The most secure of personal wireless security password protocols has been hacked. WPA-2, the best choice for general home wireless network security, seems to have been cut to pieces. In this article by phys.org, we read:
Now, a new study published in the International Journal of Information and Computer Security, reveals that one of the previously strongest wireless security systems, Wi-Fi protected access 2 (WPA2) can also be easily broken into on wireless local area networks (WLANs). The researchers have
Continue reading Seems Data-Thieves cracked WPA-2
And you thought only the NSA was snooping at your window. Forget, for the moment, the
Picture from heliguy.com
drone /UAV aspect of this story. Consider that the technology for hacking your Wi-Fi network exists in great abundance, and data-thieves everywhere would love to get a peek at your network data streams. Imagine a world where the guy a few booths over inside your favorite coffee hangout is a thief. His pal behind you, too. It isn’t enough that
Continue reading Data-Thieving Drones
Or, will give up what control it has left.
I remember the days of slow dial-up network access with fondness on one level – a private network. When Prodigy and Promenade were pretty much the big guys as far as inter-connectivity among the masses. You became a member, and then could network with people anywhere on the system. Promenade later became America Online, or AOL. Each system had its own closed network, services, communities, downloads games and chatrooms. It was
Continue reading US to Give Up Control of the Internet
Copied it full from ZeroHedge. If the ZeroHedgers have an issue with it, I’ll remove it.
Submitted by Tyler Durden on 12/29/2013 15:39 -0500
The NSA’s 50-Page Catalog Of Back Door Penetration Techniques Revealed
While the world may have become habituated to (and perhaps revels in, thank you social media exhibitionist culture) the fact that the NSA is watching anyone and everyone, intercepting, recording, and hacking every electronic exchange regardless if it involves foreign “terrorists” or US housewives, the discoveries
Continue reading 50 Page Catalog of Equipment and Techniques for Government Hackers
Well, the argument on the forums concerning the NSA’s ability to crack e-mail encryption seems to have been resolved.
The agency has fulfilled a decades-long quest to break the encryption of e-mail, online purchases, electronic medical records and other Web activities, the New York Times, the U.K.’s Guardian and ProPublica reported yesterday. The NSA also has been given access to — or found ways to enter — databases of major U.S. Internet companies operating the most popular e-mail
Continue reading Information Security – Update
Many Californians were shocked out of their seats and beds yesterday and early this morning when the first ever Amber Alert via iPhone went out. It was preceded by a very ominous alert, much like a danger signal or warning. If you were a participant in this event, and would rather not participate in another, you can turn off the alert in your iPhone.
Touch “Settings” and then “Notifications”. Scroll to the bottom of that screeen and you will see
Continue reading Did Yesterday’s Amber Alert Spook You?
As if hacked government databases haven’t already place our personal information at risk, here is news of another problem that promises to be the biggest yet.
The information database necessary for the Health Care exchanges to operate has NOT passed security testing. It will be the world’s largest and most complete storehouse of personal information ever. It will be the target of hackers large and small, government and geek, and the attacks will be round the clock.
Our people can’t
Continue reading Government Assisted Identity Theft
To enable the raping of your private data, your data has to first be available. With the news reports of federal and state data collection making waves across the land, we would be wise to suppose that there are even more examples of this travesty yet to come.
Enter ObamaCare. According to Rare.us, we now have the pleasure of seeing how one more set of programs is ready to take, store and share our data without our consent. All we
Continue reading DataRaping by our Protectors
Rendering drones surveillance null and void via modern tech in the hands of “ordinary” citizens. Sound implausible? An Oregon company intends to make drone eye-in-the-sky defense available to the public. That’s right. To YOU. “Domestic Drone Countermeasures” claims to intend selling equipment that will make it impossible for drones to “complete their mission” by disabling their mission capabilities. (Post Edit: Method at the end)
From their splash page…
“Many different, large area, small area, mobile and fixed Countermeasures and systems
Continue reading A Defense Against Drones – Galt’s Engine
Higher and higher, smarter and smarter and with better eyes than any eagle could ever evolve. I’ve been talking about drones for private use for a while now. Well, here is some information about government drones and your privacy. Keep in mind while looking at this information, that the technology discussed is already in use, with the distinct possibility of having already been replaced with superior equipment. The advancement of technology knows no end point.
Here are some links I
Continue reading The Real Direction of Drones Overhead