Latest Articles: Computers-Hacking
Spies Can Track You Just by Watching Your Phone’s Power Use
Post Date: 2015-02-19 23:43:45 by A K A Stone
Smartphone users might balk at letting a random app like Candy Crush or Shazam track their every move via GPS. But researchers have found that Android phones reveal information about your location to every app on your device through a different, unlikely data leak: the phones power consumption. Researchers at Stanford University and Israels defense research group Rafael have created a technique they call PowerSpy, which they say can gather information about an Android phones geolocation merely by tracking its power use over time. That data, unlike GPS or Wi-Fi location tracking, is freely available to any installed app without a requirement to ask the users ...
Canary Watch: Activists create website to track & reveal NSA, FBI info requests
Post Date: 2015-02-06 19:51:14 by Hondo68
Reuters/Dado Ruvic A recently launched website that tracks and lists transparency reports from across the web has already received over 20 submissions since its launch on Monday, co-founder Nadia Kayyali told the Sputnik international news service. Kayyali, who is also an activist at the Electronic Frontier Foundation (EFF), said that EFF became involved in the project because they thought it was important to provide information to people about what companies have so-called canaries. A canary is a published statement or warrant that ISPs and telecom providers put out to say they havent received any security data requests from Federal government. Its ...
Man charged in running revenge porn site convicted
Post Date: 2015-02-03 01:19:18 by Otter
AP February 2, 2015, 10:04 PM Man charged in running revenge porn site convicted SAN DIEGO - A San Diego man charged with running a so-called revenge porn website where people posted nude pictures of their ex-lovers - and then charging the victims to take down the images - was convicted Monday of 27 felony charges. Kevin Bollaert, 28, was found guilty Monday of identity theft and extortion. He faces up to 20 years in prison. The San Diego County Superior Court jury was unable to reach verdicts on two charges of identity theft and conspiracy and a judge declared a mistrial on the counts. It was believed to be the first conviction of a revenge porn website operator, although two ...
Super-cookie crumbles: Verizon vows to kill off hated zombie stalkers
Post Date: 2015-02-01 07:34:18 by Tooconservative
Super-cookie crumbles: Verizon vows to kill off hated zombie stalkersThis time opt-out actually means opt-out, we're told Verizon has backed down over its fingerprinting of subscribers using so-called immortal "super cookies." In 2012, the US mobile telco started injecting unique identifying headers (UIDHs) into every HTTP request users made to websites via the Verizon network. This allowed sneaky ad agencies to recognize people as they moved from site to site, and display ads supposedly tailored to individuals' interests. Deleting all your cookies from your web browser, or using something like Chrome's incognito mode, will not kill off the header because it is ...
Google Earth Pro drops $399 subscription, now available for free
Post Date: 2015-02-01 00:41:49 by A K A Stone
Google has recently revealed that it is dropping the paid subscription from Google Earth Pro, a more robust version of its Google Earth software. The Pro service will now be available for free, previously costing $399 per year. While the standard version of Google Earth has often been more than enough for casual map and globe users, the Pro version has seen use among professionals from scientists to businesses, who have been able to take advantage of advanced features previously not available for free. Among the main differences between Google Earth and its Pro sibling are high-resolution imagery and automated geographic location. Pro allows users to print high-res photos, but standard ...
Lenovo laptops come with preinstalled advertisement injecting adware
Post Date: 2015-01-18 14:44:16 by A K A Stone
Lenovo customers complain about the computer manufacturer preinstalling Superfish Adware on their laptops. Superfish hides in Internet Explorer, Firefox and Chrome and injects advertisements in websites. Superfish is active in the background by default on affected systems. Its likely Lenovo installs the adware on its laptops for months already. Users report Superfish is installed on the Lenovo Y50, Z40, Z50, G50 and Yoga 2 Pro laptops. Superfish Powered by VisualSearch, as the adwares full name is, is recognized by many antivirus scanners as malware. The adware injects advertisements on Google search results and on websites. The Google search results injected by ...
Google advertisements automatically redirected users to malicious sites
Post Date: 2015-01-18 14:41:32 by A K A Stone
The scam sites on which visitors landed offered weight loss, anti-aging and IQ enhancing products. The sites looked like legitimate blogs and magazines with all kinds of fake scientific research on the offered products, enhanced with fake recommendations of customers. The issues with the malicious advertisements started around the middle of December and saw a large peak on Friday the 9th of January. On the Google Adsense Forum more than 180 complaints of angry webmasters were posted that day. Webmasters displaying Google Adsense advertisements noticed how their visitors were redirected by the malicious advertisements. Google resolved the issue a day later on January 10th. ...
Aspiring cyborgs weep: Google Glass is dead. (probably)
Post Date: 2015-01-16 11:22:13 by Tooconservative
Just the other night I was watching a rerun of the Big Bang Theory episode, The Cruciferous Vegetable Amplification, in which Sheldon bemoans the fact that he wont live long enough to have his intellect fully uploaded into a robot and creates a Mobile Virtual Presence Device. It now looks like Sheldon will have to rely on his robotic doppelganger a bit longer because the days of useful android options have been pushed back even further. Ladies and gentlemen
Google Glass is dead. The company insists it is still committed to launching the smart glasses as a consumer product, but will stop producing Glass in its present form. Instead it will focus on future versions of ...
MintBox Mini gives Linux users a pocket-sized PC
Post Date: 2015-01-16 08:03:11 by Willie Green
It seems almost ironic that while are phones seem to be getting bigger, PCs are getting smaller. At least those that aren't hulking beasts constructed for raw power, for gaming and whatnot. Though not as ridiculously small as Xiaomi's Mi Box mini "set top box", if you could still call it that, this new MintBox Mini still tries to deliver a PC that is powerful enough for your basic computing needs yet small enough to fit in your pocket. Presuming, of course, you'd actually keep one in your pocket. The MintBox Mini comes from Fit-PC, a company that has been making these mini PC devices for quite some time now. In fact, this is the third incarnation of its MintBox line ...
This is Spartan – What we know about Microsoft’s IE successor
Post Date: 2015-01-10 14:48:13 by A K A Stone
Microsoft is building a new browser that will replace Internet Explorer as the default in Windows 10, features include a new, clean UI, Cortana integration and inking support. Even though Internet Explorer still has a fairly large marketshare in some parts of the world, theres no denying that it has a serious image problem. Problems with IE6 through 8, the lack of web standards support and the advent of Google Chrome have made a serious dent in Internet Explorers reputation, And even though Microsoft has gone through a lot of effort to make its browser compatible with the ever evolving web standards and has gone to great lengths to boost its popularity, it looks like they are ...
Mozilla's Lightbeam tool will expose who is looking over your shoulder on the web
Post Date: 2013-10-25 07:14:54 by A K A Stone
Just who is looking over your shoulder when you browse the Internet? Tomorrow, web users will be given a new tool to shine a light on the commercial organisations which track your every movement online. Lightbeam, a download produced by Mozilla, the US free software community behind the popular Firefox browser, claims to be a watershed moment in the battle for web transparency. Everyone who browses the Internet leaves a digital trail used by advertisers to discover what your interests are. Users who activate Lightbeam will be able to see a real-time visualisation of every site they visit and every third-party that is active on those sites, including commercial organisations ...
Luxury toilet users warned of hardware flaw (hacked to attack)
Post Date: 2013-08-05 19:00:58 by Hondo68
People can also store records of their bowel movements on the My Satis app.A luxury toilet controlled by a smartphone app is vulnerable to attack, according to security experts. Retailing for up to $5,686 (£3,821), the Satis toilet includes automatic flushing, bidet spray, music and fragrance release. The toilet, manufactured by Japanese firm Lixil, is controlled via an Android app called My Satis. But a hardware flaw means any phone with the app could activate any of the toilets, researchers say. The toilet uses bluetooth to receive instructions via the app, but the Pin code for every model is hardwired to be four zeros (0000), meaning that it cannot be reset and can be activated by ...
Now That ItÂ’s in the Broadband Game, Google Flip-Flops on Network Neutrality
Post Date: 2013-08-04 21:23:26 by A K A Stone
In a dramatic about-face on a key internet issue yesterday, Google told the FCC that the network neutrality rules Google once championed dont give citizens the right to run servers on their home broadband connections, and that the Google Fiber network is perfectly within its rights to prohibit customers from attaching the legal devices of their choice to its network. At issue is Google Fibers Terms of Service, which contains a broad prohibition against customers attaching servers to its ultrafast 1 Gbps network in Kansas City. Google wants to ban the use of servers because it plans to offer a business class offering in the future. A potential customer, Douglas ...
Romney investment in voting machines uncovered (hanging chads & butterfly ballots obsolete)
Post Date: 2012-10-22 14:35:12 by Hondo68
In the last debate Romney and Obama briefly sparred over their investment portfolios and the nefarious line items that may appear therewhen Romney asked Obama if he was sure he didnt have investments in Chinese firms, Obama dodged it by making a joke and saying his pension report sheet isnt as long as Romneys.It was funny, but it also touched on a disturbing reality: When you get someone as rich as Romney their money becomes like a Russian nesting doll, with investments hidden under subsidiaries of private equity firms, offshore accounts and blind trusts. Keeping track of its influencefollowing the money, so to speakcan become ...
Every email, text msg, phone call, bank transaction collected by NSA
Post Date: 2012-09-01 10:56:44 by whyofcourse
Video Op-Doc: The Program (Stellar Wind)
Piratebay soon available on 18,446,744,073,709,551,616 addresses?
Post Date: 2012-06-22 09:24:16 by A K A Stone
Blocking the Piratebay seems the latest hobby of legislators around Europe. In the UK, the Netherlands, Belgium and Finland, the Piratebay has to be blocked by ISPs. Blocking is done by removing the Piratebay from the ISPs DNS system or by even blocking the IP addresses the Piratebay is running on. Recently the Piratebay already showed it wasnt impressed by that, by simply making the site available on another IP and by just increasing a number (from 18.104.22.168 to 22.214.171.124). However the internet has a shortage of these kind of IP addresses. The current IP address system is IPv4 and with only 4 billion addresses available, these IPv4 addresses are running out. So ...
How Flame Virus Has Changed Everything For Online Security Firms
Post Date: 2012-06-18 12:51:13 by Brian S
Heres a question: if you connect an unprotected Windows computer to the internet, how long will it take before it is infected by malicious software? The answer is: much more quickly than most lay users think. In 2003, the average time was 40 minutes. A year later it was 20 minutes. By 2008 an unpatched computer running Microsoft Windows XP could only expect five to 16 minutes of freedom. The Internet Storm Centre (ISC) provides a useful chart of what it calls survival time for Windows machines. It suggests that a PC currently can expect between 40 and 200 minutes of freedom before an automated probe reaches it to determine whether it can be penetrated. The numbers for ...
Pentagon sets up fast track for buying cyber war tools
Post Date: 2012-04-14 00:52:02 by Hondo68
WASHINGTON (Reuters) - The Pentagon is establishing a fast-track acquisition process that would enable it to develop new cyber warfare capabilities within days or months if urgently needed, the Defense Department said in a report to Congress.The process, which would be overseen by a new senior-level Cyber Investment Management Board, aims to streamline the sluggish traditional defense acquisition process to meet the rapid pace of events in cyberspace, the 16-page report said.Congress, in defense legislation enacted last year, directed the Pentagon to develop a strategy that would enable it to speedily acquire cyber warfare tools, applications and other capabilities. The Pentagon sent a ...
Live Broadcast TV, meet the Internet. Finally.
Post Date: 2012-03-06 23:01:29 by A K A Stone
Really? Wow. Imagine the antenna on your roof or rabbit ears on your TV was somewhere you never had to see them. Aereo makes that possible. Heres how: 1. We made the TV antenna unbelievably small So small it fits on the tip of your finger. But it still gets awesome HD reception. 2. We connected these antennas to the Internet We engineered a way to put tons of these antennas in data centers, along with massive amounts of storage and super-fast Internet connections. 3. We give you control We built a simple, elegant interface to let you control your antenna. Through the Internet. With any device you want. All without cords, cables, or boxes.
The Little White Box That Can Hack Your Network
Post Date: 2012-03-04 17:39:05 by A K A Stone
When Jayson E. Street broke into the branch office of a national bank in May of last year, the branch manager could not have been more helpful. Dressed like a technician, Street walked in and said he was there to measure power fluctuations on the power circuit. To do this, hed need to plug a small white device that looked like a power adapter onto the wall. The power fluctuation story was total bullshit, of course. Street had been hired by the bank to test out security at 10 of its West Coast branch offices. He was conducting whats called a penetration test. This is where security experts pretend to be bad guys in order to spot problems. In this test, bank ...
IMPORTANT STUFF: How to delete your Google Browsing History
Post Date: 2012-03-03 10:22:17 by buckeroo
Mozilla Introducing Collusion Discover who’s tracking you online
Post Date: 2012-02-29 17:02:56 by A K A Stone
Collusion is an experimental add-on for Firefox and allows you to see all the third parties that are tracking your movements across the Web. It will show, in real time, how that data creates a spider-web of interaction between companies and other trackers. https://addons.mozilla.org/en-US/firefox/addon/collusion/
Anonymous took down cia.gov
Post Date: 2012-02-10 19:52:25 by Hondo68
Traditionally known as FuckFBIFriday, this weekend's eve turned into FuckCIAFriday, as hacktivists downed the official website for the Central Intelligence Agency of the United States cia.gov. At approximately 3:10 p.m. Eastern time one of twitter accounts related to the hackers' group announced "cia.gov DOWN. #UMAD?#Anonymous." The CIA website became the latest victim in a series of attacks conducted by the elusive group of hackers against US law enforcement agencies and copyright holders. As RT reported earlier, Anonymous took credit for crashing the websites of the US Department of Homeland Security, which was quickly revived, and the FBI.The CIA seems to be less ...
Father Shoots Daughter's Computer For Disrespectful Facebook Post
Post Date: 2012-02-10 09:53:14 by Happy Quanzaa
6:59 a.m. EST, February 10, 2012 YouTube - A gun-toting father gives his daughter a lesson in respect after finding a disrespectful Facebook post that she wrote about her family. The father actually shoots his daughter's computer. Now his actions are getting mixed reviews. Warning: language and content may not be appropriate for young viewers
Intro: Cleanliness is Next to Godliness: Browser cookies
Post Date: 2012-02-09 20:46:51 by buckeroo
Intro: Cleanliness is Next to Godliness: Browser cookies We often think of the above expression as a method of keeping mind, body, soul, heart, word and deed in a state of salvation (from a western cultural perspective) or a state of nirvana (from an eastern cultural perspective) in an effort to identify ourselves with a Creator or perhaps called a Supreme Being. In all cases of the above expression, some computer users leave the cleanliness of a computer to pure happenchance or at best an archaic process of deleting a file or a cache memory which is not much more than having your dawg lick a plate after dinner and subsequently placing the plate back on the shelf ...
Latest [Newer] 2 3 4 5 6 7 8 9 10 [End]