Security online (Page 2)

Aura_
Aura_: How would google make money off that?
4 years ago Report
0
Aura_
Aura_: Look, before it get's to identify individuals, it still has some way to go to identify humans...
http://recode.net/2015/06/30/machine-learning-is-hard-google-photos-has-egregious-facial-recognition-error/

4 years ago Report
0
lori100
lori100: I don't think they get money from the public...but it has been said the CIA has their own building on the Microsoft campus....they would be using it...
4 years ago Report
0
Undude
Undude: people are so afraid of technology still gebus
4 years ago Report
0
lori100
lori100: ...there are reasons...
4 years ago Report
0
Aura_
Aura_: No that would be NSA concerned with in-america spying. CIA is for outside of American borders.
4 years ago Report
1
Undude
Undude: thats not logical to be afraid its logical to be reasonably informed and cautious.
4 years ago Report
0
lori100
lori100: Malware Wars: Software Vendor Claims CIA and NSA ...

www.infowars.com/malware-wars-software-vendor-claims-cia...

Alex Jones

Jun 20, 2012 - Although the NSA has worked with Microsoft in the past, Hypponen ... collaborated with the NSA and the CIA to exploit their own operating system. ... with Microsoft to build a backdoor for intelligence purposes in its software.--------------------and the CIA has been involved with crimes on U.S. citizens...
4 years ago Report
0
Undude
Undude: dont forget your tinfoil hat
4 years ago Report
0
lori100
lori100: thats not logical ---Spock...is that you?
4 years ago Report
0
lori100
lori100: see my CIA thread and learn...
4 years ago Report
0
Aura_
4 years ago Report
0
Undude
Undude: My dad works in computers as a CCIE in computer security i know you dont know what that is. But he doesn't allow us to stay in the dark tech wise so i think im good
4 years ago Report
0
lori100
lori100: ^^^above article---------www.infowars.com/malware-wars-software-vendor-claims-cia...------
According to Mikko Hypponen, chief research officer of antivirus and security software vendor F-Secure, U.S. intelligence infiltrated Microsoft’s core Windows and application development programming teams in order to spread the Stuxnet, Dugu, and Flame viruses.---------------“The announcement that links Flame to Stuxnet and the conclusive proof that Stuxnet was a US tool means that Flame is also linked to the US government,” Hypponen told PC Pro last week.


“This makes you think that this breach of Microsoft’s update system was done by the Americans and most likely a US agency, someone like the NSA,” Hypponen said. “That must make Microsoft mad as hell that its most critical system, used by 900 million of its customers, was breached by fellow Americans.”

Although the NSA has worked with Microsoft in the past, Hypponen does not believe the software giant collaborated with the NSA and the CIA to exploit their own operating system.

“I don’t think Microsoft was in on it, that it was helping the US government and I don’t believe that because it looks very bad for Microsoft. I find it very hard to believe that Microsoft’s top management would have approved that,” he said.
-------------------“It’s plausible that if there is an operation under way and being run by a US intelligence agency it would make perfect sense for them to plant moles inside Microsoft to assist in pulling it off, just as they would in any other undercover operation. It’s not certain, but it would be common sense to expect they would do that.”

In 2003, it was speculated that the CIA had worked with Microsoft to build a backdoor for intelligence purposes in its software. In 2009, the NSA and the Defense Department worked with Microsoft on Windows 7 security measures.

“The key problem is that NSA has a dual mission,” Marc Rotenberg, the executive director of the Electronics Privacy Information Center, said at the time.

Following the revelation that the NSA was illegally collecting vast amounts of data on American citizens via the internet, Michael McConnell, then Director of National Intelligence, said the U.S. government should have unlimited and warrantless access to U.S. citizens’ Google search histories, private emails and file transfers.

Earlier this week it was reported that the U.S. and Israel collaborated on the sophisticated Flame virus which they unleashed on Iran’s oil industry and its nuclear program. Experts now believe Flame was built by the “same nation-state responsible for the Stuxnet virus that targeted Iran’s nuclear power plant in 2010. Many suspect Stuxnet was the work of Israeli intelligence,” Fox News reported.

The CIA, the NSA and the Office of the Director of National Intelligence, as well as the Israeli Embassy in Washington, declined to comment.

Kaspersky Lab researchers discovered a link between the two viruses earlier this month. Both take advantage of infected machines by exploiting a Windows flaw to launch the “autorun” feature.
(Edited by lori100)
4 years ago Report
1
Undude
Undude: so you can copy and paste old articles about things from five years ago
4 years ago Report
0
lori100
lori100: it shows the CIA and NSA have their own agenda....
4 years ago Report
1
Undude
4 years ago Report
0
lori100
lori100: wow...nice pic Joey...I take it all back...you were right , I was wrong...lol
4 years ago Report
1
Undude
Undude: LOL
4 years ago Report
1
DEEP dysphoria
DEEP dysphoria: and, so... i update my resident av, never click on the top 3 search results and use as modified hosts file from mvps.org to block all those pesky and possibly dangerous advertisements, links and other possibly malevolent websites. and if im getting frisky, i use linux live
3 years ago Report
0
Metaphorguy
Metaphorguy: I install firewall, anti-virus and get all the latest security updates from Microsoft. If I'm buying something online I use https protocol. If a pop-up window tries to install software I decline immediately.
3 years ago Report
0
DarkKnightbc
DarkKnightbc: Another place full of "experts"
3 years ago Report
0
Metaphorguy
Metaphorguy: ^ I sense (through the force) you are being sarcastic. For extra security, I run the entire internet through a proxy server, resetting my IP address every 10 minutes in case I accidentally see a malicious ad, or someone talks to me online about Islam. I run Linux to avoid getting any viruses. It's so much fun to compile your own GUI-desktop because of low-compatibility with many computers. When sending e-mail I use a 1,024-bit encryption with both secret pass and key unavailable to anyone except me and intended recipient in case the C.I.A. (cholo intelligence ant) or F.B.I. (federal box of italicizing) tries to intercept my response to holiday shopping ads. I run the entire rig on battery power, in case the Illuminati-communist government (i.e. electric company) tries to short circuit my unit. I have a backup-generator for when nuclear fallout occurs after the corpse of VP John C. Calhoun bans the 2nd amendment and utters the code-word for the anti-Christ to take over. Last, but not least my entire rig is inside an advanced security fortress that won't be available to the most restricted areas on the planet until the 22nd century. Watch dogs, hologram decoys, invisible cloak hiding the facility in plain-sight, 26-hr video cameras mounted with laser gun turrets, cyborg guards equipped with thermal vision/infrared/ and night vision goggles, the facility is floating in the stratosphere 1,000 meters above the earth's crust, and other secrets which I shall not reveal.
(Edited by Metaphorguy)
3 years ago Report
2
new_tauresa
new_tauresa: i skyped with someone in wite who procedded to tell me the aea of the city where i live, he said he traced me by putting my ip address in an available software. He wanted to let me know how easily i could be traced. I thought this was super weird for a guy to want to tell a woman here, as if wanting to scare her. How much else can be found out for free with regards to skype or any other social media medium. thanks
3 years ago Report
0
Geoff 
Geoff: That varies a lot depending on many factors (country of residence, ISP, device, etc). Although in many cases it's done using educated guesses, and a little psychological trickery.

It also depends how seriously police in your jurisdiction take such invasions of privacy.
3 years ago Report
0