COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Sep 03 14:12

Hackers target Manchester police, airport websites

Eastern European hackers have targeted the Greater Manchester police website making it inaccessible for users on Wednesday night.

Sep 03 14:09

Another 57 Clinton Email Threads Contain Foreign Governments’ Information

“Here’s my personal email,” Hillary Clinton wrote to U.S. special envoy George Mitchell on a summer Sunday in 2010 as he telephoned one European official after another in an effort to keep peace talks between the Israelis and the Palestinians on track.

Sep 03 11:41

Are Hillary Clinton's dominoes starting to topple in email probe?

Hillary Clinton's dominoes appear to be toppling over as the Federal Bureau of Investigation (FBI), inspectors general from a number of government agencies, and a equally large number of non-governmental organizations (NGOs) that investigate and expose government corruption intensify their investigations of Clinton and her minions, according to news reports on Thursday. While the focus of the probe is Clinton's privately-owned Internet server being used for the transfer of classified intelligence, the probe may also encompass her husband's financial bonanza allegedly accumulated through speeches for foreign entities with whom his wife conducted State Department business as the Secretary of State.

Webmaster's Commentary: 

There are two other scandals lurking in the shadows behind the email server itself that need to be fully exposed.

The first is the now confirmed flow of weapons from Libya through the consulate in Benghazi to arm Al Qaeda and ISIS in Syria. This technically constitutes treason, which is defined as giving aid and comfort to the enemy in time of war. Al Qaeda and ISIS are presented to the American people as our enemies in the war on terror. So why is the US Government giving them weapons?

The other scandal is not proven, but there is considerable circumstantial evidence to support it.

Back when Bill Clinton was running for his second term in the White House, he authorized the transfer of highly sensitive technology to China, drawing huge criticism in what later became known as China-gate. At the same time, large amounts of cash poured into his campaign through Chinese American citizens. Later it was revealed that much of that cash had come from Chinese intelligence agencies!

So with a past history of the Clintons treating US secrets as their own private property, to sell to whom they wished, let us now look at the combination of a private email server, outside US Government control and monitoring, with weak security and no encryption, on which are parked highly classified US secrets, ripe for the picking. Coupled with a "charitable" foundation that has seen many foreign governments make "contributions", we have the perfect set up for Hillary Clinton to have run an espionage operation right out of the US State Department!

Sep 03 09:27

THE HILLARY EMAIL SCANDAL - THE SCANDALS BEHIND THE SCANDAL

There is a term of craft in Propaganda called a "Limited Hangout." This refers to admitting to a smaller scandal as a distraction from the larger scandal that must remain hidden.

...

See how it works?

Good.

Because it appears we are in the middle of yet another limited hangout, in which the public furor over the questionable use of a private email server by Hillary Clinton may be concealing far greater and darker secrets!

Webmaster's Commentary: 

Bump to the top! US history is full of examples where the government would admit to a minor crime in order to keep the greater crimes hidden. I think the email scandal is one such case. All focus is being put onto the server itself, while left in the dark are the possibilities or US Government gun-running to the very terrorists we are told are our enemies, and the highest level spy ring in US history, run by the Secretary of State herself!

A long read, but I think worth it. Please forward!



Click for larger image

PLEASE SHARE THIS WITH EVERYONE YOU KNOW!

Optional Banner: 
WRH Exclusive
Sep 03 09:23

EXCLUSIVE: Hillary’s Email Server Had A Webmail Portal That Allowed UNRESTRICTED ACCESS To Hackers

Hillary Clinton’s private email server had a webmail subdomain that made it highly vulnerable to hackers, Breitbart News has learned.

clintonemail.com had a subdomain called webmail.clintonemail.com, according to the account’s GoDaddy.com encryption certificate. That subdomain is a web-based email portal that considerably weakened the server’s defenses and invited attack.

A webmail portal allows web traffic to bypass hardware and software firewalls to easily access the server’s mail “interface.”

If a user accesses emails through a web portal on an unsecure network like Clinton’s, then the emails can be read without any encryption whatsoever for safety.

Sep 03 09:22

Ex-Hillary Clinton Staffer Who Set Up Email Server Plans to Plead the Fifth

A former Hillary Clinton staffer who helped set up the former secretary of state's private email server has vowed to invoke the Fifth Amendment and refuse to answer questions after a congressional committee subpoenaed him, MSNBC confirmed late Wednesday.

Bryan Pagliano, who worked for Clinton during her 2008 presidential campaign and at the State Department, has been identified in digital records as the person who set up her email server in 2009.

The House Select Committee on Benghazi, which is investigating Clinton's emails, subpoenaed Pagliano last month to testify. But his lawyer said Monday that the IT specialist would refuse to answer questions, asserting his constitutional right against self-incrimination, The Washington Post first reported Wednesday.

Webmaster's Commentary: 
Sep 03 08:57

Will Your Car Obey You or the Police?

A few lines in a seemingly routine RAND Corp. report on the future of technology and law enforcement last week raised a provocative question: Should police have the power to take control of a self-driving car?

Sep 03 07:25

Hacker Threatens To Sell Hillary Clinton’s ENTIRE UNRELEASED Private Emails For $500K

Just as email-gate looked to be winding down, RadarOnline.com has exclusively learned a person claiming to be a computer specialist has come forward with the stunning news that 32,000 emails from Hillary Clinton‘s private email account are up for sale. The price tag — a whopping $500,000!

Promising to give the trove of the former Secretary of State’s emails to the highest bidder, the specialist is showing subject lines as proof of what appear to be legitimate messages.

Sep 03 07:17

UK Match.com site hit by malicious adverts

Malicious adverts have been found on the UK version of the Match.com dating website.

Anyone caught out by the booby-trapped ads could fall victim to ransomware, said security company Malwarebytes, which spotted the cyber-threat.

The malicious ads were appearing on pages of the dating site via an ad network that pipes content to Match and many other places.

Match said it knew about the ads and was working to clean up its feed.

Sep 03 07:00

Replacing hardware in your PC? Windows 10 will deactivate

The OS does not tolerate hardware changes, according to reports.

Sep 03 06:57

“Russian data law provokes fear in persons unknown”

It seems many people have forgotten who Edward Snowden is. To refresh your memories, he is an ex-NSA intelligence analyst currently hiding out somewhere in Moscow. Two years ago he leaked information and documents proving that the NSA and GCHQ have been spying on pretty much everyone that uses the internet – this was a big deal in the Guardian, you may recall.

You probably didn’t need me to tell you that – but apparently Shaun Walker was sick that day – or maybe all that info was on the hard drives the Guardian editor took an angle-grinder to – because in his most recent tripe on Russian politics he portrays new legislation, to store Russian electronic data on Russian soil, as an autocratic clampdown to “tighten control of the internet”. Yes, seriously.

Sep 03 06:53

Australian data retention laws end online privacy

The digital privacy of Australians ends on Tuesday, October 13th.

Sep 03 05:25

Inside view: Hillary Clinton e-mails reveal what US thinks of India

The release of over 4,000 e-mails of former US Secretary of State Hillary Clinton has given a rare insight into the growth of Indo-US engagement during the previous Congress-led UPA regime.
Out of the 4,368 emails released by the US State Department on Tuesday, more than 200 refer to India and some contain references to former PM Manmohan Singh, former external affairs minister SM Krishna and former defence minister AK Antony and Jairam Ramesh.

Sep 02 15:33

JUDGE: NSA snooping violates rights of ‘tens of millions of Americans’…

Warning that the constitutional rights of tens of millions of Americans are being violated, a federal judge said Wednesday that he’s eager to expedite a lawsuit seeking to shut down the National Security Agency’s controversial program to collect data on large volumes of U.S. telephone calls.

Sep 02 13:46

ISRAELI TERROR GONE VIRAL THEN REMOVED FROM YOUTUBE …

YouTube removed the video claiming it violated their “terms of service”

Obviously the TRUTH about Israeli terror is a violation

BUT

One of my faithful readers found it again and sent it to me …. here it is

Sep 02 10:02

‘Ghost Security’: Hackers prevent ISIS attacks on NYC and Tunisia

A hacktivist group reportedly helped prevent terror attacks in New York and Tunisia at the beginning of July. The group calls itself 'Ghost Security', and has declared an online war with Islamic State extremists.

Sep 02 09:11

Email: 'To quote Huma, I don't get paid enough' -- her pay $490,000

New Hillary Clinton emails released from the State Department suggest that top aide Huma Abedin complained about her pay despite making more in total salary that President Obama.

Sep 02 08:40

Clinton emails contained spy satellite data on North Korean nukes

One of the most serious potential breaches of national security identified so far by the intelligence community inside Hillary Rodham Clinton’s private emails involves the relaying of classified information concerning the movement of North Korean nuclear assets, which was obtained from spy satellites.

Webmaster's Commentary: 

Any Korean donors to the Clinton Foundation? :)

We know that the Clinton Foundation is hiding many of its foreign donors.

And there is one Korean donor who was listed in the Clinton Foundation records, then deleted, then re-listed when the deletion was noticed!

Was the weak private server coupled with the "charitable" foundation a cover for an espionage operation inside Hillary's state department?

It is starting to look like it!

Sep 02 08:13

Salon And WSJ Delete Offensive Tweets: Here’s What A Twitter Fail Really Feels Like

There’s a saying on Twitter: “Never tweet.” The Wall Street Journal and Salon.com may have a new appreciation for that pearl of modern wisdom this week after both outlets suffered pile-ons from scores of Twitter users over the same mistake: promoting inoffensive articles with offensive tweets.

In a tweet about Chinese President Xi Jinping’s political vulnerability, the Journal on Sunday made the ill-advised decision to ask whether he had “a chink in his armor.” Given the slang meaning of the word “chink” as an anti-Asian slur, Twitter users immediately began responding in disbelief, some asking whether the tweet was purposefully mocking Xi. It was deleted a few minutes later, but lived on through screenshots.

Sep 02 06:56

UNIVERSITY STATISTICIAN SUING GOVERNMENT OVER ALLEGED RAMPANT VOTER FRAUD

During every election cycle, politicians, the media, and citizens alike sing the praises of democracy and the power of the “vote.” The ritual is often lauded as the pinnacle of human achievement — assurance that politicians carry out the people’s wishes. In Kansas, however, a statistician from Wichita State University has filed an open records lawsuit to investigate what she worries may be evidence of voter fraud. Tellingly, since she initially filed the suit in April, authorities have attempted to block her request for voter records.

Sep 01 19:43

Your brand new phone could still have malware

A new phone is supposed to be a clean slate. But alarmingly, that's not always the case.

Security company G Data has identified more than 20 mobile phones that have malware installed despite being marketed as new, according to a research report. And it doesn't appear the infection is occurring during manufacturing.

"Somebody is unlocking the phone and putting the malware on there and relocking the phone," said Andy Hayter, security evangelist for G Data.

Many of the suspect phones are sold in Asia and Europe through third parties or middleman and aren't coming directly from the manufacturers, Hayter said.

Brands of affected phones include Xiaomi, Huawei, Lenovo, Alps, ConCorde, DJC, Sesonn and Xido.

Sep 01 19:07

Clinton emails contained spy satellite data on North Korean nukes

One of the most serious potential breaches of national security identified so far by the intelligence community inside Hillary Rodham Clinton’s private emails involves the relaying of classified information concerning the movement of North Korean nuclear assets, which was obtained from spy satellites.

Multiple intelligence sources who spoke to The Washington Times, solely on the condition of anonymity, said concerns about the movement of the North Korean information through Mrs. Clinton’s unsecured server are twofold.

First, spy satellite information is frequently classified at the top-secret level and handled within a special compartment called Talent-Keyhole. This means it is one of the most sensitive forms of intelligence gathered by the U.S.

Sep 01 15:29

Hillary Clinton may have broken US secrecy rules with emails from Tony Blair and Downing Street

Hillary Clinton may have broken US secrecy rules by handling classified information from Tony Blair and the British government on her personal email account.

Newly disclosed emails from Mrs Clinton's time as US secretary of state show she regularly received sensitive details from Mr Blair and UK officials on an email server based in her home in New York.

The former prime minister, writing on his own personal account, sent notes on his work as Middle East peace envoy while Mrs Clinton's aides passed on briefings from Downing Street on Northern Ireland.

Under US secrecy rules classified information should not be shared by email because of the risk it could be intercepted by foreign hackers. The FBI is now investigating the security of the email server.

Sep 01 12:08

Rights Group Demand Police Need Warrant To Access Data

American citizens should be able to rest safe in the knowledge that no one has the right to pry into their digital records, where they have been and how long they stayed there.

Sep 01 12:03

US considering sanctions against China over alleged cyber theft

The United States is considering imposing a round of sanctions against Chinese companies and individuals that are related to the alleged hacking of US trade secrets.

Sep 01 11:29

Teen Gets 11 Years For Giving Bitcoin Advice to ISIS on Twitter

“The War on Terror” continues as a Virginia teenager was recently sentenced to eleven years in U.S. federal prison for his pro-ISIS views and Bitcoin advice on Twitter.

17-year-old Ali Shukri Amin allegedly maintained the Twitter account @Amreekiwitness “to espouse pro-ISIS views and propaganda.” The account, which was able to gain over 4,000 Twitter followers, was also a place where advice on how to use Bitcoin to fund ISIS was disseminated...

Sep 01 10:32

Windows 10 a Window into Your Private Life? Michael Rivero - August 31, 2015

Sep 01 10:01

Exclusive: U.S. weighs sanctioning Russia as well as China in cyber attacks

The United States is considering sanctions against both Russian and Chinese individuals and companies for cyber attacks against U.S. commercial targets, several U.S. officials said on Monday.

Webmaster's Commentary: 

Soooooooo ... the same US Government that can't find Lois Lerner's IRS emails, cannot find Hillary Clinton's emails, cannot find the identity thieves, cannot find the ransomware creators, cannot break any encryption they don't have a back door in, is claiming to have proof beyond a reasonable doubt that Russia and China are hacking US computers sufficient to sanction these two nations in a desperate economic war to keep the world dependent on the US dollar? Because, if you believe THAT one, I have some of Saddam's nuclear weapons to sell you!

Sep 01 09:12

ARTIFICIALLY INTELLIGENT ROBOT TELLS CREATOR IT WILL KEEP HUMANS “IN A PEOPLE ZOO”

Android Dick is a robot created in the likeness of the science fiction writer, Philip K. Dick. Android Dick is an attempt to create thinking and reasoning artificial intelligence that has human traits like compassion and creativity. The first version of the android was created in 2005 and has been a work in progress ever since. In 2011, the creators of the android appeared on the PBS show Nova, where they interviewed the robot and asked it a series of questions. Some of the answers were impressive. Others are typical of what you would expect from a robot. However, one answer in particular is probably one of the most ominous things ever spoken by artificial intelligence.

Sep 01 07:42

Drones on a Leash - Could ''Tethered Drones'' Increase Safety or Expand Permanent Surveillance?

By Jason Erickson

Although drones have been all but welcomed into American skies by the U.S. government, the devil still remains in the details.

The proliferation of drones for hobby, commercial, or law enforcement has faced some significant setbacks, while still marching forward as though it's inevitable that drones will be part of the future landscape in America...

Aug 31 15:50

Now India probes Google, threatens $1bn fine over 'biased' search

The Competition Commission of India (CCI) opened an investigation into the ad giant after its rivals complained that they were being unsportingly squeezed out of Google's search results. Last week, the CCI director-general drew up a report summarizing the allegations, and put it to Google.

The tech biz's search engine – which used by about 90 per cent of India's netizens – is facing similar accusations in Europe, and previously in the US.

"We're currently reviewing the report from the CCI's ongoing investigation," a Google spokesperson told The Register on Monday. "We continue to work closely with the CCI and remain confident that we comply fully with India's competition laws."

According to Indian daily broadsheet the Economic Times, rivals including Facebook and retailer Flipkart griped that competing Google services receive higher placement in results.

Aug 31 12:40

Spying programs turning US into a fascist state: Analyst

The inadequate judicial oversight of the US spying programs is leading the country toward a “type of fascist state,” says a former American intelligence linguist from Orlando.

The federal court monitoring the spying operations issued the final order on Friday permitting the National Security Agency (NSA) to collect millions of Americans’ phone records.

The Foreign Intelligence Surveillance Court (FISA) ruled that the bulk data collection program does not violate Americans' privacy rights.

The secretive court contended that the program concerns the metadata of US citizens, which entails the numbers people dial in a phone call, the length of the call and when it takes place. Metadata does not include the actual contents of a phone conversation.

The Office of the Director of National Intelligence announced on Friday that the collected data “will not be used or accessed for any other purpose” other than an ongoing legal battle over the program.

Aug 31 12:24

AMERICAN TEEN GETS 11 YEAR SENTENCE FOR PRO-ISIS TWEETS THAT TAUGHT PEOPLE HOW TO USE BITCOIN

First: the one area where Amin’s actions do seem fairly questionable are when he helped another Virginia teen travel to Syria, apparently to join ISIS. That part definitely seems like it stepped over the legal line. But, the rest of the charges against him seem… like a teenager using Twitter and other social media to discuss stuff he’s interested in. Amin ran a Twitter account called @AmreekiWitness, which had about 4,000 followers. He tweeted pro-ISIS propaganda, but that still seems to be a form of protected speech, last I checked. And, his big “crime” appears to be linking to an article about why ISIS supporters should use Bitcoin.

Aug 31 10:40

State to release largest batch of Clinton emails so far

The roiling controversy over Hillary Clinton's use of a private email server as secretary of state looks likely to intensify Monday with the State Department set to release the largest batch of her messages made public thus far.

The sheer size of the planned posting on the State Department's website—at least 6,106 pages, according to a recent court filing—should give Clinton's critics and her defenders a lot to digest. The volume of emails slated to go public Monday is roughly the same as that of all of Clinton's messages unveiled up to this point.

Aug 31 08:59

3D Printed Nanobot Fish Will Deliver Drugs and Detox the Body

By Jason Erickson

There are a range of nanorobots and other nanodevices being developed with the mission of being able to deliver drugs and counter malicious organisms within the human body...

3D printing is now being combined with nanotechnology to create "microfish" that can swim through liquids...

Aug 31 08:18

What is Your Computer Hiding From You?

A good question arose in the comments to our Thursday story about U.S. border agents searching and seizing laptop computers. Can't people simply store their data on the cloud to keep it safely from government hands?

Let's think this through. Say you have a few megabytes of data that you wish to keep private. Nothing illegal, just private. You want to access your data after you cross outside U.S. borders. What are your options?

One choice is to store the data in a computer or on a thumb drive and carry it with you. As we saw yesterday, you run the risk of having government agents seize the physical device from you.

Another option is to upload the data to the cloud, safely encrypted from prying eyes, and then download it once you reach your foreign destination. This seems like a better alternative. Is it?

Aug 30 17:42

Appeals court reverses ruling that found NSA program illegal

A federal appeals court on Friday ruled in favor of the Obama administration in a dispute over the National Security Agency's bulk collection of telephone data on hundreds of millions of Americans.

The U.S. Court of Appeals for the District of Columbia Circuit reversed a lower court ruling that said the program likely violates the Constitution's ban on unreasonable searches.

The ruling means the government can continue collecting the data for the next few months, although the program is set to expire at the end of November under legislation that Congress passed earlier this summer to replace it. The appeals court sent the case back for a judge to determine whether the government must divulge more details about the program that would enable the case to go forward.

Aug 30 17:39

Windows 10 automatically sends parents detailed dossier of their children's internet history and computer use

Windows 10 sends a weekly “activity update” on childrens’ internet browsing and computer history to parents, by default and without telling anyone. The feature could be dangerous as well as embarrassing, users have pointed out, allowing parents to watch everything their children do on the computer.

The operating system sends a weekly note that includes a list of websites children have visited, how many hours per day they have spent on the computer, and for how long they have used their favourite apps, according to reports.

The feature appears to be turned on by default for family accounts — not notifying either children or their parents that they are being spied on — and was reported by parents who hadn’t asked for and weren’t aware of activating the feature themselves.

Aug 30 17:28

Tweeted Love

Brought a smile to my face.

Aug 30 08:24

99% Of Women Profiles On Ashley Madison Were Fake

At the time, the hackers claimed that 90-95% of the accounts on Ashley Madison were male with “thousands” of fake female profiles. It turns out the group were correct but underestimated the figures ever so slightly.

After careful scrutiny of the data in order to verify that 5.5 million female accounts were indeed fake, the information reveals that many accounts were created with a single localhost IP of 127.0.0.1. This was along with thousands of accounts which listed AshleyMadison.com email address as their primary contact point including organized accounts which stated 100@ashleymadison.com, 200@ashleymadison.com and so on.

Another piece of information which is certainly revealing conveys the last log in date a user has checked their inbox, this data is logged by the site even if the user only checks it once. It reveals a huge 20,269,675 men checked their messages while only 1492 woman viewed their inbox.

Aug 30 06:58

Can Bitcoin Prevent Another Ashley Madison?

By Poly Paradyme

The digital world is still reeling over the massive hack and leak surrounding Ashley Madison the adult, “cheating on your spouse” website. There have been heavy consequences for some that used the site.

Reports of extortion for Bitcoin are hitting the web. Homosexuals in foreign countries with anti-gay policies have been outed. We’ve also seen suicides connected to Ashley Madison. Marriages have likely ended this week, families likely broken or dealing with a very strange type of digital drama...

Aug 29 15:49

Data retention and the end of Australians' digital privacy

The digital privacy of Australians ends from Tuesday, October 13.

On that day this country's entire communications industry will be turned into a surveillance and monitoring arm of at least 21 agencies of executive government.

The electronically logged data of mobile, landline voice (including missed and failed) calls and text messages, all emails, download volumes and location information will be mandatorily retained by Australian telcos and ISPs.

Intelligence and law enforcement agencies will have immediate, warrantless and accumulating access to all telephone and internet metadata required by law, with a $2 million penalty for telcos and ISPs that don't comply.

Aug 29 09:53

A New Computer Can Predict If You’ll Have Psychosis With 100% Accuracy

Webmaster addition: We need one of those in Washington DC and Wall Street!

Aug 29 09:09

Ashley Madison abusing DMCA “to put genie back in the bottle,” EFF says

The online exposure of the Ashley Madison cheating sites' membership data has, to say the least, shaken the Internet like a giant earthquake.

Many of the site's members have been unmasked as one of the millions of cheaters searching for an affair. Some have committed suicide. Extortionists have taken advantage of those fearing being named. And now it appears that the site's Canadian owner, Avid Life Media, is misusing the Digital Millennium Copyright Act in a bid to make people unpublish the data that lists millions of Ashley Madison members' e-mail addresses and other information. The problem with this scenario is that such data isn't subject to copyright, the Electronic Frontier Foundation says.

Aug 29 09:05

Mark Zuckerberg had 1,000,000,000 sheeple on Facebook, Monday

Presumably, the other 85% of the world got a life

Aug 28 15:33

Chrome to block Flash ads from 1st Sept

In case your advertisements are not on the search giant’s network (Adsense), they better be in HTML5 – or they’re lifeless to Chrome. If they are already on the Adsense, then worry not, it probably has been converted to HTML5.

Google is making good on its promise to strangle Adobe Flash’s capability to auto-play in Chrome.

The online giant has set September 1, 2015 as the date from which non-essential Flash files might be click-to-play in the browser by default – effectively freezing out “many” Flash adverts in the process.

Aug 28 15:27

TISA and Tech's Double Standards On Secret Government Internet Deals

The stash of previously-secret correspondence about the Trade In Services Agreement (TISA) that EFF obtained and published this week speaks volumes about the extent to which technology companies such as IBM and Google, and trade lobby groups such as the Computer and Communications Industry Association (CCIA) and Internet Digital Economy Alliance (IDEA), have bought into the dangerous idea that trade agreements should be used to govern the Internet.

Aug 28 15:11

Win10 Insider build 10532: Avoid if you run Chrome 64-bit

A few tweaks, but what is MS doing about top feature requests and bug reports?

Aug 28 11:07

Windows Script to Remove All Windows 10 Telemetry Updates

UPDATE: Since all of our pastes and github links continue to be getting marked as spam, I have linked a direct zip package for download. You can also visit a user built site with more mirrors. https://blockwindows.wordpress.com/

Microsoft users were furious when they learned that Windows 10 is basically spyware and lots of users were asking for a fix. Ask and ye shall receive.

Below is the list of “updates” delivered by Windows Update as “telemetry and customer experience improvements”. If you don’t want to send your “telemetry” to Microsoft, remove the updates with the script provided and do not install them again. Hakspek would only advise using this code if you are technical and know what you are doing. There is a risk that the lack of updates could end up damaging your computer.

We have asked Microsoft for comment, but it has not yet responded.

Aug 28 11:06

Updates Make Windows 7 and 8 Spy On You Like Windows 10 40

Windows 10 has been launched and already installed on more than 50 million computers worldwide. It is now a known fact that Windows 10 user data is being sent back to Microsoft servers back in Redmond, Washington. Well, now new updates that are being deployed to all Windows 7, 8 and 8.1 machines will turn their computers into a big piece of spyware, just like their predecessor, Windows 10.

The updates in question are KB3075249 and KB3080149. if installed, these updates are known to report your data back to Microsoft servers, without user interaction. KB3075249 Microsoft Update adds telemetry points to ‘consent.exe’ in Windows 7, 8 and 8.1, allowing for remote monitoring of everything that happens within the operating system. KB3080149 ensures that all “down-level devices” receive the same updates and treatment as Windows 10 boxes get.

Aug 28 10:55

New password recovery scam hitting Gmail, Outlook and Yahoo Mail users

A simple yet ingenious scam is being used by scammers to compromise accounts of Gmail, Outlook and Yahoo Mail users, Symantec researcher Slawomir Grzonkowski warns.

"To pull off the attack, the bad guys need to know the target’s email address and mobile number; however, these can be obtained without much effort," he explains.

"The attackers make use of the password recovery feature offered by many email providers, which helps users who have forgotten their passwords gain access to their accounts by, among other options, having a verification code sent to their mobile phone."

Once the verification code is sent to the legitimate user's mobile phone, it's followed by a message by the scammer, saying something like: "Google has detected unusual activity on your account. Please respond with the code sent to your mobile device to stop unauthorized activity."

Webmaster's Commentary: 

And again, not a peep from the mighty (flaccid) "We See Everything" NSA!

Aug 28 10:32

Ashley Madison CEO Quits

A few months ago, Ashley Madison was the most anticipated upcoming adultery social network IPO. Then it was hacked, and all 34 million member accounts were exposed (with some amusing results and even more amusing explanations), leading to questions how long can the company exist in its current iteration, if at all.

Moments ago we got the first answer, when the Daily Beast first reported that Avid Life Media, Noel Biderman, is stepping down.

Webmaster's Commentary: 

Biderman was running a total scam. The vast majority of the female profiles were fakes! In fact I would not be surprised if there never were any actual affairs that resulted from this hoax!

Aug 28 09:47

Microsoft intensifies data collection on Windows 7 and 8 systems

Windows 7 and 8 users have been plagued by "upgrade preparation" updates but left alone otherwise up until recently when it comes to this new level of data collecting.

This changed recently with the release of several updates for both operating systems that step up the game.

KB3068708 KB3022345 KB3075249 KB3080149

If these updates are installed on the system, data is sent to Microsoft regularly about various activities on it. Microsoft lists two host names in KB3068708 that data is received from and sent to:

vortex-win.data.microsoft.com settings-win.data.microsoft.com

These, and maybe others, appear to be hardcoded which means that the Hosts file is bypassed automatically.

Aug 28 08:43

FLASHBACK - Hacking group may be NSA in disguise

New evidence uncovered by security researchers suggests that a dangerous hacking collective is actually the National Security Agency.

The so-called Equation Group, a set of hackers responsible for at least 500 malware infections in 42 countries, is considered one of history’s most effective cyber espionage rings.

Aug 28 08:27

AP Sues US Gov’t over Fake FBI News Article Booby Trapped with Surveillance Virus

The Associated Press, one of the main sources for mainstream news articles in the world, is currently suing the U.S. government. It’s claim?

The FBI endangered the AP’s reputation when the federal law enforcement agency sent out a link to a fake AP article the FBI had created which was laced with a surveillance virus that would infect the computer of anyone who clicked on it, thereby enabling the FBI to spy on them.

Disinformation laced with spyware? Yes America, our government does that.

(read more)

I rest my case. The biggest cyber-criminal in the world is the government of the United States!

Aug 28 07:51

MSN hit by large exploit kit malvertising campaign

Microsoft's MSN web portal has been used by unknown attackers to serve up malicious advertising code that attempted to plant the Angler Exploit Kit on visitors' computers.

MSN is the default home page for Microsoft's Internet Explorer browser in its Windows operating system, and the company claims several hundreds of millions of visitors click through to the site every month.

Researcher Jérôme Segura from security firm Malwarebytes reported users were served the malvertising when they simply browsed MSN news, lifestyle or other sections.

Aug 28 07:49

New Malware Attack Tries To Trick People By Pretending To Be EFF

The Electronic Frontier Foundation has put out an alert noting that, as part of a larger spear phishing attack campaign, to try to gain control over computers, a group has created a fake EFF website, designed to trick people into thinking they're going to EFF's actual website, but really installing some pretty nasty malware.

Webmaster Addition: And just where is the mighty "we see everything" NSA in all this? The NSA, trying to promote an image that they are totally monitoring the internet, never catches any computer criminals. We are left with only two possibilities. Either the NSA is totally bluffing, trying to scare is all into silence the way the Gestapo tried to scare the Germans into silence, or the NSA itself is behind this cyber crime wave!

Aug 27 15:46

Google Disappears Techdirt Article About Right To Be Forgotten Due To Right To Be Forgotten Request

So I'm at a loss as to how this latest bit of censorship could possibly be legit. And it raises some of the many concerns about the whole "right to be forgotten" concept. Is it really just limited to the supposedly out of date and "irrelevant" information? Or is it now supposed to extend to any reporting on the new and very relevant information about using the whole right to be forgotten process.

There is no official appeals process, other than that we can share "additional information regarding this content" that we feel "Google should be aware of" which may make the company reconsider -- though it also says "we can't guarantee responses." So it's just a blind "hey, that's crazy" and hoping common sense prevails.

Aug 27 15:44

There were only 3 ZIP codes in America without any Ashley Madison accounts — here they are

Gawker’s Gabrielle Bluestone has uncovered that there are precisely three ZIP codes across the country that have no record of Ashley Madison users. That’s ZIP codes, not area codes. And what do they have in common? They're partially lacking two things: the internet and a large number of people.

Gawker’s discovery highlights a pretty dark truth. These three ZIP codes are probably the only ones in the US that don't house spouses looking to cheat — at least not by using Ashley Madison.

Aug 27 15:19

Rovio To Cut 260 Jobs As The Angry Birds Franchise Becomes Irrelevant

It looks like Angry Birds maker Rovio is having some troubles to pay the bills. The Finnish company is about to cut 260 jobs after reducing its workforce by 110 employees in October 2014. At the end of 2013, the company had 800 employees in total.

Aug 27 14:53

Germany hands over citizens’ metadata in return for NSA’s top spy software

In order to obtain a copy of the NSA's main XKeyscore software, whose existence was first revealed by Edward Snowden in 2013, Germany's domestic intelligence agency agreed to hand over metadata of German citizens it spies on. According to documents seen by the German newspaper Die Zeit, after 18 months of negotiations, the US and Germany signed an agreement in April 2013 that would allow the Federal Office for the Protection of the Constitution (Bundesamtes für Verfassungsschutz—BfV) to obtain a copy of the NSA's most important program and to adopt it for the analysis of data gathered in Germany.

This was a lower level of access compared to the non-US "Five Eyes" nations—the UK, Australia, Canada, and New Zealand—which had direct access to the main XKeyscore system. In return for the software, the BfV would "to the maximum extent possible share all data relevant to NSA's mission."

Aug 27 14:45

Clinton equates GOP with terrorists while accused of passing secrets to lawyer

In another effort to get attention off of her email server debacle and on to her campaigning in the politically important state of Ohio on Thursday, Hillary Clinton compared Republican candidates to extremist terrorist groups. Many intelligence and law enforcement officers believe this is an intentionally-created controversy in order to take some of the wind out of the sails of a letter sent to Secretary of State John Kerry about Clinton's slipshod treatment of national secrets during her tenure in the Obama administration.

While many lawmakers on both sides of the aisle indicated she may have gone too far in using Islamic terrorism to make her point, the news media gave Clinton a pass on her over-the-top remarks. "Extreme views about women -- we expect that from some of the terrorist groups. We expect that from people who don't want to live in the modern world. But it's a little hard to take coming from Republicans who want to be the president of the United States," Clinton said.

Aug 27 14:02

Intel Agencies Confirm Hillary Clinton Emails Were Classified — By Obama

Another Hillary Clinton talking point is about to bite the dust, as Fox News reports confirmation from three different intelligence agencies – the DIA, the NSA, and the NGA (National Geospatial-Intelligence Agency, in charge of satellite intel) – that email on her server was classified on the day she sent it, and remains classified to this very day.

Furthermore, although Clinton has attempted to portray herself as everything from a “passive and unwitting” recipient of sensitive material to a fearless warrior on a one-woman crusade to reform silly classification rules, the Fox report makes it clear that only the intelligence agencies originating this information have the authority to declassify it, not anyone at the State Department – not Hillary Clinton, and most certainly not her top aide, Huma Abedin, who figures prominently in this story, and is looking more and more like the perfect stooge to take a fall for Clinton.

Aug 27 11:28

Ashley Madison Hack Update: All The High Profile, Celebrity Names Attached To The Private Information Leak From The Cheating Website

In the wake of the very publicized data hack of the website Ashley Madison, many cheating spouses are finding themselves in hot water at home. However, the data dump didn’t just out a cavalcade of private affairs, it revealed infidelity on the part of many celebrities as well.

For those that are unfamiliar with Ashley Madison, it is a website dedicated to facilitating affairs between consenting adults. It’s slogan is “Life is short, have an affair,” and allows a safe place for users to discretely search for a partner to help him or her cheat on their husband or wife.

Webmaster's Commentary: 

These people are all morons!

Aug 27 10:13

INDIA JUST TURNED OFF MOBILE INTERNET FOR 63 MILLION CITIZENS AMID PROTESTS IN AHMEDABAD

Restricting access to internet services isn’t the answer to such issues. Indian politicians need to encourage public debate and participation in creating policies that ensure equal opportunities for everyone.? Mobile internet services have been blocked in the Indian state of Gujarat(home to nearly 63 million people), following violent protests led by the Patel community after one of its leaders was detained by local police in Ahmedabad.

Aug 27 08:37

Clinton ally accused of running interference on email scandal

Kennedy demanded the conversation about Abedin's email be held in a special, secure facility for classified information that is commonly known as a SCIF despite his claim that the Abedin email was unclassified.

The document in question apparently discussed Christopher Stevens — then a special envoy at the State Department — and his movements in Benghazi as he and his staff prepared for a possible evacuation.

Aug 27 07:58

Construction Site Drones: Efficient, But Also A Bit Scary

By Brian Berletic

MIT's Technology Review recently published a piece titled, "New Boss on Construction Sites Is a Drone," which details the use of drones to track the progress of a project in real-time. At a construction site of a downtown stadium in Sacramento, California, drones regularly patrol overhead, comparing the current state of the project with engineering plans for the site. Discrepancies in both structural elements and with the project's schedule can be detected and passed on to site managers...

Aug 27 07:39

The most tragic thing about the Ashley Madison hack? It was really 1% actual women

When the Ashley Madison databases were splashed all over internet by hackers, it emerged that about 31 million accounts on the Tinder-for-affairs website were created by men. And about 5 million by women.

Not great odds if you're a straight fella looking to cheat on your spouse. It turns out the odds were even worse: very few of the chicks on Ashley Madison were using the site in a meaningful way.

By our counting, of the 35,290,361 leaked accounts marked as approved, 4,594,069 were each created by a woman (or someone who said they were a woman).

However, 4,085,458 of those women don't appear to have ever checked their message inboxes on the website – the database entries for those accounts read a default "0000-00-00 00:00:00" for that particular timestamp.

Aug 27 02:04

How to secure Windows 10: The paranoid's guide

For example, while Windows 10 doesn't have a keylogger it does collect your keystrokes and voice to improve spell-checking and voice recognition. Before having a fit about this, keep in mind that every cloud-based software-as-a-service (SaaS) program does this to one degree or another. Google Docs, Apple's Siri, Office 365, whatever -- they all collect not just your final words but every keystroke and spoken syllable that went into making those words.

Aug 26 15:28

AT&T reportedly playing dirty tricks to serve extra ads through airport hotspot

AT&T's "free" Wi-Fi may be too good to be true. One of the company's Wi-Fi hotspots, in Virginia's Dulles airport, is reportedly using an ad-injection platform to tamper with the web traffic of users and bombard them with more ads. Jonathan Mayer, a computer scientist and Stanford lawyer, says he discovered ad-injecting code while using the AT&T hotspot in the airport. Mayer noticed ads appearing on educational, government, and ad-supported sites such as The Wall Street Journal, and decided to take a look at the web source, discovering that it was adding lines of code that would pull in promotional materials from outside companies.

Mayer said that the hotspot was making three edits to his traffic. First, he says it added an advertising stylesheet, before injecting a back-up ad, just in case the browser didn't support JavaScript. The hotspot also added two scripts for controlling ad loading and display, code that allows the platform to import the ads themselves from third parties.

Aug 26 15:23

The Way GCHQ Obliterated The Guardian’s Laptops May Have Revealed More Than It Intended

The track pad controller, they said, can hold up to 2 megabits of memory. All the different “chips” in your computer — from the part that controls the device’s power to the chips in the keyboard — also have the capacity to store information, like passwords and keys to other data, which can be uploaded through firmware updates. According to the public documents from other members of Five Eyes, it is incredibly difficult to completely sanitize a device of all its content. New Zealand’s data deletion policies state that USB memory is only destroyed when the dust is just a few millimeters in length. “This wasn’t a random thing,” said Tynan, pointing to a slide displaying a photo of a completely destroyed pile of USB chip shards.

These hidden memory storage locations could theoretically be taken advantage of, Tynan and Al-Bassam said, by a computer’s owner, hackers, or even the government itself, either during its design phase or after the computer is purchased.

Aug 26 13:45

NSA SPYING ON YOU !!! MICROSOFT WINDOWS NO PRIVACY !!!

Webmaster's Commentary: 

So if the NSA is that good, why didn't they come up with Hillary's or Lois Lerner's missing emails? Why can't they hunt down the ransomware authors? Why can't they catch the identity thieves?

I am starting to think all this "we are spying on everything" is a hoax to scare people into silence, much as the Nazis promoted the image that the Gestapo heard and saw everything to keep the German people silent.

Aug 26 12:36

WHAT IF YOUR NAKED EYE COULD SEE WIFI SIGNALS?

In order to show you cell phone signals, the Architecture of Radio app parses wireless tower locations via OpenCellID, a ground mind mapping of cell towers. It uses NASA and JPL’s Ephemeris software to zero in on the locations of in-orbit satellites. There are hidden signals all around us. We can’t see them, but they, in a manner of speaking, can “see” us.

Aug 26 11:43

Microsoft Increases Secrecy; Expands Spyware to Windows 7 and 8

So, now that Microsoft has convinced some 50 million users to "update" to Windows 10 (with more than 14 million of them doing it in only the first 24 hours the download was available), it seems to have its sights set on those who have heeded the warnings about Windows 10 being spyware. By sending these Windows updates — many of which will be downloaded and installed by default — Microsoft is expanding its spyware empire.

Aug 26 09:57

Should Hillary Clinton Suspend Her Campaign?

Growing national security questions about Hillary Clinton’s use of a private e-mail server during her time as secretary of State are drowning out much of her message as a presidential candidate and causing many of her fellow Democrats to worry about the future of her campaign. Is it time for Clinton to put her campaign on temporary hold?

Voters are almost evenly divided on that question: the latest Rasmussen Reports national telephone survey finds that 46% of Likely U.S. Voters believe Clinton should suspend her campaign for the Democratic presidential nomination until all of the legal questions about her use of the private e-mail server are resolved. Nearly as many (44%) disagree. Nine percent (9%) are undecided. (To see survey question wording, click here.)

Webmaster's Commentary: 

Aug 26 09:56

Down Hillary Clinton’s Email Rabbit Hole

Hillary Clinton’s released emails contain information that could have damaged U.S. national security if disclosed at the time they were written.

Webmaster's Commentary: 

Aug 26 09:52

State Dept.-released Clinton email had classified intel from 3 agencies, in possible violation

One of the emails that triggered the FBI probe into Hillary Clinton’s server contained classified intelligence from three different agencies, Fox News has learned – which could mean the State Department violated a President Obama-signed executive order by authorizing its release.

That 2009 order, EO 13526, lays out the rules for "classifying, safeguarding and declassifying national security information." It states that the authority to declassify rests with the intelligence agency that originated the information.

Webmaster's Commentary: 
Aug 26 00:11

Media Pushing for TSA Security on Trains

You can always expect the busybodies in our society to exploit a crisis, no matter how remote the future risks may be.

Read on the Daily Sheeple

Aug 26 00:09

Transit System Puts up New High Tech Surveillance Cameras That Can Tell if You’re Drunk

In the ever increasing big brother society we all find ourselves attempting to hide from, now a new camera system that’s supposed to protect drunk people from being hit by transit trains at the station can “tell if you are drunk”.

Read on the Daily Sheeple

Aug 25 17:47

Windows 10: Microsoft's 'evil spy services' can be disabled with this simple trick, hackers claim

The European Digital Rights Organisation summed it up with the following statement:

"One can say that Microsoft basically grants itself very broad rights to collect everything you do, say and write with and on your devices in order to sell more targeted advertising or to sell your data to third parties.

"The company appears to be granting itself the right to share your data either with your consent 'or as necessary'."

Aug 25 15:02

Download openSUSE 13.2

Choose an installation medium by clicking it and hit the Download button to start the download. Optionally choose your computer type or an alternative download method.
Need help?

More information on downloading openSUSE is available from the Download Help and Network Installation pages in our Documentation Wiki. User manuals are available from activedoc.opensuse.org, for example the Official Start-Up Guide.

Aug 25 14:59

Download Linux Mint 17.2 Rafaela

Choose your favorite edition below. If you're not sure which one is right for you, "Cinnamon 64-bit edition" is the most popular.
Download links

Aug 25 14:57

Manjaro Installation Media

Welcome to the official Manjaro Linux ISO-image page. Here you will find the latest releases for download as ISO images.

Both 32 and 64 bit versions of Manjaro are available in the following flavours (i.e. with the following desktop environments pre-installed):XFCE KDE NET GNOME LXDE MATE and more…
XFCE is the best desktop. Manjaro is a flavor of Arch Linux.

Aug 25 09:41

Sites saving deleted tweets of politicians from 30 countries blocked by Twitter

In a blow to government transparency, Twitter, the social media network, has shut down websites which tracked politicians from 30 countries by preserving their deleted tweets. Government watchdog groups said the move erases the public record.

Aug 25 08:36

The irony: Ashley Madison plotted hacking rivals to stay ahead of the game

Leaked emails in the Avid Life data breach suggest the site's CEO was more than happy for employees to steal emails from rival companies.

Aug 25 08:35

Here's what Clinton's classified emails discussed

For example, Huma Abedin, Clinton's former deputy chief of staff, forwarded a summary of a high-level Sept. 2009 meeting to Clinton in which she detailed the "embassy security issues" that were discussed.

The issues had been raised by Eric Boswell, a diplomatic security official who was later forced to resign in the wake of the 2012 terror attack in Benghazi.

Aug 25 08:23

Updates Make Windows 7 and 8 Spy On You Like Windows 10 17

It is now a known fact that Windows 10 user data is being sent back to Microsoft servers back in Redmond, Washington. Well, now new updates that are being deployed to all Windows 7, 8 and 8.1 machines will turn their computers into a big piece of spyware, just like their predecessor, Windows 10.

The updates in question are KB3075249 and KB3080149. if installed, these updates are known to report your data back to Microsoft servers, without user interaction. KB3075249 Microsoft Update adds telemetry points to ‘consent.exe’ in Windows 7, 8 and 8.1, allowing for remote monitoring of everything that happens within the operating system. KB3080149 ensures that all “down-level devices” receive the same updates and treatment as Windows 10 boxes get.

Aug 25 08:21

Hillary’s Email Defense Strategy Was Just Hammered To Bits By These Unlikely Critics

While you might think that MSNBC’s Morning Joe would provide a refuge for Hillary Clinton as she comes under increasing attack for her controversial email practices and her reaction to criticism, the panel on the left-leaning cable net show was particularly brutal toward the Democrat front-runner on Monday. TheWashington Free Beacon points out that words such as “condescending” and “dismissive” were used to describe Hillary’s approach to defending herself against those who say she broke government rules and possibly even broke the law.

Morning Joe co-host Mika Brzezinski was stunningly direct in her criticism of Clinton’s strategy for trying to blow past the burgeoning email scandal. “This is a strategy that is basically dependent on people not being smart, which I think is really condescending,” the MSNBC anchor charged.

Webmaster's Commentary: 

It looks like the system is going to dump Hillary, rather than risk exposure of the real scandals that lie behind the issue of the server.

Will Hillary go quietly?

I hope not! :)

Aug 25 08:20

UK surveillance “worse than 1984,” says new UN privacy chief

The newly appointed UN special rapporteur on privacy, Joseph Cannataci, has called the UK's oversight of surveillance "a rather bad joke at its citizens’ expense," and said that the situation regarding privacy is "worse" than anything George Orwell imagined in his novel 1984. Speaking to The Guardian, Cannataci said: "at least Winston [a character in Orwell's 1984] was able to go out in the countryside and go under a tree and expect there wouldn’t be any screen, as it was called. Whereas today there are many parts of the English countryside where there are more cameras than George Orwell could ever have imagined. So the situation in some cases is far worse already."

Cannataci is also concerned about the routine surveillance carried out by Internet companies as a key part of their business model. "They just went out and created a model where people’s data has become the new currency," he said.

Aug 25 07:42

President Bill Clinton's top spy blasts alleged Hillary email cover up

Hillary Clinton is facing a serious debacle of her own making claims a man who worked for her husband when he was President of the United States. And unlike most of the Bill and Hillary Clinton's political friends and supporters, that man is well trained and experienced in handling literally tons of classified data. General Michael Hayden, the former director of both the CIA and NSA, told news media outlets on Sunday. that former Secretary Hillary Clinton, despite what Democratic Party talking-points indicate -- is facing a serious situation that exceeds just losing her party's nomination for president.

Aug 25 07:20

Deadly Reliance on Tech: “If Internet Goes Down… Preppers Will Be Last Ones Standing”

The general public has no clue what to do if the Internet stops... and survival kicks in. Are you ready?

“If anything to do with the internet goes down, half the planet will come to a standstill,” Steve told Mirror Online, citing the fact that we work, bank and socialise online in the 21st century. “99% of your life relies on technology.”

Read more at SHTFplan.com

Aug 24 12:50

Facebook Accused of Censoring Hundreds of Prisoners by Purging Profile Pages Without Cause

In a recent article for The Daily Beast, "Facebook Now a Place for Prisoners, Too," Sarah Shourd looked at the growing debate on prisoners using social media. Facebook has been accused of being too willing to delete profile pages of prisoners at the request of U.S. authorities.

Aug 24 07:10

Business Insider: Hillary Clinton’s ‘Best Argument’ in Email Scandal ‘Destroyed’

A Reuters story on Hillary Clinton’s email scandal, previously reported on by Breitbart, quoted national security experts who said that information shared on her private server was “born classified” even if it was not marked so.

Business Insider, hardly a right-wing publication, takes the Reuters story a step farther and posts a headline saying that this revelation “destroyed” what would have been her “best argument” against criminal investigators.

Aug 24 07:09

Hillary Clinton campaign scrambling to control damage from ongoing email server investigations

Clinton’s campaign has shifted into high gear on new messaging and outreach efforts following a rocky press conference last week and new accusations from a judge that she did violate government policy by using a private server. Frustrated allies admit that earlier attempts to stonewall what they see as a partisan witch hunt didn’t work.

“The campaign made several really significant mistakes in the way they handled it and the tone they took," former Pennsylvania Gov. Ed Rendell, a longtime Clinton ally, said.

Webmaster's Commentary: 

Mistake number 1: Choosing Hillary in the first place!

Aug 24 06:55

Obama Should Charge Clinton With Espionage

Hillary Clinton should be charged with espionage. Not really. And I don't think she will be. But if the Obama administration is going to be consistent in its treatment of those who leak classified information, Clinton ought to face charges under the Espionage Act.

The Espionage Act was written in 1917 to combat German saboteurs during the First World War. Between 1917 and 2008, it was used three times to charge Americans who had passed classified information to the press. Since Barack Obama became president, however, his Justice Department has charged eight Americans with espionage. I know. I'm one of them. And none of us gave classified information to a foreign government. In fact, most of us were whistleblowers, exposing evidence of government waste, fraud, abuse, or illegality.

The Espionage Act is actually pretty simple. It says that a person is guilty of espionage if he provides "national defense information to any person not entitled to receive it."

Aug 24 06:48

Windows 10 market share growth slows to just ten per cent

Windows 8.1 took the hit: its share went from 14.39 per cent to 13.84 per cent. Windows 7 grew a little, from 52.91 per cent to 53.3 per cent.

Aug 24 06:46

Sm?r? Špionam! BAN Windows 10, it SPIES too much, exclaim Russians

Russian lawyers have filed a complaint calling for an outright ban – or at least tight restrictions – over the sale of Windows 10 in Russia.

The complaint to the Russian Prosecutor General’s Office argues that Windows 10 collects user information in a way that violates Russian laws. Moscow-based Bubnov and Partners contended that the collection of passwords, location data, typed texts and browsing history and the uploading of the information to Microsoft’s cloud violate Russian privacy legislation.

Aug 23 16:35

Libreoffice 5 review

How much should you pay for a full suite of office applications? The nightmare scenario for Microsoft is that the answer to this is “nothing”, and LibreOffice is one of the products making that nightmare more of a reality.

LibreOffice is a free, open-source office suite that includes a word processor, a spreadsheet and presentation software. It’s derived from the old OpenOffice code base but is much improved over it and its successor products. And, as you’d expect from an open-source product, it’s available on a range of platforms: Windows, Linux, OS X, and (of course) anything you can get the source code to compile on yourself.

Aug 23 10:45

Best Friends Forever? Terrorist Groups Benefiting From Clinton Support

While democratic presidential hopeful Hillary Clinton vows to continue the US' longstanding "war on terrorism," it is Rodham Clinton who has undisputedly worked for the benefit of international terrorism, US analyst Caleb Maupin claims.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA