerns that hackers could manipulate elections in the United States. Since December, hundreds of millions of voters in the U.S., the Philippines, Turkey and Mexico have had their data discovered on the web in unprotected form. In some instances, legitimate security researchers found the information, but in others, malicious hackers are suspected of pilfering the data for criminal purposes.

May 02 11:14


Let us start with an historical fact. Treason and betrayal by the highest levels is a common feature of history, whether it is Judas vs Jesus, Brutus vs Julius Caesar, Benedict Arnold, the Rosenbergs, Jonathan Pollard, Aldrich Ames, Robert Hanssen. It is just a fact of life. It does happen.

Back in 1996, when Bill Clinton was running for re-election, he authorized the transfer of highly sensitive technology to China. This technology had military applications and allowed China to close the gap in missile performance with the United States. The transfers were opposed and severely criticized by the Defense Department.

Webmaster's Commentary: 

Optional Banner: 
WRH Exclusive
May 02 10:58

'Spying Billboards' Under Fire for Tapping Into People's Cellphones

A U.S. senator is calling for a federal investigation into an outdoor advertising company's latest effort to target billboard ads to specific consumers.

New York Sen. Charles Schumer has dubbed Clear Channel Outdoor Americas' so-called RADAR program "spying billboards," warning the service may violate privacy rights by tracking people's cell phone data via the ad space.

"A person's cellphone should not become a James Bond-like personal tracking device for a corporation to gather information about consumers without their consent," Schumer, a Democrat, said in a statement ahead of a planned news conference Sunday in Times Square, where the company operates billboards.

But the company, which operates more than 675,000 billboards throughout the world, argues that characterization of its program is inaccurate, insisting it only uses anonymous data collected by other companies.

Webmaster's Commentary: 

No, there has to be a unique identifier assigned to those being tracked to coordinate the ads.

Now, I personally don't have a problem with this. If I have to look at billboards anyway I prefer them to be for something I find interesting. However there are two problems. The first is that people like myself who browse subjects for news sites may build up a totally inaccurate ad profile. Second (and of more concern) people riding with you may infer things about your private life from the billboards being show to you.

May 02 09:13


Google has been given access to huge swatches of confidential patient information in the UK, raising fears yet again over how NHS managers view and handle data under their control. In an agreement uncovered by the New Scientist, Google and its DeepMind artificial intelligence wing have been granted access to current and historic patient data at three London hospitals run by the Royal Free NHS Trust, covering 1.6 million individuals.

May 02 08:41

Warning: Windows 10 updates being forced on users

Attention all computer users who have Windows 7 and Windows 8.1, you are in eminent danger from the new Microsoft policy to automatically download and install Windows 10 without your permission.

I have received numerous calls about Windows 10 just appearing on users’ computers, and none of them had requested the Windows 10 update. Many users complained that it is not clear how to use this system as many items appear to be missing, including anti-spyware programs. But, more importantly, many computers have been left with no working operating system at all!

Apparently the Windows 10 update failed for some unknown reason, and now many of those computers will not start in either Windows 7 mode or Windows 8 mode.

May 02 08:24

Google AI gains access to 1.2m confidential NHS patient records

Google has been given access to huge swatches of confidential patient information in the UK, raising fears yet again over how NHS managers view and handle data under their control.

In an agreement uncovered by the New Scientist, Google and its DeepMind artificial intelligence wing have been granted access to current and historic patient data at three London hospitals run by the Royal Free NHS Trust, covering 1.6 million individuals.

That would include any chronic illness people may be suffering from and the circumstances over why they were admitted – for example, if they have suffered a drug overdose. The agreement provides Google with access to data going back five years and is far more expansive than expected.

May 01 16:15

Hillary Clinton private email server problems split opinions

With Tuesday’s Indiana primary expected to all but confirm Hillary Clinton as the Democratic nominee for president, a Federal Bureau of Investigation probe into the private email server she set up at her home remains one of the biggest clouds on her horizon.

May 01 10:57

Five of six F-35 fighter jets were unable to take off during testing because of software glitches but the Air Force still plans to declare the aircraft combat-ready this year

Out of the six Air Force F-35 fighter jets, only one was able to successfully take off during a recent exercise that left the other five grounded due to 'immature systems and software'.

The F-35s, which are the world's most sophisticated and most expensive warplanes, were being tested for readiness but only one of the $100 million Lockheed Martin planes was able to boot its software and get itself airborne, according to Flight Global.

May 01 10:21

Don’t be fooled, says Sanders’ wife, he cares about the damn emails

Editors note : Bernie Sanders could have went after her for this since DAY 1. Why did he not? Why play nice!? You have proof that she is irresponsible at worst, incompetent at best — and guilty of treason as an option to simply float around! Did she already have dirt on Bernie? Maybe his plane started getting toyed with… ? He could have ended Clinton by attacking this issue early and often ; what was the trade off? Being her VP because the fix was already in? Not being another Clinton body count total?

Apr 30 08:35

FBI bought $1m iPhone 5C hack, but doesn't know how it works

The FBI doesn’t know how the hack used to unlock the San Bernardino shooter’s iPhone 5C works, and yet it paid in the region of $1m for the mechanism, which can used again to unlock any other iPhone 5C running iOS 9, according to reports.

Apr 30 07:39

US govt quietly tweaks rules to let cops, Feds hack computers anywhere, anytime

On Thursday the US Supreme Court approved a change to Rule 41 of the Federal Rules of Criminal Procedure. It sounds innocuous, but the effects will be felt around the world. Under today's rules, US cops and FBI agents need to know where a computer is before they can get a warrant to directly hack the machine – because they have to ensure the judge and court they approach for the warrant has geographical jurisdiction over the physical location of the computer. In other words, a district judge can't issue a search warrant against someone outside her district

Apr 30 00:32

28 percent of people say they don't trust Facebook at all

Technically Incorrect: In a new poll, people merrily admit to giving Facebook their data while in the same breath saying they don't trust the site.

Apr 29 12:17


In Oregon, these toxic ingredients combined to produce racist, illegal surveillance of a government employee’s First Amendment protected speech. Specifically, a police intelligence officer assigned to the local “fusion center” compiled a report on the Director of the state Department of Justice’s Civil Rights division’s tweets, warning his superiors that the civil rights Director’s commentary about police violence against Black Americans constituted threats to law enforcement. The memo describing these tweets was ultimately passed to the Attorney General, who immediately called for its author to be put on leave and commissioned an independent investigation. The results of that investigation were published in an April 6, 2016 report. The remarkable document shines a light into a place most Americans don’t have access to, but which has an outsized influence in 21st century American life: the shadowy local surveillance infrastructure established in the wake of the 9/11 attacks.

Apr 29 09:09

Supreme Court Gives FBI More Hacking Power

The Supreme Court on Thursday approved changes that would make it easier for the FBI to hack into computers, many of them belonging to victims of cybercrime. The changes will take immediate affect in December, unless Congress adopts competing legislation.

Apr 29 07:35

Billionaire investor Carl Icahn sells entire stake in Apple

Carl Icahn, the billionaire activist investor who has long been one of the most prominent voices declaring the company to be undervalued, says he has sold his entire stake in the technology firm, citing the risk of China’s influence on the stock.

After years of high growth, reaching triple-digit percentage points in 2015, Apple now sells more in China than it does in the whole of Europe. But sales in the country are now shrinking, with revenue dropping 26% year-on-year in the company’s latest quarterly earnings.

Apr 28 19:03

Peter Van Buren on Hillary's Emails

Please consider a dollar a month on Patreon
Peter Van Buren and Ry discuss Hillary Clinton’s private server e-mail and darker potential threat they pose.
The excuses Hillary has made do not hold up. The defenses of ignorance, of over classification, or unmarked documents, or classified and “classified” all fall apart. What she did was dangerous and of poor judgment which could have already created great damage to the United States and could be sitting as prime blackmail should she become the next president. Peter Van Buren is a 24-year veteran of the U.S. Department of State who has blown the whistle on their mismanagement and waste in regards to rebuilding Iraq.

Apr 28 16:43

Former Tor Developer Makes Malware For FBI

A developer of the Tor software has been exposed for creating malware for the FBI to help the agency spy on users of the supposedly anonymous tool for internet browsing and communication.

Matt Edman, a cybersecurity expert who worked for the nonprofit privacy project in 2008 and 2009, “contributed significantly to Tor’s codebase” before creating software for the FBI, according to Daily Dot.

Apr 28 15:44

So Much For The Fifth Amendment: Man Jailed For Seven Months For Not Turning Over Password

A Philadelphia man suspected of possessing child pornography has been in jail for seven months and counting after being found in contempt of a court order demanding that he decrypt two password-protected hard drives.

The suspect, a former Philadelphia Police Department sergeant, has not been charged with any child porn crimes. Instead, he remains indefinitely imprisoned in Philadelphia's Federal Detention Center for refusing to unlock two drives encrypted with Apple's FileVault software in a case that once again highlights the extent to which the authorities are going to crack encrypted devices. The man is to remain jailed "until such time that he fully complies" with the decryption order.

Apr 28 14:32

Gov’t Study Finds the More Time Young Adults Spend on Facebook and Twitter, the More Depressed They’ll Get

While everyone acts like they are “connecting” with each other because they hit a “like” button on a picture of their friend’s cat, the real truth is we are more disconnected than ever as a society and it is getting worse by the day. When virtual reality gets here, forget about it. We’ll all be living in the movie Surrogates with Bruce Willis or something.

Meanwhile, the headline for this story just sounds like a good way for Big Pharma to rack up more antidepressant customers, no?
(read more)

Apr 28 12:08

Ex-CEO Says $15 Wage “Will Trigger Massive Layoffs”: McDonald’s Will Replace Jobs with Kiosks

The future of fast food service will involve much less human interaction.

Labor organizers have been demanding an increase in wages… Rather than raise prices, McDonalds is more likely to replace people with self-service computer kiosks so they do not have to pay the high wage. […] Over a million American youths may otherwise be out of a job.


Apr 28 10:19


According to the American Trucking Association, there are some 3.5 million truck drivers in the United States alone.

That’s 3.5 million people who may lose their jobs once driverless trucks hit the roads in full force… which appears to be in the not-too-distant future.

Tech Crunch reports that a convoy of these trucks recently drove across Europe and arrived without incident at their destination at the Port of Rotterdam for 75% cheaper than it would have cost had human beings been driving them:

Webmaster's Commentary: 

Apr 28 09:44


Was Clinton negligent? Did she receive classified informtation? Did she send classified information? Yes, yes and yes!

Apr 28 09:25

Microsoft's Windows 10 nagware storms live TV weather forecast

Microsoft's relentless Windows 10 nagware has interrupted a live TV weather forecast, urging meteorologist Metinka Slater to upgrade.

Apr 28 09:14


Bloomberg Editor-in-Chief John Micklethwait told his 2,400 journalists in a memo on Tuesday that he was forming a 10-person team to lead a study on how to use more automation in writing and reporting. Micklethwait called the robot-generated copy “smart automated content (SAC).” A company spokesman insisted no journalists will be sacked as a result of the SAC.

Apr 28 09:12

SNOWDEN - Official Trailer

Academy Award®-winning director Oliver Stone, who brought Platoon, Born on the Fourth of July, Wall Street and JFK to the big screen, tackles the most important and fascinating true story of the 21st century. Snowden, the politically-charged, pulse-pounding thriller starring Joseph Gordon-Levitt and Shailene Woodley, reveals the incredible untold personal story of Edward Snowden, the polarizing figure who exposed shocking illegal surveillance activities by the NSA and became one of the most wanted men in the world.

He is considered a hero by some, and a traitor by others. No matter which you believe, the epic story of why he did it, who he left behind, and how he pulled it off makes for one of the most compelling films of the year.

(Note: Hmmmm . . . I wonder what won't be shown i.e. the direct NSA pipeline to Israel, maybe?)

Apr 28 07:04

Qatar National Bank allegedly hacked, data of 1,200 entities leaked

The data breach includes the personal bank accounts and passwords for Al Jazeera employees and members of the ruling al-Thani family

Apr 28 06:19

Facebook censors pro-Trump and negative Hillary news

By definition, Free Speech IS political. For reasons that only a hard core Hillary sycophant could understand, the mere posting or sharing of online reports on the 2016 Election Race is now blocked. Such a Facebook policy to disrupt political content

Apr 27 15:21

CIA-Backed Artificial Intelligence Firm To Spy on Wall Street Traders

By Jake Anderson

Swiss multinational bank, Credit Suisse, will collaborate with data analysis firm, Palantir, to launch a trader surveillance program. According to Bloomberg’s Jeffrey Voegeli, the joint venture, called Signac, aims to catch rogue Wall Streeters engaged in illegal trading. It comes in the wake of a number of trading scandals in recent years that have cost banks billions of dollars.

Palantir was co-founded by Peter Thiel and seed-funded by the CIA. The company was funded in part by In-Q-Tel Inc., the venture capital investment arm of the CIA that has a long, symbiotic history with startups, the NSA, the FBI, and DARPA...

Apr 27 13:30

Male Employee Found Dead at Apple’s Cupertino Headquarters: Sheriff

The county coroner is now in charge of the investigation and will release more information once it is completed. Urena would not comment on whether a weapon was involved or if the death was suicide or natural.

Apr 27 13:00

WhatsApp: Critics Claim EU ‘Remain’ Campaign Using App To Avoid FoI Requests

Critics of the EU ‘Remain’ campaign claim that WhatsApp is being used to organize strategy and tactics because it cannot be subject to Freedom of Information (FoI) requests.

Denials have been issued to the Sun newspaper from the spokesman representing prominent Remain campaigners including Business Minister Sajid Javid, Work and Pensions Secretary Stephen Crabb and Education Minister Nicky Morgan.

Apr 27 12:54

People Too Afraid To Search Privacy-Sensitive Topics After Snowden Revelations – Oxford Study

NSA whistleblower Edward Snowden’s revelations on government mass surveillance have apparently scared a significant number of people away from searching for terrorism-related information on Wikipedia, as a new study shows readers are afraid of being investigated.

Apr 27 12:11

Killer Merchandise: Outrage As Myra Hindley T-Shirts And IPhone Cases Sold On US Website

An American website attempting to iconize British serial killer Myra Hindley by printing her image on a line of products has been forced to remove the range following an outcry.

Apr 27 11:57

Hillary supporters accused of taking down Bernie FB pages in porn attack

Multiple Facebook pages supporting Democratic presidential candidate Bernie Sanders were abruptly removed from the social media network late last night following a cyberattack.

According to eyewitness reports, the pages were flooded with pornographic images in what appeared to be coordinated fashion and then flagged for obscene content, prompting Facebook to remove them.

Webmaster's Commentary: 

Apr 27 11:46

Spy Chief Complains That Edward Snowden Sped Up Spread of Encryption by 7 Years

THE DIRECTOR OF NATIONAL INTELLIGENCE on Monday blamed NSA whistleblower Edward Snowden for advancing the development of user-friendly, widely available strong encryption.

“As a result of the Snowden revelations, the onset of commercial encryption has accelerated by seven years,” James Clapper said during a breakfast for journalists hosted by the Christian Science Monitor.

Webmaster's Commentary: 

Maybe of the US Government had played by the rules (the Bill of Rights) none of this would have happened.

Apr 27 09:58

Fury as David Cameron's team 'plot pro-EU campaign in SECRET on WhatsApp'

DAVID Cameron's inner circle are using WhatsApp to secretly plot the Prime Minister's pro-EU campaign, it has been claimed.

Apr 27 09:29

Computer Virus Discovered In German Nuclear Power Plant

Remember when "someone" used the Stuxnet virus, or rather worm, in an Iranian nuclear plant several years ago to freeze Iranian nuclear production, leading to a major diplomatic scandal involving the spy agencies of both the US and Israel, as the world learned that in the present day industrial sabotage only needed a flash drive and a computer virus to render even the most sophisticated piece of industrial machinery obsolete? Well, moments ago, Bloomberg reported that a computer virus was discovered in a German nuclear power plant.

Apr 27 09:17

Revealed: How criminals get the 'CVV' security code on the back of your credit card - and how to make sure you don't get skimmed

A simple anti-virus program installed on your computer, laptop or smart device can stop criminals from stealing the CVV number on the back of your card.

Fraudsters can easily purchase credit card details at online cybercrime stores called 'CVV shops' for a low cost between US$2 and US$5, The Age reported.

Each bundle includes a name, credit card number, expiration date, a CVV number and a postcode.

Webmaster's Commentary: 

And the NSA/FBI/CIA can't seem to find these crooks.

Or ...

The NSA/FBI/CIA are the crooks!

We live in a nation where the uniformed police are stealing more from the people than the robbers, muggers, and burglars combined. They stole $56,000 from an orphanage only a week ago!

Is it hard to imagine a desperately broke and in debt government pillaging their own people through computers?

Apr 27 09:10

Riot control robot that looks like a DALEK gives protesters electric shocks if they step out of line

You have ten seconds to comply, or you're in for a shock.

Rolling straight out of a dystopian future where robots keep humans in check, a Chinese university has developed a riot control machine to keep the peace.

The robot, which resembles one of Dr Who's infamous Daleks, can keep rioters in check with a nifty electric shock and could enable people to call for help or press an SOS button to call for police.

Webmaster's Commentary: 

I'll bet the US Government is going to be ordering thousands of these things.

Apr 27 08:51

Intel community doing damage assessments on Clinton e-mails

Apr 27 08:46

People too afraid to search privacy-sensitive topics after Snowden revelations – Oxford study

NSA whistleblower Edward Snowden's revelations on government mass surveillance have apparently scared a significant number of people away from searching for terrorism-related information on Wikipedia, as a new study shows readers are afraid of being investigated.

The conclusions come as the online encyclopedia giant showed a 30-percent drop in searches on terrorism-related topics – the most direct evidence yet of something called the "chilling effect," described by University of Oxford and Toronto’s Jonathon Penney as the measure of the negative impact on legal conduct that arises out of the leaks by the former NSA contractor who exposed the PRISM program.

(Note this article is unsourced with no by-line)

Apr 27 08:40

FBI May Keep Vulnerability It Used To Access IPhone Under Wraps

The FBI is analyzing the security flaw that allowed it to unlock the iPhone used by one of the San Bernardino terrorists in order to assess whether the method should be disclosed to Apple and the public, agency chief James Comey said.

Apr 27 08:39

7 million users affected by Minecraft community Lifeboat data breach

Minecraft community fansite “Lifeboat” has admitted that it suffered a data breach in January, after security researcher Troy Hunt added some of the stolen data to his “Have I Been Pwned?” website.

Lifeboat Network runs servers that players of the smartphone version of Minecraft can connect to in order to play in different game modes (CTF, survival games, etc.). In order to do that, they have to open an account.

Hunt was given the data – usernames, hashed passwords and email addresses of over 7 million users – by a source involved in data trading who has provided him with similar information in the past.

Apr 27 08:24

Pentagon identifies cause of F-35 radar software issue

Last month the Pentagon said the software instability issue meant the sensors had to be restarted once every four hours of flying.

Kendall and Air Force Lieutenant General Christopher Bogdan, the program executive officer for the F-35, told a Senate Armed Service Committee hearing in written testimony that the cause of the problem was the timing of “software messages from the sensors to the main F-35” computer. They added that stability issues had improved to where the sensors only needed to be restarted after more than 10 hours.

Webmaster's Commentary: 

That's not a fix; that's a tweak!

Apr 27 08:09

Here's how Apple's 13-year growth streak came to an end

While all eyes are on iPhone sales, it's the state of Apple's safety net that should have investors worried.

Webmaster's Commentary: 

Apple has announced plans to diversify into the military market! :)

Apr 27 08:05

What do you call an old, unpatched and easily hacked PC? An ATM

Almost any cash machine in the world could be illegally accessed and jackpotted1 with or without the help of malware.

Security researchers at Kaspersky Lab reached this conclusion after investigating real attacks on ATMs and assessments of the machines carried out for several international banks.

The susceptibility of ATMs in particular is due to the widespread use of outdated and insecure software, mistakes in network configuration, and a lack of physical security for critical components of ATMs.

Apr 27 08:04

Game of P0wns: Malvertising menace strikes Pirate Bay season six downloads

Scores of Game of Thrones pirates may have had computers encrypted by ransomware after malvertisers served the dangerous malware through the Pirate Bay during the mega-series' season six première last weekend.

MalwareBytes researcher Jerome Segura says the hard-working Magnitude exploit kit authors were able to target pirates after they bought advertising space on the infamous Bittorrent website targeting users with pop-under ads.

Apr 27 08:04

Kaspersky cracks CryptXXX, throws lifeline to ransomware victims

The ransomware encrypts files both on the victim's PC and on attached storage. Kaspersky notes there's a short delay applied to the external storage encryption “to confuse victims and make it harder to detect which websites spread the malware”.

The attackers also steal Bitcoins recorded on victims' hard drives, and copies other data back to base. Victims are told – via a Web page, an image dropped in as the user's desktop, and in a text file in case everything else fails – to download the Tor browser and navigate to an Onion site to get recovery instructions.

Although CryptXXX uses RSA4096, Snow writes it wasn' that hard to crack, and it's added decryption to its RannohDecryptor tool here.

Apr 27 07:51

McAfee: If FBI Gets Backdoor To People’s Phones, US Society Will Collapse

They said that the war never changes – but what if it does? The introduction of digital technologies, the cyberspace of the World Wide Web has introduced new battlefields. How far will this fight go? Who has the upper hand? And can battles in virtual reality claim real lives?

Apr 26 15:19

Spotify denies hacking after user details were leaked

Spotify has denied it was hacked after users details, including passwords and user names, were posted online.

Hundreds of account details, including the country where the account was registered, the type of account, and when it was due to auto-renew were uploaded to website Pastebin in what appears to be a security breach.

However, Spotify maintained it had not been unlawfully accessed, and that it closely monitored websites like Pastebin to check for such breaches.

Apr 26 14:23


Apple Inc. posted its first quarterly revenue drop in more than a decade and forecast another decline in the current period, dragged down by waning demand for the iPhone. Shares fell as much as 5.4 percent in extended trading. Sales in the third quarter, which ends in June, will be $41 billion to $43 billion, the Cupertino, California-based company said Tuesday in a statement. On average, analysts estimated revenue of $47.4 billion, according to a Bloomberg survey. Second-quarter sales slid 13 percent and IPhone shipments fell 16 percent.

Apr 26 12:17


A convoy of self-driving trucks recently drove across Europe and arrived at the Port of Rotterdam. No technology will automate away more jobs — or drive more economic efficiency — than the driverless truck. Shipping a full truckload from L.A. to New York costs around $4,500 today, with labor representing 75 percent of that cost. But those labor savings aren’t the only gains to be had from the adoption of driverless trucks.

Apr 26 11:53

ISIS-Aligned Hackers Leak Confidential Info On 43 US State Dept Employees

The Islamic State-aligned United Cyber Caliphate claims to have hacked into US State Department records, releasing online information on 43 employees it wants dead. The leak also includes staff with Homeland Security and other agencies, media reported.

Apr 26 10:54

Bank-hacking malware discovery leaves 11,000 global financial institutions on high alert

Over ten thousand banks and financial institutions are being urged to remain vigilant after the secure Swift (Society for Worldwide Interbank Financial Telecommunication) system – used to send messages between global firms – was reportedly compromised by the sophisticated hacking scheme that targeted the Bangladesh central bank in March 2016.

Webmaster's Commentary: 

Isn't the NSA supposed to prevent this sort of thing? Or are they too busy spying on law-abiding Americans to bother with trivial things like real crimes?

Apr 26 10:14

Censored, Surveilled, Watch Listed and Jailed: The Absurdity of Being a Citizen in the American Police State

snip: While this may sound like a riff on a bad joke, it’s a bad joke with “we the people” as the punchline. Yet it is no laughing matter that Americans are being jailed for growing orchids, feeding whales, collecting rainwater, and praying in their backyards. There is nothing humorous about Americans having their families terrorized by SWAT teams, their pets killed, their children shot, their homes trashed and their privacy shredded. And there’s really not much comic relief to be found when the citizenry is forced to pay their own government to jail, spy on, censor, terrorize and kill them.

Apr 26 10:13

"Package has been delivered" email? Be on guard for a scam

"Ransomware" is a nightmare for consumers but positively lucrative for scammers, which is why the pace of new attacks is speeding up.

The latest twist on ransomware is particularly audacious, with scammers using a spam campaign to reach as many consumers as possible with an enticing email come-on: "Your package has been delivered," according to new research from computer security firm Endgame.

If a consumer opens the attached file to find out more -- some people may think it refers to their tax returns, for instance -- the ransomware is unleashed.

Webmaster's Commentary: 

And the NSA/CIA/FBI can;t do a thing to stop these clowns.

Unless the ransomware is coming form the NSA/CIA/FBI.

I mean, in a nation where the cops steal $56,000 from an orphanage, is it really so hard to accept a broke government pillaging its own people through their computers?

Apr 26 09:38

Watch as U.S. border fence gets breached using a simple car jack

The builders of the existing and rather spotty U.S. border fence, which separates Arizona from Mexico, should be ashamed of themselves.

Apr 26 09:29


Federal regulators gave the green light to Charter Communications’ proposed $78 billion mega-merger with Time Warner Cable on Monday, paving the way for a new broadband industry giant with 24 million customers in 41 states. The deal, in which Charter would also absorb smaller rival Brighthouse Networks for $10.4 billion, has been fiercely opposed by public interest groups that call it just the latest example of a decades-long pattern of runaway consolidation in the telecommunications industry. Together, the new Charter and industry leader Comcast would become the nation’s two dominant broadband providers, controlling nearly two-thirds of the high-speed broadband market.

Apr 26 09:12

For your eyes only: Amazon won't sell you the new James Bond film Spectre on DVD unless you sign up to its £79-a-year Prime service

Upset customer, Bradley Kerr, from Birkenhead, said: 'What's with items starting to appear for sale as 'Prime Exclusive'?

'It's utter nonsense to need an £80 subscription to simply buy stuff from Amazon.

'Amazon Prime should provide perks to Prime members, not lock out non-members from basic services.'

'Don't you guys earn enough money without forcing people to join Prime?'

Amazon bosses have also given the 'exclusively for Prime Members' badge to a selection of Barbie toys and other video games.

Apr 26 08:40

Judge Warns Of CHAOS If Hillary Is NOT Indicted

While America anxiously awaits the FBI’s results in the investigation into Hillary Clinton’s handling of classified information – wondering if she will ever face criminal charges – one man is explaining what will happen should she not be indicted.

And it still doesn’t look good for the former Secretary of State.

Judge Andrew Napolitano, who recently stated that “the evidence of her (Hillary’s) guilt is overwhelming,” claims that if she isn’t held accountable for her crimes, it would still be “catastrophic” for her candidacy.

How catastrophic?

Napolitano believes “she will be replaced on the Democratic ticket.”

Webmaster's Commentary: 

The Judge underestimates Hillary. The word is that she has sent out a warning that if she is not made President, she will blow the whistle on all the dead bodies and how they got to be dead bodies, and bring down the whole government.

Apr 26 08:25

F-35's dodgy software in the spotlight again

America's toothless Tiger Moth, the F?35, has copped another backhander from US government auditors: the US Government Accountability Office reckons its logistics software isn't ready for battlefield deployment.

The GAO also warns that the US$16.7bn Autonomic Logistics Information System (ALIS) could, instead, swallow anything between $20 and $100bn.

Those warnings are contained in a report (PDF) titled DoD Needs a Plan to Address Risks Related to Its Central Logistics System.

The GAO is also concerned that the DoD's management of ALIS is so ad-hoc that the "full scale production" due-date of 2019 might not be met.

Apr 26 08:24

Facebook's own TLS cert used by crooks in double logon phish

The phish uses an iframe to serve a Facebook verification form, but that form isn't from The Social NetworkTM. Instead, the form comes from an external Hostgator site that uses HTTPS and Facebook's certificate.

That combination means browsers don't warn users of the impending danger.

Once users log in from the form in the iframe form, a second fake login form appears claiming that the details into the first fake form were incorrect. Users are prompted to log in again.

A login successful page appears after the user has submitted their details for the second time claiming that the victim will receive a verification approval email within the next 24 hours.

Apr 26 08:19

Ted Cruz knows where you live – if you downloaded his app

US presidential primary apps leak supporters' phone data

Apr 26 07:59

Computerized predictive policing models, much like credit reports, have already issued your ‘threat level’

Whether you like it or not, police departments across the country have been accessing a special data base which contains a plethora of personal information on you and the rest of th

Apr 26 05:00


Russia’s electronic warfare equipment producer launched tests of a tactical electromagnetic combat complex fully integrated with latest air-defense systems. It guarantees complete neutralization of all enemy electronics. Factory testing is underway for components of the new system, capable of protecting troops and civilian facilities from air and space attacks, a representative of Russia’s leading producer of electronic warfare systems, Radio-Electronic Technologies Concern (KRET), told TASS. The tests are expected to be completed by the end of 2016.

Apr 25 18:23

Spy chief appalled that Americans don’t want government snooping through correspondence

Over the past couple years, America’s digital communications companies have made great progress in developing technologies designed to keep customers’ private communications safe from the prying eyes of snoops and identity thieves. National Intelligence chief James Clapper said Monday the new security developments are “not a good thing.”

Apr 25 18:09

Anonymous Group Shuts Down KKK Website

Those trying to access the White Knights of the KKK website are out of luck following a Denial of Service (DDoS) attack on their servers launched by hacktivist group Anonymous, leaving its fans in the dark.

Apr 25 17:01

Police Caught Spying on Social Media to Track Anyone Who Talks About Flint Water Crisis

By Claire Bernish

After needlessly contaminating Flint’s water supply with lead, a new report reveals the government now monitors social media for hints subversive communications relating to the Flint Water Crisis...

Apr 25 15:31

'Elite' dating site is hacked: Experts warn everything from sexual preferences to income of 1.1 million members has been sold online

The controversial site,, was hacked in November and details including sexual preferences, income, addresses and 15 million messages between users were stolen.

Now it has been claimed by Forbes the data has been sold online to a mystery buyer.

Apr 25 12:41

FLASHBACK - Why Was Hillary Clinton Transferring Secret Historical State Department Documents To Her Private Server?…

Why was Hillary Clinton transferring/extracting data from secure, and monitored, classified State Department data bases, into her non-secure private email server?

What else was data-mined and extracted from government accounts, that could/would be discovered with a thorough forensics investigation into the private server?

She wasn’t just reading them, she was extracting them. Why would she be doing this, if not to build a shadow file for use at a later date?

Apr 25 12:14

Do Hillary Clinton’s Emails Expose A Scheme To Trade US Secrets For Political Influence?

Back in August, I wrote a post titled The real email question: Did Hillary Clinton sell US secrets? As much as I loathe Hillary, this was a very serious question based on the facts that we know. The IG representing the 17 US intelligence agencies identified two emails residing on Hillary Clinton’s private, unsecure email server as being properly classified as TS\TK, that is, the were classified Top Secret and compartmentalized under the code words Talent Keyhole which indicates that it is imagery deriving from a KH-11 reconnaissance satellite. If the emails had merely contained a description of the satellite imagery, even if the subject were classified, there is no way a reader could ascertain if the imagery came from a KH-11 or a drone or a manned flight or an on the ground agent. This implies that the emails contained the actual imagery (with no security markings, we’ve heard of that before).

Apr 25 12:13

The real email question: Did Hillary Clinton sell US secrets?

While the media is focusing your attention on the shiny object that is her email server, the real story is not being told. The circumstantial evidence indicates that Hillary Clinton, or members of her inner circle with her connivance, purloined highly classified US intelligence and either sold it, traded it, or used it for personal gain. This is not a conspiracy theory and it is not hyperbole. Stick with me for a moment.

Apr 25 12:05


Hillary Clinton-aligned Super PAC, Correct the Record, is taking a page out of Vladimir Putin’s playbook by employing a $1 million dollar professional internet troll army to build a paid, positive consensus about the Clinton campaign. The effort, called “Breaking Barriers 2016,” claims: “While Hillary Clinton fights to break down barriers and bring America together, the Barrier Breakers 2016 digital task force will serve as a resource for supporters looking for positive content and push-back to share with their online progressive communities, as well as thanking prominent supporters and committed superdelegates on social media.

Apr 25 07:38

Websites that reject ad-blocker readers don't deserve your clicks

Anti-ad blocker sites put reader security at risk, and fall foul of privacy laws.

Apr 25 07:01

This is what it’s like to become a target of the FBI’s illegal cyber-harassment program

The following is a list of what I have been subject to (only on a cyber-level) as an alleged “Domestic Threat” or alleged “Domestic Terrorist” after my return to the United States after studying abroad for several years.

Apr 25 07:01

'No password' database error exposes info on 93 million Mexican voters

Voter records were exposed as the result of a config error in a MongoDB database that meant that the information was left accessible by anyone who knew where to look. The database – hosted on Amazon AWS – included voters' names, addresses, voter ID numbers, dates of birth, parents’ names, occupations and more.

Apr 25 00:53

WPS Office 2016 - Free download and software reviews - CNET

WPS Office is CNET and PCWorld's "Best Microsoft Office alternative" and one of the world's most popular office suites for Windows,...

Apr 24 14:58

Intel To Lay Off 12,000 People

Intel to lay off 12,000 people. Is the iconic chipmaker in trouble?
The technology pioneer announced a new focus that shifts its business further away from its legacy in personal computers to the fast growing cloud and 'Internet of Things' industries.

As it navigates its path into the future, Intel, the 47-year-old corporation best known for making microprocessor chips that power personal computers, has announced significant changes to its business.

On Tuesday, Intel’s CEO Brian Krzanich said in a letter to employees that the company over the next year will cut its 107,300-person global workforce by 12,000 people, or 11 percent.

The move, said Mr. Krzanich, is meant to help transform Intel from a PC company to one that powers the cloud and the ‘Internet of Things,’ a term used to describe connected devices such as washing machines, coffeemakers, and automobiles. It also will save the chipmaker $750 million this year, says Intel in a public announcement.

Apr 24 09:25

University of Florida Holds First Brain-Powered Drone Race

The brain drone race is the first of its kind, according to Juan Gilbert, a professor of computer science at the University of Florida where the competition took place. The race works by fitting pilots with a Brain Computer Interface device, which sits on users’ heads and measures electrical signals from the brain. Users “think forward,” to move the drone forward, and “think right or left” to move it from side to side.

Apr 23 19:16

SpyEye Trojan Creators Sentenced to 15, 9 Years in Jail, Respectively

The dreaded SpyEye trojan creators were sentenced to long prison term by a US court, the US Department of Justice has announced. A judge sentenced two hackers involved in the creation, maintenance, and marketing of the SpyEye financial botnet to a combined sentence of 24 years in prison.


Apr 23 15:23

China Unveils “Anti-Riot” Security Robot That Will Patrol Public Places

China's first robot security guard debuted on Friday at the ongoing China Chongqing Hi-Tech Fair. The 1.49-meter-tall, 78-kg "AnBot" has a maximum speed of 18 km per hour. It can patrol at a speed of 1 km per hour and has battery capacity of 8 hours. The security robot is capable of autonomous patrol, intelligent monitoring, emergency calls, auto recharging and has optional modules for environmental monitoring, biochemical detection and clearing explosives.

Apr 23 11:30

The web is DOOM'd: Average page now as big as id's DOS classic

BFG? More like BFHTTP, amiright?

Apr 23 10:21

Hackers steal $81 million from a bank that had no firewall

Hackers managed to steal about $81 million from Bangladesh Bank thanks to the bank’s use of $10 network switches and a complete lack of firewalls, Reuters reported. It is one of the largest amounts stolen from a bank at once in history.

Apr 23 10:15

Personal info of 93.4 million Mexicans exposed on Amazon

In today’s installment of “Epic Infosecurity #FAIL,” more than 93.4 million Mexican citizens have had their voter registration details exposed online due to a misconfigured database. Why a database with Mexican voters’ information was hosted on a server outside of Mexico, who uploaded it to Amazon, and why it wasn’t properly secured are questions in search of answers.

Apr 23 09:25

Clinton IT staffer refuses to testify after immunity deal

The former State Department staffer who set up a private server in Hillary Clinton's basement is refusing to testify before Congress in spite of his immunity deal.

Apr 23 09:14

Transforming Our Communities Ourselves With Technology

By Brian Berletic

Many people may mistakenly believe that the future is something that others, like big companies or governments usher in and that they themselves play either a minor active role, or one that is entirely passive. In reality, there are already groups of regular people just like you or me around the world literally building the future of their communities themselves with their own two hands and in collaboration with their friends, family, neighbors, and through the power of the Internet, with like-minded individuals around the world...

Apr 23 08:53

Profit sharing conflict exposed illegal internet: report

A dispute between employees at the state-owned telecommunications company Ogero and the operators of an illegal internet company in Lebanon is what led to the exposure of the recent scandal, a report said Saturday.

Apr 23 08:37

Reserving the Right to Refuse Service, Silicon Valley Sells Tech Abroad

According to Defense One, at least three Silicon Valley companies have turned away from US military contracts in favor of foreign buyers. American tech companies cite unreasonable demands, including overly long decision-making cycles, and a rapacious hunger by the Defense Department for the blueprints and schematics of proprietary technology.

Apr 22 16:13

Hillary PAC Spending $1m To ‘Forcefully Correct’ Social Media Trolls

A pro-Hillary Clinton Super Pac is spending serious money to tackle negative Clinton comments across social media.

Apr 22 12:53

Good Chance Spies Are Hoovering Up Your Personal Data In Bulk, Documents Show

British security services “routinely” collect personal data on bulk from thousands of public and private organizations, including confidential medical and financial records, newly-disclosed documents show.

Apr 22 12:40


The EU plans to create a single access point for the authorities to look at people's personal data, including fingerprints and facial scans, by linking up to a dozen border and law enforcement databases, interior ministers said on Thursday (21 April). The announcement follows the adoption of a controversial law to collect flight data information of everyone flying into and out of Europe as part of a larger pan-national bid to crack down on potential terrorists and other criminal suspects. “Our data systems must be complementary, searchable, interoperable, and interconnected with one single click,” EU commissioner for home affairs Dimitris Avramopoulos told reporters in Luxembourg, where EU interior ministers are meeting.

Apr 22 11:12

“We Are Slaves to Technology. Here’s What To Do If You Want to Break Free”

If you could pluck any of your ancestors from any period of time in history, and send them to the world we live in now, they would be in for quite a shock. All of the technology that we have at our disposal would seem like magic to them.

But... they would see a society full of people who are completely out of touch with nature, and completely helpless without all of their gadgets.


Apr 22 09:42

Hillary Clinton's Super PAC Spends $1 Million on Online Trolls

“Correct the Record” is a pro-Clinton super PAC founded and run by a man named David Brock—a former conservative hit man whose greatest hits include the vicious defaming of sexual assault victim Anita Hill when she threatened to subvert the Supreme Court appointment of conservative justice Clarence Thomas.

Webmaster's Commentary: 

Let's all make sure Hillary gets her money's worth! Please share all the articles about Hillary (and Cruz) from this website to all your social media and friends! :)

Apr 22 09:28

FBI head: No timetable for completing Clinton email probe

FBI Director James Comey says there's no timetable for the FBI to complete its investigation into Hillary Clinton's use of a private email server when she was secretary of state.

Webmaster's Commentary: 

So, they are simply going to delay things until after the election, like they did with Nixon (and look how that turned out). Comey may be opening himself up to a charge of misprision of espionage!

Apr 22 08:30

Hillary PAC Spends $1 Million to ‘Correct’ Commenters on Reddit and Facebook

FEC loopholes mean Correct the Record can openly coordinate with Clinton’s campaign.

Webmaster addition: These must be the people flooding my Facebook posts with "YOU HATE WOMEN! YOU HATE WOMEN! YOU HATE WOMEN! YOU HATE WOMEN! YOU HATE WOMEN! YOU HATE WOMEN! YOU HATE WOMEN!!!!!!!"

Apr 22 08:24

Win XP, Flash, Java... healthcare makes easy pickings for hackers

The healthcare industry is a long way behind the financial sector in basic security practices, according to a study by two factor authentication firm Duo Security.

Duo found that healthcare devices were significantly more out of date and less secure than ones from finance, after comparing its healthcare customers' devices to its finance customers' equipment.

Healthcare has a four times greater density of Windows XP computers compared to finance. Windows XP has been unsupported by Microsoft since 2014 and unsupported OSes do not receive any software patches or updates, making them an easy target for attackers.

Apr 21 22:58

Build A Storable Food Supply Without Breaking the Bank: “All About Self-Reliance”

You don’t necessarily have to pull out your wallet, and pay big bucks for storable food, emergency camping equipment, ammo and fatigues… though you can if you want.

Here are some good basics... because it isn't always time to go full commando on your preps.


Apr 21 16:45

Why is the Federal Government Installing Mysterious Boxes on Utility Poles?

By Derrick Broze

The Bureau of Alcohol, Tobacco and Firearms and Explosives has claimed ownership of a mysterious box that was removed from a utility pole in Phoenix, Arizona.

Phoenix resident Brian Clegg was concerned about a box he witnessed being installed on a power pole. Clegg said the box was facing his house and he believed it may have had cameras inside. The pole was owned by Arizona’s largest power provider, SRP, who claimed no one had permission to put the box on their pole. Brian Clegg says shortly afterwards SRP sent a crew to remove the box.

Shortly after ABC15 investigated the matter, the bureau of Alcohol, Tobacco and Firearms and Explosives(ATF), a branch of the U.S. Department of Justice, acknowledged installing the box as part of an ongoing investigation. Officials with the ATF would not provide details about their alleged investigation and would not confirm if they were conducting surveillance in the area...

Apr 21 15:44

Opera browser bakes in free VPN

Touts access to blocked sites and services, anonymous browsing

Opera Software today released a developer preview of its namesake browser that includes a full-featured VPN (virtual private network) client and free access to the service.

"We are the first major browser maker to integrate an unlimited and free VPN or virtual private network," boasted Krystian Kolondra, Opera's head of engineering, in a Thursday post to a company blog.

Apr 21 15:23

Spies' 'staggering' data requests revealed

Since 2005 successive Home Secretaries have authorised the collection of vast amounts of telecommunications data, documents reveal.

The documents also show that MI5 secretly collected large amounts of "anonymised" financial data.

Campaign group Privacy International said the documents show "the staggering extent of UK government surveillance".

Apr 21 15:18

AMLC seeks FBI help on $81-M cyber heist

The Anti-Money Laundering Council (AMLC) is seeking the help of the Federal Bureau of Investigation (FBI) in unmasking the persons behind the laundering of $81 million allegedly stolen by Chinese hackers from the account of the Bangladesh Bank in the US Federal Reserve Bank.

Julia Bacay-Abad, executive director of AMLC, admitted making the request at a hearing yesterday on the issue by the Senate Blue Ribbon committee.

“I was the one who requested assistance from the FBI,” Abad said in a reply to a query from Sen. Ralph Recto.

She also pointed out the AMLC has also sought the assistance of its counterpart in Hong Kong to check on the $20 million transferred to Hong Kong.

Apr 21 09:44

Choosing to Skip the Upgrade and Care for the Gadget You’ve Got

Many tech companies are trying to train people to constantly upgrade their gadgets — part ways with a device, the argument goes, as soon as something newer and faster comes along. Companies like Apple, AT&T and T-Mobile USA now offer early upgrade plans that allow consumers to buy a new cellphone every year. Philip W. Schiller, Apple’s senior vice president for worldwide marketing, said at a product event last month that it was “really sad” that more than 600 million computers in use today are more than five years old.

Mr. Lai’s behavior might be extreme, but his experience with the Palm Treo illustrates there is another way: If you simply put some maintenance into electronics as you would a car, you can stay happy with your gadgets for years.

Webmaster's Commentary: 

In this economy, buying a new gadget every few years just isn't practical, and Windows 10 just reminded us all that the new upgrade may be a lot worse than what you just tossed in the trash! Any corporation whose business model depends on customers constantly upgrading hardware is doomed to fail.

Apr 21 09:07

Scars Of Shame: Lewinsky Calls For Compassion For Victims Of Cyberbullying

Monica Lewinsky, the infamous intern who had an affair with then-President Bill Clinton, spoke out against cyberbullying at a technology conference in Miami on Tuesday.

“At the age of 22 I fell in love with my boss. By 24, I learned the devastating consequences of my mistake,” she said.

Webmaster addition: I think that Monica ought to stop blaming the internet and understand that the cause of all the "devastating consequences" was her deciding to have an affair with a married man! What ever happened to personal responsibility?

Apr 21 08:48

‘Islamic State, We Own You!’ Hackers Hijack Twitter Accounts Used By ISIS Propagandists

A small group of hackers has started a new offensive against Islamic State.

Apr 21 08:41

Cheaters Beware: Ashley Madison Lawsuit Will Require Real Names

A federal judge has ruled that Ashley Madison users can sue the dating website for cheaters, but only if they reveal their real names. A 2015 data breach outed many users, leaving them eager for legal recourse.

Eastern District of Missouri Judge John A. Ross, who is presiding over a class action lawsuit against Ashley Madison, handed the plaintiffs both a victory and a defeat.

Apr 21 07:54

UK spy agencies systematically amass data on innocent people, legal challenge reveals

Privacy campaign group Privacy International says documents it has obtained through a legal challenge to the UK security agencies data-harvesting practices illustrate the extent to which spies have systematically and secretly amassed a cache of data on UK citizens for the past 15 years — regardless of whether a particular individual is suspected of a crime.

Aka: mass surveillance.

Apr 21 07:53

Ex-NSA security expert develops generic Mac ransomware blocker

RansomWhere? suspends untrusted processes

Apr 20 15:35


Last month, WhatsApp, the hugely popular messaging service that Facebook owns, made end-to-end encryption the default for its 1 billion users. On Tuesday, Viber said it will do the same for the 700 million people who use it.

Although Viber is smaller than WhatsApp, the repercussions of its decision to encrypt every text message, every photo, and everything else shared on its platform could be far greater. That’s because, unlike WhatsApp, Viber is not a US company. It will not be subject to US laws written by lawmakers desperate to regulate technology they do not understand. More than anything, Viber offers a powerful example of the futility of legislating encryption.

Apr 20 15:27

HighThere, the App for Stoners, Will Broadcast Your Location to Nearby Cops Listening In

HighThere, the "Tinder for Tokers," is a stoner app for finding smoking buddies. When you first download the app and join the network, HighThere asks for your location data and your energy level when stoned, so it can match you with potential friends.

This data would be a jackpot for police if they could get their hands on it. So if you're one of HighThere's 150,000 users, you might be wondering: Is your information safe?

Mic reached out to hacking and cybersecurity firm Synack to find out. After just a few minutes, Synack concluded that HighThere's security is "student project level." Anyone with knowledge of computer science could use HighThere to find the name, photograph, smoking habits and even personal location of nearby users with ease.

Apr 20 15:25


As streaming services such as Netflix and Spotify gain even greater traction, so does the centralization of online content that consumers no longer own. According to Pirate Bay founder Peter Sunde this business model holds subscribers to ransom, with the threat of content being suddenly taken away now a constant threat.

Apr 20 15:21

Cybercrooks turn away from banks. Your health records are far juicier

Why break into Fort Knox when you can get a data treasure trove from hospital?

Apr 20 14:17

This Law would Really Leave Us Defenseless : Will the Feds Criminalize Real Encryption?

You have to admit that the US government has a pretty dismal record when it comes to computer security. In just the last year, the Office of Personnel Management (OPM) revealed that hackers had stolen the personal information of more than 20 million current and former federal government applicants and employees. The stolen data included more than six million fingerprints – considered the “gold standard” for proof of identity. If that wasn’t enough, the IRS acknowledged it also had suffered a massive data breach, with hackers stealing information of more than 300,000 taxpayers to claim more than $50 million in bogus refunds. And just a few months later, the IRS admitted that the system it used to identify taxpayers electronically had itself been hacked!

Apr 20 14:12

Orwellian Reality: Big Brother Watching You on Facebook, Twitter, Instagram

MAKE SURE YOU SHARE THIS ARTICLE! :) The US Central Intelligence Agency has become increasingly focused on monitoring social media, according to a document obtained by The Intercept; the intelligence agency is pouring money in start-ups mining tweets, Instagram photos, and Facebook posts.

Apr 20 13:16

Shock: Denver Schools To Patrol Students With Military-Style Rifles: "Certainly Ratchets Up A Notch"

Are they being protected from potential violence, or indoctrinated in a police state society where even children are under sharp suspicion, and misbehavior is criminalized?

A suburban Denver school district is arming its security staff with military-style semiautomatic rifles in case of a school shooting or other violent attack, a move that appears unprecedented even as more schools arm employees in response to mass violence elsewhere.

The guards, who are not law enforcement officers, already carry handguns.

Because Sandy Hook...


Apr 20 11:35

Machiavellian or dumb? Obama's take on Hillary Clinton's emails is hard to figure out

His efforts to minimize his former secretary of state's diversion of emails from government-secured servers to her own non-secure home server by calling it “careless” may actually harm her in the eyes of the public or even serve as a dog whistle to the FBI. That’s because carelessness is a species of negligence, and espionage, which is the failure to safeguard state secrets by removing them from their proper place of custody, is the rare federal crime that can be proved by negligence -- to be precise, gross negligence.

Gross negligence is the failure to perform a high legal duty with the great probability of an improper result -- for example, driving a car 90 miles per hour in New York's Times Square. The high legal duty Clinton had was to safeguard state secrets; the improper result is the exposure of those secrets contained in her emails.

What did she do that was criminal, and who was harmed by her behavior?

Apr 20 09:28


NSW Police have abused their power and in effect directed Facebook to take down a support page for police, former police and their families who are dealing with mental health problems such as stress, depression and to help with suicide prevention. Posts on the page were broad and allowed people with mental health issues to reach out for support while other posts gave families and friends the opportunity to pay tribute to deceased officers.

It seems the only reason that the Facebook page (The Forgotten 300) was taken down is that a few posts criticized some serving officers and other posts were critical of the lack of support within the police force for officers and former officers suffering mental health issues.

The police have admitted that they had Facebook take down the page (18th March 2016) yet there was no allegation that any crime had been committed or anyone had been defamed. There was no legal basis given to have the page taken down so one has to assume there is none.

Apr 20 09:09

DOJ faces legal fight with EFF over US govt ‘secret’ surveillance requests

A digital rights group is suing the US Justice Department over secret court orders it suspects are being used to force tech companies to unlock devices. The lawsuit asks the [Foreign] Intelligence Surveillance Court for a disclosure of all such requests.

The Electronic Frontier Foundation (EFF) insists that the US government has been “increasing pressure on companies” to either gain access to encrypted private communications or receive assistance that would help it do so.

Webmaster's Commentary: 

Which confirms that the NSA cannot break any codes, but relies on back doors.

Apr 20 07:29

Snafu! BT funnels all customers' sent email into one poor sod's inbox

Telco blames testing mishap

Apr 20 07:29

Saw-inspired horror slowly deletes your PC's files as you scramble to pay the ransom

A new strain of ransomware is adding psychological tactics to its code to try and extort money faster, borrowing from cult horror film franchise Saw.

The Windows malware, dubbed BitcoinBlackmailer.exe or JIGSAW, follows the usual practice of encrypting the victim's files, and adding a .FUN extension for giggles. A popup screen bearing the face of Saw character Billy the Puppet then starts to make demands.

The screen displays a countdown timer and the victim is asked for $20 in Bitcoin to unencrypt the files. But as the hours tick by, the malware will begin to delete files – first only a few, but the number will rise, as will the ransom needed to unencrypt them.

After 72 hours, all of the files on the target computer will be deleted, and the ransom will have risen to $150-worth of Bitcoins.