HOME/ABOUT  Prayer  SCOTUS  ProLife  BangList  Aliens  StatesRights  ConventionOfStates  WOT  HomosexualAgenda  GlobalWarming  Corruption  Taxes  Congress  Fraud  MediaBias  GovtAbuse  Tyranny  Obama  ObamaCare  Elections  Polls  Debates  Trump  Cruz  Kasich  OPSEC  Benghazi  InfoSec  BigBrother  IRS  Scandals  TalkRadio  TeaParty  FreeperBookClub  HTMLSandbox  FReeperEd  FReepathon  CopyrightList  Copyright/DMCA Notice 

Please keep those donations coming in, folks. Our 2nd quarter FReepathon is off to a great start and we have a chance of getting 'er done early! Thank you all very much!!

Or by mail to: Free Republic, LLC - PO Box 9771 - Fresno, CA 93794
Free Republic 2nd Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $34,172
38%  
Woo hoo!! And the first 38% is in!! Thank you all very much!! God bless.

Keyword: security

Brevity: Headers | « Text »
  • FBI’s ‘No Data is New Data’ iPhone Spin Stinks

    04/21/2016 11:55:36 AM PDT · by Swordmaker · 7 replies
    Mac Observer ^ | April 21, 2016 | By Jeff Gamet
    The FBI says it has new data from Syed Farook's iPhone, and that new data is that there isn't any data, or at least no data that's of any use to the San Bernardino mass shooting investigation. The FBI is saying their analysis shows Mr. Farook didn't communicate with anyone during an 18 minute window that's unaccounted for following the shooting spree—something they should've known long before hacking into the phone. iCloud backups from the iPhone had been in the FBI's hands since early January, and agents had access to the device's phone carrier records, too. Critics to the FBI's...
  • Apple, Google, Microsoft, and others express ‘deep concerns’ over controversial encryption bill

    04/20/2016 10:14:22 AM PDT · by Swordmaker · 18 replies
    The Verge ^ | April 20, 2016 04:37 am | By Amar Toor
    Coalitions representing major tech companies warn of 'unintended consequences' in letter to US senators Four coalitions representing Apple, Microsoft, Google, Amazon, and other major tech companies have published an open letter expressing their concerns over a controversial US bill that would require smartphone makers to decrypt data on demand. The letter, published this week, is addressed to the bill's sponsors, Senators Richard Burr (R-NC) and Dianne Feinstein (D-CA), and signed by four industry groups: Reform Government Surveillance, the Computer and Communications Industry Association, the Internet Infrastructure Coalition, and the Entertainment Software Association. In addition to Apple, Microsoft, Google, and Amazon,...
  • Hackers use Congressman’s iPhone to demo ability to listen into calls, monitor texts, track location

    04/18/2016 6:31:09 PM PDT · by Swordmaker · 21 replies
    9 to 5 Mac ^ | April 18, 2016 | By Ben Lovejoy
    CBS correspondent Sharyn Alfonsi, left, with hacker Karsten Nohl Update: Rep. Ted Lieu has now written to the Chairman of the House Committee on Oversight and Government Reform requesting a formal investigation into the vulnerability. In his letter, the Congressman says that the flaw threatens ‘personal privacy, economic competitiveness and U.S. national security.’ The full text of his letter can be found at the bottom of the piece.Apple may take iOS security so seriously that it’s willing to do battle with the FBI over it, but German hackers have demonstrated that all phones – even iPhones – are susceptible...
  • Line by line, how the US anti-encryption bill will kill our privacy, security

    04/14/2016 5:19:22 PM PDT · by Swordmaker · 11 replies
    The Register ^ | 13 Apr 2016 at 22:18, | By Iain Thomson
    El Reg takes latest Burr-Feinstein legislation apart Not feeling Feinstein—Senators propose crappy legislation Analysis In the wake of the FBI's failed fight against Apple, Senators Richard Burr (R-NC) and Dianne Feinstein (D-CA) have introduced a draft bill that would effectively ban strong crypto.The bill would require tech and communications companies to allow law enforcement with a court order to decrypt their customers' data. Last week a draft copy of the bill, dubbed the Compliance with Court Orders Act of 2016, was leaked, but the new version is even worse than the discussion draft. The bill would apply to "device manufacturers,...
  • California phone decryption bill defeated

    04/14/2016 1:50:05 PM PDT · by Swordmaker · 9 replies
    The Sacramento Bee (AP) ^ | April 13th, 2016 | BY JEREMY B. WHITE
    A Sacramento woman uses her phone on Thursday, Sept. 11, 2014. Hector Amezcua hamezcua@sacbee.com A national debate over smartphone encryption arrived in Sacramento on Tuesday as legislators defeated a bill penalizing companies that don’t work with courts to break into phones, siding with technology industry representatives who called the bill a dangerous affront to privacy. The bill did not receive a vote, with members of the Assembly Committee on Privacy and Consumer Protection worrying the measure would undermine data security and impose a logistically untenable requirement on California companies. Disagreement over the balance between privacy and public safety exploded into...
  • Line By Line, How The US Anti-Encryption Bill Will Kill Our Privacy, Security

    04/14/2016 7:59:33 AM PDT · by Cyberman · 9 replies
    The Register ^ | 04/13/2016 | Iain Thomson
    Analysis In the wake of the FBI's failed fight against Apple, Senators Richard Burr (R-NC) and Dianne Feinstein (D-CA) have introduced a draft bill that would effectively ban strong crypto. The bill would require tech and communications companies to allow law enforcement with a court order to decrypt their customers' data. Last week a draft copy of the bill, dubbed the Compliance with Court Orders Act of 2016, was leaked, but the new version is even worse than the discussion draft.... The senators want to have their cake--by requiring tech companies to protect their customers' data--and eat it too--by insisting...
  • OPM Seeks Social Media Tracking for Background Checks

    04/13/2016 8:14:50 AM PDT · by detective · 3 replies
    Nextgov ^ | April 11, 2016 | By Jack Moore
    The Office of Personnel Management is preparing for a pilot program to automatically track public social media postings of people applying for security clearances. OPM is conducting market research to find companies that can perform automated social media tracking and other types of Web crawling as part of the background investigation process, according to an April 8 request for information posted online. Responses from interested companies are due by April 15.
  • Microsoft, Samba Badlock flaw not critical, but serious enough

    04/13/2016 2:06:43 PM PDT · by Mannaggia l'America
    Computerworld ^ | 04/13/2016 | Lucian Constantin
    Microsoft and the Samba project fixed a vulnerability in their implementation of the SMB/CIFS protocol after the flaw was initially announced three weeks ago under the name Badlock. The vulnerability, covered by Microsoft in its MS16-047 security bulletin published Tuesday, was also fixed in Samba 4.4.2, 4.3.8 and 4.2.11. It could allow a man-in-the-middle attacker to impersonate an authenticated user and execute arbitrary network calls to the server, possibly with administrative privileges. Badlock's existence was announced on March 22 by a company called SerNet, which offers Samba consulting, support and development services. It employs the person who found the flaw:...
  • Obama Administration Weighs Nixing 'Confidential' Classification

    04/13/2016 1:08:39 PM PDT · by Oldeconomybuyer · 30 replies
    NBC News ^ | April 13, 2016 | by Ken Dilanian
    The nation's top intelligence official is considering letting spy agencies drop the lowest level of classification, "confidential," in an effort to shrink the gusher of secret documents flowing out of their offices. The proposal by James Clapper, the director of national intelligence, comes amid a simmering controversy over classified information that found its way on to the home email system used by Democratic presidential candidate Hillary Clinton when she was secretary of state. In a memorandum sent last month to directors of the CIA and four other intelligence agencies, Clapper told them to "to take a leading role in reducing...
  • Mac Users Attacked Again by Fake Adobe Flash Update

    04/12/2016 10:31:56 PM PDT · by Swordmaker · 11 replies
    Intego ^ | April 12th, 2016 | by Graham Cluley
    Mac users are once again being urged to exercise caution when installing updates to Adobe Flash Player, after a fake update was discovered infecting computers.Intego security experts have identified the rogue package installer as a variant of OSX/InstallCore, and have updated Intego VirusBarrier definitions to provide protection.The in-the-wild attack has been spread in the form of a Mac Package installer .pkg file, also known a flat package, and has been signed with a legitimate Developer ID certificate — effectively tricking OS X's built-in Gatekeeper security to believe that the files can be trusted and are not malicious.Curiously, if the Mac Package...
  • Amazon has sold 3 million Echo speakers, research firm says [3,000,000 spies in our houses]

    04/12/2016 8:11:13 AM PDT · by upchuck · 42 replies
    Seattle Times ^ | April 6, 2016 | Ángel González
    A research firm estimates Amazon.com has sold 3 million Echo voice-controlled home speakers, and that close to half of U.S. Amazon customers are aware of the product. [snip] The device, which sells for $180, also has given Amazon a big role in the emerging field of home automation, as many people use it to control thermostats or lights that work off Wi-Fi. [snip] Launched in late 2014, the Echo slowly picked up speed as word spread about its uncanny abilities — from answering questions to turning on the living-room lights.
  • WhatsApp outpaces iMessage on verification and forward secrecy

    04/11/2016 7:09:26 PM PDT · by Swordmaker · 2 replies
    MacWorld ^ | April 11, 2016 10:23 AM PDT | by Glenn Fleishman
    A cross-platform messaging app owned by Facebook leapfrogs iMessage; Apple should step up and join it. credit: WhatsApp Apple’s security and encryption strategies have received a lot of attention lately, from the way in which iOS devices’ data are locked down to how Apple doesn’t have the encryption keys the iMessage and FaceTime systems employ to secure its users’ communications to how Secure Enclave keeps our secrets secret. But WhatsApp, an app-based text, video, and voice service with a billion users, took the spotlight Tuesday with the news that its users have end-to-end encryption as well. WhatsApp has a couple...
  • OT pay for Kasich security detail jumps 64% amid campaign

    04/10/2016 1:19:53 PM PDT · by bimboeruption · 8 replies
    Columbus Dispatch ^ | 4-10-2016 | Randy Ludlow
    As Ohio Gov. John Kasich campaigned for the presidency, Ohio taxpayers paid $222,243 in overtime during the past year to the state troopers who guard him on the road and at home. The nine State Highway Patrol troopers assigned to the governor's executive-protection unit earned $183,600 in overtime in 2015, a 64-percent jump from 2014, according to state payroll records released today in response to a request from The Dispatch. Four troopers earned more than $20,000 in overtime pay last year for working more than 40 hours a week; one earned nearly $27,000 to boost his annual pay to $94,400....
  • SAFE AT LAST

    04/10/2016 7:00:51 AM PDT · by V K Lee · 18 replies
    I took down my Rebel flag (which you CAN'T buy on ebay any more) and peeled the NRA sticker off the front door. I disconnected my home alarm system and quit the Neighborhood Watch. I went out and bought two Pakistani flags and put one at each corner of the front yard. Then I purchased the black flag of ISIS (which you CAN buy on ebay) and ran it up the flag pole. NOW, the local police, sheriff, FBI, CIA, NSA, Homeland Security, Secret Service and other agencies are all watching my house 24/7. I've NEVER felt safer and I'm...
  • Newsmax/Fabrizio Lee Poll: Trump Has 'Commanding Lead' Over Hillary on National Security

    04/08/2016 5:04:58 PM PDT · by GilGil · 11 replies
    Newsmax ^ | 4/8/2016 | David Patten
    Overall, the survey showed Clinton leading Trump by a razor-thin margin of 45 to 44 percent in a poll with a 2.5 percent margin of error. But when voters were asked which candidate would be better suited to keep America safe, they gave Trump a commanding advantage despite Clinton's presumed expertise on the international scene after four years as secretary of state. By a 37 to 27 percent margin, voters said Trump is better suited than Clinton to keep the United States safe from terrorists. Trump also won – 40 to 32 percent – on the question of which candidate...
  • FBI can't unlock anything newer than Apple's iPhone 5c, Comey reveals

    04/08/2016 12:47:53 AM PDT · by Swordmaker · 52 replies
    AppleInsider ^ | Thursday, April 07, 2016, 06:25 am PT (09:25 am ET | By AppleInsider Staff
    The unlocking procedure used by the Federal Bureau of Investigation to break into an iPhone 5c at the center of the San Bernardino case cannot be used on new devices, the bureau's director said on Wednesday. The IP Box setup, via MDSec. Comey told a group of students and educators at Kenyon College in Ohio that his department had "purchased a tool" from a third party to unlock the iPhone in question, according to CNN Money. Though he stopped short of revealing the exact process, he did note that it would not work on more modern handsets. "This doesn't work...
  • Cellebrite is the FBI's go-to phone hacker (with Video)

    04/01/2016 11:21:19 PM PDT · by Swordmaker · 11 replies
    CNN Money ^ | April 1, 2016 | by Jose Pagliery
    All signs are pointing to Cellebrite, an Israeli company, as the mysterious "outside party" that helped agents unlock the iPhone used by the San Bernardino terrorist. An elite group of engineers at Cellebrite -- led by a "brilliant" hacker in Seattle -- helped the FBI crack the iPhone 5C last week, according to two people with direct contact to the team. Everyone at the company has since been forced to sign non-disclosure agreements to remain silent about the matter, one of them said. Additionally, government records now show that Cellebrite landed its biggest contract ever with the FBI -- one...
  • Secretary Kerry, our genocide security monitor

    04/01/2016 7:05:12 AM PDT · by luke1825 · 1 replies
    Lowell Sun ^ | 4/1 | Peter Lucas
    When it comes to genocide, John Kerry is like the bank guard in that wonderful little Life Lock bank television ad. You know the one. It's where two gunmen break into a bank, smash a glass counter, wield weapons, take a hostage and shout, "Nobody move." Bank employees and customers hit the ground, except for a lone bank guard who is still standing. One woman lying on the floor looks up and says, "Do something." The guard looks around and pleasantly explains, "I'm not a security guard. I'm a security monitor. I only notify people if there is a robbery."...
  • At least FIFTY ISIS supporters are working as baggage handlers at Brussels airport

    03/31/2016 8:05:08 PM PDT · by Beave Meister · 29 replies
    The Daily Mail ^ | 3/31/2016 | JOHN STEVENS
    Police at Brussels airport have claimed at least 50 Islamic State supporters are working there as baggage handlers, cleaners and catering staff. In an astonishing open letter, the officers said they have warned about the terrorist sympathisers whose security badges give them access to planes, but they remain employed. The airport police, who are threatening to go on strike because of security deficiencies, also said they have raised the issue of terrorists scouting the airport to plan possible attacks. The extraordinary claims come after the Mail reported how the family of two of the bombers involved in the attacks last...
  • Mississippi Bill Would Let Churches Create Armed Security Squads

    03/31/2016 1:04:45 AM PDT · by 2ndDivisionVet · 12 replies
    The Huffington Post's Huffpost Politics ^ | March 30, 2016 | Ed Mazza
    What would Jesus pack? The Mississippi Senate just passed a bill that would allow churches to train members to carry guns and act as security guards during religious services — and exempt them from legal action if they use their weapons. “This will allow a church to have a sergeant-at-arms to protect the church body, just like we have (in the Legislature),” Sean Tindell, a Republican state senator, was quoted as saying by the Clarion-Ledger. Tindell pointed to last year’s massacre at a church in Charleston, South Carolina as an example of why churches need an armed guard. Others said...
  • More Seniors, Fearing Crime, Flock to Shooting Ranges

    03/30/2016 7:13:47 AM PDT · by KeyLargo · 30 replies
    The Wall Street Journal ^ | March 30, 2016 | By James R. Hagerty
    WSJ More Seniors, Fearing Crime, Flock to Shooting Ranges Gun dealers say personal safety is a priority for older people who want firearms training By James R. Hagerty AUSTINTOWN, Ohio—On a recent Monday at the Austintown Senior Center, activities included painting, bingo and shooting guns. Around 9:45 a.m., a dozen people in their 60s and 70s bundled into a van and several cars and headed to the nearby American Range shooting gallery, whose lobby features a portrait of Clint Eastwood over the legend “Go ahead make your day.” Soon, they were blasting away at paper targets dangling in a dim,...
  • Donald Trump Lists Top Three Functions of Government: ‘Security, Security, Security,’

    03/30/2016 6:09:40 AM PDT · by justlittleoleme · 141 replies
    Breitbart ^ | 3/30/16 | Alex Swoyer
    GOP frontrunner Donald Trump said the top three functions of the United States government are security, healthcare, and education. During CNN’s town hall in Milwaukee, Wisconsin on Tuesday night, an audience member asked Trump, “What are the top three functions of the United States government?”“Security for our nation,” Trump responded. “I would also say healthcare… [and] education.”“The top three are security, security, security,” Trump stressed, saying America needs security “so we can continue to exist as a country.”“Thousands and thousands of people are infiltrating our country,” the real estate mogul explained. “We don’t know who they are.”On top of security,...
  • And now Apple is going to stop the FBI getting into iCloud data too

    03/28/2016 10:22:38 AM PDT · by Swordmaker · 34 replies
    GrahamCluely ^ | March 25, 2016 | by David Bisson
    Apple announces plans to hand over iCloud encryption key management to users Apple has announced its plans to transfer iCloud encryption key management to account holders, a move which could stand in the way of or even prevent the FBI and other law enforcement agencies from requesting users' information.The tech giant currently manages the encryption key management for all iCloud account holders.eWeek reports that because of this level of control, Apple provided federal authorities with several iCloud backups of Syed Rizwan Farook, an individual who participated in a mass shooting and attempted bombing in San Bernardino, California back in December....
  • Zero-day exploit can bypass rootless on Mac to modify the system without detection

    03/27/2016 12:18:07 AM PDT · by Swordmaker · 16 replies
    Digital Trends ^ | March 25, 2016 | By Justin Pot
    A zero-day exploit affecting Mac OS X allows attackers to execute arbitrary code on any binary. That’s not good, and it gets worse. The exploit bypasses System Identity Protection (SIP, sometimes called rootless), and is almost impossible to trace once implemented. Apple has been notified and a patch is on the way.“Our researchers recently uncovered a major flaw which allows for local privilege escalation and bypass of System Integrity Protection, Apple’s newest protection feature,” wrote SentinelOne in a blog post announcing the discovery. A talk given by Pedro Vilaça at SyScan360, a security conference in downtown Singapore this week, outlined...
  • In Donald Trump’s Worldview, America Comes First, and Everybody Else Pays

    03/26/2016 6:22:25 PM PDT · by Trumpinator · 161 replies
    nytimes.com ^ | MARCH 26, 2016 | DAVID E. SANGER and MAGGIE HABERMAN
    In Donald Trump’s Worldview, America Comes First, and Everybody Else Pays By DAVID E. SANGER and MAGGIE HABERMANMARCH 26, 2016 Mr. Trump’s views, as he explained them, fit nowhere into the recent history of the Republican Party: He is not in the internationalist camp of President George Bush, nor does he favor President George W. Bush’s call to make it the United States’ mission to spread democracy around the world. He agreed with a suggestion that his ideas might be summed up as “America First.” “Not isolationist, but I am America First,” he said. “I like the expression.” He said...
  • Apple's scariest bug this week: Your device pwned over Wi-Fi

    03/25/2016 8:52:29 PM PDT · by Swordmaker · 8 replies
    ZDNet ^ | March 24, 2016 | By Larry Seltzer for Zero Day
    The iMessage vulnerability got a lot of attention, but another bug allows for remote execution over Wi-Fi, which is a much bigger threat. Apple released new versions of several operating system products earlier this week, fixing vulnerabilities in OS X El Capitan and iOS 9 among others. Because encryption and Apple are big news these days, the attention mostly went to an admittedly interesting flaw in Apple's encryption for iMessage, reported by a research team, led by well-known cryptographer Matthew Green. But the bug is not an easy one to exploit and doesn't even expose a lot. There are much...
  • Two Americans confirmed to be victims in Brussels attacks

    03/25/2016 6:41:07 AM PDT · by KeyLargo · 31 replies
    WTKR.com ^ | March 25, 2016
    Two Americans confirmed to be victims in Brussels attacks Posted 7:13 am, March 25, 2016, by CNN Wire This was the news the family of Alexander and Sascha Pinczowski hoped would never come. The siblings were in the Delta ticket line at the Brussels Airport to check in for their flight to New York. Alexander was talking to his mother on the phone when the line went dead. They haven’t been heard from since. Nearly three agonizing days later, word came from Belgian authorities at Astrid Hospital in Brussels. It was a list of the remaining victims who were still...
  • Do Not Interfere with the Will of the People in An Effort To Stop Trump

    03/24/2016 12:25:05 PM PDT · by Kaslin · 171 replies
    Townhall.com ^ | March 24, 2016 | Armstron Williams
    The American People are angry. And it is not cyclical anger – after all, we are sitting at the top of the current business cycle. This anger is a secular trend. There is anger at the lack of jobs, there is anger over class warfare , there is anger at police profiling of young black men, anger at conservatives, anger at political correctness, anger at Liberals, anger at the break down of our inner city infrastructures and the poisoning of water in Flint, Michigan and elsewhere, anger at Hillary Rodham Clinton, anger at Donald Trump, anger at the main...
  • Failing the National Security Mission

    03/24/2016 12:14:47 PM PDT · by detective · 2 replies
    AIM ^ | March 24, 2016 | Retired Adm. James A. Lyons
    face reality: There was absolutely no justification for removing Cuba from the list of states that sponsor terrorism. Our intelligence clearly shows that Cuba was allowing and continues to allow Hezbollah, Iran’s terror proxy group, to maintain a command-and-control base on Cuban soil from which to conduct criminal, narco-trafficking and terrorist operations throughout the Western hemisphere. Regrettably, this leads to the sad conclusion that President Obama has lied again when he certified to Congress, as required by federal law, that Cuba could be safely removed from the U.S. list of nations that sponsor terrorism. Does anybody care that our president...
  • Obama’s Legacy – The Threat of More Terrorism Here

    03/23/2016 6:31:03 AM PDT · by KeyLargo · 27 replies
    Center For Security Policy ^ | March 8, 2016 | Frank Gaffney, Jr.
    Obama’s Legacy – The Threat of More Terrorism Here Free Fire | March 8, 2016 | Counterintelligence, Counterterrorism, Defense Budget & Programs, Understanding the Shariah Threat Doctrine The President’s Homeland Security Advisor says international terrorist groups are “planning for sophisticated and coordinated terror attacks” in this country. In fact, Lisa Monaco warned that the threats are becoming ‘broader, more diffuse, and less predicable than at any time” since the 9/11 attacks. Call it Obama’s legacy. Unfortunately, as former clandestine CIA officer Clare Lopez and I point out in a new book, See No Sharia, our first lines of defense against...
  • Somali 'refugee' influx continues unabated

    03/22/2016 5:32:42 AM PDT · by KeyLargo · 14 replies
    WND.com ^ | March 18, 2016 | Leo Hohmann
    Somali 'refugee' influx continues unabated Obama sending 700 per month to U.S. cities despite admitted 'terror-recruitment problem' The Islamic State’s Cyber Army used an online cellphone app to post a “kill list” of names, addresses, phone numbers and other personal information on 36 police officers in the Twin Cities area of Minnesota. The FBI said this week it is investigating the case but analysts say it’s obvious why ISIS chose to target the Minneapolis-St. Paul area. The area is home to America’s largest Somali refugee community and has been a hotbed of Islamic terrorist recruitment dating back to at least...
  • Apple patches encryption flaw in iOS and OS X

    03/22/2016 12:32:08 AM PDT · by Utilizer · 2 replies
    iTnews (AUS) ^ | Mar 22 2016 6:45AM (AUS) | Juha Saarinen
    Apple has quickly released a patch for a flaw in its encryption capability for the iOS mobile and OS X desktop operating systems which could allow attackers to unscramble protected iMessage photos and videos. First reported by the Washington Post, a group of researchers led by cryptographer Matthew Green at John Hopkins University discovered they could intercept iMessage content stored in Apple's iCloud by brute-force guessing the encryption key. With the encryption key at hand, attackers could retrieve files from iCloud accounts without users knowing. Attackers would need to be able to bypass Apple’s TLS certificate pinning, which associates the...
  • Johns Hopkins researchers poke a hole in Apple’s encryption

    03/21/2016 2:37:59 PM PDT · by Swordmaker · 26 replies
    The Washington Post ^ | March 21 at 12:01 AM | By Ellen Nakashima
    A group of Johns Hopkins University researchers found a bug in Apple’s encryptionthat would let a skilled attacker decrypt photos and videos that were sent as secure instant messages. (Matthias Schrader/AP) Apple’s growing arsenal of encryption techniques — shielding data on devices as well as real-time video calls and instant messages — has spurred the U.S. government to sound the alarm that such tools are putting the communications of terrorists and criminals out of the reach of law enforcement. But a group of Johns Hopkins University researchers has found a bug in the company’s vaunted encryption, one that would enable...
  • Secret Service, Trump Campaign Increasing Security After Threats to Family, Violent Protests

    03/21/2016 7:55:39 AM PDT · by Enlightened1 · 15 replies
    Gateway Pundit ^ | 03/21/16 | Kristinn Taylor
    The Secret Service and the presidential campaign of Donald Trump are increasing security for the candidate and his rallies after threatening letters were received by Trump family members and violent protests by leftists broke out at a string of several recent Trump rallies.Donald Trump turns to face down the threat as Secret Service agents and Trump’s personal security rush to protect Trump from a leftist protester who jumped a barricade and reached the back of the stage at a rally in Dayton, Ohio March 12, 2016. NBC News reported on Friday: Secret Service Tightens Trump’s Security Amidst New Threats“The Secret...
  • Researchers Uncover Multiple OS X and Safari Exploits at Pwn2Own 2016

    03/18/2016 2:08:19 AM PDT · by Swordmaker · 9 replies
    MacRumors ^ | Thursday March 17, 2016 12:01 PM PDT | by Joe Rossignol
    The sixteenth annual CanSecWest security conference is underway in downtown Vancouver, British Columbia, and researchers participating in the Pwn2Own computer hacking contest have already discovered multiple vulnerabilities in OS X and the Safari web browser on the desktop. On day one of the event, independent security researcher JungHoon Lee earned $60,000 after exploiting both OS X and Safari. Lee uncovered four vulnerabilities in total, including one exploit in Safari and three other vulnerabilities within the OS X operating system, according to security firm Trend Micro. JungHoon Lee (lokihardt): Demonstrated a successful code execution attack against Apple Safari to gain root...
  • American Express reveals three-year old data breach

    03/17/2016 6:49:11 PM PDT · by Utilizer · 14 replies
    iTnews (AUS) ^ | Mar 18 2016 10:23AM (AUS) | Juha Saarinen
    American Express has notified US authorities that some of its card holder information was likely compromised almost three years ago after an unauthorised person or group accessed one of its merchants' systems. The breach took place on 7 December 2013, but Amex said it had only now become aware of the intrusion. The payments card giant asked members to take steps to protect their sensitive data as a result of the data breach, including monitoring their accounts for suspicious activity. Customers won't be liable for any fraudulent activity, Amex said. In a notice to customers filed with the Californian Attorney...
  • AceDeceiver: First iOS Trojan Exploiting Apple DRM Design Flaws to Infect Any iOS Device

    03/16/2016 6:30:31 PM PDT · by Utilizer · 5 replies
    Palo Alto Networks ^ | March 16, 2016 5:00 AM | Claud Xiao
    We’ve discovered a new family of iOS malware that successfully infected non-jailbroken devices we’ve named “AceDeceiver”. What makes AceDeceiver different from previous iOS malware is that instead of abusing enterprise certificates as some iOS malware has over the past two years, AceDeceiver manages to install itself without any enterprise certificate at all. It does so by exploiting design flaws in Apple’s DRM mechanism, and even as Apple has removed AceDeceiver from App Store, it may still spread thanks to a novel attack vector. AceDeceiver is the first iOS malware we’ve seen that abuses certain design flaws in Apple’s DRM protection...
  • Millions menaced as ransomware-smuggling ads pollute top websites

    03/16/2016 7:54:20 AM PDT · by snarkpup · 42 replies
    The Register ^ | 15 Mar 2016 at 17:19 | John Leyden
    msn.com, nytimes.com, aol.com et al hit by malware-injecting banners Top-flight US online publishers are serving up adverts that attempt to install ransomware and other malware on victims' PCs. Websites visited by millions of people daily – msn.com, nytimes.com, aol.com, nfl.com, theweathernetwork.com, thehill.com, zerohedge.com and more – are accidentally pushing out booby-trapped adverts via ad networks, warn infosec researchers.
  • Microsoft forced updated security setting on my computer when I had updates OFF!

    03/16/2016 5:02:24 AM PDT · by MeneMeneTekelUpharsin · 27 replies
    16 March 2016 | Mene Mene Tekel Upharsin
    Wow. Overnight, Microsoft forced updated a "Security Setting" on my computer without my permission. I had updates turned OFF on purpose and NEVER turn it on. I use my own anti-virus protection and it works beautifully. How do I turn off Microsoft's Anti-virus protection (Windows XP)?
  • Hillary Clinton owes Iowa police THOUSANDS of dollars in unpaid bills for providing security...

    03/16/2016 1:55:17 AM PDT · by Libloather · 22 replies
    Daily Mail ^ | 3/15/16 | Mia De Graaf
    Hillary Clinton owes Iowa police THOUSANDS of dollars in unpaid bills for providing security at Katy Perry concert six months ago Hillary Clinton owes Iowa police thousands of dollars for provided security at a Katy Perry-headlined event and two rallies. Despite raising more than $130 million for her presidential campaign, the former Secretary of State has yet to pay Des Moines police $1,800 for manning the concert on October 24, the force claims. Meanwhile, officers in the neighboring city of Marshalltown claim the Democrat frontrunner owes them $2,700 for working overtime at a January 15 event with Bill Clinton and...
  • Outmoded U.S. immigration system poses security risk: study

    03/15/2016 3:23:58 PM PDT · by stocksthatgoup · 15 replies
    Reuters ^ | March 15, 2016 | Patricia Zengerle
    WASHINGTON (Reuters) - U.S. immigration authorities' lack of progress in automating their systems is compromising border security, making it more difficult to process people seeking to get into the country, a report said on Tuesday. "We may be admitting individuals who wish to do us harm, or who do not meet the requirements for a visa," John Roth, the Inspector General for the Department of Homeland Security, told a Senate Homeland Security Committee hearing.
  • Women in High-threat Security Exist

    03/15/2016 9:59:21 AM PDT · by w1n1 · 9 replies
    AShooting Journal ^ | 3/15/2016 | D Breteau
    Female Security Contractors There are thousands of security contractors operating in high-threat environments and within that group there are a handful of women. They sport the same body armor and equipment, have to uphold the same physical requirements and are expected, by their male peers, to do the exact same work – protect people from danger, up to and including losing their own life. On the subject of whether women should be in elite military forces, the jury is still out; however females in high-level close protection who cover a range of clients from foreign dignitaries and ambassadors to...
  • Obama puts down his encrypted phone long enough to tell us: Knock it off with the encryption

    03/12/2016 6:36:06 AM PST · by snarkpup · 23 replies
    The Register ^ | 11 Mar 2016 at 23:30 | Chris Williams
    Back doors, skeleton keys, just make it happen, nerds SXSW Amid the row between Apple and the FBI over the unlocking of a mass murderer's iPhone, President Barack Obama has told the tech world to suck it up and do what the Feds want. Speaking today at hipster-circle-jerk SXSW in Austin, Texas, the United States' Commander in Chief said phones and computers cannot be unbreakable "black boxes," and that an "absolutist" view on encryption won't fly with the laws and courts of the land.
  • Windows patch KB 3139929: When a security update is not a security update

    03/11/2016 7:02:23 PM PST · by Utilizer · 30 replies
    InfoWorld ^ | Mar 9, 2016 | Woody Leonhard
    If Microsoft's documentation is correct, installing Patch Tuesday's KB 3139929 security update for Internet Explorer also installs a new Windows 10 ad-generating routine called KB 3146449. Many people -- present company included -- feel that putting an ad generator inside a security patch crosses way over the line. In fact, you have to ask yourself if there are any lines any more. Microsoft lays it all out in black and white in its inimitable, most obfuscatory way. This month's MS16-023 security patch for Internet Explorer, KB 3139929, says: This security update resolves several reported vulnerabilities in Internet Explorer. The most...
  • Serious Flaws Patched in Cisco Modems, Gateways

    03/11/2016 6:54:58 PM PST · by Utilizer · 2 replies
    SecurityWeek ^ | March 11, 2016 | Eduard Kovacs
    Cisco released software updates this week to patch several high severity vulnerabilities in the company’s cable modems, residential gateways and security appliances. A couple of serious flaws in Cisco’s residential gateways were reported by Kyle Lovett, and Chris Watts of Tech Analysis. Lovett discovered an information disclosure vulnerability (CVE-2016-1325) that allows a remote, unauthenticated attacker to access sensitive data on affected devices. The issue, caused by improper access restrictions, affects the Cisco DPC3941 Wireless Residential Gateway with Digital Voice and the DPC3939B Wireless Residential Voice Gateway. Watts identified a denial-of-service (DoS) flaw affecting the Cisco DPQ3925 8x4 DOCSIS 3.0 Wireless...
  • Apple OS X ransomware downloaded 6500 times

    03/11/2016 6:05:39 PM PST · by Utilizer · 16 replies
    iTnews (AUS) ^ | Mar 9 2016 | "Staff Writer"
    The first known ransomware targeted at Apple's Mac computers was only downloaded about 6500 times, according to a representative for the Transmission project, whose software was used to launch the attack. Transmission representative John Clay said the ransomware was added to disk-image of its software after the project's server was compromised in an attack. "We're not commenting on the avenue of attack, other than to say that it was our main server that was compromised," he said. "The normal disk image [was] replaced by the compromised one." He said security on the server had since been increased and the group...
  • Slew of dangerous Adobe Flash flaws patched

    03/11/2016 5:46:01 PM PST · by Utilizer · 31 replies
    iTnews (AUS) ^ | Mar 11 2016 | Juha Saarinen
    Adobe has issued patches for 21 serious flaws in its Flash Player software to address critical vulnerabilities that could potentially allow attackers to take control of victims' systems. The vulnerabilities affect versions of Flash for Microsoft Windows, Apple OS X and iOS, Linux and Google's ChromeOS operating systems, Adobe said. Of the vulnerabilities, three allow arbitrary code execution through integer overflows, and 11 involve use-after-free flaws. Researchers from Google's Project Zero, HP Enterprise Zero Day Initiative, NSFOCUS, Microsoft, Kaspersky, Tencent and Venustech also discovered a heap underflow vulnerability in Adobe Flash and eight memory corruption bugs - all of which...
  • FBI warns it could demand Apple's iPhone code

    03/11/2016 4:32:19 PM PST · by Swordmaker · 40 replies
    Yahoo Finance ^ | March 10, 2016 | By Aaron Pressman
    The FBI on Thursday threatened to raise the stakes in its legal battle with Apple (AAPL), suggesting it might demand access to the iPhone maker's source code and secret electronic signature used to verify the legitimacy of its software updates. The FBI currently is seeking to force Apple to write a special version of its iOS software with some security features disabled so that the bureau can try to crack the passcode on an iPhone 5C used by deceased San Bernardino shooter Syed Rizwan Farook. Apple is challenging the order issued by U.S. Magistrate Judge Sheri Pym last month. But...
  • The best 8 secure browsers 2016

    03/08/2016 6:10:51 PM PST · by ShadowAce · 34 replies
    TechWorld ^ | 25 February 2016 | John E Dunn
    Browse the web with privacy and security with these best secure browsers. Protect your privacy online with the eight best secure browsers you can use in 2016.What does the idea of a secure browser mean in 2016? The world is now more complex than it was in 2010 when we last looked at the contenders. People are more oriented to mobile devices running under very different conditions while a range of security features such as URL filtering, download protection and do not track have transformed mainstream desktop browsers such as Chrome, IE and Firefox. In a sense all browsers could...
  • Apple has shut down the first fully-functional Mac OS X ransomware

    03/07/2016 10:04:09 PM PST · by Utilizer · 7 replies
    TechCrunch ^ | Mar. 7, 2016 | Sarah Perez
    Apple has shut down what appears to have been the first, fully-functional ransomware targeting Mac computers. This particular form of cyber threat involves malware that encrypts the data on your personal computer so you can no longer access it. Afterwards, the hackers request that you pay them in a hard-to-trace digital currency – in this case, bitcoin – in order for you to retrieve your files. This ransomware, called KeRanger,” was first reported by researchers at Palo Alto Networks. They also noted that Apple has now revoked the abused certificate that was used in the attack and updated its built-in...