WTF Are Y’all Searching For To Get Here

_20141011_205706

On occasion I like to review what searches have lead people to my blog. It’s interesting in a way, people are looking for some pretty twisted shit while they are surfing cyberspace. Listed below is the searches for the past 7 days. Some of them I understand it leading people here, others are so extremely bizarre that I don’t understand the relationship between the search criteria and this blog. I gonna go out on a limb here and say there truly are some sick fucks out there on our little planet. I’m just saying, but feel free to look below at the list for yourselves.

tattooed, ass, cowgirls, glamour, stinger, monster, fucktard card, crab assholes, mint condition, don cuervo’s revenge.mp3, once upon a time in mexico scorpion, thai lottery results 2 october 2014 guess paper set, 10 2014 tail number tip thai lotto exclusive hair, fre tens hug dik and tits in scool, ebay window cleaning poles and brushes, best fuck ever montana craigslist 2014, japan, camel toes august, camel toe lingerie sales houston tx, full-nude stripclub, korean sex virgin move live porn, vulger sx vidio, iyaayas nude, air force, dumbasses, westboro baptist church wbc dickhead pastor,  dick pussy on road, houston, does elmo has a dark side, exo kris scenarios facts reality, member loung, texas, porn romance sex, family fucked by black cocks erotic story, african sex booty ass fuck africa furck, real cheese taco vag, strip club scorpion,  android porno big ass phat ass anal, vagina anus buttacks shape and size all information with video and pic, rhino real porn fat asssss last inch fucked hard, entp and strip clubs, pussy money weed sloth, dirty panties full of vagina lubricant, camera bra breasts cocks anal “my sister” nc, monster disc repair by tit pussy, wyoming michigan blowjob selfie photo turns viral, stripper, employment, government,  aged blonde shared on couch, veterans,  spead eagle vajazzle, yellow can-am spider, mn c-store, motorcycle, sting, engineering big boobs girl caught, grabbed boobs photos, gallery, nures hend job long nails x himster, latex bondage, miss piggy and kermit, #1 rechargeable led, 100% lifetime guarantee money back, free shipping on the high intensity usb rechargeable bike light with tw, osan afb swingers, scorpion, fakig ledy full neked to gem, unborn human fetus, scary horny pussy, scorpion swimsuits, big fish casino social rooms sexting, link exchange, wtf, super powers of the scorpion men, the snap crack and sting a beautiful bare woman fears, he fucked me with extreme force, confession, force, germni little hot babess, fuck brother fucking, sixe ass yemen, twinkal hot oooops, movemants full hd photos, krokodil crock, exotic womens belts, scorpio, gay italia, religion, property, hummer h1, woodwork

80% Of All Android Phones Are At Risk

_20140808_200944

Recently a well-known and recommended security research organization found a vulnerability in the legitimate certificate validation of the Android system. Hackers can create malicious apps to imitate trusted Android system apps such as Adobe Flash Plug-in, 3LM, etc. Malicious applications will then operate stealthily in user’s mobile devices, secretly stealing account numbers, passwords and other private information, making it a huge threat to all users.

How hackers forge trusted apps

Every Android application has its own certificate which serves as a unique identifier in the Android system, like an ID card. The Android system verifies the authenticity of an app only by referring to this ID. Once the ID is trusted, the app can carry out its operations as requested by users. Apps continue to be authenticated as long as they keep the same ID. In the real world, if one person holds the ID card of another, they can spoof that person’s identity and carry out certain transactions.

Impact of the Fake ID vulnerability

Currently the vulnerability affects devices running Android system versions from 2.1 to 4.3, which encompasses over 80% of Android users, or 100 million people worldwide.

As the Android system reports the malware as having a trusted ID, it’s difficult for the user to detect. For example, once a fake Adobe Flash ID malicious application has been verified by the system and installed on a device, it will be automatically loaded along with a browser and can then steal account credentials for online banking or social networking sites. Android will not know anything is wrong, as it thinks a trusted app is running.

Google and security vendors actively responded to Fake ID

Google published patch as soon as they discovered the vulnerability, and communicated to Samsung, HTC and other partners. At the same time they updated the Google Play app store to prevent applications that exploit the vulnerability from being added.

Users who can not update the system or install the Google Play Store are still at risk. For users who are part of this category, the CM Security Research Lab has developed a warning module and integrated it into CM Browser, Clean Master and CM Security, to provide instant protection and defense against this issue. Install Clean Master or CM Security immediately to ensure your device’s safety in real-time. As the same time surfing the web with CM Browser to prevent malicious plugins.

_20140808_200922

CM Security Researcher Lab tips:

1. Update your mobile versions to Android 4.4 and above as soon as possible.
2. Download apps from the official Google Play Store to prevent malware infection.
3. Install a reliable antivirus and keep it updated. We recommend using apps Clean Master and CM Security, which were recently awarded title of No.1 antivirus by AV-TEST for the sixth consecutive time.
4. Surfing with a secure browser .

References:

[1] http://bluebox.com/blog/technical/android-fake-id-vulnerability/
[2] https://android.googlesource.com/platform/libcore/+/android-cts-4.1_r4%5E%21/

Posted From Scorpion Sting’s Motorola Droid Maxx!

Scientists Make Fascinating Discovery

bigfoot_3

Yeti. Sasquatch. Bigfoot. Both enthusiasts and scientists alike hope to answer the question: “Do they exist?”

Thus far, most scientific analysis on so-called evidence of Sasquatches has not turned up a positive result for a new, large, primate-like species, but that’s not stopping scientists from continuing to test theories. In fact, genetic analysis of such samples was recently published in a peer-reviewed journal for the first time.

The team analyzed 30 different hair samples said to be from yetis from different sources around the world. Though their research did not confirm the existence of the creature, it did find something else.

Using a rigorous decontamination method and conducting RNA sequencing to identify species origin from the hair samples, the team found a few samples were closely related to a prehistoric polar bear. All the other samples were from known mammals that are still living, like cows, dogs, sheep and more.

According to the study published in the Proceedings of the Royal Society, some of the samples were a 100 percent match to the DNA recovered from a more than 40,000-year-old Pleistocene fossil of Ursus maritimus. This finding, the study suggests, could mean that descendants this prehistoric polar bear could still be living in the Himalayas.

“With the exception of these two samples, none of the submitted and analysed hairs samples returned a sequence that could not be matched with an extant mammalian species, often a domesticate,” the study authors wrote. “While it is important to bear in mind that absence of evidence is not evidence of absence and this survey cannot refute the existence of anomalous primates, neither has it found any evidence in support. […] The techniques described here put an end to decades of ambiguity about species identification of anomalous primate samples and set a rigorous standard against which to judge any future claims.”

“Modern science has largely avoided this field and advocates frequently complain that they have been ‘rejected by science,’” the study authors wrote in the paper’s introduction. ”This conflicts with the basic tenet that science neither rejects nor accepts anything without examining the evidence. To apply this philosophy to the study of anomalous primates and to introduce some clarity into this often murky field, we have carried out a systematic genetic survey of hair samples attributed to these creatures.”

Still, Bryan Sykes from Oxford University, who lead the study, admitted to the Guardian that he would not have embarked on such research “before I had an established reputation as a scientist.”

“There are very few reputable scientists who have ever been willing to go publicly on record as far as bigfoot and yeti,” anthropologist Todd Disotell of New York University, who was not involved in the research, told Science magazine. “This study did it right, reducing contamination and following all the standard protocols.”

Even though the study did not establish the existence of Sasquatch, Sykes told NBC News he doesn’t think “this finishes the Bigfoot myth at all.”

“What it does do is show that there is a way for bigfoot enthusiasts to go back out into the forest and get the real thing,” he said.

This information and picture found on The Blaze @ Scientists Testing for Sasquatch Actually Make a Fascinating Discovery

Jul. 2, 2014 1:07pm Liz Klimas

Posted From Scorpion Sting’s Motorola Droid Maxx!