What the ! ! No Way ! What did I just watch ? ?

This guy outsings Celine by a mile, I’m sure she’s jealous. Wow, Filipinos are the best karaoke singers PERIOD, thx for sharing!

renxkyoko's space

Hi, Renxkyoko Iglesias here !

I got an email from a  friend who informed  me about this Filipino singer  who sang LIVE on this popular Philippine radio station WISH FM 107.5 BUS that has a YouTube Channel . This radio station is inside a bus and is always on the road, and features local artists , mostly amateurs…… so, anyways, I got to watch and listen to this guy named Marcelito Pomoy, who just blew my brains off.  I mean, what the heck ! ! !   He’s freakin’ insane !

You guys, seriously , you just have to  watch this. He sings The Prayer, a Celine Dion – Andrea Bocelli duet.

Spoiler Alert ! !  He sings a duet with himself ! ! !

I swear, Filipinos love for karaoke does wonders.  Or , maybe Filipinos’ musical talent  is genetic, ( the best in Asia, and that’s a fact…… I’m supposed to…

View original post 60 more words

Hacker News: WikiLeaks Reveals CIA Teams Up With Tech to Collect Ideas For Malware Development


As part of its ongoing Vault 7 leaks, the whistleblower organisation WikiLeaks today revealed about a CIA contractor responsible for analysing advanced malware and hacking techniques being used in the wild by cyber criminals.

According to the documents leaked by WikiLeaks, Raytheon Blackbird Technologies, the Central Intelligence Agency (CIA) contractor, submitted nearly five such reports to CIA as part of UMBRAGE Component Library (UCL) project between November 2014 and September 2015.

These reports contain brief analysis about proof-of-concept ideas and malware attack vectors — publically presented by security researchers and secretly developed by cyber espionage hacking groups.

Reports submitted by Raytheon were allegedly helping CIA’s Remote Development Branch (RDB) to collect ideas for developing their own advanced malware projects.

It was also revealed in previous Vault 7 leaks that CIA’s UMBRAGE malware development teams also borrow codes from publicly available malware samples to built its own spyware tools.

Here’s the list and brief information of each report:

Report 1 — Raytheon analysts detailed a variant of the HTTPBrowser Remote Access Tool (RAT), which was probably developed in 2015.

The RAT, which is designed to capture keystrokes from the targeted systems, was being used by a Chinese cyber espionage APT group called ‘Emissary Panda.’

Report 2 — This document details a variant of the NfLog Remote Access Tool (RAT), also known as IsSpace, which was being used by Samurai Panda, Identified as another Chinese hacking group.

Equipped with Adobe Flash zero-day exploit CVE-2015-5122 (leaked in Hacking Team dump) and UAC bypass technique, this malware was also able to sniff or enumerate proxy credentials to bypass Windows Firewall.

Report 3 — This report contains details about “Regin” — a very sophisticated malware sample that has been spotted in operation since 2013 and majorly designed for surveillance and data collection.

Regin is a cyber espionage tool, which is said to be more sophisticated than both Stuxnet and Duqu and is believed to be developed by the US intelligence agency NSA.

The malware uses a modular approach that allowed an operator to enable a customised spying. Regin’s design makes the malware highly suited for persistent, long-term mass surveillance operations against targets.

Report 4 — It details a suspected Russian State-sponsored malware sample called “HammerToss,” which was discovered in early 2015 and suspected of being operational since late 2014.

What makes HammerToss interesting is its architecture, which leverages Twitter accounts, GitHub accounts, compromised websites, and Cloud-storage to orchestrate command-and-control functions to execute the commands on the targeted systems.

Report 5 — This document details the self-code injection and API hooking methods of information stealing Trojan called “Gamker.”

Gamker uses simple decryption, then drops a copy of itself using a random filename and injects itself into a different process. The trojan also exhibits other typical trojan behaviours.

Previous Vault 7 CIA Leaks

Last week, WikiLeaks revealed CIAs Highrise Project that allowed the spying agency to stealthy collect and forwards stolen data from compromised smartphones to its server through SMS messages.

Since March, the whistle-blowing group has published 17 batches of “Vault 7” series, which includes the latest and last week leaks, along with the following batches:

  • BothanSpy and Gyrfalcon — two alleged CIA implants that allowed the spying agency to intercept and exfiltrate SSH credentials from targeted Windows and Linux operating systems using different attack vectors.
  • OutlawCountry – An alleged CIA project that allowed it to hack and remotely spy on computers running the Linux operating systems.
  • ELSA – the alleged CIA malware that tracks geo-location of targeted PCs and laptops running the Microsoft Windows operating system.
  • Brutal Kangaroo – A tool suite for Microsoft Windows used by the agency to targets closed networks or air-gapped computers within an organisation or enterprise without requiring any direct access.
  • Cherry Blossom – An agency’s framework, basically a remotely controllable firmware-based implant, used for monitoring the Internet activity of the targeted systems by exploiting vulnerabilities in Wi-Fi devices.
  • Pandemic – A CIA’s project that allowed the agency to turn Windows file servers into covert attack machines that can silently infect other computers of interest inside a targeted network.
  • Athena – A CIA’s spyware framework that has been designed to take full control over the infected Windows PCs remotely, and works against every version of Microsoft’s Windows operating systems, from Windows XP to Windows 10.
  • AfterMidnight and Assassin – Two alleged CIA malware frameworks for the Microsoft Windows platform that has been designed to monitor and report back actions on the infected remote host computer and execute malicious actions.
  • Archimedes – Man-in-the-middle (MitM) attack tool allegedly created by the CIA to target computers inside a Local Area Network (LAN).
  • Scribbles – A piece of software allegedly designed to embed ‘web beacons’ into confidential documents, allowing the spying agency to track insiders and whistleblowers.
  • Grasshopper – Framework that allowed the spying agency to easily create custom malware for breaking into Microsoft’s Windows and bypassing antivirus protection.
  • Marble – Source code of a secret anti-forensic framework, basically an obfuscator or a packer used by the CIA to hide the actual source of its malware.
  • Dark Matter – Hacking exploits the agency designed to target iPhones and Macs.
  • Weeping Angel – Spying tool used by the agency to infiltrate smart TV’s, transforming them into covert microphones.
  • Year Zero – Alleged CIA hacking exploits for popular hardware and software.
Swati - Hacking News
Technical Writer, Security Blogger and IT Analyst. She is a Technology Enthusiast with a keen eye on the Cyberspace and other tech related developments.

Hacker News: Hackers Stole $32 Million in Ethereum; 3rd Heist in 20 Days


An unknown hacker has just stolen nearly $32 million worth of Ethereum – one of the most popular and increasingly valuable cryptocurrencies – from Ethereum wallet accounts linked to at least three companies that seem to have been hacked.

This is the third Ethereum cryptocurrency heist that came out two days after an alleged hacker stole $7.4 million worth of Ether from trading platform CoinDash, and two weeks after an unknown attacker hacked into South Korean cryptocurrency exchange Bithumb and stole more than $1 Million in Ether and Bitcoins from user accounts.

On Wednesday, Smart contract coding company Parity issued a security alert, warning of a critical vulnerability in Parity’s Ethereum Wallet software, which is described as “the fastest and most secure way of interacting with the Ethereum network.”

Exploiting the vulnerability allowed attackers to compromise at least three accounts and steal nearly 153,000 units of Ether worth just almost US$32 million at the current price.


The attack started late Tuesday and continued on Wednesday, resulting in a total of three transactions, which can be seen on Etherscan.io. The three victims of the attack identified are:

Parity says the vulnerability affected the contract used to create multi-signature Ethereum wallets in Parity version 1.5 or later, warning its users to move their Ether from their in-browser wallets to more secure accounts immediately.

White Hat Hackers Group Holds $75 Million Worth of Ethereum


Yes, 377,000 more Ether worth over $75 Million were also drained by white hat hackers.

As the attack began, a group of white hat hackers used the same exploit to drain approximately 377,000 Ether from other vulnerable wallets into holding accounts in order to protect them from black hat hackers, Coindesk reports.

The Whitehats are currently holding the rescued funds and has promised to return the funds to their owners once this security threat passed.

“The White Hat Group were made aware of a vulnerability in a specific version of a commonly used multisig contract. This vulnerability was trivial to execute, so they took the necessary action to drain every vulnerable multisig they could find as quickly as possible,” White Hats wrote on Reddit.

“We will be creating another multisig for you that has the same settings as your old multisig but with the vulnerability removed and we will return your funds to you there.”

The company has just released an updated version of the Parity software fixing the vulnerability.

Swati - Hacking News
Technical Writer, Security Blogger and IT Analyst. She is a Technology Enthusiast with a keen eye on the Cyberspace and other tech related developments.

New Study Reveals Regular Consumption of Marijuana Keeps You thin, Fit, and Active

Finally the truth revealed

Tales from the Conspiratum

According to the researchers of this latest study, people who use marijuana more than five times per month have a lower Body Mass Index

Source: New Study Reveals Regular Consumption of Marijuana Keeps You thin, Fit, and Active


A new study by a group of scientists from Oregon Health and Science University in the United States has revealed that regular users of marijuana are fit and active than non-users of the plant.

Marijuana has long suffered image assassination. The plant has previously been portrayed as a gateway drug as well as a substance that contributes to crime. It has also been associated with laziness and failure. Consumers of the plant are therefore scorned and ridiculed. But thanks to the recent studies, these negative stereotypes are fast changing. Marijuana is increasingly becoming popular, especially in the U.S.

According to the latest study, people who…

View original post 310 more words

Graham Hancock speaks at Cannabis Hemp Conference and Expo, Vancouver, Canada (34 min)

Tales from the Conspiratum

End of the Inquisition? Cognitive liberty, adult sovereignty, and the legalization of cannabis
Cannabis Hemp Conference and Expo
The NEST, University of British Columbia, Vancouver, Canada
May 6-7th, 2017

Watch more conference videos and stay informed by signing up at:


Graham Hancock is the author of the major international non-fiction bestsellers The Sign and the Seal, Fingerprints of the Gods, The Message of the Sphinx, Heaven’s Mirror, Underworld and Supernatural, and of the epic adventure novels Entangled and War God. His books have sold more than seven million copies worldwide and have been translated into thirty languages. His public lectures, radio and TV appearances, including two major TV series, Quest For The Lost Civilization and Flooded Kingdoms of the Ice Age, as well as his censored TEDx talk The War on Consciousness and his strong presence on the internet, have put his ideas before audiences of tens of millions…

View original post 57 more words