My 9 Tips To Cut Down On Exposure To Computer Radiation

My 9 Tips To Cut Down On Exposure To Computer Radiation:

Who doesn’t use a computer today? I happily live without a cell phone but I’d find it very hard to get by without using a computer – especially for writing this blog!

But computers are not as harmless as they might seem.

All computers emit radiation or electromagnetic fields (EMFs) on many different frequencies. These EMFs can be extremely harmful to your health. Cancer and other serious diseases have been linked to these exposures – studies indicate pregnant women and small children are particularly vulnerable.

In this article I explain what you can do to minimize your exposure to these harmful EMFs.

H/t reader kevn a.

* * *

PayPal: Donate in USD
PayPal: Donate in EUR
PayPal: Donate in GBP

The “Meltdown” Story: How A Researcher Discovered The “Worst” Flaw In Intel History

The “Meltdown” Story: How A Researcher Discovered The “Worst” Flaw In Intel History:

Daniel Gruss didn’t sleep much the night he hacked his own computer and exposed a flaw in most of the chips made in the past two decades by hardware giant Intel, something we discussed in “Why The Implications Of The Intel “Bug” Are Staggering.” And as Reuters describes in fascinating detail, the 31-year-old information security researcher and post-doctoral fellow at Austria’s Graz Technical University had just breached the inner sanctum of his computer’s CPU and stolen secrets from it.

Until that moment, Gruss and colleagues Moritz Lipp and Michael Schwarz had thought such an attack on the processor’s ‘kernel’ memory, which is meant to be inaccessible to users, was only theoretically possible.

“When I saw my private website addresses from Firefox being dumped by the tool I wrote, I was really shocked,” Gruss told Reuters in an email interview, describing how he had unlocked personal data that should be secured.
Gruss, Lipp and Schwarz, working from their homes on a weekend in early December, messaged each other furiously to verify the result.

“We sat for hours in disbelief until we eliminated any possibility that this result was wrong,” said Gruss, whose mind kept racing even after powering down his computer, so he barely caught a wink of sleep.

Gruss and his colleagues had just confirmed the existence of what he regards as “one of the worst CPU bugs ever found”.

The flaw, now named Meltdown, was revealed on Wednesday and affects most processors manufactured by Intel since 1995.

Read moreThe “Meltdown” Story: How A Researcher Discovered The “Worst” Flaw In Intel History

Apple Says All iPhones, Macs Exposed To “Meltdown”, “Spectre” Flaws

Apple Says All iPhones, Macs Exposed To “Meltdown”, “Spectre” Flaws:

All Mac iOS devices and systems are exposed and vulnerable to the recently discovered chip bugs known as Spectre and Meltdown, Apple confirmed on Thursday. The flaws, which as we discussed before, allow hackers unauthorized access to a computer’s memory and sensitive data, were discovered by security researchers at Google Project Zero on Wednesday. Security vulnerabilities called Meltdown and Spectre affect almost all modern CPUs, including those produced by Intel, AMD and ARM Holdings.

All Mac systems and iOS devices are affected,” Apple acknowledged in a statement on Thursday, adding that no cases had yet been reported of customers being affected by the security flaws.

Read moreApple Says All iPhones, Macs Exposed To “Meltdown”, “Spectre” Flaws

Pro tip: You can log into macOS High Sierra as root with no password

Pro tip: You can log into macOS High Sierra as root with no password:

Apple, this is Windows 95 bad – but there is a workaround to kill the bug

Updated A trivial-to-exploit flaw in macOS High Sierra, aka macOS 10.13, allows users to gain admin rights, or log in as root, without a password.

The security bug can be triggered via the authentication dialog box in Apple’s operating system, which prompts you for an administrator’s username and password when you need to do stuff like configure privacy and network settings.

If you type in “root” as the username, leave the password box blank, hit “enter” and then click on unlock a few times, the prompt disappears and, congrats, you now have admin rights. You can do this from the user login screen, too.

Read morePro tip: You can log into macOS High Sierra as root with no password

WikiLeaks: CIA wrote code ‘to impersonate’ Russia’s Kaspersky Lab anti-virus company

CIA wrote code ‘to impersonate’ Russia’s Kaspersky Lab anti-virus company, WikiLeaks says:

WikiLeaks says it has published the source code for the CIA hacking tool ‘Hive,’ which indicates that the agency-operated malware could mask itself under fake certificates and impersonate public companies, namely Russian cybersecurity firm Kaspersky Lab.

The CIA multi-platform hacking suite ‘Hive’ was able to impersonate existing entities to conceal suspicious traffic from the user being spied on, the source code of the malicious program indicates, WikiLeaks said on Thursday.

The extraction of information would therefore be misattributed to an impersonated company, and at least three examples in the code show that Hive is able to impersonate Russian cybersecurity company Kaspersky Lab, WikiLeaks stated.

Read moreWikiLeaks: CIA wrote code ‘to impersonate’ Russia’s Kaspersky Lab anti-virus company

New Stealthy Cyberattack Could Dwarf Last Week’s Global Worm Epidemic, Uses Infected Computers To Mine Virtual Currency

“It’s Much Bigger Than WannaCry”: New Stealthy Cyberattack Could Dwarf Last Week’s Global Worm Epidemic:

Another large-scale, stealthy cyberattack is underway on a scale that could dwarf last week’s assault on computers worldwide, a global cybersecurity firm told AFP on Wednesday. Rather than freeze files demanding a ransom, Adylkuzz uses infected computers to mine virtual currency…“As it is silent and doesn’t trouble the user, the Adylkuzz attack is much more profitable for the cyber criminals.”

* * *

PayPal: Donate in USD
PayPal: Donate in EUR
PayPal: Donate in GBP

Same place, same computer memory, 58 years later (PIC)

Same place, same computer memory, 58 years later (PIC):

comp-c-c-565x565

I was just in Target where I saw I could buy a 1 TERABYTE XBox 1 for $300. $300!

This is the beauty of innovation, and competition, and capitalism. Do you think the Soviet Union would ever have come up with a 1 terabyte personal computer? Never mind at a cost that most middle class families can manage? No, ahem, way.

You socialists are nuts (I say respectfully.) Now, if you’ll excuse me I’m going to go spend some time in my custom holodeck.

Click here for the Reddit thread associated with the above photo.

* * *

PayPal: Donate in USD
PayPal: Donate in EUR
PayPal: Donate in GBP

Obama’s New Executive Order Says the US Must Build an Exascale Supercomputer

Skynet


Obama’s New Executive Order Says the US Must Build an Exascale Supercomputer (Vice/Motherboard, July 29, 2015):

President Obama has established a new initiative across multiple government agencies that will focus entirely on creating the fastest supercomputers ever devised. The National Strategic Computing Initiative will attempt to build the first ever exascale computer, which would be more than 30 times faster than today’s fastest supercomputer, according to an executive order issued Wednesday.

The initiative will primarily be a partnership between the Department of Energy, Department of Defense, and National Science Foundation, which will be designing supercomputers primarily for use by NASA, the FBI, the National Institutes of Health, the Department of Homeland Security, and NOAA. Each of those agencies will be allowed to provide input during the early stages of the development of these new computers.

The primary task of the initiative is “accelerating delivery of a capable exascale computing system,” the order said. For context, it is believed that an exascale computer might be capable of mimicking the human brain, something impossible with current technology.

As of June, the fastest supercomputer in the world is China’s Tianhe-2, a computer that runs at 33.86 petaflops, which means it can perform 33.86 quadrillion floating point operations per second. The US has the second fastest supercomputer, a machine at the Oak Ridge National Laboratory that runs at 17.6 petaflops. Earlier this year, Intel and Cray won a $200 million contract from the federal government to build a 180-petaflops computer by 2018.

Read moreObama’s New Executive Order Says the US Must Build an Exascale Supercomputer

“We Messed Up Badly” Lenovo Admits Putting Tracking Software On Your PC

“We Messed Up Badly” Lenovo Admits Putting Tracking Software On Your PC (ZeroHedge, Feb 20, 2015):

Meet SuperFish – Lenovo’s, the world’s largest computer manufacturer, pre-installed, image recognizing tracking software that monitors everything you do, and breaches web security… all for the purpose of pushing more ads in your face. After its initial approach of being completely unapologetic and dismissal, Lenovo is now groveling for forgiveness. The company’s Chief Technology Officer now says, “We messed up badly here,” and “We made a mistake.”

Russian researchers expose breakthrough U.S. spying program

Related info:

Intel’s New Mobile Chips Are Always Listening

Russia To Swap Intel-AMD Processors For Local Technology

First Cisco And Microsoft, Now IBM: China Orders Banks To Remove High-End IBM Servers


nsa-321

Russian researchers expose breakthrough U.S. spying program (Reuters, Feb 16, 2015):

The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world’s computers, according to cyber researchers and former operatives.

That long-sought and closely guarded ability was part of a cluster of spying programs discovered by Kaspersky Lab, the Moscow-based security software maker that has exposed a series of Western cyberespionage operations.

Kaspersky said it found personal computers in 30 countries infected with one or more of the spying programs, with the most infections seen in Iran, followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria. The targets included government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists, Kaspersky said. (reut.rs/1L5knm0)

Read moreRussian researchers expose breakthrough U.S. spying program

Microsoft Finally Fixes 19-Year-Old Bug Present In Every Version Of Windows From Windows 95 Onwards, Allowing A Remote User To Take Over And Control A Computer

Microsoft finally fixes 19-year-old ‘rare, unicorn like’ bug (RT, Nov 12, 2014):

The Microsoft Corporation has finally sorted out a bug that has plagued its Windows operating system undetected for the last 19 years.

The bug was present in every version of Microsoft Windows from Windows 95 onwards, and allows a remote user to take over and control a computer.

Read moreMicrosoft Finally Fixes 19-Year-Old Bug Present In Every Version Of Windows From Windows 95 Onwards, Allowing A Remote User To Take Over And Control A Computer

New ‘Bash’ Software Bug May Pose Bigger Threat Than ‘Heartbleed’

New ‘Bash’ software bug may pose bigger threat than ‘Heartbleed’ (Reuters, Sep 24, 2014):

A newly discovered security bug in a widely used piece of Linux software, known as “Bash,” could pose a bigger threat to computer users than the “Heartbleed” bug that surfaced in April, cyber experts warned on Wednesday.

Bash is the software used to control the command prompt on many Unix computers. Hackers can exploit a bug in Bash to take complete control of a targeted system, security experts said.

Read moreNew ‘Bash’ Software Bug May Pose Bigger Threat Than ‘Heartbleed’

Intel’s New Mobile Chips Are Always Listening

“Hello, Computer” – Intel’s New Mobile Chips Are Always Listening (MIT Technology Review, Sep 5, 2014):

Tablets and laptops coming later this year will be able to constantly listen for voice commands thanks to new chips from Intel.

A new line of mobile chips unveiled by Intel today makes it possible to wake up a laptop or tablet simply by saying “Hello, computer.” Once it has been awoken, the computer can operate as a voice-controlled virtual assistant. You might call out “Hello, computer, what is the weather forecast today?” while getting out of bed.

Tablets and lightweight laptops based on the new Core M line of chips will go on sale at the end of this year. They can constantly listen for voice instructions thanks to a component known as a digital signal processor core that’s dedicated to processing audio with high efficiency and minimal power use.

Read moreIntel’s New Mobile Chips Are Always Listening

China May Unveil Homegrown OS Rivals To Windows, Google And Apple

China may unveil homegrown OS rivals to Windows, Google and Apple (RT, Aug 25, 2014):

Following revelations of America’s National Security Agency’s global internet surveillance system, combined with a desire to enhance domestic production, China is beating a path towards unveiling its own operating systems in October.

The Chinese-made substitutes would first be introduced on desktop devices, later expanding to include smartphones and other hand-held devices, Ni Guangnan heads an official operating system development alliance established in March, Xinhau reported at the weekend.

“We hope to launch a Chinese-made desktop operating system by October supporting app stores,” Ni told the trade paper.

Read moreChina May Unveil Homegrown OS Rivals To Windows, Google And Apple

NSA BIOS Backdoor a.k.a. God Mode

NSA BIOS Backdoor a.k.a. God Mode Malware Part (Infosec Institute):

This article is the first part of a series on NSA BIOS backdoor internals. Before we begin, I’d like to point out why these malwares are classified as “god mode.” First, most of the malware uses an internal (NSA) codename in the realms of “gods,” such as DEITYBOUNCE, GODSURGE, etc. Second, these malwares have capabilities similar to “god mode” cheats in video games, which make the player using it close to being invincible. This is the case with this type of malware because it is very hard to detect and remove, even with the most sophisticated anti-malware tools, during its possible deployment timeframe.

Russia To Swap Intel-AMD Processors For Local Technology

NSA111
Image: The NSA is not an independent agency nor does it merely answer to those in Washington. It is a manifestation of an overreaching corporatocracy that will stop at nothing to expand its various monopolies.
The key to defeating the NSA is not attacking it directly but by undermining and replacing the corporate interests that created it and direct it in the first place.

Russia to Swap Intel-AMD Processors For Local Technology  (Activist Post, June 22, 2014):

Russia’s ITAR-TASS News Agency reported in an article titled, “Russia wants to replace US computer chips with local processors,” that:

Russia’s Industry and Trade Ministry plans to replace US microchips Intel and AMD, used in government’s computers, with domestically-produced micro processor Baikal in a project worth dozens of millions of dollars, business daily Kommersant reported Thursday.

It also stated:

The Baikal chips will be installed on computers of government bodies and in state-run firms, which purchase some 700,000 personal computers annually worth $500 million and 300,000 servers worth $800 million. The total volume of the market amounts to about 5 million devices worth $3.5 billion.

In addition to the obvious financial benefits for Russia of locally manufacturing processors, there are several other dimensions within which the move will be beneficial, including in terms of national security.

Read moreRussia To Swap Intel-AMD Processors For Local Technology

First Cisco And Microsoft, Now IBM: China Orders Banks To Remove High-End IBM Servers

IBM logo_0

First Cisco And Microsoft, Now IBM: China Orders Banks To Remove High-End IBM Servers (ZeroHedge, May 27, 2014):

A week ago, in retaliation to the inane charges lobbed by the US accusing 5 Chinese army officials of spying on US companies (when the NSA spying scandal on, well, everyone refuses to leave the front pages), China announced it would ban the use of Windows 8 on government computers (considering the quality of Windows 8, this is likely a decision government computers would have taken on their own regardless). Today, China has expanded its list of sanctioned companies from Microsoft to include IBM as well, following a Bloomberg report that the Chinese government is pushing domestic banks to “remove high-end servers made by International Business Machines Corp. and replace them with a local brand.

Why is MSFT and now IBM sowing the seeds of the US government’s stupidity and failed attempts to distract from its own spying scandals? We don’t know. Here is what we do know:

Read moreFirst Cisco And Microsoft, Now IBM: China Orders Banks To Remove High-End IBM Servers

China Publishes Data Claiming US Is World’s Largest Cyber Attacker

China Publishes Data Claiming US Is World’s Largest Cyber Attacker (ZeroHedge, May 20, 2014):

Well that didn’t take long. Having already responded angrily to the US charging 5 military officers with cyber espionage, China has published details of the US cyber attacks:

  • *CHINA CALLS U.S. THE BIGGEST ATTACKER OF CYBER SPACE: XINHUA

From 3/19 to 5/18, they claim to have found 135 host computers in the US carrying 563 phishing pages targeting Chinese sites that directly controlled 1.18 million computers. But Jay Carney said earlier that “the US does not engage in economic espionage.”

As Xinhua reports,

Read moreChina Publishes Data Claiming US Is World’s Largest Cyber Attacker

China ‘Sanctions’ US, Bans Use Of Windows 8 On Government Computers

China “Sanctions” US, Bans Use Of Windows 8 On Government Computers (ZeroHedge, May 20, 2014):

Considering the epic production and sales flop that Windows 8 has been, one probably does not need an actual sales ban from preventing anyone sane from using it let alone buying it, however in yet another symbolic step, banning its government employees from using the latest Windows operating system is precisely what China did in retaliation to yesterday’s DOJ announcement it was charging five PLA members with hacking offenses against the US. According to Reuters, this latest blow to Microsoft came when the Central Government Procurement Center issued the ban as part of a notice on the use of energy-saving products. So Windows 8 lead to global warming? Who knew…

Read moreChina ‘Sanctions’ US, Bans Use Of Windows 8 On Government Computers

NSA Embedded Surveillance Tools Within Exported US Computer Hardware

NSA-The-Only-Part-Of-Government-That-Actually-Listens

NSA embedded surveillance tools within exported US computer hardware (RT, May 12, 2014):

While the United States has warned against buying Chinese routers due to surveillance concerns, a new book about the Edward Snowden revelations states America has been intercepting and tinkering with routers intended for foreign customers.

According to Glenn Greenwald – one of the journalists entrusted with Snowden’s leaked documents – the National Security Agency has been implanting devices into routers headed overseas since at least 2010.

In an extract from Greenwald’s new book, titled “No Place to Hide,” the journalist states the NSA “routinely receives – or intercepts – routers, servers, and other computer network devices being exported from the US before they are delivered to the international customers.”

Read moreNSA Embedded Surveillance Tools Within Exported US Computer Hardware

Microsoft Includes Windows XP Users In Internet Explorer Fix

Microsoft includes XP users in Internet Explorer fix (BBC News, May 2, 2014):

Microsoft has said users of its Windows XP operating system will also get the security update it has issued to fix a flaw in the Internet Explorer browser.

It issued the update on Thursday to fix a bug that let hackers gain access and user rights to computers.

Read moreMicrosoft Includes Windows XP Users In Internet Explorer Fix

Hackers Find First Post-Retirement Windows XP-Related Vulnerability

Hackers find first post-retirement Windows XP-related vulnerability (Computerworld, April 27, 2014):

Internet Explorer 6, 7 and 8 arent being exploited yet, but harbor a critical flaw

Computerworld – Microsoft on Saturday told customers that cyber-criminals are exploiting an unpatched and critical vulnerability in Internet Explorer (IE) using “drive-by” attacks.

“Microsoft is aware of limited, targeted attacks that attempt to exploit a vulnerability in Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11,” the company said in a security advisory.

Read moreHackers Find First Post-Retirement Windows XP-Related Vulnerability