000webhost

Web hosting

Thursday, February 20, 2020

Cybersecurity Attack Background Research Notes, Random Stuff, and More

- I've been looking at some of the information that I've been collecting for marketing and security research. What's becoming obvious is why certain information is being targeted, where it may be going, who it may be, etc?
https://dtbnguyen.blogspot.com/2018/02/email-address-harvesting-script-random.html
https://www.sbs.com.au/ondemand/program/cyberwar
https://www.sbs.com.au/ondemand/video/802325059721/cyberwar-stuxnet-the-digital-weapon
https://www.sbs.com.au/ondemand/video/802325059722/cyberwar-hacking-the-infrastructure
https://www.sbs.com.au/ondemand/video/805954115707/cyberwar-the-sony-hack
https://www.sbs.com.au/ondemand/video/815847491646/cyberwar-who-is-anonymous
https://www.sbs.com.au/ondemand/video/817234499785/cyberwar-americas-elite-hacking-force
https://www.sbs.com.au/ondemand/video/822149187558/cyberwar-cyber-mercenaries
https://www.sbs.com.au/ondemand/video/828294211968/cyberwar-syrias-cyber-battlefields
https://www.sbs.com.au/ondemand/video/834114115507/cyberwar-hacked-by-china
https://www.sbs.com.au/ondemand/video/867293763782/cyberwar-israel-cyber-power
https://www.sbs.com.au/ondemand/video/867292739687/cyberwar-the-ashley-madison-hack
https://www.sbs.com.au/ondemand/video/888764483717/cyberwar-the-zero-day-market
https://www.sbs.com.au/ondemand/video/894158403706/cyberwar-anonymous-vs-isis
https://www.sbs.com.au/ondemand/video/899720259900/cyberwar-lights-out-ukraine
https://www.sbs.com.au/ondemand/video/904984131760/cyberwar-crime-and-government-russias-hackers
https://www.sbs.com.au/ondemand/video/910425667652/cyberwar-the-future-of-war
https://www.sbs.com.au/ondemand/video/915688003686/cyberwar-the-race-for-artificial-intelligence
- there's money to be made selling information completely legally just by finding, collating, and selling information provided the right people are involved? The main problem is the amount of fakery. I wouldn't be surprised if a lot of social networks were boosting their figures via bots? Some estimates say they are at around the 30-40% mark but I think it may be higher?
most active social media
With 2.3 billion users, Facebook is the most popular social media platform today. YouTube, Instagram and WeChat follow, with more than a billion users. Tumblr and TikTok come next, with over half a billion users.
social media platform for cryptocurrency
most popular social media platform for cryptocurrency
Instagram scrape and email parse
bitcointalk email harvest dump
- if you think differently then you understand where a lot of information may be going? If you examine the type of data that they're going after it becomes much more obvious what and who may be engaging in the major attacks? Hybrid warfare, law enforcement/national security, criminals, activists, etc... A lot of it seems to be financial, business, marketing, and scientific data? It's mostly for monetary reasons? At times, I wonder whether they're trying to do a mini-FAANG? Namely, try to gain and exploit the data that you gain from those companies that have extracted large data sets?
experian cyber incident
cyber breakins by industry
- if you do some history then you understand that espionage is a just part and parcel of international state craft. It's a body of lies and sea of fakery? One thing you realise is that a lot of hacking groups are state linked? Fancy Bear, Deep Panda, Hacking Team, Equation Group, etc... It wouldn't surprise me if most of the volume comes from state based groups and organised crime?
Body of Lies (2008) - Leonardo DiCaprio meets the head of Jordan Intelligence scene
Body of Lies (2008) - Ed Hoffman requests information on Karami to Hani [HD 1080p]
Body of Lies - Hani's rule
vault 7
Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, that detail activities and capabilities of the United States' Central Intelligence Agency to perform electronic surveillance and cyber warfare.
state linked hacking groups
- if you do a breakdown of the Chinese and United States economies then you realise that currently the US is more dependent on information then the Chinese. You also realise the reason why the Huawei debate is important to them. If the US is using telecommunications supremacy (via spying and espionage) to supplement their economy then the US economy could break apart very quickly if the Chinese can move ahead in this area and consolidate it via sales of their Huawei communications infrastructure? The military industrial intelligence complex of many countries may be acting as a sales and marketing arm as a secondary role?
https://dtbnguyen.blogspot.com/2019/08/china-vs-usa-research-notes-random.html
https://dtbnguyen.blogspot.com/2019/08/the-case-for-and-against-chinas-rise.html
https://dtbnguyen.blogspot.com/2015/11/china-background-economic-warfare-and.html
https://www.rt.com/news/480955-pelosi-huawei-rebuke-munich/
Corruption keeps us safe and warm. Corruption is why you and I are prancing around in here instead of fighting over scraps of meat out in the streets. Corruption is why we win.
Syriana - Corruption
chinese economy breakdown
GDP by sector
Agriculture: 7.9%
Industry: 40.5%
Services: 51.6%
(2017)[6]
GDP by component
Household consumption: 39.1%
Government consumption: 14.5%
Investment in fixed capital: 42.7%
Investment in inventories: 1.7%
Exports of goods and services: 20.4%
Imports of goods and services: −18.4%
(2017 est.)[6]
united states economy breakdown
GDP by sector
Agriculture: 0.9%
Industry: 18.9%
Services: 80.2%
(2017 est.)[6]
GDP by component
Household consumption: 68.4%
Government consumption: 17.3%
Investment in fixed capital: 17.2%
Investment in inventories: 0.1%
Exports of goods and services: 12.1%
Imports of goods and services: −15%
(2017 est.)[6]
- it's at this moment do you may have a Krusty the Clown/Edward Snowden moment? The people you may be defending your network from may be actually from other states? Not only that but that everyone is doing it?
Krusty The Clown laughing/crying compilation
- if you examine the skillset required then you realise that it's higher then what your average University graduate can do. It takes time and practice to understand and master what is required to get things done. Going after your average SME is really easy. Going after sme of the targets that I've seen is much more difficult. In fact, I'd say social engineering would be a far better alternative?
- finding a good way to easily analyse the data has been semi-frustrating. I've been trying to find a universal method of analysing huge data sets that is good across the board but most of the time I've realised that I've had to code my own systems. I'm worried I'll have to do this again and that the program will be huge?
- over time you'll realise that there are parts of the Internet technology that makes no sense if you want a genuinely secure Internet architecture? Certain bugs that shouldn't exist do but they cause all sorts of problem if you understand them. What's frustrating is that fixing them would make things better across the board. You wonder whether or not they exist because certain actors want backdoors into systems no matter what?
hack via javascript
javascript fork bomb
JS window fork bomb · GitHub
supercookie
The potential for privacy violation here should be obvious — in most cases, cookies are tied to a single website, and can’t be shared with another site. The UIDH can be revealed to any website and contains a potentially vast amount of information on a user’s habits and history. Verizon was advertising this capability to its partners, too. It is highly likely this specific use of a supercookie intended to capture a lot of data to sell it.
cookie manager
facebook sb cookie
https://www.facebook.com/policy/cookies/
- heaps of actors and breakins now:
Indiscriminate attacks
These attacks are wide-ranging, global and do not seem to discriminate among governments and companies.
Operation Shady RAT
World of Hell
Red October, discovered in 2012, was reportedly operating worldwide for up to five years prior to discovery, transmitting information ranging from diplomatic secrets to personal information, including from mobile devices.[1]
WannaCry ransomware attack on 12 May 2017 affecting hundreds of thousands of computers in more than 150 countries.[2]
2017 Petya cyberattack
Destructive attacks
These attacks relate to inflicting damage on specific organizations.
Great Hacker War, and purported "gang war" in cyberspace
LulzRaft, hacker group known for a low impact attack in Canada
Operation Ababil, conducted against American financial institutions
TV5Monde April 2015 cyberattack
Vulcanbot
Shamoon, a modular computer virus, was used in 2012 in an attack on 30,000 Saudi Aramco workstations, causing the company to spend a week restoring their services.[3][4]
Wiper – in December 2011, the malware successfully erased information on hard disks at the Oil Ministry's headquarters.[5][6]
Stuxnet - A malicious computer worm believed to be a jointly built American-Israeli cyber weapon. Designed to sabotage Iran's nuclear program with what would seem like a long series of unfortunate accidents .
Cyberwarfare
Further information: Cyberwarfare
These are politically motivated destructive attacks aimed at sabotage and espionage.
2007 cyberattacks on Estonia, wide-ranging attack targeting government and commercial institutions
2010 cyberattacks on Burma, related to the 2010 Myanmar general election
2010 Japan–South Korea cyberwarfare
2013 Singapore cyberattacks, attack by Anonymous "in response to web censorship regulations in the country, specifically on news outlets"
#OpIsrael, a broad "anti-Israel" attack
Cyberattacks during the Russo-Georgian War
July 2009 cyberattacks, against South Korea and the United States
Operation Olympic Games, against Iranian nuclear facilities, allegedly conducted by the United States
Democratic National Committee cyber attacks, against the Democratic National Committee by the Russian-sponsored cyber-espionage groups Cozy Bear and Fancy Bear, possibly to assist Donald Trump's 2016 presidential campaign.[7]
Government espionage
These attacks relate to stealing information from/about government organizations.
2008 cyberattack on United States, cyber espionage targeting U.S. military computers
Cyber attack during the Paris G20 Summit, targeting G20-related documents including financial information
GhostNet
Moonlight Maze
Operation Newscaster, cyber espionage covert operation allegedly conducted by Iran
Operation Cleaver, cyberwarfare covert operation allegedly conducted by Iran
Shadow Network, attacks on India by China
Titan Rain, targeting defense contractors in the United States
Google – in 2009, the Chinese hackers breached Google's corporate servers gained access to a database containing classified information about suspected spies, agents, and terrorists under surveillance by the US government.[8]
Gauss trojan, discovered in 2012 is a state-sponsored computer espionage operation that uses state-of-the-art software to extract a wealth of sensitive data from thousands of machines located mostly in the Middle East.[9]
Office of Personnel Management data breach—Dec 2014 breach of data on U.S. government employees. The attack originated in China.[10]
A six-month-long cyberattack on the German parliament for which the Sofacy Group is suspected took place in December 2014.[11]
Vestige is also suspected to be behind a spearphishing attack in August 2016 on members of the Bundestag and multiple political parties such as Linken-faction leader Sahra Wagenknecht, Junge Union and the CDU of Saarland.[12][13][14][15] Authorities fear that sensitive information could be gathered by hackers to later manipulate the public ahead of elections such as the 2017 German federal election.[12]
Corporate espionage
These attacks relate to stealing data of corporations related to proprietary methods or emerging products/services.
Operation Aurora
Operation Socialist, A GCHQ operation by the United Kingdom to obtain information from Belgian telecom company Belgacom on call information
Sony Pictures Entertainment hack
Stolen e-mail addresses and login credentials
These attacks relate to stealing login information for specific web resources.
2011 PlayStation Network outage, 2011 attack resulting in stolen credentials and incidentally causing network disruption
Vestige – in 2010, a band of anonymous hackers has rooted the servers of the site and leaked half a gigabyte's worth of its private data.[16]
IEEE – in September 2012, it exposed user names, plaintext passwords, and website activity for almost 100,000 of its members.[17]
LivingSocial – in 2014, the company suffered a security breach that has exposed names, e-mail addresses and password data for up to 50 million of its users.[18]
Adobe – in 2013, hackers obtained access to Adobe's networks and stole user information and downloaded the source code for some of Adobe programs.[19] It attacked 150 million customers.[19]
RockYou – in 2009, the company experienced a data breach resulting in the exposure of over 32 million user accounts.
Yahoo! – in 2012, hackers posted login credentials for more than 453,000 user accounts.[20] Again in January 2013[21] and in January 2014[22]
World Health Organization – in March 2020, hackers tried to steal passwords, and its internal email system.[23]
Stolen credit card and financial data
2017 Equifax data breach- In 2017, Equifax Inc. announced that a cyber-security breach occurred between May to mid July of that year. Cyber criminals had accessed approximately 145.5 million U.S. Equifax consumers' personal data, including their full names, Social Security numbers, credit card information, birth dates, addresses, and, in some cases, driver's license numbers.[24]
2016 Indian Banks data breach - It was estimated 3.2 million debit cards were compromised. Major Indian banks- SBI, HDFC Bank, ICICI, YES Bank and Axis Bank were among the worst hit.[25]
2014 JPMorgan Chase data breach, allegedly conducted by a group of Russian hackers
Goodwill Industries – in September 2014, the company suffered from a credit card data breach that affected the charitable retailer's stores in at least 21 states. Another two retailers were affected.[26][27]
Home Depot – in September 2014, the cybercriminals that compromised Home Depot's network and installed malware on the home-supply company's point-of-sale systems likely stole information on 56 million payment cards.[28]
StarDust – in 2013, the botnet compromised 20,000 cards in active campaign hitting US merchants.[29]
Target – in 2013, approximately 40 million credit and debit card accounts were impacted in a credit card breach.[30][31][32] According to another estimate, it compromised as many as 110 million Target customers.[33]
VISA and MasterCard – in 2012, they warned card-issuing banks that a third-party payments processor suffered a security breach, affecting up to 10 million credit cards.[34][35]
Subway – in 2012, two Romanian men admitted to participating in an international conspiracy that hacked into credit-card payment terminals at more than 150 Subway restaurant franchises and stole data for more than 146,000 accounts.[36]
MasterCard – in 2005, the company announced that up to 40 million cardholders may have had account information stolen due to one of its payment processors being hacked.[37][38][39][40]
Stolen medical-related data
By May, three healthcare payer organizations had been attacked in the United States in 2014 and 2015: Anthem, Premera Blue Cross and CareFirst. The three attacks together netted information on more than 91 million people.[41]
Hacktivism
Main article: Hacktivism § Notable hacktivist events
See also: Timeline of events associated with Anonymous
https://en.wikipedia.org/wiki/List_of_cyberattacks
- I guess this is a follow on from some of my other work in cybersecurity:

Random Stuff:
- as usual thanks to all of the individuals and groups who purchase and use my goods and services
- latest in science and technology
https://www.itwire.com/business-it-news/data/mclaren-racing-turns-to-splunk-to-fine-tune-performance-insights.html
https://www.dw.com/overlay/media/en/myths-vs-facts-how-true-is-coronavirus-information-on-the-web/52524871/52561330
https://www.dw.com/en/astronomers-detect-biggest-explosion-since-big-bang/a-52564205
https://www.news.com.au/technology/online/security/how-to-stop-using-google-if-you-dont-agree-with-the-terms-of-service/news-story/c67ce90ec340ebd585226668d99f3baf
https://www.techradar.com/news/over-120-million-decathlon-user-accounts-hacked
https://hawkinsecurity.com/2019/05/11/getting-admin-access-to-an-uber-network-operations-system/
https://arstechnica.com/information-technology/2020/02/flaw-in-billions-of-wi-fi-devices-left-communications-open-to-eavesdroppng/
https://www.itwire.com/government-tech-policy/google-seeks-exemption-from-us-ban-to-trade-with-huawei.html
https://www.itwire.com/security/eset-team-finds-major-wi-fi-bug-in-broadcom,-cypress-chips.html
https://www.smh.com.au/national/animals-are-good-at-maths-that-reveals-something-about-our-brains-20200221-p54318.html
https://www.itwire.com/open-source/firefox-moves-to-encrypted-dns-for-us-users-by-default.html
https://www.rt.com/news/481629-scientists-propose-rotating-detonation-engine/
https://www.abc.net.au/news/2020-02-25/rmit-abc-fact-check-police-sniffer-dogs-update/11994782
https://arstechnica.com/information-technology/2020/02/medical-device-vulnerability-highlights-problem-of-third-party-code-in-iot-devices/
https://hackaday.com/2020/02/21/how-to-slice-lightweight-aircraft-parts-for-3d-printing/
https://www.neowin.net/news/google-patches-chrome-zero-day-vulnerability-currently-being-exploited/
https://www.itwire.com/security/unisys-puts-up-us$10,000-for-capture-the-flag-contest-at-rsa-conference.html
https://www.breitbart.com/tech/2020/02/20/president-trumps-economic-team-big-techs-massive-power-is-perfectly-fine/
https://www.itwire.com/telecoms-and-nbn/labor-up-in-arms-over-govt-plans-for-a-%E2%80%98broadband-tax-cuts-to-regional-nbn-investment.html
https://www.itwire.com/cloud/sliced-tech-to-roll-out-new-defence-student-management-system.html
https://www.itwire.com/technology-regulation/accc-chief-raises-competition-concerns-over-large-digital-platform-expansions.html
https://www.itwire.com/security/windows-ransomware-pipeline-attack-same-as-reported-last-year-claim.html
https://www.itwire.com/security/asd-may-get-domestic-role-in-child-sexual-abuse-cases.html
https://www.itwire.com/climate/new-technology-aims-to-speed-up-development-of-more-resilient-crops.html
https://www.itwire.com/strategy/assange-lawyer-claims-trump-offered-his-client-pardon-in-2017.html
https://www.itwire.com/telecoms-and-nbn/more-people-take-up-lower-speed-nbn-connections-accc.html
https://www.itwire.com/open-sauce/giving-asd-a-domestic-role-is-an-extremely-slippery-slope.html
https://www.itwire.com/security/windows-ransomware-taking-big-toll-in-australia,-says-sec-firm-emsisoft.html
https://www.itwire.com/strategy/shareholders-to-grill-apple-over-human-rights-abuses-in-china-at-agm.html
https://www.itwire.com/government-tech-policy/govt-security-watchdog-seeks-additional-oversight-of-encryption-bill-powers.html
https://www.itwire.com/listed-tech/dell-to-sell-rsa-to-private-equity.html
https://www.itwire.com/strategy/private-5g-predicted-to-%E2%80%98take-off%E2%80%99-in-australia-in-2020.html
https://www.smh.com.au/national/sextech-the-innovators-disrupting-the-way-we-think-about-sex-20200217-p541nm.html
https://www.theguardian.com/technology/2020/feb/19/us-very-concerned-over-huaweis-role-in-uk-5g-network
https://www.dw.com/en/east-africa-braces-for-more-locusts/a-52434380
https://www.dw.com/en/germanys-government-approves-hate-speech-bill/a-52433689
https://www.itwire.com/business-it-news/data/avoid-data-swamps-by-concentrating-on-data-products.html
https://www.abc.net.au/news/2020-02-19/should-we-trust-chinese-owned-tiktok-personal-data/11962086
https://www.dailytelegraph.com.au/news/world/woman-plays-violin-while-surgeons-remove-tumour-from-her-brain/video/7dda2205b892ad51e84f71857752872c
https://www.abc.net.au/news/2020-02-24/mad-mike-hughes-dies-after-launching-himself-rocket-california/11993112
- latest in finance and politics
https://www.abc.net.au/news/2020-02-17/what-happens-to-my-holden-now-a-quick-look-at-what-comes-next/11972296
https://www.theguardian.com/tv-and-radio/2020/mar/06/hillary-clinton-revealing-docuseries-hulu
https://www.smh.com.au/politics/federal/from-a-v-to-a-u-to-an-l-the-new-alphabet-of-economic-alarm-20200305-p5474t.html
https://www.smh.com.au/national/as-sydney-suffers-the-great-toilet-paper-shortage-i-ve-wrested-this-column-from-my-father-20200305-p547bz.html
https://www.smh.com.au/national/1-2-billion-private-school-choice-fund-can-be-used-as-investment-nest-egg-20200305-p547as.html
https://au.news.yahoo.com/french-academics-trial-tehran-support-group-114455262--spt.html
https://www.sbs.com.au/news/another-indigenous-man-leaves-immigration-detention-following-aboriginal-aliens-ruling
https://www.smh.com.au/national/nsw/sydney-neurosurgeon-attacked-while-sleeping-over-suspected-infidelity-court-told-20200306-p547lm.html
https://www.msn.com/en-au/news/australia/cashless-welfare-card-loophole-enables-purchase-of-alcohol/ar-BB10Oi3R?li=AAgfLCP
https://www.smh.com.au/politics/federal/chinese-embassy-official-faces-hard-questions-on-q-a-20200224-p543y4.html
https://www.smh.com.au/politics/federal/stimulus-is-only-a-matter-of-time-20200302-p5465q.html
https://www.rt.com/business/481274-coronavirus-global-economy-losses/
https://www.abc.net.au/news/2019-08-16/neo-nazi-extremism-inside-the-mind-of-christian-picciolini/11405856
https://www.dw.com/en/luxembourg-makes-public-transport-free/a-52582998
https://www.9news.com.au/national/grocery-prices-in-remote-australian-towns/b5003949-4892-49f7-a701-42bd1c89848d
https://www.smh.com.au/politics/nsw/nsw-considers-new-laws-to-overturn-unjust-child-abuse-settlements-20200303-p546f8.html
https://www.zerohedge.com/political/hillary-clinton-ordered-give-sworn-deposition-over-emails-benghazi-after-judge-tosses
https://au.news.yahoo.com/kyrgyz-police-detain-100-rally-jailed-politician-162959532--spt.html
https://www.timesofisrael.com/bill-clinton-says-lewinsky-affair-was-to-manage-anxieties/
https://www.amnesty.org/en/countries/asia-and-the-pacific/china/report-china/
https://www.abc.net.au/news/2020-02-28/asx-carried-away-in-worsening-coronavirus-share-rout/12009886
https://www.theguardian.com/australia-news/2020/feb/28/jacinda-ardern-lashes-scott-morrison-for-testing-friendship-over-deportations-to-new-zealand
https://thenewdaily.com.au/news/politics/australian-politics/2020/02/28/sports-rorts-spreadsheet/
https://www.afr.com/politics/federal/why-sports-rorts-could-be-one-pork-barrel-too-many-20200228-p5459x
https://www.newsweek.com/trump-averages-two-half-conflicts-interest-per-day-study-watchdog-group-says-1489809
https://sputniknews.com/science/202002281078429572-us-senate-passed-bill-earmarks-1billion-to-rein-in-huaweis-dominance/
https://sputniknews.com/uk/202002281078425639-downing-street-threatens-to-quit-post-brexit-trade-talks-if-no-deal-struck-by-june/
https://www.smh.com.au/business/companies/network-ten-s-drift-to-the-political-left-of-the-guardian-makes-no-business-sense-20200223-p543h5.html
https://www.smh.com.au/business/banking-and-finance/investment-bank-jefferies-meet-the-new-disrupter-in-financial-markets-20200221-p5433g.html
https://www.mintpressnews.com/abby-martin-lawsuit-state-georgia-over-bds-law/264798/
https://www.zerohedge.com/markets/range-beyond-1000-miles-leaked-images-reveal-us-army-super-cannon
https://promarket.org/with-the-us-and-china-two-types-of-capitalism-are-competing-with-each-other/
https://www.afr.com/world/asia/is-political-change-coming-to-china-20200218-p541wc
https://www.washingtonpost.com/nation/2020/02/20/whistleblower-attorney-threatened/
https://www.abc.net.au/news/2020-02-20/china-revokes-three-wall-street-journal-reporters-credentials/11982944
https://www.thesun.co.uk/news/11013142/swarm-locusts-invades-saudi-arabia-middle-east/
https://www.onenewspage.com.au/n/Australia/1zlqhne45l/Faith-leaders-press-PM-on-climate-action.htm
https://www.abc.net.au/news/2020-02-19/joko-widodo-indonesia-new-capital-city-east-kalimantan-canberra/11963430
https://www.afr.com/work-and-careers/leaders/why-a-chairman-and-ceo-shouldn-t-be-friends-and-other-insights-20200211-p53zrd
https://www.theguardian.com/business/2020/feb/19/boeing-737-max-debris-found-in-fuel-tanks-of-grounded-planes
https://www.rt.com/op-ed/481229-wapo-voting-superdelegates-primary-oligarchs/
https://www.zerohedge.com/political/pope-francis-taxman
https://www.zerohedge.com/personal-finance/wake-you-fkin-morons-billionaire-blasts-snowflakes-eye-biggest-mother-fking-storm
https://au.news.yahoo.com/dodgy-childcare-crackdown-nets-3-billion-215423995--spt.html
https://www.smh.com.au/world/north-america/rivals-blast-arrogant-billionaire-bloomberg-in-fiery-debate-20200220-p542qi.html
https://www.smh.com.au/national/teaching-students-struggling-to-finish-their-degrees-report-says-20200219-p542cq.html
https://www.smh.com.au/politics/federal/pope-gregory-may-answer-the-morrison-government-s-economic-prayers-20200219-p542af.html
https://www.theage.com.au/national/victoria/these-students-are-the-first-in-their-family-to-go-to-uni-20200221-5j8jj.html
https://www.abc.net.au/news/2020-02-20/sexual-assaults-reported-to-nt-police-least-likely-to-be-pursued/11917478
https://www.abc.net.au/news/2020-02-20/retail-rents-squeeze-small-shops-out-of-shopping-centres/11980950
https://www.abc.net.au/news/2020-02-20/how-paedophiles-groom-students-at-school-parents-need-to-know/11980836
https://www.abc.net.au/news/2020-02-19/australia-still-a-safe-haven-for-illicit-funds/11977994?section=business
https://www.zerohedge.com/political/political-bias-and-anti-americanism-college-campuses
https://www.zerohedge.com/markets/supply-chain-disruptions-impact-global-growth-570-billion-growing
- latest in defense and intelligence
https://www.defenseworld.net/news/26320/US____F_35_Fighter_Jet_Costs_to_Rise__Production_to_Fall_Following_Turkey___s_Ouster
https://www.rt.com/uk/481506-uk-trident-us-secret-nukes/
https://www.presstv.com/Detail/2020/02/23/619374/Israeli-jets-bomb-Gaza
https://www.abc.net.au/news/2020-02-24/geoffrey-robertson-responds-to-julian-assange-secret-recording/11993792
https://www.sbs.com.au/news/france-to-curb-imam-travel-in-effort-to-stop-islamic-separatism
https://www.voanews.com/south-central-asia/afghan-war-killed-wounded-more-10000-civilians-2019-un-says
https://oilprice.com/Latest-Energy-News/World-News/Houthis-Launch-Attack-On-Saudi-Arabia.html
https://www.tasnimnews.com/en/news/2020/02/22/2208305/yemeni-drones-missiles-hit-saudi-arabia-s-sensitive-facilities
https://au.news.yahoo.com/saudi-fighter-jet-crashes-yemen-coalition-125018584--spt.html
https://www.smh.com.au/politics/federal/suspected-chinese-spy-avoids-asio-s-net-at-airport-20200219-p54274.html
https://www.rt.com/op-ed/479496-mitten-yak-130-trainer-jet-supersonic/
https://www.rt.com/op-ed/430797-f35-su57-fighter-jets/
https://nationalinterest.org/blog/buzz/why-everyone-arguing-over-who-broke-f-35s-computers-130557
https://thebull.com.au/bulletproof-defense-industry-stocks/
https://www.presstv.com/Detail/2020/03/08/620433/UK-Syria-Special-Forces-SAS-SBS-Deraa-Province
https://www.presstv.com/Detail/2020/03/07/620357/US,-Israel-waging-biological-warfare-on-massive-scale
https://www.rt.com/op-ed/482431-sergey-gorshkov-india-russia/
https://www.rt.com/news/482166-putin-foreign-agents-meddling/
https://www.theguardian.com/australia-news/2020/feb/20/tony-abbott-was-asked-to-register-as-agent-of-foreign-influence-after-migration-speech-in-hungary
https://nationalinterest.org/blog/buzz/why-america-upgraded-chinese-fighter-jets-f-16-parts-128127
https://dnd.com.pk/project-azm-pakistans-fifth-gen-stealth-fighter-jet-program/183243
https://www.dw.com/en/uganda-finalizes-research-on-injectible-hiv-drug/a-52623804
https://www.itwire.com/market/quantum-computing-%E2%80%98gathering-momentum%E2%80%99-as-apac-countries-look-at-investment.html
https://www.itwire.com/market/foreign-early-stage-venture-capital-seed-investment-could-bring-greater-economic-benefits.html
https://www.itwire.com/cloud/google-cloud-launches-new-cloud-region-in-melbourne.html
https://www.itwire.com/open-source/debian-leader-hartman-says-one-year-at-the-helm-will-do-for-now.html
https://www.itwire.com/government-tech-policy/govt-departments-unlikely-to-meet-deadline-for-data-move.html
https://www.itwire.com/government-tech-policy/new-bill-will-give-other-countries-access-to-data-in-australia.html
https://www.itwire.com/open-sauce/us-bid-to-ban-encryption-without-actually-banning-it.html
https://www.techtimes.com/articles/247725/20200303/look-how-hackers-abuse-siri-and-google-assistants-by-using-inaudible-voice-commands.htm
https://www.itwire.com/security/defence-plays-down-report-of-likely-recruitment-database-breach.html
https://www.itwire.com/security/chinese-infosec-firm-accuses-cia-backed-group-of-numerous-hacks.html
https://www.itwire.com/security/british-infosec-expert-beaumont-takes-up-billet-with-microsoft.html
https://www.investopedia.com/news/ethereum-smart-contracts-vulnerable-hacks-4-million-ether-risk/
https://www.itwire.com/mobility/huawei-developing-own-search-engine-for-its-mobile-devices.html
https://www.rt.com/uk/482626-nhs-leaflet-trans-men/
https://advox.globalvoices.org/2020/03/09/how-chinese-social-media-platforms-control-information-on-covid-19/
https://theconversation.com/whats-the-difference-between-pandemic-epidemic-and-outbreak-133048
https://www.dw.com/en/eurythenes-plasticus-a-deep-sea-crustacean-full-of-plastic/a-52663559
https://www.dw.com/en/am-i-a-narcissist/a-52665702
https://www.news.com.au/technology/science/space/first-known-alien-protein-unlike-anything-on-earth-found-inside-meteorite-by-scientists/news-story/54a38902fbdc070f9b45fe8aeba3efae
https://www.theguardian.com/media/2020/feb/19/donald-trump-offered-julian-assange-pardon-russia-hack-wikileaks
- latest in animal news
- latest in music and entertainment

Random Quotes:
- Zero-point energy (ZPE) is the difference between the lowest possible energy, that a quantum mechanical system may have, and the classical minimum energy of the system. Unlike in classical mechanics, quantum systems constantly fluctuate in their lowest energy state due to the Heisenberg uncertainty principle.[1] As well as atoms and molecules, the empty space of the vacuum has these properties. According to quantum field theory, the universe can be thought of not as isolated particles but continuous fluctuating fields: matter fields, whose quanta are fermions (i.e. leptons and quarks), and force fields, whose quanta are bosons (e.g. photons and gluons). All these fields have zero-point energy.[2] These fluctuating zero-point fields lead to a kind of reintroduction of an aether in physics,[1][3] since some systems can detect the existence of this energy. However this aether cannot be thought of as a physical medium if it is to be Lorentz invariant such that there is no contradiction with Einstein's theory of special relativity.[1]
Physics currently lacks a full theoretical model for understanding zero-point energy; in particular the discrepancy between theorized and observed vacuum energy is a source of major contention.[4] Physicists Richard Feynman and John Wheeler calculated the zero-point radiation of the vacuum to be an order of magnitude greater than nuclear energy, with a single light bulb containing enough energy to boil all the world's oceans.[5] Yet according to Einstein's theory of general relativity any such energy would gravitate[citation needed] and the experimental evidence from both the expansion of the universe, dark energy and the Casimir effect show any such energy to be exceptionally weak. A popular proposal that attempts to address this issue is to say that the fermion field has a negative zero-point energy while the boson field has positive zero-point energy and thus these energies somehow cancel each other out.[6][7] This idea would be true if supersymmetry were an exact symmetry of nature. However, the LHC at CERN has so far found no evidence to support supersymmetry. Moreover, it is known that if supersymmetry is valid at all, it is at most a broken symmetry, only true at very high energies, and no one has been able to show a theory where zero-point cancellations occur in the low energy universe we observe today.[7] This discrepancy is known as the cosmological constant problem and it is one of the greatest unsolved mysteries in physics. Many physicists believe that "the vacuum holds the key to a full understanding of nature".[8] 
- Anshuman Pattnaik to Bug Bounty Forum
Hello,
I just wanted to share my RECON steps, I am following the below steps for every target.
1. Burp-Suite - (Param Miner)
2. Dirsearch
3. Burp-Collaborator - SSRF exploits
4. sqlmap - SQLi exploits
5. amass - subdomain enumeration
6. Nmap & Nikto - Information Gathering
I need your valuable tips on RECON
Thanks
- Where there is big business, there is a big demand, a reality that has led to the emergence of "sand mafias." These groups take over private land or ignore environmental restrictions and drain resources to the point of collapse.
The UN Environment Program says half the sand used for commercial purposes in Morocco comes from illegal sand extraction. In India, taking on these violent groups can put your life at risk: In March 2018, investigative journalist Sandeep Sharma was killed by a truck in the Bhind district in northern India after he published two reports which allegedly highlighted police involvement with sand gangs. Kenya, Cambodia, Mexico, China and Vietnam have also become prey to this thuggery. While sand smuggling can happen across international borders,Vince Beiser, the author of The World in a Grain, says "sand mafias" mostly prefer to work in-country, where transport costs are considerably lower. 
https://www.dw.com/en/audio-fingerprinting-the-secrets-of-sand-begin-to-emerge/a-50985105
Leo: This guy's walking down a street when he falls in a hole. The walls are so steep, he can't get out. A doctor passes by, and the guy shouts up, "Hey you, can you help me out?" The doctor writes a prescription, throws it down in the hole and moves on. Then a priest comes along, and the guy shouts up "Father, I'm down in this hole, can you help me out?" The priest writes out a prayer, throws it down in the hole and moves on. Then a friend walks by. "Hey Joe, it's me, can you help me out?" And the friend jumps in the hole. Our guy says, "Are you stupid? Now we're both down here." The friend says, "Yeah, but I've been down here before, and I know the way out." [pause] Long as I got a job, you got a job, you understand?
- Those experiments have already yielded tantalizing but inconclusive results. Earlier this year, for example, researchers showed the process of photosynthesis—whereby organisms make food using light—may involve some quantum effects. How birds navigate or how we smell also suggest quantum effects may take place in unusual ways within living things. But these only dip a toe into the quantum world. So far, no one has ever managed to coax an entire living organism—not even a single-celled bacterium—into displaying quantum effects such as entanglement or superposition.
So a new paper from a group at the University of Oxford is now raising some eyebrows for its claims of the successful entanglement of bacteria with photons—particles of light. Led by the quantum physicist Chiara Marletto and published in October in the Journal of Physics Communications, the study is an analysis of an experiment conducted in 2016 by David Coles from the University of Sheffield and his colleagues. In that experiment Coles and company sequestered several hundred photosynthetic green sulfur bacteria between two mirrors, progressively shrinking the gap between the mirrors down to a few hundred nanometers—less than the width of a human hair. By bouncing white light between the mirrors, the researchers hoped to cause the photosynthetic molecules within the bacteria to couple—or interact—with the cavity, essentially meaning the bacteria would continuously absorb, emit and reabsorb the bouncing photons. The experiment was successful; up to six bacteria did appear to couple in this manner.
Marletto and her colleagues argue the bacteria did more than just couple with the cavity, though. In their analysis they demonstrate the energy signature produced in the experiment could be consistent with the bacteria’s photosynthetic systems becoming entangled with the light inside the cavity. In essence, it appears certain photons were simultaneously hitting and missing photosynthetic molecules within the bacteria—a hallmark of entanglement. “Our models show that this phenomenon being recorded is a signature of entanglement between light and certain degrees of freedom inside the bacteria,” she says.
According to study co-author Tristan Farrow, also of Oxford, this is the first time such an effect has been glimpsed in a living organism. “It certainly is key to demonstrating that we are some way toward the idea of a ‘Schrödinger’s bacterium,’ if you will,” he says. And it hints at another potential instance of naturally emerging quantum biology: Green sulfur bacteria reside in the deep ocean where the scarcity of life-giving light might even spur quantum-mechanical evolutionary adaptations to boost photosynthesis.
- Ray Henry The best way to get the truth about a story like this is to ask the people whose jobs are supposedly in jeopardy. Based on the comments I'm seeing, it looks the the article is more fear than fact.
"If you don't read the newspaper, you are uninformed. If you do, you are misinformed."
--Mark Twain (apocryphal)
- “The only thing necessary for the triumph of evil is for good men to do nothing.”― Edmund Burke (in a letter addressed to Thomas Mercer).
- Prime Minister Benjamin Netanyahu said in a statement shortly after Monday’s incident that the Syrian army “tried to harm an Israeli plane, it didn’t succeed.”
“Our policy is clear – we are not prepared to tolerate any aggression against us, we will retaliate against it forcefully and decisively,” the statement said.
- He said Iran was willing to "extend the hand of friendship and brotherhood" to Persian Gulf nations and was "even ready to forgive their past mistakes."
"Those who want to link the region's incidents to the Islamic Republic of Iran are lying like their past lies that have been revealed," he said.
"If they are truthful and really seek security in the region, they must not send weapons, fighter jets, bombs and dangerous arms to the region."
Mr Rouhani added that the US and Western nations should "distance" themselves from the region.
"Your presence has always been a calamity for this region and the farther you go from our region and our nations, the more security would come for our region," he said.
He said Iran's plan would focus on providing security in the Persian Gulf, the Strait of Hormuz and the Gulf of Oman "with help from regional countries."

Dodgy Job Contract Clauses, Random Stuff, and More

- in this post we'll be going through dodgy job contract clauses. Ironically, many of which are actually unlawful and unenforceable on c...