COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED

COMPUTERS/INTERNET/SECURITY

Mar 09 09:32

Vimeo Censors my Interview, In Which Catherine Austin Fitts and I Discuss Coronavirus and Vaccines

By Jon Rappoport

To boil it down: a video was posted, then it was censored. Removed. Deleted. By Vimeo. On March 4. Bang.

Why? Because you’re not supposed to know what was discussed in the video.

It might give you a wrong idea.

You might infer something you shouldn’t. You can’t handle making up your own mind. You have to feed at the official and approved public trough for truth. Truth is defined for you by those in charge of Knowing. You’re a pawn who must be controlled, for your own good. That’s why Vimeo took down the video...

Mar 09 09:10

Unfixable flaw in nearly all Intel chips released in the last five years could allow cyber criminals to hijack computers and wreak 'utter chaos'

An unfixable flaw present in nearly all Intel chips released in the last five years could allow cyber criminals to hijack computers and wreak 'utter chaos', an expert warns.

The vulnerability arises because a security feature designed to protect malicious edits to the computer's random-access memory does not launch quickly enough.

This creates a brief window of time in which hackers can run malicious code on start-up, with full system privileges, and bypass other security features.

Although Intel has released patches to make the weakness harder to exploit, the nature of the flaw means that it will likely not be possible to provide full protection.

Mar 09 06:43

Former DHS watchdogs charged in software and data theft

The Department of Justice announced it has indicted Charles K. Edwards, a former acting inspector general for the Department of Homeland Security, and one of his former subordinates for allegedly stealing software and confidential databases from the U.S. government.

According to a DOJ press release, both Edwards and Murali Yamazula Venkata are accused of carrying out a scheme between October 2014 and April 2017 to steal confidential and proprietary software and databases containing personally identifiable information of DHS and U.S. Postal Services employees from the DHS Inspector General's Office. Edwards, who left his post in December 2013, allegedly struck a deal with Venkata to steal the software and records to underpin a new, enhanced version of the system that he planned to sell back to DHS IG and the Department of Agriculture.

Mar 08 04:31

Women's Day: PM Narendra Modi 'signs off' from twitter, hands over his social media accounts to seven women achievers

Prime Minister Narendra Modi on Sunday (March 8) greeted the nation on International Women’s Day and signed off from Twitter, handing over his social media accounts to seven women achievers to celebrate the special day.
"Greetings on International Women’s Day! We salute the spirit and accomplishments of our Nari Shakti. As I’d said a few days ago, I’m signing off. Through the day, seven women achievers will share their life journeys and perhaps interact with you through my social media accounts," tweeted PM Modi.

Mar 07 15:47

Post-Coronavirus Future? Injectable Biosensors, A.I. Virus Detection, Robots and a Cashless Society

By Aaron Kesel

As a result of the coronavirus, we are witnessing a push towards injectable sensors for virus detection, Orwellian surveillance, A.I. and robots, as well as a call to quarantine U.S. fiat money coming out of China due to its potential to spread the virus...

Next year, if the FDA approves it, a military biosensor designed by Profusa and backed by DARPA could help spot new infections weeks before symptoms begin to even show...

Mar 07 05:35

Virgin Media Breach: Company Linked Customers to Porn and Shock Sites

Virgin is Britain’s second largest telecommunications firm and it is believed that the breach is the biggest the country has seen in recent years. However, representatives from the firm say that it does not pose a risk to customers.

A breach of Virgin Media’s database has exposed customers’ contact details to porn, gambling, and shock sites. The UK company revealed on Thursday that personal information from 900,000 customers was available online from 29 April 2019 to 28 February 2020 and was accessed at least once by an unknown person. It also said the breach had occurred due to an incorrectly configured marketing database, which it blamed on a negligent staff member.

Speaking at a press conference CEO Lutz Schuler urged customers to remain calm and said that the data was not stolen. "There is no evidence that the data taken has been used in the wrong way. We want to avoid any panic".

Mar 06 13:39

NEWS/ASIA PACIFICFighting in Rakhine, Chin states rages as Myanmar limits internet

Yangon, Myanmar - Continued fighting between Myanmar's military and the Arakan Army armed group has left several people dead in recent days as the government continues a clampdown on the western region.

Activists and journalists have decried the internet blackout the government has imposed as part of the clampdown as a violation of human rights.

More:
Myanmar violence: Thousands displaced by fresh fighting
Students injured in shelling at school in Myanmar's Rakhine state
UN urged to suspend Myanmar return plan for Chin amid unrest
Reports on Tuesday said at least 11 civilians, including five Muslim Rohingya, had been killed after being caught in the hostilities in Rakhine, a western state that is home to more than three million people.

Webmaster's Commentary: 

I never used to think, that I would ever have to say, "watch out, folks, here comes a highly nationalistic Buddhist Army, ready to exterminate the Muslim Rohingya in their country!!"

Unfortunately, Myanmar, and its military, has proven me wrong on this one.

Mar 06 12:09

A Massive U.S. Property and Demographic Database Exposes 200 Million Records

More than 200 million records containing a wide range of property-related information on US residents were left exposed on a database that was accessible on the web without requiring any password or authentication.

The exposed data — a mix of personal and demographic details — included the name, address, email address, age, gender, ethnicity, employment, credit rating, investment preferences, income, net worth, and property information, such as:

Market value
Property type
Mortgage amount, rate, type, and lender
Refinance amount, rate, type, and lender
Previous owners
Year built
Number of beds and bathrooms
Tax assessment information

Mar 06 11:57

Windows 10 KB4535996 Update Issues: Crashes, Slowdowns, Audio, More

Since the release of the Windows 10 KB4535996 cumulative update, Windows users have been reporting numerous problems including boot issues, crashes, performance problems, audio issues, and developer tools no longer working.

The optional Windows 10 KB4535996 cumulative update was released on February 27th, 2020 and while it resolved some Windows Search issues, it also introduced other issues for users who installed the update.

Mar 06 11:46

Apple and Google crack down on false information on coronavirus by rejecting apps and blocking searches related to the disease

Apple and Google are cracking down on the spread of coronavirus misinformation.

The App Store is reportedly rejecting apps related to the virus not developed by the government or health officials.

Developers told CNBC that in order to be accepted by Apple, 'apps with information about current medical information need to be submitted by a recognized institution.'

Google Play is blocking all searches for the virus- users are shown 'We couldn't find anything for your search' when searching 'coronavirus.'

Mar 06 11:43

Self-isolating and working from home as a precaution against coronavirus could overload broadband networks and cause internet 'bottlenecks', experts warn

Many companies have implemented a mandatory work from home policy as a precaution against coronavirus but widespread adoption could lead to internet connectivity issues, experts warn.

The added strain of remote access, video conferencing and the use of VPNs may cause some difficulties for the internet's infrastructure.

Domestic broadband for customers served by an antiquated copper-wire network would be worst affected and could see a data bottleneck.

Mar 06 11:23

Virgin Media admits breach exposed 900,000 customers' personal information after database was left unsecured for ten months

The company said the breach did not happen due to a hack but occurred because its database was incorrectly configured, allowing unauthorised access.

The information in the database did not include passwords or financial details but did contain names, email addresses, phone numbers and details of customers' contracts with the service.

However, the independent company that alerted Virgin to the breach found details that linked some customers to 'explicit websites', it told MailOnline.

Virgin Media is blaming the error on the negligence of a staff member who did not follow correct procedures.

The information was accessible from April 2019 until February 28, 2020.

Mar 06 11:22

More than one billion Android phones and tablets around the world are vulnerable to hackers because they are no longer supported by security updates, study warns

Consumer watchdog Which? found 40 per cent of Android users have been using old versions of the Google-made OS that no longer receive vital updates.

The most at-risk phones are any that run Android 4 or older – however, those using devices on Android 7.0 that can’t update to a newer version should also be concerned.

The study, based on Google data, highlights the importance of using up-to-date software to avoid being at risk of data theft, ransom demands and other malware attacks.

The current software version is Android 10 while Android 9 and 8 are still 'in theory' getting security updates too and are safe to use.

Mar 06 06:20

Virgin Media warning as 900,000 customers at risk after major security blunder

Virgin Media has revealed that almost one million customers could be at risk after a database containing personal details was left unsecured for 10 months. The incident occurred due to a member of staff not following the correct procedures. This meant that personal details such as name, home address, email and even date of birth were all easily accessible.

Mar 06 06:19

AI Microprocessing Chip Developer Hailo Raises $60 Million

Tel Aviv-based chip developer Hailo Technologies Ltd. has raised $60 million in a series B investment round, the startup announced Thursday. The round was led by existing investors Jerusalem-headquartered equity crowdfunding platform OurCrowd, Israeli entrepreneur Zohar Zisapel, and Israeli car importer Delek Motors. The round was participated by strategic investors including Switzerland-based ABB Technology Ventures, NEC Corporation, and London-based Latitude Ventures. Existing investors such as Maniv Mobility and Next Gear Management Ltd. also participated. The investment brings Hailo’s total funding to date to $88 million.

Founded in 2017, Hailo develops microprocessing chips for artificial intelligence applications on edge devices used in autonomous cars, unmanned aerial vehicles (UAV), internet of things (IoT) devices, and smart home appliances. The company has around 80 employees.

Mar 05 12:25

Cybercriminals exploit coronavirus panic by creating hundreds of fraudulent websites offering fake information and home test kits to steal users' data and make cash

Cybersecurity experts reveal that since January more than 4,000 coronavirus-related domains have been registered and some 300 are deemed 'malicious' or 'suspicious'.

A new report, released by Check Point, found that domains about the virus are 50 percent more likely to be owned by cybercriminals than other domains registered during the same time period.

Omer Dembinksy, security researcher at Check Point, told DailyMail.com that fraudulent sites offering information or test kits in order to gather people's information or receive payment.

Mar 05 09:28

Intel CSME bug is worse than previously thought

Researchers say a full patch requires replacing hardware. Only the latest Intel 10th generation CPUs are not affected.

Mar 05 05:40

CORONAVIRUS VS. THE MASS SURVEILLANCE STATE: WHICH POSES THE GREATER THREAT?

SOURCE: JOHN W. WHITEHEAD
“If, as it seems, we are in the process of becoming a totalitarian society in which the state apparatus is all-powerful, the ethics most important for the survival of the true, free, human individual would be: cheat, lie, evade, fake it, be elsewhere, forge documents, build improved electronic gadgets in your garage that’ll outwit the gadgets used by the authorities.”—Philip K. Dick

Emboldened by the citizenry’s inattention and willingness to tolerate its abuses, the government has weaponized one national crisis after another in order to expands its powers.

The war on terror, the war on drugs, the war on illegal immigration, asset forfeiture schemes, road safety schemes, school safety schemes, eminent domain: all of these programs started out as legitimate responses to pressing concerns and have since become weapons of compliance and control in the police state’s hands.

Webmaster's Commentary: 

Much of what happens in China's future, depends on its military; how loyal it will continue to be to a centralized government, which continues to abuse its people and act with an incredible degree of hubris, , or develop a new-found loyalty to the Chinese people themselves, suffering under the boot-heel of oppression.; and right now, that issue is up for grabs.

Mar 04 17:05

Amazon's Ring keeps a log of every time a smart doorbell is rung, a motion-sensing camera is activated or the app is used on a smartphone - but claims NO video is saved

Amazon's Ring keeps a log of every single time one of its cameras, doorbells or apps is activated and used, it has been revealed.

Events that are logged include motion detected by the cameras, a doorbell being activated or pressed by a visitor, or an action by the user to activate a live feed to converse with a visitor.

The data recorded also includes exact GPS co-ordinates of the devices as well as the duration of each event in seconds.

It has also been found that every time the Ring app is used by a customer, a permanent note of the device model and which network it uses is saved and recorded in a vast database.

Experts have slammed the feature and said it poses a 'serious threat to people's privacy' and could easily be stolen or misused by criminals.

Mar 04 13:34

VPN vs Proxy - which is more secure?

VPN and Proxy both help its users to access the content and stuff which are geo-restricted. Its allows the users to virtually be appeared anywhere in the world. However, there is still a little difference in between both of them, one protects the privacy of the users and one does not.

What is a VPN?

VPN is a privacy tool uses to hides the user identity. VPN reroutes the traffic through isolated server and hides the original IP of the users. That means the ISPs of the users monitoring the activity and collecting the data no longer can see what the user are doing online. The encryption also protects users from surveillance, tracking and hacking if anyone tries to get into your system. VPN offers ultimate online privacy and security.

Advantages of Using VPN

1. VPN uses different protocols to encrypt your network traffic to keep the data safe and secure.

Mar 04 13:34

VPN vs Proxy - which is more secure?

VPN and Proxy both help its users to access the content and stuff which are geo-restricted. Its allows the users to virtually be appeared anywhere in the world. However, there is still a little difference in between both of them, one protects the privacy of the users and one does not.

What is a VPN?

VPN is a privacy tool uses to hides the user identity. VPN reroutes the traffic through isolated server and hides the original IP of the users. That means the ISPs of the users monitoring the activity and collecting the data no longer can see what the user are doing online. The encryption also protects users from surveillance, tracking and hacking if anyone tries to get into your system. VPN offers ultimate online privacy and security.

Advantages of Using VPN

1. VPN uses different protocols to encrypt your network traffic to keep the data safe and secure.

Mar 04 09:43

Gene Genovese And Our Criminally Reckless Wars

Eugene Genovese (1930-2012) was an accomplished and influential historian of the United States whose professional and personal trajectory carried him from the radical Left to a distinctive form of conservatism. As a young man, he was a card-carrying communist. He ended up a devout Roman Catholic. His contributions to scholarship were legion and his impact on our understanding of slavery and on Southern slaveholders massive.

Genovese did not place a premium on getting along with others. Instinctively combative, he was a cantankerous colleague who never hesitated to say what he believed. Giving offense he considered a plus.

Webmaster's Commentary: 

Genovese was right on both counts here; there is no "moral rightness" in the US invasion and occupation of Afghanistan; Iraq; any of the invasions of Africa; or Syria; this was all about money and resources; regime changing countries in order to expropriate natural resources to which the US had utterly no moral right; have them processed by multi-national centric companies not unfavorable to the US; and only sold in US dollars.

And please remember; the US is aiding and abetting Saudi war crimes in Yemen as I type this. And just in case you are dealing with a really bad case of SMD (selective memory disorder), let these images remind you of US complicity in Saudi war crimes (warning; these are graphic, to a "lose your lunch" point, but need to be posted, and seen.)

The Saudis are killing and maiming innocent children with their bombing runs.
The US military is providing "guidance" for these strikes.

images: Yemeni children killed and maimed through Saudi bombing strikes
Yemeni children killed or maimed for life from Saudi bombings
Yemeni children are being starved to death through malnutrition, because of US-Enabled, Saudi blockades of Yemeni ports:

Images: Yemeni children dying from malnutrition, due to Saudi port blockades in Yemen

Images:
Yemeni children dying of starvation, courtesy of US-enabled blockade of its ports

Saudi coalition using depleted uranium weapons in Yemen
Deformities in Yemen suggests that the US military has supplied the Saudi military with depleted uranium weapons.

The result of this use of DU is causing massive rises in cancer rates; stillbirths, and horrific deformities of Yemeni children:

And yet, apparently, the Royal House of Saud; the Saudi government; and the US government, are perfectly comfortable with poisoning Yemeni children in the womb, and destroying not only their lives, but their families' lives as well. If there is a more cruel form of child abuse, I cannot imagine what that is.

And please DON'T start with me about "collateral damage"; in my world, there is none. Just non-combatants caught up at the wrong place, in the wrong time.

Mar 04 07:27

Windows 10 run commands you should know (but probably forgot)

If you know the right keyboard shortcut and the right commands, the Windows 10 run command can be a powerful tool. We explore 12 run commands everyone should know.

Mar 04 07:26

Honeywell says it built the world's most powerful quantum computer

When it comes to quantum computers, we tend to think of companies like Google and IBM as the big players in the field, but there could soon be more competition in the space. Honeywell says sometime in the next three months it will unveil a quantum computer that is at least twice as powerful as any current device.

Breaking down that claim requires some context. As Protocol points out, most companies talk about qubits when they speak to the capabilities of their machines. For instance, Sycamore, the computer Google claimed last year achieved quantum supremacy, had 53 qubits. Honeywell is instead using a metric called quantum volume to talk up the capabilities of its machine. IBM coined the term, and here's how it defines it:

Mar 04 03:33

Twitter encourages employees to work from home amid coronavirus scare

Twitter further also informed that the 'Work from Home' system will be mandatory for Twitter employees based in our Hong Kong, Japan, and South Korea offices due in part to government restrictions, adding that its criteria may evolve as per the situation and it will further keep the employees updated in the matter.

Mar 03 12:15

SETI@home Search for Alien Life Project Shuts Down After 21 Years

SETI@home has announced that they will no longer be distributing new work to clients starting on March 31st as they have enough data and want to focus on completing their back-end analysis of the data.

Mar 03 11:31

Revealed: New cars coming to the market this year are STILL vulnerable to keyless thefts, latest vehicle security tests find

Assessments of 13 new cars found that some models are still being launched with 'inherent security vulnerabilities', according to Thatcham Research.

'Poor' ratings were awarded to the Mazda CX-30, MG HS, Subaru Forester and Vauxhall Corsa because engineers were able to access and start these vehicles using relay attack equipment.

Mar 03 11:26

Baby monitors and smart cameras are being HACKED by burglars and used to spy on victims' homes and families, cyber chiefs warn

Baby monitors and smart security cameras used in homes risk being hacked by cyber criminals, security chiefs warn today.

They fear weak passwords can allow online attackers to control wireless cameras and spy on families in their homes.

A suggestion for a secure password:

:)

Mar 03 08:48

Airbnb Gives Renters Secret Risk Assessments And Personality Tests

By MassPrivateI

What does the Church of Scientology and Airbnb have in common? If you answered secret risk assessments and personality tests, then give yourself a gold star.

If you have you rented an Airbnb in the past six years, the odds are pretty high that you have been given a secret risk assessment and personality score...

Mar 03 03:42

SCHOOLS ARE SPYING ON STUDENTS — BUT STUDENTS CAN FIGHT BACK

San Francisco – Schools across the country are increasingly using technology to spy on students at home, at school, and on social media. Today, the Electronic Frontier Foundation (EFF) launched a new Surveillance Self-Defense guide for students and their parents, so they can learn more about how schools are watching them, and how they can fight back.

The surveillance technology currently in use includes software to scan students’ social media posts, cameras with facial recognition and other scanning capabilities, and microphones to “detect aggression.” Schools can even track you on devices that they don’t control: if you have to download a certain kind of security certificate to use the school Internet, they may be monitoring your browser history and messages you send.

Webmaster's Commentary: 

I know that here in Indiana, parents are turning increasingly to home schooling, to avoid just such kinds of surveillance, and insure that the core values with which those kids are impressed, are their parents' core values.

Mar 02 13:19

Hackers Can Use Ultrasonic Waves to Secretly Control Voice Assistant Devices

Researchers have discovered a new means to target voice-controlled devices by propagating ultrasonic waves through solid materials in order to interact with and compromise them using inaudible voice commands without the victims' knowledge.

Called "SurfingAttack," the attack leverages the unique properties of acoustic transmission in solid materials — such as tables — to "enable multiple rounds of interactions between the voice-controlled device and the attacker over a longer distance and without the need to be in line-of-sight."

In doing so, it's possible for an attacker to interact with the devices using the voice assistants, hijack SMS two-factor authentication codes, and even place fraudulent calls, the researchers outlined in the paper, thus controlling the victim device inconspicuously.

Mar 02 05:01

New Bluetooth vulnerability can be exploited to silently hack phones and laptops

This morning, Armis security published details of a new Bluetooth vulnerability that could potentially expose millions of devices to remote attack. Dubbed Blueborne, the attack works by masquerading as a Bluetooth device and exploiting weaknesses in the protocol to deploy malicious code, similar to the Broadcom Wi-Fi attack disclosed earlier this year. Because Bluetooth devices have high privileges in most operating systems, the attack can be executed without any input from the user. Blueborne doesn’t require devices to be paired with the malicious device, or even be set in discoverable mode.

Mar 01 23:41

Neocon Vulture Capitalist Paul Singer Buying Up Twitter Stock to Oust CEO Jack Dorsey: Report

Vulture Capitalist Paul Singer, a major pro-Israel donor who pushed the GOP to embrace the LGBT agenda and funded the notorious Steele dossier, is reportedly buying up shares of Twitter stock in order to oust CEO Jack Dorsey.

Mar 01 06:25

Don't be like Bezos: How to keep your phone from being hacked

In January, the world was surprised when the news broke that Amazon CEO Jeff Bezos had his phone hacked by the Crown Prince of Saudi Arabia, Mohammed bin Salman. But people are still buzzing about it because the idea that a corporate executive would be the target of a government is a perfectly legitimate, albeit shocking concept.

What happened with Bezos is that the Saudi royal family member, whom everyone calls MbS, supposedly sent a booby-trapped video to Bezos via a WhatsApp message on May 1, 2018. The two men had met at a small dinner in April 2018, exchanged phone numbers, and four weeks later, Bezos received a 4.22 MB video through WhatsApp. The video allegedly exploited a WhatsApp bug to download and install malware on Bezos' personal iPhone, which then exfiltrated data from it. Why would this have happened? Well, the Amazon CEO is the owner of The Washington Post, the newspaper that employed Jamal Khashoggi, who was murdered by Saudi agents later in 2018.

Feb 29 05:58

THIS ASSANGE “TRIAL” IS A SELF-CONTRADICTORY KAFKAESQUE NIGHTMARE

It’s common in British courtrooms to have something called a “dock”, a place where defendants sit separately from court proceedings. Not all UK courtrooms have docks, and not all docks are the “secure” glass cabinet type which Assange is kept in; they can also be open wooden enclosures. Because Assange is being kept without explanation in a maximum security prison normally reserved the most dangerous violent offenders and terrorism convicts, his trial is taking place in a cage that is very much the “secure” type (so much so that he’s been complaining that he can’t hear the proceedings in his own trial through the bulletproof glass), and there is an expectation that he remain there. The magistrate has ruled that this nonviolent offender shall be kept in his sound-resistant enclosure throughout the duration of his trial, bizarrely asserting that Assange poses a danger to the public.

Webmaster's Commentary: 

Please remember; nothing ever reported at Wikileaks, has ever been proven to be wrong.

What is happening to Assange is punishment for having told the truth, and "embarrassing" certain US public officials; nothing more and nothing less.

His extradition, and ultimate guilty verdict in an alleged US "Court of Law", means that no journalist will ever be safe in this country if they tell the truth, EVER AGAIN.

Feb 28 12:36

Hackers are sending malicious software in emails disguised as information about the coronavirus in order to gain access to people's computers

Security experts have discovered cybercriminals are sending emails with a malicious strain of software disguised as information about the outbreak.

The emails, discovered in Japan, claim the virus has spread like wildfire throughout the country and prompt recipients to open an attachment to 'learn more'.

This attachment gives hackers access to the victim's computer, allowing them to harvest personal data and infect their computers with a virus.

Feb 28 12:21

New Windows 10 update: Microsoft tries again to fix Search bugs

Microsoft has released an optional Windows 10 update that it says fixes some lingering Search box bugs.

The update for Windows 10 versions 1903 and 1909 "updates an issue that prevents the Windows Search box from rendering properly".

Feb 28 08:35

New Smartphone App Lets You Monitor Internet Of Things Spying Devices

By Aaron Kesel

A new app created by Carnegie Mellon researchers lets you see cameras, Bluetooth beacons and smart speakers around you and help you opt out of data collection...

Feb 28 06:37

Stock market live updates: Dow drops 1190 points amid coronavirus fears, S&P 500 sees fastest correction in history

Global financial markets plunged for the sixth consecutive day on Thursday, with coronavirus fears shaving over 1,100 points off the Dow (^DJI) — its biggest in history — and sending the S&P 500 (^GSPC) swooning to its fastest-ever correction.

“Global markets were down $1.83 trillion today, with the U.S. down $1.33 trillion,“ S&P Dow Jones’ Howard Silverblatt said in an email. He added that over the past six days, global markets erased $6 trillion in wealth with U.S. markets losing $4 trillion.

Investors took fright amid the first coronavirus case in the U.S. involving a person who didn’t travel to an infected country and didn’t knowingly interact with someone who did. Meanwhile, California’s governor said the state is monitoring more than 8,400 people who could possibly have the virus.

Feb 28 06:31

The new burger chef makes $3 an hour and never goes home. (It’s a robot)

In a test kitchen in a corner building in downtown Pasadena, Flippy the robot grabbed a fryer basket full of chicken fingers, plunged it into hot oil — its sensors told it exactly how hot — then lifted, drained and dumped maximally tender tenders into a waiting hopper.

A few feet away, another Flippy eyed a beef patty sizzling on a griddle. With its camera eyes feeding pixels to a machine vision brain, it waited until the beef hit the right shade of brown, then smoothly slipped its spatula hand under the burger and plopped it onto a tray.

The product of decades of research in robotics and machine learning, Flippy represents a synthesis of motors, sensors, chips and processing power that wasn’t possible until recently.

Webmaster's Commentary: 

Sorry, folks; but this where the "fight for $15 dollars an hour", in the food service industry, was always headed; it just got here a little earlier than many anticipated.

Feb 27 21:38

Turkey in social media BLACKOUT amid fears of all-out war in Syria

Turks are getting their butts handed to them.

Social media platforms across Turkey winked out after reports of an airstrike in Syria killing dozens of Turkish soldiers fueled rumors of an all-out war. Twitter, Facebook, Instagram, Messenger and YouTube were all reported down.

Feb 27 19:38

Schools Are Pushing the Boundaries of Surveillance Technologies

By Mona Wang and Gennie Gebhart

A school district in New York recently adopted facial recognition technology to monitor students, and it is now one of a growing number of schools across the country conducting mass privacy violations of kids in the name of “safety.” The invasive use of surveillance technologies in schools has grown exponentially, often without oversight or recourse for concerned students or their parents.

Not only that, but schools are experimenting with the very same surveillance technologies that totalitarian governments use to surveil and abuse the rights of their citizens everywhere: online, offline, and on their phones. What does that mean? We are surveilling our students as if they were dissidents under an authoritarian regime.

Schools must stop using these invasive technologies...

Feb 27 19:26

Socioemotional “Thought Crimes” in American Schools: Tracking Student SEL Data for Precrime

By John Klyczek

This scholarly article examines how race, A.I., social credit systems and education seem to be merging into a much larger system...

Feb 27 12:06

7 Tips to Create a Hack-Proof Password You'll Actually Remember

Sure, both Visa and MasterCard have zero-liability policies that say you won't be held responsible for unauthorized card charges as long as you report the fraud promptly. But wording in the fine print adds a caveat: to qualify, the cardholder must use care to protect the card. Could a password that's easy to crack violate those rules? At least one bank in Canada this year was reported to have held a 20-year-old student accountable for around $6,800 in fraudulent charges made after she lost her debit card because she'd used the last four digits of her phone number, an easy-to-figure-out sequence, as her personal identification number.

Feb 27 10:48

YouTube Takes Down 100 Videos by Prager University, Sparks Lawsuit, PragerU Loses (Updated)

By Activist Post

It appears that we finally have an answer to a question that was being sought in a PragerU lawsuit against YouTube: Is the company a private publisher which can editorialize its content? Or, has it become a public forum by virtue of its wide adoption and, therefore, required to remain politically neutral in accordance with constitutional principles?

As Zerohedge reports, Google has been declared victorious by the 9th Circuit Court of Appeals after they reviewed the initial 2017 ruling by a California federal judge...

Feb 27 10:28

Clearview AI: Face-collecting company database hacked

Clearview AI, a start-up with a database of more than three billion photographs from Facebook, YouTube and Twitter, has been hacked.

The attack allowed hackers to gain access to its client list but it said its servers had not been breached.

Most of its clients are US law enforcement agencies who use its facial-recognition software to identify suspects.

Its use of images scraped from the internet has raised privacy concerns.

Feb 27 10:27

YouTube 'not a public forum' with guaranteed free speech

YouTube is not a "public forum" that must guarantee users' rights to free speech, a US court has ruled.

The case involved right-wing channel PragerU, which argued YouTube was infringing its rights by "censoring" its conservative views.

But judges decided that the US constitution's First Amendment did not apply to YouTube, a private company.

The landmark ruling by US judges could affect future cases involving freedom of speech online.

Feb 26 16:16

Hackers Scanning for Vulnerable Microsoft Exchange Servers, Patch Now!

Attackers are actively scanning the Internet for Microsoft Exchange Servers vulnerable to the CVE-2020-0688 remote code execution vulnerability patched by Microsoft two weeks ago.

Feb 26 16:06

New Wi-Fi Encryption Vulnerability Affects Over A Billion Devices

Cybersecurity researchers today uncovered a new high-severity hardware vulnerability residing in the widely-used Wi-Fi chips manufactured by Broadcom and Cypress—apparently powering over a billion devices, including smartphones, tablets, laptops, routers, and IoT gadgets.

Dubbed 'Kr00k' and tracked as CVE-2019-15126, the flaw could let nearby remote attackers intercept and decrypt some wireless network packets transmitted over-the-air by a vulnerable device.

The attacker does not need to be connected to the victim's wireless network and the flaw works against vulnerable devices using WPA2-Personal or WPA2-Enterprise protocols, with AES-CCMP encryption, to protect their network traffic.

"Our tests confirmed some client devices by Amazon (Echo, Kindle), Apple (iPhone, iPad, MacBook), Google (Nexus), Samsung (Galaxy), Raspberry (Pi 3), Xiaomi (RedMi), as well as some access points by Asus and Huawei, were vulnerable to Kr00k," ESET researchers said.

Feb 26 12:48

Pets 'go hungry' after smart feeder goes offline

Owners of a device designed to release food for pets say their animals were left hungry during a week-long system failure.

Petnet allows owners to schedule and control feeding via a smartphone app.

When the BBC contacted Petnet on its advertised email address, the email bounced back with a delivery failure notice.

One pet owner tweeted: "My cat starved for over a week", while others complained about other hardware issues.

"My three Gen2 feeders constantly jam and won't dispense food," wrote another.

Some expressed relief that the feeders were now back online.

Feb 26 09:39

Apple and Tesla under fire over software engineer's fatal Autopilot crash

The National Transportation Safety Board has criticized Tesla, Apple, and road-safety regulators in the report from its nearly two-year investigation into the fatal crash of Apple software engineer 38-year-old Walter Huang.

Huang was driving his Tesla Model X P100D SUV with Autopilot drive assistance enabled when he crashed into a barrier on March 23, 2018 in Mountain View, California.

Feb 26 00:48

Reddit Announces They'll Ban Users For Their Upvotes, Launches 'Takeover' Of r/The_Donald

Reddit's leftist overlords announced Tuesday they're going to start banning users for upvoting content they don't like from communities they've "quarantined" (see: censored) and gave the boot to some half of the moderators at r/The_Donald for allegedly having "generally undermined progress."

Feb 25 12:26

Firefox turns encrypted DNS on by default to thwart snooping ISPs

US-based Firefox users get encrypted DNS lookups today or within a few weeks.

Feb 25 02:35

RING CONTINUES TO PITCH FACIAL RECOGNITION TO LAW ENFORCEMENT WHILE CLAIMING IT WON’T BE ADDING FACIAL RECOGNITION TO ITS CAMERAS

SOURCE: TECH DIRT
Ring continues to insist it is not adding facial recognition to its sadly super-popular doorbell cameras. Its insistence is suspect for several reasons.

First, it employs a "Head of Facial Recognition Tech" at its Ukraine office. A company that isn’t planning to add facial recognition doesn’t need anyone in charge of tech it’s not planning on using.

Second, its lengthy answers to Congressional questions stated that the company would continue to develop and explore other options in response to "customer demand." If enough customers express an interest in facial recognition, Ring would be stupid not to add that to its list of features, even if it has spent months denying it ever plans to do so.

Webmaster's Commentary: 

Folks, this is surveillance writ large, no matter what codswallop we are getting from the spokespeople representing the company's corporate HQ.

Feb 24 15:29

Major vulnerabilities found in top free VPN apps on Google Play store

SuperVPN Free VPN Client is one of the most popular free VPN apps you can find on the Google Play store, having gained more than 100 million installs already.

But besides being a very popular app, there’s something else you need to know about this free VPN: SuperVPN Free VPN Client is also very dangerous. You see, our analysis shows that this app has critical vulnerabilities that opens it up to dangerous attacks known as man-in-the-middle (MITM) hacks. These vulnerabilities will allow hackers to easily intercept all the communications between the user and the VPN provider, letting the hackers see everything the user is doing.

This is actually quite the opposite of what a VPN is supposed to do.

Feb 24 14:29

6 Ways to Hide your IP Address

Various Ways to hide your IP Address, but the best way is using a VPN service followed by Proxy service, Tor, Mobile Data, Public Wi-Fi and with the help of ISPs.

If you’re curious about your privacy and anonymity over the internet, then you must hide your IP Address. This will help you protect your personal details from your ISP (Internet Service Providers) which as we all know, can sell your data to pesky marketers.

By hiding your IP address, you can dodge your ISPs. This way, you can easily access geo-blocked content with the help of fake IP (region wise) and also explore the restricted websites in your country.

6 Ways to Hide IP Address

If you don’t know how to hide your IP address, simply follow the below listed 6 easy steps by TheVPNExperts to hide your IP address. If all works well, you’ll become totally anonymous on the web in less than no time.

Feb 24 10:25

Katherine Johnson, NASA mathematician depicted in 'Hidden Figures,' dies at 101

Katherine Johnson, one of the NASA mathematicians depicted in "Hidden Figures," died Monday, the administrator of NASA said. She was 101.

Johnson "was an American hero and her pioneering legacy will never be forgotten," NASA administrator Jim Bridenstine wrote on Twitter.

Feb 22 06:48

NANOTECHNOLOGY: ONE WORLD, ONE BRAIN

BY JON RAPPOPORT
From lexico.com: nanotechnology: “The branch of technology that deals with dimensions and tolerances of less than 100 nanometers, especially the manipulation of individual atoms and molecules.”

The recent arrest of Harvard pioneer in the field of nanotechnology, Charles Lieber—on charges of lying to federal authorities about his business connections to China—has exposed wide-ranging relationships among American and Chinese researchers.

These relationships include, above all, the open sharing of sensitive technologies that, once upon a time, would have been considered closely guarded state secrets. (See my recent piece, “Behind the explosive Charles Lieber scandal.”)

Here are quotes from the journal Nano Today, from a 2019 paper titled: “Nanowire probes could drive high-resolution brain-machine interfaces”. Its authors are Chinese and American:

Webmaster's Commentary: 

The hidden, and current history, of these technology transfers, is chilling in its scope, and implications for the future of this technology.

Feb 21 11:43

Windows 10's new icons are rolling out: This is what you'll see, says Microsoft

Microsoft has started rolling out new icons for Windows 10 from among the 100 new designs it revealed in December.

Microsoft says Windows 10 users in the Windows Insider Release Preview ring – the most stable of its previews – should start seeing the new Mail and Calendar icons today.

Webmaster's Commentary: 

How about skipping facelifts in favor of making Win10 more usable?

Feb 21 10:08

House Subcommittee Requests Data From Amazon Ring On Law Enforcement Partnerships

By Aaron Kesel

Amazon’s Ring is under fire from U.S. senators who want a briefing by the end of the month on how the consumer technology operates, stores data and works with law enforcement.

In a letter to Amazon Feb. 19, Democratic Rep. Raja Krishnamoorthi, the chairman of the Subcommittee on Economic and Consumer Policy, requested various documents and policies from Ring, including the most asked question how the company partners with law enforcement agencies. The letter states the subcommittee is examining “traditional constitutional protections against surveilling Americans” and balancing civil liberties with security interests...

Feb 21 07:26

MIKE BLOOMBERG IN 2014: “WE SHOULD HOPE” THE NSA IS “READING EVERY EMAIL”

“Look, if you don’t want it to be in the public domain, don’t take that picture, don’t write it down. In this day and age, you’ve got to be pretty naive to believe that the NSA isn’t listening to everything and reading every email,” Bloomberg said. “And incidentally, given how dangerous the world is, we should hope they are, because this is really serious, what’s going on in the world.”

Feb 21 06:39

VIZIBILEZONE WANTS PEDESTRIANS TO LET DRIVERS TRACK THEIR LOCATION IN REAL-TIME

Have you ever felt unsafe crossing the street? You could look both ways before crossing the street and feel safe, knowing you used common sense to navigate street crossings.

Or, you could download this app which alerts drivers to slow down and/or stop as you approach an intersection allowing you to cross the street safely.

An Israeli start-up company called Viziblezone (VZ) wants pedestrians, bicyclists, people on skateboards, scooters etc., to send their locations to vehicles in real-time.
"Viziblezone has introduced a patent-protected, cutting-edge vehicle integrated “Pedestrian Detector.” The system identifies, tracks and protects pedestrians, even when they go undetected by a fast-approaching driver. The detector is designed to operate in any adverse weather and visibility, whether day or night."
VZ's app could give anyone that that leases their software the ability to know where a person or vehicle is in real-time.

Webmaster's Commentary: 

I have one word for this technology, and that word is: terrifying.

Feb 21 06:38

MGM Seeks To Replace 2,000 Workers With Robots By 2020

MGM, one of the major global casino companies, is considering replacing some workers with robots, which will cause some concern for their employees and those in the industry as a whole.

The Las Vegas Culinary Union (LVCU), which represents bartenders, kitchen staff, and wait staff, reached a five-year deal in June 2018 with the MGM.

The agreement guarantees that MGM will not implement any technology that would have a negative impact on employment. However, the news that the MGM is considering replacing some workers with robots could mean that the company is not willing to fulfill this agreement.

Feb 21 06:35

Over 10 Million People Impacted by MGM Resorts 2019 Data Breach

A data breach last summer is estimated to have affected some 10.6 million individuals, including a number of high-profile guests, such as Twitter CEO Jack Dorsey, Justin Bieber and various US government officials, according to a new report.

MGM Resorts International confirmed Wednesday that the company fell victim to a data breach last summer and claimed that its has since reached out to individuals who had their information compromised.

Feb 21 06:08

LEAKED TWITTER DEMO SHOWS RED BANNERS TO INDICATE LIES AND DISINFORMATION UNDER TWEETS

A leaked demo has bright red and orange marks on 'harmfully misleading' tweets

"Twitter is experimenting with adding brightly colored labels directly beneath lies and misinformation posted by politicians and public figures," reports Ben Collins at NBC News.

“Twitter tells me it's a possible iteration of something that will roll out on March 5. Possible community moderation coming, too. We've got screenshots.”

From Ben's NBC News reporting:

In this version, disinformation or misleading information posted by public figures will be corrected directly beneath the tweet by fact-checkers and journalists who are verified on the platform, and possibly other users who will participate in a new “community reports” feature, which the demo claims is “like Wikipedia.”

Webmaster's Commentary: 

And Twitizens, of course, are forced to "swallow the codswallop" here, that Twitter's alleged "fact checkers" have utterly zero geopolitical agenda here, which is, of course, an absolutely a damned lie.

Feb 20 20:42

YouTube Bans Christian Broadcaster TruNews For 'Hate Speech'

Christian pastor Rick Wiles' channel TruNews was permanently banned from Google-owned YouTube on Thursday for "hate speech."

Feb 20 17:11

REVEALED: Saudi Arabia infiltrated Twitter 'by using two corrupt moles working for the site to exploit security flaws, spy on dissidents and hack thousands of users' data'

Saudi Arabian officials' campaign to lure Twitter workers to spy on social media users in return for cash and gifts began with a simple request to verify an account in 2014, a criminal complaint lodge by the FBI has revealed.

Ahmad Abouammo, 41, and Ali Alzabarah, 35, were cultivated by the country's government to hand over information on users who criticized the Saudi royals.

The personal data accessed would have allowed users to be tracked down in real life, a source told BuzzFeed News.

Colleagues of Abouammo have alleged that other staff members were pressed for information by the US and foreign governments and given little training to deal with it.

Abouammo, a US citizen, and Alzabarah, a Saudi living in California, were reported by The Washington Post have been directed by Bader al-Asaker, a Saudi official. Prosecutors said al-Asaker worked for man named as 'Royal Family Member-1,' reported to be Saudi Crown Prince Mohammed bin Salman (MBS).

Webmaster's Commentary: 

Color me completely unsurprised by these revelations.

Feb 20 15:06

Chinese Regime Deploys 1,600 Online Trolls To Suppress Information On Coronavirus

Authored by Cathy He and Eva Fu via The Epoch Times,

The propaganda department in virus-stricken Hubei Province has engaged over 1,600 censors to scrub the internet of “sensitive” information relating to the coronavirus outbreak, according to an internal document obtained by The Epoch Times.

The internal report, dated Feb. 15, detailed the agency’s efforts to ramp up censorship measures. It was drafted after a speech given by Chinese leader Xi Jinping via video link on Feb. 10 to “frontline responders” of the coronavirus outbreak in Wuhan, the capital of Hubei, where the virus first broke out.

The revelations come as the Chinese regime tightens information controls over the worsening outbreak, as netizens have increasingly turned to the internet to vent their frustrations about the authorities’ response, or document what is happening on the ground.

Webmaster's Commentary: 

Holy crud, are you flipping kidding me?!?

This... is worse than horrific, folks!!

Feb 20 11:01

Ayatollah Tweets "Wealthy Zionists" Control America Amid Push To Get Him Banned From Twitter

Iranian Supreme Leader Ayatollah Khamenei has marked the latest national event commemorating the death of IRGC Quds Force commander Qasem Soleimani by tweeting a deeply provocative statement asserting that “wealthy Zionists” control America.

The United States has reached the “peak of arrogance,” and is controlled by “wealthy Zionists and their corporate owners,” which makes it a “manifestation of oppression, abhorred by the world,” he said further, as reported in The Jerusalem Post.

The statement comes after the Islamic Republic's top cleric and head of the regime previously slammed Trump's Mideast peace plan “Deal of the Century” as “satanic” because it ultimately represents the “Jewishization” of Jerusalem and the suppression of Islamic identity.

“To the dismay of US politicians, the satanic, evil US policy about Palestine — the so-called Deal Of The Century— will never bear fruit, by the grace of God,” Khamenei wrote on his official Twitter account in late January.

Webmaster's Commentary: 

I am respectfully requesting that Twitter does not ban either this man, nor other of his Iranian contemporaries, no matter how much hawkish Republicans want to see these statements banned.

And folks, one of two things will happen here; either these charges will wither in the light of logic, or they will not.

What concerns me so deeply about Twitter, and these Neocons, is that they don't believe that thinking Americans have the ability to think critically about what they see coming from Iran, and do a reality test.

It appears that both Twitter and these Neocons have already made the decision that Americans are pathologically incapable of deciding for themselves what the truth of a situation may be, so need to be "protected" from these kinds of statements from members of the Iranian leadership by censoring them, before they get to the American people; but is this really the truth?!?

So I have to ask; what are Twitter and these Neocons afraid of, if these statements are absolutely lies, on the part of Iranian leadership?!?

The short answer is, absolutely nothing, which is why such statements should not be censored, period, end of discussion.

Feb 20 10:34

Exclusive: Details of 10.6 million MGM hotel guests posted on a hacking forum

The personal details of more than 10.6 million users who stayed at MGM Resorts hotels have been published on a hacking forum this week.

Besides details for regular tourists and travelers, included in the leaked files are also personal and contact details for celebrities, tech CEOs, reporters, government officials, and employees at some of the world's largest tech companies.

ZDNet verified the authenticity of the data today, together with a security researcher from Under the Breach, a soon-to-be-launched data breach monitoring service.

Feb 20 09:14

Vizibilezone Wants Pedestrians To Let Drivers Track Their Locations In Real-Time

By MassPrivateI

Have you ever felt unsafe crossing the street? You could look both ways before crossing the street and feel safe knowing you used common sense to navigate street crossings.

Or, you could download this app which alerts drivers to slow down and/or stop as you approach an intersection allowing you to cross the street safely.

An Israeli start-up company called Viziblezone (VZ) wants pedestrians, bicyclists, people on skateboards, scooters etc., to send their locations to vehicles in real-time...

Feb 20 04:26

Pentagon to Adopt Detailed Principles for Using AI

The Defense Department will soon adopt a detailed set of rules to govern how it develops and uses artificial intelligence, officials familiar with the matter told Defense One.

A draft of the rules was released by the Defense Innovation Board, or DIB, in October as “Recommendations on the Ethical Use of Artificial Intelligence.” Sources indicated that the Department’s policy will follow the draft closely.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA