Espionage – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Fri, 07 Sep 2018 14:15:23 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Espionage – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Domestic Disappointments | TechSNAP 382 https://original.jupiterbroadcasting.net/127026/domestic-disappointments-techsnap-382/ Fri, 07 Sep 2018 06:15:23 +0000 https://original.jupiterbroadcasting.net/?p=127026 Show Notes: techsnap.systems/382

The post Domestic Disappointments | TechSNAP 382 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/382

The post Domestic Disappointments | TechSNAP 382 first appeared on Jupiter Broadcasting.

]]>
Don’t Panic & P your S | TechSNAP 310 https://original.jupiterbroadcasting.net/107531/dont-panic-p-your-s-techsnap-310/ Tue, 14 Mar 2017 21:23:24 +0000 https://original.jupiterbroadcasting.net/?p=107531 RSS Feeds: HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Malware found preinstalled on 38 Android phones used by 2 companies Malicious apps were surreptitiously added somewhere along the supply chain. Check Point didn’t disclose […]

The post Don’t Panic & P your S | TechSNAP 310 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Malware found preinstalled on 38 Android phones used by 2 companies

  • Malicious apps were surreptitiously added somewhere along the supply chain.

  • Check Point didn’t disclose the names of the companies that owned the infected phones. One of the affected parties was a “large telecommunications company” and the other was a “multinational technology company.”

  • It’s interesting how this came on out March 10 and the WikiLeaks notice about compromised cellphones came out a few days earlier. Coincidence?

“Vault 7” by WikiLeaks

  • A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

  • Among the more notable disclosures which, if confirmed, “would rock the technology world”, the CIA had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”

  • NOTE: From what I’ve read, this compromise involves first compromising the phone in question and as such is not an attack on the apps themselves.

  • Kreb’s coverage

  • Krebs says: “The documents for the most part don’t appear to include the computer code needed to exploit previously unknown flaws in these products, although WikiLeaks says those exploits may show up in a future dump. This collection is probably best thought of as an internal corporate wiki used by multiple CIA researchers who methodically found and documented weaknesses in a variety of popular commercial and consumer electronics.”

  • Krebs also says: “Some of the exploits discussed in these leaked CIA documents appear to reference full-on, remote access vulnerabilities. However, a great many of the documents I’ve looked at seem to refer to attack concepts or half-finished exploits that may be limited by very specific requirements — such as physical access to the targeted device.”

  • See also Espionage vs. Surveillance

  • Best advice: patch your shit, secure physical access, it is not as bad as WikiLeaks is making it out to be.


Feedback


Round Up:

+Silent Data Corruption Is Real


The post Don’t Panic & P your S | TechSNAP 310 first appeared on Jupiter Broadcasting.

]]>
Chinese Cyberwar Takeout | Unfilter 98 https://original.jupiterbroadcasting.net/57947/chinese-cyberwar-takeout-unfilter-98/ Wed, 21 May 2014 23:57:15 +0000 https://original.jupiterbroadcasting.net/?p=57947 After we breakdown the new NSA revelations, we’ll discuss the escalating “cyber tensions” between the US and China. And the recent high profile indictment that may have pushed China into the hands of Russia, sealing the largest gas deal of the century. Plus the explosive story from the North West, our follow up, and much […]

The post Chinese Cyberwar Takeout | Unfilter 98 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

After we breakdown the new NSA revelations, we’ll discuss the escalating “cyber tensions” between the US and China. And the recent high profile indictment that may have pushed China into the hands of Russia, sealing the largest gas deal of the century.

Plus the explosive story from the North West, our follow up, and much more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

\"Foo\"

— Show Notes —

NSA is Crazy

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas

\"SOMALGET\"/

  • In addition to the Bahamas, The Intercept‘s report also revealed NSA’s targeting of mobile networks in Mexico, Kenya and the Philippines.

According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system — code-named SOMALGET — that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country\’s cellular telephone network, enabling it to covertly record and store the \”full-take audio\” of every mobile call made to, from and within the Bahamas — and to replay those calls for up to a month.

All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere.

\"SOMALGET\"/

If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”

When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.”

\"NSA

The State Department considers the Bahamas both a \”major drug-transit country\” and a \”major money laundering country\” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets.

  • SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence.

Documents published with this article:

WikiLeaks vows to reveal second country where NSA is recording all mobile phone

— Thanks for Supporting Unfilter —

Become an Unfilter supporter on Patreon

\"Foo\"

  • Thanks to our 126 patrons!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


CYBER CHINER

\"5

The U.S. dramatically escalated its battle to curb China’s technology theft from American companies by accusing five Chinese military officials of stealing trade secrets, casting the hacker attacks as a direct economic threat.

China Arrests Former CEO Of JPMorgan Asia

Just one day after the FBI issues arrest warrants for 5 Chinese military officials, Caixin reports that Fang Fang – the former CEO of JPMorgan Asia – has been arrested in Hong Kong by the Independent Commission Against Corruption (or anti-graft agency).

​Russia and China seal historic $400bn gas deal

\"Russia

After 10 years of negotiations, Russia\’s Gazprom and China\’s CNPC have finally signed a historic gas deal which will provide the world\’s fastest growing economy with the natural gas it needs to keep pace for the next 30 years.

The total value of the contract is $400 billion, Gazprom CEO Aleksey Miller said. However, the price of gas stipulated in the document remains a \”commercial secret.\”

Assuming the overall price of the contract includes only the cost of supplies of Russian gas, then the $400 billion price tag means China will pay about $350 per 1,000 cubic meters. Delivery price for the contract will be tied to market oil prices, Putin said from Shanghai on Tuesday.

  • Last year, China consumed about 170 billion cubic meters of natural gas and is expected to consume 420 billion cubic meters per year by 2020.

Russia, China sign deal to bypass U.S. dollar

PHOTO: Vladimir Putin and Xi Jinping celebrate 'gas deal of the century' between Russia, China https://t.co/IMxSdjuyRH pic.twitter.com/6L1iNDQwHM

— RT (@RT_com) May 21, 2014

\”Breaking the dominance of the U.S. dollar in international trade between the BRICS is something that the group has been talking about for some time,\” said Chris Weafer, a founding partner of Macro-Advisory, a consultancy in Moscow. \”The Ukraine crisis and the threats voiced by the U.S. administration may well provide the catalyst for that to start happening.\”

China calls for new security pact with Russia, Iran

\"President

China\’s president called Tuesday for the creation of a new Asian structure for security cooperation based on a regional group that includes Russia and Iran and excludes the United States.


Weed Wackers:

More young children getting their hands on vaping devices

\"Cig

In 2010, Washington state had one report of an e-juice poisoning with kids under the age of 6. But the numbers steadily climbed each year to 51 in 2013. And already 39 cases so far in the first quarter of this year.

\"Elisabeth

\”So, why — I think parents would be concerned that this is something that is opening up in the NFL. No?\” she added, nodding her head in expectation of the guest\’s agreement.

Drug lab explosions set car on fire in Puyallup

Authorities in Puyallup, Washington, say a hash oil extraction operation ended in explosions that set a car afire Tuesday night.


If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Chinese Cyberwar Takeout | Unfilter 98 first appeared on Jupiter Broadcasting.

]]>
In NSA We Trust | Unfilter 61 https://original.jupiterbroadcasting.net/41037/in-nsa-we-trust-unfilter-61/ Wed, 31 Jul 2013 22:21:43 +0000 https://original.jupiterbroadcasting.net/?p=41037 XKeyscore has been exposed in a newly released presentation giving us a better picture of the system said to hold a three day buffer of all Internet activity.

The post In NSA We Trust | Unfilter 61 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A diagram that literally puts the NSA’s world wide spying system on the map has been exposed in a newly released presentation giving us a better picture of the surveillance system that is said to hold a three day buffer of all Internet activity.

Plus: An update on Bradley Manning, the Obama Administration pledges not to torture Snowden, and the US continues to dance around that big problem in Egypt.

Then it’s your feedback, our follow up, and much much more…

On this week’s Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


Violence in Egypt Over the Weekend

A coalition of human rights liberals and conservatives opposed to foreign aid is gaining strength. In mid-July, Senate Republicans John McCain and Lindsey Graham, two party leaders on foreign policy, called canceling military aid “right and necessary.” Though, Graham said Tuesday he’s reserving final judgment until he and McCain return next week from a trip to Egypt at President Obama’s behest.


– Thanks for Supporting Unfilter –

In a twist that television industry gawkers immediately homed in on, the victory was shared by Ms. Sawyer and one of her regular fill-ins, David Muir. That was because Mr. Muir substituted for Ms. Sawyer three nights last week — the same three nights, it turned out, that ABC beat NBC in the all-important ratings demographic. Mr. Williams prevailed, barely, on the two nights that Ms. Sawyer was at work.

This Week’s New Supporters:

  • Benjamin J
  • Craig T
  • Rex
  • Bertel K
  • Thanks to our 142 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience.

  • Become a Supporter


Manning Not Aiding the Enemy – Faces Years in Prison

A military judge on Tuesday found U.S. soldier Bradley Manning not guilty of aiding the enemy, the most serious charge he faced for handing over documents to WikiLeaks, but he still likely faces a long jail term after being found guilty of 19 other counts.

One of Manning’s most visible supporters was banned from the trial Friday after the judge said someone posted threats online. Clark Stoeckley, a college art instructor from New Jersey, confirmed he was the one booted.

Stoeckley attended the court-martial as a sketch artist, arriving each day in a white box truck with bold words painted on the sides: “WikiLeaks TOP SECRET Mobile Information Collection Unit.”

A tweet Thursday night from an account Stoeckley used said: “I don’t know how they sleep at night but I do know where.” It was removed Friday and Stoeckley told The Associated Press on Twitter he couldn’t comment.

During Bradley Manning’s trial in Fort Meade, Maryland, many of the soldier’s supporters showed up during the trial to back the whistleblower for revealing one of the biggest data leaks in US history, but last Friday Clark Stoeckley, courtroom sketch artist, was banned for one of his tweets.

NSA is Crazy

From Greenwald:

XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

Furthermore, Greenwald reports that analysts can use XKeyscore and other NSA systems “to obtain ongoing ‘real-time’ interception of an individual’s internet activity.”

Training materials for the XKeyscore program detail how analysts can use it and other systems to mine enormous agency databases and develop intelligence from the web

Some highlights:

“Performs strong (e.g. email) and soft (content) selection.” pg 2

“Provides real-time target activity.” pg 2

“Show me all the VPN startups in country X, and give me the data so I can decrypt and discover the users” pg 17

“Show me all the exploitable machines in country X” pg 24

According to one of the 11 judges that sits on the Foreign Intelligence Surveillance Court (FISC), no corporation ever served with a “business record” court order under the Patriot Act has ever challenged one, even though the law provides them a means to do so.

Sen. Ron Wyden said Tuesday that U.S. intelligence agencies’ violations of court orders on surveillance of Americans is worse than the government is letting on.

Wyden (D-Ore.), as a member of the Senate Intelligence Committee, is privy to classified briefings on the government’s surveillance. On Tuesday, he told Andrea Mitchell on MSNBC that all he could say is that the violations are worse than being made public.

• XKeyscore gives ‘widest-reaching’ collection of online data
• NSA analysts require no prior authorization for searches
• Sweeps up emails, social media activity and browsing history
NSA’s XKeyscore program – read one of the presentations

United States Representative Mike Rogers serves as the Chairman of the House Permanent Select Committee on Intelligence. The Committee is the House’s primary panel responsible for authorizing the funding for and overseeing the execution of the intelligence activities of the United States government.

General Keith Alexander Visits Black Hat

Alexander’s talk had begun with a plea for the hacker and security researcher community to reconsider the NSA’s role in the wake of a still-unfolding scandal revealed by the classified leaks of former Booz Allen contractor Edward Snowden. “Their reputation has been tarnished,” he said, speaking of his NSA staff. “But you can help us articulate the facts properly. I will answer every question to the fullest extent possible, and I promise you the truth: What I know, what we’re doing, and what I cannot tell you because we don’t want to jeopardize the future of our defense.”

After the talk, I found McCoy in the crowd and asked him about his not-so-friendly debate with the general. “His speech was pretty canned,” said McCoy. “It’s anything you can see on Fox News any day. We’re in danger, we have to get rid of your freedom to keep you safe.”

“Everyone’s thinking this, but no one’s saying it public, so everyone thinks they’re alone,” he said. “Ninety-eight percent of society has issues with this…But no one speaks up.”

He attempted to reassure a skeptical audience by saying “our people have to take courses and pass exams to use this data.” Data from the interception programs has “provided value” across some 53 “terror-related activities” detected by the NSA.


Where in the World is Snowden

In a letter sent this week, US attorney general Eric Holder told his Russian counterpart that the charges faced by Snowden do not carry the death penalty. Holder added that the US “would not seek the death penalty even if Mr Snowden were charged with additional, death penalty-eligible crimes”.

Holder said he had sent the letter, addressed to Alexander Vladimirovich, Russia’s minister of justice, in response to reports that Snowden had applied for temporary asylum in Russia “on the grounds that if he were returned to the United States, he would be tortured and would face the death penalty”.

House Intelligence Committee Chairman Mike Rogers (R-Mich.) said Sunday that Edward Snowden’s actions defy logic.

By granting NSA leaker Edward Snowden temporary asylum, Russia is giving itself time to figure out what their best move is, the chairman of the Senate Intelligence Committee said Sunday.

What has happened to NSA whistleblower who leaked files to Guardian since he decided to reveal his identity to the world and began his asylum battle


Feedback:

Bitmessage Address: BM-GuQ4gqmBeW8CYpSo3Htg2pBrBdHbvpe7

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post In NSA We Trust | Unfilter 61 first appeared on Jupiter Broadcasting.

]]>
Standing with Ed | Unfilter 58 https://original.jupiterbroadcasting.net/40217/standing-with-ed-unfilter-58/ Wed, 10 Jul 2013 21:52:03 +0000 https://original.jupiterbroadcasting.net/?p=40217 Latin America stands with Snowden with multiple offers of asylum, we'll bring you up to date on the hunt for Edward Snowden and discuss latest revelations.

The post Standing with Ed | Unfilter 58 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

New leaks give us a better picture of how the NSA vacuums up your Internet traffic, and leverages their relationships with telecom companies to take what they want.

Then Latin America stands with Edward Snowden as multiple offers of asylum come in, we’ll bring you up to date on the hunt for Edward Snowden and discuss his latest revelations.

Plus on the eve of new talks with China the US is caught in another hypocritical scandal, a look at the explosive situation in Egypt, your feedback, and much much more.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


Is Broccoli-Gate The Media Having a Laugh at the Public?

The president’s answer places him in direct odds with former President George H.W. Bush, who famously declared in 1990 that he hated broccoli.

“And I haven’t liked it since I was a little kid and my mother made me eat it. And I’m president of the United States, and I’m not going to eat any more broccoli!” he said.


Egypt Headed for Civil War?

Egypt lurched into dangerous new terrain Monday as an angry and bloodied Muslim Brotherhood called for an “uprising” against the new order, and the head of Egypt’s top Islamic authority warned that the country was headed toward “civil war,” after security forces opened fire on supporters of ousted President Mohamed Morsi in the early morning hours.

Senate Foreign Relations Committee Chairman Robert Menendez (D-N.J.) on Sunday said the U.S. could use its foreign aid package for Egypt as “leverage” to push the country back to democracy, days after the military ousted elected President Mohamed Morsi.

What do we actually give to Egypt? Between 1948 and 2011, the United States has given Egypt about $71.6 billion in bilateral military and economic aid. That’s more than we’ve given to any other country over that time frame save for Israel.

A recent report (pdf) from the Congressional Research Service lays out the details. The biggest chunk is military aid, averaging about $1.3 billion per year since 1987, with much of that military equipment. For instance, Egypt plans to acquire 1,200 M1A1 Abrams Battle tanks from the United States. The components are jointly manufactured in both countries and shipped to Egypt for final assembly. This year, the United States is also shipping 20 F–16 fighter jets overseas. Plus there’s money for border security along the Sinai Peninsula.

Egypt also gets a few special financing provisions, says CRS, including the ability to deposit its funds at an interest-bearing account at the Federal Reserve Bank of New York. The nation also gets to engage in cash-flow financing to pay for military equipment, a special provision not available to most recipients, and one that allows Egypt to negotiate bigger arms purchases.

The Obama administration has insisted that aid to Egypt is crucial to avoiding broader problems. “A hold up of aid might contribute to the chaos that may ensue because of their collapsing economy, said Secretary of State John Kerry in January. ”Their biggest problem is a collapsing economy."

– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Christopher B
  • Kent K
  • Stephen M
  • Steven H
  • Victor
  • Marc G
  • Travis D
  • Julius S

Latest Leaks

A classified NSA slide obtained by The Washington Post and published here for the first time lists “Two Types of Collection.”

One is PRISM, the NSA program that collects information from technology companies, which was first revealed in reports by the Post and Britain’s Guardian newspaper last month. The slide also shows a separate category labeled “Upstream,” described as accessing “communications on fiber cables and infrastructure as data flows past.”

Colombia is considered a top military and diplomatic ally in the region following a decade of joint operations against Marxist rebels and drug trafficking gangs that have caused harm to both countries’ economies.

“In rejecting the acts of espionage that violate people’s rights and intimacy as well as the international conventions on telecommunication, Colombia requests the corresponding explanations from the United States government through its ambassador to Colombia,” the foreign ministry said in the statement.

A majority of U.S. registered voters
consider Edward Snowden a whistle-blower, not a traitor, and a
plurality says government anti-terrorism efforts have gone too
far in restricting civil liberties, a poll released today shows.

Fifty-five percent said Snowden was a whistle-blower in
leaking details about top-secret U.S. programs that collect
telephone and Internet data, in the survey

“The fact that there is little difference now along party lines about the overall anti-terrorism effort and civil liberties and about Snowden is in itself unusual in a country sharply divided along political lines about almost everything,”

Peter Brown, assistant director of Quinnipiac’s polling institute.

Where in the World is Snowden

In the second part of an exclusive interview with Glenn Greenwald and Laura Poitras, former NSA contractor Edward Snowden contemplates the reaction from the US government to his revelations of top-secret documents regarding its spying operations on domestic and foreign internet traffic, email and phone use. This interview was recorded in Hong Kong on 6 June 2013

Should NSA leaker Edward Snowden decide to accept Venezuela’s offer of asylum, the tricky thing will be figuring how to get there from Moscow’s Sheremetyevo Airport. His big problem is that after the strange saga of Bolivian President Evo Morales’s flight over Europe, which included an unexpected stopover in Austria where the presidential plane may have been searched, Snowden might want to avoid flying over any countries friendly to the United States.

He appears to have, generally speaking, five options, each of which carries significant risk.


Dinner with China:

US Vice President Joe Biden has urged China to end its “outright” theft through hacking and to improve human rights as the world’s two largest economies began annual strategic talks.

Treasury Secretary Lew tells Fareed Zakaria how Chinese cyber theft is different from NSA surveillance.

Citing documents leaked by Edward Snowden, the fugitive former American intelligence contractor, O Globo newspaper said the NSA programs went beyond military affairs to what it termed “commercial secrets.”

These included petroleum in Venezuela and energy in Mexico, according to a graphic O Globo identified as being from the NSA and dated February of this year.


Feedback:

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Standing with Ed | Unfilter 58 first appeared on Jupiter Broadcasting.

]]>
Red October Hunts You | TechSNAP 93 https://original.jupiterbroadcasting.net/30271/red-october-hunts-you-techsnap-93/ Thu, 17 Jan 2013 20:46:48 +0000 https://original.jupiterbroadcasting.net/?p=30271 If you thought Stuxnet was a big deal, wait till you meet Red October. The incredible story of some of the most sophisticated malware yet surfaces.

The post Red October Hunts You | TechSNAP 93 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

If you thought Stuxnet was a big deal, wait till you meet Red October. The incredible story of some of the most sophisticated malware yet surfaces, and we’ve got the details.

Plus: A Nasty 0-Day exploit for Linksys routers, a HUGE batch of your questions, and much much more – On this week’s episode of TechSNAP!

Thanks to:

Use our code tech295 to get a .COM for $2.95.

Something else in mind? Use go20off5 to save 20% on your entire order!

Pick your code and save:
techsnap7: $7.49 .com
techsnap10: 10% off
techsnap11: $1.99 hosting for the first 3 months
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans
techsnapx: 20% off .xxx domains

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Get TechSNAP on your Android:

Browser Affiliate Extension: