Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $35,069
43%  
Woo hoo!! And we're now over 43%!! Thank you all very much!! God bless.

Keyword: security

Brevity: Headers | « Text »
  • NSA Website down - being actively hacked

    10/25/2013 4:32:32 PM PDT · by usconservative · 21 replies
    Self | 10/25/2013 | USConservative
    NSA Website down - not reachable. Being hacked at this moment.
  • Mozilla's Lightbeam tool will expose who is looking over your shoulder on the web

    10/25/2013 6:41:56 AM PDT · by Red Badger · 39 replies
    Independent UK | 10-25-2013 | Adam Sherwin
    http://www.independent.co.uk/life-style/gadgets-and-tech/news/mozillas-lightbeam-tool-will-expose-who-is-looking-over-your-shoulder-on-the-web-8902269.html
  • vanity- Heads up interesting spearfishing scam(computer security)

    10/24/2013 8:22:36 PM PDT · by waynesa98 · 37 replies
    happened to me | 10/24/2013 | self
    So I get a private call, dead air for a few seconds, then the phone rings back to the caller. Indian accented man answers claiming my computer is infected with a virus, no company name nothing. So I ask which computer. a few meaningless back and forth. Ask me to google teamviewer.com, instead of just going to teamviewer.com. wanted access to my system, wouldn't tell me the virus. did an off line scan anyway. So note to selfs, do not let anyone your not 100% sure is legit connect to your system with teamviewer
  • Security trumps privacy, EU court says

    10/20/2013 3:21:22 PM PDT · by Olog-hai · 10 replies
    EU Observer ^ | 17.10.13 @ 17:44 | Benjamin Fox
    Ensuring protection against the fraudulent use of passports outweighs personal privacy concerns about mandatory fingerprinting, the European Union’s top court said Thursday. The European Court of Justice (ECJ) ruled on Thursday (17 October) that although the taking and storing of fingerprints for passports breached privacy and personal data rights, it did not breach the EU’s Charter of Fundamental Rights and was in line with EU law. Article eight of the Charter includes an explicit right to the protection of personal data, but the Luxembourg-based Court ruled that the infringement of privacy was justified because fingerprinting reduced fraud. … Meanwhile, government...
  • Has Obama endangered public safety, national security?

    10/20/2013 2:07:08 PM PDT · by sheikdetailfeather · 21 replies
    Fox News ^ | 10-20-13 | Fox News
    Has Obama endangered public safety, national security? ICE Council President Chris Crane reacts
  • Colonel in charge of Quantico's Security Battalion relieved

    10/19/2013 7:49:06 PM PDT · by Nachum · 104 replies
    Patriots for America ^ | 10/19/13 | staff
    Col. Daren Margolin has been relieved as head of Security Battalion at Marine Corps Base Quantico, Va. (Marine Corps) The two-star head of Marine Corps Installations Command has relieved the commanding officer of Quantico’s Security Battalion following an incident involving a personal weapon, Marine Corps officials said. Col. Daren Margolin, a 24-year officer was removed from his post Oct. 18 by Maj. Gen. Juan Ayala due to a loss of confidence in his ability to command, said Capt. Maureen Krebs, a Marine Corps spokeswoman. Krebs said the decision stemmed from a single incident last week involving one of Margolin’s personal...
  • Should Truecrypt be audited?

    10/18/2013 9:25:12 AM PDT · by ShadowAce · 18 replies
    LinuxBSDos.com ^ | 15 October 2013 | Unknown
    Truecrypt is a cross-platform, free disk encryption software for Windows and Unix-like operating systems. It is generally considered a good disk encryption software, and not too long ago, I wrote a tutorial that showed how to encrypt the Windows installation of a Windows-Linux dual-boot setup (see Dual-boot Fedora 18 and Windows 7, with full disk encryption configured on both OSs). Truecrypt is said to be published under an open source license, but in some quarters, its license has not been accepted as a valid open source license. And some of those people believe it has a backdoor. Guess who is...
  • Obama's DHS Appointee: Career Lawyer, Political Crony Who OK'd Drone Strikes on Americans

    10/17/2013 5:51:28 PM PDT · by montag813 · 17 replies
    Stand With Arizona ^ | 10-17-2013 | John Hill
    Above: Obama's DHS Secretary-designee Jeh Johnson, former DOD General Counsel who led the reversal of the Pentagon's "Don't Ask Don't Tell" restrictions on "gays in the military".- Barack Obama once again demonstrated his lack of interest in choosing national security and immigration enforcement officials who have actual experience in their fields. Back in August, Obama surprised many in D.C. by selecting John Sandweg for new Immigration and Customs Enforcement (ICE) Director - despite the fact that Sandweg had zero law enforcement experience and had fought for the release of violent sexual predators and pedophiles as an attorney. Now Obama continues...
  • TSA introduces loudspeaker warnings threatening travelers with arrest for joking about security

    10/14/2013 2:20:22 PM PDT · by QT3.14 · 60 replies
    Daily Mail (UK) ^ | October 14, 2013 | Staff
    Travelers who attempt to make a joke about strict security procedures at airports have been warned they face arrest. A loudspeaker announcement made by the Transport Security Administration warns the public: 'Any inappropriate remarks or jokes concerning security may result in your arrest.' Concerned passenger Matt Miller recorded the loudspeaker message while passing through George Bush Intercontinental Airport in Houston, Texas.
  • The Linux Backdoor Attempt of 2003

    10/10/2013 12:25:17 PM PDT · by ShadowAce · 28 replies
    Freedom to Tinker ^ | 9 October 2013 | Ed Felten
    Josh wrote recently about a serious security bug that appeared in Debian Linux back in 2006, and whether it was really a backdoor inserted by the NSA. (He concluded that it probably was not.) Today I want to write about another incident, in 2003, in which someone tried to backdoor the Linux kernel. This one was definitely an attempt to insert a backdoor. But we don’t know who it was that made the attempt—and we probably never will.Back in 2003 Linux used a system called BitKeeper to store the master copy of the Linux source code. If a developer wanted...
  • Nothing to sniff at: Cisco finishes $2.8bn gobble of Snort'ing guy's Sourcefire

    10/09/2013 10:05:01 AM PDT · by Ernest_at_the_Beach · 5 replies
    The Register ^ | 9th October 2013 | Iain Thomson,
    Biggest security purchase since Intel wolfed down McAfee Intrusion prevention's a hot topic in the world of security, as reflected in the $2.8bn price tag Cisco has paid to complete the acquisition of network security specialists Sourcefire.The purchase - which was announced in July - is the largest security firm purchase since Intel's $7.7bn acquisition of McAfee in 2010. And it's a huge personal payday for Marty Roesch, creator of the open-source intrusion protection system Snort. He took Snort's basic technology and built commercial code under the Sourcefire brand since 2001."I'd be lying if I said I wasn't sentimental. When...
  • Israel to run for U.N. Security Council seat for 2019-20

    10/04/2013 8:55:34 AM PDT · by Olog-hai · 1 replies
    Reuters ^ | Thu Oct 3, 2013 5:59pm EDT | Dan Williams
    Israel said on Thursday it plans to run for a rotating seat on the U.N. Security Council for the time ever for 2019-2020, although U.N. diplomats said it will not be easy for the Jewish state to win. “We’re going all out to win,” Israel's U.N. Ambassador Ron Prosor told Reuters. “It’s about time.” … Prosor said Israel will be vying against Germany and Belgium for two seats allotted to the “Western European and Others Group.” Technically, Israel should be a member of the Asia-Pacific Group along with the other states in the Middle East, but predominantly Muslim states blocked...
  • Data, credit card numbers for 2.9 million Adobe users stolen

    10/03/2013 7:39:00 PM PDT · by Theoria · 19 replies
    LA Times ^ | 03 Oct 2013 | Salvador Rodriguez
    Adobe announced Thursday that it was the victim of a hack and that personal data for 2.9 million users were stolen. The software company, known for Photoshop and other programs, said cyber attackers were able to access user information, including account IDs, encrypted passwords as well as credit and debit card numbers. The hackers were able to erase data of some Adobe users. The hackers also illegally accessed source codes for numerous Adobe products. That's like stealing the secret formula for Coca-Cola. The company did not specify which users of its various software programs were hit. "We deeply regret that...
  • NSA chief asks tech firms to team on cybesecurity

    09/30/2013 11:49:47 AM PDT · by shego · 5 replies
    PC World ^ | 9/29/13 | Antone Gonsalves
    Gen. Keith Alexander, head of the embattled National Security Agency (NSA), says he is willing to share cyberattack information with the private sector—an offer seen as a Trojan horse by at least one expert.... Revelations of massive NSA data gathering from telecom and Internet companies has sparked a fierce national debate on whether the spy agency's antiterrorism activities have gone too far in collecting information on innocent Americans. In claiming the NSA has done nothing illegal, Alexander blamed calls from Capitol Hill to restrict government surveillance on "sensationalized" reporting and "media leaks," Politico reported he said in his speech. However,...
  • Exclusive: Hundreds of U.S. security clearances seen falsified

    09/25/2013 6:58:24 AM PDT · by Oldeconomybuyer · 10 replies
    Reuters ^ | September 25, 2013 | By Tabassum Zakaria
    Federal prosecutors have documented at least 350 instances of faulty background investigations done by private contractors and special agents for the U.S. Office of Personnel Management in recent years, illustrating what some lawmakers call systemic weaknesses in the granting of federal security clearances. Reuters calculated the total by reviewing court documents and press releases from prosecutors for 21 cases resulting in convictions that involved the making of false statements from December 2004 to March 2012. These are the cases government officials have cited to assert that action is taken against investigators who falsely claim to have reviewed records or done...
  • House chairman pledges action on immigration

    09/19/2013 4:41:26 PM PDT · by Oldeconomybuyer · 5 replies
    AP via Yahoo! News ^ | September 19, 2013 | By Erica Werner
    WASHINGTON (AP) — The chairman of the House Judiciary Committee on Thursday pledged action on immigration overhaul legislation even as most of the attention on Capitol Hill is focused on fights over the budget and debt. Rep. Bob Goodlatte said the immigration issue needs to be solved and work is happening behind the scenes toward that goal.
  • Media, The Navy and the DC Shooter: A Retired Navy Security Officer’s View

    09/19/2013 2:40:29 AM PDT · by marktwain · 6 replies
    mississippigunnews.com ^ | 17 September, 2013 | Rick Ward
    If you are watching the news in the early stages of the Navy Yard shooting, you may not be surprised that you hear one thing and hours later hear something totally different. It seems the media gets focused on things like, how many shooters were there, what kind of gun was used, how did he get a security clearance with his background and so on. Many of these are valid questions but the demand put on Navy officials for facts quickly impacts on those with boots on the ground, leading to nothing but misinformation.I reminisce of the frustration I often...
  • The Stealthy Hardware Trojan that Can Affect Intel Ivy Bridge Processors

    09/18/2013 10:52:16 PM PDT · by SgtBilko · 5 replies
    infosecurity ^ | 18 September 2013
    A team from universities in the US, Netherlands, Switzerland and Germany have published research demonstrating that subtle changes below the gate level of chips can alter functionality in a controlled but covert manner. The possibility for hardware trojans to be inserted into motherboards and processors – especially since many of these are manufactured abroad in countries such as China – has been a growing concern. But, say the researchers in a paper titled 'Stealthy Dopant-Level Hardware Trojans' published last week, "since there have been no reported hardware trojans in practice yet, little is known about how such a trojan would...
  • CNN: Washington FBI Confirms no AR-15 was used in Navy Yard Attack

    09/17/2013 7:07:53 AM PDT · by Perdogg · 136 replies
    Twitter ^ | Sept 17th, 2013 | Pamela Brown
    FBI Washington field office just confirmed gunman was NOT armed with AR15. Spokesperson says 1 shotgun and 2 pistols recovered— Pamela Brown (@PamelaBrownCNN) September 17, 2013
  • Strange email from FR (vanity)

    09/16/2013 12:19:09 PM PDT · by Bob · 47 replies
    Free Republic | 09/16/13 | Me
    I received an unusual email from FR today: On Mon Sep 16 12:23:52 2013 somebody at the Internet address 138.162.0.42 requested this information to be sent to you. Your screen name is: Bob Your password is: ----------- (removed) To log into your account, please visit: http://www.freerepublic.com/perl/login When I looked up the requesting IP address, this is what was returned: Overview for 138.162.0.42 Updated 0 seconds ago NetRange: 138.162.0.0 - 138.162.255.255 CIDR: 138.162.0.0/16 OriginAS: NetName: NMCI-NET-ORF NetHandle: NET-138-162-0-0-1 Parent: NET-138-0-0-0-0 NetType: Direct Assignment RegDate: 1990-05-07 Updated: 2011-02-23 Ref: http://whois.arin.net/rest/net/NET-138-162-0-0-1 OrgName: Navy Network Information Center (NNIC) OrgId: NNICN-1 Address: 2465 GUADALCANAL ROAD...