The Internet - The first Worldwide Tool of Unification ("The End of History")

" ... Now I give you something that few think about: What do you think the Internet is all about, historically? Citizens of all the countries on Earth can talk to one another without electronic borders. The young people of those nations can all see each other, talk to each other, and express opinions. No matter what the country does to suppress it, they're doing it anyway. They are putting together a network of consciousness, of oneness, a multicultural consciousness. It's here to stay. It's part of the new energy. The young people know it and are leading the way.... "

" ... I gave you a prophecy more than 10 years ago. I told you there would come a day when everyone could talk to everyone and, therefore, there could be no conspiracy. For conspiracy depends on separation and secrecy - something hiding in the dark that only a few know about. Seen the news lately? What is happening? Could it be that there is a new paradigm happening that seems to go against history?... " Read More …. "The End of History"- Nov 20, 2010 (Kryon channelled by Lee Carroll)

"Recalibration of Free Choice"– Mar 3, 2012 (Kryon Channelling by Lee Carroll) - (Subjects: (Old) Souls, Midpoint on 21-12-2012, Shift of Human Consciousness, Black & White vs. Color, 1 - Spirituality (Religions) shifting, Loose a Pope “soon”, 2 - Humans will change react to drama, 3 - Civilizations/Population on Earth, 4 - Alternate energy sources (Geothermal, Tidal (Paddle wheels), Wind), 5 – Financials Institutes/concepts will change (Integrity – Ethical) , 6 - News/Media/TV to change, 7 – Big Pharmaceutical company will collapse “soon”, (Keep people sick), (Integrity – Ethical) 8 – Wars will be over on Earth, Global Unity, … etc.) - (Text version)

“…5 - Integrity That May Surprise…

Have you seen innovation and invention in the past decade that required thinking out of the box of an old reality? Indeed, you have. I can't tell you what's coming, because you haven't thought of it yet! But the potentials of it are looming large. Let me give you an example, Let us say that 20 years ago, you predicted that there would be something called the Internet on a device you don't really have yet using technology that you can't imagine. You will have full libraries, buildings filled with books, in your hand - a worldwide encyclopedia of everything knowable, with the ability to look it up instantly! Not only that, but that look-up service isn't going to cost a penny! You can call friends and see them on a video screen, and it won't cost a penny! No matter how long you use this service and to what depth you use it, the service itself will be free.

Now, anyone listening to you back then would perhaps have said, "Even if we can believe the technological part, which we think is impossible, everything costs something. There has to be a charge for it! Otherwise, how would they stay in business?" The answer is this: With new invention comes new paradigms of business. You don't know what you don't know, so don't decide in advance what you think is coming based on an old energy world. ..."
(Subjects: Who/What is Kryon ?, Egypt Uprising, Iran/Persia Uprising, Peace in Middle East without Israel actively involved, Muhammad, "Conceptual" Youth Revolution, "Conceptual" Managed Business, Internet, Social Media, News Media, Google, Bankers, Global Unity,..... etc.)


German anti-hate speech group counters Facebook trolls

German anti-hate speech group counters Facebook trolls
Logo No Hate Speech Movement

Bundestag passes law to fine social media companies for not deleting hate speech

Honouring computing’s 1843 visionary, Lady Ada Lovelace. (Design of doodle by Kevin Laughlin)

Wednesday, January 2, 2008

Boom times for hi-tech criminals

By Mark Ward, Technology Correspondent, BBC News website

Starting a career as a cyber criminal got much easier in 2007.

So say security experts looking back on 12 months in which hi-tech gangs took control of the net's underground.

The economy supporting these groups has matured so much that now everything from virus-writing kits to spam-spewing zombies are available for rent or hire.

This has helped to fuel, say security professionals, rapid growth in the methods criminals use to catch out PC users and steal saleable data.

Money game

"2007 was a fairly interesting year," said Joe Telafici, vice president of operations for McAfee's Avert Labs, "cyber crime continued to fuel most of the security attacks we saw."

It was a year, he said, which saw the effective extinction of young hackers who wrote viruses and other malicious programs for fun.

Now, he said, Windows malware was all about money.

Some attacks, such as phishing runs, were clearly about stealing cash from victims either from a credit card or bank account.

But, he said, many others that looked more innocuous were done with money in mind. For instance, he said, trojans placed in banner ads that try to hijack a home PC were all about getting hold of resources that can be rented out for a fee to spammers or other net-based criminals.

"There's a real eco-system built around this," he said.

Paul Henry, vice president of technology evangelism at Secure Computing said the tool of choice for many hi-tech criminals was the botnet - a collection of hijacked home PCs.

"Botnets are now a well-organised tool," he said. "They are at a point now where they are creating smaller botnets from larger ones."

This was being done, he said, because like all businessmen criminals were keen to make the most of their assets.

2007 saw news break about one of the biggest botnets ever created. The network got its name from spam e-mails sent in January that capitalised on interest in a series of severe European storms to infect a large number of Windows PCs.

Successive spam campaigns added to the numbers of machines in the Storm botnet and, though estimates vary, many believe it was made up of more than 1 million machines.

A ready market for the buying and selling of time on a botnet and the tools needed to put it to good use had sprung up, said Mr Henry.

"Commercial exploitation has brought the real value of these tools to the vast majority," he said.

One of the most widely known tools was the MPack kit which was created by a Russian hacker gang. Anyone buying it got included in the price a year of technical support that updated them with the latest vulnerabilities so it could be used time and again for attacks.

But, said Mr Telafici, this had created problems for some makers of malicious software.

"One kit developer recently threw in the towel because they could no longer get the margins they used to," he said.

"Instead they opened up the source and gave it away. There were just too many players in that space, it's too crowded."

Novel threats

This busy market was driving innovation, said Simon Heron, managing director of Network Box.

Windows XP on sale, PA

Windows remains the biggest target for hi-tech criminals

"We've seen attacks move away from sending e-mail with poisoned attachments to groups doing drive-by downloads," he said.

Some of those that used to send huge numbers of phishing e-mails were now indulging in "spear phishing" which brought together lots of bits of data to make the messages they send look much more convincing.

Mr Heron said he had seen campaigns targeted at a few hundred people such as the senior managers in a large firm.

"It's just fascinating seeing that this is happening," he said.

The move away from the old attack vector of e-mail meant troubled times for users, he said.

"The bad guys are becoming more sophisticated and that means its becoming more difficult to stay safe," he said.

Summing up Paul Henry from Secure Computing said 2007 was the year that hi-tech crime became firmly established and entrenched.

"I see no end to this," he said, "until we effectively reduce the value of personal information to the point where for the hackers it is useless."

No comments: