Cyber Warfare: HAMAS May Be a Threat to 8chan, QAnon

Hamas May Be Threat to 8chan, QAnon Online


Stay Alert, Armed and Dangerous!


Cyber Threats – 3 Easy Steps To Getting Your Door Kicked In


By Mr. A

The Internet is easy to use, but the consequences of using it are hard for people to understand. Just stop and think about that. This technology can be used by almost anyone with a computer, and yet only a very small fraction of people using computers, smart  phones, and tablets really understand what’s going on ‘under the hood’ and how they can be negatively impacted by this.

  • Reckless teens post party pictures and vomit up ridiculous and petty comments through multiple social media outlets. Then they wonder a few years later why they were turned down for a job.
  • Employees exercise ‘free speech’ online and one day find out they are terminated for making statements the company finds insensitive.
  • Teenage girls post mildly inappropriate pictures not knowing those pictures may contain the exact GPS location of their home or school

In 1984, the idea of Big Brother seeing all you do what put forth by George Orwell. What people have a hard time understanding is that in the age of big data almost anyone can be Big Brother and you may be feeding them everything they need to target you.

The latest example of this can be found in new ISIS ‘Kill List’ gathered from church directories posted online. In many states property tax records are online. Targeting and entire church, the pastors, or specific individuals within the congregation is as easy as 1-2-3.

  1. Find a church website
  2. Find a pastor’s name
  3. Search property tax records


You need to recognize something right now. NONE of this required ‘hacking’, attacker kits, or any sophistication outside of being able to do a Google search. If these 3 steps aren’t sufficient, very simple social engineering can manipulate the remaining information.

Do you really want everything you do posted on Facebook? Do you want your teens posting on Instagram 10x a day? It doesn’t take very much at all to go from ‘online’ to a bad guy kicking down your front door.

Stay Alert, Stay Armed, Watch What You Do Online and Stay Dangerous!


Modern Crime: Inside a Russian Hacker Ring


A man with intense eyes crouches over a laptop in a darkened room, his face and hands hidden by a black ski mask and gloves. The scene is lit only by the computer screen’s eerie glow.

Exaggerated portraits of malicious hackers just like this keep popping up in movies and TV, despite the best efforts of shows like Mr. Robot to depict hackers in a more realistic way.

Add a cacophony of news about data breaches that have shaken the U.S. government, taken entire hospital systems hostage, anddefrauded the international banking system, and hackers start to sound like omnipotent super-villains.

But the reality is, as usual, less dramatic. While some of the largest cyberattacks have been the work of state-sponsored hackers-the OPM data breach that affected millions of Americans last year, for example, or the Sony hack that revealed Hollywood’s intimate secrets-the vast majority of the world’s quotidian digital malice comes from garden-variety hackers.

And for many of those cybercriminals, hacking is as unglamorous as any other business. That’s what a group of security researchers found when they infiltrated a ring of hackers based in Russia earlier this year, and monitored its dealings over the course of five months.

The researchers were with Flashpoint, an American cybersecurity company that investigates threats on the dark and deep web. Their undercover operation began when they came across a post on a Russian hacker forum on the dark web-a part of the internet that’s inaccessible to regular browsers-that read very much like a get-rich-quick ad you might find on Facebook.

Read the Remainder at Business Insider

Cyber-Security Threat Update: Don’t Get Juice-Jacked

You are racing through the airport. The low power light is blinking red. You are desperate to plug into any outlet you can find.

Watch out.

You could get juice jacked.

Guess what? In every smart phone—no matter what the model—power and data flow through the same USB port and power cable. That creates a potential attack vector for a malicious actor to break into your device. A virus could be injected right into the phone. That’s a problem. There are some nasty bugs out there.

Another possibility is that a hacker could use the power cord like a vacuum cleaner and suck all kinds of data off your phone. Hackers can do an awful lot with the information they steal including identity theft. The FBI described a stolen identity as “a powerful cloak of anonymity for criminals and terrorists…and a danger to national security and private citizens alike.”

There are already lots of ways to break into your phone—the most common is when users log on to an unsecured wifi site.

Sneaking in through the power cable—called “juice jacking”–is now another concern.

At the 2011 DEF CON security conference, researchers from Aries Security showed how this scam might work. They built a charging kiosk and installed it on the conference floor.  Security “professionals” plugged in all day long. When they did, they got flashed a message—“You should not trust public kiosks with your smart phone. Information can be retrieved or downloaded without your consent.”

For now, the danger seems mostly just a possibility. Seems like hackers are finding plenty of other ways to wreak havoc on smart phone users.

Still, better to be safe than sorry.

There are some common sense practices for avoiding juice jacking.  There is also a suggested tech protection—a USB condom.

Read the Original Article at PJ Media


Cyber-Terrorism and Air Travel

If you were worried about box cutters and strange liquids in un-approved containers on your next flight you need to switch that off and get on message.