After yesterday’s disturbing report about a convicted child molester being a featured performer at Scientology’s exclusive “Maiden Voyage” celebrations, we received this sobering report from former Sea Org member and Scientology “technology” expert Sunny Pereira. We think it pairs pretty well with what we learned in yesterday’s story.

I can tell stories from [...]


  Peter Bonyai asked us if we’d seen a three-year-old video put out by Scientology which features one of our favorite performers, Scientology’s in-house hip hop giant, Chill EB. We told him we weren’t sure, but we really didn’t need much excuse to visit it again as long as the Chillmaster was in it.

The Information Technology industry has witnessed exponential growth over the years, and if you want to be a part of this growing industry, it's important for you to earn certificates in this field.

Organisations always prefer employees with strong internationally-recognized professional certifications that proof your skills, knowledge, and what you know—giving you more credibility and


  Our thanks again to Rasha, who sped the latest copy of International Scientology News to us. You’ll be thrilled to hear that this issue contains startling information about Scientology’s new television network!

But first, we know you will want to see the latest portrait of church leader David Miscavige doing his usual pose [...]


  It’s the dog days of summer, and we beg your patience as we take a break from our usual serious approach to the news for this imagined Scientology report on our recent travels…



Subject landed Saturday at Gatwick and was in London by 2 pm, then tried [...]


[Jim Bridgeforth and Victoria and Tom Cummins, Scientology cetaceans]

Thanks to the tipster who forwarded us pages from the new Impact magazine, we have your mid-year Scientology whale watching update!

If you’re new around here, we’ll catch you up by explaining that every October, Scientology leader David Miscavige recognizes Scientology’s biggest donors (we call [...]

The source code of the popular social media app Snapchat was recently surfaced online after a hacker leaked and posted it on the Microsoft-owned code repository GitHub.

A GitHub account under the name Khaled Alshehri with the handle i5xx, who claimed to be from Pakistan, created a GitHub repository called Source-Snapchat with a description "Source Code for SnapChat," publishing the code of

Amnesty International, one of the most prominent non-profit human rights organizations in the world, claims one of its staff members has been targeted by a sophisticated surveillance tool made by Israel's NSO Group.

The NSO Group is an Israeli firm that's mostly known for selling high-tech spyware and surveillance malware capable of remotely cracking into Apple's iPhones and Google's Android

After an eight-year-long absence from the most populated country in the world, Google search is going to dramatically make a comeback in China.

Google is reportedly planning to launch a censored version of its search engine in China that is going to blacklist certain websites and search terms to comply with Chinese government’s attempts to censor the Internet, a whistleblower revealed.


If Alt-Right Idiots Come To DEF CON, The Goons Won't Have It

logicfish Security headline conference All https://packetstormsecurity.com   Discuss    Share

[Sen. Iván Cepeda wants an investigation of Scientology in Colombia]

Our correspondent in Colombia’s capital of Bogotá, who helped us cover the Scientology Ideal Org opening there in 2015, has been keeping an eye on the brewing scandal in that country over Scientology’s relationship with various members of the Colombian national police force.

He tells [...]


Hackers Find Creative Way To Steal $7.7 Million Without Being Detected

logicfish Security headline hacker cybercrime fraud All https://packetstormsecurity.com   Discuss    Share
What maximum a remote attacker can do just by having your Fax machine number?

Believe it or not, but your fax number is literally enough for a hacker to gain complete control over the printer and possibly infiltrate the rest of the network connected to it.

Check Point researchers have revealed details of two critical remote code execution (RCE) vulnerabilities they discovered in the

Google tracks you everywhere, even if you explicitly tell it not to.

Every time a service like Google Maps wants to use your location, Google asks your permission to allow access to your location if you want to use it for navigating, but a new investigation shows that the company does track you anyway.

An investigation by Associated Press revealed that many Google services on Android and


  This week in our ‘Scientology Lit’ series, we have an excerpt from BBC reporter John Sweeney’s 2013 book, Church of Fear: Inside the Weird World of Scientology. Sweeney wrote about his experiences making two BBC documentaries about the church, 2007’s “Scientology and Me,” and 2010’s “The Secrets of Scientology.” In this chapter, he’s [...]

Adobe has released August 2018 security patch updates for a total of 11 vulnerabilities in its products, two of which are rated as critical that affect Adobe Acrobat and Reader software.

The vulnerabilities addressed in this month updates affect Adobe Flash Player, Creative Cloud Desktop Application, Adobe Experience Manager, Adobe Acrobat and Reader applications.

None of the security

Artificial Intelligence (AI) has been seen as a potential solution for automatically detecting and combating malware, and stop cyber attacks before they affect any organization.

However, the same technology can also be weaponized by threat actors to power a new generation of malware that can evade even the best cyber-security defenses and infects a computer network or launch an attack only

Like many others, do you also believe that the popular system-cleaning tool CCleaner was performing well before Avast acquired the software from Piriform last year?

If yes, then pop-up advertisements in the previous CCleaner software version was not the last thing you have to deal with.

Avast has released a new version of CCleaner 5.45 that not only always runs in the background, but also

Get your update caps on.

Just a few minutes ago Microsoft released its latest monthly Patch Tuesday update for August 2018, patching a total of 60 vulnerabilities, of which 19 are rated as critical.

The updates patch flaws in Microsoft Windows, Edge Browser, Internet Explorer, Office, ChakraCore, .NET Framework, Exchange Server, Microsoft SQL Server and Visual Studio.

Two of these

Security researchers at Check Point Software Technologies have discovered a new attack vector against the Android operating system that could potentially allow attackers to silently infect your smartphones with malicious apps or launch denial of service attacks.

Dubbed Man-in-the-Disk, the attack takes advantage of the way Android apps utilize 'External Storage' system to store app-related data,


  Rod Keller has another sobering look at what Scientology’s “Volunteer Ministers” are really up to…

The Carr fire has been burning in Northern California since July 25. It’s a large and destructive fire, and despite the work of thousands of firefighters it’s no more than 37 percent contained. Redding, California remains at risk [...]


[Ron Miscavige and Becky Bigelow]

We have another treat for you in our ‘Scientology Lit’ series. Ron Miscavige has generously allowed us to post an entire chapter from his book Ruthless: Scientology, My Son David Miscavige, and Me, which he wrote with Dan Koon. Ron sent us the key chapter when he and his wife, [...]

Security researchers have discovered at least three massive malware campaigns exploiting hundreds of thousands of unpatched MikroTik routers to secretly install cryptocurrency miners on computers connected to them.

In all, the malware campaigns have compromised more than 210,000 routers from Latvian network hardware provider Mikrotik across the world, with the number still increasing as of


[Mitchell Rogovin]

We’re curious to see how today’s document hits you. You may cheer at the sight of a top US government lawyer putting the word “church” in quote marks when he refers to Scientology, but when we finished reading this letter, we were angry.

This is a letter written in 1966 — more than [...]

Taiwan Semiconductor Manufacturing Company (TSMC)—Apple's sole supplier of SoC components for iPhones and iPads, and Qualcomm's major manufacturing partner—shut down several of its chip-fabrication factories Friday night after being hit by a computer virus.

The world's largest makers of semiconductors and processors TSMC lost an entire day of production after several of its factories systems

Bought a new Android phone? What if I say your brand new smartphone can be hacked remotely?

Nearly all Android phones come with useless applications pre-installed by manufacturers or carriers, usually called bloatware, and there's nothing you can do if any of them has a backdoor built-in—even if you're careful about avoiding sketchy apps.

That's exactly what security researchers from mobile

Your Mac computer running the Apple's latest High Sierra operating system can be hacked by tweaking just two lines of code, a researcher demonstrated at the Def Con security conference on Sunday.

Patrick Wardle, an ex-NSA hacker and now Chief Research Officer of Digita Security, uncovered a critical zero-day vulnerability in the macOS operating system that could allow a malicious application

WhatsApp, the most popular messaging application in the world, has been found vulnerable to multiple security vulnerabilities that could allow malicious users to intercept and modify the content of messages sent in both private as well as group conversations.

Discovered by security researchers at Israeli security firm Check Point, the flaws take advantage of a loophole in WhatsApp's security


  We see a lot of signs that Scientology is entering a desperate phase. Mike Rinder does a particularly good job at his site gathering evidence that shortages in staffing and at events is a sign that David Miscavige’s dog and pony show is at a breaking point. But even if membership is tanking, [...]

Another day, another significant data breach.

This time the victim is Reddit... seems someone is really pissed off with Reddit's account ban policy or bias moderators.

Reddit social media network today announced that it suffered a security breach in June that exposed some of its users' data, including their current email addresses and an old 2007 database backup containing usernames and


  Our thanks to the tipster who sent us pages from the newest copy of Impact magazine, the publication of the International Association of Scientologists.

There are a few things of note in this issue, but one that really jumped out at us was a report from this year’s Maiden Voyage celebration aboard [...]

Looking for how to hack WiFi password OR WiFi hacking software?

Well, a security researcher has revealed a new WiFi hacking technique that makes it easier for hackers to crack WiFi passwords of most modern routers.

Discovered by the lead developer of the popular password-cracking tool Hashcat, Jens 'Atom' Steube, the new WiFi hack works explicitly against WPA/WPA2 wireless network protocols

What is Plikli?

Plikli is an open source content management system that lets you easily create your own user-powered website.

BMC logoBuy me a coffee
Latest Comments