Apr 14

twitter

- 44 Percent of Twitter Accounts Have Never Tweeted (PCMag, April 13, 2014):

Twitter has a ton of users, right? Around 974 million, to be a bit more precise. However, just because a person has taken the time to make a Twitter account doesn’t necessarily mean they’ve used it. And according to the latest stats from Twopcharts, a third-party site that monitors Twitter activity, a surprisingly high number of people have done just that: Made an account and abandoned Twitter forever.

Just how many? According to the site, approximately 44 percent of Twitter’s 947 million accounts or so have never sent a single tweet. Of the number that have — approximately 550 million — just under half of these accounts are reported to have sent their last tweet more than one year ago (43 percent). Only 126 million have sent any kind of tweet at any point in the past 30 days.

Continue reading »

Tags: , ,

Apr 12

- Eric Holder Admits That, If It Wanted, NSA Could Collect Internet Searches & Emails Just Like Phone Metadata (TechDirt, April 9, 2014):

During a recent House Judiciary Committee hearing concerning oversight, Rep. Zoe Lofgren decided to quiz Attorney General Eric Holder about the federal government’s surveillance efforts, starting off with a rather simple question. She notes that the bulk phone record collection program is considered to be legal by its supporters, based on Section 215 of the Patriot Act, which allows for the collection of “business records.” So, she wonders, is there any legal distinction between phone records and, say, internet searches or emails? In other words, does the DOJ believe that it would be perfectly legal for the US government to scoop up all your search records and emails without a warrant? Holder clearly does not want to answer the question, and first tries to answer a different question, concerning the bulk phone records program, and how the administration is supposedly committed to ending it. But eventually he’s forced to admit that there’s no legal distinction:

Continue reading »

Tags: , , , , , , , , , , , , , , , ,

Apr 03

- Conspiracy Fact – How the U.S. Government Covertly Invented a “Cuban Twitter” to Create Revolution (Liberty Blitzkrieg, April 3, 2014):

It appears the U.S. government is doing its best to ensure that nobody anywhere in any corner of planet earth will ever trust American technology again (or U.S. aid for that matter). This process of distrust first really got going with the Edward Snowden revelations, which demonstrated that essentially all major U.S. tech firms are mere wards of the state with little to no privacy protections, and absolutely zero backbone.

This story of the U.S. government covertly creating a “Cuban Twitter” called ZunZuneo in order to overthrow the regime there has enormous long-term ramifications on many, many levels, which I will address throughout this post.

From the AP via The Washington Post:

WASHINGTON — In July 2010, Joe McSpedon, a U.S. government official, flew to Barcelona to put the final touches on a secret plan to build a social media project aimed at undermining Cuba’s communist government.

McSpedon and his team of high-tech contractors had come in from Costa Rica and Nicaragua, Washington and Denver. Their mission: to launch a messaging network that could reach hundreds of thousands of Cubans. To hide the network from the Cuban government, they would set up a byzantine system of front companies using a Cayman Islands bank account, and recruit unsuspecting executives who would not be told of the company’s ties to the U.S. government.

McSpedon didn’t work for the CIA. This was a program paid for and run by the U.S. Agency for International Development, best known for overseeing billions of dollars in U.S. humanitarian aid.

Now we can pretty much guarantee that foreign nations will forever be skeptical of any U.S. “aid”. Great work morons. Continue reading »

Tags: , , , , , , , , ,

Mar 24

tweet

- Turkey’s Twitter ban collapse fueled by VPNS and DNS tricks (Intellihub, March 23, 2014):

Friday’s news that the Turkish government had banned its citizens from accessing Twitter was depressing but an opportunity to be embraced. Forewarned is forearmed, and the fact that Turks are learning how to beat censorship with VPNs and DNS tricks better prepares them for the future.

Two days ago on the campaign trail ahead of end-of-March elections, Turkish Prime Minister Tayyip Erdogan showed his Internet naivety by doing something extremely silly. In the midst of a corruption scandal he first threatened and then carried through with an outright ban of Twitter.

“I don’t care what the international community says at all. Everyone will see the power of the Turkish Republic,” Erdogan said on Thursday.

Continue reading »

Tags: , , , , , , , ,

Mar 23

- Mark Dice’s Channel Permanently Deleted by YouTube for “Severe Violations” (The Daily Sheeple, March 22, 2014)

Tags: , , , ,

Mar 21

Erdogan-dictator

- Turkey PM Acts On His Threat To “Destroy Twitter”, Blocks Countrywide Access (ZeroHedge, March 20, 2014):

When we reported early yesterday that Turkey’s Prime Minister Erdogan warned that since Twitter had ignored court orders to remove content related to a government corruption scandal., that he would “destroy Twitter” and that “we’ll dig up Twitter – all of them – from the roots,” he raged, “they’ll see the power of the Republic of Turkey” it may not have been quite clear what he meant. A few hours later it was revealed, when virtually all Twitter access was blocked in Turkey ten days ahead of the general election in a move that has already enraged the nation and resulted in a powerful public outcry.

Continue reading »

Tags: , , , , , , , , , , ,

Mar 19

- Bit rot: The Internet never forgets,€“ or does it? (Al Jazeera, March 18, 2014):

Planned obsolescence and flipping bits may be putting our digital archives at risk

At The Guardian’s 2013 Activate conference in London, the computer scientist and Internet founder Vint Cerf, when asked about the future of libraries in the digital age, expressed concern. “I am really worried right now about the possibility of saving bits but losing their meaning and ending up with bit rot,” he said. “You have a bag of bits that you saved for a thousand years, but you don’t know what they mean because the software that was needed to interpret them is no longer available or it’s no longer executable … This is a serious, serious problem, and we have to solve that.”

“Bit rot”? The term is nightmarish, conjuring images of a computer system gone haywire, cannibalizing itself from the inside. The phenomenon it describes — the self-erasure of computer bits, caused by aging software’s obsolescence, leading to an irrevocable loss of data — directly contradicts the popular belief that digital data are permanent. Comparatively, the fire at the Library of Alexandria was more straightforward.

Continue reading »

Tags: , ,

Mar 18

UK Government Wants Unsavoury Web Content Censored

- UK gov wants ‘unsavoury’ web content censored (Wired, March 15, 2014):

The UK minister for immigration and security has called for the government to do more to deal with “unsavoury”, rather than illegal, material online.

James Brokenshire made the comments to the Financial Times in an interview related to the government’s alleged ability to automatically request YouTube videos be taken down under “super flagger” status.

Continue reading »

Tags: , , , , , , , , , ,

Mar 17
spies-data
Agencies want access to metadata, such as web browsing histories.

- Push for Australians’ web browsing histories to be stored (Sydney Morning Herald, March 17, 2014):

Intelligence agency ASIO is using the Snowden leaks to bolster its case for laws forcing Australian telecommunications companies to store certain types of customers’ internet and telephone data for a period of what some law enforcement agencies would like to be two years.

The federal spying agency is supported by the Northern Territory Police, Victoria Police, Australian Federal Police, Australian Crime Commission and Australian Commission for Law Enforcement Integrity, who all say they are in support of a data-retention regime.

Continue reading »

Tags: , , , , , , , , , , ,

Mar 15

- How the NSA Plans to Infect ‘Millions’ of Computers with Malware (The Intercept, March 12, 2014):

By Ryan Gallagher and Glenn Greenwald

Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.

The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.

Continue reading »

Tags: , , , , , , , , , ,

Mar 13

- The Most Evil And Disturbing NSA Spy Practices To-Date Have Just Been Revealed (Liberty Blitzkrieg, March 12, 2014):

In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

The man-in-the-middle tactic can be used, for instance, to covertly change the content of a message as it is being sent between two people, without either knowing that any change has been made by a third party.

- From Glenn Greenwald’s latest article: How the NSA Plans to Infect Millions of Computers with Malware

The latest piece from Greenwald and company on the unconstitutional spy practices of the NSA may represent the most dangerous and disturbing revelations yet. It’s hard for shadiness at the NSA to surprise me these days, but there was only one word that kept repeating over and over in my head as I read this: EVIL.

As a quick aside, Greenwald points out in the quote above how spam emails are used by the NSA to bait you into clicking dangerous links. This is a timely revelation considering I received one such email yesterday from a friend of mine. The email was sent to a wide list of let’s say “liberty-minded people” and webmasters associated with very popular sites. The link seemed shady so I texted him to ask if he had sent it. He hadn’t.

Continue reading »

Tags: , , , , , , , , , , , , , , , , , ,

Mar 10

FYI.


Japanese reports blame collapse of the company on hackers overloading the website

bitcoin-111
Unlike traditional currencies, which are backed by central banks, Bitcoin is created by complex interactions between a large network of computers across the globe.

- Bitcoin exchange MtGox ‘faced 150,000 hack attacks every second’ (Telegraph, March 9, 2014):

Troubled Bitcoin exchange MtGox was reportedly attacked 150,000 times per second by hackers in the days leading up to its collapse last month.

The Tokyo-based exchange, which filed for bankruptcy protection in February, was hit with crippling distributed denial-of-service (DDoS) attacks, according to the Yomiuri Shimbun newspaper.

During DDoS attacks, hackers take control of multiple computers to send a flood of data to the target, causing servers to crash and making websites unavailable.

Lawyers for MtGox said that during the attacks, which lasted for several days, 750,000 Bitcoins belonging to customers were stolen, worth an estimated $575m (£344m).

Continue reading »

Tags: , , , ,

Mar 05

- Official in Charge of Guidelines for British Internet Porn Filters Arrested on Child Porn Charges (Liberty Blitzkrieg, March 4, 2014):

Last summer, I wrote an article titled: How Internet in the UK is “Sleepwalking into Censorship.” That post detailed how plans in the UK to unveil default internet filters, sold to the public under the guise of “blocking child porn” and all sorts of other unethical and illegal activities, would actually provide a backdoor to censoring the internet.

Well it turns out it is even worse than that. Apparently, Patrick Rock, an official who helped draw up guidelines on Internet porn filters, has been arrested for child porn. You can’t make this stuff up.

From Raw Story:

A senior aide to British Prime Minister David Cameron has resigned after being arrested on suspicion of child pornography offenses, Downing Street confirmed Monday.

Continue reading »

Tags: , , , , , , , ,

Mar 05

- Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping (Ars Technica, March 4, 2014):

This GnuTLS bug is worse than the big Apple “goto fail” bug patched last week.

Hundreds of open source packages, including the Red Hat, Ubuntu, and Debian distributions of Linux, are susceptible to attacks that circumvent the most widely used technology to prevent eavesdropping on the Internet, thanks to an extremely critical vulnerability in a widely used cryptographic code library.

The bug in the GnuTLS library makes it trivial for attackers to bypass secure sockets layer (SSL) and Transport Layer Security (TLS) protections available on websites that depend on the open source package. Initial estimates included in Internet discussions such as this one indicate that more than 200 different operating systems or applications rely on GnuTLS to implement crucial SSL and TLS operations, but it wouldn’t be surprising if the actual number is much higher. Web applications, e-mail programs, and other code that use the library are vulnerable to exploits that allow attackers monitoring connections to silently decode encrypted traffic passing between end users and servers.

The bug is the result of commands in a section of the GnuTLS code that verify the authenticity of TLS certificates, which are often known simply as X509 certificates. The coding error, which may have been present in the code since 2005, causes critical verification checks to be terminated, drawing ironic parallels to the extremely critical “goto fail” flaw that for months put users of Apple’s iOS and OS X operating systems at risk of surreptitious eavesdropping attacks. Apple developers have since patched the bug.

Continue reading »

Tags: , , , , ,

Feb 26

See also:

- CONSPIRACY FACT: Agents Infiltrate Websites Intending To ‘Manipulate, Deceive, And Destroy Reputations’


- Reddit Censors Big Story About Government Manipulation and Disruption of the Internet (Washington’s Blog, Feb 25, 2014):

The moderators at the giant r/news reddit (with over 2 million readers) repeatedly killed the Greenwald/Snowden story on government manipulation and disruption of the Internet … widely acknowledged to be one of the most important stories ever leaked by Snowden.

Similarly, the moderators at the even bigger r/worldnews reddit (over 5 million readers) repeatedly deleted the story, so that each new post had to start over at zero.

For example, here are a number of posts deleted from r/news (click any image for much larger/clearer version): Continue reading »

Tags: , , , , ,

Feb 26

I’ve decided to not bombard my readers (and myself) with advertising, like ‘google adsense’ (or better ‘nonsense’), which would have been a good source of income.

This makes income generation for Infinite Unknown pretty much dependent on your donations.

Even the smallest donation helps and is much appreciated.


- DO NO EVIL GOOGLE – CENSOR & SNITCH FOR THE STATE (The Burning Platform, Feb 25, 2014):

“The conscious and intelligent manipulation of the organized habits and opinions of the masses is an important element in democratic society. Those who manipulate this unseen mechanism of society constitute an invisible government which is the true ruling power of our country. We are governed, our minds are molded, our tastes formed, our ideas suggested, largely by men we have never heard of.

This is a logical result of the way in which our democratic society is organized. Vast numbers of human beings must cooperate in this manner if they are to live together as a smoothly functioning society. In almost every act of our daily lives, whether in the sphere of politics or business, in our social conduct or our ethical thinking, we are dominated by the relatively small number of persons who understand the mental processes and social patterns of the masses. It is they who pull the wires which control the public mind.”

– Edward Bernays – Propaganda

google-goes-evil_1

I find the quote above by Edward Bernays to be a perfect synopsis for everything that has come to pass over the last century. The world has become increasingly controlled by an invisible government of greedy Wall Street bankers, shadowy billionaires, immoral big business, crooked politicians, and the military industrial complex, with mammoth media conglomerates, purposefully using propaganda to manipulate and mold the minds of the masses in order to exert power and control over our lives. He wrote those words in 1928, when the only available forms of manipulation were newspapers and radio. Bernays would be ecstatic and delighted with the implements available today used by our corporate fascist state controllers as they deliver the electronic messaging guiding the public mind.

He never dreamed of television, the internet, social media, and the ability of corporations like Google, in full cooperation with the government, to censor the truth, while feeding misinformation and state sanctioned propaganda to the masses in such an efficient and effective mode. Compelling the masses to worship at the altar of technology, while idolizing the evil men running our largest banks and corporations, has been a prodigious success for the shadowy ruling power and their mass media propaganda agents. Mike Lofgren, former congressional insider and author of The Party Is Over: How Republicans Went Crazy, Democrats Became Useless and the Middle Class Got Shafted, describes these mysterious perfidious men as the Deep State:

Continue reading »

Tags: , , , , , , , , , , , , , , , , , ,

Feb 15

internet

- Linking to free stuff is not piracy, EU rules (RT, Feb 14, 2014):

Managing a site with links to freely available copyrighted content does not amount to online piracy, an EU court has ruled. The justices advised their Swedish colleagues, who are reviewing a journalists’ lawsuit against a link-hosting website.

The case involves four journalists from Göteborgs-Posten newspaper, who believe they sustained damages from the website Retriever Sverige, which provides users with clickable links to various online publications.

Continue reading »

Tags: , , , , ,

Feb 06

- Spy Agency Engaged In Internet “False Flag” Attacks (Washington’s Blog, Feb 6, 2014):

Spy Agency “Masqueraded As An Enemy In A ‘False Flag’ Operation”

We’ve warned since 2009 (and see this) that the government could be launching cyber “false flag attacks” in order to justify a crackdown on the Internet and discredit web activists.

A new report from NBC News – based on documents leaked by Edward Snowden – appear to confirm our fears, documenting that Britain’s GCHQ spy agency has carried out cyber false flag attacks:

Continue reading »

Tags: , , , , , ,

Feb 06

turkey-internet-censorship

- Turkish Government Restricts Internet Access; Erdogan Compared To Hitler (ZeroHedge, Feb 6, 2014):

Remember that Adolf Hitler used the same methods when he rose to power,” opposition leader Hasan Oren blasts as Turkish PM Erdogan as the Turkish parliament has approved a bill that would tighten government controls over the internet. As The BBC reports, the new law allows the government to block websites without first seeking a court ruling. “Now you are implementing fascism,” Oren goes on, despite promises of “enhancing democracy in Turkey” when Erdogan was elected. The Erdogan government had already restricted access to “the scourge of Twitter” and Facebook’s “menace to society,” but this latest step dismisses any legal limits or restrictions.

Via The BBC,

The Turkish parliament has approved a bill that would tighten government controls over the internet.

The new law will allow Turkey’s telecommunications authority to block websites without first seeking a court ruling.

Continue reading »

Tags: , , , , , , , , , , ,

Jan 31

In case you want to know who really is a curse (and has never been a blessing) for humanity:

- On record: Benjamin Netanyahu: ‘America is something that can easily be moved.’ ‘The world won’t say a thing.’ ‘The world will say we’re defending.’ (Video)

- Former PM Olmert: Netanyahu Wasted Billions On Iran ‘Hallucinations’

- Israeli PM Benjamin Netanyahu: I Don’t Care What UN Says About Settlement Activities

- Lunatic Netanyahu Exposed: What The Israelis Really Think Of Us (Video)


Israeli Prime Minister Benjamin Netanyahu speaks at the 68th United Nations General Assembly on October 1, 2013 in New York City

- ‘Turn the curse into a blessing’: Netanyahu wants UN of the internet (RT, Jan 27/29, 2014):

Israeli Prime Minister Benjamin Netanyahu has said at the Cybertech conference in Tel Aviv that he wants to create a coalition of leading companies to turn the internet from a curse into a blessing.

In the wake of a reported breach of Defense Ministry computers, Prime Minister Benyamin Netanyahu talked of the importance of cyber security at an Israeli cybertech conference in the Israeli capital on Monday, Globes reports.

“The biggest challenge we face with the cyber world is protecting the privacy and security of the public. There could be a serious breach,” he said.

“There should be a sort of UN for the internet. A coalition of the leading companies in the cyber world…and in my opinion Israel is the most advanced,” he added.

Continue reading »

Tags: , , , , ,

Jan 30

- Dutch court rules in favor of unblocking Pirate Bay as ban ‘ineffective’ (RT, Jan 29, 2014):

People in the Netherlands will soon have access to The Pirate Bay, one of the world’s most censored file-sharing websites, as a court in The Hague ruled that Dutch ISPs need to stop blocking the site after the ban proved ineffective against piracy.

The Court of The Hague released its verdict that two leading ISPs operating in the country – XS4All and Ziggo – no longer have to block access to file sharing website The Pirate Bay.

Continue reading »

Tags: , , , , , , ,

Jan 26

- Google Chrome Bug Lets Websites Listen to Your Conversations (IBT, Jan 23, 2014):

A bug in Google’s Chrome web browser enables malicious websites to activate your microphone and spy on conversations that happen next to your computer, even after you’ve left the website.

Tal Ater, a web developer in Israel discovered the exploit while working on a JavaScript Speech Recognition library called annyang.

The internet giant seems dismissive of the problem, however.

In a statement, Google said: “We’ve reinvestigated and still believe there is no immediate threat, since a user must first enable speech recognition for each site that requests it.”

In a video he filmed with a voice-over artist, Ater shows how websites that legitimately turn on your microphone to enable speech recognition, can continue to record and listen in on conversations in the background even after you have left the website.

His video shows that every word of the script the voice-over artist was reading aloud has been recorded by Chrome’s speech recognition feature, even after the website has been closed.

Continue reading »

Tags: , , , , ,

Jan 23

Activists Stamp Banknotes With Freegate QR Codes To Circumvent China’s Great Firewall

- Stamping Chinese banknotes with censorship-busting QR codes (Boing Boing, Jan 21, 2014):

An anonymous anti-censorship group is stamping Chinese banknotes with a QR code and the message “Scan and download software to break the Internet firewall.” The stamps encode a URL for Freegate, a firewall-busting service. The stamps are widely suspected to be the work of Falun Gong, an outlawed religious sect that has a long history of supplying anti-censorship technology inside of mainland China, both to supply access to its own censored websites and to advertise the virtues of its belief-system to Chinese Internet users who are more interested in beating censorship than religion.

Continue reading »

Tags: , , , , , , , ,

Jan 22
China - Guarded Military-Style Boot Camps To Cure Internet Addiction
Internet addiction is worrying China. Boot camp-style correctional facilities hope to deprogram those who live in online worlds. Source: Supplied

- Inside the secret Chinese camps curing internet addiction (news.com.au, Jan 21, 2014)

CHINA is the first country to label internet addiction a clinical disorder. But instead of shutting the laptop and going for a stroll, in China there are guarded boot camps intended to deprogram hooked teens.

We use the internet daily. We rely on it. But there are some who are so addicted to it they shun the tangible realm of reality for an online existence, exploring digital worlds and living a digital life to such an extent the lines of what’s real and what isn’t become a blur.

Continue reading »

Tags: , , , , , ,

Jan 22

- Cyber attack that sent 750k malicious emails traced to hacked refrigerator, TVs and home routers (The Age/AFP, Jan 20, 2014):

Call it the attack of the zombie refrigerators.

Computer security researchers say they have discovered a large “botnet” which infected internet-connected home appliances and then delivered more than 750,000 malicious emails.

Continue reading »

Tags: , , , ,

Jan 20

- Computer Security Expert Claims he Hacked the ObamaCare Website in 4 Minutes (Liberty Blitzkrieg, Jan 20, 2014):

The hits just keep on coming for ObamaCare. It was less than two weeks ago that I highlighted the potential premium rate death spiral that ObamaCare faces due to the fact that only old and sick people are signing up for the program. Now it seems there are further security related concerns plaguing the site, as cyber-security expert David Kennedy recently claimed that “gaining access to 70,000 personal records of Obamacare enrollees via HealthCare.gov took about 4 minutes.”

It’s actually hard to be this incompetent if you tried.

More from the Washington Times:

Continue reading »

Tags: , , , , , , , , , ,

Jan 19

- Microsoft’s secret battle against the Tor botnet (The Daily Dot, Jan 16, 2014):

In August 2013, 4 million infected computers woke up and waited instructions from their master.

The pathogen was Sefnit, a nasty bit of malware that makes infected computers mine bitcoins. Once the computers woke up, they worked under the command of Ukranian and Israeli hackers named Scorpion and Dekadent. The malware communicated with the two by downloading Tor, the powerful anonymizing software, and talking over encrypted channels. It was the first time a botnet, as a collection of slave computers is called, used Tor in such a potentially powerful way.

By using an unconventional method to exploit Windows, the hackers unwittingly forced Microsoft to show a hand few knew it had: The ability to remotely remove progams en masse from people’s computers, without them even knowing it.

Continue reading »

Tags: , , , , , , , , ,

Dec 27

- The Stock Market Has Officially Entered Crazytown Territory (Economic Collapse, Dec 26, 2013):

It is time to crank up the Looney Tunes theme song because Wall Street has officially entered crazytown territory.  Stocks just keep going higher and higher, and at this point what is happening in the stock market does not bear any resemblance to what is going on in the overall economy whatsoever.  So how long can this irrational state of affairs possibly continue?  Stocks seem to go up no matter what happens.  If there is good news, stocks go up.  If there is bad news, stocks go up.  If there is no news, stocks go up.  On Thursday, the day after Christmas, the Dow was up another 122 points to another new all-time record high.  In fact, the Dow has had an astonishing 50 record high closes this year.  This reminds me of the kind of euphoria that we witnessed during the peak of the housing bubble.  At the time, housing prices just kept going higher and higher and everyone rushed to buy before they were “priced out of the market”.  But we all know how that ended, and this stock market bubble is headed for a similar ending.

It is almost as if Wall Street has not learned any lessons from the last two major stock market crashes at all.  Just look at Twitter.  At the current price, Twitter is supposedly worth 40.7 BILLION dollars.  But Twitter is not profitable.  It is a seven-year-old company that has never made a single dollar of profit. Continue reading »

Tags: , , , ,

Dec 23

- Windows XP: Microsoft’s ticking time bomb (PC Pro, Dec 19,2013):

Shona Ghosh examines the security threat posed by Microsoft’s decision to end support for its 12-year-old OS in April

The final deadline for Windows XP support will act as a starting pistol for hackers, as they target hundreds of millions of users on unpatched systems.

Microsoft has already granted the 12-year-old OS several stays of execution, but the firm has said it will finally end extended support on 8 April 2014 – despite the fact that XP remains the second-most popular OS, with almost a third of PCs running it.

Continue reading »

Tags: , , , , ,

Dec 17

- Facebook saves everything you type – even if you don’t publish it (The Age, Dec 14, 2013)

Tags: , , , , ,