itsBX hiphop sports wild'ish games movies news eyecandy tech gear rides
most viewers popular now #top20 top yesterday all sections videos pics tracks headlines

most watched this minute | see more
most viewed right now
57 viewing
Video inside Sauce Walka checks Young Thug in Houston
most viewed right now
46 viewing
 Image inside This is what happens when u put pu#$y on the pedestal
most viewed right now
37 viewing
 Oct 6 - Michigan $310M Powerball winner says she quit ‘nasty, dirty’ job
most viewed right now
27 viewing
 Video inside Drake & Future’s ‘WATTBA’ Suffers One Of The Worst Sales Drops In Hip H..

whats new right now

8 hours ago

Video inside Tech Tuesday Microsoft Event Round Up

2 people viewing this

| By Witness101 - 8 hours ago

Read 0 comments »

8 hours ago

Video inside Sharp Just Created The Most Advanced Smartphone Of All Time

4 people viewing this

| By mr_underground - 8 hours ago

Read 0 comments »

11 hours ago

Verizon confirms Samsung Pay support

3 people viewing this

| By Tiko377 - 11 hours ago

Samsung Pay was launched in the United States last month, the payments service requires carrier support to work and naturally it raised a few eyebrows when it was confirmed that Verizon will not be supporting the service at launch. This means that Verizon users are unable to use Samsung Pay on their carrier-branded devices, even though itÂ’s the largest mobile carrier in the country, it was hinted recently that Verizon might confirm supporting the new service soon and now the company has sent out a tweet through its official account confirming just that.

Verizon has confirmed that itÂ’s going to support Samsung Pay on compatible smartphones which include the Galaxy S6, the Galaxy S6 edge, the Galaxy S6 edge+ and the Galaxy Note 5. The carrier says that itÂ’ll flip the switch on the service through a future software update but doesnÂ’t say precisely when the software update will be released. At least Verizon users now know that their carrier will allow them to use SamsungÂ’s new payment service at some point.

*tweet embedded g-pay-support/

Read 4 comments »

15 hours ago

(The UK's NSA) GCHQ's SMURF ARMY can hack smartphones, says Snowden. Again.

2 people viewing this

| By toonice12 - 15 hours ago

Whistleblower Edward Snowden has given an interview to BBC investigative programme Panorama in which he's added further detail on an array of tools named after the Smurfs* that allow UK intelligence agencies to hack smartphones.

Privacy International has already aired much of what Snowden explained to Panorama, namely that a tool called “Nosey Smurf” turns on a phone's microphone to use it for audio surveillance. Snowden also discussed “Dreamy Smurf”, which he says can turn a phone on or off. “Tracker Smurf” is a geo-location tool that Snowden says offers a more accurate method of locating a phone and its carrier than using triangulation. Another Smurf can operate a smartphone's camera.

“Paranoid Smurf” does its best to hide the activities of the other Smurfs, Snowden said, so that someone skilled enough to repair a phone won't find traces of the other Smurfs' work.

The Smurf army arrives by TXT messages, Snowden says, without users ever being aware of the message or its payload arriving or altering their phones in any way.

The interview also repeats and expands upon previous allegations that the UK Government Communications Headquarters (GCHQ) was able to compromise Cisco routers used in Pakistan, gaining the ability to surveil government and civilian communications within the country.

GCHQ has offered no comment in response to Snowden's allegations.

Read 2 comments »

17 hours ago

Article inside Early iPhone 6S owners reporting burning hot Touch ID buttons

3 people viewing this

| By JoeDoe22 - 17 hours ago

*tweet embedded

*tweet embedded

*tweet embedded

While more than a handful of users have complained about this issue, it pales in comparison to last year's infamous bendgate, where a small number of iPhone 6 models bent in the pockets of users. In other words, don't expect to see something to effect of #heatgate or #burnghazi trending on Twitter any time soon, even if it is a... hot button issue.

Apple has yet to respond to a Mashable request for comment. One user reported the issue to Apple Support and the representative said he "hadn't heard" of this issue prior.

9to5Mac also reports that users are experiencing a variety of other bugs with their new iPhones, mainly software related. With the addition of 3D touch, users are reporting that normal taps on web links won't open up Safari as normal, and others complain of poor sound quality with the iPhone 6S's internal speaker.

While the hot TouchID is somewhat alarming, the reality is that early production devices often have small issues like this. Take for example, the battery problems of the very first run of iPhone 5 and 5S models.

Apple often addresses such issues in a software update, only replacing or repairing hardware when necessary. /#mz492xcRzqqm thread/7247833

Read 25 comments »

2 days ago

Video inside Conversation Between Robots

2 people viewing this

| By awww - 2 days ago


Marcus Du Sautoy meets robots that learn about their own body from their reflection and begin to communicate, a step closer to artificial intelligence? Taken from The Hunt for AI.

Read 5 comments »

2 days ago

Official Surface Pro Event Thread (October 6th)

2 people viewing this

| By Jago - 2 days ago

October 6th, 10 AM EST

Surface Book

Surface Pro 4

Lumia 950 And 950 XL

Microsoft Band

Read 66 comments »

2 days ago

Image inside iPhone 6s/6s Plus Adoption Rates Lower Than iPhone 6/6 Plus

4 people viewing this

| By Jago - 2 days ago


While Apple is reporting record sales for the iPhone 6S and 6S Plus (13 million sold in 3 days), our research shows that the iPhone 6S and 6S Plus are experiencing lower adoption rates in the first week of their availability versus the same timeframe for the iPhone 6 and 6 Plus last year.

One week after launch, the 6S and 6S Plus account for 1.9% of all iPhones. Whereas last year after one week of sales, the iPhone 6 and 6 Plus accounted for 2.7% of all iPhones.

This data is not necessarily shocking, considering many may view Apple’s iPhone S version launches as “softer” launches with only minor improvements and features.

By comparison, the adoption rates of the 5S and 5C versus the 5 support this view. In 2013, only 1.2% of all iPhone users had adopted the new 5S or 5C models within the first week of their availability. Whereas, in 2012 the iPhone 5 accounted for 3.1% of all devices after the first week of sales.

For some people, it would also seem the reduced price of the 6 and 6 Plus is more compelling than the feature enhancements of the 6S and 6S Plus, as the adoption of last yearÂ’s models has also increased. One month ago the iPhone 6 accounted for 30% of all devices. Whereas today, even with the new 2015 models available as an option, it represents 33.2% of all devices.

iOS 9 Upgrades are Stronger than iOS 8, Slower than iOS 7

Looking across OS upgrades for the last three Apple iOS versions over the first two weeks of their availability, our data shows that iOS 9 has stronger early adoption across eligible devices* than that of iOS 8, but that both still pale in comparison to the early days of iOS 7.

This is likely due to the fact that iOS 7 offered many visual and easy to grasp changes that resulted in fast adoption. The visual changes that came with iOS 7 were likely more significant to the average user, compared to (for example) iOS 8Â’s silent push or iOS 9Â’s app switching feature, which may be more appealing to tech fans or developers. As iOS 7 was more appealing to a broader audience, the adoption rates of iOS 8 and iOS 9 are more typical of what we expect to see in adoption rates over the first two weeks.

iOS 9 Is Most Popular on Newer Devices

On average, 46.6% of all eligible Apple devices have upgraded to iOS 9. Unsurprisingly, newer devices tend to upgrade faster, with the iPhone 6 Plus and 6 adoption at 59% and 55% respectively. The iPhone 4S, which is the oldest phone that is still eligible to upgrade to iOS 9, has the slowest adoption rate to date with only 30%.

iPhone 6S / 6S Plus Show Lower Adoption Rates Than 2014 Models

Read 6 comments »

2 days ago

The Xperia Z5 Compact's BBQ Grill Feature Is Causing Touchscreen Issues

3 people viewing this

| By Jago - 2 days ago


Last month in a teardown of the Sony Xperia Z5 Premium, it was discovered that Sony had included an extra heat pipe in the phone. What this does is that it allows for better heat dissipation, which is handy when you consider that the Snapdragon 810 chipset is said to be prone to overheating.

This was applied to the Xperia Z5, but there was no confirmation of whether it was the same situation for the Xperia Z5 Compact. Unfortunately according to recent reports out of China (via Tech Grapple), it turns out that maybe the Xperia Z5 Compact was not given the same treatment because now there are users who are reporting that their Xperia Z5 Compact phones are overheating.

The overheating issues have gotten to the point where not only does the phone get hot (obviously), but it starts to get sluggish when users try to interact with the screen, making the touch laggy. In some cases, it would seem that the screen will not even respond to touch, and only after locking/unlocking it will it begin with work again.

Rebooting the phone seems to offer some kind of temporary fix as it allows the phone to cool, but ultimately it is not a permanent fix. No word on how widespread this issue is, but if you have an Xperia Z5 Compact that overheats, do let us know in the comments below.
Sony Xperia Z5 Compact Is Apparently Overheating For Some | Ubergizmo

Read 28 comments »

2 days ago

Article inside iOS malware YiSpecter: NO iPHONE IS SAFE

4 people viewing this

| By toonice12 - 2 days ago

World where only jailbroken iThings were vulnerable is 'thing of the past'

The first iOS malware capable of attacking both non-jailbroken and jailbroken devices has surfaced online.

The mobile malware nasty - YiSpecter - hooks into private APIs in the iOS system to implement malicious actions has been in the wild for at least 10 months, mostly in China and Taiwan, since November 2014 if not earlier.

YiSpecter uses a battery of unusual tricks to spread itself. Distribution tactics include hijacking of traffic from nationwide ISPs, a worm on Windows, and an offline app installation and a community promotion. Initially the malware spread by posing as a “private version” or “version 5.0” of a famous but discontinued media player QVOD that offered the ability to watch porn videos online. Spreading tactics have evolved towards greater sophistication and diversity.

YiSpecter consists of four different components that are signed with enterprise certificates, according to security researchers at Palo Alto Networks, who add that the malware uses a variety of tricks to hide its presence on compromised systems, such as the use of the same name and logos as system apps and hiding their icons from iOSÂ’s SpringBoard, which prevents the user from finding and deleting them. Once installed the malware mounts a variety of cybercrime scams, as detailed in a blog post by Palo Alto Networks.

On infected iOS devices, YiSpecter can download, install and launch arbitrary iOS apps, replace existing apps with those it downloads, hijack other appsÂ’ execution to display advertisements, change SafariÂ’s default search engine, bookmarks and opened pages, and upload device information to the C2 [command and control] server.
Whether an iPhone is jailbroken or not, the malware can be successfully downloaded and installed. Experience from victims suggests that even if you manually delete the malware, it will automatically re-appear. Manually removing YiSpecter is tricky but possible, according to Palo Alto, which has published some instructions.

iOS had remained (almost) malware-free for years. However YiSpecter is the latest of a relatively small but growing collection of malware families to target iOS devices. WireLurker previously demonstrated the ability to infected non-jailbroken iOS devices by abusing enterprise certificates. Academic researchers have discussed how private APIs can be used to implement sensitive functionalities in iOS. YiSpecter is the first real world iOS malware that combines these two attack techniques, according to Palo Alto.

Palo Alto Networks has released IPS (intrusion prevention system) and DNS signatures to block YiSpecterÂ’s malicious traffic. Apple has also been notified about the outbreak.

Last month Palo alto warned of an OS X and iOS malware named XcodeGhost. Developers who relied on this malicious version of AppleÂ’s Xcode developer tool produced apps with a built-in backdoor. Again the issue was largely confined to China but security researchers reckon the two problems are NOT related.

“While YiSpecter and XcodeGhost both attacked non-jailbroken iOS devices, they are not related to each other,” Palo Alto said. “We believe that YiSpecter and XcodeGhost were developed by different attackers and there is no evidence of cooperation between the two developers so far.”

If anything, YiSpecter poses a greater risk to iPhone and iPad (fondleslab) security.

“The world where only jailbroken iOS devices were threatened by malware is a thing of the past,” Palo Alto concludes. “WireLurker proved that non-jailbroken iOS devices can also be infected through abuse of the enterprise distribution mechanism. YiSpecter further shows us that this technique is being used to infect many iOS devices in the wild.”

“The key techniques deployed in YiSpecter are bypassing App Store reviews using enterprise distribution and abusing iOS private APIs to perform sensitive operations,” it adds.

Read 3 comments »

2 days ago

Image inside It's Official: Google Becomes ALPHABET

2 people viewing this

| By toonice12 - 2 days ago

"Alphabet is about businesses prospering through strong leaders and independence. In general, our model is to have a strong CEO, who runs each business, with Sergey and me in service to them as needed."

With this, founders Larry Page and Sergey Brin combined all Google products and services under one roof - ALPHABET.

Revealed in their Google Investor's Blog, the newly formed Public Holding Company ALPHABET would be taking place at the closing of business on October 2, 2015.

From now on Google would be the subsidiary of Alphabet and owning all of the outstanding capital stock of Google.

Moreover, by implementing a holding company reorganization the "Alphabet Merger" will close today.

Until now, the ticker symbol used by Google in the stock market was "GOOG" and "GOOGL" (on NASDAQ), which are kept same even after the merger.

This makes Google Class C Capital Stock and shares of Google Class A Common Stock being traded as Alphabet Class C Capital Stock and Alphabet Class A Common Stock.

The recasting of Board of Directors is done in a way that would comprise:

Larry Page as the Chief Executive Officer (CEO)
Sergey Brin as the President
Eric E. Schmidt as the Executive Chairman of the Board of Directors
Sundar Pichai as the CEO of Google

Further, a noticeable change seen will be, this time the company releases its Q4 financial results in January, i.e. it will report earnings for two different
components of Alphabet:

1. Larry Page's Alphabet
2. Sundar Pichai's Google

Alphabet includes:

Calico (life-extension biotech research)
Nest (smart home products)
Fiber (high-speed Internet service)
Ventures (early-stage investing)
Capital (growth-stage investing)

However, the stockholders of Google will not face gain or loss for the United States federal income tax purposes upon the conversion of their shares in the Alphabet Merger.

Read 9 comments »

2 days ago

Article inside How to evade Apple's anti-malware Gatekeeper in OS X and really ruin a fanboy's week

4 people viewing this

| By toonice12 - 2 days ago

Need a better latch on that gate

The myth that Macs are inherently more secure than Windows PCs has taken another hit.

Patrick Wardle, a former NSA staffer who now heads up research at crowdsourced security intelligence firm Synack, has found a new route around Apple's defensive Gatekeeper technology.

Apple's Gatekeeper utility is built into OS X, and is designed to verify the integrity and origin of software installed on Macs. By default, only code digitally signed by registered developers – or, with more restrictive settings, only packages from the Mac App Store – should be allowed to run. The technology was introduced in July 2012.

Wardle has found a way around these restrictions. During a presentation at the Virus Bulletin conference in Prague on Thursday, Wardle detailed unpatched vulnerabilities he has found in Gatekeeper that allow attackers to spread unsigned binaries containing malware, circumventing Gatekeeper in the process.

The essential problem is that Gatekeeper only verifies the signatures on app bundles. Malicious unsigned binaries stored outside an app can still be loaded without Gatekeeper interfering.

In other words, when a legit signed application is run, and it pulls in an outside library file, if an attacker can replace that file with something malicious, OS X will load that file into the app and allow it to execute, no questions asked – even if the external library is unsigned and completely untrusted.

It's therefore possible to inject dodgy code into an otherwise normal application – a stepping stone to infecting a Mac.

Of course, if you can modify that external library, you may be in a position to cause damage to the Mac, or snoop on the user, without any help from Gatekeeper – but that doesn't change the fact that Wardle has uncovered a design flaw in Apple's system.

"External content is not verified by Gatekeeper" at run-time, and this remains a vulnerability months after Apple patched a related dylib hijack vulnerability, Wardle told El Reg.

Gatekeeper still permits run-time shenanigans
This latest Gatekeeper bypass follows previous research from Wardle that showed it was possible to sidestep Apple's Gatekeeper using a malicious dylib (equivalent to a DLL on Windows).

Aside from this, dodgy software can always exploit other vulnerabilities to evade Gatekeeper entirely, as was the case for the infamous Flashback malware.

Wardle has presented at numerous security conferences over recent years about the various security shortcomings of Mac OS X in general, as previously reported.

Gatekeeper ... and some of the ways around it
On Wednesday, Apple released OS X "El Capitan," its latest desktop operating system, but it too is vulnerable. Wardle has notified Apple about his latest research and a fix is likely. In the meantime, users should stick to downloading software from the Mac App Store, Wardle suggested. As things stand, Gatekeeper by itself only protects Mac fans from lame attackers, according to Wardle.

While Apple's Gatekeeper provides for basic code-signing validation, it is essentially a blacklisting technology that many developers have legitimate reasons for disabling. Wardle's research is nonetheless noteworthy, especially since Macs are becoming an increasingly common desktop option in companies, partly as a result of the industry-wide BYOD trend.

"Anyone who has read Patrick [Wardle]'s research will realize that many of the security mechanisms built into OS X are not suitable for enterprise-level security," said Andrew Avanessian, VP at security tools firm Avecto.

"With Gatekeeper being simply bypassed, it is time for organizations to consider layering extra defenses on top – such as privilege management and application control – in order to mitigate attacks and prevent unwanted content from executing."

As Mac adoption in the enterprise increases, so too does the frequency of attacks, and this calls for a fresh approach to security for the platform, according to Avanessian.

"Whilst Macs have come a long way in the past 20 years, the security offerings have stood still – even the major vendors offer little more than basic antivirus," he added. "It is time for enterprises to think differently when it comes to Macs and learn the lessons from Windows."

And for the the record I fu*k with Linux! I choose to mess with the lesser of the three evils.......

Read 2 comments »

2 days ago

Video inside Pastor Troy says FU€K COMCAST

4 people viewing this

| By sdeacons - 2 days ago ast-so-bad-56/

Why is Comcast So Bad
By Brad Reed
Friday October 2, 2015, 12:40 PM
Comcast has a problem: It wants to implement data caps but it knows customers hate data caps. Its solution: Call them something other than “data caps.” As DSLReports points out, Comcast is bringing its capped data plans to lucky customers in Florida while simultaneously insisting that it isn’t implementing data caps.

RELATED: FCC complaints reveal the horrors of ComcastÂ’s data caps

In short, ComcastÂ’s plans are the same ones that AT&T and Verizon have implemented for years now with their 4G LTE networks: YouÂ’re offered an array of tiered plans that give you a set limit on data you use every month and then charge you overage fees if you exceed it. Comcast is also offering a more expensive unlimited data plan in which you can keep the unlimited data plan youÂ’ve traditionally had for an extra $30 a month.

Traditionally, AT&T and Verizon havenÂ’t made a big deal out of their capped plans being referred to as data caps. In fact, itÂ’s widely accepted in the world of tech jargon that both carriers have data caps. Comcast, however, has a different take on the matter: The company says that real data caps only occur when youÂ’re completely cut off from your Internet service after exceeding your monthly limit, whereas with these plans youÂ’re only charged an overage fee.

“We don’t call it a cap,” Comcast spokseman Charlie Douglas tells Fortune. “We call it a data plan just like wireless companies have data plans.”

But why stop at boring old “data plans,” Comcast? Why not call them “happy plans?” Or if you want to go all red-white-and-blue, “freedom plans” or “liberty caps?”

WhatÂ’s particularly galling about ComcastÂ’s take on its capped data plans, however, is its insistence that theyÂ’re really about fairness. After all, the company argues, why should Mr. and Mrs. Normal Internet user have trouble viewing their favorite cat GIFs because some uber-dork is illegally torrenting 4K movies from his basement 24 hours a day?

The trouble with this, of course, is that the amount of data that Internet applications consume is constantly growing. So while using 300GB a month might seem like a lot to some people right now, it won’t be once more people start streaming Netflix in 4K. And anyone who downloads games from the web right now can easily go over their monthly cap in no time — for instance, consider that Grand Theft Auto V weighs in at just under 49GB, which means that downloading just one game can blow through 16% of your monthly cap.

Put simply, these happy freedom caps have nothing to do with fairness. Rather, theyÂ’re a business decision made by Comcast to help generate more revenue to make up for declining pay TV subscribers.

At any rate, if you live in Florida and Comcast tries to tell you that it doesnÂ’t have data caps, donÂ’t believe it. Unless, that is, you donÂ’t believe AT&T and VerizonÂ’s wireless services have data caps either.


Read 10 comments »

3 days ago

Video inside Pocketnow: iPhone 6s Plus vs Galaxy Note 5/S6 Edge +

3 people viewing this

| By mtva24 - 3 days ago

Read 20 comments »

4 days ago

Article inside SMH.... AdBlock Extension has been Sold to an 'Unknown Buyer'

3 people viewing this

| By toonice12 - 4 days ago


Adblock Extension that blocks annoying online advertising has been sold...

...And more shocking, the most popular "Adblock Extension", with more than 40 million users, quietly sold their creation to an unknown buyer...

'Michael Gundlach', the creator widely used Adblock Extension refuses to disclose the name, who purchased his company and how much it was sold for, just because buyer wishes to remain anonymous.

After watching a popup message (as shown) on their browsers this week, the Adblock users are literally going crazy.

"I am selling my company, and the buyer is turning on Acceptable Ads," Gundlach said.

Holy Sh*t! NSA Buys Adblock?

The ‘Anonymous buyer’ conspiracy has caused concern for Adblock users and they have raised number of questions on social media sites, such as:

1. Should I trust AdBlock Extension anymore?
2. Who owns the Software I have installed?
3. Is it NSA?

Also, reportedly, Michael Gundlach will no longer be associated with Adblock company or the Buyer's company.

AdBlock to Turn on “Acceptable Ads”

No doubt, Ad-blocking has become a huge problem for Online Publications and websites that rely on Ad Revenue...

...but now these utilities have changed their fundamental idea for making money by enabling the "Acceptable Ads" feature, which maintains a whitelist of ads that aren't blocked by default.

Until now, the company makes money either through donations or through direct payments for its software license.

However, Acceptable Ads feature will now let some advertisements through on by selected websites or by selected companies by default, if those companies pay for showing their ads.

So, Does that make any sense?

What Should you do?

However, it is too early to come to any conclusion, but AdBlock users should pay close attention to future upgrades just to be on the safer side. Or just ditch Adblock and use uBlock Origin....

Read 46 comments »

4 days ago

Video inside iPhone 6s Review!

2 people viewing this

| By KingP1n - 4 days ago

Read 5 comments »

4 days ago

Video inside iPhone 6s Plus With 2GB RAM Smokes Galaxy Note 5 With 4GB RAM In Real-World Speed Test

4 people viewing this

| By mrfreak76 - 4 days ago

To be fair, this is Android with Touchwiz, so I'm assuming stock Android would be faster. :iduunobro:

Read 34 comments »

4 days ago

Video inside 25 3D Touch Tips Every iPhone 6s / 6s Plus User Needs To Know About [Video]

3 people viewing this

| By mrfreak76 - 4 days ago

Read 4 comments »

4 days ago

Video inside Ultra Futuristic Smart Rope

2 people viewing this

| By mr_underground - 4 days ago

Read 0 comments »

5 days ago

Image inside FBI: We unmasked and collared child p0rn creep on Tor with spy tool

4 people viewing this

| By toonice12 - 5 days ago

Dark-web deadbeats may not be as anonymous as they think. A bloke in the US was charged on Friday after FBI spyware caught him downloading child sex abuse material.

Luis Escobosa, of Staten Island, admitted to Feds he broke federal child pornography laws by viewing depraved photos on a hidden Tor service. Unknown to Escobosa, the Feds were running the hidden server, and were using it to feed him spyware.

The child porn website's systems were seized in Lenoir, North Carolina, after agents got a court order in February. The Feds continued to keep it in operation for two weeks afterwards to catch perverts using it. The site had nearly 215,000 users.

Because users had to use Tor to access the warped website, the web server's logs were of little use to investigators – they simply listed the nodes of the anonymizing network. Instead, the FBI deployed a NIT – a "network investigative technique," or what in the hands of criminals would be termed spyware.

The FBI has been using NITs for over a decade.While the Escobosa indictment doesn't give details, other court documents have stated that the software was developed by adapting a tool written by white hat hacker HD Moore called the Metasploit Decloaking Engine.

A NIT works like this: a file, typically a Flash file, is hosted by a seized child porn website, and sent to web browsers when perverts visit the hidden service via Tor. This Flash file is run in Adobe's plugin, and establishes a direct connection to an FBI-controlled server on the public internet without going through Tor.

The Feds can then, in most cases, read off the user's real public IP address from this connection, unmasking the scumbag.

In Escobosa's case, the software reported back he was using a computer in Staten Island via Verizon's fiber service. After determining his home address from the ISP using a subpoena, FBI agents got a search warrant, and snatched the man's computers in late June.

The investigators said Escobosa thought he kept no copies of illegal imagery on his PC, but agents found 115 child sex abuse images stored in the thumbnail cache of his Tor browser – plus logs of IRC chats with other pedophiles. After he was cuffed, Escobosa kept his mouth shut and demanded a lawyer, then admitted to the Feds he had cruised websites looking for unspeakable images.

Escobosa was then given a polygraph test to determine if he had physically abused children, which showed he had not. He has appeared before magistrates in an eastern district court of New York, and is free on a $150,000 bond awaiting trial.

According to the FBI, Escobosa joined the notorious Playpen website on February 4 using the handle Fraud92787, and on one day alone in March, found 70 indecent pictures of three girls aged between five and eight.

This isn't the first time a NIT has been used to find someone using the dark web for nefarious purposes, and it won't be the last.

So in other words the Feds are hacking too!!!!!

Bouns: cough-2266388/

Read 37 comments »

ItsBX - #top20 list | hot topic blog
          join bx


most viewed right now
18 viewing
Joe Budden- All Love Lost [Anticipation/Discussion] Thread
2 days ago
most viewed right now
9 viewing
Oct 5 - Ohio judge upholds suspension of 12-yo boy for STARING CONTEST
2 days ago
most viewed right now
7 viewing
Image inside Oct 5 - Vladimir Putin To Send Russian Spetsnaz Into ISIS Capital For ..
1 day ago
most viewed right now
7 viewing
Well Damn, Female Gets Jumped After Getting Caught Stealing From Walmart!
2 days ago
most viewed right now
7 viewing
Oct 5 - 4 Reasons My Six-Figure Job Led to an Unhappy Life
2 days ago
most viewed right now
3 viewing
Video inside Game Replies to Stitches & Disses Young Thug: "I Will Put Hands On You...
1 day ago
most viewed right now
3 viewing
Android 6.0 Marshmallow Factory Images Are Live!
2 days ago
most viewed right now
3 viewing
50 Cent Blames Empire Ratings Dip on Too Much 'Gay Stuff'
2 days ago
contact us   |   mobile   |   privacy statement   |  ItsBX. 1998 - end of time. Powered by: vBulletin