Saturday, March 24, 2018
Atlanta Had Bad Backups and No Kaspersky...,
By CNu at March 24, 2018 0 comments
Labels: count zero , FAIL , tricknology
Tuesday, November 14, 2017
CIA False-Flagging and Impersonating Kaspersky
By CNu at November 14, 2017 0 comments
Labels: count zero , Deep State , disinformation , predatory militarism , tricknology , you used to be the man
Friday, October 27, 2017
Having Nothing to Hide - Kaspersky Opens Transparency Centers
By CNu at October 27, 2017 0 comments
Labels: count zero , culture of competence , scientific morality , The Straight and Narrow , What IT DO Shawty...
Kaspersky Did Nothing Wrong: Thieving NSA JaMoke Self-Stooged
By CNu at October 27, 2017 0 comments
Labels: Ass Clownery , count zero , Deep State , The Straight and Narrow
Wednesday, September 20, 2017
Removing Kaspersky Is A Recipe For Cybernetic Pearl Harbor....,
By CNu at September 20, 2017 0 comments
Labels: A Kneegrow Said It , count zero , The Hardline , wikileaks wednesday
Monday, May 15, 2017
Asian Windows Bootleggers Now WannaCry....,
By CNu at May 15, 2017 0 comments
Labels: count zero , unintended consequences
Before Miss Lindsey and Auntie Maxine Blame Russia..,
More than 45,000 attacks of the #WannaCry recorded by #Kaspersky in 74 countries around the world, mostly in Russia. https://t.co/Agtr2rFDt2 pic.twitter.com/r3JCpXf9MR— Odisseus (@_odisseus) May 12, 2017
He added that the attack didn't cause any significant damage to Russia. Russian security firm Kaspersky said hospitals, police and railroad transport had been affected in the country. Another report suggested Russia was one of the worst hit locations.
As regards the source of these threats, I believe that the leadership of Microsoft have announced this plainly, that the initial source of the virus is the intelligence services of the United States.
Once they're let out of the lamp, genies of this kind, especially those created by intelligence services, can later do damage to their authors and creators.
So this question should be discussed immediately on a serious political level and a defence needs to be worked out from such phenomena.
By CNu at May 15, 2017 0 comments
Labels: common sense
Military-Backed Criminal Superhacking Looks Like....,
By CNu at May 15, 2017 0 comments
Labels: count zero , tricknology
Monday, March 16, 2015
is this why valodya was at an undisclosed location for ten days?
“For the past week, something strange has been going on in the European internet. For five days, web traffic from Texas to certain addresses in the UK has been routed through Ukrainian and Russian telecoms, taking a detour thousands of miles out of the way. Network traffic often takes a circuitous route as a result of network congestion or interconnection difficulties, but neither one would be enough to account for these routes. Instead, this was the result of a bad route announced by Ukraine’s Vega telecom, inserting itself in between.
It’s particularly disconcerting because of the sensitive nature of many of the sites involved. Among the dozens of sites involved was the UK’s Atomic Weapons Establishment, which is tasked with managing and delivering the UK’s nuclear warheads, as well as the UK’s official mail service, the Royal Mail. US defense contractor Lockheed Martin was also running a VPN connection that was caught up in the redirection.”
By CNu at March 16, 2015 2 comments
Labels: WW-III
Tuesday, February 17, 2015
military-backed criminal superhacking, or, three stacks for uncle sugar, one stack for me?
By CNu at February 17, 2015 3 comments
Labels: count zero , elite , tricknology
i've used kaspersky endpoint security for years and so should you...,
- The use of virtual file systems, a feature also found in the highly sophisticated Regin malware. Recently published documents provided by Ed Snowden indicate that the NSA used Regin to infect the partly state-owned Belgian firm Belgacom.
- The stashing of malicious files in multiple branches of an infected computer's registry. By encrypting all malicious files and storing them in multiple branches of a computer's Windows registry, the infection was impossible to detect using antivirus software.
- Redirects that sent iPhone users to unique exploit Web pages. In addition, infected machines reporting to Equation Group command servers identified themselves as Macs, an indication that the group successfully compromised both iOS and OS X devices.
- The use of more than 300 Internet domains and 100 servers to host a sprawling command and control infrastructure.
- USB stick-based reconnaissance malware to map air-gapped networks, which are so sensitive that they aren't connected to the Internet. Both Stuxnet and the related Flame malware platform also had the ability to bridge airgaps.
- An unusual if not truly novel way of bypassing code-signing restrictions in modern versions of Windows, which require that all third-party software interfacing with the operating system kernel be digitally signed by a recognized certificate authority. To circumvent this restriction, Equation Group malware exploited a known vulnerability in an already signed driver for CloneCD to achieve kernel-level code execution.
In an exhaustive report published Monday at the Kaspersky Security Analyst Summit here, researchers stopped short of saying Equation Group was the handiwork of the NSA—but they provided detailed evidence that strongly implicates the US spy agency.
By CNu at February 17, 2015 0 comments
Labels: count zero , tricknology , What IT DO Shawty...
Fuck Robert Kagan And Would He Please Now Just Go Quietly Burn In Hell?
politico | The Washington Post on Friday announced it will no longer endorse presidential candidates, breaking decades of tradition in a...
-
theatlantic | The Ku Klux Klan, Ronald Reagan, and, for most of its history, the NRA all worked to control guns. The Founding Fathers...
-
Video - John Marco Allegro in an interview with Van Kooten & De Bie. TSMATC | Describing the growth of the mushroom ( boletos), P...
-
dailybeast | Of all the problems in America today, none is both as obvious and as overlooked as the colossal human catastrophe that is our...