Posts Tagged ‘hackers’
It’s 2013 and white hat hackers like Adam Laurie are still breaking into ID chips that are supposed to be secure. How come? Partly it’s the way of the world, because no man-made NFC or RFID security barrier can ever be truly impervious. But in practical terms, a chip’s vulnerability often stems from the fact that it can be taken apart and probed at a hacker’s leisure. The secure element doesn’t necessarily need to have power running through it or to be in the midst of near-field communication in order to yield up its cryptographic key to a clever intruder who has sufficient time and sufficient desire to breach the security of a smartphone, bank card or national border.
Which brings us to the latest device in NXP‘s SmartMX2 range — a piece of technology that is claimed to work very differently and that is expected to hit the market next year. Instead of a traditional key stored in the secure element’s memory, every single copy of this chip carries a unique fingerprint within the chemical structure of its transistors. This fingerprint (aka Physically Unclonable Function, or PUF) is a byproduct of tiny errors in the fabrication process — something chip makers usually try to minimize. But NXP has found a way to amplify these flaws and use them for identification, and it’d take a mightily well-equipped criminal (or fare dodger, or Scrabble cheater) to reverse engineer that.
Apple Says It Was Targeted By The Same Hackers That Hit Facebook, Will Release Protection Software Tuesday
Apple has exposed that it was attacked by the same team that went after Facebook in a recent attempt to break that network ’ s security. The company says a “ little number ” of its workers ’ Macs were affected, however there is “ no proof that any information left Apple, ” according to a report by Reuters. The business will be issuing software to avoid clients from being attacked in the same manner, Apple stated.
Apple ’ s report follows the news from Facebook on Friday that it was targeted by hackers apparently operating from China. Facebook additionally reported that none of its users ’ information was compromised with the attack. Apple is said to be workign with law enforcement on looking for the source of the hacking attempt, and will be launching a software device intended at its customers to help them protect their very own Macs against the malware used by the unknown assailant.
The goal for both Apple and Facebook, in being the source of these reports about attacks on their own companies is to be proactive and get out ahead of the news, in order to assure clients that they ’ re doing everything possible to guarantee the protection of any data they hold. The object lesson of Sony ’ s PlayStation network breach, and the taking place unfavorable judgment and lawsuits that resulted from it being regarded as “ slow ” to inform outsiders of the attack is probably one cause of heightened transparency on the part of companies facing cyber-security risks. For Apple, confessing to a protection breach is an unusual occurrence. The business acknowledged some 400 iTunes accounts were hacked back in 2010 in feedback to consumer complaints, but this kind of pre-emptive step suggests that we ’ re most likely dealing with a various level of safety hazard completely. On the plus side, account information appears not to have actually been dripped, and this indicates authorities will have the assistance of 2 technology titans and their substantial resources in tracking the criminals down.
BlackBerry announced pop music star Alicia Keys as its new Global Creative Director to great fanfare during its launch of BlackBerry 10 late last month, but if a tweet posted by Keys today is any indication, she may not be being that faithful to the new platform. The superstar was caught tweeting “Started from the bottom now were here!” from the Twitter for iPhone app this morning, despite her promise to The New York Times that she was exclusive to BlackBerry 10 now. The original tweet has since been deleted, and Keys has followed up with not an apology, but rather a claim that she was hacked and didn’t post the tweet in question. It’s hard to say for sure whether or not Keys is telling the truth and someone with her password decided to…
Incoming search terms:
And the saga continues. Just a year after Bloomberg News was apparently targeted by Chinese hackers, both The Exchange Journal and The New york city Times have separately released reports suggesting that they too are being probed. Both companies seem to think that it’s all part of a larger scheme, with Chinese hackers sifting through newsgathering systems of outlets that are stating on sensitive topics. As the Times puts it: “The attacks appear to be part of a more comprehensive pc espionage project against American information media companies that have actually reported on Chinese leaders and corporations.”
When asked about such a possibility, China’s Ministry of National Protection (unsurprisingly) rejected the allegations, noting that “to implicate the Chinese military of introducing cyberattacks without solid evidence is less than professional and baseless.” As it stands, the FBI is currently looking into various attacks of this nature, however strangely, the hacking attempts aren’t being generally deemed malicious. Paula Keve, chief spokeswoman for Dow Jones & Co., mentioned: “Proof reveals that invasion efforts target the tracking of the Diary’s insurance coverage of China, and are not an effort to obtain commercial advantage or to misappropriate client information.” As you ‘d expect, both outfits are stepping up protection in a major way in hopes of resisting any future attempts.
Declared under: InternetCommentsSource: The Wall
It initially appeared that the HTC HD2 would have a short life — after all, the phone came to the US in March of 2010 with Windows Mobile 6.5 and was denied an official upgrade to Windows Phone 7 when the OS launched some six months later. However, the venerable device has gone on to receive an almost unprecedented amount of hacker support, as the device has been cracked to run Windows Phone 7 and 8 as well as Android 4.0 Ice Cream Sandwich — not to mention other, more peculiar options like Windows XP. Now, a hacker known as @CotullaCode on Twitter has managed to shoehorn Windows RT onto the device, bringing Microsoft’s new tablet OS to a nearly three-year-old phone.
myself shocked :O twitter.com/CotullaCode/st…
As you ’ ll recall, every year TechCrunch rolls out to Las Vegas for a CES livestream to beat all others. This year, in addition to our common CE coverage, we ’ d enjoy to obtain tons of hardware start-ups on phase with us at the Las Vegas Convention center where we ’ ll be holding giveaways, live podcasts, and tons of interviews with developers, builders, hackers, and CEOs.
Want to join us? Pop over here and submit your information and we ’ ll pencil you in. Do you need to be a startup? No, however it assists.
If you ’ d like to sponsor part of the occasion please email email@example.com. Otherwise, contact me at firstname.lastname@example.org if you have any type of questions. Please place “ CES BOOTH ” in the subject line.
We ’ re anticipating covering CES the TechCrunch way by concentrating on the little men attempting to make it in a massive market and the cool things concealed behind the scenes. Help us make this CES our finest yet.
As you’ll recall, every year TechCrunch rolls out to Las Vegas for a CES livestream to beat all others. This year, in addition to our standard CE coverage, we’d love to get loads of hardware startups on stage with us at the Las Vegas Convention center where we’ll be holding giveaways, live podcasts, and loads of interviews with developers, builders, hackers, and CEOs.
Want to join us? Pop over here and submit your information and we’ll pencil you in. Do you have to be a startup? No, but it helps.
If you’d like to sponsor part of the event please email email@example.com. Otherwise, contact me at firstname.lastname@example.org if you have any questions. Please put “CES BOOTH” in the subject line.
We’re looking forward to covering CES the TechCrunch way by focusing on the little guys trying to make it in a huge market and the cool stuff hidden behind the scenes. Help us make this CES our best yet.
Combatants on both sides of Syria’s domestic dispute have actually resorted to cyberwarfare to reach their targets, and a brand-new hack has actually targeted Al Jazeera’s SMS news service, offering customers artificial breaking news updates using text message. As Doha News reports, a group calling itself the “Syrian Electronic Army” has actually claimed obligation for the hack, which sent messages claiming that an assassination effort had been made on Qatar’s prime minister. Al Jazeera confirmed the hack on Twitter, and said that their system had been jeopardized by hackers who were spreading out fake news.
While the hack was carried out on a news agency outside of Syria, it’s not the very first time pro-Syrian forces have meddled with news agencies: as the Financial Times r.
Incoming search terms:
If you are attending this weekend’s Hackathon – that is if you have tickets and are raring to go – I have some fun news. As we mentioned before, Makerbot will be in attendance with two of their 3D printers and I still have two Raspberry Pis courtesy of Adafruit Industries that will go to teams intent on building small hardware projects.
To recap, this year we’re offering one Makerbot to the team in the Disrupt Hackathon that submits the best hardware hack as chosen by some Makerbot reps. The winner will accept their prize on stage at the end of the Hackathon. While we encourage you to bring your own parts – motors, Ardiuno boards, and the like – we’d love for you to hack on (and keep) one of the Raspberry Pi mini-computers we have available. I’ve already given away two, so hurry it on up.
To request a Pi, remember that you’ll need to bring an SD card, USB keyboard and mouse, and HDMI monitor with cable. We may have some hardware on site, but don’t depend on it. If you’d still like one, email me at email@example.com with the subject line “PI ME!” and I’ll pick two folks randomly. Also remember that you must already have a ticket to the Hackathon. Got it? Good.
This will be our first hardware hack and because the Hackathon is only 24 hours we don’t expect you guys to build a ten-foot-tall robotic dancing mouse with sonar vision. Instead, we ask that you think more in terms of smaller robotics or kiosk computers for students. However, as we get better at this I expect to see ten-foot mice roaming the halls next year.
Incoming search terms:
There are masochists, then there are masochists. We ‘d have to put French hackers Dyak and Furrtek in the last category. The two ingenious and self harmful modders tweaked the loved Sega Genesis to send signals to a pair of controllers any time the player takes damages. That signal doesn’t produce rumbles or blinking lights, nonetheless, it’s passed through a port to a shock collar suggested for canines. That’s right, every time you get hit, you get zapped. The jolt of electrical power you get is barely dangerous, however it’s certainly not pleasant, as you can distinguish the barrage of obscenities bleeped out of the above video presentation. The hack isn’t precisely uncomplicated but, if you’re daring, and don’t mind a bit of discomfort, you’ll discover full details of the mod at the source link.
Filed under: GamingFrench hackers link