videos

Anonymous - Turkey Net Aid Package

To the fascist government of Turkey. We are anonymous. Recently, during the past weeks, we have witnessed your deteriorating issues concerning communications, free speech, and the freedom of the press. With the recent ban you have placed on Twitter. You have proved to the citizens of all nations that you, Erdogan, do not care about your people, nor do you care about their voices and opinions. Your only care is your authority, dominance, and your odious ways to further suppress the Turkish people from shouting their cries of freedom.

New video: Anonymous USAID "Cuban Twitter" to Create Violent Uprisings

Citizens of the World, We are Anonymous. Last week, a report accused the U.S. Agency for International Development (USAID) of running a "covert" project to build a Twitter-like social network in Cuba to stir political unrest in the island. ZunZuneo was a social network marketed to Cubans that was like a stripped-down version of Twitter. The network allowed subscribers to send and receive free updates via text message since US AID covered all the expenses. The AP reported that its operators, once the service reached "critical mass" intended to send political content to the subscribers, in the hopes of inspiring "smart mobs" and an eventual "Cuban Spring." The service, started in 2010, was retired two years later, due to lack of funds.

If The NSA/Heartbleed Revelations Don't Piss You Off, Nothing Will

"The U.S. National Security Agency knew for at least two years about a flaw in the way that many websites send sensitive information, now dubbed the Heartbleed bug, and regularly used it to gather critical intelligence, two people familiar with the matter said.

Ultimate guide on how to steal a botnet - MUST SHARE

Oh yeah, welcome to the road to domination. Have you ever wondered if it is possible to steal a botnet from a botnet herder? Well, of course it is possible, they are humans - and they make mistakes, just like we make mistakes. Hackers will secure their environments in such an way that it will be only accessible for them, but what happens when a hacker makes a mistake in the config file? Exactly, they become vulnerable to an attack which could lead to the theft of their Botnet. 

Are Russian forces using cyber warfare?

CNN's Richard Quest interviews McAfee CEO Michael DeCesare in the face of growing cybersecurity concerns in Ukraine. VICE reporter Simon Ostrovsky reports Russian troops are leaving military bases with the arrival of OSCE observers. CNN's Richard Quest interviews McAfee CEO.

Cyberwar: How the Internet Changes World Conflict

The South Dakota World Affairs Council is proud to share Michael McNerney's Harding Lecture: Cyberwar: How the Internet Changes World Conflict. This lecture was given January 23, 2014 at South Dakota State University.

Valentine hack: What would cupid do if he was hacked? [Must watch video]

We all heard the story about Cupid, how you can fall in love just in a second, but what would hap

VIDEO: Anonymous people climb the Shanghai Tower, China (650M!)

Two Russians, show how to climb the Shanghai Tower, in China.

Shocking video: Takfiri terrorists strangle Syrian girl in public

A grisly video has emerged showing Takfiri terrorists operating in Syria strangulating a young gi

Why You Should Not Be Afraid

The odds of dying on a roller coaster are 1 in 300,000,000 (that's 300 million for those who

Pages