Tag: Security
-
Science Faction?
In a somewhat disturbing case of life imitating art, it seems that real world turmoil is catching up with classic science fiction projections of a dystopian future as envisioned by writers like George Orwell and Ray Bradbury — a world where the general populace is under constant surveillance, and the technology that we’ve become overly…
-
Bribe or ‘Tax’? NSA gives 10milion to RSA for Backdoor Access
Hmm. Hold up. So if we go by this Wikipedia entry.. “Founded as an independent company in 1982, RSA Security, Inc. was acquired by EMC Corporation in 2006 for US$ 2.1 billion and operates as a division within EMC.[5]” People need to understand, this means RSA took around 2% of what they’d make in one…
-
U.S. Forces, Intelligence Agents and American Security Agents (MERCs) clandestine war in Yemen
Saudi militants were behind the massive car bombing and assault on Yemen’s military headquarters that killed more than 50 people, including foreigners, investigators said in a preliminary report released Friday. Al-Qaeda claimed responsibility for the attack, saying it was retaliation for US drone strikes that have killed dozens of the terror network’s leaders. The attack…
-
DARPA Hackers Show How Cars Can Be Remotely Controlled
Hackers Chris Valasek and Charlie Miller have demonstrated from the backseat of a Toyota Prius that all you need is a Macbook and a USB cable in order to hack into a computer-controlled car. Valasek is the director of security intelligence for IOActive and Miller is a security engineer for Twitter. These two security researchers…
-
Information Technology – Higher Education… or?
Information security, especially at schools that provide training on the subject, in for-profit higher education should not be a premium. It would make a really great story to send an “undercover” technician to DeVry and Rasmussen campuses to observe their incredible service delivery. Rasmussen’s portal has long had a SQL injection vulnerability that has been…
-
June 3, 2013 – Decrypted Matrix Radio: Dome on Mars, Istanbul on Fire, MI6 Terrorists, iOS Compromised, Supreme Court on DNA, Monsanto & Big Pharma Exposed, Kicking Cancer
City Dome Discovered On Mars In Juventae Chasma, Video & Photos The Sixth Day of Fire, Tear Gas, and Blood in Istanbul Woolwich murder: Younger brother of Michael Adebolajo ‘was paid thousands to spy in Middle East’ by MI6 Any iOS Device Can Be Compromised Within One Minute SUPREME COURT: POLICE MAY TAKE DNA FROM…
-
DynCorp Gets $72.8 Million Contract Despite History of Child Trafficking
DynCorp is one of the most lucrative and infamous military contractors in the world, perhaps only surpassed by Halliburton. They both have a documented history of gunrunning, drug dealing, and human trafficking. In addition, the actual work that they do on the record is sub par and their rebuilding efforts have gotten terrible reviews, especially…
-
Cryptoparty Goes Viral: Pen testers, Privacy Geeks Spread Security to the Masses
Security professionals, geeks and hackers around the world are hosting a series of cryptography training sessions for the general public. The ‘crytoparty’ sessions were born in Australia and kicked off last week in Sydney and Canberra along with two in the US and Germany. Information security experts and privacy advocates of all political stripes have…
-
Undercover Reporter Infiltrates Security Firm to Expose London Olympics
Highlights: Foreign troops drafted in; drug deals in training classroom; ineffective screening processes and detection technology; photographs of sensitive mock-up screening areas taken by un-screened trainees; 200k ‘casket linings’ delivered; uniforms being stolen; plan for an evacuation of London; drones on-line (incl. armed); poor standard of security recruits — cant speak English. Exclusive interview with…
-
VPN vs. SSH Tunnel: Which Is More Secure?
VPNs and SSH tunnels can both securely “tunnel” network traffic over an encrypted connection. They’re similar in some ways, but different in others – if you’re trying to decide which to use, it helps to understand how each works. An SSH tunnel is often referred to as a “poor man’s VPN” because it can provide…
-
How to secure your computer and surf fully Anonymous BLACK-HAT STYLE
This is a guide with which even a total noob can get high class security for his system and complete anonymity online. But its not only for noobs, it contains a lot of tips most people will find pretty helpfull. It is explained so detailed even the biggest noobs can do it^^ : === The…
-
Hacks of Valor: Why Anonymous Is Not A Threat to National Security
Over the past year, the U.S. government has begun to think of Anonymous, the online network phenomenon, as a threat to national security. According to The Wall Street Journal, Keith Alexander, the general in charge of the U.S. Cyber Command and the director of the National Security Agency, warned earlier this year that “the hacking group…
-
Anonymous reveals Haditha massacre emails
Anonymous have unveiled their second major release for this week’s installment of FuckFBIFriday. Their target this time around is Frank Wuterich, the US Marine that admitted to killing Iraqi civilians — and received no jail time for his crime. Early Friday afternoon, members of the loose-knit online collective Anonymous began circulating news that the website…