• Same story, different day...........year ie more of the same fiat floods the world
  • There are no markets
  • "Spreading the ideas of freedom loving people on matters regarding high finance, politics, constructionist Constitution, and mental masturbation of all types"

Three Steps Outlining How Hackers Access Your Personal Information

searcher

Mother Lode Found
Mother Lode
Sr Site Supporter
Joined
Mar 31, 2010
Messages
158,020
Likes
41,255
#1
Notorious former hacker reveals how criminals can steal your details in just THREE easy steps when you connect to public Wi-Fi
  • Video shows how exposed your personal details are to cyber criminals
  • Tools so accessible school students can download systems and hack
  • Jetstar and Suzuki listed as being suspected of a major cyber breach
  • Hackers monitored Australian satellite company Newsat for two years
  • Australian government, defence department and other networks hacked


Read more: http://www.dailymail.co.uk/news/article-3764353/Notorious-former-hacker-Kevin-Mitnick-reveals-criminals-steal-details-just-THREE-easy-steps-connect-public-Wi-Fi.html#ixzz4IoDITN7d
Follow us: @MailOnline on Twitter | DailyMail on Facebook
 

searcher

Mother Lode Found
Mother Lode
Sr Site Supporter
Joined
Mar 31, 2010
Messages
158,020
Likes
41,255
#2
Pro Hacker Tells Scary Truth CYBER SECURITY & Online Privacy
John Lovell


Published on Jun 1, 2017
John Lovell interviews professional hacker on cyber security, privacy on the internet, cyber terrorism, penetration testing, information / data security, confidentiality, phishing, the dark / deep web, and hacking in Hollywood movies such as James Bond Skyfall, Hackers, Swordfish, the Net, Mr. Robot, and other movies.
 

searcher

Mother Lode Found
Mother Lode
Sr Site Supporter
Joined
Mar 31, 2010
Messages
158,020
Likes
41,255
#3
How Navy SEALs create a Bomb Proof Password | Tactical Rifleman
Tactical Rifleman


Published on Aug 4, 2017
Here at Tactical Rifleman we have some great content on weapons and tactics. But today Jason Phalin, a former Navy SEAL and co-founder of Arion Risk LLC, is going to share a critical electronic security measure that the military uses to protect themselves electronically while at home and overseas. In this episode we take a look at password generation, a common weak spot in computer security. He takes us through an efficient method to generate a great password that is as easy to generate on a laptop as it is on a smart phone or tablet and can be easily taught to friends and family. Cyber security is a growing security concern for society and the need to protect ourselves digitally is equally important as our physical security. Happy Hunting!



For more go to http://www.tacticalrifleman.com/ and Follow us on Facebook: https://www.facebook.com/TacticalRifl... and Twitter-http://bit.ly/TACrman
 

searcher

Mother Lode Found
Mother Lode
Sr Site Supporter
Joined
Mar 31, 2010
Messages
158,020
Likes
41,255
#4
The man who came up with the safe password rules admits he was WRONG and his guidelines about using numbers, symbols and capital letters have made computers easier to hack!
  • Bill Burr's 'bible' on password security was written in 2003
  • His guidance was use numbers, non-alphabetic symbols and capital letters
  • Long passwords with just letters are stronger than short ones with characters
  • When people change their passwords they do predictable things like add a 1
  • These are called 'transformations' and hackers build them into their scripts


Read more: http://www.dailymail.co.uk/sciencetech/article-4771194/The-man-responsible-passwords-says-advice-WRONG.html#ixzz4pAvqypFw
Follow us: @MailOnline on Twitter | DailyMail on Facebook
 

searcher

Mother Lode Found
Mother Lode
Sr Site Supporter
Joined
Mar 31, 2010
Messages
158,020
Likes
41,255
#5
Cyber Security Pt.2 - Critical Tips
John Lovell


Published on Oct 14, 2017

McAfee Antivirus - http://amzn.to/2y8gxds
Norton Antivirus - http://amzn.to/2z5FlBj

Interviewing a professional computer hacker on online security tips. Topics covered include browsing anonymously (VPNs, TOR, duckduckgo, etc.), avoiding suspiscious websites and programs, best antivirus programs, general cybersecurity, and more.
 

dacrunch

Platinum Bling
Platinum Bling
Joined
Apr 9, 2010
Messages
4,161
Likes
2,884
#6
One of my son's friends from high-school, now in his late 30's, spent a few days with us.


All of our computers were bogged down & slow... Since the 90's, I've been running ZoneAlarm (firewall) and AVG (viruses).

He helped me just rely on Windows Firewall & Windows Defender. Sure sped up the computers.

But when I went to the PirateBay (a proxy), I started getting pop-ups that I couldn't shut down, except shutting off the computer.

I re-installed "Peerblock 1.1" (the 1st version, free, with definition updates... Oh, and don't "upgrade to a newer version", then you lose the free definition updates!) - and that problem went away.

I haven't installed "ghostery" or "adblock" on Mozilla Firefox yet... Seeing how my "light" set-up works. He says that the "trick" is checking OFTEN for Windows (7) updates and installing them. Then running CCleaner.

So far, so good...

As for "hacker/phishing/tracking" protection, and "anonymity", no clue.
 

searcher

Mother Lode Found
Mother Lode
Sr Site Supporter
Joined
Mar 31, 2010
Messages
158,020
Likes
41,255
#7
Threats of cyber warfare
CaspianReport


Published on Oct 28, 2017
Support CaspianReport on Patreon:
https://www.patreon.com/CaspianReport

Follow Nathan on Twitter:
https://twitter.com/NathanAB_

WASHINGTON - Over the last decade, high profile cyber attacks have steadily increased among national governments such as the United States, China, Russia, Israel and even North Korea. As cyber warfare becomes the battlefield of choice for developed nations, governments are able to launch direct attacks against each other in secrecy and without the risk of causing physical harm. This trend has resulted in new global threats as digital technology becomes increasingly integrated into all aspects of life. In this report, we will examine the effectiveness, allure, and dangers of cyber warfare.

Soundtrack:
All This - Scoring Action by Kevin MacLeod is licensed under a Creative Commons Attribution license (https://creativecommons.org/licenses/...)
Source: http://incompetech.com/music/royalty-...
Artist: http://incompetech.com/

Follow CaspianReport on social media.
Facebook: https://www.facebook.com/caspianreport
Twitter: https://twitter.com/caspianreport
 

searcher

Mother Lode Found
Mother Lode
Sr Site Supporter
Joined
Mar 31, 2010
Messages
158,020
Likes
41,255
#8
Ignorance vs Understanding: Regulation of "malware"?
InRangeTV


Published on Dec 16, 2017
Ignorance vs Understanding: Regulation of "malware"?

The similarities between kinetic and digital weapons are astonishing - both are nothing more than agnostic technology.

It's how the technology is used that dicatates a positive or negative result and both are nearly impossible to truly remove from the populace. As a result regulators create a patchwork quilt of confusing and ridiculous laws typically based out of ignorance and fear.

We're now at a point in which we're again seeing this same sort of ignorance and fear being applied to the research, development and analysis of malware. There were attempts in the past to sue lawful firearms manufacturers for the "harm" caused by their product and we're now seeing that same logic applied to hackers and software coders working with 'malware' in which there is a momement afoot to hold them criminally liable for actions done with their code even if they were not the ones instigating the actions.

Using regulations and ignorant laws to control technology inevitably fails.

Malicious people will do malicious things and keeping technology out of the hands of the "good people" is never the right answer.

Ignorance is never the answer.

Please join us for this 45 minute round table discussion with some true experts in this field:

John Strand of Black Hills infosec (and SANS instructor):
https://www.blackhillsinfosec.com/tea...

Jake Williams of Rendition Infosec (and SANS instructor):
https://www.renditioninfosec.com/peop...

Deviant Ollam, physical security expert:
http://deviating.net/

InRangeTV is entirely viewer supported, please consider it:
https://www.patreon.com/InRangeTV
 

dacrunch

Platinum Bling
Platinum Bling
Joined
Apr 9, 2010
Messages
4,161
Likes
2,884
#9
Remembering the old Yahoo News from yesteryear, and comparing it to today's Yahoo News, methinks the Governments have taken control - or "hacked" - what used to be "real information", replacing it with advertising & fake news.
 

searcher

Mother Lode Found
Mother Lode
Sr Site Supporter
Joined
Mar 31, 2010
Messages
158,020
Likes
41,255
#10
McAfee to RT: ‘We live in a new world of sophisticated hacking & cryptojacking’
RT


Published on Dec 29, 2017
Cybersecurity guru John McAfee, who courted online ridicule after he was breached by a hacker seeking to promote obscure digital coins, told RT we are essentially defenseless in the face of advanced hacking techniques. READ MORE: https://on.rt.com/8vws
 

searcher

Mother Lode Found
Mother Lode
Sr Site Supporter
Joined
Mar 31, 2010
Messages
158,020
Likes
41,255
#11
Do YOU save passwords on your browser? Major security flaw in autofill tool means your personal details and online habits could be revealed to hackers
  • Browsers such as Safari or Google Chrome often come with password managers
  • But new research shows that tracking firms are exploiting the popular tools
  • Web trackers are stealing information from them to help target advertisements
  • The security loophole could be used to access people's passwords, raising concerns that hackers could exploit the flaw


Read more: http://www.dailymail.co.uk/sciencetech/article-5228303/Ad-firms-use-browser-password-managers-track-users.html#ixzz532n9cxM5
Follow us: @MailOnline on Twitter | DailyMail on Facebook
 

searcher

Mother Lode Found
Mother Lode
Sr Site Supporter
Joined
Mar 31, 2010
Messages
158,020
Likes
41,255
#12
This Is How Easy It Is To Get Hacked: VICE on HBO, Full Episode
VICE News



Published on Mar 28, 2018
Since the 2016 election, the notion of hacking has become inextricably intertwined with one country: Russia.

But cyber crimes emanating from Russia and Russian speaking countries have been around for years, fueling attacks like a 2014 data breach of more than 500 million Yahoo! accounts and a scheme that stole 160 million credit cards from American corporations.

"If someone wants to hack you, they're gonna be able to" former NSA hacker Patrick Wardle told VICE News. And if a Russian wants to hack you, they've certainly got the tools: A 2016 report by the Department of Homeland Security confirmed that 75 percent of all ransomware was created in Russia.

The apparent lack of ethical consideration in the buildup of Russian information technology and cyber security is rooted in decades of technical education under Stalin, who launched polytechnic schools to train engineers for his military-industrial complex. Russia's cyber capabilities can now be used for just about everything, ranging from digital bank robberies to tampering with critical infrastructure.

"This is the website of a big online store." Kostya, an anonymous Russian hacker who agreed to show VICE News how easy it is to steal digital data. "I can get into their configurations and download their client database."

Spurred by the trillions of dollars online and in a generation raised on the web, hacking from Russia and around the world is flourishing.

VICE News went to Moscow to see the country’s expert hackers in action.

Subscribe to VICE News here: http://bit.ly/Subscribe-to-VICE-News

Check out VICE News for more: http://vicenews.com

Follow VICE News here:
Facebook: https://www.facebook.com/vicenews
Twitter: https://twitter.com/vicenews
Tumblr: http://vicenews.tumblr.com/
Instagram: http://instagram.com/vicenews
More videos from the VICE network: https://www.fb.com/vicevideo
 

searcher

Mother Lode Found
Mother Lode
Sr Site Supporter
Joined
Mar 31, 2010
Messages
158,020
Likes
41,255
#13
FBI says Russian hackers may be collecting your personal data after hacking 'hundreds of thousands' of home routers and devices

  • The FBI has said that 'foreign cyber actors have compromised hundreds of thousands of home and office routers and other networked devices worldwide'
  • The hackers have infected these devices with VPNFilter malware
  • VPNFilter malware can rendering routers inoperable and allow data collection
  • The group believed to be behind the attack is known as the 'Sofacy Group,' also known as 'apt28,' 'sandworm,' 'x-agent,' 'pawn storm,' 'fancy bear' and 'sednit'
  • Sofacy has been blamed for many cyber attacks involving Russia


Read more: http://www.dailymail.co.uk/news/article-5774517/Russian-hackers-collecting-data-hundreds-thousands-routers-world.html#ixzz5Gcwkk81n
Follow us: @MailOnline on Twitter | DailyMail on Facebook
 

searcher

Mother Lode Found
Mother Lode
Sr Site Supporter
Joined
Mar 31, 2010
Messages
158,020
Likes
41,255
#14
Expectations of Privacy in the Digital Age with Terry Roberts
IntlSpyMuseum


Published on Jun 4, 2018
Terry Roberts, Founder and President of WhiteHawk, Inc. leads
a discussion of cybersecurity informed by her extraordinary career in intelligence. She was previously the Vice President for Intel and Cyber at TASC. Before transitioning to industry in 2009, Roberts was the Deputy Director of Naval Intelligence (DDNI), where she led, together with the Director of Naval Intelligence, more than 20,000 intelligence and information-warfare military and civilian professionals.

------------------------------------------------------------------
Facebook: https://www.facebook.com/IntlSpyMuseum
Twitter: https://twitter.com/intlspymuseum
SpyCast: https://audioboom.com/channel/spycast