Tag Archives: Tools

Best Bar Tools for Your Home Bar

Best Bar Tools for Your Home Bar



Yahoo News – Latest News & Headlines

X-ray images show tools Khashoggi killers brought to Istanbul, Turkish paper claims

X-ray images show tools Khashoggi killers brought to Istanbul, Turkish paper claimsThe 15-strong Saudi kill team responsible for the murder of columnist Jamal Khashoggi carried luggage containing scissors, syringes and a stun gun, a pro-government Turkish paper has claimed. Sabah, a daily newspaper headquartered in Istanbul, published images on Tuesday purported to be airport X-ray scans of the team's bags as they left Istanbul for Riyadh on October 2, the day of Mr Khashoggi’s murder.  A number of tools and pieces of equipment can be seen, including walkie-talkies, a signal jammer and a pair of scissors.  The bags were loaded onto two private jets but police were not able to open them due to diplomatic immunity, according to the report. The paper, which is close to Turkish president Recep Tayyip Erdogan’s ruling Justice and Development Party (AKP), is one of a number of outlets that has published a steady stream of leaks providing lurid details of Khashoggi’s death, a tactic seemingly designed to keep pressure on Riyadh and its allies. How the disappearance of Jamal Khashoggi unfolded Mr Khashoggi, a regular contributor to the Washington Post, was killed in the kingdom’s Istanbul consulate while attempting to secure paperwork that would allow him to remarry.  According to Istanbul’s chief prosecutor, he was strangled and his body dismembered soon after entering the building.  Saudi officials initially denied all involvement but in the face of mounting international outrage admitted that the columnist had been killed as part of a “rogue” operation. The X-ray images were published as the New York Times reported that in an audio recording of the killing, one of the team responsible can be heard instructing a superior to "tell your boss" after the murder takes place, a suspected reference to Mohammed bin Salman, the Saudi crown prince.  Khashoggi was once close to the royal family but went into self-imposed exile last year and had since been critical of the Crown Prince in his writing. Mr Erdogan described the tape as a “calamity” this week and said it shocked even a Saudi intelligence officer who listened to it, according to local media. The Turkish president added that orders for the killing came from the highest levels of the kingdom.



Yahoo News – Latest News & Headlines

Putin warns of risks of governments creating hacking tools

Putin warns of risks of governments creating hacking toolsRussian President Vladimir Putin said on Monday that intelligence services should beware of creating software that can later be used for malicious means – a reference to global ‘ransomware’ attacks that researchers say exploited a hacking tool built by the U.S. National Security Agency. Speaking to reporters in Beijing, where he is taking part in a conference, Putin said that there was no significant damage to Russian institutions, including its banking and healthcare systems, from the computer worm known as WannaCry. As regards the source of these threats, I believe that the leadership of Microsoft have announced this plainly, that the initial source of the virus is the intelligence services of the United States,” Putin said.



Yahoo News – Latest News & Headlines

Global Ransomware Attack Could Have Happened Using NSA Tools

Global Ransomware Attack Could Have Happened Using NSA ToolsAround 75,000 attacks in 99 countries had been reported at the time of writing.



Yahoo News – Latest News & Headlines

Symantec attributes 40 cyber attacks to CIA-linked hacking tools

Symantec attributes 40 cyber attacks to CIA-linked hacking toolsBy Joseph Menn SAN FRANCISCO (Reuters) – Past cyber attacks on scores of organizations around the world were conducted with top-secret hacking tools that were exposed recently by the Web publisher Wikileaks, the security researcher Symantec Corp said on Monday. The files posted by WikiLeaks appear to show internal CIA discussions of various tools for hacking into phones, computers and other electronic gear, along with programming code for some of them, and multiple people familiar with the matter have told Reuters that the documents came from the CIA or its contractors. Symantec said it had connected at least 40 attacks in 16 countries to the tools obtained by WikiLeaks, though it followed company policy by not formally blaming the CIA.     The CIA has not confirmed the Wikileaks documents are genuine.



Yahoo News – Latest News & Headlines

Dodge Challenger SRT Demon Crate Holds Tools to Prep for the Track

Dodge Challenger SRT Demon Crate Holds Tools to Prep for the TrackThe 2018 Dodge Challenger SRT Demon is a few weeks from its official debut, but that hasn’t stopped the company from teasing yet more information about the track-ready machine. Dubbed the Demon Crate, a collection of custom Snap-on tools will help transform the Demon from street sensibility to drag duty.



Yahoo News – Latest News & Headlines

These messaging apps are safe from all of the CIA’s known hacking tools

These messaging apps are safe from all of the CIA’s known hacking tools

News organization have been abuzz this week following the release of a new WikiLeaks document dump detailing the hacking tools used by the CIA to spy on Americans. Of the countless worrisome discoveries made possible by the leaked documents, one of the most frightening was the assertion that the CIA is capable of "bypassing" encrypted messaging apps such as Signal and WhatsApp. This detail was widely reported throughout the week, but according to the New York Times, those reports are overblown.

The Times reports that following the dump, security researchers used automated tools to search the entire database and couldn't find a single mention of any popular encrypted messaging apps. That means top messaging apps like WhatsApp, Signal, Wickr and Apple's own iMessage platform are all safe from the CIA's prying eyes.

Additionally, "the hacking methods described in the documents do not, in fact, include the ability to bypass such encrypted apps." While a member of the intelligence community might be able to access your WhatsApp by taking control of your phone, the app itself isn't vulnerable, at least not according to the documents.

As the Times surmises, reporters seem to fundamentally misunderstand what these documents actually reveal. End-to-end encryption means that no one can aside from the two participants can access the conversation, including the company that developed the app. The tools that the leaked documents describe focus on "techniques for hacking into individual phones," which would subsequently give the CIA (or anyone else who hacked your phone) the ability to see anything they want to see.

While this is also troublesome, it's a different story than if the CIA had developed a tool to "bypass" encryption altogether. Instead, it seems to reinforce the idea that encrypted communication is working. Otherwise, why would the CIA be hacking into individual devices rather than massive network of app users?

"If anything in the WikiLeaks revelations is a bombshell, it is just how strong these encrypted apps appear to be. Since it doesn’t have a means of easy mass surveillance of such apps, the C.I.A. seems to have had to turn its attention to the harder and often high-risk task of breaking into individual devices one by one."

Had WikiLeaks not willfully deceived the public with tweets about "hacking malware" that could "infest" mobile devices and "bypass" encryption of apps like Signal and Confide, this clarification might not be necessary. But once again, there appears to be a story behind the story being pushed by WikiLeaks.



Yahoo News – Latest News & Headlines

WikiLeaks offers CIA hacking tools to tech companies – Assange

WikiLeaks offers CIA hacking tools to tech companies - AssangeBy Dustin Volz and Joseph Menn WASHINGTON/SAN FRANCISCO (Reuters) – Wikileaks will provide technology companies with exclusive access to CIA hacking tools that it possesses so they can patch software flaws, founder Julian Assange said on Thursday, presenting Silicon Valley with a potential dilemma on how to deal with the anti-secrecy group. If the offer is legitimate, it would place technology companies in the unusual position of relying on Assange, a man believed by some U.S. officials and lawmakers to be an untrustworthy pawn of Russian President Vladimir Putin, to share cyber vulnerabilities stockpiled by a secretive U.S. spy agency. It was not clear how WikiLeaks intended to cooperate with the companies.



Yahoo News – Latest News & Headlines

WikiLeaks Publishes Massive Archive of CIA Hacking Tools

WikiLeaks Publishes Massive Archive of CIA Hacking ToolsJulian Assange is back, this time purportedly exposing some of Langley’s most sensitive secrets.



Yahoo News – Latest News & Headlines

Supporting the HIV-Positive Community Requires New Tools for Ending Stigma

Supporting the HIV-Positive Community Requires New Tools for Ending StigmaWe begin 2015 having won many victories for the LGBT community in 2014, among them some victories in the HIV arena. The fight against HIV includes some important milestones. Breakthrough research studies show new data on the transmission of HIV between partners with varying viral loads. New approved uses for medications can prevent the spread…



Sexual Health News Headlines – Yahoo! News