Wednesday, September 28, 2016

Yet another reason Verizon...

From Ars Technica...


Employee breached customer trust, profited from private phone data for years. 

An Alabama man who worked as a Verizon Wireless technician has agreed to plead guilty to a federal hacking charge in connection to his illegal use of the company's computers to acquire customer calling and location data. The man, Daniel Eugene Traeger, faces a maximum five years in prison next month. He admitted Thursday that he sold customer data—from 2009 to 2014—to a private investigator whom the authorities have not named.

Great!

Tuesday, August 30, 2016

Was Hillary's server used for State Dept Business? While it was infected? It just keeps getting worse...

Oh I don't know - how did the State Department treat it?  As a priority? Then maybe...

AP: Emails: State Dept. scrambled on trouble on Clinton's server


WASHINGTON (AP) — State Department staffers wrestled for weeks in December 2010 over a serious technical problem that affected emails from then-Secretary Hillary Clinton's home email server, causing them to temporarily disable security features on the government's own systems, according to emails released Wednesday.
The emails were released under court order Wednesday to the conservative legal advocacy group Judicial Watch, which has sued the State Department over access to public records related to the presumptive Democratic presidential nominee's service as the nation's top diplomat between 2009 and 2013.
The emails, reviewed by The Associated Press, show that State Department technical staff disabled software on their systems intended to block phishing emails that could deliver dangerous viruses. They were trying urgently to resolve delivery problems with emails sent from Clinton's private server.
"This should trump all other activities," a senior technical official, Ken LaVolpe, told IT employees in a Dec. 17, 2010, email. Another senior State Department official, Thomas W. Lawrence, wrote days later in an email that deputy chief of staff Huma Abedin personally was asking for an update about the repairs. Abedin and Clinton, who both used Clinton's private server, had complained that emails each sent to State Department employees were not being reliably received.
 
After technical staffers turned off some security features, Lawrence cautioned in an email, "We view this as a Band-Aid and fear it's not 100 percent fully effective."
 Techdirt calls it more frankly -

Emails Show Hillary Clinton's Email Server Was A Massive Security Headache, Set Up To Route Around FOIA Requests

from the breaking-badly dept
More bad news for Hillary Clinton and her ill-advised personal email server. Another set of emails released by the State Department shows the government agency had to disable several security processes just to get its server to accept email from Clinton's private email address.

Tuesday, August 9, 2016

Are the Democrats *REALLY* accusing Wikileaks?! Bernie?! and Trump?!?! of being RUSSIAN SPIES!?

From the Intercept
Democrats’ Tactic of Accusing Critics of Kremlin Allegiance Has Long, Ugly History in U.S.

Is Hillary getting worried?














From Drudge

OTOH, the New York Times, has an interesting article..

Cash Flowed to Clinton Foundation Amid Russian Uranium Deal

...

Beyond mines in Kazakhstan that are among the most lucrative in the world, the sale gave the Russians control of one-fifth of all uranium production capacity in the United States. Since uranium is considered a strategic asset, with implications for national security, the deal had to be approved by a committee composed of representatives from a number of United States government agencies. Among the agencies that eventually signed off was the State Department, then headed by Mr. Clinton’s wife, Hillary Rodham Clinton.

 

Tuesday, July 26, 2016

Will the FCC PLEASE SCHWACK COMCAST!?

According to ARS, On the Comcast cable box - Netflix won't be exempt from data caps, unlike Comcast content, which is.

Here's the link:
http://arstechnica.com/information-technology/2016/07/netflixs-cable-box-deal-with-comcast-wont-exempt-it-from-data-caps/

DOES NO ONE UNDERSTAND TEXTBOOK ANTI-COMPETITIVE BEHAVIOR BY A PROTECTED UTILITY?!?!?!

CAN I BE ANY CLEARER?

PLEASE?!?!

Yes, Malvertising is real

Hello all - I was getting slow response on Firefox ( Maybe the Intel I5 is showing its age - Nah ), so I followed the instructions to reset.  Unbeknownst to me, UBlock Origin was deleted =:-O.

Visiting Drudge a little while later, I got this:



 Zooming in:



So this probably isn't a real Firefox patch

Be careful out there folks.

Sunday, July 3, 2016

Updated 7-7-2016: Is Ourmine.com REALLY blackhat hacking celebrities' social media sites and taking payments on Paypal and credit cards?

It's claimed on CSOOnline and their web site, ourmine.org .  (Using "Blazingfast.io for DDOS protection").

Graham Cluley tweeted, likely writing about it soon.

Is it just a scam, or are they getting schwacked soon?


Update: It gets even better 
According to this article in SC Magazine, Conflict between OurMine and Anonymous hackers reportedly leads to DDoS attack on Wikileaks,
There's a DDOS war between them, anonymous, wikileaks, and even had some of their people Doxed by anon people...  (get the popcorn)

and better...
 Pokemon Go servers brought down by OurMine DDoS attack

and better...
 

Thursday, June 30, 2016

So can Comodo be any sleazier? Trademarking "Let's Encrypt"?

Comodo has backed down from their, well, cynical and sleazy idea that they were bigger bullies than  a little non-profit, so applied for a trademark for "Let's Encrypt" in October 2015.

In doing that they admitted that they've never used the expression themselves (Techdirt) , and a quick Internet search shows that letsencrypt.org was registered on the web in 2014, and the organization had, as of June 15 2016, issued 5 Million certificates.

When asked about this by Let's Encrypt, there was silence until LE went public, and Comodo finally backed down, abandoning the filing, thankfully, but it begs the question:

Comodo is one of the biggest Certificate authorities, and "The largest issuer of SSL certificates with a 33% market share on 6% of all web domains" (Wikipedia) 

Are they a business that deserves the level of trust required by your security provider?

Oh by the way - Comodo's wikipedia page has a listing about Symantec:
https://en.wikipedia.org/wiki/Comodo_Group#Symantec

Symantec is the company that acquired Bluecoat 

So that's quite the triumvirate - Comodo makes the certs, Symantec now has the client and the SSL-unpacking proxy.

As a matter of fact our computers are definitely not our own

  

From Slate - Cyber Weapons are NOT like Nuclear


Cyberweapons Aren’t Like Nuclear Weapons

Officials around the world like to compare the two—but the metaphor is incorrect, and dangerous.

 “If Internet security cannot be controlled, it’s not an exaggeration to say the effects could be no less than a nuclear bomb,” said Gen. Fang Fenghui, chief of general staff of the People’s Liberation Army of China, in April 2013. Fang is not alone in drawing comparisons between nuclear weapons and cyberweapons during the past few years. Secretary of State John Kerry responded to a cybersecurity question during his confirmation hearings in January 2013 by saying, “I guess I would call it the 21st century nuclear weapons equivalent.” That same year, Russian Deputy Prime Minister Dmitry Rogozin praised cyberweapons for their “first strike” capability. Since 2013, a number of leaders in the U.S. national security establishment—including former National Security Adviser Brent Scowcroft in January 2015, Adm. Michael Rogers of Cyber Command in March 2015, and Director of National Intelligence James Clapper in February of this year—have stated that the threat posed by cyberweapons is comparable to, or greater than, that of nuclear weapons. The list of high-ranking officials who have made an analogy between the fundamentally different nuclear and cyberweapons systems, and are using this flawed analogy as a basis for policy, is a long one.

 On the surface, the analogy is compelling. Like nuclear weapons, the most powerful cyberweapons—malware capable of permanently damaging critical infrastructure and other key assets of society—are potentially catastrophically destructive, have short delivery times across vast distances, and are nearly impossible to defend against. Moreover, only the most technically competent of states appear capable of wielding cyberweapons to strategic effect right now, creating the temporary illusion of an exclusive cyber club. To some leaders who matured during the nuclear age, these tempting similarities and the pressing nature of the strategic cyberthreat provide firm justification to use nuclear deterrence strategies in cyberspace. Indeed, Cold War–style cyberdeterrence is one of the foundational cornerstones of the 2015 U.S. Department of Defense Cyber Strategy.

More ... 
http://www.slate.com/articles/technology/future_tense/2016/03/cyberweapons_are_not_like_nuclear_weapons.html

Wednesday, June 22, 2016

Spamford Wallace Headed for the Slammer?


Don't know Spamford Wallace - here's another article

Wonder how Walt is doing?

How to avoid being scammed on Craigs List? Follow the rules...

Slashdot has an Interview With A Craigslist Scammer, and apparently

He ended the interview asking the scammer for any words of advice for readers. The scammer responded: "It's getting harder for business people like me to be successful, but if they [the victims] follow the rules it would be very hard for me to be successful. That's one of the surprises. My friends and I thought we would not be successful for so long, especially with how Craigslist is different now. But there is always someone looking to sell something who doesn't know the game."

Who'da Thunk?

Sunday, June 19, 2016

Remove location from facebook app Now

According to popular science, Facebook is explicitly tracking you
http://www.popsci.com/facebook-will-know-what-stores-you-go-into (Link)

Does it really matter?  According Slashdot, through truth-out.com and to Edward Snowdon, Smartphone Users Are Paying For Their Own Surveillance