Tag Archive for: real

Real Big Phish: Mobile Phishing & Managing User Fallibility – Threatpost



Real Big Phish: Mobile Phishing & Managing User Fallibility  Threatpost

Source…

Is Comelec hacking for real?


MANILA, Philippines — The Commission on Elections (Comelec) on Tuesday said it would release before the end of the week its findings on the reported hacking of its servers, which had raised concerns about the integrity of the May elections among lawmakers and several presidential candidates who called for an urgent investigation.

Malacañang also is troubled by the reported hacking just four months before Filipinos head to the polls to elect a new president, acting presidential spokesperson Karlo Nograles said on Tuesday.

“Obviously we are also worried about this if this is true,” he said.

Sen. Panfilo Lacson, standard-bearer of Partido Reporma, urged Comelec to be “forthright” in reporting its findings.

“Only through transparency and accountability can we guarantee the integrity of the upcoming elections,” he said.

The Manila Bulletin reported on Monday that its Technews team received a tip from a “source” about the hacking last Saturday and discovered that the hackers downloaded more than 60 gigabytes of data which “could possibly affect the May 2022 elections.”

Validate

The stolen data included usernames and PINs (personal identification numbers) of vote-counting machines (VCMs). The Bulletin said that it immediately informed Comelec spokesperson James Jimenez about the alleged hacking.

“When you say that there is a data breach in Comelec, people would of course be alarmed. That’s why it’s important for us to validate this report,” Jimenez said in a radio interview on Tuesday.

But he warned that “someone should be held accountable” if the report was proven wrong.

In a statement on Monday night, the Comelec questioned parts of the Bulletin report, particularly the downloaded usernames and PINs of the VCMs.

“The fact, however, is that such information still does not exist in Comelec systems simply because the configuration files—which includes usernames and PINs — have not yet been completed,” Comelec said. “This calls into question the veracity of the hacking claim.”

3rd party audit

Presidential candidate Sen. Manny Pacquiao wants a congressional oversight investigation of the alleged hacking and that political parties be allowed…

Source…

Mike Wimmer: The Real Tony Stark Working For Special Operations?


In an age of rapidly changing technology, where tech becomes obsolete almost as soon as it hits the shelves, staying on top of the wave is the only way to keep from being rolled over. Mike Wimmer is doing a good job of riding that wave.

Mike Wimmer is an American entrepreneur. He has some exciting ideas on artificial intelligence the US government is interested in. His achievements include being Valedictorian at his high school graduation, starting two tech companies, having membership in Mensa, Congressional briefings, and being coined by the United States Special Operations Command’s (USSOCOM) directorate of science and technology. Did I mention he’s 13 years old?

Mike Wimmer, Entrepreneur. (Photo from nexterainnovations.com)

Real (Young) Genius

About the same age you and I were learning not to finger paint with the contents of our diapers, Mike was learning trigonometry. While we were playing with Hot Wheels cars, Mike was too, developing computer algorithms to recognize his Hot Wheels. At the same age, I was standing against the wall, too nervous to ask a girl to dance at Homecoming; Mike was signing contracts with USSOCOM. Where did I go wrong?

Oh, wait, I didn’t. I spent long years reaching this point, where I could tell you about Mike Wimmer, the cool things he is doing, and how expertise like his is how the US military is stepping into the new millennium. We each have our roles in this life. Mike’s role is different than mine. Or yours. Or most everyone else.

Global Shift to Technological Warfare

In recent articles, the SOFREP team has brought you more information about the future of artificial intelligence in warfare. Technological leaps in global warfare have brought China to the top of the news cycle. Russian hackers appear to have access to nearly every network on the planet (and beyond). Every military branch and office within the US government has a cyber operations division. Globally connected systems are here to stay.

Real-time cyber attacks, including information on the attack’s origin, type, and target, as well as the attacker’s IP address, geographic location, and ports being utilized, are displayed on the Norse attack map on the 275th Cyberspace…

Source…

How to get phone calls without sharing your real number


No matter how long you’ve had your phone number, it’s never too late to start being more discreet with it.

How many people and companies have your phone number if you had to guess? Maybe a hundred? Think again.

Want to be shocked? Your cellphone and landline number (if you still have one) are probably posted online where I found mine – at a people search site that doesn’t cost a dime. Tap or click here for 4 sites that let you search for phone numbers.

By the way, should you find your phone number at the No. 1 site on that list, take these steps to remove it.

Your phone number can do a lot of damage in the wrong hands. It’s an easy way for someone to connect you to a leaked password or even intercept your two-factor authentication codes. Tap or click for a safer way to lock down your accounts.

Source…