Why Is There So Little Talk About Jill Stein Sitting At Putin’s Table?

Jill Stein looking very photogenic in front of the Kremlin! Perhaps she’s too insignificant to be a Kremlin agent, enjoying her stay as Putin’s guest while on “vacation”? Very interesting post Gronda!

Gronda Morin

Both Jill Stein and Mike Flynn are sitting at table with Russian President Putin Both Jill Stein and Mike Flynn are sitting at table with Russian President Putin

There has been a lot of talk about the retired Lt. General Mike Flynn who recently resigned as our republican Donald Trump’s National Security Advisor, having ties to Russia. But my question is, why are there not more questions of the Green party’s candidate, Jill Stein along these lines”

The former U.S. National Security Advisor Gen. Mike Flynn resigned after it was reported on 2/9/17 that he did discuss with the US Russian ambassador, the issue of recent US sanctions placed against Russia in retaliation for its meddling into the 2016 US presidential elections, and that this event occurred before 1/20/17 while President Barack Obama was still in office. He then misled Vice President Mike Pence, as the vice president kept publicly defending General Flynn.

Department of Defense's Defense Intelligence Agency Director, Lt. Gen. Michael Flynn testifies on Capitol Hill in Washington, Thursday, April 11, 2013, before the House Intelligence Committee hearing on worldwide threats. (AP Photo/Manuel Balce Ceneta) Michael Flynn (AP Photo/Manuel Balce Ceneta)

The retired general has a history as…

View original post 710 more words

Hacker Shows How Easy It Is To Hack People While Walking Around in Public

Source:   http://thehackernews.com/2017/02/hacking-in-public.html


Wi-Fi enabled devices — widely known as the Internet of Things (IoT) — are populating offices and homes in greater and greater numbers.

From smartphones to connected printers and even coffee makers, most of these IoT devices have good intentions and can connect to your company’s network without a problem.

However, as the Internet of Things (IoT) devices are growing at a great pace, they continue to widen the attack surface at the same time, giving attackers a large number of entry points to affect you some or the other way.

The attackers can use your smart devices to gain backdoor entry to your network, giving them the capability to steal sensitive data, such as your personal information, along with a multitude of other malicious acts.

An interesting attack scenario has recently been demonstrated by one of the renowned hackers, Jayson Street, who said all it is needed is to walk around with the right device to get into someone’s device.

Before we jump into the technical details of the attack, let’s watch out a video showing that how easy it is to hack smartphones and laptops in a crowded place by setting up an EvilAP (malicious access point).

Here’s How the Attack Works:

Hacker Shows How Easy It Is To Hack People While Walking Around in Public

Street used a simple penetration testing device and an internet connection to pwn people around him.

Technically, Street hacking device automatically set up an ‘Evil Twin Attack,’ in which an attacker fools wireless users into connecting their smartphones and laptops to an evil (malicious) hotspot by posing as a legitimate WiFi provider.

Once connected, all of the victim’s information flows directly into the attacker’s device, allowing cybercriminals to secretly eavesdrop on the network traffic and steal passwords, financial and other sensitive data and even redirect you to malware and phishing sites.

How to Prevent Evil Twin WiFi Attacks

Pwnie Express released its yearly industry report: Internet of Evil Things, providing insight on products that the IT professionals should be wary of.
Using the report and additional information from security researchers at Pwnie, we have listed five quick steps you can implement in order to prevent yourself or your workplace from being compromised.

1. Turn your WiFi Off: Turn off Wi-Fi devices when you are not using them, especially on the weekends — it saves energy and minimizes your exposure to hackers.

2. Use it or Lose it: Once the product is in your office, turn off the functions you aren’t using. Enabled functionality usually comes with increased security risks.

Also, make sure you review the products before you bring them into the workplace. If it is already there, do not be shy about calling customer service and walking through the steps required to shut down any unused functions.

3. Change Your Passwords: It is important never to use the default credentials. Set up strong, secure passwords to secure your devices.

4. Research Your Purchase: Before you even buy a product, always research what you’re buying and make sure you know how to update any software associated with that device.

Look for devices, systems, and services that make it easy to upgrade the device and inform the end user when updates are available.

5. Trust and Verify Every Device: Be aware of any device from brands known to have more security issues than others. The personalization of corporate hardware, including mobile hotspot vendors, is one of the top threats to network security.

Mohit Kumar - Hacking News
Entrepreneur, Hacker, Speaker, Founder and CEO — The Hacker News and The Hackers Conference.