Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $25,572
31%  
Woo hoo!! And we're now over 31%!! Thank you all very much!! God bless.

Keyword: security

Brevity: Headers | « Text »
  • Candidate Lies about National Security Experience [semi-satire]

    04/04/2017 11:06:01 AM PDT · by John Semmens · 1 replies
    Semi-News/Semi-Satire ^ | 2 Apr 2017 | John Semmens
    Jon Ossoff, the Georgia Democrat running for the House seat vacated by Republican Tom Price who is now Trump’s Secretary of Health and Human Services, has been campaigning as a man “with five years of top secret security clearance.” The truth is that Ossoff has had quite a bit less time with top secret clearance. While the candidate admitted that he had a US top secret clearance for only five months he defended his campaign claims by asserting that his employment at an investigative film company that does work for Al Jazeera over the last three years “has more than...
  • Theresa May triggers Article 50 with warning over security as EU leaders rule out key Brexit demand

    03/29/2017 1:20:40 PM PDT · by Repeal 16-17 · 13 replies
    The Telegraph ^ | March 29, 2017 | Laura Hughes, Kate McCann, and Gordon Rayner
    Theresa May’s Brexit negotiations got off to a bruising start as she threatened to withdraw cooperation on security and Europe’s heavyweights flatly rejected one of her key demands. The Prime Minister started her day of history by talking of a “deep and special partnership” with post-Brexit Europe, but within hours she and the EU’s most powerful leaders were trading blows. Mrs. May invoked the dark days of the Cold War as she warned the EU its “fragile” security would be “weakened” if it failed to reach a deal with Britain.
  • Apple Dials Up Encryption as Mobile Threats Soar

    03/28/2017 3:08:00 PM PDT · by Swordmaker · 6 replies
    Infosecurity Magazine ^ | March 28, 2017 | By Phil Muncaster
    The infection rate in mobile networks – which includes Windows/PC systems connected by dongle and mobile IoT devices – rose “steadily” during the year to hit a new high of 1.35% in October. The vast majority of infections (85%) discovered in mobile networks belonged to smartphones, with Android (81%) the main culprit, followed by Windows/PCs (15%) and 4% linked to iPhones and other mobile devices. Nokia explained: “Many people are surprised to find that Windows/PCs are responsible for a large portion of the malware infections detected when analyzing mobile network traffic. These Windows/PCs are connected to the mobile network using...
  • Trump Administration Orders Tougher Screening of Visa Applicants

    03/23/2017 5:50:45 PM PDT · by SpeedyInTexas · 43 replies
    NYTimes ^ | 03/23/2017 | MICHAEL D. SHEAR
    The Trump administration is making it tougher for millions of visitors to enter the United States by demanding new security checks before giving visas to tourists, business travelers and relatives of American residents. Diplomatic cables sent last week from Secretary of State Rex W. Tillerson to all American embassies instructed consular officials to broadly increase scrutiny. It was the first evidence of the “extreme vetting” Mr. Trump promised during the presidential campaign.
  • Why do White House Roof Security Dress in Black?

    03/25/2017 7:07:33 AM PDT · by Gadsden1st · 68 replies
    Vanity...Just saw shot of White House, there are 8 S. S. guards on roof. Why are they in Black? They stand out as targets. Don't they have white (Winter) camo??? Sorry for Vanity..
  • Apple says recent WikiLeaks CIA docs detail old, fixed iPhone and Mac exploits

    03/24/2017 2:35:08 PM PDT · by Swordmaker · 9 replies
    TechCrunch ^ | March 23, 2017 | by Matthew Panzarino
    Apple says that its preliminary assessments of the WikiLeaks documents released today indicate that the vulnerabilities it details for iPhone and Mac were fixed years ago. The documents, which originated with the CIA, detailed a variety of methods for compromising — breaking into — Apple devices if an agent was able to gain physical access to the device.The leaks were a part of the “Vault7″ documents, which WikiLeaks has been dribbling out. Some of the exploits, like NightSkies, could access personal info like call logs and SMS conversations — but only with physical access.Apple’s full statement is as follows We...
  • Hackers threaten to wipe millions of iPhones and iCloud accounts if Apple doesn’t pay by April 7th

    03/22/2017 12:17:49 PM PDT · by Swordmaker · 46 replies
    MacDailyNews ^ | Wednesday, March 22, 2017 · 9:29 am
    “A hacker or group of hackers is apparently trying to extort Apple over alleged access to a large cache of iCloud and other Apple email accounts,” Joseph Cox reports for Motherboard. “The hackers, who identified themselves as ‘Turkish Crime Family’, demanded $75,000 in Bitcoin or Ethereum, another increasingly popular crypto-currency, or $100,000 worth of iTunes gift cards in exchange for deleting the alleged cache of data.” “The hackers provided screenshots of alleged emails between the group and members of Apple’s security team. One also gave Motherboard access to an email account allegedly used to communicate with Apple,” Cox reports. “‘Are...
  • Secret Service Removed Alarm Sensors From Fence Intruder Climbed Over

    03/21/2017 3:11:56 PM PDT · by HarleyLady27 · 61 replies
    Gateway Pundit ^ | March 21, 2017 | Cristina Laila
    The fence jumper who roamed around the White House grounds for 17 minutes before being apprehended by the Secret Service was able to breach security so easily because the sensors along the fence had been reportedly removed. The agency had removed alarm sensors along an area of one fence that the intruder scaled, according to two sources familiar with details of the incident. One source said superiors in the Uniformed Division told Secret Service personnel to remove the sensors and piece them together for use elsewhere. They were never replaced.
  • President Trump No Longer Safe At The White House

    03/19/2017 9:49:53 AM PDT · by davikkm · 63 replies
    IWB ^ | Pamela Williams
    President Trump No Longer Safe At The White House – LAST NIGHT Man Drove Up To The WH With A Bomb In His Car – March 19, 2017 President Trump’s life is in danger. Yesterday a fence jumper was on the White House property 15 minutes before he was spotted and arrested. Then last night around 11pm a man drove his car to the WH, but the Secret Service stopped him, as he looked suspicious. They were correct in their analysis, as he had a bomb in his car. The Secret Service have made the statement that President Trump is...
  • President Trump no longer safe in White House: Former Secret Service agent

    03/17/2017 7:23:25 PM PDT · by 2ndDivisionVet · 73 replies
    Fox News Politics ^ | March 17, 2017 | Malia Zimmerman
    The president is no longer safe on the White House grounds, according to former Secret Service agent Dan Bongino, who once guarded presidents George W. Bush and Barack Obama. Bongino made the stunning assessment in an interview Friday with Fox News. It followed an incident last Friday night when a man jumped the White House fence and may have roamed the property for as long as 15 minutes before he was stopped by the Secret Service. Jonathan Tran, who carried two cans of mace, set off multiple alarms, Bongino said, and was even spotted by Secret Service officers, but was...
  • Star Trek Themed Kirk Ransomware and a Spock Decryptor!

    03/17/2017 5:13:53 PM PDT · by LouieFisk · 9 replies
    Bleeping Computer ^ | March 16, 2017 | Lawrence Abrams
    Boldly going where no man has gone before, the Kirk Ransomware brings so much nerdy goodness to the table that it could make anyone in IT interested. We have Star Trek, Low Orbital Ion Cannons, a cryptocurrency payment other than Bitcoin, and a decryptor named Spock! Need I say more? Discovered today by Avast malware researcher Jakub Kroustek, the Kirk Ransomware is written in Python and may be the first ransomware to utilize Monero as the ransom payment of choice.
  • Congressman: We need a National Guard for cybersecurity

    03/14/2017 6:35:44 PM PDT · by 2ndDivisionVet · 5 replies
    CNN Tech ^ | March 12, 2017 | Selena Larson
    There are few people with computer science backgrounds who work in the federal government. Long hours coupled with smaller salaries make it hard to recruit techies to Washington, according to Representative Ruben Gallego. But one way to get more tech people to serve their country is to set up a cybersecurity reservist system, like a National Guard for digital security, said Gallego, a Democrat from Arizona. "We have to accept that, look, this person is not going to man a machine gun, why would we put them through bootcamp, we're never going to send them to the front line," Gallego...
  • Palestinian protesters demand Abbas resign over security coordination with Israel

    03/14/2017 12:01:27 PM PDT · by Eleutheria5 · 2 replies
    Several hundred Palestinians marched in an anti-government protest Monday, calling for the resignation of Palestinian Authority (PA) head Mahmoud Abbas and criticizing his security coordination with Israel. Abbas administers parts of Judea and Samaria and his policy of cooperation between Israeli troops and PA forces against Islamic militants is unpopular among Palestinians. Despite the tense relationship between Israel and the PA, the two benefit from limited coordination on security issues. .....
  • EXCLUSIVE: Former Secret Service Agent Warns Trump ‘Not Secure’ In the White House

    03/11/2017 6:20:23 PM PST · by blam · 66 replies
    Breitbart ^ | 3-11-2017 | Aaron Klein
    A former Secret Service agent who served in the security details of both Presidents Bush and Obama warned on Saturday that President Donald Trump “is not secure in the White House right now as it stands.” Dan Bongino, who was also an instructor at the training academy of the Secret Service, was commenting on Friday night’s reported breach of the White House complex, at least the seventh such incident in recent years. Bongino stated: “If one guy with a backpack and Omar Gonzales with a bad knee could get near the residence of the White House, can you tell me...
  • I can't distinguish between angry and scared, anymore. (vanity)

    03/11/2017 10:01:46 AM PST · by Baynative · 21 replies
    Youtube-FBN ^ | Feb 9, 2017 | Youtube
    The more the scandals left by Obama are unraveling the more I am conflicted between anger and fear over what is in our future. It is bad enough (and not completely unexpected) to learn that Obama has been working harder to destroy our country that we thought. But, the depth of his support in the media is in my opinion, in need of far more exposure and very serious punishment.
  • [Updated] WikiLeaks Not Ready to Share Code with Tech Companies –

    03/09/2017 11:26:42 AM PST · by Ernest_at_the_Beach · 9 replies
    wccftech.com/ ^ | March 9, 2017 | Rafia Shaikh
    Google has finally come out of the closet and is saying what Apple did about the latest CIA leaks – many of the flaws leaked are outdated and already patched. As the companies continue to review the documents, it is becoming clear that most of the reported vulnerabilities are outdated. However, none of the tech firms mentioned in the documents have yet said if “all” of the CIA exploits are patched.Analysts believe that this could be because the tech firms lack access to the hacking code. Only the CIA and WikiLeaks can share further details with the tech industry to help it...
  • Apple says most vulnerabilities in Wikileaks docs are already patched

    03/08/2017 8:20:08 AM PST · by Swordmaker · 40 replies
    Tech Crunch ^ | March 7, 2017 | by Kate Conger
    Wikileaks today published a trove of documents, allegedly taken from the CIA, that detail the government’s efforts to hack popular devices like iPhones, Android phones, and Samsung smart TVs. But Apple is pushing back against claims that the CIA’s hoarded vulnerabilities for its devices were effective. The documents, if they are indeed legitimate, include charts that detail iOS exploits that would allow the CIA to surveil iPhone users and, in some cases, control their devices. Some of the exploits may have been developed in-house, while others appear to have been purchased, copied or downloaded from non-governmental sources. However, Apple...
  • Global elites’ love of iPhone made iOS a prime target of CIA

    03/07/2017 6:16:30 PM PST · by Swordmaker · 21 replies
    Cult of Mac ^ | March 7, 2017 | BY LEANDER KAHNEY
    Although Google’s Android dominates the worldwide smartphone market, the CIA concentrated on Apple’s iOS because of its popularity among global elites, WikiLeaks reports.The huge trove of leaked CIA documents, codenamed “Vault 7” and released Tuesday by WikiLeaks, reveals that the CIA formed a special unit called the Mobile Development Branch (MDB) to infect smartphones. And within that unit, Apple’s iOS was a prime target. According to WikiLeaks, the CIA’s MDB developed or exploited a range of hacks, vulnerabilities and even specialized malware to turn iPhones and iPads into spying devices. Compromised iPhones and iPads can track users’ conversations, texts, geolocations...
  • THREE Lucian Wintrich University Speaking/Panel Events Canceled..Schools Claim “Security Concerns”

    03/03/2017 5:20:25 AM PST · by davikkm · 5 replies
    thegatewaypundit ^ | Matt Armstrong
    “In lumine Tuo videbimus lumen” (In Thy light shall we see light) is Columbia University’s motto. However, they are keeping many students in the dark when it comes to debates about free speech on campus. The Gateway Pundit’s White House correspondent Lucian Wintrich, along with Breitbart writers Charles Nash and Allum Bokhara, were booked by a Columbia University student organization to give an open panel discussion on campus free speech set for Thursday, March 3rd. The student organization was also organizing to invite a liberal writer on the panel to debate Wintrich, Nash, and Bokhara. Days before the event the...
  • Hidden backdoor discovered in Chinese IoT devices

    03/02/2017 9:49:29 AM PST · by Swordmaker · 11 replies
    BetaNews ^ | March 2, 2017 | By Ian Barker
    Researchers at Trustwave have uncovered a backdoor in IoT devices from a Chinese manufacturer that could leave them open to exploitation. The backdoor is present in almost all devices produced by VoIP specialist DBLTek, and appears to have been purposely built in for use by the vendor.It uses a simple challenge and response mechanism to allow remote access. However, Trustwave's investigation has shown this scheme to be fundamentally flawed in that it is not necessary for a remote user to possess knowledge of any secret or password, besides the challenge itself and knowledge of the protocol/computation used.The issue permits a...