'cookieChoices = {};'

Governments are instituted among Men,
deriving their just powers from the consent of the governed,
That whenever any Form of Government becomes destructive of these ends,
it is the Right of the People to alter or to abolish it,
and to institute new Government

Friday, March 31, 2017


From Reuters:
A scramble at Cisco exposes uncomfortable truths about U.S. cyber defense 
When WikiLeaks founder Julian Assange disclosed earlier this month that his anti-secrecy group had obtained CIA tools for hacking into technology products made by U.S. companies, security engineers at Cisco Systems (CSCO.O) swung into action. 
The Wikileaks documents described how the Central Intelligence Agency had learned more than a year ago how to exploit flaws in Cisco's widely used Internet switches, which direct electronic traffic, to enable eavesdropping. 
Senior Cisco managers immediately reassigned staff from other projects to figure out how the CIA hacking tricks worked, so they could help customers patch their systems and prevent criminal hackers or spies from using the same methods, three employees told Reuters on condition of anonymity. 
The Cisco engineers worked around the clock for days to analyze the means of attack, create fixes, and craft a stopgap warning about a security risk affecting more than 300 different products, said the employees, who had direct knowledge of the effort. 
That a major U.S. company had to rely on WikiLeaks to learn about security problems well-known to U.S. intelligence agencies underscores concerns expressed by dozens of current and former U.S. intelligence and security officials about the government's approach to cybersecurity. 
That policy overwhelmingly emphasizes offensive cyber-security capabilities over defensive measures, these people told Reuters, even as an increasing number of U.S. organizations have been hit by hacks attributed to foreign governments.

TechRepublic: Is the Intel Management Engine a backdoor? 
Is Intel's Management Engine a backdoor for security groups and hackers, or just a feature created to aid businesses? Jack Wallen dives in and draws his conclusions. 
Bookmark and Share
posted by Pastorius at permanent link#


Anonymous Anonymous said...

Latest WikiLeaks release shows how the CIA uses computer code to hide
the origins of its hacking attacks and ‘disguise them as Russian or
Chinese activity’



Computer genius - MicroJESTER discusses Botnet cheats . . .which cannot be stopped . . .these bot nets surge topics which trend https://twitter.com/WDFx2EU95

Friday, March 31, 2017 4:40:00 pm  
Anonymous Anonymous said...

OT: https://twitter.com/JamesOKeefeIII/status/847847554087780352

James O'Keefe tweets:
Someone just impersonated me to create a bogus @Project_Veritas PAC with the @FEC. @TheJusticeDept needs to start an immediate investigation

The correct place to donate to @Project_Veritas is by using this link, not to the fraudulent activity shown below: http://projectveritas.com/donate/

Friday, March 31, 2017 5:54:00 pm  
Blogger Pastorius said...

MicroMagicJingle is "Jester"?

Is that correct?

How do you know?

Friday, March 31, 2017 7:12:00 pm  

Post a Comment

Subscribe to Post Comments [Atom]

<< Home

Older Posts Newer Posts