‘Trojan Horse’ Bug Lurking in Vital US Computers Since 2011

A destructive “Trojan Horse” malware program has penetrated the software that runs much of the nation’s critical infrastructure and is poised to cause an economic catastrophe, according to the Department of Homeland Security. National Security sources told ABC News there is evidence that the malware was inserted by hackers believed to be sponsored by the…

World on a string: Breakthrough fiberoptic cable 2,500X faster than fastest internet

Imagine downloading your favorite flick in 31 thousandths of a second. Such insane internet speeds are now a reality, with researchers rolling out a 255 terabits per second fiberoptic network which could transport the entire Internet on a single cable. The cable, the joint effort of Dutch and US scientists, is 2,550 times faster than…

FBI director: iPhones shields pedophiles from cops

NEW YORK (CNNMoney) Apple’s new privacy features protect kidnappers, pedophiles and terrorists, according to FBI director James Comey. In an interview on CBS’ “60 Minutes” on Sunday, Comey said Apple’s encryption standards for iPhones and iPads “put people beyond the law.” Apple (AAPL, Tech30) recently took measures to enhance user privacy. Now, only users have…

The Internet is broken

Reports of Internet bugs like like Heartbleed and the recent shellshock are growing more frequent and the problems they pose are increasingly more dangerous. Why? For two reasons that aren’t going to change anytime soon. The Internet was never meant for this. We use the Internet for banking, business, education and national defense. These things…

Inventor of World Wide Web warns of threat to internet

London (AFP) – The British inventor of the World Wide Web warned on Saturday that the freedom of the internet is under threat by governments and corporations interested in controlling the web. Tim Berners-Lee, a computer scientist who invented the web 25 years ago, called for a bill of rights that would guarantee the independence…

‘You are not a product’: Privacy-friendly ad-free ‘anti-Facebook’ network Ello explodes

A mostly obscure, privacy-orientated social network – an ‘anti-Facebook’ of sorts – has recently undergone meteoric growth. It poses itself as an advert-free enterprise which is not going to become a tool to manipulate its users. ‘Anti-facebook’ network Ello kicked off in July as an invite-only social network seeking to have an advert-free user-orientated role…

Pirate Bay fools the system with cloud technology

Despite years of persecution, the world’s most notorious pirated content exchange continues to flout copyright laws worldwide. The Pirate Bay team revealed how cloud technology made their service’s virtual servers truly invulnerable. Two founders of The Pirate Bay (TPB) file exchange are in prison, but their creation continues to receive millions of unique visitors daily…

Governments spy on journalists with weaponized malware – WikiLeaks

Journalists and dissidents are under the microscope of intelligence agencies, Wikileaks revealed in its fourth SpyFiles series. A German software company that produces computer intrusion systems has supplied many secret agencies worldwide. The weaponized surveillance malware, popular among intelligence agencies for spying on “journalists, activists and political dissidents,” is produced by FinFisher, a German company.…

High Speed Click Fraud: Over One Third Of All Internet “Traffic” Is Fake

“When you bundle bots, clicks fraud, viewability and the lack of transparency [in automated ad buying], the total digital-media value equation is being questioned and totally challenged,” warns one advertising group executive as theWSJ reports about 36% of all Web traffic is considered fake, the product of computers hijacked by viruses and programmed to visit sites. This…

Why HTTPS and SSL are not as secure as you think

GIH: We are led to believe that by installing a certificate, or by other common security practices, we are safe.  The following shows that this may not be the case, especially considering the vulnerabilities of HTTPS protocol, the commonly accepted ‘safe’ way to browse: In this day and age of well-known NSA spying, everyone keeps…

How the NSA Plans to Infect ‘Millions’ of Computers with Malware

GIH:  As more information comes out about various spy agencies and their cyber divisions, it seems that those such as the NSA pose a larger threat to internet security than the hackers they are supposedly protecting us from.  The following information should make any user of the internet, be it a business or individual or…

Facebook click fraud revealed $600,000 small business nightmare

GIH: Click fraud is nothing new, but Facebook seems to be taking it to an entirely new level, according to this account of a small business operator who paid hundreds of thousands of dollars for fake profile likes, with no accounting of where his money went.  Now being a public company, this cannot be written…

The Conspiracy Theory Is True: Agents Infiltrate Websites Intending To “Manipulate, Deceive, And Destroy Reputations”

GIH: Alarming information has been brought forth as part of an ongoing disclosure regarding activities of NSA and other intelligence agencies.  The following should be alarming for anyone using the internet – especially businesses, governments, and other organizations.  What SEO managers and forum administrators have suspected for years, government agent ‘shills’ are infecting the internet…

6 anti-NSA technological innovations that may just change the world

Rather than grovel and beg for the U.S. government to respect our privacy, these innovators have taken matters into their own hands, and their work may change the playing field completely.  People used to assume that the United States government was held in check by the constitution, which prohibits unreasonable searches and seizures and which…

Internet firms release data on NSA requests

GIH: We now have a better picture of how some tech giants were handling NSA requests for information.  Of course, we cannot be sure that this represents an accurate picture of data released.  Also, many of the NSAs collection strategies such as the TAO program, involve hacking or otherwise collecting info without the consent of…

Introducing the UltraCoin Cryptocurrency Composite Index

GIH: Alternative investing takes a new dimension with the introduction of ‘cryptocurrencies’ – designed mostly as payment systems, the value fluctuates based on customer demand, and marketplaces offer you the ability to trade your Bitcoins for USD or EUR.  Whatever your opinion if this is a valid investment, if one had purchased Bitcoin near it’s…

ALERT: Point of Sale RAM scraper malware

Advances in technology have led to more sophisticated crimes by exploiting security vulnerabilities of new technologies.  This is exacerbated by the fact that understanding of these technologies and their use is only by a few, while the majority of end-users are unaware.  Generally speaking, following standard security practices will thwart 95% of electronic crimes such…

Google’s robots and creeping militarization

Google’s connection to the US Military and specifically, the intelligence community, should be alarming both for political and technical reasons.  We can assume that Google has been compromised and any data exchange over Google networks including search, apps, web services such as Gmail, Google+, and others, are being recorded and analyzed.  Also disturbingly, Google is…

The State of Technology Address at the End of 2013

From SOTT: Oh 2013, what a high-tech year you were! From the general recognition (finally) that the US government was spying on everyone, everyone’s dog, and everyone’s dog’s lawn presents, to the almighty Mobile Revolution, to the 64-bit iPhone with 2X the awesome, to the complete abortion that is Windows 8/8.1… Yes, it was a year to…