253

[Andrej Kiska with Barack and Michelle Obama in 2016]

Rod Keller cuts through some of the propaganda coming out of Russia to get a little closer to what’s actually happening there.

Slovakian President Andrej Kiska announced this week that he would not run for re-election. The office is mostly ceremonial, but Kiska has been perhaps [...]

255
A critical remote code execution vulnerability has been discovered in the popular Electron web application framework that could allow attackers to execute malicious code on victims' computers.

Electron is an open source app development framework that powers thousands of widely-used desktop applications including WhatsApp, Skype, Signal, Wordpress, Slack, GitHub Desktop, Atom, Visual Studio


1
We the undersigned petition the council to reject plans to develop the area surrounding Robin Hood's grave in Calderdale into industrial units. Moreover to ask that the Council considers improving access to the area to encourage international tourism and bring visitors and money to our region.

251

  Last week, we enjoyed an excerpt from Marc Headley’s 2009 book Blown for Good, a stunning narrative by a longtime Scientologist describing his life in the church and how he broke away. Another account with a similar theme which came out a few months later was the remarkable Counterfeit Dreams by Jefferson Hawkins.

[...]
255
With a heavy heart, security researchers have early released the details of a set of vulnerabilities discovered in email clients for two widely used email encryption standards—PGP and S/MIME—after someone leaked their paper on the Internet, which was actually scheduled for tomorrow.

PGP and S/MIME are popular end-to-end encryption standards used to encrypt emails in a way that no one, not


252

[Hubbard in 1948]

A 1948 letter written by L. Ron Hubbard that Lawrence Wright quotes in his 2013 history of Scientology, Going Clear, is going on the auction block in New York on June 14, and it’s really fun to see it in its entirety on the Christie’s website.

The auction features two letters written [...]

255
Adobe has just released new versions of its Acrobat DC, Reader and Photoshop CC for Windows and macOS users that patch 48 vulnerabilities in its software.

A total of 47 vulnerabilities affect Adobe Acrobat and Reader applications, and one critical remote code execution flaw has been patched in Adobe Photoshop CC.

Out of 47, Adobe Acrobat and Reader affect with 24 critical vulnerabilities—


251

[Renata and Flavio]

Last week, we asked the people on our “Scientology disconnection, a reminder” list — which appears at the end of each story here at the Bunker — about how they are coping with the church keeping them from their loved ones. The result was an emotional outpouring from the people on the [...]

254
Last week, we reported about the first network-based remote Rowhammer attack, dubbed Throwhammer, which involves the exploitation a known vulnerability in DRAM through network cards using remote direct memory access (RDMA) channels.

However, a separate team of security researchers has now demonstrated a second network-based remote Rowhammer technique that can be used to attack systems using


252

[Los Angeles District Attorney Jackie Lacey and Taryn Teutsch]

For years, Scientology and its operatives have attacked former spokesman Mike Rinder with one particular accusation.

In 2007 Rinder left Scientology, literally running away from the Sea Org while he was in London. His wife at the time, Cathy Bernardini, and their children, Taryn Teutsch [...]

250
For the second time in less than a week, users of the popular end-to-end encrypted Signal messaging app have to update their desktop applications once again to patch another severe code injection vulnerability.

Discovered Monday by the same team of security researchers, the newly discovered vulnerability poses the same threat as the previous one, allowing remote attackers to inject malicious


1
We the undersigned petition the council to reject plans to develop the area surrounding Robin Hood's grave in Calderdale into industrial units. Moreover to ask that the Council considers improving access to the area to encourage international tourism and bring visitors and money to our region.
251

[Laura DeCrescenzo and Bert Deixler]

Well-regarded California attorney Bert Deixler has once again genuflected to his client, Church of Scientology leader David Miscavige, filing a notice of appeal after the church got roundly defeated in a calculated move to slow down a lawsuit that scares the bejeesus out of Miscavige.

We’re talking about the forced-abortion [...]

254
A Google security researcher has discovered a critical remote command injection vulnerability in the DHCP client implementation of Red Hat Linux and its derivatives like Fedora operating system.

The vulnerability, tracked as CVE-2018-1111, could allow attackers to execute arbitrary commands with root privileges on targeted systems.

Whenever your system joins a network, it’s the DHCP client


252

  Tammy Clark tells us she sent a letter to her uncle Heber Jentzsch in November, hoping to find out how he’s doing as he turned 82. This week, she received a reply.

But she’s suspicious about it.

Heber Jentzsch is a major name in Scientology. In the 1980s, church leader David Miscavige [...]

252
After the revelation of the eFail attack details, it's time to reveal how the recently reported code injection vulnerability in the popular end-to-end encrypted Signal messaging app works.

As we reported last weekend, Signal has patched its messaging app for Windows and Linux that suffered a code injection vulnerability discovered and reported by a team of white-hat hackers from Argentina.
<!


252

[Copenhagen’s May 2017 grand opening]

Rod Keller has some new insights for us about how Scientology “Ideal Orgs” evolve, including a fascinating new ad posting from the church…

The new Ideal Org in Copenhagen is following a predictable path from boom to bust. That and other interesting revelations come from an online job posting currently [...]

253
Luring users on social media to visit lookalike version of popular websites that pop-up a legitimate-looking Chrome extension installation window is one of the most common modus operandi of cybercriminals to spread malware.

Security researchers are again warning users of a new malware campaign that has been active since at least March this year and has already infected more than 100,000 users


1
In the blog post linked below, the author attempts to illustrate the lettering of the first verse of John’s gospel in the Book of Kells. According to the author, the wording is “In Prin…
250

[Bernie Headley and his son Marc, and Marc’s sister Stephanie]

More than a year ago, in January 2017, we wrote a story about Bernie Headley that got us pretty worked up. Here was a man who was fighting cancer and was being prevented from seeing his own daughter, Stephanie, by the Church of Scientology.

We’ve [...]

252
Security researchers have discovered a severe vulnerability in the popular end-to-end encrypted Signal messaging app for Windows and Linux desktops which could allow remote attackers to execute malicious code on recipients system just by sending a message—without requiring any user interaction.

Discovered by Alfredo Ortega, a software security consultant from Argentina, the vulnerability was


255

[A drone’s-eye view of Int Base]

It’s been nearly a decade since one of our favorite books about Scientology life was published: Blown for Good: Behind the Iron Curtain of Scientology, by former Sea Org worker Marc Headley.

We interviewed Marc when the book came out, and he’s been a big part of this website [...]

253
Security of Android devices has been a nightmare since its inception, and the biggest reason being is that users don't receive latest security patch updates regularly.

Precisely, it's your device manufacturer (Android OEMs) actually who takes time to roll out security patches for your devices and sometimes, even has been caught lying about security updates, telling customers that their


1
Come listen awhile and I’ll sing you a song Of three merry gentlemen riding along. They met a fair maid, unto her did say, “We’ll afraid this cold morning will do you some harm.” “Oh no…
1
Scientific American is the essential guide to the most awe-inspiring advances in science and technology, explaining how they change our understanding of the world and shape our lives.
253

  Over the last two days, we’ve seen some fascinating letters made public for the first time which were written by Donald H. Rogers, an eyewitness to the earliest days of Dianetics. Rogers wrote the letters in 1984-85 to Jon Atack, who was researching his book, A Piece of Blue Sky, and who generously [...]

252
Well, that did not take long.

Within just 10 days of the disclosure of two critical vulnerabilities in GPON router at least 5 botnet families have been found exploiting the flaws to build an army of million devices.

Security researchers from Chinese-based cybersecurity firm Qihoo 360 Netlab have spotted 5 botnet families, including Mettle, Muhstik, Mirai, Hajime, and Satori, making use of


255

  Today we have the second and third letters sent in the mid-1980s by Don Rogers, an early witness to Dianetics, to author Jon Atack, who has generously allowed us to make them public for the first time. Please see historian Chris Owen’s introduction to these letters in yesterday’s first installment.

—————- THE ROGERS [...]

252
It turns out that macOS client for the popular end-to-end encrypted messaging app Signal fails to properly delete disappearing (self-destructing) messages  from the recipient's system, leaving the content of your sensitive messages at risk of getting exposed.

For those unaware, the disappearing messages in Signal self-destruct after a particular duration set by the sender, leaving no trace of


251

  Jon Atack has provided us a marvelous exclusive. He’s provided us with copies of letters he received from a man name Don Rogers in the mid-1980s. And we’ve asked historian Chris Owen to help us understand just how valuable these letters are and what’s in them, followed by the first of three Rogers [...]

253
Security researchers revealed a way around that some hacking groups have been found using in the wild to bypass a security feature of Microsoft Office 365, which is originally designed to protect users from malware and phishing attacks.

Dubbed Safe Links, the feature has been included in Office 365 software as part of Microsoft's Advanced Threat Protection (ATP) solution that works by replacing


256

[Milo Yiannopoulos and Joy Villa, in happier days]

Thanks again to one of our alert tipsters, it was brought to our attention that Joy Villa’s “testing the waters” web pages for a Congressional run have come down.

Both “bringjoytocongress.com” and “joyvilla.com/testingthewaters/” now redirect us to Joy’s general website.

On February 9, the Internet Archive [...]

What is Plikli?

Plikli is an open source content management system that lets you easily create your own user-powered website.

BMC logoBuy me a coffee
Latest Comments
Statistics