The most secure of personal wireless security password protocols has been hacked. WPA-2, the best choice for general home wireless network security, seems to have been cut to pieces. In this article by phys.org, we read:
Now, a new study published in the International Journal of Information and Computer Security, reveals that one of the previously strongest wireless security systems, Wi-Fi protected access 2 (WPA2) can also be easily broken
Continue reading Seems Data-Thieves cracked WPA-2
And you thought only the NSA was snooping at your window. Forget, for the moment, the
Picture from heliguy.com
drone /UAV aspect of this story. Consider that the technology for hacking your Wi-Fi network exists in great abundance, and data-thieves everywhere would love to get a peek at your network data streams. Imagine a world where the guy a few booths over inside your favorite coffee hangout is a
Continue reading Data-Thieving Drones
Or, will give up what control it has left.
I remember the days of slow dial-up network access with fondness on one level – a private network. When Prodigy and Promenade were pretty much the big guys as far as inter-connectivity among the masses. You became a member, and then could network with people anywhere on the system. Promenade later became America Online, or AOL. Each system had its own
Continue reading US to Give Up Control of the Internet
Copied it full from ZeroHedge. If the ZeroHedgers have an issue with it, I’ll remove it.
Submitted by Tyler Durden on 12/29/2013 15:39 -0500
The NSA’s 50-Page Catalog Of Back Door Penetration Techniques Revealed
While the world may have become habituated to (and perhaps revels in, thank you social media exhibitionist culture) the fact that the NSA is watching anyone and everyone, intercepting, recording, and hacking every electronic exchange regardless
Continue reading 50 Page Catalog of Equipment and Techniques for Government Hackers
Well, the argument on the forums concerning the NSA’s ability to crack e-mail encryption seems to have been resolved.
The agency has fulfilled a decades-long quest to break the encryption of e-mail, online purchases, electronic medical records and other Web activities, the New York Times, the U.K.’s Guardian and ProPublica reported yesterday. The NSA also has been given access to — or found ways to enter — databases
Continue reading Information Security – Update
Many Californians were shocked out of their seats and beds yesterday and early this morning when the first ever Amber Alert via iPhone went out. It was preceded by a very ominous alert, much like a danger signal or warning. If you were a participant in this event, and would rather not participate in another, you can turn off the alert in your iPhone.
Touch “Settings” and then “Notifications”. Scroll
Continue reading Did Yesterday’s Amber Alert Spook You?