Tag Archive for: southern

Infowars Store Enjoyed Traffic Boost During ‘Stop the Steal”https://www.splcenter.org/hatewatch/2022/04/06/” Southern Poverty Law Center


Hatewatch analyzed four years of domain ranking data on Jones’ Infowars Store from the internet security company Cisco. The data show the prolific and influential conspiracy theorist Jones faced a decline in the popularity of his store prior to Stop the Steal, but a rise during November 2020, December 2020 and the first days of January 2021. This rise in traffic hit levels the extremist had not generated since the early days of President Trump’s administration.

Hatewatch’s finding shines new light on profit-driven incentives Jones and other far-right influencers may have seen while supporting former President Trump’s election lies, as his supporters gathered to protest across the country. Jones, whose Infowars Store made $165 million in the three years from 2015-18, according to documents first obtained by HuffPost, has in private expressed revulsion over Trump.

Hatewatch previously reported on a leaked video of Jones saying in January 2019, “I’m so sick of fucking Donald Trump, man. God, I’m fucking sick of him.” Despite saying these words on camera, Jones went on to stoke anger among Trump’s supporters by perpetuating the ex-president’s inflammatory claims about election rigging that never happened. Jones promoted Trump’s Stop the Steal lies in a speech to Trump’s supporters on Jan. 5, 2021, in Washington, D.C., less than 24 hours before some of them went on to attack the Capitol.

“We have only begun to resist the globalists. We have only begun our fight against their tyranny. They have tried to steal this election in front of everyone,” Jones said on the eve of the attack on the U.S. Capitol.

Cisco, a network security…

Source…

Verizon, Southern California Water Supplier Among Those hit in Suspected Chinese Hack


Verizon and the Metropolitan Water District of Southern California were two high-value targets hit by a suspected Chinese-backed hack that was first brought to the public’s attention in April, the Associated Press reported.



a group of people walking down the street: Pedestrians cross Herald Square in front of a Verizon Wireless store in New York on Friday, March 18, 2016. Verizon was one of the high-value targets in the Pulse cyberespionage campaign.


© Richard Levine/Corbis via Getty Images
Pedestrians cross Herald Square in front of a Verizon Wireless store in New York on Friday, March 18, 2016. Verizon was one of the high-value targets in the Pulse cyberespionage campaign.

Pulse Connect Secure networking devices are used by many companies and governments to allow secure remote access to their networks and those were the targets of the hacks. The Chinese government was suspected of backing the hacks, but China has denied any role.

Loading...

Load Error

Verizon, which has over 120 million subscribers through Verizon Wireless, said a Pulse-related compromise was found in one of its labs. The hack was quickly dealt with, and Verizon said no data or customer information had been accessed or stolen.

“We know that bad actors try to compromise our systems,” said Verizon spokesman Rich Young. “That is why internet operators, private companies and all individuals need to be vigilant in this space.”

The Metropolitan Water District of Southern California, the country’s largest water agency, provides water to 19 million people and operates some of the largest treatment plants worldwide, reported it also found a compromised device after an alert issued in April.

The device was immediately removed from service and spokeswoman Rebecca Kimitch said there was “no known data exfiltration” and no systems or processes were known to be affected.

The Associated Press reported earlier this month that the country’s largest subway system in New York City was also breached during the hack.

For more reporting from the Associated Press, see below.

Security researchers say dozens of other high-value entities that have not yet been named were also targeted as part of the breach of Pulse Secure.

It’s unclear what sensitive information, if any, was accessed. Some of the targets said they did not see any evidence of data being stolen. That uncertainty is common in cyberespionage and it can take months to determine data loss,…

Source…

How a single email stole $1.9 million from Southern Oregon University

How a single email stole $  1.9 million from Southern Oregon University

Southern Oregon University has announced that it is the latest organisation to fall victim to a business email compromise attack, after fraudsters simply tricked the educational establishment into transferring money into a bank account under the fraudsters’ control.

Read more in my article on the Tripwire State of Security blog.

Graham Cluley