S414m4n63r writes: as the internet is increasingly becomes under government surveillance http://tinyurl.com/asacby5 / http://tinyurl.com/75edr6u but only to their disappointment thy seem to be finding out how sharp are teeth are http://tinyurl.com/d64cwaw but is this all about p2p sharing seemingly not as all other US administrations have never used a espionage act but only two time since it was born in the 1900's the new and current one has used it 6 times so far
S414m4n63r writes: on October 1st 2012 Chinese hackers gain access to white house's computers though a phishing attack when a unnamed staff member clicks on a link sent by email from the attackers the hackers targeted the white house military office to try and steal the launch codes but the computers that were infected were quickly isolated and the white house reports no sensitive data was leaked Link to Original Source
S414m4n63r writes: we have all seen them movies some one piss's of that wrong hacker and the next thing you know the world is falling to its knees street lights are going out power plants are blowing up you cant visit you favorite porn site and its being done by 2 or 3 people in a van, well im afraid to inform you that thy dont even need the van to pull most of that stuff heck who are we kidding a lot of it can probably be done with a smart phone as Mr. tentler aka viss explains and deminstraits a little bit, in one of his wonderful and frighting speeches at defcon, all to sadly their is a constant flow of news articles coming out about are blatant lack of security with in are infrastructure http://tinyurl.com/csl3j4m and as the world continues to become more and more dependent technology their will just be more flaws in the systems we need for are every day lives or we start putting time money and COMMON SENSE "im mean come who puts a web server on a industrial power generate" in to the things we build. Link to Original Source
CowboyRobot writes: "Jeremiah Grossman of Whitehat Security has an article at the ACM in which he outlines the current state of browser security, specifically drive-by downloads.
Grossman's proposed solution is to make the desktop browser more like its mobile cousins.
"By adopting a similar application model on the desktop using custom-configured Web browsers (let's call them DesktopApps), we could address the Internet's inherent security flaws. These DesktopApps could be branded appropriately and designed to launch automatically to Bank of America's or Facebook's Web site, for example, and go no further. Like their mobile application cousins, these DesktopApps would not present an URL bar or anything else making them look like the Web browsers they are on the surface, and of course they would be isolated from one another.""
hypnosec writes: Kim Dotcom’s plan of launching a “bigger, better, faster, stronger, safer” Megaupload successor, Mega, is already in peril as Gabon's government has suspended the domain www.me.ga. Announcing his decision, Gabon’s Communication Minister Blaise Louembe said "I have instructed my departments... to immediately suspend the site www.me.ga" in a bid to "protect intellectual property rights" and "fight cyber crime effectively." Dotcom has revealed through a tweet that he is in possession on an alternative domain name and that the recent suspension “demonstrates the bad faith witch hunt the US government is on.” Link to Original Source
to think things get deleted any more is a myth from ever search, email and txt you send it will all be stored and archived heck i still messages on facebook i got 4 years ago i thought i deleted untell thy decided to let people see them with the archive sec thy just put in
S414m4n63r writes: as the flood of reports start coming in it comes to no surprise it was a bad idea to begin with, electronic voting machines are failing all over the country and are casting the wrong votes,im sure the conspiracy theories will start flying next, but in reality its much more likely to be the work of incompetent programers Link to Original Source
S414m4n63r writes: ""the late 50s & early 60s a time of love life and free minds, while most of are country men and woman were busy trying to live their life's to the fullest though mind altering drugs and 30 minute guitar solos the good old boys at the nsa were busy and hard at work fighting the ruskies and that fight like many fights were for information and so the T.E.M.P.E.S.T device was born a device made for capturing low radiation emitted from mostly any device that would emit such radiation tv computers microchips microwaves you name it, strangely for a 60 year old spying device many still dont know about it or that it even exist so very much of the civilian world is still open to such a old attacks, in a nut shell the tempest is basically a modified ham radio some what easy and cheap to construct the link iv provided will give any one that is interested the knowledge to defend against and build one of their own little spying box's have fun and be safe""