Windows Takeover On A Global Scale

With the shadowbrokers release of NSA tools last month came something very scary for most Windows users. A file named Eternalblue was included, which was a remote SMBv2 exploit (CVE-2017-0143) that could be used for RCE. This exploit has been used in the now infamous “WannaCry” ransomware that has been sweeping the globe in a massive cyber attack.

On May 12, a security researcher by the name of ‘MalwareTech’ found a unregistered domain within the code, that happened to be its killswitch. With the shutdown of WannaCry many were excited, but it hasn’t ended yet. A new version has been seen spreading around even after friday.

The Five Eyes


James Comey lands in Queensland for five nation top  secret services spying consortium in Australia. CIA Director Mike Pompeo may have been seen as well. The meeting between the five nation including the Aussies, New Zealand, Us and the Brits yearly hook up for the Five Eyes international spy alliance.

Eyes In The Walls

Hacker Groups

One of the topics that will probably be discussed is the wikileaked docs on the nation state spyware that the five eyes group more than likely were involved in producing.

Damage Report Scotty

The group will now have to contend with black hat hackers using nation state spy ware to spy back on the very group that invented it.

A fly on the wall.

Wouldn’t you like to be one on that wall Coders?

Anybody ?

More Here

Nothing more here move along

Please like and share


Reprinted From RickStone.Org

March For Science On Earth Day Gets Trashy

The streets of DC were littered with trash yesterday following a rally/ protest for science.

The witty signs handpainted on poster board showing support for scientist in the fight on global warming lay scattered on the battlefield.  The mess of the “trashy” protesters will soon be gone but the fight continues across the political divide.  Bill Nye lead the protestors with the battlecry, believe in science give us money. Reporting left leaning media outlets touted the velocity of global warming which is the focal point on the earth day movement to save the planet. The right posted pics of “Trashy” protesters “trash on the streets.

How can I say this in 200 words?

We can protest, we can recycle our trash,  we can and should be vocal in our effort to clean up the mess of evolving as a species humans have made on this beautiful world. We have over populated, over indulged in our resources and over rated our science. We have also over trusted our politicians to “save” it all in our names.

What you should do.

Get informed

Our race to save our planet is a race with many contestants and many, many finish lines. What is a win for one could spell the destruction of others.  Bill Nye  is a pseudo science guy so am I, trust no one listen to many.. The proponents  of both sides of the global warming issue cannot be trusted to report factually  the data and analysis they produce. A  “great” scientist once stated “Once  scientific fact is politicized it becomes skewed  and can not be trusted to be accurate ( Richard Feynman ).

The Good News

We will evolve

The Bad News

Maybe not fast enough

Do your part by becoming your own researcher, it can’t hurt. I will post as many sides of the issue as I can  to help us all not be duped by anyone, soooo stay tuned and

watch your six earthling


Back to our main news feed

Reprinted From


Bose Headphones Listening To everything You Hear

A law suit has been filed against the tech giant Bose alleging the headphone they make are virtual “spy machines”.

Kyle Zak filed the complaint in federal court in Chicago on Tuesday night. At the center of the lawsuit is Bose’s Connect app, which is marketed as an optional companion to a handful of the headphone maker’s newer headphones and speakers, including its acclaimed QuietComfort 35 noise-cancelling headphones.

Chicago-based law firm Edelson PC, which specializes in cases involving technology and consumer privacy, claim the Connect app also “intercepted and collected all available Media Information” from Zak’s smartphone, every time it was opened, after Zak paired the app with his pair of QuietComfort 35s.

The Bose user agreement is vague the lawsuit alleges and while it states in collects and share data with third parties it specifically states it does not build profiles. Profiles like if you were a muslim and listened to call to prayer recordings you could be pigeon holed as a muslim.

We will follow the developments in this case but we suspect that many, many other companies are doing the same. Al in the name of big dtat collection going on all around us everyday.

Also in the news today is Facebook announces mind typing…..project

Now back to our main news feed


Reprinted From DeeperThanDrudge

My Big Brother Caught The Fresno Killer (alleged)

Fresno city counsel members are grinning after newly installed state of the art gun shot sound detection system alerted police yesterday to the brutal killing of 3 white males in their fine city.


The ShotSpotter gunfire detection system, which uses a network of sensors to “listen” for shots being fired, immediately alerted police to the shooting.

Big brother looking out for all you hackers out there with the loud devices, if they can hear your guns they can probably hear your groans.

Watch your six.



Reprinted From


How to properly secure your Windows 10 Computer

Are you tired of that annoying message about your Anti-Virus? Are you curious about hackers and how to prevent them from getting into your computer? If so then you’ve come to the right place.

This process works for all Windows Operating Systems but we’re going to be focusing on Windows 10 today, since it’s the latest and most updated os.

1 – Trashing Unwanted Programs

One of the main things the average person forgets to do is remove forgotten or unwanted programs and it’s a VERY big deal. This is a big deal because not only do these programs take away your space but they also pose a threat to your security because they’re not being updated. Outdated software is one of the easiest targets for hackers that want to compromise your computer.


In order to remove unwanted programs you’re going to work your way to the control panel. Control Panel can be opened by right clicking the start button and selecting control panel. If you’re trying to get there from your settings then all you have to do is type control panel in the search bar. Pretty simple right? Once you’re at Control Panel, you’re going to click on “Uninstall a program” under “Programs”.


If you followed my instructions then in front of you should be a list of programs you have on your computer. Start by clicking on a program or software you don’t use anymore and you should have the option to “Uninstall” it. Go ahead and do this with all the programs you downloaded but don’t use or update anymore. This will help you prevent hackers from getting into your outdated programs as well as save space on your computer.

2 – Anti-Virus and Windows Security

While uninstalling unwanted and outdated programs play a big part in securing your computer, there’s still two more important steps required to fully secure your computer. 9 times out of 10 a store bought or factory reset computer comes with a pre-installed anti-virus that helps defend and protect your computer from malicious files and people.


Lets work on making sure we have a clean anti-virus and the right settings enabled to prevent viruses and other things from infecting your computer.


First things first, let’s make sure a few settings are enabled/disabled by going to your settings and clicking on Privacy. Once there you want you make sure SmartScreen Filter is enabled and can scan URL’s. You’ll also want to check your privacy settings for your Microphone, Location, Camera, Contacts, Calendar and anything else you might want to take a look at. Checking these settings prevents certain applications and programs from having access to your camera, microphone and other information that could be used to hurt you or invade your privacy.


Now that we’ve tweaked some of our settings to give us more privacy and security let’s work on getting a fresh working anti-virus for your computer. We need this because it will detect harmful files, emails, links and activities that you might not notice right away. Most computers come with Norton, McAfee or AVG anti-viruses, but today we’re going to get a new one. There are ton’s of Anti-Viruses made to protect you, ones like Kaspersky, Avast, McAfee, AVG, Windows Defender and many more. All you have to do is go to your search engine of choice ( Mine is ) and type in which anti-virus program you want to download. Don’t worry, you can always compare anti-viruses to see which is better, but once you’ve done that you want to go to the official site that provides the software and download the trial version of the software.


Now that you’ve downloaded the trial version of your favorite anti-virus you’re going to have to repeat the first step and uninstall your previous anti-virus. You’re uninstalling your old one so your new one won’t have any issues with the last one. After uninstalling the old one you’re going to install the new one and restart your computer. This should provide you with a brand new anti-virus that will protect, scan and keep your computer safe to an extent.

3 – Practicing Safe Computer Habits

Believe it or not having an anti-virus, tweaked settings and secure programs isn’t all you need to safe while browsing the internet or working on your computer. The biggest security risk to your computer and personal information is you, the user!


In order to completely be secure you have to practice safe computer habits. Computer habits are just like real life habits and are things that we do because we’re so used to doing them. Things like checking emails without looking at who they’re from, downloading programs and files without checking to see if they are legitimate and safe, visiting websites or using online services from fraudulent companies that are out to get you. In order to stay as secure as possible you’ll have to pay more attention to emails that may contain harmful files, ignore ads that persuade you, download programs from trusted sources and make sure the websites you visit are safe, clean and have good ratings. While these are only a few ways to stay secure on the internet, the job is ultimately up to you, so please practice safe computer habits and thanks for reading!

Make sure to check out the main site for the latest hacking and tech news!!!


Check out @ThatWindowsDev

Networking 04

Welcome back to another installment of hacking tutorials. If you haven’t read the other previous articles I suggest you start off here. Today we will be going over networking and how it created the hacker into what we know them as today.

A long time ago, when the internet was in its infancy, the only hacker was someone who took computers and made hardware for them, that would either aid them in some way or destroy them. When the internet was established in 1969, it opened a big door for anyone that wanted to be a hacker. The ironic thing is that the hacker culture that we know of today can be dated to 1961, when MIT received the first PDP-1. These early working of the very first hackers were outlined in the first part of Steven Levy’s book Hackers. I suggest that everyone should read that book at least once because it’s a classic.

I personally suggest that you buy a website server and have at least one domain on it. This way you will learn how to do server side stuff on your website while learning web development and making sure your website isn’t too vulnerable to website attacks. You will learn a good bit about networking and the internet in general if you just do this.

Next you are going to want to get a few certs these will ensure that you know the ins and outs of networking and the internet, I will have a couple of links to good certification websites if you would like to check them out in the bottom of this article. Certifications will also help you tremendously if you would like to get a job hacking or even working on network systems in general.

After you have done these things you will be proficient in networking and you will be ready to start the real hacking. By now you should know the ins and out of Linux, how to program like a computer guru (Not using Stack Overflow for every line of your code), and should have a good understanding of networking. In the next part of this series we will go over computer hardware and how it applies to hacking.

Be sure to come back and check out the next article. If you would like a notification to when it becomes available follow us on twitter @hackernews_us. Thanks for reading we appreciate each and every visitor that we have.

Thank you


Security and you 01


With all the recent leaks over the pst few months (such as the vault 7 leak). Many are left wondering just how secure they are. We at hackernews have planned on starting this series for a while but have been holding off, however recent events make it appear people want to be secure now more then ever.

Ok so before we get into how to secure ourselves and our personal data we have to understand what being secure really means and what we have to sacrifice. First off you have to understand that no one can be invisible on the internet no matter what you measures you go through there will always be proof of you existing somewhere, thats just the way the internet works.

However what we can do though is make it hard for websites we visit, or even intelligence agencies to track us through use of various techniques such as not allowing java-script in our browsers or using end-to-end encryption for the messages we send. Next we will be going over a few of the recent leaks and how we potentially are insecure along with so misconceptions that seem to be going around in the next post. Make sure to come back as we continue the series!!

Dont forget to check out our main page

for all the latest news on technology and cyber security/analysis.




Programming as a hacker 03

Hello all, welcome back. In the last blog post we talked about installing the operating system Linux and how it benefits hackers and normal people alike. If you missed that blog post or would like a refresher you can go check it out here.

Today we are going to go one step further on the road to becoming a hacker and were gonna talk about learning a programing language.  Programming is one of the most essential parts of becoming a real hacker. It is almost as important as having a computer. This is because computers and everything connected to them is essentially billions of lines of code and hardware. So without programing in there all we have is a toaster.

Now that I have convinced you to learn a programing language (I hope) I guess I need to give you a few links to websites that will help you get that started. Now I’m not going to tell you in cold hard facts which programing language you should learn but I will tell you this, please learn a language that is used a lot such as, Java, Python, or C++. This way your chances are the greatest to find something to hack or make better.

Actually I lied you are going to learn one programing language no matter what because every one needs to know it, HTML, Yes good ol’ HTML. This programing language is so easy and useful I think it should be a requirement to know it before graduating high school. Not only is it super easy to learn it also is on every web page on the Internet so I guess you would say its useful.

Okay now that I have bored you to sleep with a bunch of facts and rants Il give you a couple of links to website that I found most useful when learning to program.

Codecademy: This website is great for beginners because it has an interactive shell that teaches you as you go along. Very recommended.

CodeSchool: Here is another interactive website but this one is more aimed at websites. They teach HTML, CSS, JavaScript and IOS.

RosettaCode: This website will help you by giving you 500 examples to try to program. This website helped me out a lot.

After getting a basic understanding of the programing language of your choice I would recommend either buying a few books or finding some PDFs to get a more in-depth understanding.

I hope everyone has enjoyed reading this article, if you did be sure to come back for more information on becoming a hacker. Also if you like tech, internet and hacking news come check out




Installing Linux 02

Hello everyone and welcome to the second installment of the hacking tutorials. If you haven’t checked out the first blog post you can see that “here“, after viewing that come back and read this one.

Okay now on to the interesting stuff. Last week we talked about a few things that you need before you get started with hacking. In this article and the next few articles following this I am going to share with you some great and valuable information that will help you along the way.

Since I already know that you have a computer, I would like to go over which operating system hackers use and why. If you haven’t already guessed the number one operating system that all hackers use in Linux, (no it’s not because it’s free and were all cheep). This is because Linux is flexible, stable, and network friendly. Also about 67% of the internet runs on Linux so if you know it you pretty much know the internet.

As a side note Linux was actually developed by a group of programmers over the internet therefore it has exceptional support for network functionality.  Therefore if you want to run your own home server you can and I will show you how to do this in a later article.

It also will teach you the command line interface which is a must for any type of hacking, this command line grants users greater access and control over their systems which is a must for hackers. In the command line you get an infinite amount of control over the system, yet again another great feature. Also as a side note it makes running programs a lot easier because you can compile and run them in the command line.

Now that I have given you a few reasons to go and download Linux I have just a few things to say. I’m not going to tell you what flavor of Linux to choose but I will tell you to do some research to find out what distro is best for you. To learn how to install Linux in a virtual system click “here“. For anyone that hasn’t ever installed an operating system before this is highly recommended! To learn how to install Linux alongside your current operating system you can click “here“.

Here is a few links to get you started learning Linux:

I hope that you like this article and it has convinced you to start your journey becoming a hacker. If you have any questions leave a comment in the comments section of this blog and I will get back to it as soon as possible.

Come check out the main website at to see all the latest and greatest internet news. That is all for now. Thanks for sticking with me through out this long article.