Big Bother

Is your TV watching you?

https://www.nytimes.com/2017/03/07/world/europe/wikileaks-cia-hacking.html?_r=0

Not unless they can hack TVs from the 90s…

3 Likes

The only shocking thing about that Wikileak is that people are actually “Surprised or shocked”.

Anyone who wants to can see anything you type anywhere and at anytime.

Any #secondratewebdeveloper can do it.

Hell when even #3rdratemobileappsalesmen can hack US Government stuff as a demo during a powerpoint presentation, why is this even news?

It should be taken for granted FFS.

Dont write or send it if you dont want some other fucker to read it

(not necessarily the person you sent it to)

Although if you want to cause havoc in a company e-mail everybody at the same time slagging off a big boss because he is stupid.

1 Like

It amuses me that employees set up their own internal Whats App groups and then moan and b***ch about managers and the like.

And do it on Company mobile phones…

1 Like

So The CIA have spying tools and that gets people talking.

Yet everyone just shrugged off THESE

The Top 10 Data Thefts

1. 50 Millions Credit Cards Data Stolen from Home Depot’s System (2014)
In 2014 retailer Home Depot’s system was breached, exposing data from over 50 million credit cards.
The thieves used a vendor’s user name and password to get into the company’s computer network, then installed malware on its point-of-sale systems, which meant that consumers swiping their credit cards were literally handing over their data to the criminals.
In other words, people were buying physical items from a real life store, but at the same time they ended up giving their credit card data to hackers.

**2. Single Largest Theft of Customer Data (Citigroup, HSBCS, Dow Jones & Others) in 2014 **
In 2014 Bank JPMorgan Chase disclosed a massive breach that saw the data of 76 million households and 7 million small businesses compromised. Other U.S. financial institutions, brokerage firms, and financial news publishers were also targeted, including Citigroup, HSBC, Dow Jones and payroll service company ADP.

Three men, now under arrest and pending trial, had set up “hacking as a business model,” according to Preet Bharara, the United States attorney for the Southern District of New York. He called the breach: “The single largest theft of customer data from a U.S. financial institution ever.”
The charges allege that the men used the stolen information in pump-and-dump schemes, manipulating prices of stocks by sending fake e-mails to customers whose data was stolen, tricking them into investing then profiting by the rise in stock price. The three men also allegedly operated unlawful internet gambling sites, distributed counterfeit and malicious software and operated an illegal BitCoin exchange.

3. Yahoo Data Breach: Over 1,5 Billion Users Data Was Breached (2013 to 2016)
Yahoo! has been the target of at least two major breaches over the years. In September 2016, the company disclosed that it had a 2014 breach which led to the data of at least 500 million users being stolen. Then four months later it reported another breach had happened in August 2013 that exposed data of more than a billion Yahoo! users. The company did not explain why it took so long to report the breaches, which could land it in trouble with regulators.
The U.S. Securities & Exchange Commission issued guidance in 2011 that required companies to disclose material information about cyber incidents if they could impact investors. The agency is reportedly investigating the company.

4. In 2015, 79 Million Customer’s Data was Stolen from HealthCare Companies
The last three years have shown how vulnerable consumer health data can be as hackers increasingly target health insurance and medical information. In 2015, three healthcare companies – Anthem, Premera Blue Cross and CareFirst BlueCross BlueShield, were hacked. Anthem’s was the largest – exposing some 79 million customers’ data. Premera lost information on more than 11 million customers. Then CareFirst uncovered a breach that compromised the information of over a million customers. The U.S. government, which sometimes holds even more critical information than companies, has become a prospective targets.

5. Over 700,000 Social Security Numbers Were Stolen From IRS in 2015
In 2015, the U.S. Internal Revenue Service had a breach that exposed more than 700,000 Social Security numbers and other sensitive information. Published reports say the hackers took advantage of an online IRS program called “Get Transcript,” which allowed taxpayers to access their tax history. Even before the breach, identity thieves were using stolen Social Security numbers to fraudulently file for refunds. According to a report by the inspector general, in the 2016 tax season the IRS identified 42,148 tax returns with $227 million claimed in fraudulent refunds, and that was only as of early March of that year.

6. Largest Government Data Breach (2016) Due to Outdated Technology
Meanwhile, the U.S Office of Personnel Management (OPM) exposed records of as many as 21.5 million people, one of the largest breaches of government data in U.S. history. Information included Social Security numbers, names, dates and places of birth, health and financial details and even fingerprints of people who had been subjected to government background checks. A congressional report published in September 2016 said the government was using outdated technology that left its systems vulnerable. One of the hackers used a contractor’s credentials to log on, install malware and create a backdoor to the network.

7. Google Corporate Servers in China Were Hacked in 2009
In 2009, hackers accessed several of Google’s corporate servers in China, stealing intellectual property and other information. The company said it had “evidence to suggest that a primary goal of the attackers was accessing the Gmail accounts of Chinese human rights activists.”
Four years later, in 2013, U.S. government officials said the Chinese hackers had accessed a sensitive database that contained court orders authorizing surveillance, possibly of Chinese agents who had Gmail accounts. A Microsoft official suggested that Chinese hackers had targeted its servers at about the same time as Google’s, possibly seeking similar information about its email service.

8. North-Korea “supposedly” Hacked Sony Pictures and Stole Unreleased Movies
In 2014, hackers attacked the computer network of Sony Pictures, stealing employee e-mails, information on executive salaries and copies of unreleased movies. There was widespread speculation that the group was trying to disrupt release of the film, The Interview, a comedy depicting a plot to assassinate North Korean leader Kim Jong-un. The U.S. government blamed the North Korean government for the breach – the first time the U.S. government publicly accused a country of a cyber attack.

9. WikiLeaks: Sensitive Emails From Democratic National Committee (2016)
In July WikiLeaks published a series of emails taken from servers of the Democratic National Committee. The e-mails contained private correspondence, some of which derided the campaign of the Bernie Sanders, and sensitive financial data on high-profile donors to Hillary Clinton’s campaign.
The revelations prompted the resignation of the DNC’s chairperson and arguably impacted the U.S. election. U.S. intelligence agencies said they were confident that the Russian government was behind the hacks and even issued a report at the end of 2016 providing details on how the Russians allegedly carried out the exploit. Others, particularly new President Donald Trump, expressed doubt that Russia was responsible.

10. Biggest DDOS Attack That Took Down Twitter, PayPal, Netflix and Others (October, 2016)
2016 also marked the first time the so-called “Internet of Things” (IoT) was widely used in a cybercrime. In October, a cyberattack on one of the companies that host the internet’s Domain Name System, a directory of internet addresses, took down many of the internet’s most popular sites, including Twitter, Netflix, Paypal and Spotify.
The attack was of a common type, called a distributed denial of service (DDoS), which shuts down systems by bombarding them with too many requests at the same time. The unusual and alarming aspect, however, was that rather than using “zombie PCs,” where malware has been downloaded onto the PCs of unsuspecting consumers, making them into a sort of robot that can help to send all these requests, the attackers used common internet-connected things like baby monitors and digital recorders. The company, called Dyn, said the onslaught came from millions of internet addresses, making it one of the largest cyberattacks of all time.
Experts believe that as more things are connected to the internet, cybercrime is only going to get worse. Research firm Gartner forecasts that there will be 6.4 billion things connected to the internet by 2018. It predicts that by 2020 some 25 percent of known cyberattacks will involve the IoT.

Luckily I am not of a pay grade to qualify for a company mobile phone or laptop, and have to make do with the company provided desktop offshore. Which means I an not contactable by the company when I am on leave apart from my own personnel E-mail account. Which you dont have to monitor 24/7 so if I never received an e-mail to go back early its not my fault.

1 Like

I gotta get some glasses. I’m sure that first line read

PhilippineSaint posted this 2 minutes ago

Luckily I am not of a gay pride to qualify for …

2 Likes

What have you cunts got to hide? My life is Open Book. All my passwords are set to “password”, all my pin numbers are 1234. We invite inspection! You won’t find anything on me, copper!

The feds are prob looking at you bros, with ur 20 digit alphanumeric passcodes, ur incognito browsing, and ur closed bathroom doors and thinking, hmm. v.suspicious. Better red flag this bro, he is clearly upto Something.

1 Like

I have been filmed through my webcam and put on the internet on some bad sites. What can you do?

2 Likes

In the name of ALL that is Holy, do NOT post any links on here.

Ever.

3 Likes

Due to the nature of the company I work for myself and my Back to back (he works when I am not there) have to share a computer system so we get continuation of work. IT stipulate we have to change passwords every 28/56 days with so many different systems we have to log onto to complete our daily tasks we have a password and logon crib shit printed out weekly and stuck to the side of the desktop.

IT security came around and asked what is this?

Err a list of passwords.

you cant do that

Why

Somebody else might see them?

who Everybody onboard has been vetted they all have there own logins let me keep the passwords for more than 56 days then so I dont forget them

No we cant do that why dont you keep the spreadsheet on the desktop?

Because when I get logged out after every 20 mins of no key functions I have to log in so I need to keep them where I can actually see them.

Manbear who has never made a pub meeting speaks of life being open book.

Only on Sotonians :lou_smiley:

6 Likes

And another thing.

We all live in the cloud these days. In fact we’re pretty much dependent on it now.

Which means our “STUFF” is stored in the Cloud - which means stored in Data Centers.

But who OWNS Datacenters?

There seems to be an “INteresting” or chould that be “Worrying” consolidation in that industry - a lot of DC’s being sold to ever bigger groups.

So eventually we could end up with a few “Service Providers” storing our data.

Are we unwittingly about to get shafted? A new set of Mafia who demand huge fees (extortion) or they delete our data?

Hmmmm. I always imagined I’d be one of the last dinosaurs fighting migration to the cloud but now every photo I ever took on my phone is up there - photos of my life here in Dubai going back to the year dot is stored up there in fact I always viewed FB as being free storage of memories of me for family when I pop these clogs.

But Big Bother from Big Data Owning Monopolies as well as Big Brother.

(Link only for Geeks & Pap :wink: )

That’s what 3 terrabite hardrives are for storage of the stuff you do not want to lose

You should do what I do Phil and bury all old phones/laptops/cameras/memory cards/victims. Preferably in cement (surely there’s plenty of local building work going on out there).

Give future generations a challenge!

Let’s be honest there’s only so many photos of old duffers playing some game whilst wearing hideously garish clothing that you’d want to gaze at vacantly for a few seconds.

2 Likes

Yeah that’s what I thought.

Then we moved. I found the (old) back up drive. But can you believe NOBODY makes a cable for it now, had to get a family member to bid for one on eBay in UK.

It’s just the porn I need to keep some is nearly as old as me :lou_is_a_flirt:

And you can never have enough porn

I could look at some of them all day long

But luckily still haven’t worked out how to link those onto here without FB’ing them first

Pulling the strings…

![Image may contain: one or more people, people standing and outdoor](https://fb-s-a-a.akamaihd.net/h-ak-xtp1/v/t1.0-9/16508215_10155033900689452_7935959823858155106_n.jpg?oh=906e171daa515028410c2d5fc2d67518&oe=596F1C8F& gda =1499767204_1b0855dc66d8f41c909c71d2ee02dc8b)