shopify traffic stats
Impero Education Cares More About PR than its Users – the Kids.
One of the most widely used tools for monitoring and restricting pupils’ internet use in UK schools has a serious security flaw which could leave hundreds of thousands of children’s personal information exposed to hackers, a researcher has warned. Impero Education Pro, a product that restricts and monitors’ students’... Read more
Home Hacks and Smart Grids: Data Theft Made Even Simpler
There is often times a trade-off between security and convenience. The more easily you can access your personal data, the easier someone else can too, making anything that you put online a potential target for hackers. A growing source of concern for many people is their home security and... Read more
COINTELPRO

COINTELPRO

Taboo Terminology December 9, 2014 0

The FBI began COINTELPRO—short for Counterintelligence Program—in 1956 to disrupt the activities of the Communist Party of the United States. In the 1960s, it was expanded to include a number of other domestic groups, such as the Ku Klux Klan, the Socialist Workers Party, and the Black Panther Party.... Read more
Recommendations for the Hacktivist Community
Statement of Purpose I have been observing the hacker and hacktivist communities, at times very closely, for many years. The exact definition of “hacker” and “hacktivist” varies from author to author, so I shall make my interpretation of these words very clear. Let us define a “hacker” as someone... Read more
Science Faction?
In a somewhat disturbing case of life imitating art, it seems that real world turmoil is catching up with classic science fiction projections of a dystopian future as envisioned by writers like George Orwell and Ray Bradbury — a world where the general populace is under constant surveillance, and... Read more
Bribe or ‘Tax’? NSA gives 10milion to RSA for Backdoor Access
Hmm. Hold up. So if we go by this Wikipedia entry.. “Founded as an independent company in 1982, RSA Security, Inc. was acquired by EMC Corporation in 2006 for US$ 2.1 billion and operates as a division within EMC.” People need to understand, this means RSA took around 2%... Read more
U.S. Forces, Intelligence Agents and American Security Agents (MERCs) clandestine war in Yemen
Saudi militants were behind the massive car bombing and assault on Yemen’s military headquarters that killed more than 50 people, including foreigners, investigators said in a preliminary report released Friday. Al-Qaeda claimed responsibility for the attack, saying it was retaliation for US drone strikes that have killed dozens of... Read more
DARPA Hackers Show How Cars Can Be Remotely Controlled
Hackers Chris Valasek and Charlie Miller have demonstrated from the backseat of a Toyota Prius that all you need is a Macbook and a USB cable in order to hack into a computer-controlled car. Valasek is the director of security intelligence for IOActive and Miller is a security engineer... Read more
Information Technology – Higher Education… or?
Information security, especially at schools that provide training on the subject, in for-profit higher education should not be a premium. It would make a really great story to send an “undercover” technician to DeVry and Rasmussen campuses to observe their incredible service delivery. Rasmussen’s portal has long had a... Read more
City Dome Discovered On Mars In Juventae Chasma, Video & Photos The Sixth Day of Fire, Tear Gas, and Blood in Istanbul Woolwich murder: Younger brother of Michael Adebolajo ‘was paid thousands to spy in Middle East’ by MI6 Any iOS Device Can Be Compromised Within One Minute SUPREME... Read more
DynCorp Gets $72.8 Million Contract Despite History of Child Trafficking
DynCorp is one of the most lucrative and infamous military contractors in the world, perhaps only surpassed by Halliburton. They both have a documented history of gunrunning, drug dealing, and human trafficking. In addition, the actual work that they do on the record is sub par and their rebuilding... Read more
Cryptoparty Goes Viral: Pen testers, Privacy Geeks Spread Security to the Masses
Security professionals, geeks and hackers around the world are hosting a series of cryptography training sessions for the general public. The ‘crytoparty’ sessions were born in Australia and kicked off last week in Sydney and Canberra along with two in the US and Germany. Information security experts and privacy... Read more
August 3, 2012 – DCMX Radio: Re-cap Week’s Alternative News, Intro to CyberWar: Viruses, Hacking, & Black Security Breaches, Protecting Your Computer, Securing Your Internet Connection & Maintaining Privacy Online
Cyber Security Industry Explosion, Intelligence Spying, Data-mining, Black-Hats, White-Hats, Gray-Hats abound. Alphabet Agencies, Corrupt Globalist Corporations exploiting your info. Micro Tutorial on Protecting Your Computer, Securing Your Internet Connection, Maintaining ‘some’ Privacy Online Every Week Night 12-1am EST (9-10pm PST) Read more
Undercover Reporter Infiltrates Security Firm to Expose London Olympics
Highlights: Foreign troops drafted in; drug deals in training classroom; ineffective screening processes and detection technology; photographs of sensitive mock-up screening areas taken by un-screened trainees; 200k ‘casket linings’ delivered; uniforms being stolen; plan for an evacuation of London; drones on-line (incl. armed); poor standard of security recruits —... Read more
VPN vs. SSH Tunnel: Which Is More Secure?
VPNs and SSH tunnels can both securely “tunnel” network traffic over an encrypted connection. They’re similar in some ways, but different in others – if you’re trying to decide which to use, it helps to understand how each works. An SSH tunnel is often referred to as a “poor... Read more
How to secure your computer and surf fully Anonymous BLACK-HAT STYLE
This is a guide with which even a total noob can get high class security for his system and complete anonymity online. But its not only for noobs, it contains a lot of tips most people will find pretty helpfull. It is explained so detailed even the biggest noobs... Read more
Hacks of Valor: Why Anonymous Is Not A Threat to National Security
Over the past year, the U.S. government has begun to think of Anonymous, the online network phenomenon, as a threat to national security. According to The Wall Street Journal, Keith Alexander, the general in charge of the U.S. Cyber Command and the director of the National Security Agency, warned earlier... Read more
Facebook Spies on Phone users Text Messages, Emails report says
INTERNET giant Facebook is accessing smartphone users’ personal text messages, an investigation revealed today. Facebook admitted reading text messages belonging to smartphone users who downloaded the social-networking app and said that it was accessing the data as part of a trial to launch its own messaging service, The (London) Sunday Times reported.... Read more
Here’s How Law Enforcement Cracks Your iPhone’s Security Code
Update: I’ve clarified two aspects of this story below. First, Micro Systemation’s XRY tool often requires more than two minutes to crack the iPhone’s password. The two minutes I originally cited were a reference to the time shown in the video (now removed by Micro Systemation) below. Given that,... Read more
Anonymous reveals Haditha massacre emails
Anonymous have unveiled their second major release for this week’s installment of FuckFBIFriday. Their target this time around is Frank Wuterich, the US Marine that admitted to killing Iraqi civilians — and received no jail time for his crime. Early Friday afternoon, members of the loose-knit online collective Anonymous... Read more