SaferPC.info

Virus Information News

     
 Title   Date   Author   Host 

Global Warming Lefties Commit Identity Theft to Target Conservative Think Tank
Big Journalism
by Ben Shapiro
February 17, 2012

Wednesday, two left-wing blogs posted confidential information supposedly obtained from the Heartland Institute, a free-market, non-profit think tank with a particular focus on battling global warming hysteria.

They posted supposed donor information, inside financials, and even a "confidential memo" on the Institute's climate strategy - which is a "complete fake," according to a statement from The Heartland Institute.

'Anonymous' Leaks Assad Emails; ABC Interview Tips Exposed: "American Psyche Easily Manipulated; Prey On Liberal Guilt"
Big Journalism
by Liberty Chick
February 13, 2012

Sheherazad Ja'Afari, a U.N. based press attache in New York for the Syrian mission to the UN, exposes more about the American media and its capacity to be influenced by 'liberal guilt' in one email than conservative news sites could accomplish in a year.

Last night, hackers associated with the loose collective 'Anonymous' leaked the emails from the inboxes of 78 staffers from the mail server of the Syrian Ministry of Presidential Affairs, revealing some interesting observations about the American media.

US Sen. Paul: Ebola "incredibly" contagious
bigstory.ap.org
by Kathleen Ronayne
October 21, 2014

U.S. Sen. Rand Paul of Kentucky told a group of college students Wednesday the deadly virus Ebola can spread from a person who has the disease to someone standing three feet away and said the White House should be honest about that.

Paul, a doctor and potential GOP presidential contender, made his comments during a stop at Plymouth State University in New Hampshire Wednesday. In his remarks, he called Ebola "incredibly contagious" and suggested it could spread at a cocktail party attended by someone who is symptomatic, according to CNN video footage.

If You Click A Facebook "Like" Button, The Page Owner Can Spam You
bingocardcreator.com
by Patrick McKenzie
August 30, 2010

Facebook sometimes makes very curious decisions with respect to user privacy. Recently, one of them came to my attention, and it is so comprehensively wrong that I had to put up a PSA about it.

US Military May Consider You a Potential Terrorist If You Question Mainstream Ideologies
blog.alexanderhiggins.com
October 3, 2012

Wired magazine has obtained an outrageous US military document revealing people are being considered terrorist for all kinds of normal activities.

These are some warning signs that that you have turned into a terrorist who will soon kill your co-workers, according to the U.S. military. You've recently changed your "choices in entertainment." You have "peculiar discussions." You "complain about bias," you're "socially withdrawn" and you're frustrated with "mainstream ideologies." Your "Risk Factors for Radicalization" include "Social Networks" and "Youth."

U.S. Caught Creating Three New Cyberwar Viruses
blog.alexanderhiggins.com
September 19, 2012

In about of Orwellian double speaks the Obama administration touts cybersecurity while using it as cover to conduct cyber warfare.

As computer technology experts continue to be amazed and perplexed by the series of cyber espionage masterpieces which include Stuxnet, Flame and DuQu researchers have discovered three more malicious viruses being used in the United States cyber warfare arsenal. Researchers hope the discovery of the three new malware packages code-named SP, SPE and IP being used to communicate with a vast cyberwarfare infrastructure will help provide additional clues in hunting down the source of this malware.

Apple Granted Patent For Third-Party iPhone Kill Switch
blog.alexanderhiggins.com
September 17, 2012

A new Apple patent gives third parties the ability to disable data transmissions, cameras, and other features such as video and audio recording on iPhones.

A new patent granted to Apple will give third parties the complete ability to control the functionality of iPhones as they set fit. The patent specifies several use cases which will ultimately give the government, companies and organizations complete control over controlling the abilities of your iPhone. For example, when you bring your iPhone near a move theater they can set up policies to disable disable any features the create light or sound as well as disable recording functionality. Another use case specified in the patent is policies at academic institutions such as schools and colleges to completely disable data transmissions.

Obama Preparing To Seize Internet With CISPA Based Executive Order
blog.alexanderhiggins.com
by Alexander Higgins
September 9, 2012

President Obama is circulating draft legislation of CISPA legislation he will sign into law through executive order after Congress failed to pass it.

When the US congress tried to push legislation into effect to protect America's so-called critical infrastructure from the imminent threat of a doomsday cyberattack it was meant with such a huge public outcry and protest Congress couldn't enact it. Why? Well it didn't take a genius to look at the legislation and realize it did next to nothing to in regards to actually protecting America from a cyberattack but instead open a Pandora's box which essentially allowed companies that send your data across the internet to send all of that data to Uncle Sam. The legislation was written to give the government and participating companies immunity from any lawsuits or criminal charges for illegal activities they participate in the name of cybersecurity. In short the bill was nothing more than a complete suspension of the constitutional protections against illegal search in seizure.

BitTorrent Forced To Allow Feds To Secretly Monitor Traffic
blog.alexanderhiggins.com
by Monitoring Torrent Traffic It Is Not Unreasonable to Assume the Government Has Created A List of All Users Who Downloaded Or Shared the Top Secret Government Documents.
September 6, 2012

Researchers reveal shady companies, some yet to be identified, are secretly monitoring users and BitTorrent does not apply peer-blocking rules to these firms.

At least 10 companies are covertly monitoring the online traffic of the popular Bit Torrent peer to peer traffic sharing software researchers from the University of Birmingham have revealed. The researchers have learned several of the companies are government copyright enforcement agencies but their inability to identify several of the companies could mean that more sinister government monitoring is occurring. The researchers also revealed the Bit Torrent software is not allowing manually created block lists to be applied to the companies conducting the secret surveillance.

Hackers Find 12 Million Apple Users Personal Data On FBI Laptop
blog.alexanderhiggins.com
by Alexander Higgins
September 5, 2012

Hackers who got inside and FBI laptop found the personal data of over 12 million users including addresses, phone numbers and Unique Device Identifiers (UDID).

The Hacker Group Anonymous Hacked into the laptop of an FBI agent and found a massive cache of personal information: "This is just lovely. So apparently several hacker activist groups got into FBI agent Christopher Stangl's laptop and found - A list of 12,367,232 Apple iOS devices including Unique Device Identifiers (UDID), user names, name of device, type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, etc."

     

Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.

Shawn K. Hall © 2003-2022 Powered by 12 Point Design
Professional Web Hosting and Design Services: 12 Point DesignAt Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling painReliable Answers - developer information, current news, human interest and legislative newsLocal Homeschool provides the most up-to-date support group listings in a geographical and searchable indexTwain Harte, CA - The closest you can get to Heaven on EarthSaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security
Google

AddThis Social Bookmark Button