|
|
|
|
This is where we'll remind you that the FCC has shown no interest whatsoever in investigating any of this. Similarly, when I contacted the agency to tell them someone else had written a fraudulent comment in my name supporting the attack on net neutrality, I was told there was simply nothing that could be done. Combined with the agency's apparently fabricated DDoS attack, there's more than a few indicators that the agency is eager to malign the integrity of the public feedback period in order to try and downplay the massive public backlash to its handout to the telecom industry. Since the FCC is expected to unveil its full plan ahead of Thanksgiving for what will likely be a vote right before Christmas, contacting your lawmakers on this subject remains of utmost importance. Should the FCC decide to ignore the public and dismantle the protections anyway, it seems more than likely that this recent necromancy will play a starring role in the inevitable lawsuits to come. |
|
|
|
|
cauz |
Nov. 1, 2017, 8:37 p.m. |
|
|
|
Shawn Fanning |
I think then, when we started receiving the first of the user feedback, feedback from people that I had not specifically told about it, but had spread from friend to friend and then they were giving us feedback. |
John Eisenhower |
Almost everything else I have done during my adult years has been affected to some extent by my name - by my father's position, if you will. But in the air, I had no name; to the Federal Aviation Agency I was simply Comanche Nine-Nine POP. The quality of my landings, navigation and judgment were mine alone. |
Shawn Fanning |
Well, user feedback was excellent. Even when the software didn't work at all, there were few people who were avid users, and there were people who were just sending excellent feedback and excellent ideas. |
Malcolm X |
The real names of our people were destroyed during slavery. The last name of my forefathers was taken from them when they were brought to America and made slaves, and then the name of the slave master was given, which we refuse, we reject that name today and refuse it. I never acknowledge it whatsoever. |
Marc Jacobs |
Whether it's an $11 flip-flop or a $2 key ring or a $2,000 dress, they're all done with integrity. They're all done with a design sense. As long as the creativity exists, then I don't think it's a sellout. A sellout is putting your name on any piece of crap and then expecting people to buy it because it's got your name on it. |
Chimamanda Ngozi Adichie |
It is easy to romanticize poverty, to see poor people as inherently lacking agency and will. It is easy to strip them of human dignity, to reduce them to objects of pity. This has never been clearer than in the view of Africa from the American media, in which we are shown poverty and conflicts without any context. |
Lisa Jakub |
If you have someone in your life that you are grateful for - someone to whom you want to write another heartfelt, slanted, misspelled thank you note - do it. Tell them they made you feel loved and supported. That they made you feel like you belonged somewhere and that you were not a freak. Tell them all of that. Tell them today. |
John Abbott |
I hate politics and what are considered their appropriate measures. I hate notoriety, public meetings, public speeches, caucuses and everything that I know of which is apparently the necessary incident of politics - except doing public work to the best of my ability. |
Robert Kiyosaki |
Critics only make you stronger. You have to look at what they are saying as feedback. Sometimes the feedback helps, and other times, it's just noise that can be a distraction. |
Zig Ziglar |
With integrity, you have nothing to fear, since you have nothing to hide. With integrity, you will do the right thing, so you will have no guilt. |
|
|
Dead People Mysteriously Support The FCC's Attack On Net Neutrality
We've noted for months how an unknown party has been using bots to bombard the FCC website with entirely bogus support for the agency's planned attack on net neutrality. Inquiries so far have indicated that whatever group or individual is behind the fake support used a bot that automatically pulled names -- in alphabetical order -- from a compromised database of some kind. Earlier this year one reporter actually managed to track down some of these folks -- who say they never filed such comments or in many instances had no idea what net neutrality even is. Earlier this year, some reporters discovered that some of the bigges...
|
|
|
|
Today I want to talk about a large DDOS attack that leveraged thousands of unsuspecting WordPress websites as indirect source amplification vectors.
Any WordPress site with Pingback enabled (which is on by default) can be used in DDOS attacks against other sites. Note that XMLRPC is used for pingbacks, trackbacks, remote access via mobile devices and many other features you?re likely very fond of. But, it can also be heavily misused like what we are seeing.
The story
...
This post is a comment.
|
|
|
|
To perform a man-on-the-side attack, the NSA observes a target?s Internet traffic using its global network of covert ?accesses? to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency?s surveillance sensors alert the TURBINE system, which then ?shoots? data packets at the targeted computer?s IP address within a fraction of a second.
In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target?s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the ...
This post is a comment.
|
|
|
|
SPs Won't Promise To Treat All Traffic Equally After Net Neutrality
An anonymous reader writes: The FCC voted to put an end to net neutrality, giving internet providers free rein to deliver service at their own discretion. There's really only one condition here: internet providers will have to disclose their policies regarding "network management practices, performance, and commercial terms." So if ISPs want to block websites, throttle your connection, or charge certain websites more, they'll have to admit it. We're still too far out to know exactly what disclosures all the big ISPs are going to make -- the rules (or lack thereof) don't actually go into effect for another few months -- bu...
|
|
|
|
Basic decade-old encryption technology is finally coming to Pentagon email servers next year.
For years, major online email providers such as Google and Microsoft have used encryption to protect your emails as they travel across the internet.
That technology, technically known as STARTTLS, isn't a cutting edge developmentāit's been around since 2002. But since that time the Pentagon never implemented it. As a Motherboard investigation revealed in 2015, the lack of encryption potentially left some soldiers' emails open to being intercepted by enemies as they travel across the internet. The U...
|
|
|
|
Cyber attack spreads across 74 countries; some UK hospitals crippled
Cyber attacks that hit 74 countries across Europe and Asia Friday, impacting the public health system in Britain, apparently involved a leaked hacking tool from the National Security Agency.
The attack used ransomware, which is malware that encrypts data and locks a user from their data until they pay a ransom. The tool, which was leaked by a group known as Shadow Brokers, had been stolen from the N.S.A. as part of a wide swath of tools illegally released in 2016. ...
|
|
|
|
Sweden Accidentally Leaks Personal Details of Nearly All Citizens
Another day, Another data breach! This time sensitive and personal data of millions of transporters in Sweden, along with the nation's military secrets, have been exposed, putting every individual's as well as national security at risk. Who exposed the sensitive data? The Swedish government itself. Swedish media is reporting of a massive data breach in the Swedish Transport Agency (Transportstyrelsen) after the agency mishandled...
|
|
|
|
California DMV Changes Rules To Allow Testing and Use of Fully Autonomous Vehicles msmash 3 hours ago 35 The California Department of Motor Vehicles is changing its rules to allow companies to test autonomous vehicles without a driver behind the wheel -- and to let the public use autonomous vehicles. From a report: The DMV released a revised version of its regulations and has started a 15-day public comment period, ending October 25, 2017. California law requires the DMV to work on regulations to cover testing and public use of autonomous vehicles, and the regulator said that this is the first step. "We are excited to take the next step in furthering the development of this potentially life-saving technology in California," the state's Transportation Secretary, Brian Kelly, said in a stat...
|
|
|
|
US Says North Korea 'Directly Responsible' For WannaCry Ransomware Attack
The White House has publicly blamed North Korea for a ransomware attack in May that locked more than 300,000 computers in 150 countries. From a report: In an opinion piece published in The Wall Street Journal on Monday, Homeland security adviser Tom Bossert writes that after careful investigation, Washington can say that Pyongyang is "directly responsible" for the WannaCry virus. Bossert called the attack in which victims received ransom demands to unlock their computers "cowardly, costly and careless." "The consequences and repercussions of WannaCry were beyond economic," he wrote. "The malicious software hit compu...
|
|
|
|
HealthCare.gov Portal Suffers Data Breach Exposing 75,000 Customers
Sensitive information belonging to roughly 75,000 individuals was exposed after a government healthcare sign-up system got hacked, the Centers for Medicare & Medicaid Services (CMS) said on Friday. The agency said that "anomalous system activity" was detected last week in the Direct Enrollment system, which Americans use to enroll in healthcare plans via the insurance exchange established under the Affordable Care Act -- also known as Obamacare. A breach was declared on Wednesday. It's unclear why the agency, which is part of the U.S. Department of Health and Human Services, chose to not announce the incident sooner. Officials said the hacked portal is used by insurance agents and brokers to help Americans sign up for c...
|
|