Free Republic 3rd Quarter Fundraising Target: $85,000 Receipts & Pledges to-date: $80,755
95%  
Woo hoo!! And we're now over 95%!! Less than $4.3k to go!! We can do this!! Thank you all very much!!

Keyword: security

Brevity: Headers | « Text »
  • BOMBSHELL: Homeland Security monitoring ISIS already IN THE U.S. and fear more through open borders

    08/24/2014 9:21:12 AM PDT · by sheikdetailfeather · 108 replies
    The Right Scoop via Fox News ^ | 8/23/2014 | soopermexican
    Terrorism expert Brigitte Gabrielle seemed to confirm what many suspected and feared on Judge Jeanine’s show on Saturday night. She said that Homeland Security are monitoring suspected members of ISIS already in America, and they’re afraid that others might be coming in through our porous border.
  • As 9/11 arrives for another year, terror targets?

    08/10/2014 10:46:45 AM PDT · by jyro · 16 replies
    I dread to see another 9/11 date come around. Benghazi enhanced that date as a terror target. I know we can't prevent attacks world wide on U.S.A. targets. I just hope and pray we are better prepared to respond in real time. Be aware of your surroundings and be prepared.
  • U.S. Homeland Security contractor reports computer breach (Illegal aliens not mentioned)

    08/06/2014 8:16:01 PM PDT · by Libloather · 7 replies
    MSN ^ | 8/06/14
    WASHINGTON (Reuters) - A company that performs background checks for the U.S. Department of Homeland Security said on Wednesday it was the victim of a cyber attack, adding in a statement that "it has all the markings of a state-sponsored attack." The computer breach at Falls Church, Virginia-based US Investigations Services (USIS) probably involved the theft of personal information about DHS employees, according to the Washington Post, which first reported the story. DHS has suspended all work with the company amid an investigation by the FBI, the Post reported. A U.S. government official confirmed to Reuters that the FBI is...
  • Proof - DHS 'Partnered' with UN Migration Organization Before Engineering Border Crisis

    08/06/2014 12:33:12 PM PDT · by James Franklin
    DontComply.com ^ | 8/6/2014 | James Franklin
    "In the October-November 2011 issue of Migration Policy Practice, the UN International Organization for Migration (IOM) announced that in March it had ‘partnered’ with the US Department of Homeland Security (DHS). An IOM/DHS workshop, held around the same time as the first ‘Morton Memo’, planned how to best facilitate a mass migration of illegal immigrants into the United States..." " On July 18, 2014, the IOM posted this article on their website clearly claiming credit for facilitating the crisis: 'IOM Stresses Need to Increase Assistance to Unaccompanied Children Traveling to the United States' excerpt - “The ability of transit countries...
  • Proof - DHS 'partnered' with UN Migration Organization Before Engineering the Border Crisis

    08/06/2014 12:33:12 PM PDT · by James Franklin · 66 replies
    DontComply.com ^ | 8/6/13 | James Franklin
    "In the October-November 2011 issue of Migration Policy Practice, the UN International Organization for Migration (IOM) announced that in March it had ‘partnered’ with the US Department of Homeland Security (DHS). An IOM/DHS workshop, held around the same time as the first ‘Morton Memo’, planned how to best facilitate a mass migration of illegal immigrants into the United States..." " On July 18, 2014, the IOM posted this article on their website clearly claiming credit for facilitating the crisis: 'IOM Stresses Need to Increase Assistance to Unaccompanied Children Traveling to the United States' excerpt - “The ability of transit countries...
  • Why any decent website doesn't know your password. (video)

    08/06/2014 7:24:21 AM PDT · by servo1969 · 10 replies
    dump.com ^ | 8-6-2014 | Tom Scott
    A brief introduction to password hashing for the uninitiated -- and why you should never trust a site that emails your password back to you!
  • CIA Strikes Penitent Pose

    08/04/2014 6:29:31 AM PDT · by John Semmens · 5 replies
    Semi-News/Semi-Satire ^ | 2 August 2014 | John Semmens
    With the escape route of deniability closed, CIA Director John Brennan grudgingly apologized to Senate intelligence committee leaders for his Agency’s covert perusal of their correspondence. “Yeah, we’re sorry,” Brennan growled. “But I still don’t see what the big deal is. We spy on everyone. Why should Senators be exempt from our efforts to protect national security? Are they somehow better than the average Americans they supposedly represent?” “Is it really implausible that Senators having access to classified information might pose a significant security risk?” Brennan continued. “I could argue that the need to keep an eye on what they...
  • Another Saudi port deal - Selling off control of America one piece at a time

    08/04/2014 5:53:03 AM PDT · by Elle Bee · 20 replies
    The Patroit Factor ^ | August 3, 2014 | Diane Sori
    What pray tell has our country come to, and what pray tell has my beloved state of Florida allowed, as a Middle Eastern company…Gulftainer…was recently awarded a 35-year, $100 million concession agreement to ‘supposedly’ boost cargo operations at Port Canaveral…a port NOT far from the Trident Turning Basin which the Navy uses to support our fleet of nuclear ballistic missile submarines…and a port perilously close to the Kennedy Space Center and Cape Canaveral where our space launches take place…or at least they did until Obama cut their funding. And while it’s claimed by port officials that the new container and...
  • This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil”

    07/31/2014 10:16:53 AM PDT · by Utilizer · 18 replies
    ars technica ^ | July 31 2014, 6:21am -0700 | Dan Goodin
    This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil” Per FR posting rules, ars technica can not be posted, so a link to the article referring to USB thumbdrives hacking computers is listed instead. Ignore the "source url", it just points back to the FR website. Article here: http://arstechnica.com/security/2014/07/this-thumbdrive-hacks-computers-badusb-exploit-makes-devices-turn-evil/
  • Average Internet of Things device has 25 security flaws

    07/31/2014 9:54:43 AM PDT · by mojito · 28 replies
    The Telegraph ^ | 7/30/2014 | Matthew Sparkes
    The Internet of Things (IoT) has connected everything from smoke alarms to fridges and cars, making life easier and safer – but it has also given hackers a new way to attack their victims, warns HP. In a study of the ten most popular IoT devices (which it did not name in its report) HP found 250 potentially dangerous security vulnerabilities. The devices came from manufacturers of TVs, webcams, home thermostats, remote power outlets, sprinkler controllers, hubs for controlling multiple devices, door locks, home alarms, scales and garage door openers. All of the devices included remote smartphone applications which were...
  • Which is better, Adblock or Adblock Plus?

    07/30/2014 9:41:18 AM PDT · by Utilizer · 22 replies
    Wladimir Palant's notes ^ | 2014-07-29 11:18 local | Wladimir Palant
    Note: This is explicitly posted in my private blog rather than the Adblock Plus blog. This post represents my own opinion only. It is likely unwise to rant about a competing project but I just don’t want to keep my findings to myself. If you are here for Adblock Plus bashing and don’t care enough to read the post, please make sure to read the edit at the bottom nevertheless. On Chrome, two popular ad blockers are currently available: AdBlock and Adblock Plus. Despite the confusingly similar names, they are completely unrelated projects. I am in charge of the latter,...
  • BREAKING -- Obama Abandons Israel At U.N. Security Council…

    07/28/2014 9:03:49 PM PDT · by Nachum · 75 replies
    Red Flag News ^ | 7/28/14
    Despite a history of rocky relations between U.S. President Barack Obama and Israeli Prime Minister Benjamin Netanyahu, the Obama administration could largely be counted on to watch Israel’s back in the U.N. Security Council, where it succeeded for more than five years in blocking successive efforts by the Palestinians to gain more of the trappings of an independent state and to get the world body to formally censure Israeli settlement policies. That changed after the stroke of midnight Sunday when, in the early minutes of Monday, July 28, the U.N. Security Council, with the backing of the United States, issued...
  • UN Security Council, with US backing, calls for “unconditional” ceasefire

    07/28/2014 6:47:26 PM PDT · by Nachum · 63 replies
    Jihad Watch ^ | 7/28/14 | Robert Spencer
    This is the first time that the United States has not supported Israel at the United Nations. It is surprising that in the Obama presidency, with all of Obama’s obvious hostility toward Israel, that it has taken this long. It is unlikely to be the last time that this happens. “The United States Lowers Israel’s Diplomatic Shield at the United Nations,” by Colum Lynch, Foreign Policy, July 28, 2014 (thanks to Jerk Chicken): Despite a history of rocky relations between U.S. President Barack Obama and Israeli Prime Minister Benjamin Netanyahu, the Obama administration could largely be counted on to watch...
  • 11 sure signs you've been hacked

    07/27/2014 9:47:12 AM PDT · by TwelveOfTwenty · 9 replies
    CSO Online ^ | Nov 4, 2013 7:00 AM | Roger A. Grimes
    Here are 11 sure signs you've been hacked and what to do in the event of compromise. Note that in all cases, the No. 1 recommendation is to completely restore your system to a known good state before proceeding. In the early days, this meant formatting the computer and restoring all programs and data. Today, depending on your operating system, it might simply mean clicking on a Restore button. Either way, a compromised computer can never be fully trusted again. The recovery steps listed in each category below are the recommendations to follow if you don't want to do a...
  • Theory of 2 teams floated by NYPD in Brooklyn Bridge flag-swipe

    07/23/2014 11:34:38 AM PDT · by bryan999 · 44 replies
    NYPD officials investigating how the two American flags on top of the Brooklyn Bridge were replaced with two white banners said Wednesday that the act was likely carried out by up to five intruders in two teams with knowledge of the bridge, The New York Post reported. The teams' plan to evade police in four patrol cars included aluminum lasagna pans they used to cover the floodlights aimed at the flags during the switch at 3:29 a.m. Tuesday. The 11-by-20-foot white flags were first spotted at the break of dawn by a police officer, The Post reported. "For someone to...
  • Old technology in NSA age: Typewriter sales surge in Germany

    07/23/2014 7:09:30 PM PDT · by Enterprise · 48 replies
    RT.com ^ | July 23, 2014 | Unknown
    Earlier in July, German politicians said they were considering going back to old-fashioned manual typewriters for confidential documents, in order to protect national secrets from American NSA spooks. Patrick Sensburg, chair of the German parliament’s inquiry into alleged NSA spying, said committee members are considering new security measures and are seriously thinking about abandoning email and returning to old school typewriters.
  • No Longer the World’s Policeman, We’re Now the World’s Social Worker

    07/20/2014 7:05:47 AM PDT · by Sean_Anthony · 39 replies
    Canada Free Press ^ | 07/20/14 | Michael R. Shannon
    It’s 9 AM late July and already the day is shot to hell. The temperature is over 80 and the humidity would wilt a Puritan’s collar. You’re supposed to be taking Migra, your Mexican Water Spaniel, on a 400–hundred-mile car trip. The dog’s 14–years–old if he’s a day, and who knows if he’ll live long enough to be reunited with the rest of your family. Plus, you can’t just motor out the driveway because that’s not a good idea where you live.
  • Delusional Democrats Who Lied About Border Security Called Out in a Video So Absurd It’s Hilarious

    07/18/2014 6:53:29 PM PDT · by Nachum · 14 replies
    IJR Review ^ | 7/18/14 | Jennifer Van Laar
    The Washington Free Beacon has put together a greatest hits compilation of the Democrats’ border security quotes. Why would the Democrats continuously insist that the border is secure? Perhaps because Republicans insist on having a secure border before discussing any type of immigration reform legislation. Democrats don’t think people will catch up to this at some point? The PR game that carried Obama – health care lies and all – to the White House is showing significant signs of incompetent wear and tear lately…
  • The Era of Intended Adverse Consequences

    07/17/2014 9:33:53 AM PDT · by Aspenhuskerette · 4 replies
    The Aspen Times (CO) ^ | July 17, 2014 | Melanie Sturm
    “Too often … we enjoy the comfort of opinion without the discomfort of thought,” President Kennedy famously asserted before Yale’s class of 1962. Denouncing political debates that “bear little or no relation to the actual problems the United States faces,” Kennedy urged policymakers to Think Again before engaging in “false dialogues” that “distract our attention and divide our efforts.” He believed “the very future of freedom depends upon the sensible and clearheaded management of the domestic affairs of the United States” and a “vigorous economy” — quaint concerns 52 years hence. Because today’s political discourse is so dishonest and domestic...
  • Militarize Our Border? O'Reilly, Here's Your Plan

    07/13/2014 6:32:50 AM PDT · by rktman · 34 replies
    americanthinker.com ^ | 7/13/2014 | Russ Vaughn
    Bill O’Reilly almost nightly calls for the militarization of our southern border, but he never has any guests to explain how this could be done. So, Bill, since I agree with you, here is a rudimentary plan worked out by someone with a working knowledge of both our military capabilities and the geographical area in question. Mind you, I have no information regarding military training budgets, but as we withdraw from large-scale overseas operations, our leadership should consider applying funds no longer needed for those to the mission of defending our currently defenseless southern border.
  • Don’t pet the new Secret Service dogs at the White House

    07/11/2014 2:59:48 AM PDT · by tbpiper · 33 replies
    PBS News Hour ^ | July 9, 2014 at 4:29 PM EDT | BY Josh Lederman, Associated Press
    The Secret Service has started deploying specialized canine units to help protect the area around the White House grounds, where tourists flock day and night to catch a glimpse of 1600 Pennsylvania Ave. Although the Secret Service has used police dogs since 1976 to screen areas for presidential visits, this is the first time they’re being broadly deployed among the general public.(emphasis added)
  • Here’s one way to land on the NSA watch list

    07/10/2014 6:41:50 AM PDT · by ShadowAce · 31 replies
    Wonky News Nerd ^ | 10 July 2014 | Julia Angwin and Mike Tigas
    Last week, German journalists revealed that the National Security Agency has a program to collect information about people who use privacy-protecting services, including popular anonymizing software called Tor. But it’s not clear how many users have been affected. So we did a little sleuthing, and found that the NSA’s targeting list corresponds with the list of directory servers used by Tor between December 2010 and February 2012 – including two servers at the Massachusetts Institute of Technology. Tor users connect to the directory servers when they first launch the Tor service.That means that if you downloaded Tor during 2011, the NSA may have scooped up your...
  • We the People petition the Federal Courts to get involved now. (Vanity)

    07/07/2014 4:14:25 AM PDT · by Enterprise · 26 replies
    Vanity | 7/7/2014 | Enterprise
    We the People plead with the Federal Courts to stop the ongoing criminal conduct of the Obama Administration. The Federal Courts have acted in the past, when Congress could not act, or would not act, to protect the civil rights and safety of Americans.
  • U.S. Nuke Sites Dismantled Security to Save Money, Report Warns

    07/02/2014 2:41:42 AM PDT · by markomalley · 14 replies
    Washington Free Beacon ^ | 7/2/2014 | Adam Kredo
    The organization responsible for securing America’s highly sensitive nuclear sites has been suffering from a “chaotic” and “dysfunctional” security policy that has endangered the country’s nuclear sites and left them vulnerable to attack, according to a new report by the government’s watchdog group.The National Nuclear Security Administration (NNSA), which is tasked with managing the nation’s nuclear stockpile and securing classified research sites, has “increased risks and reduced security” over the past several years in a bid to reduce overhead costs, according to a new Government Accountability Office (GAO) report.Security vulnerabilities at these NNSA sites still persist two years after a...
  • New House Majority Leader: Border Security, Then Legalization

    06/29/2014 1:42:40 PM PDT · by Cringing Negativism Network · 43 replies
    National Review ^ | June 29, 2014 12:44 PM | By Joel Gehrke
    Kevin McCarthy, the California Republican who replaced Virginia representative Eric Cantor as House majority leader, believes there is an “opportunity” to negotiate for the legalization of illegal immigrants, but not until the border is secure.
  • Security tight as Bergdahl goes through reintegration

    06/20/2014 7:20:48 PM PDT · by Libloather · 13 replies
    WQAD ^ | 6/20/14 | Shellie Nelson
    (CNN) — Like the six other former captives who have been through the Army’s reintegration program at Brooke Army Medical Center before him, daily life for Sgt. Bowe Bergdahl is focused on routine. He rises, eats and sleeps on a “normal schedule” and lives in a “typical” room at the huge hospital facility on a floor he shares with other patients. What isn’t typical is the security presence outside his door. The reason, says Col. Hans Bush, command spokesman for U.S. Army South, is not to keep the returnee in, but “to make sure he doesn’t get overwhelmed in a...
  • Access Health CT to make changes after security breach

    06/09/2014 3:52:28 PM PDT · by matt04 · 7 replies
    The state’s Obamacare health insurance exchange is apologizing Monday and is quickly trying to make things right after a security breach. In this age of high tech security breaches, this one was decidedly low tech. A backpack was found at a deli in downtown Hartford containing hand-written notepads with names addresses and some social security numbers and letterhead from ‘Access Health CT.’ The person that found it did not call the police. They gave it to a Republican State Rep who turned it in to the Obamacare headquarters. “Access Health CT” says the notepads and backpack belong to a call-center...
  • Are Children's sissors that dangerous??

    06/06/2014 7:32:24 PM PDT · by ealgeone · 51 replies
    vanity | 06-06-14 | ealgeone
    Today my family and I had need of entering a federal building. In the process of doing so we encountered the following crazy federal hangups. 1) one family member had a pair of child's sissors they forgot about. these had to be removed and kept up front before we were allowed entrance to the building. now bear in mind thousands of kids take the very same kind of sissors to the gun free zones known as schools every day without a care. in fact, the schools often supply the "deadly" weapons. 2) another family member had left their driver's license...
  • Stop. Put down the cup. Six new bugs found in OpenSSL – including a hole for snoopers

    06/05/2014 11:09:28 AM PDT · by ShadowAce · 6 replies
    The Register ^ | 5 June 2014 | John Leyden
    OpenSSL today pushed out fixes for six security vulnerabilities – including a flaw that enables man-in-the-middle (MITM) eavesdropping on encrypted connections, and another that allows miscreants to drop malware on at-risk systems.A DTLS invalid fragment bug (CVE-2014-0195, affects versions 0.9.8, 1.0.0 and 1.0.1) can be used to inject malicious code into vulnerable software on apps or servers. DTLS is more or less classic TLS encryption over UDP rather than TCP, and is used to secure live streams of video, voice chat and so on.However an SSL/TLS MITM vulnerability (CVE-2014-0224, potentially affects all clients, and servers running 1.0.1 and 1.0.2-beta1) is...
  • Obama pledges to defend Poland’s security (again)

    06/04/2014 8:04:21 AM PDT · by Olog-hai · 21 replies
    EU Observer ^ | 06/04/2014 @ 16:37 | Andrew Rettman
    US leader Barack Obama has promised to defend Poland and other NATO allies against potential Russian aggression. “I’ve come to Warsaw today—on behalf of the United States, on behalf of the NATO alliance—to reaffirm our unwavering commitment to Poland’s security. [The NATO treaty’s] Article 5 is clear—an attack on one is an attack on all,” he said in a speech in the Polish capital on Wednesday (4 June). “Poland will never stand alone. But not just Poland—Estonia will never stand alone. Latvia will never stand alone. Lithuania will never stand alone. Romania will never stand alone,” he added. “These are...
  • China sentences mining tycoon Liu Han to death

    05/23/2014 10:59:09 PM PDT · by CorporateStepsister · 10 replies
    MSN News ^ | May 24 2014 | By AFP
    A Chinese court on Friday convicted a mining billionaire said to have links with former security tsar Zhou Yongkang of murder and sentenced him to death. Liu Han led private company Hanlong, which once launched a billion-dollar bid for an Australian firm. He and his brother Liu Wei were found guilty of "organising and leading a mafia-style group", murder and other crimes, the Xianning Intermediate People's Court said. They and three accomplices were sentenced to death.
  • Cisco CEO asks Obama to curtail surveillance, according to reports

    05/18/2014 3:43:04 PM PDT · by Oldeconomybuyer · 17 replies
    Washington Post ^ | May 18, 2014 | BY KATIE ZEZIMA
    Cisco CEO John Chambers has sent a letter to President Obama calling for rules ensuring that both needs of national security and product integrity are met, according to reports. The Financial Times and Re/code are reporting that Chambers sent a letter dated May 15 to Obama, warning that confidence in an open Internet is being "eroded by revelations of governments' surveillance" and asking him to create new standards of conduct about how the government collects data. "Absent a new approach where industry plays a role, but in which you, Mr. President, can lead, we are concerned that our country's global...
  • The Words "Boko Haram" Have Become Nigeria's National Synonym for Fear

    05/10/2014 5:05:03 PM PDT · by Enchante · 20 replies
    National Geographic ^ | May 8, 2014 | James Verini
    One Nigerian official's wish for Boko Haram: "Find them, kill them." ....... "I love this about America," he said with a tone of, if not love, then certainly reverence. "Find them, kill them. Don't wait for judicial manipulation." As the parents of the kidnapped schoolgirls become more desperate, and their protests in Abuja grow larger, he may be repeating those four words to himself like a mantra.
  • Obama says Japan's disputed islands with China is within scope of U.S.-Japan security treaty

    04/23/2014 7:45:43 AM PDT · by SeekAndFind · 27 replies
    Reuters ^ | 04/23/2014
    (Reuters) - U.S. President Barack Obama said that islands at the center of a territorial dispute between Japan and China fall within the scope of the U.S.-Japan security treaty, the Yomiuri Shimbun daily said on Wednesday. Obama, who arrives in Japan later on Wednesday on the first step of a four-nation Asian visit, made the remarks in written replies to questions.
  • The U.S. Cut Military Spending in 2013, While These Two Global Powers Did the Opposite

    04/23/2014 6:26:00 AM PDT · by SkyPilot · 29 replies
    The Blaze ^ | 14 Apr 14 | Elizabeth Kreft
    Global military spending dropped by nearly two percent in 2013, led by the United States which dropped it’s spending by 7.8 percent. By contrast, the military industrial complexes in Russia and China are bustling; seeing a 4.8 and 7.4 percent increase, respectively. "For the first time since 2003, Russia spent a larger percentage of it’s Gross Domestic Product on military expenses than the United States… " The U.S. dropped spending from roughly $690 Billion in 2012, to $640 Billion in 2013, shrinking to 3.8 percent of the Gross Domestic Product. The reduction is noted in real terms, which means the...
  • "They know we're coming." With piss-poor operational security, Feds flood the zone at Las Vegas

    04/20/2014 11:23:12 AM PDT · by Nachum · 28 replies
    Sipsey Street Irregulars ^ | 4/20/14 | Dutchman 6
    <p>"They know, Chuck, they know. They know we're coming." -- ATF undercover agent Robert Rodriguez to raid commander Chuck Sarabyn, 28 February 1993, one hour before the raid on the Branch Davidians.</p> <p>"It is of no concern. Soon the Rebellion will be crushed."</p>
  • Obama Promised a ‘Civilian National Security Force’ – Today There Are Over 120,000 Armed Federal

    04/19/2014 11:48:24 PM PDT · by Nachum · 53 replies
    The Gateway Pundit ^ | 4/20/14 | Jim Hoft
    Armed federal agents at the Cliven Bundy ranch in Nevada, April 2014. (Natural News)In 2008, Barack Obama announced his plan to build a massive “civilian national security force” here in America. It would be just as well funded as the US military.
  • Google Knew About Heartbleed and Didn’t Tell the Government

    04/16/2014 12:55:45 PM PDT · by george76 · 11 replies
    National Journal ^ | April 14, 2014 | Brendan Sasso
    Federal systems remained vulnerable to hackers even after researchers identified the bug. Google knew about a critical flaw in Internet security, but it didn't alert anyone in the government. Neel Mehta, a Google engineer, first discovered "Heartbleed"—a bug that undermines the widely used encryption technology OpenSSL—some time in March. A team at the Finnish security firm Codenomicon discovered the flaw around the same time. Google was able to patch most of its services—such as email, search, and YouTube—before the companies publicized the bug on April 7. The researchers also notified a handful of other companies about the bug before going...
  • Security 'bad news for sex drive'

    04/15/2014 9:14:36 PM PDT · by Jack Hydrazine · 43 replies
    BBC News ^ | 14APR2014 | BBC Staff Writer
    A woman's sex drive begins to plummet once she is in a secure relationship, according to research. Researchers from Germany found that four years into a relationship, less than half of 30-year-old women wanted regular sex. Conversely, the team found a man's libido remained the same regardless of how long he had been in a relationship.
  • ‘Heartbleed’ Bug Exposes Passwords, Web Site Encryption Keys

    04/08/2014 6:13:21 PM PDT · by Drago · 25 replies
    Krebs on Security ^ | 04-08-2014 | Brian Krebs
    Researchers have uncovered an extremely critical vulnerability in recent versions of OpenSSL, a technology that allows millions of Web sites to encrypt communications with visitors. Complicating matters further is the release of a simple exploit that can be used to steal usernames and passwords from vulnerable sites, as well as private keys that sites use to encrypt and decrypt sensitive data.
  • Serious OpenSSL bug renders websites wide open

    04/08/2014 11:13:55 AM PDT · by Utilizer · 30 replies
    itnews au ^ | on Apr 8, 2014 8:07 AM | Juha Saarinen
    A serious vulnerability in the popular OpenSSL cryptographic library has been discovered that allows attackers to steal information unnoticed. Known as the Heartbleed bug, the vulnerability allows anyone on the Internet to read the memory of systems that run vulnerable versions of OpenSSL, revealing the secret authentication and encryption keys to protect the traffic. User names, passwords and the actual content of the communications can also be read. ... OpenSSL recommends that uses immediately upgrade to version 1.0.1g. If that's not possible, users should recompile OpenSSL with the -DOPENSSL_NO_HEARTBEATS flag to remove the the heartbeat handshake. The 1.0.2 version of...
  • Data security earns BlackBerry a boost from the Pentagon

    03/27/2014 11:26:13 PM PDT · by deks · 1 replies
    The Globe and Mail ^ | March 27, 2014 | The Canadian Press
    BlackBerry has earned a “full operational capability” designation from the U.S. Defense Department for its BlackBerry 10 smartphones and enterprise service, the smartphone company said Thursday. BlackBerry said the security certification will allow U.S. government employees to securely access email, data, apps and other department network resources using the company’s latest smartphones. On Wednesday, BlackBerry received certification for U.S. government employees to use its secure work space enterprise software on iPhones and devices that use the Android operating system. The technology is among products that became available through the rollout of the company’s BlackBerry 10 operating system. The software helps...
  • Half-blind guard caught sleeping at WTC site

    03/26/2014 10:28:15 PM PDT · by ConservativeStatement · 24 replies
    New York Post ^ | March 26, 2014 | Philip Messing, Reuven Fenton and Bruce Golding
    Only days before President Obama revealed that his worst fear was a nuclear terror attack on Manhattan, a nearly blind guard was caught sleeping on the job at the Freedom Tower — where he was the building’s first line of defense. In a shocking cellphone photo obtained exclusively by The Post, Abdul Basher, 65, is wearing shades and lying almost completely flat in a chair in the No. 1 terror target’s south lobby, where he was the only guard stationed, sources said.
  • Homeland Security Chief Swoons Over Terrorist Support Group CODE PINK – Asks For Medea Benjamin’s

    03/18/2014 6:35:30 PM PDT · by Nachum · 32 replies
    The Gateway Pundit ^ | 3/18/14 | Jim Hoft
    Medea Benjamin, left sans vagina costume, leads group meeting Homeland Security Sec. Jeh Johnson, photo by Code Pink.It’s an Obama world. As the United States faces a Cold War showdown over Russia annexing Crimea and an international passenger jet having seemingly disappeared, Secretary of Homeland Security Jeh Johnson met with leaders of the terrorist support group Code Pink at Homeland Security headquarters in Washington, D.C. on Monday. Medea Benjamin wipes her feet on ‘Homeland Security’, photo by Code Pink.It is another feather in the cap of a group that has a history of working with terrorists and state sponsors...
  • If We Ban Bossy, Will They Take Their HOPE and CHANGE and Go Away?

    03/16/2014 9:51:36 AM PDT · by NOBO2012 · 13 replies
    Michelle Obama's Mirror ^ | 3-16-2014 | MOTUS
    For those of you who don’t think Big Guy works hard enough: here’s concrete evidence to the contrary. He pulled an all-nighter working on this marketing schematic B4 he tweeted it out:Seriously, young-uns, Big Guy hates to be the one to deliver the bad news, butt you are NOT invincible; incredible? Yes:The Incrediblesbutt invincible? Nah. Not unless you’re a wise, bossy woman. Oh yes, I am wise But it's wisdom born of pain Yes, I've paid the price But look how much I gained If I have to, I can do anything I am strong (Strong) I am invincible (Invincible)...
  • Senator Complains about CIA Spying

    03/15/2014 11:56:55 AM PDT · by John Semmens · 3 replies
    Semi-News/Semi-Satire ^ | 14 March 2014 | John Semmens
    This week Senator Diane Feinstein (D-Calif), a long time supporter of the intelligence community, expressed outrage upon discovering that the CIA has been spying on members of Congress. “I have backed every budget request the CIA has put forward,” Feinstein declared. “I have defended them against their detractors from both sides of the ideological spectrum. Now we find out that they have been surreptitiously breaking into the emails of members of Congress—including mine. It is one thing to spy on ordinary people. It is quite another for them to spy on a separate branch of government.” CIA Director John Brennan...
  • Identity Theft Protection is it worth it?

    03/12/2014 5:49:44 PM PDT · by Ben Mugged · 39 replies
    Me | March 12, 2014 | Me
    Is identity theft a real enough problem to warrant $10/month monitoring service? I must decide whether or not to get the service but to initiate it I must trust the service with a lot of personal data.
  • Suspected Russian spyware Turla targets Europe, U.S.

    03/07/2014 9:05:54 AM PST · by afraidfortherepublic · 5 replies
    Reuters ^ | 3-7-14 | Peter Apps and Jim Finkle
    A sophisticated piece of spyware has been quietly infecting hundreds of government computers across Europe and the United States in one of the most complex cyber espionage programs uncovered to date. Several security researchers and Western intelligence officers say they believe the malware, widely known as Turla, is the work of the Russian government and linked to the same software used to launch a massive breach on the U.S. military uncovered in 2008. Those assessments were based on analysis of tactics employed by hackers, along with technical indicators and the victims they targeted.
  • GnuTLS: Big internal bugs, few real-world problems

    03/07/2014 4:20:54 AM PST · by ShadowAce · 5 replies
    ZD Net ^ | 06 March 2014 | Steven J. Vaughan-Nichols
    According to some reports you'd think the security sky was falling. Yes, GnuTLS, an open-source "secure" communications library that implements \Secure-Socket Layer (SSL) and Transport Layer Security (TLS), has serious flaws. The good news? Almost no one uses it. OpenSSL has long been everyone's favorite open-source security library of choice. Red Hat discovered the latest in a long-series of GnuTLS bugs .Latest? Yes, latest.You see, GnuTLS has long been regarded as being a poor SSL/TLS security library. A 2008 message on the OpenLDAP mailing list had "GnuTLS considered harmful" as its subject — which summed it up nicely. In it, Howard...
  • Apple security flaw could let hackers beat encryption

    02/22/2014 10:33:57 AM PST · by for-q-clinton · 22 replies
    CNBC ^ | 22 Feb 2014 | Yasuyoshi Chiba
    A major flaw in Apple Inc software for mobile devices could allow hackers to intercept email and other communications that are meant to be encrypted, the company said on Friday, and experts said Mac computers were even more exposed. If attackers have access to a mobile user's network, such as by sharing the same unsecured wireless service offered by a restaurant, they could see or alter exchanges between the user and protected sites such as Gmail and Facebook. Governments with access to telecom carrier data could do the same. ... "It's as bad as you could imagine, that's all I...