Tag: Security

  • Schools Now Monitoring kids with Insecure Impero Software, PR Issues Abound

    Schools Now Monitoring kids with Insecure Impero Software, PR Issues Abound

    One of the most widely used tools for Schools monitoring kids and restricting pupils’ internet use in UK schools has a serious security flaw which could leave hundreds of thousands of children’s personal information exposed to hackers, a researcher has warned. Impero Education Pro, a product that restricts and monitors’ students’ website use and searches,…

  • Home Hacks and Smart Grids: Data Theft Made Even Simpler

    Home Hacks and Smart Grids: Data Theft Made Even Simpler

    There is often times a trade-off between security and convenience. With Home Hacks the more easily you can access your personal data, the easier someone else can too, making anything that you put online a potential target for hackers. A growing source of concern for many people is their home security and home automation systems.…

  • COINTELPRO

    COINTELPRO

    The FBI began COINTELPRO—short for Counterintelligence Program—in 1956 to disrupt the activities of the Communist Party of the United States. In the 1960s, it was expanded to include a number of other domestic groups, such as the Ku Klux Klan, the Socialist Workers Party, and the Black Panther Party. All COINTELPRO operations were ended in…

  • Recommendations for the Hacktivist Community

    Recommendations for the Hacktivist Community

    Statement of Purpose I have been observing the hacker and hacktivist communities, at times very closely, for many years. The exact definition of “hacker” and “hacktivist” varies from author to author, so I shall make my interpretation of these words very clear. Let us define a “hacker” as someone who utilizes their knowledge of computers…

  • Science Faction?

    Science Faction?

    In a somewhat disturbing case of life imitating art, it seems that real world turmoil is catching up with classic science fiction projections of a dystopian future as envisioned by writers like George Orwell and Ray Bradbury — a world where the general populace is under constant surveillance, and the technology that we’ve become overly…

  • Bribe or ‘Tax’? NSA gives 10milion to RSA for Backdoor Access

    Bribe or ‘Tax’? NSA gives 10milion to RSA for Backdoor Access

    Hmm. Hold up. So if we go by this Wikipedia entry.. “Founded as an independent company in 1982, RSA Security, Inc. was acquired by EMC Corporation in 2006 for US$ 2.1 billion and operates as a division within EMC.[5]” People need to understand, this means RSA took around 2% of what they’d make in one…

  • U.S. Forces, Intelligence Agents and American Security Agents (MERCs) clandestine war in Yemen

    U.S. Forces, Intelligence Agents and American Security Agents (MERCs) clandestine war in Yemen

    Saudi militants were behind the massive car bombing and assault on Yemen’s military headquarters that killed more than 50 people, including foreigners, investigators said in a preliminary report released Friday. Al-Qaeda claimed responsibility for the attack, saying it was retaliation for US drone strikes that have killed dozens of the terror network’s leaders. The attack…

  • DARPA Hackers Show How Cars Can Be Remotely Controlled

    DARPA Hackers Show How Cars Can Be Remotely Controlled

    Hackers Chris Valasek and Charlie Miller have demonstrated from the backseat of a Toyota Prius that all you need is a Macbook and a USB cable in order to hack into a computer-controlled car. Valasek is the director of security intelligence for IOActive and Miller is a security engineer for Twitter. These two security researchers…

  • Information Technology – Higher Education… or?

    Information Technology – Higher Education… or?

    Information security, especially at schools that provide training on the subject, in for-profit higher education should not be a premium. It would make a really great story to send an “undercover” technician to DeVry and Rasmussen campuses to observe their incredible service delivery. Rasmussen’s portal has long had a SQL injection vulnerability that has been…

  • June 3, 2013 – Decrypted Matrix Radio: Dome on Mars, Istanbul on Fire, MI6 Terrorists, iOS Compromised, Supreme Court on DNA, Monsanto & Big Pharma Exposed, Kicking Cancer

    City Dome Discovered On Mars In Juventae Chasma, Video & Photos The Sixth Day of Fire, Tear Gas, and Blood in Istanbul Woolwich murder: Younger brother of Michael Adebolajo ‘was paid thousands to spy in Middle East’ by MI6 Any iOS Device Can Be Compromised Within One Minute SUPREME COURT: POLICE MAY TAKE DNA FROM…

  • DynCorp Gets $72.8 Million Contract Despite History of Child Trafficking

    DynCorp Gets $72.8 Million Contract Despite History of Child Trafficking

    DynCorp is one of the most lucrative and infamous military contractors in the world, perhaps only surpassed by Halliburton. They both have a documented history of gunrunning, drug dealing, and human trafficking. In addition, the actual work that they do on the record is sub par and their rebuilding efforts have gotten terrible reviews, especially…

  • Cryptoparty Goes Viral: Pen testers, Privacy Geeks Spread Security to the Masses

    Cryptoparty Goes Viral: Pen testers, Privacy Geeks Spread Security to the Masses

    Security professionals, geeks and hackers around the world are hosting a series of cryptography training sessions for the general public. The ‘crytoparty’ sessions were born in Australia and kicked off last week in Sydney and Canberra along with two in the US and Germany. Information security experts and privacy advocates of all political stripes have…

  • August 3, 2012 – DCMX Radio: Re-cap Week’s Alternative News, Intro to CyberWar: Viruses, Hacking, & Black Security Breaches, Protecting Your Computer, Securing Your Internet Connection & Maintaining Privacy Online

    August 3, 2012 – DCMX Radio: Re-cap Week’s Alternative News, Intro to CyberWar: Viruses, Hacking, & Black Security Breaches, Protecting Your Computer, Securing Your Internet Connection & Maintaining Privacy Online

    Cyber Security Industry Explosion, Intelligence Spying, Data-mining, Black-Hats, White-Hats, Gray-Hats abound. Alphabet Agencies, Corrupt Globalist Corporations exploiting your info. Micro Tutorial on Protecting Your Computer, Securing Your Internet Connection, Maintaining ‘some’ Privacy Online http://youtu.be/CxfyIgPHGg4 Every Week Night 12-1am EST (9-10pm PST)

  • Undercover Reporter Infiltrates Security Firm to Expose London Olympics

    Undercover Reporter Infiltrates Security Firm to Expose London Olympics

    Highlights: Foreign troops drafted in; drug deals in training classroom; ineffective screening processes and detection technology; photographs of sensitive mock-up screening areas taken by un-screened trainees; 200k ‘casket linings’ delivered; uniforms being stolen; plan for an evacuation of London; drones on-line (incl. armed); poor standard of security recruits — cant speak English. Exclusive interview with…

  • VPN vs. SSH Tunnel: Which Is More Secure?

    VPN vs. SSH Tunnel: Which Is More Secure?

    VPNs and SSH tunnels can both securely “tunnel” network traffic over an encrypted connection. They’re similar in some ways, but different in others – if you’re trying to decide which to use, it helps to understand how each works. An SSH tunnel is often referred to as a “poor man’s VPN” because it can provide…

  • How to secure your computer and surf fully Anonymous BLACK-HAT STYLE

    How to secure your computer and surf fully Anonymous BLACK-HAT STYLE

    This is a guide with which even a total noob can get high class security for his system and complete anonymity online. But its not only for noobs, it contains a lot of tips most people will find pretty helpfull. It is explained so detailed even the biggest noobs can do it^^ : === The…

  • Hacks of Valor: Why Anonymous Is Not A Threat to National Security

    Hacks of Valor: Why Anonymous Is Not A Threat to National Security

    Over the past year, the U.S. government has begun to think of Anonymous, the online network phenomenon, as a threat to national security. According to The Wall Street Journal, Keith Alexander, the general in charge of the U.S. Cyber Command and the director of the National Security Agency, warned earlier this year that “the hacking group…

  • Facebook Spies on Phone users Text Messages, Emails report says

    Facebook Spies on Phone users Text Messages, Emails report says

    INTERNET giant Facebook is accessing smartphone users’ personal text messages, an investigation revealed today. Facebook admitted reading text messages belonging to smartphone users who downloaded the social-networking app and said that it was accessing the data as part of a trial to launch its own messaging service, The (London) Sunday Times reported. Other well-known companies accessing smartphone users’…

  • Here’s How Law Enforcement Cracks Your iPhone’s Security Code

    Here’s How Law Enforcement Cracks Your iPhone’s Security Code

    Update: I’ve clarified two aspects of this story below. First, Micro Systemation’s XRY tool often requires more than two minutes to crack the iPhone’s password. The two minutes I originally cited were a reference to the time shown in the video (now removed by Micro Systemation) below. Given that, as I originally wrote, the phone…

  • Anonymous reveals Haditha massacre emails

    Anonymous reveals Haditha massacre emails

    Anonymous have unveiled their second major release for this week’s installment of FuckFBIFriday. Their target this time around is Frank Wuterich, the US Marine that admitted to killing Iraqi civilians — and received no jail time for his crime. Early Friday afternoon, members of the loose-knit online collective Anonymous began circulating news that the website…