Reliable Answers - News and Commentary

Virus Information News

How To Master CSS

How To Master CSS

"With How To Master CSS, you'll discover how to read stylesheets, how to recognise the best solution and how to translate a graphical design to a real website, simply by watching my fun and sophisticated training videos. Hundreds of people, just like you, worldwide have used my unique multimedia course to fast-track their Stylesheet learning, while having piles of fun in the process. Will you be next?"

It doesn't matter what level you are at now (beginner or intermediate), How to Master CSS is packed full of quality step-by-step lessons, video files, an editor and other resources to get YOU results fast!

      
 Title   Date   Author   Host 

xrepublic.tv

August 2, 2013

Justin Amash Argues With AIPAC Stooge Over NSA Spying

news.cnet.com

by Declan McCullagh

August 2, 2013

CNET has learned the FBI has developed custom "port reader" software to intercept Internet metadata in real time. And, in some cases, it wants to force Internet providers to use the software.

The U.S. government is quietly pressuring telecommunications providers to install eavesdropping technology deep inside companies' internal networks to facilitate surveillance efforts. FBI officials have been sparring with carriers, a process that has on occasion included threats of contempt of court, in a bid to deploy government-provided software capable of intercepting and analyzing entire communications streams. The FBI's legal position during these discussions is that the software's real-time interception of metadata is authorized under the Patriot Act. Attempts by the FBI to install what it internally refers to as "port reader" software, which have not been previously disclosed, were described to CNET in interviews over the last few weeks. One former government official said the software used to be known internally as the "harvesting program."

money.cnn.com

by Erica Fink and Laurie Segall

August 1, 2013

A flaw in Samsung Smart TVs was discovered that could allow hackers to control the camera and watch users in their living rooms.

Today's high-end televisions are almost all equipped with "smart" PC-like features, including Internet connectivity, apps, microphones and cameras. But a recently discovered security hole in some Samsung Smart TVs shows that many of those bells and whistles aren't ready for prime time. The flaws in Samsung Smart TVs, which have now been patched, enabled hackers to remotely turn on the TVs' built-in cameras without leaving any trace of it on the screen. While you're watching TV, a hacker anywhere around the world could have been watching you. Hackers also could have easily rerouted an unsuspecting user to a malicious website to steal bank account information.

theguardian.com

by Glenn Greenwald

August 1, 2013

XKeyscore gives 'widest-reaching' collection of online data, NSA analysts require no prior authorization for searches, Sweeps up emails, social media activity and browsing history

A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight.

theatlanticwire.com

by Philip Bump

August 1, 2013

Michele Catalano was looking for information online about pressure cookers. Her husband, in the same time frame, was Googling backpacks. Wednesday morning, six men from a joint terrorism task force showed up at their house to see if they were terrorists.

The Suffolk County Police Department released a statement this evening that answers the great mystery of the day. Suffolk County Criminal Intelligence Detectives received a tip from a Bay Shore based computer company regarding suspicious computer searches conducted by a recently released employee. The former employee's computer searches took place on this employee's workplace computer. On that computer, the employee searched the terms "pressure cooker bombs" and "backpacks." After interviewing the company representatives, Suffolk County Police Detectives visited the subject's home to ask about the suspicious internet searches. The incident was investigated by Suffolk County Police Department's Criminal Intelligence Detectives and was determined to be non-criminal in nature.

dailytexanonline.com

by Tucker Whatley

August 1, 2013

A team of UT researchers took control of the GPS navigation system of a yacht in the Mediterranean Sea in June without detection, causing it to veer off-course, in the process of developing anti-spoofing technology.

A group of graduate students under the guidance of aerospace engineering professor Todd Humphreys conducted this experiment to demonstrate the danger to vessels caused by "spoofing," an electronic attack on a GPS system that tricks it into receiving a attacking signal. According to the researchers, spoofing attacks can be used to cause target ships to become lost, drift into territorial waters of an unfriendly state or even run aground in shallow waters. "What's most sinister is that the victim ship can hardly tell it's being spoofed," Humphreys said. "So it's all the dangers you would expect from being led off course without your knowing."

businessinsider.com

July 31, 2013

Hackers pulls a William Wallace on NSA director, then calls bulls*** on him.

While Army Gen. Keith Alexander, the head of the National Security Agency, was barred from this year's DefCon hacker conference, Black Hat hacker conference welcomed him with open arms. Well, not everybody at the conference did. One hacker in particular, felt the need to interrupt Alexander's Wednesday morning presentation.

rt.com

July 31, 2013

The world is witnessing the creation of a new world order that involves the security state apparatus as an overwhelming force, Julian Assange said during his speech at OHM2013 Observe, Hack, Make conference.

"We are seeing the doubling of the power of the national security agency every four years," Assange said, adding that even some experts might not have "enough perspective about what is going on." Through the ever increasing networking, people are voluntary sharing their personal data and doing the work of the NSA for free, Assange stated. The recent revelation by the NSA whistleblower Edward Snowden confirmed that the security agency's operators are actually one click away from gaining access to any of billions of emails, online chats, or site visit histories without any proper justification of the request.

cnn.com

by Amanda Wills

July 31, 2013

You've never heard of XKeyscore, but it definitely knows you.

The National Security Agency's top-secret program essentially makes available everything you've ever done on the Internet - browsing history, searches, content of your emails, online chats, even your metadata - all at the tap of the keyboard. The Guardian exposed the program on Wednesday in a follow-up piece to its groundbreaking report on the NSA's surveillance practices. Shortly after publication, Edward Snowden, a 29-year-old former Booz Allen Hamilton employee who worked for the NSA for four years, came forward as the source.

techcrunch.com

by John Biggs

July 31, 2013

Further leaks have revealed an NSA project called XKeyscore that, with a few keystrokes, can give a data analyst access to nearly everything a user does on the Internet - from chat sessions to email to browsing habits.

The system requires an email because many behaviors online are completely anonymous and it is only via some sort of identifier - a username and domain - that the system can scour the database of collected Internet traffic and metadata. As Snowden said to the Guardian on June 10, "I, sitting at my desk could wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email." XKeyscore is how it is done.

      

Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.

Carschooling by Diane Flynn Keith
Carschooling

Take me to the top

We invite you
to visit:

Professional Web Hosting and Design Services: 12 Point Design Local Homeschool provides the most up-to-date support group listings in a geographical and searchable index Budget Homeschool Kidjacked -- To seize control of a child, by use of force SaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security Reliable Answers - developer information, current news, human interest and legislative news Twain Harte Times - Twain Harte, CA - The closest you can get to Heaven on Earth Cranial Laser & Neurolymphatic Release Techniques (CLNRT) - Experience dramatic pain reduction At Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling pain Visit UniveralPreschool.com to learn about your preschool options.
Reliable Answers.com/virus/news.asp
Google