For those not familar, please refer to the National Reviews article: Déjà Vu: When Bill Clinton Pardoned His Former CIA Director over Classified Documents on His Home Computer CIA PDF HERE: UNCLASSIFIED/ /FOUO Central Intelligence Agency Inspector General REPORT OF INVESTIGATION IMPROPER… Read More ›
Cyber Security
YouTube now Censoring Americans who Criticize their Government ?
Editors Note: (Ralph Turchiano): Youtube is a semi free service, in which I have also been banned to this mysterious algorithm through invalid click activity with no chance of appeal in 2012. I do believe Youtube has a right to… Read More ›
Decryption Key to MegaCloud DNC 2.0 File Dump
This will get you through the first wall of encryption; However, each file from there is passcoded Link mega.nz/#!uwBGyCoQ Decryption key: !ZSPbUeUjmeSt0GEovBrEYV9V_3CX09hROm3JQJmr0HU
Open Source Code algorithm now available through here to detect Online fraudsters and politicians
Public Release: 8-Sep-2016 Carnegie Mellon algorithm detects online fraudsters Method sees through camouflage to reveal fake followers, reviewers Carnegie Mellon University PITTSBURGH — An algorithm developed at Carnegie Mellon University makes it easier to determine if someone has faked an… Read More ›
Researchers find vulnerabilities in cars connected to smartphones
Public Release: 1-Sep-2016 NYU Tandon School of Engineering Caption This is a hardware setup in which an Android phone is integrated with the head unit of a 2015 model vehicle (left). MirrorLink is the connection protocol and allows the… Read More ›
People ignore software security warnings up to 90 percent of the time
Public Release: 17-Aug-2016 Why? Poor timing Brigham Young University IMAGE: A security message from the Google Chrome Cleanup Tool is shown. Credit: Google Chrome Software developers listen up: if you want people to pay attention to your security warnings… Read More ›
China takes the lead in quantum communication satellites
BEIJING, Aug. 16 (Xinhua) — China plans to send more quantum communication satellites into orbit after the successful launch of the Quantum Experiments at Space Scale (QUESS) satellite, according to the chief scientist of the project. Early Tuesday… Read More ›
Equation Group – Cyber Weapons Auction (File Copy- Unverified)
Editors Note: (Ralph Turchiano) – This is a picture format – The current source link is here: CLICK LINKS BELOW AT YOUR OWN RISK !!! https://archive.is/rdYpc#selection-373.0-373.38 rawdownloadcloneembedreportprinttext 6.64 KB —–BEGIN PGP SIGNED MESSAGE—– Hash: SHA256 From: bitmessage = BM-NBvAHfp5Y6wBykgbirVLndZtEFCYGht8… Read More ›
The NSA leaking Hillary’s Emails?
Monday, 01 August 2016 Over a year before Edward Snowden shocked the world in the summer of 2013 with revelations that have since changed everything from domestic to foreign US policy but most of all, provided everyone a glimpse… Read More ›
US State Department lacks any cyber-security whatsoever, including no passwords needed (Repost from Oct 2013)
Editors Note: (Ralph Turchiano)- Requested Repost from Oct 2103 Published time: October 28, 2013 02:01 Reuters / Jim Young Access classified data without authorization, use your account after you’ve been fired, or anonymously request a new account for an… Read More ›
Compromised Code Names, Operations and Equipment / Recent and in progress ( Updated 12:37PM PST / 27OCT2013 )
Editors Note: (Ralph Turchiano) Requested Repost from the archives (Oct 2013) EEV: Recently Compromised or exposed Code names, Operations, Software and facilities. The list is in no particular order and is being updated frequently. These are just the discoveries from… Read More ›
Your browsing behavior can indicate your personality and provide a unique digital signature which can identify you
Public Release: 7-Jun-2016 You are not as anonymous as you think online Hiding online is harder than you’d think Frontiers You may not be anonymous as you think you are online; reveals a new study published on Frontiers in ICT…. Read More ›
Cyber criminals took down London Stock Exchange website for two hours
Hackers attack the Stock Exchange: Cyber criminals take down website for more than two hours as part of protest against world’s banks The attack was carried out by a ‘hacktivist’ group based in the Philippines By JABER MOHAMED FOR THE… Read More ›
Audit Slams U.S. for Money Pit of Ancient Technology
“the Department of Defense uses 8-inch floppy disks in a legacy system that coordinates the operational functions of the nation’s nuclear forces,” By DANIEL W. STAPLES WASHINGTON (CN) — The U.S. government is spending $61 billion of its $89… Read More ›
Computing a secret, unbreakable key
Public Release: 20-May-2016 Researchers develop the first available software to evaluate the security of any protocol for Quantum Key Distribution University of Waterloo What once took months by some of the world’s leading scientists can now be done in… Read More ›
Social engineering: Password in exchange for chocolate
Public Release: 12-May-2016 Large-scale study on password security University of Luxembourg It requires a lot of effort and expense for computer hackers to program a Trojan virus and infiltrate individual or company computers. They are therefore increasingly relying on… Read More ›
Deleting QuickTime off Windows is advised: US
AFPApril 17, 2016, 12:40 am TWN SAN FRANCISCO — A cyber security team at the U.S. Department of Homeland Security is advising people to remove QuickTime media software from Windows computers to avoid being hacked. The U.S. Computer Security… Read More ›
Of the Requirements for Successful GPS Spoofing Attacks
Requested Repost from 28 APR 2015 (Editors Note – Ralph Turchiano) The information has already been highly compromised . PDF FILE ORIGINAL AND IN PROPER FORMAT On the Requirements for Successful GPS Spoofing Attacks ABSTRACT An increasing number of wireless applications… Read More ›
Feds Unlock Terrorist’s IPhone Without Apple’s Help
By MATT REYNOLDS RIVERSIDE, Calif. (CN) – The FBI has unlocked the iPhone of San Bernardino terrorist Syed Farook and asked a federal judge to vacate its court case against tech giant Apple. “The government has now… Read More ›
Saving Government Email an Open Question with December 2016 Deadline Looming
The National Security Archive’s 2016 “Email Alert” Finds 1 in 6 Federal Agencies Failed Even to File Key Report on Email Management DIA, Treasury, and Nuclear Regulatory Commission Admit They Will Miss December 31, 2016 Deadline for Electronic… Read More ›
Hacker who uncovered Clinton’s emails, extradited to U.S.
Monday, 07 March 2016 Guccifer, the infamous Romanian hacker who accessed emails of celebrities and top US officials, will be extradited to the United States, after losing a case in his home country’s top court. Reuters reports that Lehel… Read More ›
New ‘Radar’ Billboards Spy on Unsuspecting Public, Then Track Them by Phone
00:40 02.03.2016(updated 03:46 02.03.2016) Clear Channel releases legally-dubious Big Brother billboards that intrude on privacy. A troubling new revelation of domestic consumer intelligence gathering emerged Sunday, when privacy advocates revealed a new kind of billboard that uses surveillance triangulation…. Read More ›
FBI officials STILL can’t unlock San Bernardino killer’s phone – TWO MONTHS after massacre
OFFICIALS are still unable to unlock a phone owned by one of the terrorists behind December’s terror attacks in San Bernardino. By TOM PARFITT PUBLISHED: 03:22, Wed, Feb 10, 2016 | UPDATED: 03:48, Wed, Feb 10, 2016 HANDOUT Syed… Read More ›
‘Right to Be Forgotten’ Gets a Boost in Europe
Monday, December 21, 2015 By WILLIAM DOTINGA (CN) – European lawmakers agreed on a sweeping reform of the EU’s data-protection law on Monday, replacing a patchwork of national laws with a single rule that includes the right to… Read More ›
Swedish researchers reveal quantum security hole
“They found that energy-time entanglement – the method that today forms the basis for many systems of quantum cryptography – is vulnerable to attack.” Public Release: 18-Dec-2015 Hacking the Bell Test using classical light in energy-time entanglement-based quantum key… Read More ›
U mad bro? Computers now know when you’re angry
“Websites can go beyond just presenting information, but they can sense you. They can understand not just what you’re providing, but what you’re feeling.” Public Release: 14-Dec-2015 The way you move a computer mouse reveals negative emotions Brigham Young… Read More ›
U.S. State Dept. Employee Admits to Cyberstalking
“When one victim begged him to leave her alone, authorities said Ford wrote in one email “don’t worry, it’s not like I know where you live,” then sent another email to the same victim with her home address and… Read More ›
Selling students Social Security numbers and other personal information, is OK.
No Harm, No Foul in Student Info Sales By JACK BOUBOUSHIAN CHICAGO (CN) – College-bound students cannot show they were harmed by the ACT and College Board’s sale of their Social Security numbers and other personal information, the Seventh Circuit… Read More ›
Voters Sue Georgia Official for Data Breach
By KEVIN LESSMILLER ATLANTA (CN) – Georgia Secretary of State Brian Kemp disclosed the social security numbers and birthdates of more than 6 million voters and did not notify them, voters claim in court. Elise Piper and Yvette… Read More ›
Every Website You Visit To Be Recorded ( UK )
Under new spying powers, police and security services will be able to see what websites a person has visited without a warrant. 01:57, UK,Wednesday 04 November 2015 By Tom Cheshire, Technology Correspondent The web browsing history of every person… Read More ›
Researchers find vulnerabilities in use of certificates for Web security
Public Release: 28-Oct-2015 Study finds website admins not revoking certificates, browsers not checking certificate revocation status University of Maryland Consumers use the Internet for banking, emailing, shopping and much more nowadays. With so much personal and private information being transmitted… Read More ›
Spying goes Mainstream: Windows 10 Spies on Everything You Do
Monday, 03 August 2015 We can see the lines forming of people rushing to buy Windows 10. Included in Microsoft’s new 12,000-word service agreement, which goes into effect August 1, is the following excerpt from the privacy policy: “We… Read More ›
More Than One Million Fingerprints Stolen in Federal Personnel Data Hack
In what one former NSA official has called “probably the biggest counterintelligence threat in my lifetime,” 1.1 million fingerprints were stolen in the hack of the federal government’s Office of Personnel Management, which compromised the data belonging to 21.5… Read More ›
21.4 million Social Security additional numbers found hacked
Tens of Millions Implicated in Data Breach, OPM says WASHINGTON – The Office of Personnel Management confirmed a new cybersecurity breach Thursday that exposed 21.4 million Social Security numbers. This breach is separate from one OPM announced in April… Read More ›
Was the Stock Market brought down by a cyberattack ?
Editors Note: There are many rumors flying around currently at the unusual coincidences that occurred prior to the shut down. While I am not going to add directly to the speculation such as the photo present by the IBT. I… Read More ›
Hacked US Security Clearances Are Giving Beijing Insanely Personal Information About American Citizens
By Jeff Stone @JeffStone500 j.stone@ibtimes.com on June 12 2015 2:20 PM EDT Hackers believed to be from China hacked into the U.S. Office of Personnel Management and lurked there for at least a year. It’s just the latest infiltration into… Read More ›
With one false tweet, computer-based Hack Crash led to real panic
Public Release: 20-May-2015 More attention must be paid to social media’s connection with financial decision making, says UB researcher University at Buffalo BUFFALO, N.Y. – A false tweet from a hacked account owned by the Associated Press (AP) in 2013… Read More ›
ISIS preparing total cyber war on critical US systems
DEBKAfile May 18, 2015, 9:39 PM (IDT) Hooded hackers released a video Monday stating that the Islamic State in Iraq and Syria was preparing to wage all-out “electronic” war on the US and Europe, but the war has not… Read More ›
FBI probe claims hacker controlled flight through plane’s Wi-Fi
Security researcher Chris Roberts has told special agents he has repeatedly managed to access such things as the engine systems from his seat The FBI are investigating claims a prominent computer hacker was able to take control of a… Read More ›
At least 29 million health records breached by overt criminal activity
Public Release: 14-Apr-2015 Increase seen in data breaches of health information The JAMA Network Journals Between 2010 and 2013, data breaches of protected health information reported by HIPAA-covered entities increased and involved approximately 29 million records, with most data breaches… Read More ›
UK GOVERNMENT claims they are legally justified to hack anyone, anywhere in the world, even if the target is not a threat to national security nor suspected of any crime.
UK GOVERNMENT CLAIMS POWER FOR BROAD, SUSPICIONLESS HACKING OF COMPUTERS AND PHONES Wednesday, March 18, 2015 The British Government has admitted its intelligence services have the broad power to hack into personal phones, computers, and communications networks, and claims they… Read More ›
DOD Secrets Don’t Shield ‘StingRays’ in Buffalo
By ADAM KLASFELD (CN) – The fact that so-called “StingRays” derive from military technology is no reason for the Erie County Sheriff’s Office to stonewall information on how the device tracks New Yorkers’ cellphones, a Buffalo judge ruled on… Read More ›
You forgot to Wash the WayBack Machine
EEV: This one goes out to the community who only washed half the board to the Russia hacker site: exposed.su You shut down the site, but left the Archives ??? https://web.archive.org/web/20130316053725/http://exposed.su/
Your privacy online: Health information at serious risk of abuse
Public Release: 23-Feb-2015 Annenberg research uncovers privacy risks from surfing health web sites University of Pennsylvania Annenberg School for Communication There is a significant risk to your privacy whenever you visit a health-related web page. An analysis of over 80,000… Read More ›
Chinese Hackers may of used the Anthem Data Breach as a back-door way to spy on U.S. defense officials, corporations and others, according to wire reports.
LOS ANGELES (CN) – Anthem Blue Cross allowed hackers to steal personal information from 80 million customers, a class action claims in Federal Court. Two such class actions were filed in Los Angeles Thursday and another in Birmingham, Ala. Federal… Read More ›
China is trying to deny it stole the plans for the Lockheed’s F-35 Joint Strike Fighter
2015-01-20 13:28:33 BEIJING, Jan. 20 (Xinhuanet) — According to a report carried in the Australian Associated Press, U.S. National Security Agency whistle-blower Edward Snowden has claimed that Chinese spies stole a huge volume of data related to Lockheed’s F-35 Joint… Read More ›
Phone Data Collection by United States Reauthorized
Monday, January 12, 2015 By WILLIAM DOTINGA (CN) – The Foreign Intelligence Surveillance Court reauthorized the federal government’s bulk collection of telephone metadata last month, according to a declassified order made public by the director of National Intelligence on… Read More ›
Researchers work to counter a new class of coffee shop hackers
– Studying Side-channel Emission Issues If you’re sitting in a coffee shop, tapping away on your laptop, feeling safe from hackers because you didn’t connect to the shop’s wifi, think again. The bad guys may be able to see what… Read More ›
Secret Malware in European Network Traced to NSA & GCHQ
Tuesday, 25 November 2014 Complex malware known as Regin is the suspected technology behind sophisticated cyberattacks conducted by U.S. and British intelligence agencies on the European Union and a Belgian telecommunications company, according to security industry sources and technical… Read More ›