Jul 15, 2015 | Black Technology, Leaks
One of the most widely used tools for Schools monitoring kids and restricting pupils’ internet use in UK schools has a serious security flaw which could leave hundreds of thousands of children’s personal information exposed to hackers, a researcher has warned. Impero...
Feb 16, 2015 | Black Technology, News
There is often times a trade-off between security and convenience. With Home Hacks the more easily you can access your personal data, the easier someone else can too, making anything that you put online a potential target for hackers. A growing source of concern for...
Dec 9, 2014 | 2020 Relevant, Taboo Terminology
The FBI began COINTELPRO—short for Counterintelligence Program—in 1956 to disrupt the activities of the Communist Party of the United States. In the 1960s, it was expanded to include a number of other domestic groups, such as the Ku Klux Klan, the Socialist Workers...
Nov 13, 2014 | 2020 Relevant, Anonymous, News
Statement of Purpose I have been observing the hacker and hacktivist communities, at times very closely, for many years. The exact definition of “hacker” and “hacktivist” varies from author to author, so I shall make my interpretation of these words very clear. Let us...
Feb 6, 2014 | Abuses of Power, Black Technology, News
In a somewhat disturbing case of life imitating art, it seems that real world turmoil is catching up with classic science fiction projections of a dystopian future as envisioned by writers like George Orwell and Ray Bradbury — a world where the general populace...
Dec 21, 2013 | Abuses of Power, Leaks, News
Hmm. Hold up. So if we go by this Wikipedia entry.. “Founded as an independent company in 1982, RSA Security, Inc. was acquired by EMC Corporation in 2006 for US$ 2.1 billion and operates as a division within EMC.[5]” People need to understand, this means...
Dec 7, 2013 | WAR: By Design
Saudi militants were behind the massive car bombing and assault on Yemen’s military headquarters that killed more than 50 people, including foreigners, investigators said in a preliminary report released Friday. Al-Qaeda claimed responsibility for the attack, saying...
Oct 18, 2013 | Abuses of Power, Black Technology, News
Hackers Chris Valasek and Charlie Miller have demonstrated from the backseat of a Toyota Prius that all you need is a Macbook and a USB cable in order to hack into a computer-controlled car. Valasek is the director of security intelligence for IOActive and Miller is a...
Sep 5, 2013 | Anonymous, Leaks
Information security, especially at schools that provide training on the subject, in for-profit higher education should not be a premium. It would make a really great story to send an “undercover” technician to DeVry and Rasmussen campuses to observe their...
Nov 8, 2012 | 2020 Relevant, Human Traffic
DynCorp is one of the most lucrative and infamous military contractors in the world, perhaps only surpassed by Halliburton. They both have a documented history of gunrunning, drug dealing, and human trafficking. In addition, the actual work that they do on the record...
Sep 4, 2012 | Anonymous, News
Security professionals, geeks and hackers around the world are hosting a series of cryptography training sessions for the general public. The ‘crytoparty’ sessions were born in Australia and kicked off last week in Sydney and Canberra along with two in the...
Jul 15, 2012 | Leaks, News
Highlights: Foreign troops drafted in; drug deals in training classroom; ineffective screening processes and detection technology; photographs of sensitive mock-up screening areas taken by un-screened trainees; 200k ‘casket linings’ delivered; uniforms...
Apr 24, 2012 | Globalist Corporations, News
INTERNET giant Facebook is accessing smartphone users’ personal text messages, an investigation revealed today. Facebook admitted reading text messages belonging to smartphone users who downloaded the social-networking app and said that it was accessing the data...
Apr 24, 2012 | Abuses of Power, News
Update: I’ve clarified two aspects of this story below. First, Micro Systemation’s XRY tool often requires more than two minutes to crack the iPhone’s password. The two minutes I originally cited were a reference to the time shown in the video (now removed by Micro...