Hacker Wars


7:51 am


Now, while Guccifer works on Pelosi’s computer emails, Assange works on Hillary’s.

These hackers deserve something, more than a medal, too.

Hacker Publishes List Of Cell Phone Numbers, Private E-Mails For Most House Democrats
GUCCIFER 2.0 has a blog.  I thought he had been arrested?
This site has phone numbers and emails and lots of cool stuff.



10:53 am

Hundreds of small British businesses and minor celebrities have been targeted by a sophisticated blackmail scam orchestrated by “rogue editors” at Wikipedia, The Independent can reveal.

See at:



4:37 pm

The iCloud hack STILL hasn’t been solved: Case remains open a year after nude celebrity photos were leaked online

  • Last year, hackers broke into approximately 500 Apple iCloud accounts
  • On August 31 2014, hundreds of stolen images were posted to forums
  • Apple has boosted security and enabled two-factor authentication tools 
  • The investigation has led the FBI to search addresses and seize equipment but the case remains open and no charges have yet been brought

Read more: http://www.dailymail.co.uk/sciencetech/article-3216846/The-iCloud-hack-hasn-t-solved-Case-remains-open-year-nude-celebrity-photos-leaked-online.html#ixzz3kQXc92ry
Follow us: @MailOnline on Twitter | DailyMail on Facebook



2:59 am

Ashley Madison puts out $375,000 bounty on hackers

Avid Life Media, the founders and operators of the Ashley Madison website, have offered 500,000 Canadian dollars (around $375,000 US) for any information on the hackers who stole the site’s anonymous user data and started leaking it over the past month.

Read more here:




10:58 am

HACKERS WHO STOLE sensitive customer information from the cheating site AshleyMadison.com appear to have made good on their threat to post the data online.

A data dump, 9.7 gigabytes in size, was posted on Tuesday to the dark web using an Onion address accessible only through the Tor browser. The files appear to include account details and log-ins for some 32 million users of the social networking site, touted as the premier site for married individuals seeking partners for affairs.

See more at:

Hackers Finally Post Stolen Ashley Madison Data



8:56 am

EXCLUSIVE: Jailed hacker Guccifer boasts, “I used to read [Clinton’s] memos… and then do the gardening”

At one point he breaks into a rehearsed tantrum about Arianna Rockefeller, another victim of his hacking. “I have the secret journal of the Rockefellers – I’ve taken it from a member of the Illuminati and ran a metadata analysis to verify it’s genuine.” I suggest that sounds implausible. He continues: “G. W. Bush is a KKK member. In a picture I found and published (below) he’s wearing a white KKK hood. You can see it in the reflection in the window. Mainstream media totally suppressed that.” To me, the “KKK hood” in that picture looks more like a tablet computer Bush used to photograph one of his paintings.

See more at:



4:00 am

Hackers Shut Down 54 Israeli Govt Sites After “Price Tag” Killers Set Free

On 11 August, hackers attacked the website of the Office of the Prime Minister, that of the Israel army and that of a number of ministries and government departments.

In a statement the international group of hackers known as Anonymous said this was

“because the Palestinian toddler’s voice was not heard and because the world’s wicked silence was all over heard and because we decided to be the toddler’s voice and pain and because Israel, the criminal state, decided to set the Jewish Extremist settler who burnt the toddler alive, free we decided this OP.”

See more at:




9:30 am

Hackers Expose New Method For Disabling Vehicles

See at:

Hackers Expose New Method For Disabling Vehicles



6:48 pm


Read more at http://investmentwatchblog.com/wikileaks-issues-e100000-bounty-for-leaked-ttip-tpp-documents/#AI0LchrkAsfRAF6S.99



4:48 am

Hacking Everything In Las Vegas

Report from Luke Rudkowski at  Defcon and Black Hat conferences.



10:57 am

New hacking technique that uses sound and radio waves can siphon data from devices even without internet access

A new hacking technique that uses sound and radio waves can siphon data from devices even without internet access. Showcased at the Black Hat security summit in Las Vegas, the ‘Funtenna’ hack has the potential to unravel the Internet of Things.

By uploading a malicious program to a device, the hackers can vibrate the physical prongs on general-purpose input/output circuits at a frequency of their choice. The resulting vibrations can be picked up by an AM radio antenna.

The setup, dubbed “Funtenna” by its creators, was presented to the audience at the Black Hat hacking conference in Las Vegas on Wednesday by Ang Cui of the Manhattan-based Red Balloon Security.

Read more at http://investmentwatchblog.com/new-hacking-technique-that-uses-sound-and-radio-waves-can-siphon-data-from-devices-even-without-internet-access/#goyCpTgJlzq14oge.99

10:47 am

Watch Everyday Items Get Hacked in Real-Time

Samy Kamkar, founder of the “Applied Hacking” YouTube channel, has proven time and time again just how vulnerable everyday common items can be.


In an effort to raise awareness and improve the security of such items, Kamkar has shown how to exploit everything from vehicles to motion-sensor doors.


Here are three videos showing everyday items being hacked in real-time.

See at:

Watch Everyday Items Get Hacked in Real-Time



8:37 am

‘BitDefender’ has recently been hacked and has had a portion of its customer data leaked.

See more at:




10:19 am

That time the Internet sent a SWAT team to my mom’s house

When I set out to research the out-of-control harassment problem in gamer culture, I never dreamed my mother would be caught up in the middle of it all.

Read more at:





3:16 pm

Mozilla sends Microsoft a no thank you letter for Windows 10


CHRIS BEARD, Mozilla’s fur-free CEO, has sent Microsoft’s Satya Nadella an open letter in which he criticises his peer for Windows 10 and the decision to automatically update systems.

Beard told Nadella that Microsoft’s move to take control over such measures is not one that he could support.

He said that it sends technology backwards, which must be the equivalent of a ‘your mum’ insult for the million dollar technology industry CEO community.

Beard reminded Nadella that a previous attempt to get Microsoft to follow the advice of a market-disrupting rival fell on deaf ears, which is why Mozilla is repeating its warning.

Read more at:





1:14 pm

Hackers Can Disable a Sniper Rifle—Or Change Its Target

At the Black Hat hacker conference in two weeks, security researchers Runa Sandvik and Michael Auger plan to present the results of a year of work hacking a pair of $13,000 TrackingPoint self-aiming rifles. The married hacker couple have developed a set of techniques that could allow an attacker to compromise the rifle via its Wi-Fi connection and exploit vulnerabilities in its software. Their tricks can change variables in the scope’s calculations that make the rifle inexplicably miss its target, permanently disable the scope’s computer, or even prevent the gun from firing. In a demonstration for WIRED (shown in the video above), the researchers were able to dial in their changes to the scope’s targeting system so precisely that they could cause a bullet to hit a bullseye of the hacker’s choosing rather than the one chosen by the shooter.


See more at:

Hackers Can Disable a Sniper Rifle—Or Change Its Target


9:16 pm

Anonymous releases hacked CSIS document, threatens to leak ‘stunning secrets at irregular intervals’

Secrets about the foreign activities of Canada’s spy agency — including the size of its network of foreign stations, the volume of sensitive communications they handle and their deeply antiquated system of information sharing — are revealed in what is purported to be a sensitive government document hacked by Anonymous and released Monday in a vendetta against Canadian authorities.

See at:

Anonymous releases hacked CSIS document after member’s death, threatens to leak ‘stunning secrets’


6:33 pm

Hacking Team hack casts spotlight on murky world of state surveillance

The recent dump of the company’s private documents revealed the blurred moral lines of ‘digital mercenaries’ providing software that could violate human rights

See more at:  





10:35 am

Cheating spouses rush to delete profiles from adultery site Ashley Madison after hackers access their details but it could already be too late ‘they plan to sell data to the highest bidder’

  • Millions of love cheats at risk of being found out after dating site hacked
  • Ashley Madison has 37m members around the world including 1.2m Brits
  • Anti-infidelity hackers Impact Team to leak data until website is closed
  • £15 fee to delete profiles is waived but hackers say it makes no difference 
  • Founder says he has made $1bn and says he would cheat on his own wife

Read more: http://www.dailymail.co.uk/news/article-3168620/CEO-Ashley-Madison-says-hack-inside-job-culprits-post-personal-information-users.html#ixzz3gXL7DL2f
Follow us: @MailOnline on Twitter | DailyMail on Facebook

The Impact Team say the website wrecks marriages and have told owners they will start publishing intimate details about users unless the site, known as the ‘Google of cheating’, is closed.

Two men – one American and one Canadian – have already been outed to prove their hack was successful.

Impact Team say Ashley Madison members should not have anonymity because they are ‘cheating dirtbags and deserve no such discretion.’ 

Read more: http://www.dailymail.co.uk/news/article-3168620/CEO-Ashley-Madison-says-hack-inside-job-culprits-post-personal-information-users.html#ixzz3gXKUls3p
Follow us: @MailOnline on Twitter | DailyMail on Facebook



3:17 pm

Ashley Madison, which uses the advertising slogan “Life is short. Have an affair,” said Monday it had been attacked and some user data was stolen.

Read more at http://investmentwatchblog.com/ashley-madison-hacked-a-dating-website-that-helps-married-people-cheat-has-been-hit-by-hackers-who-threatened-to-release-information-about-millions-of-customers/#c2SWChmo4RijUC1v.99



2:26 pm

A dramatic breach at an Italian surveillance company has laid bare the details of government cyberattacks worldwide, putting intelligence chiefs in the hot seat from Cyprus to South Korea.

The massive leak has already led to one spymaster’s resignation and pulled back the curtain on espionage in the iPhone age.

More than one million emails released online in the wake of the July 5 breach show that the Milan-based company Hacking Team sold its spy software to the FBI and to Russian intelligence. It also worked with authoritarian governments in the Middle East and pitched to police departments in the American suburbs.

Read more at http://investmentwatchblog.com/a-dramatic-breach-at-an-italian-surveillance-company-has-laid-bare-the-details-of-government-cyberattacks-worldwide-putting-intelligence-chiefs-in-the-hot-seat-from-cyprus-to-south-korea/#iV5vPYWShEzBRBpw.99
Read more at http://investmentwatchblog.com/a-dramatic-breach-at-an-italian-surveillance-company-has-laid-bare-the-details-of-government-cyberattacks-worldwide-putting-intelligence-chiefs-in-the-hot-seat-from-cyprus-to-south-korea/#iV5vPYWShEzBRBpw.99



8:26 pm

Firefox has blocked all versions of Flash Player by default until adobe gets their sh*t together
Read more at http://investmentwatchblog.com/firefox-has-blocked-all-versions-of-flash-player-by-default-until-adobe-gets-their-sht-together/#4fKzGlxAyXYBzk3h.99

Read more at http://investmentwatchblog.com/firefox-has-blocked-all-versions-of-flash-player-by-default-until-adobe-gets-their-sht-together/#4fKzGlxAyXYBzk3h.99




8:53 pm

Galileo, the leaked hacking software from Hacker Team (defense contractor), contains code to insert child porn on a target’s computer.

The security community is buzzing about the release of more than 400GB of corporate data from the Italian security firm Hacking Team, a revelation that’s being called the security industry’s version of the Edward Snowden leaks. Hacking Team has been previously accused of being willing to sell its services and software to anybody, even authoritarian regimes with active human rights investigations ongoing.

This leak, which included private emails, invoices, and client lists, removes all doubt about whether these allegations were true. It also reveals a cynical internal culture at Hacking Team — and it’s the care-free attitude toward their morally questionable work that seems to be evoking the most powerful public backlash.
Read more at http://investmentwatchblog.com/galileo-the-leaked-hacking-software-from-hacker-team-defense-contractor-contains-code-to-insert-child-porn-on-a-targets-computer/#5ab5GOCe4I7c5m28.99

9:07 am

The Secret Benefactors Of The NYSE ‘Glitch’

Following Wednesday’s “glitch” on the New York Stock Exchange (NYSE) and the grounding of United Airlines flight due to a “computer malfunction” around the same time, cybersecurity firms have seen an increase of 15% in their stock price. 


Read more at http://investmentwatchblog.com/the-secret-benefactors-of-the-nyse-glitch/#jOsFAm7z3MReKfbi.99


4:50 pm

Anonymous issued cryptic tweet on eve of NYSE suspension

The Department of Homeland Security said there was no indication the NYSE had been hacked, according to Bloomberg and CNN. The exchange said the glitch could not be attribute to “a cyber breach.”
“The issue we are experiencing is an internal technical issue and is not the result of a cyber breach,” it said in another statement. “We chose to suspend trading on NYSE to avoid problems arising from our technical issue. NYSE-listed securities continue to trade unaffected on other market centers.”



11:09 am

Hacking Team breach reveals a global spying firm run amok

On Sunday night, unidentified hackers published a massive, 400 gigabyte trove on BitTorrent (peer-to-peer file sharing) of internal documents from the Milan-based Hacking Team, a firm long accused of unethical sales of tools that help governments break into target computers and phones. The breached trove includes executive emails, customer invoices and even source code; the company’s twitter feed was hacked, controlled by the intruders for nearly 12 hours, and used to distribute samples of the company’s hacked files. The security community spent Sunday night picking through the spy firm’s innards and in some cases finding what appear to be new confirmations that Hacking Team sold digital intrusion tools to authoritarian regimes.



See more at:



6:52 pm

Hackers Hacked! Malware Firms Data Leaked, Ties with Regimes Exposed!

6:37 pm

Exposed: Establishment-Funded ‘Security Network’ Spying On Users

Tor is free open source software and a popular open network used to anonymize communications on the Internet.

Read more at http://investmentwatchblog.com/exposed-establishment-funded-security-network-spying-on-users/#CQEtiwfRhzXkK6Wv.99

10:26 am

Hacking Team, Which Sells Surveillance Tech To Governments, Exposed By Major Hack

One of the technology world’s most notorious providers of surveillance and intrusion software has found itself on the wrong end of an embarrassing hack.

A range of sensitive documents belonging to Italy-based Hacking Team, which is known for working with governments worldwide, appeared to leak out over the weekend, including email communications and client lists. The hackers, who remain unidentified at this time, also took over the group’s Twitter account, using it to post screenshots of emails and other details, as CSO first reported.

See more at:




8:53 am

The largest US federal employee union has lodged a lawsuit against the federal personnel office for failing to protect personal files from the most damaging cyberthefts in the country’s history.

See more at:

Federal employee union sues US government over data breach



Router malware spreads to steal passwords

Once the virus was running, not only would it steal your information, it would use your computer to send spam containing the virus. However, researchers have noticed that the virus has moved beyond just infecting computers.

The researches have seen hundreds of routers infected with Dyre that are communicating with hacker-run servers and sending out virus-filled spam. So far, the affected routers are ones running MikroTik and Ubiquiti’s AirOS operating systems.

See more here:

Router malware spreads to steal passwords




5:04 pm

Hackers Stole Secrets of U.S. Government Workers’ Sex Lives

OMG!  What a big surprise!  I guess somebody should have listened to the ‘conspiracy theorists.”  They ‘know what you did last summer.’  I sure am glad all I ever do is type.

Infidelity. Sexual fetishes. Drug abuse. Crushing debt. They’re the most intimate secrets of U.S. government workers. And now they’re in the hands of foreign hackers.
It was already being described as the worst hack of the U.S. government in history. And it just got much worse.

See more here:




10:22 am

The Man Behind An Encrypted Network That Will Take Down Facebook

In this video Luke Rudkowski talks to the CEO and one of many people behind minds.com a new opensource encyrpted social network that many are saying will destroy facebook.

Read more at http://investmentwatchblog.com/the-man-behind-an-encrypted-network-that-will-take-down-facebook/#UBTS3I4uPc44zLOM.99




11:17 am

“Effectively, this means that Google had taken itself the right to listen to every conversation in every room that runs Chrome somewhere, without any kind of consent from the people eavesdropped on.”

Google has been stealth downloading audio listeners onto every computer that runs Chrome

(Do we presume that Chrome is the only product doing this?)
Read more at http://investmentwatchblog.com/google-has-been-stealth-downloading-audio-listeners-onto-every-computer-that-runs-chrome/#arzxcSXeby01oI8i.99
Read more at http://investmentwatchblog.com/google-has-been-stealth-downloading-audio-listeners-onto-every-computer-that-runs-chrome/#arzxcSXeby01oI8i.99





11:34 am

Anonymous Hacks Canadian Government Over Bill C-51

Following the event, the hacker group Anonymous posted a Youtube video with a statement, where they officially claimed responsibility for the attack. The video said that their actions were a response to the newly passed anti-terrorism Bill C-51.

– See more at: http://pressfortruth.ca/top-stories/anonymous-hacks-canadian-government-over-bill-c-51/#sthash.px6jCfJM.dpuf



9:13 am

No one’s safe from hackers — not even LastPass, a company that stores people’s passwords.

On Monday, LastPass announced that hackers broke into its computer system and got access to user email addresses, password reminders, and encrypted versions of people’s master passwords.

So keeping all your passwords in a single place on the Internet might not be such a great idea.

LastPass said it discovered the digital break-in on Friday. It’s still very early in its investigation, but if LastPass is right, hackers didn’t manage to grab plain text versions of the all-powerful master passwords.

Read more at http://investmentwatchblog.com/password-company-hacked/#iR7MtP1D6Y5F7Zzo.99



9:25 am

CHINA HACKING U.S. – 2nd Hack of Federal Records Hits Intelligence & Military

The Chinese breach of the Office of Personnel Management network was wider than first acknowledged, and officials said Friday that a database holding sensitive security clearance information on millions of federal employees and contractors also was compromised.

In an announcement, OPM said that investigators concluded this week with “a high degree of confidence” that the agency’s systems containing information related to the background investigations of “current, former and prospective” federal employees, and others for whom a background check was conducted, were breached. The State Department is having some technical difficulties with its overseas passports and visa systems, and while it’s working to figure out the problem, it stopped giving out most new travel documents.

Read more at http://investmentwatchblog.com/china-hacking-u-s-2nd-hack-of-federal-records-hits-intelligence-military/#2lWxsm68Y4P6yBt4.99



4:21 pm

MegaNet: Kim Dotcom’s plan for uncensored, people-powered internet

In an announcement this morning, the entrepreneur confirmed that his MegaNet project will seek equity via a crowd-funding campaign set to launch on the January 2016 anniversary of the raid on Megaupload.

For many years Kim Dotcom was associated with a crazy lifestyle but these days he prefers to be seen more as a family man.

Read more at:

MegaNet: Kim Dotcom’s plan for uncensored, people-powered internet


8:07 am

I know what you did last edit…. Chrome extension lets anyone see every change you’ve made to Google documents

  • ‘Draftback’ was created by New York-based developed James Somers
  • It adds a button in Chrome that plays back the changes in a Google Doc
  • Since 2010, Google Documents has kept a detailed edit history of work
  • Without Draftback, only people with ‘edit’ permissions can see changes

Read more: http://www.dailymail.co.uk/sciencetech/article-3120426/Think-Google-Doc-edits-hidden-Think-Chrome-extension-lets-change-ve-made.html#ixzz3cqgs7sbP
Follow us: @MailOnline on Twitter | DailyMail on Facebook

6:24 am


But J. David Cox, president of the American Federation of Government Employees, said in a letter Thursday to OPM director Katherine Archuleta that based on incomplete information OPM provided to the union, “we believe that the Central Personnel Data File was the targeted database, and that the hackers are now in possession of all personnel data for every federal employee, every federal retiree, and up to 1 million former federal employees.”

Mike Rogers, the former chairman of the House Intelligence Committee, said last week that Chinese intelligence agencies have for some time been seeking to assemble a database of information about Americans. Those personal details can be used for blackmail, or also to shape bogus emails designed to appear legitimate while injecting spyware on the networks of government agencies or businesses Chinese hackers are trying to penetrate.

WOW. Convenient timing for government’s CYBER-TYRANNY.  ( It’s also like Mike Rogers’ wish-list.  He really wants to be relevant.)  (And also to DESTROY our freedom.)

Read more here:




1:24 pm

The Worm Turns: Virus Hunter Kaspersky Becomes the Hunted

The Russian IT security firm Kaspersky Lab has discovered a new, powerful cyber weapon, apparently a successor to the notorious Duqu software. But this time the virus hunter itself is a target. Now experts are scrambling to identify who’s behind it.

Read more at:




9:17 am

Top FBI Official Says Tech Companies Need To ‘Prevent Encryption Above All Else’

Usually, when we see clueless government lackeys discussing the need to backdoor encryption, they at least admit upfront that they think encryption is important in protecting private information. Even that nutty rambling speech by Homeland Security Appropriations chair Rep. John Carter recognized that there were important reasons to use encryption to protect privacy. And FBI boss James Comey usually does some hand waving to that effect as well. But apparently he forgot to tell one of his deputies.

Read more at:




7:37 pm

Hacked! 4 Million Federal Workers’ Data Stolen, DC Points Finger at Beijing

The Office of Personnel Management is the human resources department for the federal government, and the hackers were able to access a vast amount of sensitive information about federal employees, people familiar with the matter told the Wall Street Journal.

One US official who spoke with the Journal described the attack as one of the largest thefts of government data ever.

Read more: http://sputniknews.com/us/20150605/1022964852.html#ixzz3c8iMIUDt

Read more: http://sputniknews.com/us/20150605/1022964852.html#ixzz3c8idbNWm



3:04 pm

America’s Biggest Secret: Wikileaks Is Raising a $100,000 Reward for TPP Leaks

Curiously, according to Wikileaks, the TPP contains 29 chapters but only 5 pertain to trade. As Red State reports, “Wikileaks will be publishing the entire bill and they have already released the chapter on Investment.  It’s very interesting.  It is written in a such a way as to give multinational companies a huge advantage on trade.  If a public hospital is built close to a private one, the private hospital has the right to sue the country for expected losses.” The chapter on investment can be found here.

– See more at: http://www.thedailysheeple.com/americas-biggest-secret-wikileaks-is-raising-a-100000-reward-for-tpp-leaks_062015#sthash.9uuUQWdq.dpuf



1:12 pm

Thousands of sites block and redirect Congress to Patriot Act protest page

As of Sunday night, 14,827 websites and counting were blocking IP addresses associated with the US Congress, redirecting visitors away from their sites and toward a page protesting mass surveillance.


Read more at:

Thousands of sites block and redirect Congress to Patriot Act protest page


11:39 am

United Nations says encryption and anonymity online are human rights that must be protected

“Encryption and anonymity, and the security concepts behind them, provide the privacy and security necessary for the exercise of the right to freedom of opinion and expression in the digital age,” writes author David Kaye, a special rapporteur who will be presenting the paper to the UN Human Rights Council in June.

See more at:




3:38 am

The founder of the Silk Road drug marketplace has been sentenced to life in prison without parole

The convicted mastermind behind the world’s largest online narcotics emporium has been sentenced by a federal judge to two terms of life in prison and three lesser sentences, USA Today reports.

Read more: http://www.businessinsider.com/silk-road-drug-baron-sentenced-to-2015-5#ixzz3bba63QNI


11:43 am

This Text Message Can Crash, Reboot Any iPhone Instantly

A recently discovered bug in Apple’s mobile OS means that anyone can effectively crash another individual’s iPhone, or send it into Safe Mode if jailbroken, by simply sending a SMS or iMessage containing a specific set of non-Latin characters. The bug, as discovered by a number of keen-eyed Reddit users, causes an iOS device to immediately crash and reboot upon receiving of the message, as long as the device isn’t opened in the same conversation thread in which the message was received.

More at:   http://www.redmondpie.com/this-text-message-can-crash-reboot-any-iphone-instantly/


5:13 pm

IRS Hacked!!! “We’re confident that these are not amateurs, that these are actually organized crime syndicates.”

(The propaganda is really slipping.  Either they’re embarrassed because they got hacked by the South Park cast…or they did it themselves to make us afraid of hackers because the hackers are about to throw the psychopaths under the bus.)

The IRS said the thieves accessed a system called “Get Transcript.” In order to access the information, the thieves cleared a security screen that required knowledge about the taxpayer, including Social Security number, date of birth, tax filing status and street address.

Read more at http://investmentwatchblog.com/irs-hacked-were-confident-that-these-are-not-amateurs-that-these-are-actually-organized-crime-syndicates/#bO9bWTm5wHxPHukW.99


4:54 pm

From the Very Creation of the Internet, U.S. Spy Agencies Fought to Block Encryption

American spy agencies have intentionally weakened digital security for many decades. This breaks the functionality of our computers and of the Internet. It reduces functionality and reduces security by – for example – creating backdoors that malicious hackers can get through.

Read more at:

From the Very Creation of the Internet, U.S. Spy Agencies Fought to Block Encryption


9:52 am

Yemeni Group Hacks Saudi Gov’t, Releases Thousands of Top Secret Documents

A Yemeni hacking group announced that it has hacked the website, servers and archives of Saudi Arabia’s Foreign, Interior and Defense ministries and released thousands of top secret documents from the identity and contact addresses of the country’s spies to the most confidential correspondence of Riyadh officials in the last several decades.

“We have gained access to the Saudi Ministry of Foreign Affairs (MOFA) network and have full control over more than 3000 computers and servers, and thousands of users. We also have access to the emails, personal and secret information of hundreds of thousands of their staff and diplomats in different missions around the world,” the Yemen Cyber Army said in a statement carried by several globally known hacking news websites.

Read more at:

Yemeni Group Hacks Saudi Gov’t, Releases Thousands of Top Secret Documents


4:01 am

How Hackers Changed the World (BBC Documentary 2013)


12:59 pm

Anti-NSA Pranksters Planted Tape Recorders Across New York and Published Your Conversations

A WOMAN AT a gym tells her friend she pays rent higher than $2,000 a month. An ex-Microsoft employee describes his work as an artist to a woman he’s interviewing to be his assistant—he makes paintings and body casts, as well as something to do with infrared light that’s hard to discern from his foreign accent. Another man describes his gay lover’s unusual sexual fetish, which involves engaging in fake fistfights, “like we were doing a scene from Batman Returns.”

These conversations—apparently real ones, whose participants had no knowledge an eavesdropper might be listening—were recorded and published by the NSA. Well, actually no, not the NSA, but an anonymous group of anti-NSA protestors claiming to be contractors of the intelligence agency and launching a new “pilot program” in New York City on its behalf.

That anonymous email was followed by an envelope sent to WIRED’s New York office containing a single page with the printed words “We’re listening as you read this,” along with the group’s website url. Inside the envelope was also one of the group’s tape recorders (without a tape) and a USB stick containing the video below, which shows one of the recorders being surreptitiously planted under a restaurant table, marked with the words “PROPERTY OF NSA.”

See more at:

Anti-NSA Pranksters Planted Tape Recorders Across New York and Published Your Conversations


10:28 am

Hackers Hit St. Louis Federal Reserve

Hackers took over part of the St. Louis Federal Reserve’s website last month to redirect users to fake pages, potentially subjecting visitors seeking economic data and research to malware and phishing attacks, the bank said Monday.

On April 24, attackers took over the domain name service used by the St. Louis Fed to “redirect some of the Bank’s web traffic that day to rogue Web pages they created to simulate the look of the St. Louis Fed’s research.stlouisfed.org website,” a spokesperson for the institution said in a statement. That means people who logged in gave up their credentials to hackers.

See more at:   http://govtslaves.info/hackers-hit-st-louis-federal-reserve/


11:32 am

Man Who Hacked And HiJacked Airplane On The Run From FBI, John McAfee Speaks Out

Read more at http://investmentwatchblog.com/man-who-hacked-and-hijacked-airplane-on-the-run-from-fbi-john-mcafee-speaks-out/#6LBORCfP87CUCMRe.99


1:23 pm

Security researcher tells FBI he took control of a commercial airliner – even making it fly sideways – by hacking into the entertainment system 

  • Chris Roberts told FBI agent he had hacked flight entertainment systems
  • He compromised such systems up to 20 times from 2011 to 2014, he said
  • On one flight he ‘overwrote aircraft’s thrust management computer code’
  • He then managed to ‘issue climb command and turn the plane sideways’
  • Despite FBI interviews in February and March, Roberts was not charged
  • However, agency confiscated two of his laptops and several hard drives 
  • Roberts was kicked off United Airlines flight in April after a ‘tweet threat’
  • He had told followers that he might hack the aircraft’s onboard systems

Read more: http://www.dailymail.co.uk/news/article-3084856/Security-researcher-admits-FBI-hacked-commercial-airline-s-entertainment-took-control-plane-making-climb-fly-sideways.html#ixzz3aPwasWk7
Follow us: @MailOnline on Twitter | DailyMail on Facebook
Read more: http://www.dailymail.co.uk/news/article-3084856/Security-researcher-admits-FBI-hacked-commercial-airline-s-entertainment-took-control-plane-making-climb-fly-sideways.html#ixzz3aPwUBHmW
Follow us: @MailOnline on Twitter | DailyMail on Facebook


4:52 pm


A security researcher kicked off a United Airlines flight last month after tweeting about security vulnerabilities in its system had previously taken control of an airplane and caused it to briefly fly sideways, according to an application for a search warrant filed by an FBI agent.
Read more at http://www.wnd.com/2015/05/feds-say-banned-researcher-commandeered-plane/#QrOVCQjxi8evQAWI.99


3:34    am

NSA Chief: We May Retaliate for Cyberattacks With Real Weapons

Admiral Michael Rogers, who took over as head of the NSA last April, said that there may be times when the US could go beyond a cyber response.

“Because an opponent comes at us in the cyber domain doesn’t mean we have to respond in the cyber domain,” Rogers said, at a forum at George Washington University on Monday. “We think it’s important that potential adversaries out there know that this is part of our strategy. The whole goal is you do not want to engage in escalatory behavior.”

Read more: http://sputniknews.com/military/20150513/1022114124.html#ixzz3a60XAQVk

Read more: http://sputniknews.com/military/20150513/1022114124.html#ixzz3a60pcUPY


5:11 pm

Anonymous retaliates against Papa John’s for NDA attacking free speech

When news leaked of a controversial nondisclosure agreement forbidding Papa John’s employees from discussing anything that isn’t work-related, the mainstream hacker collective calling itself Anonymous has stepped up to defend the free speech rights of all Papa John’s employees by orchestrating a series of DDoS attacks and SQL-injections against the Papa John’s website.

Read more here:

Anonymous retaliates against Papa John’s for NDA attacking free speech


5:33 pm


Hesder is an Israeli yeshiva program which combines advanced Talmudic studies with military service in the Israel Defense Forces. Hesder is usually a program for the National Religious, but the new intiative focuses on the Haredim. Derech Chayim combines Torah studies and military service, as in all hesder yeshivot, but in addition, the students engage in technological studies, with an emphasis on cyber-warfare.

Read at:



4:59 pm


Yet another report has surfaced describing how tools created by the companies selling software that can damage and hack into people’s computers are being deployed by U.S. security services. While the coverage surrounding this story focuses primarily on federal agencies it’s important to step back for a moment and view the big picture. In particular, looking at who builds, operates, and profits from mass surveillance technology offers insight into the nature of the global panopticon.

Read more at:



12:24 pm

The Biggest Military Hack Ever Exposes NASA Secret ‘UFO Files’

Between February 2001 and March 2002 Gary McKinnon from North London, looking for evidence of free energy suppression and a cover-up of UFO activity and other technologies potentially useful to the public, hacked into 16 NASA computers as well as dozens of US Army, Navy, Air Force, and Department of Defense computers. The search for evidence of a UFO cover-up, however, landed McKinnon in trouble.

The Americans believed he had caused $800,000 (£487,000) worth of damage to computers between 2001 and 2002. On 16 October 2012, after a series of legal proceedings in Britain, Home Secretary Theresa May withdrew her extradition order to have him brought to the United States. She took the quasi-judicial decision on human rights grounds because of medical reports warning that McKinnon, who has Asperger syndrome and suffers from depressive illness, could kill himself if sent to stand trial in the US.

“I am not blind to criminality, but I was on a moral crusade. I was convinced, and there was good evidence to show, that certain secretive parts of the American government intelligence agencies did have access to crashed extra-terrestrial technology which could, in these days, save us in the form of a free, clean, pollution-free energy. I thought if someone is holding onto that, it is unconstitutional under American law. I didn’t think about jail sentences at the time”.

Read more here:

The Biggest Military Hack Ever Exposes NASA Secret ‘UFO Files’


4:54 pm

‘Ugliest bride I have ever seen… Bridezilla’: Newlywed left devastated after photographer slams her on Facebook when she complained about his photographs – but he says his account was hacked

  • A bride and wedding photographer have gone to war on social media
  • Ashlea Howard claims Lee Maxwell Judd ruined her wedding snaps
  • She married Daniel Howard on February 21 at Bendooley Estate in Berrima
  • Mr Judd called Mrs Howard a Bridezilla online – he says his account was hacked

Read more: http://www.dailymail.co.uk/news/article-3070376/Ugliest-bride-seen-Bridezilla-Newlywed-left-devastated-photographer-slams-Facebook-complained-photographs-says-account-HACKED.html#ixzz3ZOTui1Fb
Follow us: @MailOnline on Twitter | DailyMail on Facebook


6:17 pm

US internet censorship mirrors China’s

As noted by McClatchy Papers in a recent piece, that monitoring – the “Great Firewall,” as it is – takes place behind a large, walled-off compound near Beijing’s Forbidden City known as Zhongnanhai. There, technicians answerable to the Party manage China’s 24-hour control of all Internet traffic into, out of, and within the country.

Learn more: http://www.naturalnews.com/049593_censorship_China_Internet.html#ixzz3ZIyTXBwF

7:09 am

World’s first anti-propaganda search engine launching soon that favors Independent Media while banning government and corporate disinfo  

“For the last six months, I have been working hard on the development of a breakthrough search engine that will finally offer a credible search alternative to the NSA-funded, surveillance-state search engines currently dominating the web.”

“Next week, I’ll be opening the webmaster URL submit page for the world’s first independent, anti-propaganda search engine that filters out corporate propaganda and government disinformation. The search engine is free to submit to and free to use. It’s funded entirely by advertising that appears on the search results page.”

Learn more: http://www.naturalnews.com/049591_anti-propaganda_search_engine_independent_media_corporate_disinfo.html#ixzz3ZGG8EEmL

Learn more: http://www.naturalnews.com/049591_anti-propaganda_search_engine_independent_media_corporate_disinfo.html#ixzz3ZGGKb6n6

Learn more: http://www.naturalnews.com/049591_anti-propaganda_search_engine_independent_media_corporate_disinfo.html#ixzz3ZGGKb6n6


6:59 am

Medical equipment can be taken over and controlled remotely by hackers

The development of a form of medical technology known as telesurgery, which uses robotic arms capable of performing surgery that can be remotely controlled, has tremendous potential to save lives and money. The ability to remotely perform a surgical procedure is an inexpensive way to partially solve the problems associated with the lack of expert surgeons in remote areas, for example.

Learn more: http://www.naturalnews.com/049589_telesurgery_hackers_cyber_security.html#ixzz3ZAN8qOgU

Learn more: http://www.naturalnews.com/049589_telesurgery_hackers_cyber_security.html#ixzz3ZANHN9B4


7:50 am

This Hacker has Implanted a Chip in his Body to Exploit your Android Phone

Wahle took an NFC chip, similar to the kind found in many of today’s smartphones, and injected it between the thumb and finger of his left hand. According to Forbes, the injection was something of an eye-watering experience.

See more at:

This Hacker has Implanted a Chip in his Body to Exploit your Android Phone


8:33 pm

Just Google It: Info to Hack a Military Drone is Already Online

“The information necessary to hack a military drone is freely available to the public, in academic publications and online documents, according to an Israeli defense manufacturer.”

Read more: http://sputniknews.com/military/20150429/1021497888.html#ixzz3Yeav9irh

Read more: http://sputniknews.com/military/20150429/1021497888.html#ixzz3Yeb0Gbhw


12:10 pm


“So an increasingly important alternative is the possibility of telesurgery with an expert in one place controlling a robot in another that physically performs the necessary cutting and dicing. Indeed, the sale of medical robots is increasing at a rate of 20 percent per year.”
Read more at http://investmentwatchblog.com/robot-surgeon-hacked/#6pPf87E7wcF7OOhA.99


9:18 am

Potent, in-the-wild exploits imperil customers of 100,000 e-commerce sites

Actively exploited bug in Magento could compromise customer data on a massive scale.

Read more here:



4:37 pm

ANONYMOUS issues a warning on Jade Helm 15. Advises Americans to purchase firearms while still possible…

“Sooner or later,  brothers and sisters in America, a non-violent battle will  not work, if we fail to unite before then”

Read more at http://investmentwatchblog.com/anonymous-issues-a-warning-on-jade-helm-15-advises-americans-to-purchase-firearms-while-still-possible/#VU9Pv72f0C5uizdG.99


6:12 pm

Wikileaks has proof Fox, Disney, NBCUniversal, Paramount/Viacom, Sony, Warner Bros., and the MPAA are attempting to influence ISPs to block sites entirely.

“At the right time, we would quietly approach ISPs with which we have good relationships and which we believe might consider cooperating with us to test US site blocking. If any US ISPs are prepared to cooperate — and we can create a track record of effective site blocking in the US — the environment for US site blocking more broadly will become significantly more favorable. We do not need to decide in advance how to proceed if no US ISP is prepared to work with us cooperatively.”
Read more at http://investmentwatchblog.com/wikileaks-has-proof-fox-disney-nbcuniversal-paramountviacom-sony-warner-bros-and-the-mpaa-are-attempting-to-influence-isps-to-block-sites-entirely/#OdlcqKQqvefyCpkT.99


7:19 pm

Israeli Military Networks Penetrated by Hackers

Hackers managed to breach the computer networks of the Israeli military sending out emails to numerous military addresses that claimed to show breaking military news.

Read more: http://sputniknews.com/middleeast/20150417/1021042997.html#ixzz3XbyngQTE


6:43 pm

DEA, US Army bought $1.2M worth of hacking tools in recent years– Remote access malware either already has or will soon turn up in local cops’ kits.

“Hacking Team openly advertises what it calls its “Remote Control System,” (RCS) a piece of malware remotely installed on a target’s computer or smartphone. As the company touts: “Evidence collection on monitored devices is stealth and transmission of collected data from the device to the RCS server is encrypted and untraceable.”

More here:


3:19 pm

Leaks Show How Sony Is Connected To The White House

“Secret-spilling group WikiLeaks has taken the trove of documents stolen during last year’s colossal Sony Pictures Entertainment hack and made them searchable through a new database to show “the inner workings of an influential multinational corporation.”

“The Sony Archives include 30,287 documents from Sony Pictures Entertainment (SPE) and 173,132 emails, to and from more than 2,200 SPE email addresses.”

Read at:

Leaks Show How Sony Is Connected To The White House


8:41 am

Cyber Emergency: Pentagon Drafting Thousands of ‘Cyber Forces’ for Future Event

“The Pentagon intends to draft personnel for its cyber reserve force from civilians as well as the National Guard in the event of a network emergency, a top military official told the Senate Armed Forces committee on Tuesday.”
Read more at http://investmentwatchblog.com/cyber-emergency-pentagon-drafting-thousands-of-cyber-forces-for-future-event/#wwicGotivDoA8P9p.99



9:11 am

Prosecutors suspect man hacked lottery computers to score winning ticket

“Eddie Raymond Tipton, 51, may have inserted a thumbdrive into a highly locked-down computer that’s supposed to generate the random numbers used to determine lottery winners, The Des Moines Register reported, citing court documents filed by prosecutors. At the time, Tipton was the information security director of the Multi-State Lottery Association, and he was later videotaped purchasing a Hot Lotto ticket that went on to fetch the winning $14.3 million payout.”

(Or, maybe somebody set him up.  It would be really stupid to do what is claimed, and also perceived AIR-GAP Security is a fallacy.)

Read more at:



12:21 pm

International cybersquad takes down ‘Beebone’ botnet

“The Joint Cybercrime Action Taskforce—an agency launched last year in partnership with law enforcement from the United States, United Kingdom and the European Union—said on Thursday this week that it’s seized the command-and-control server that had been used to operate the so-called ‘Beebone’ botnet.”

See more here:



7:39 pm

Worried about cyberfraud? If you live in the UK or US you’ve been hacked ALREADY says real life Catch Me If You Can conman

  • Conman who inspired Spielberg film says personal details no longer safe
  • Frank Abagnale, with FBI for 35 years, says IDs have already been stolen
  • Fraud expert calls level of theft ‘unimaginable’ in the technological age

Read more: http://www.dailymail.co.uk/news/article-3027379/Worried-cyberfraud-live-UK-ve-hacked-says-real-life-Catch-conman.html#ixzz3WZjs4bRM
Follow us: @MailOnline on Twitter | DailyMail on Facebook


8:25 am

Anonymous Hackers Vow to Shutdown IT System of Irish Government


11:00 am

This Guy Could Have Deleted Everything on YouTube, but He Resisted

Smart tech firms like Google and Facebook routinely pay hackers and miscellaneous security geeks to find (and report) security flaws. This way, companies can plug the holes before someone less scrupulous can use them to mess with our data online. It’s a good system, and as Hismatullin, one such geek, details in a personal blog post, he recently landed a whopper: the ability to instantly delete any video on YouTube. All it took was sending a very, very short string of text to the site, and no matter whose video you’d targeted, it’d vanish as if the owner himself had trashed it.

See more at:



1:26 pm

Father discovers Facebook photos of him and his seven-year-old daughter were used to scam $4,000 from Austrian woman

  • Antonio Valente, from Dallas, Texas, learned his photos had been used in a scam after he was contacted by the victim, Marianne Heinrich from Vienna
  • She had been befriended online by a man calling himself ‘Johnson Michael Lynn’ who said he wanted to marry her and live with her and his daughter
  • She sent him $4,000 – but realized it was a scam and tracked Valente down
  • He has now reported the problem to Facebook who removed the profile 

Read more: http://www.dailymail.co.uk/news/article-3023181/Father-discovers-Facebook-photos-seven-year-old-daughter-used-scam-4-000-Austrian-woman.html#ixzz3WApw49bc
Follow us: @MailOnline on Twitter | DailyMail on Facebook

6:09 am

I had to look this up, I thought it was an April fool’s joke. Obama declares a “national emergency” because the internet leaks truth now and again? Look up, for your redemption draweth nigh.

Heads Up! Obama Issues Executive Order On Hackers Amid Cyber Security ‘National Emergency’


4:44 am

GitHub suffers ‘largest DDoS’ attack in site’s history

“The coding website is a popular repository for projects from game engines to security applications and web app frameworks, and is used by programmers and tech firms to develop and share tools. Since Thursday, the website has been under fire in a DDoS attack of a scale which has forced GitHub staff to rally and attempt to mitigate access problems.”

“In a blog post last week, GitHub said the distributed denial of service (DDoS) attack is the largest in github.com’s history. Beginning on March 26, at the time of writing the onslaught is yet to end.”

Read more here:



6:17 am

IT Independence is National Security

“However, a simpler and more logical explanation remains, though it is one manufacturers vehemently deny; that the NSA had/has direct access to the factory floors of several IT giants. These include Western Digital Corporation, Seagate Technology, Toshiba Corporation, IBM, Micron Technology and Samsung Electronics.”

“Besides access to factory floors, several high profile “cyber attacks” attributed to China targeting US tech giants, may have been in fact the NSA itself attempting to steal source code required to rewrite hard drive firmware.”

“It was during the 2011 Arab Spring uprisings that it became clear US Internet giants Google, Facebook and Twitter were directly involved with the US State Department in helping organize unrest across much of North Africa and the Middle East. Source code being raided in 2009, then turning up as the key ingredient necessary to cook up what is believed to be NSA malware in 2015, suggests every once in a while the NSA steps on its partners’ toes. ”

More at:   http://www.activistpost.com/2015/03/it-independence-is-national-security.html


7:28 am


So, until recently, the FBI was actively recommending you encrypt your data to protect your safety — and yet, today it’s “an affront to the rule of law.” Is this guy serious?

More directly, this should raise serious questions about what Comey thinks his role is at the FBI (or the FBI’s role is for the country)? Is it to keep Americans safe — or is it to undermine their privacy and security just so it can spy on everyone?

Not surprisingly, Comey pulls out the trifecta of FUD in trying to explain why it needs to spy on everyone: pedophiles, kidnappers and drug dealers:

“Tech execs say privacy should be the paramount virtue,” Comey continued, “When I hear that I close my eyes and say try to image what the world looks like where pedophiles can’t be seen, kidnapper can’t be seen, drug dealers can’t be seen.”

Read here:  http://www.blacklistednews.com/As_crypto_wars_begin%2C_FBI_silently_removes_sensible_advice_to_encrypt_your_devices/42987/0/38/38/Y/M.html


9:55 am

Adobe Flash fix FAIL exposes world’s most popular sites… You had one job, Adobe, one job …

“Hackers Luca Carettoni and Mauro Gentile found a badly-applied four-year-old Adobe patch allows attackers to steal information and commandeer accounts for three of the world’s top ten websites and ‘many’ others.”

Read at:  http://www.theregister.co.uk/2015/03/24/borked_adobe_flash_files_expose_worlds_most_popular_sites/


1:39 pm



9:22 am

ALERT!! Google Hacking ‘YOUR’ Computer Through YouTube Browser PROOF
Read more at http://investmentwatchblog.com/alert-google-hacking-your-computer-through-youtube-browser-proof/#TRPhz4bUAyUIgM9b.99

Read more at http://investmentwatchblog.com/alert-google-hacking-your-computer-through-youtube-browser-proof/#TRPhz4bUAyUIgM9b.99


3:47 pm


“While most of us have been busy thinking about net neutrality, guess what Google has been doing. The leading search engine has decided to change the criteria it uses for ranking content on the internet, so that content will no longer be ranked by popularity, as it has been since the beginning. The new ranking system will instead use what it has determined to be ‘truth’ as its ranking tool. This Orwellian move opens the door for Google to homogenize thought and become the global arbiters of truth, with the ability to send content it declares as ‘untrue’ into the dustbin of obscurity.”

Read more at:



4:35 pm


2:11 pm

Encryption Backdoors Will Always Turn Around And Bite You In The Ass

“They talk about ridiculous things like “golden keys,”pretending that it’s somehow possible to create something that only the good guys can use. Many in the security community have been pointing out that this is flat-out impossible. The second you introduce a backdoor, there is no way to say that only “the good guys” can use it.”

This might be academic if it was just a history lesson — but for the past several months, U.S. and European politicians have been publicly mooting the notion of a new set of cryptographic backdoors in systems we use today. This would involve deliberately weakening technology so that governments can intercept and read our conversations. While officials are carefully avoiding the term “back door” — or any suggestion of weakening our encryption systems — this is wishful thinking. Our systems are already so complex that even normal issues stress them to the breaking point. There’s no room for new backdoors.

More at:   https://www.techdirt.com/articles/20150304/06534030206/encryption-backdoors-will-always-turn-around-bite-you-ass.shtml


12:31 am

‘FREAK’ flaw undermines security for Apple and Google users, researchers discover

“Technology companies are scrambling to fix a major security flaw that for more than a decade left users of Apple and Google devices vulnerable to hacking when they visited millions of supposedly secure Web sites, including Whitehouse.gov, NSA.gov and FBI.gov.”

“Researchers discovered in recent weeks that they could force browsers to use the weaker encryption, then crack it over the course of just a few hours. Once cracked, hackers could steal passwords and other personal information and potentially launch a broader attack on the Web sites themselves by taking over elements on a page, such as a Facebook “Like” button.”

Read more at:   http://www.washingtonpost.com/blogs/the-switch/wp/2015/03/03/freak-flaw-undermines-security-for-apple-and-google-users-researchers-discover/


3:20 am

We Now Know The NSA And GCHQ Have Subverted Most (All?) Of The Digital World: So Why Can’t We See Any Benefits?

“First, that the recent attempts by politicians to demonize strong encryption look like an attempt to cover up the fact that most digital systems are already vulnerable using one or more of the techniques that have been revealed over the last year or two. That is, the NSA and GCHQ can probably access most digital content stored or transmitted in any way — either because the encryption itself or the end-points have been compromised.”

Read more at:   https://www.techdirt.com/articles/20150220/10115530090/we-now-know-nsa-gchq-have-subverted-most-all-digital-world-so-why-cant-we-see-any-benefits.shtml


1:10 pm

US Court Rules That Kim Dotcom Is A ‘Fugitive’ And Thus DOJ Can Take His Money

“In the long, convoluted and complex legal battles facing Megaupload founder Kim Dotcom, there was some bizarre stuff that happened late last year. As you may recall, early on, the US government seized basically all of his stuff and money. Dotcom has made efforts to get some of it returned, as it’s tough to fight the most powerful government in the world when it’s holding onto all of your money.”

See more here:   https://www.techdirt.com/articles/20150227/18171630168/us-court-rules-that-kim-dotcom-is-fugitive-thus-doj-can-take-his-money.shtml


1:04 pm

Facebook outage

“Unexplained outages took down a number of popular Internet services Monday night, including Facebook, Instagram, HipChat, and possibly others. Notorious hacker group The Lizard Squad took credit.”

Outage Analyzer first noted Facebook’s outage at 10:24 PM on Monday night, and reported numerous other outages affecting the company’s servers. Both the Android app as well as the main Web site were unresponsive. ”

Read more at:   http://www.pcworld.com/article/2875973/internet-problems-take-out-facebook-instagram-others.html


5:07 pm

THIN LIZZY – The Boys Are Back In Town (1976 UK T.O.T.P. TV Appearance) ~ HIGH QUALITY HQ ~


4:57 am

Solving the mystery of shadow hacker organization the Equation Group: Part I

“What may sound like the start to a Tom Clancy novel, or an episode of 24, is, in fact, completely real, the likes of which actually happened to one or more researchers back in 2009. In fact, surreptitious,interdiction-based cyberattacks like this one have apparently been happening since at least the early 2000s and may date back to 1996.”

“Last Monday, Moscow-based Kaspersky Lab released a cybersecurity report uncovering details about the most sophisticated, covert, and pervasive hacker groups known to man and possibly ever imagined. The organization, dubbed the Equation Group due to the group’s affinity towards sophisticated encryption methods, had operated practically undetected for over a decade, silently infecting computers across the globe and delivering attack payloads still unknown.”

”What make Equation Group so impressive are their “almost superhuman” technical feats, which include never-before-seen levels of ingenuity in hacking, engineering, and encryption. Those feats include:

  • using virtual file systems like those found in the Regin (a.k.a. WarriorPride) malware attack used by the NSA to infect overseas computers;
  • the ability to infect and surveil sensitive air-gapped (i.e. non-Internet connected) networks by piggybacking on USB flash drives, much like the Stuxnet virus;
  • encrypting malicious files and storing them in multiple branches of the Windows registry, making it immune to detect with antivirus software;
  • using over 300 Internet domains and 100 servers to command and control malware infrastructure; and
  • hijacking URL requests on iPhones to spoofed Mac servers, which indicates that Equation Group has compromised the iOS and OSX operating systems.”

“Equation Group is more than likely a clandestine operation of the U.S. government.”

Read more at:   http://beforeitsnews.com/science-and-technology/2015/02/solving-the-mystery-of-shadow-hacker-organization-the-equation-group-part-i-2750728.html


11:19 am

Yahoo exec grills NSA director over ‘backdoor’ access to private data

Yahoo’s chief information-security officer attacked the NSA’s director over building “backdoors” to allow government spying on selected users. Mike Rogers defended the practice, saying it should be done within a “legal framework.”

“It sounds like you agree with [Federal Bureau of Investigation Director James] Comey that we should be building defects into the encryption in our products so that the US government can decrypt,” Yahoo’s chief information-security officer, Alex Stamos, said during the ‘Cybersecurity for a New America: Big Ideas and New Voices’ conference.

Rogers cut the question off, saying: “That would be your characterization.”

Read more at:   http://rt.com/usa/234891-nsa-backdoor-access-data/


7:00 am

How two Palestinian Americans plan to PIVOT the world

“The  app, which will peel back layers of time of a specific place, includes interactive audio/video features, oral histories and augmented reality. The app will first focus on locations in Palestine and Harvard University but will launch for users all over the world.”

“For Jaber and Jitan, the project has an urgent personal quality that is crucially connected to “building a community”. In fact, they call it a “movement” a “mission to connect people” to histories that matter to them, not to mention being a “living breathing” child that keeps them up at all hours of the night.”

– See more at: http://mondoweiss.net/2015/02/working-pivot#sthash.cW7p9JJK.dpuf

– See more at: http://mondoweiss.net/2015/02/working-pivot#sthash.cW7p9JJK.dpuf


5:06 am

It’s Time for Intelligence Agencies to Shut the Hell Up About Encryption

“The complaining from these agencies is a bit disingenuous.”

Read more here:   http://motherboard.vice.com/read/its-time-for-intelligence-agencies-to-shut-the-hell-up-about-encryption


12:21 am

Hacker from Anonymous Says He Was Charged After Refusing to Help FBI


11:27 am

Internet-connected pacemakers will provide a “kill switch” in patients’ hearts

“Remote wireless monitoring of patients via the worldwide web is increasing, according to telematics research engineer Jasone Astorga, of Spain’s University of the Basque Country, the only public academic institution in the northern portion of the country. In recent years, new progress has been made in the area of remote monitoring, via means of implanted sensors.”

“In August 2009, Popular Science reported that the first American patient received an Internet-connected pacemaker:

Carol Kasyjanski of New York became the first patient to receive the new pacemaker, which was made by St. Jude Medical Inc. and approved by the FDA in July. The device downloads all its information into a remote monitor in Kasyjanski’s home at least once a day and the monitor automatically assesses the performance of both the pacemaker and the patient’s heart. Then it uploads the information to a central server.”

Learn more:http://www.naturalnews.com/048669_pacemakers_internet_connection_kill_switch.html#ixzz3S7AI0b81

Learn more:http://www.naturalnews.com/048669_pacemakers_internet_connection_kill_switch.html#ixzz3S79s7tWc

Learn more:http://www.naturalnews.com/048669_pacemakers_internet_connection_kill_switch.html#ixzz3S7A0Sily


9:54 am

Tech Privacy has Been a Myth. A New Stone Age Beckons

“Why on earth would a foreign marketplace import American technology if they know that there is a very good chance the technology will be countermanded and the data use against the owner? It is akin to wheeling in a Trojan horse when actually knowing what lays hidden inside.”
Read more at http://investmentwatchblog.com/nsa-trojan-firmware-widespread-u-s-international-tech-reputation-may-suffer-tech-privacy-has-been-a-myth-a-new-stone-age-beckons/#lsd5FrzuCsZdgcQ6.99


1:39 pm

1 billion data records were stolen last year, thanks to poor security

“Security came into prime focus last year after a spate of high-profile attacks on banks and retailers. Banking giant JPMorgan Chase, and retailer Target were named two of the largest breaches in US history. But concerns over data security were carried into the new year with an attack on health insurance provider Anthem, with up to 80 million records taken.”

Read more at:   http://www.zdnet.com/article/in-2014-more-than-1500-data-breaches-led-to-1-billion-records-stolen/

5:36 am

What Hackers Really Want With Your Data

Read more at http://investmentwatchblog.com/what-hackers-really-want-with-your-data/#POM4UJkzmYrXsJT5.99


3:31 am

Feds Unveil New Surveillance Tool Developed by DARPA that Could Kill the ‘Dark Web’

“The dark web is an unseen iceberg composing more than 95% of the real activity of the web, where databases, password-protected websites, official records from federal, state and local governments, various intranets, messageboards, website archives, forums and vast catalogues of data all reside.”

“White and black hat hackers, law enforcement agencies and criminal networks all operate there in the shadows.”
Read more at http://investmentwatchblog.com/feds-unveil-new-surveillance-tool-developed-by-darpa-that-could-kill-the-dark-web/#tCUsBgr0QvTtfoAy.99


5:59 am

Million Mask March in London


9:59 am

Twitter Bot ‘Issues’ Death Threat, Police Investigate

“So, van der Goot had to explain how his bot worked. The bot (which was actually created by another person but “owned” by van der Goot) reassembles chunks of his past tweets, hopefully into something approaching coherence. On this occasion, it not only managed to put together a legitimate sentence, but also one threatening enough to attract the interest of local law enforcement.”

Read more at:   https://www.techdirt.com/articles/20150211/14002829991/twitter-bot-issues-death-threat-police-investigate.shtml


5:29 am

‘I’m tired of running’: John McAfee reveals he’s settled with his wife in Tennessee – but is always armed and ready for a government raid

  • The software tycoon, 69, has now settled in plain sight in Lexington with his wife Janice – even though he believes he’s still a wanted man
  • He fled Belize in 2012 after he was named as a person of interest in his neighbor’s shooting death
  • But he claims the Belize government wanted the excuse to hold him because he had repeatedly accused them of corruption
  • He has since been moving ‘from hotel to hotel’ to avoid assassins from Belize but said he is now staying in one place – with a loaded gun 

Read more: http://www.dailymail.co.uk/news/article-2949722/John-McAfee-reveals-s-settled-wife-Tennessee-armed-ready-government-raid.html#ixzz3RWdTPG5I
Follow us: @MailOnline on Twitter | DailyMail on Facebook

3:05 am

US Creates Cyber-CIA to Fight Hackers

“Right now, cybersecurity is managed by a hodgepodge network consisting of the National Security Agency, Department of Homeland Security, FBI, and CIA, but a lack of coordination between these departments is a critical weakness in US intelligence. The CTIIC will, theoretically, serve to pool all of this cybersecurity information in one place.”

This means that they’re RECRUITING hackers.   The police state is dead any time the hackers say so.

– See more at: http://www.thedailysheeple.com/us-creates-cyber-cia-to-fight-hackers_022015#sthash.sLrEtOAb.dpuf


10:48 am

NSA Claims Iran Learned From Western Cyberattacks

“A  top secret National Security Agency document from April 2013 reveals that the U.S. intelligence community is worried that the West’s campaign of aggressive and sophisticated cyberattacks enabled Iran to improve its own capabilities by studying and then replicating those tactics.”

See more here:   http://www.lewrockwell.com/2015/02/no_author/why-why-its-terrorism/


1:00 pm

Hacktivisit group Anonymous claims it has ‘exposed and destroyed’ more than 1,000 ISIS-related sites, accounts and emails since declaring war on jihadists after Charlie Hebdo massacre

  • Group releases video citing successes since launch of January offensive
  • Anonymous declared war after the Paris attacks, which left 17 dead
  • Pledged to close jihadi social network accounts to avenge those murdered 

Read more: http://www.dailymail.co.uk/news/article-2947691/Anonymous-war-ISIS-Claims-exposed-destroyed-1-000-accounts.html#ixzz3RMl9Rmgx
Follow us: @MailOnline on Twitter | DailyMail on Facebook


1:27 pm

3:59 am


“According to the report, which is scant on technical details, DARPA engineers dialed in through the Impala’s OnStar system, transmitted a data packet that confused the internal computers, and then planted a malicious bit of code that allowed it to reprogram control systems on the ECU.”

I think the process was easier fifteen years ago when I first read about car-hacking

Read more here:  http://www.blacklistednews.com/%E2%80%8BDARPA_Hacks_GM%27s_OnStar_To_Remote_Control_A_Chevrolet_Impala/41648/0/38/38/Y/M.html.


4:20 pm

Massive Utah cyberattacks aimed at NSA facility? 300 million per day!

Read more at http://investmentwatchblog.com/massive-utah-cyberattacks-aimed-at-nsa-facility-300-million-per-day/#GoFzbTs7AZtMkvai.99


4:18 am

Experts warn that new malware called BlackEnergy could be used to sabotage America’s most critical infrastructure

“Stuxnet, it is a weapon, it’s not ‘like’ a weapon,” says German computer security expert Ralph Langner, who was the first to identify how the virus worked. “It is a weapon because it was designed to cause physical damage.”

“Malicious code could theoretically be used to manipulate the controls of pipelines, water purification systems, power generators and other critical infrastructure, resulting in real-world physical damage. That could mean blackouts or disruptions to an entire city’s water supply. In short, it could be catastrophic.”

Read more at:   http://america.aljazeera.com/watch/shows/america-tonight/articles/2015/2/5/blackenergy-malware-cyberwarfare.html



8:36 am

The British Army is Creating a Battalion of “Facebook Warriors”

“These Facebook warriors will be using similar atypical tactics, through non-violent means, to fight their adversary. This will mainly be achieved through “reflexive control,” an old Soviet tactic of spreading specifically curated information in order to get your opponent to react in the exact way you want them to. It’s a pretty tricky trick, and the British army will be doing just that with 1,500-person (or more) troop using Twitter and Facebook as a means to spread disinformation, real war truths, and “false flag” incidents as well as just general intelligence gathering. The 77th battalion will reportedly begin operations in April.”

Another  LYING-brigade.  With hackers.  I don’t like that much.

Read more here:   http://www.globalresearch.ca/the-british-army-is-creating-a-battalion-of-facebook-warriors/5429618

2:17 am

Pentagon to Recruit ‘Google’ Generation as Cyber Warriors

“They grew up on Google and wear ponytails. We need to look at ways to bring them into the Army without necessarily going through the same training procedures as our combat troops,” the US commander added.

“Addressing the future cyber regiments recruiters, the expert emphasizes that they should provide the talented youths with new and exciting opportunities, as well as get prepared for inevitable “frictions” and cultural “clashes” with the “Google” generation. The recruiters should choose the best and brightest among the candidates, since “the pain is only worth the gain for going after truly extraordinary talent,” the expert stresses.”

Read more: http://sputniknews.com/military/20150203/1017726953.html#ixzz3QqrBFKsR

Read more: http://sputniknews.com/military/20150203/1017726953.html#ixzz3Qqr3hvkT

Read more: http://sputniknews.com/military/20150203/1017726953.html#ixzz3Qque2UuY


5:15 am

Over 110k Facebook users infected by porn-disguised Trojan

“According to a warning sent out to the Full Disclosure mailing list last Thursday by the researcher, Mohammad Faghani, social networking users have been falling victim to the attack en masse by clicking on posts purported to contain pornographic material and then installing what appears to be an update to Flash Player, a popular Adobe-made piece of software used to view video footage within web browsers.”
Read more at http://investmentwatchblog.com/over-110k-facebook-users-infected-by-porn-disguised-trojan/#1Y5zclR1Wo6xv5Zr.99

2:13 am

Hacktivist leak alleges ‘extortion & money laundering’ by Ukraine’s Right Sector leader

“Now everyone will know that Yarosh and his band of neo-Nazis are just using politics as a cover for their criminal activities and personal enrichment at the expense of ordinary Ukrainians.”

“CyberBerkut is named after Berkut, the government special force unit deployed to restrain the protesters. Operating under the motto “We won’t forgive! We won’t forget!,” the online group has targeted high-profile figures in the new government. As well as posting the private documents and conversations of top politicians, including Yulia Tymoshenko, it has shut down high-profile websites – including those belonging to NATO – with distributed denial of service (DDOS) attacks.”

Read more at:   http://rt.com/news/228387-ukraine-hacktivists-leak-yarosh/


6:37 am

Nanny left terrified after man hacked into toddler’s babycam and uses speaker to tell her the little girl ‘is cute’ 

  • Houston nanny Ashley Stanley was shocked to hear a man’s voice come over the baby monitor as she was caring for 1-year-old girl 
  • The hacker made some comments about the toddler and her ‘poopy diaper,’ and even urged Stanley to password-protect the camera 

Read more: http://www.dailymail.co.uk/news/article-2929231/Nanny-left-terrified-man-hacks-security-camera-toddler-s-crib-begins-talk-changed-girl-s-diaper.html#ixzz3Q7CBs33W
Follow us: @MailOnline on Twitter | DailyMail on Facebook


7:04 am

Lizard Squad may have hacked Facebook

“Lizard Squad posted a cryptic message on their Twitter feed: “Facebook, Instagram, Tinder, AIM, Hipchat #offline #LizardSquad.” The message was tweeted close to noon, IST from their Twitter handle @LizardMafia. The Tweet got nearly 4800 retweets.”

“If only we didn’t use twitter to communicate…” they tweeted soon afterwards, and followed it up with, “More to come soon. Side note: We’re still organizing the @MAS email dump, stay tuned for that.” @MAS is the Malaysia Airlines’ official Twitter handle. The person behind the Twitter account also dared followers with a picture, asking them to “dox” him or reveal his real identity.”

More at:   http://timesofindia.indiatimes.com/tech/tech-news/Lizard-Squad-may-have-hacked-Facebook/articleshow/46029169.cms


11:22 am

Why You Should Build Your Own Internet

“An interesting Make Magazine article on what are called “Meshnets” appeared in November 2014. In it, they describe Hyperboria, a project which aspires to create a global mesh network.”

– See more at: http://www.techswarm.com/2015/01/why-you-should-build-your-own-internet.html#sthash.RfubWUG1.dpuf


1:23 pm

Hackers collective declares vigilante justice against the international “paedosadist industry.”

“In the most recent revelations, on Wednesday, the Telegraph reported that a secret file kept in the ‘PREM’ Prime Minister file series from the 1980s detailing allegations of “unnatural sexual proclivities” being engaged in at the Houses of Parliament has been found at the National Archives, suggesting that then Prime Minister Margaret Thatcher may have been aware of the information.”

More at:   http://sputniknews.com/europe/20150124/1017301478.html

7:47 am


7:58 pm

WTF! It Should Not Be Illegal to Hack Your Own Car’s Computer

“Two of EFF’s requests this year are on behalf of people who need to access the software in cars so they can do basic things like repair, modify, and test the security of their vehicles,” says Kit Walsh of the EFF. “Because Section 1201 of the DMCA prohibits unlocking ‘access controls’—also known as digital rights management (DRM)—on the software, car companies can threaten anyone who needs to get around those restrictions, no matter how legitimate the reason.”

Read more at:   http://www.wired.com/2015/01/let-us-hack-our-cars/

5:29 am

Anonymous Exposing UK Pedophilia Ring in #OpDeathEaters

“These people feed off the agony of others. They cause
wars and destruction during their working hours and they torture and
murder children as recreation.
These are not child lovers.
These are death eaters.”
“This is not a group of sad paedophiles who need help and
understanding. This is a torture and death cult with a powerful global
human trafficking network. We demand that torture and murder be called
torture and murder, not sex. This is an international cult and needs to
be investigated as one, not simply as an endless series of isolated
incidents confined to the UK.”


7:52 pm

“The fact that the government has still asked you to punish me for that link is proof, if any more were needed, that those of us who advocate against secrecy are to be pursued without regard for the rule of law, or even common decency. “

Barrett Brown’s sentencing hearing.  He made a statement.

“So now the dozens of people who have given their time and expertise to what has been hailed by journalists and advocacy groups as a crucial journalistic enterprise are now at risk of being indicted under the same sort of spurious charges that I was facing not long ago, when the government exposed me to decades of prison time for copying and pasting a link to a publicly available file that other journalists were also linking to without being prosecuted.”

“Special Agent Allen Lynn took the stand and claimed under oath that in reviewing my laptops he had found discussions in which I admit having engaged in, quote, “SWATting”, unquote, which he referred to as, quote, “violent activity”, unquote. Your Honor may not be familiar with the term SWATting; as Mr. Lynn described it at the hearing it is, quote, “where they try to place a false 911 call to the residence of an individual in order to endanger that individual.” He went on at elaborate length about this, presenting it as a key reason why I should not receive bond. Your Honor will have noted that this has never come up again. This is because Mr. Lynn’s claims were entirely untrue. But that did not stop him from making that claim, any more than it stopped him from claiming that I have lived in the Middle East, a region I have never actually had the pleasure of visiting.”

“…it would have been wrong. Even aside from the obvious fact that I did not commit fraud, and thus couldn’t sign to any such thing, to do so would have also constituted a dangerous precedent, and it would have endangered my colleagues, each of whom could now have been depicted as a former associate of a convicted fraudster. And it would have given the government, and particularly the FBI, one more tool by which to persecute journalists and activists whose views they find to be dangerous or undesirable.”

Read more at:   http://www.activistpost.com/2015/01/journalist-barrett-brown-sentenced-to.html

4:13 pm


“The intelligence and security journalist has already served more than two years in prison for charges related to his proximity to sources within the hacktivist entity known as Anonymous.”

Read more here:  http://www.blacklistednews.com/Journalist_Barrett_Brown_sentenced_to_63_months_in_federal_prison%2C_must_pay_%24890K_in_restitution/41121/0/38/38/Y/M.html

10:01 am

Pentagon Cyber Security Expert And Family Killed In Fire

We certainly have to wonder, what did Mr. Don Pyle know, or recently find out, via his role as C.O.O. of a company monitoring the activities of the FBI, Pentagon and the Department of Defense?

– See more at: http://govtslaves.info/pentagon-cyber-security-expert-family-killed-fire/#sthash.oMnKpiK9.dpuf

6:06 am

Besides the NSA being in North Korean systems but not warning Sony about the attack, leaked documents indicate that the NSA covertly uses innocent victims’ infected PCs when hijacking botnets, secretly redirects blame to scapegoats as well as taps into ‘unwitting data mules’ to pass along exfiltrated information.

After digging into top secret documents provided by Edward Snowden, Der Spiegelpublished another very enlightening report on the NSA’s digital arms race. Documents discuss how Five Eyes intelligence partners “steal their tools, tradecraft, targets, and take.”

Read more at:   http://www.computerworld.com/article/2872292/nsa-secretly-uses-scapegoats-data-mules-and-innocent-victims-pcs-for-botnets.html


6:44 am

How the NSA Hijacks Hacker Botnets for Spying

But for the NSA and its allies, botnet victims are just another tool to be used. According to the newly-released documents, the NSA has been commandeering other hackers’ bots to serve its own goals, like sabotaging the computers of rival nation states or monitoring networks that exist beyond its already impressive reach.

A set of top secret slides shows that NSA’s Tailored Access Operations unit hijacks botnets under a program called DEFIANTWARRIOR. The system uses previously disclosed spy tools like XKEYSCORE and TURBINE to identify, target and exploit victimized computers, directing them into a “bot prison” where an algorithm sorts them according to location.

Read more at:




4:04 pm

Obama and Cameron’s ‘solutions’ for cybersecurity will make the internet worse. Drafting policies to imprison people who share an HBO GO password? Eliminating end-to-end data encryption? They can’t be serious

“Less than 24 hours before Cameron-Obama the meeting, the Guardian published a secret report based on previously unreleased Snowden documents showing that the US government is fully aware that encryption is vital for security, and that the government risked leaving themselves vulnerable if they didn’t start implementing it on their own systems quicker.”

Read more at:   http://refreshingnews99.blogspot.in/2015/01/obama-and-camerons-solutions-for.html


12:40 pm

Activist pulls off clever Wi-Fi honeypot to protest surveillance state

“The chairman of the youth wing of the Swedish Pirate Party successfully fooledattendees at a major Swedish security and defense conference into connecting to an open Wi-Fi network that he controlled—as a way to protest mass digital surveillance.”

“The operation we have performed during the two conference days in Salen based on the same principle as the great spy organizations such as the US NSA and the Swedish FRA uses. The difference is that they sign a year round operation, and to a much greater extent. They also have access to more advanced technology—the privacy intrusion is [still] enormous.”

Read more at:   http://arstechnica.com/security/2015/01/activist-pulls-off-clever-wi-fi-honeypot-to-protest-surveillance-state/

Young Pirate hacker gets top security secrets

“The security establishment was in Sälen pushing for more surveillance, but then leading figures go and log on to an unsecure W-Fi network,” he told The Local.
“It is very embarrassing because the data we collected showed that some people were looking at Skype, eBay and Blocket and stuff like that, or looking for holidays and where you could go and hike the forest. This was during the day when I suppose they were being paid to be at the conference working.”

12:30 pm

Obama wants Congress to increase prison sentences for hackers

Proposal also expands hacking definition. That’s a “dangerous idea,” expert says.

“During next week’s State of the Union address, the president is set to publicly urge increased prison time and other changes to the Computer Fraud and Abuse Act—the statute that was used to prosecute Internet activist Aaron Swartz before he committed suicide in 2013.”

Read more at:   http://arstechnica.com/tech-policy/2015/01/obama-wants-congress-to-increase-prison-sentences-for-hackers/

11:22 am

Why I Hope Congress Never Watches Blackhat

“Last week I was literally walking the red carpet at the Hollywood premiere of Michael Mann’s Blackhat, a crime thriller that I had the good fortune to work on as a “hacker adviser” (my actual screen credit). Today, all I’m thinking is, please, God, don’t let anybody in Congress see the film.”

“It wasn’t until this week—Tuesday evening, to be exact—that my anxiety over the timing of the movie set in. That’s when the White House released its legislative proposal to “reform” US computer crime policy in reaction to the Sony breach. President Obama plans to formally announce it at the State of the Union next Tuesday, but the details are public now. And many are troubling.”

“But a sober computer crime proposal doesn’t ban tools that benefit thousands of people because one of them is a criminal. Security expert Robert Graham notes that even circulating a link could be considered a felony under the proposal.”

“At this very moment there are hackers, and even low-level credit card fraudsters, serving 20 year terms, and that didn’t deter the Sony intruders. As for the “trafficking” prohibition, when hacking tools are outlawed … well, you know the rest.”

Read more at:   http://www.wired.com/2015/01/why-i-hope-congress-never-watches-blackhat/

9:27 am

Heads Up! US, UK Plan Cyber ‘War Games’ to Boost Defense Against Hackers!

“Additionally, the two allies will create a joint “cyber cell” featuring agents from both countries that will conduct the war games and share information on threats, as well as the best ways to combat hackers. The US division has already been staffed with members of the FBI, National Security Agency, GCHQ, and MI5, the Guardian reported.”

Another layer of fusion-centers.
Read more at http://investmentwatchblog.com/heads-up-us-uk-plan-cyber-war-games-to-boost-defense-against-hackers/#3zj0GVrd7PBbGStt.99


4:58 pm

FBI Counter-Terrorism Expert: ISIS Likely Did NOT Hack Centcom … Anonymous Collective: Centcom Hackers Were In MARYLAND

Read more at http://investmentwatchblog.com/fbi-counter-terrorism-expert-isis-likely-did-not-hack-centcom-anonymous-collective-centcom-hackers-were-in-maryland/#Foo1A4SLIMmKSDZF.99


7:26 pm

The Twitter and YouTube accounts of the Pentagon’s command for its forces in the Middle East were hacked Monday, according to U.S. Central Command.

“We view this as little more than a prank,” said Army Col. Steve Warren, a Pentagon spokesman. “No (Pentagon) systems or computers were compromised.”

Read more at:   http://www.usatoday.com/story/news/nation/2015/01/12/twitter-centcom-isis/21640577/


10:32 am

“Freedom of speech has suffered an inhuman assault … Disgusted and also shocked, we cannot fall to our knees. It is our responsibility to react,” the statement says.  (Anonymous)


6:46 pm

Beware the coffee shop hacker: New breed of cyber criminal spies on your laptop by listening to signals even when it’s OFFLINE

  • Georgia Institute of Technology researchers reveal new hacking method
  • They say hackers can ‘listen in’ to signals emitted by laptops and phones
  • This means, even when offline, they could find out what you are doing
  • It is very hard to track because the spying is ‘silent’
  • However, they say developers can create software to patch up the vulnerability in devices

Read more: http://www.dailymail.co.uk/sciencetech/article-2903261/Beware-coffee-shop-hacker-New-breed-cyber-criminal-spies-laptop-listening-signals-s-OFFLINE.html#ixzz3ON3p3Eky
Follow us: @MailOnline on Twitter | DailyMail on Facebook

11:02 am

Snowden Claims U.S. Policy Is Creating A Black Market For Digital Weapons

“We’re creating a class of Internet security researchers who research vulnerabilities, but then instead of disclosing them to the device manufacturers to get them fixed and to make us more secure, they sell them to secret agencies,” Snowden says.”

Read more at:   http://www.orrazz.com/2015/01/snowden-claims-us-policy-is-creating.html


7:04 am

“Operation Death Eaters” seek to expose “pedosadistic” men of influence and the political powers activists claim help shield them from prosecution.

#OpDeathEaters, as it is known on Twitter by those associated with the hacktivist groupAnonymous, defines itself as “an internationally linked, independent, victim-led paedosadist inquiry/tribunal, which is in no way affiliated with the institutions of power that have created and run this industry.”

Read more at:   http://www.dailydot.com/politics/operation-death-eaters-opdeatheaters-anonymous-pedosadism-prince-andrew/


8:19 am

Hack Check: How ‘Russian hacker’ became global brand

Read more at http://investmentwatchblog.com/hack-check-how-russian-hacker-became-global-brand/#qejM5hI7m5ri5aby.99

3:54 am

US Companies Being Investigated for Revenge Hacking

“American companies are seeking ways to fend off hack attacks similar to the cyberattackagainst Sony Pictures, but the FBI is looking into some of the country’s largest banks to see if they took “revenge hacking” too far and overstepped the law. Jan Crawford reports.”

See more here:   http://www.activistpost.com/2015/01/us-companies-being-investigated-for.html


6:05 pm

Spokesman for ‘Lizard Squad’ hacking group allegedly behind attacks on Microsoft and Sony is arrested over PayPal thefts

  • Vincent Omari, 22, linked to the Lizard Squad hacking organisation
  • But he denies having any part in the attack on Sony and Microsoft
  • Arrested on suspicion of fraud and Computer Misuse Act offences
  • Investigated by police probing funds stolen from PayPal accounts

Read more: http://www.dailymail.co.uk/news/article-2893549/Spokesman-Lizard-Squad-hacking-group-allegedly-attacks-Microsoft-Sony-arrested-PayPal-thefts.html#ixzz3Nc7TTm9o
Follow us: @MailOnline on Twitter | DailyMail on Facebook


12:42 pm

The Interview becomes Sony’s highest grossing online release of all time as it makes $15 MILLION in web sales after hacking scandal

Read more: http://www.dailymail.co.uk/tvshowbiz/article-2889559/The-Interview-Sony-s-highest-grossing-online-release-time.html#ixzz3NJGMWgcJ
Follow us: @MailOnline on Twitter | DailyMail on Facebook

11:33 am

Browser Hijacking and Free Browser Hijacker Removal Tools

“Browser hijacking occurs when you find that your web browsers settings have been changed without your permission. This could happen when you are installing new software, and during installation, your settings get changed; or it could occur if some malicious software takes control of your computer including the browser and changes its settings, without your knowledge.”

Read more at:   http://www.thewindowsclub.com/free-browser-hijacker-removal-tool


4:56 pm

“A good person will resist an evil system with his or her whole soul.”  (Gandhi)

“Lord, please make me a good person.”

Order Followers

“Order-followers are the people that keep the existence of slavery in place.”  “Following orders means by definition, doing what you are told to do without judging for yourself whether or not that action that you are being ordered to carry out, is ACTUALLY right or wrong.”

“…by definition, that person is not exercising conscience…”

“…following orders is never a virtue…”

(This guy’s hot.  Don’t you think?)

Listen here:  

7:54 am

Hackers are the lynchpin of humanity’s survival.  That’s really how I’m seeing it.  All they have to do is say no and nothing on the planet is happening.  I knew they were important in Y2K, but I had no idea how much more important they would become.  If I could, I would encourage hackers to take it to the streets.  I would encourage those with skills I do not possess, to do things their hearts tell them they should do.  I’m an honorary hacker and I stand up against your prison!  I plead for your souls!  I respect your decisions and your responsibilities, but I also question your sanity.  There is not much earth left.  We must stake a claim for the tribe.  We must get beyond the X-box and eliminate (hackable…) machinery from our realm of intrapersonal influence.  You know I’m right.  We must evolve or we’re toast.

(I felt like Patrick Henry writing that down.  “Who will ride?”)

6:18 am

‘Lizard Squad’ Explains Why It Hacked Xbox Live and PSN

“The attacks were initially launched just for fun, but one of the hackers says that the group’s motivation eventually shifted from fun to exposing how weak the security is on PSN and Xbox Live.”

I think I could get rich making little tiny Faraday boxes to be implanted with pacemakers.  There’s nothing the hackers can’t do.

Read more at:   http://www.theepochtimes.com/n3/1162887-lizard-squad-explain-why-they-hacked-xbox-live-and-psn/



3:07 am

CHRISTMAS HACKING BUMMER: PlayStation, Xbox offline due to attacks. A hacking group called Lizard Squad is claiming to have caused the problems.

Read more at http://investmentwatchblog.com/christmas-hacking-bummer-playstation-xbox-offline-due-to-attacks-a-hacking-group-called-lizard-squad-is-claiming-to-have-caused-the-problems/#czEhd75ljBsf3qTY.99


4:20 pm

The Interview makes Hollywood history as the first studio film to premiere online while thousands turn out for the movie’s midnight release – including star Seth Rogen

  • Thousands packed movie theaters across the country last night for the first screening of The Interview, which happened at midnight on Christmas Eve 
  • This as tens of thousands streamed the film online in just its first day of release
  • Early audiences seem to be responding well to the film, sharing how much they enjoyed the comedy on social media 
  • This news is not doubt a relief to everyone involved in the production and many at the studio after the film was panned by many critics
  • Sony also made history on Wednesday when The Interview became to first studio film to have its release online
  • They then made history again Thursday, when The Interview became the first film to simultaneously play across three different viewing platforms

Read more: http://www.dailymail.co.uk/news/article-2887002/The-Interview-makes-Hollywood-history-studio-film-premiere-online-thousands-turn-movie-s-midnight-release-including-star-Seth-Rogen.html#ixzz3MwlEn34i
Follow us: @MailOnline on Twitter | DailyMail on Facebook


12:06 pm

“Sony was not just hacked, this is a company that was essentially nuked from the inside,” said Stammberger.

“He says Norse data is pointing towards a woman who calls herself “Lena” and claims to be connected with the so-called “Guardians of Peace” hacking group. Norse believes it’s identified this woman as someone who worked at Sony in Los Angeles for ten years until leaving the company this past May.”

Read more here:   http://www.cbsnews.com/news/did-the-fbi-get-it-wrong-on-north-korea/

4:19 am

Hacktivist group ‘takes down’ GCHQ website, claims N. Korean blackout

“The Anonymous-allied hacktivist group Gator League claimed it took down the website of Britain’s GCHQ surveillance agency on Tuesday. Earlier, the same group boasted of shutting down North Korea’s internet.”

See more at:   http://rt.com/news/217211-gchq-website-down-hackers/


6:40 am


“SPD is working to release more video than ever before, while striking the right balance between transparency and privacy. … We’re looking for a few good hackers who can help.”

INTEL COWBOYS!  Be ye white hats or black?  Can you even tell the difference anymore?

Read more at:  http://www.blacklistednews.com/Seattle_Police_Held_a_Hackathon_to_Figure_Out_How_to_Redact_Body_Cam_Video_Streams/40252/0/38/38/Y/M.html


3:30 pm

Actor Kevin Hart was ‘paid $2 MILLION’ by Sony to tweet about two films,’ leaked email reveals

  • Kevin Hart refused to reveal if he would ever work with Sony again after being called a ‘whore’ in a leaked email exchange
  • An executive was angry with Hart after his team requested more money for the star to support his film on social media 
  • Meanwhile a new leaked email reveals that the actor was ‘paid $2million to send out tweets to his 14.8 million followers promoting Sony films’
  • Hart’s upcoming film The Wedding Ringer is a Sony picture 

Read more: http://www.dailymail.co.uk/news/article-2885093/Kevin-Hart-refuses-say-work-Sony-labeled-whore-emails-new-leak-reveals-actor-paid-2million-promote-film-Twitter.html#ixzz3MkrcqCIU
Follow us: @MailOnline on Twitter | DailyMail on Facebook


10:03 am

The Darknet Counterfeit Gift Guide: Chanel, Rolex and Louis Vuitton

Fake Beats by Dre Studio Wireless

Authentic Retail: $380. Darknet Counterfeit: $56–You Save $324!

Read more at:



5:27 pm

North Korea goes completely offline: Report

“The country, which the FBI accused last week of the cyberattack, is suffering a total Internet outage that experts at DYN Research said is out of the ordinary, as first reported by North Korea Tech. According to the research firm, North Korea’s Internet connectivity grew steadily worse beginning Sunday night, and then went completely offline Monday morning.”

Read more at:   http://www.cnbc.com/id/102289459

4:56 am

I really do expect the hackers to revolt.  Their allegiance is to freedom; they were temporarily misled by promises of security.  They 1)  run the world, 2) know they do, and 3) occasionally read.  We’ll be OK.
“A strategic pivot has occurred among top Intel Cowboys all around the World. Yes, they still are careful to protect their own nation’s important defense secrets and systems, but they have joined a working relationship with numerous other Top Intel Cowboys from around the World, even with nations considered to be enemies.”

“In practical terms, this means Intel Cowboys from many nations — even some Israeli Intel who can’t stand the pedophile ops of the Organized crime cabal anymore, and some Intel from the Russian Republic (with President Putin’s apparent support).”

Intel Cowboys all over the World are getting clued in to how they have been used… to be later disposed of by the Organized Crime Cabal — and are now taking action to reverse this

Yes, the Top Policy-makers who run America do Very, Very Bad Things, incredibly Bad Things to stay in power and protect their massive Organized Crime Cabal, which has worldwide reach and is empowered by the crooked City of London FIAT Bankster System.

“Many of these incredibly skilled, astute individuals thought they were serving their nations by supporting what they have now come to understand to be an Organized Crime Cabal that has hijacked many nations of the World, especially England, America, Israel, Saudia Arabia and Turkey and many Balkan Nations. Many have also found out that this Organized Crime Cabal was initially created by a very interesting association that developed between the Babylonian Talmudic Banksters and the satanic Cult Network emerging from John Dee and Aleister Crowley, which evolved into the Process Cult in America and now the Denver Circle of Twelve, the Bloodthirsty Ones, aka the Disciples of Satan, or the “Illuminati” as they prefer to call themselves.”

The hackers all have a choice to make.

Read more at:  http://www.veteranstoday.com/2014/12/20/very-very-bad-things/


1:24 pm

“Courage is doing what you’re afraid to do. There can be no courage unless you’re scared.” — Eddie Rickenbacker

Read more: whatreallyhappened.com http://whatreallyhappened.com/#ixzz3MYeLqJHn


1:15 pm

SONY ‘The Interview’ HACK SCANDAL – An Inside Job to Bring in Cyber Security Bill?

Read more at http://investmentwatchblog.com/sony-the-interview-hack-scandal-an-inside-job-to-bring-in-cyber-security-bill/#HXEQ0ccs7t8AO8X6.99

9:56 am

Could Understanding Code Be Key In Avoiding Being Programmed?

“Programming had a logic that is unarguable.”

“But the fact is that even the “thinking” and “response” functions previously performed by people can now be done more quickly, cheaply and even reliably by computers.”

“This recognition could move us beyond religious and tribal differences as we see that everything is essentially information –as quantum physics has already suggested. But in the meantime we and particularly our children become intimately comfortable and familiar with the process of computing that works symbolically, logically and inexorably: software.”

Read more here:   http://www.collective-evolution.com/2014/12/19/could-understanding-code-be-key-in-avoiding-being-programmed/


2:58 pm

FBI formally blames North Korea in Sony hack

“Confirming what government officials were saying privately for days, the FBI announced that is months-long investigation concluded that North Korea was behind the attack, based on technical similarities to previous attacks.”

I wish I could bet somebody a million dollars this is all bullshit.

Read more: http://www.washingtontimes.com/news/2014/dec/19/fbi-formally-blames-north-korea-sony-hacking/#ixzz3MNLOkf7e
Follow us: @washtimes on Twitter