TOPIC: FAN-SUBMITTED


 

 

SOURCE:  ARTEMUS FAN, RANDY LARSEN

Zero Days is a must-see video for all students of national security. Zero Days includes interviews with Michael Hayden, Gary Samore, Richard Clarke, plus DHS Chief of Cyber Defense.  

In addition to a superb account of Stuxnet (actual name, Olympic Games), it provides details on the Iranian retaliatory attacks, far more sophisticated offensive weapons, and the most important issue—controlling cyber weapons.  

One can view Zero Days through Amazon for $7.00.  http://www.zerodaysfilm.com

WATCH THE OFFICIAL TRAILER HERE:  https://www.youtube.com/watch?v=C8lj45IL5J4
 

TOPIC: FAN-SUBMITTED

 

                                                                       

 

SOURCE:  ARTEMUS FAN, RANDY LARSEN

I am making a documentary about 2,300 7th Day Adventist conscientious objectors who volunteered for human testing in the Army biodefense program at Ft Detrick 1954-73. I plan to have it released on Veterans Day.
 
"Hacksaw Ridge" is also coming out in November. It is about Desmond Doss, the Seventh-Day Adventist conscientious objector who was awarded the Medal of Honor. I have read many MOH citations, but never one as incredible as this one.
 
WATCH THE "HACKSAW RIDGE" TRAILER HERE:  https://www.youtube.com/watch?v=s2-1hz1juBI

TOPIC: FAN-SUBMITTED


 

 

SOURCE:  news.siteintelgroup.com courtesy of FAN Steve Jones!

ISIS fighters in Afghanistan claimed to have recently seized a trove of sensitive U.S. military equipment – including communications gear, a rocket launcher and the ID card of a U.S. soldier –but it remains unclear how the items came into the terror group’s possession.

There was no immediate information on when the pictures, posted to social media on Saturday, were taken, though the U.S. soldier’s ID expires in 2017, a possible sign the photos are relatively fresh. There was also no information on how the extremists captured the gear.

The American soldier whose identification was pictured, U.S. Army Specialist Ryan Jay Larson, was not captured by ISIS, Brigadier General Charlie Cleveland told Fox News on Sunday.

“Obviously, SPC Larson is not captured – he is accounted for and with his unit despite having lost his ID card and possibly some of his equipment during recent operations,” Cleveland said in an email. “Beyond that, there is a lot of equipment in those pictures. 

“At this point, we don't know if all of the equipment in the pictures was lost during recent operations or at some other time in the past.”

TOPIC: CYBERSECURITY

 

 

 

SOURCE: fortune.com

Companies still use outdated technology, and hackers are using abandoned websites for their schemes.

Companies are still using outdated technology leaving them prone to cyber attacks, security researchers are losing their confidence, and hackers are making millions of dollars through so-called ransomware attacks.

These are some of the findings detailed in Cisco’s annual report on the state of cybersecurity based on research the company obtained from customers, outside security analysts, and its networking devices connected to the Internet.

Here’s five interesting takeaways from the big report:

1. Hackers love ransomware

Cisco’s  CSCO 0.79%  latest security report confirms that recent ransomware attacks on hospitalsuniversities, and even some utility services, are on the rise. Using a type of malware known as ransomware, hackers can cut access to computer networks and systems and encrypt documents from victims until they receive payment. The report said that 9,515 people end up paying ransoms each month. The average ransom is $300 and hackers could make $34 million a year on ransomware attacks.

One way criminals pull off ransomware attacks is to create a fake website that contains a so-called Angler exploit kit. The Angler exploit kit essentially scans a person’s web browser to find security holes, and then transmits malware like the popular Cryptowall 3.0 and Bedep software that then locks down a person’s computer.

 

2. Adobe Flash is still bad for cybersecurity

Hackers continue to love using the Adobe Flash media player as a convenient way to penetrate computers because of its buggy nature and security holes. The report’s authors said that for 2016, “criminals are most likely to focus their exploits and attacks on Adobe Flash users,” and they expect hackers to continue exploiting Flash’s vulnerabilities for some time.

The good news is that with companies like Google  GOOG 3.07%  and Amazon  AMZN 0.82%  phasing outsupport for the media player in favor of newer technologies like the HTML5 coding language, attacks will likely decline over time.