This Handmade Jukebox Uses a Card Scanner to Select Tracks

Designer Chris Patty may have won Christmas. This year, his family decided all the gifts they gave each other had to be handmade. He decided to make his dad a fancy jukebox with some classic tunes inside.

This isn’t a jukebox like you’d see in a ’50s diner mind you, it’s more like a wooden cigar box with a computer inside. What makes it truly unique is the way that you select tunes to play on it. He connected a card reader to the Raspberry Pi, and programmed it to choose the song based on magnetic stripe information recorded on each card.

The system limits the listener to the specific songs that Chris has created cards for, but from the looks of it, there are lots of songs to enjoy. Patty has promised a tutorial for people wanting to build their own jukeboxes is coming, and is also working on a Kickstarter for a version you can buy for yourself. You can sign up for more information on the project here.

[via The Verge via Mashable]

Hackers hijack thousands of Chromecasts to warn of latest security bug

Hackers have hijacked thousands of exposed Chromecast streaming devices to warn users of the latest security flaw to affect the device. But other security researchers say that the bug — if left unfixed — could be used for more disruptive attacks.

The culprits, known as Hacker Giraffe and J3ws3r, have become the latest person to figure out how to trick Google’s media streamer into playing any YouTube video they want — including videos that are custom-made. This time around, the hackers hijacked forced the affected Chromecasts to display a pop-up notice that’s viewable on the connected TV, warning the user that their misconfigured router is exposing their Chromecast and smart TV to hackers like themselves.

Not one to waste an opportunity, the hackers also asks that you subscribe to PewDiePie, an awful internet person with a popular YouTube following. (He’s the same hacker who tricked thousands of exposed printers into printing support for PewDiePie.)

The bug, dubbed CastHack, exploits a weakness in both Chromecast and the router it connects to. Some home routers have enabled Universal Plug and Play (UPnP), a networking standard that can be exploited in many ways. UPnP forwards ports from the internal network to the internet, making Chromecasts and other devices viewable and accessible from anywhere on the internet.

As the two say, disabling UPnP should fix the problem.

“We have received reports from users who have had an unauthorized video played on their TVs via a Chromecast device,” a Google spokesperson told TechCrunch. “This is not an issue with Chromecast specifically, but is rather the result of router settings that make smart devices, including Chromecast, publicly reachable,” the spokesperson said.

That’s true on one hand, but it doesn’t address the underlying issue — that the Chromecast can be tricked into allowing an unauthenticated attacker the ability to hijack a media stream and display whatever they want.

Hacker Giraffe sent this YouTube video to thousands of exposed Chromecast devices, warning that their streams could be easily hijacked. (Screenshot: TechCrunch)

Bishop Fox, a security consultancy firm, first found a hijack bug in 2014, not long after the Chromecast debuted. The researchers found that they could conduct a “deauth” attack that disconnects the Chromecast from the Wi-Fi network it was connected to, causing it to revert back to its out-of-the-box state, waiting for a device to tell it where to connect and what to stream. That’s when it can be hijacked and forced to stream whatever the hijacker wants. All of this can be done in an instant — as they did — with a touch of a button on a custom-built handheld remote.

Two years later, U.K. cybersecurity firm Pen Test Partners discovered that the Chromecast was still vulnerable to “deauth” attacks, making it easy to play content on a neighbor’s Chromecasts in just a few minutes.

Ken Munro, who founded Pen Test Partners, says there’s “no surprise that somebody else stumbled on to it,” given both Bishop Fix found it in 2014 and his company tested it in 2016.

“In fairness, we never thought that the service would be exposed on the public internet, so that is a very valid finding of his, full credit to him for that,” Munro told TechCrunch. (Google said in a follow-up email that it’s working to fix the deauth bug.)

He said the way the attack is conducted is different, but the method of exploitation is the same. CastHack can be exploited over the internet, while Bishop Fox and his “deauth” attacks can be carried out within range of the Wi-Fi network — yet, both attacks let the hacker control what’s displayed on the TV from the Chromecast, he said.

Munro said Google should have fixed its bug in 2014 when it first had the chance.

“Allowing control over a local network without authentication is a really silly idea on [Google’s] part,” he said. “Because users do silly things, like expose their TVs on the internet, and hackers find bugs in services that can be exploited.”

But Munro said that these kinds of attacks — although obnoxious and intrusive on the face of it — could be exploited to have far more malicious consequences.

In a blog post Wednesday, Munro said it was easy to exploit other smart home devices — like an Amazon Echo — by hijacking a Chromecast and forcing it to play commands that are loud enough to be picked up by its microphone. That’s happened before, when smart assistants get confused when they overhear words on the television or radio, and suddenly and without warning purchase items from Amazon. (You can and should turn on a PIN for ordering through Amazon.)

To name a few, Munro said it’s possible to force a Chromecast into loading a YouTube video created by an attacker to trick an Echo to: “Alexa, order an iPad,” or, “Alexa, turn off the house alarm,” or, “Alexa, set an alarm every day at 3am.”

Amazon Echos and other smart devices are widely considered to be secure, even if they’re prone to overhearing things they shouldn’t. Often, the weakest link are humans. Second to that, it’s the other devices around smart home assistants that pose the biggest risk, said Munro in his blog post. That was demonstrated recently when Canadian security researcher Render Man showed how using a sound transducer against a window can trick a nearby Amazon Echo into unlocking a network-connected smart lock on the front door of a house.

“Google needs to properly fix the Chromecast deauth bug that allows casting of YouTube traffic,” said Munro.

Updated at 9pm ET: with a new, clearer headline to better reflect the flaws over the years, and added additional comment from Google.

LG 2019 TVs boast new smarts with Amazon Alexa

Everything is becoming smarter these days. Not only that, they’re also becoming voice controlled. The latter feature is especially useful in cases where physical controls are inconvenient. And one of the most inconvenient control device is the TV remote, with its limited but confusing arrays of buttons. Which is why this year, LG is doubling its smart TVs’ intelligence with … Continue reading

Dual UPnP-Chromecast Exploit Allows Hacker to Hijack Devices, Force Any YouTube Video to Play

Hackers have discovered a bug that allows attackers to seize control of Google’s Chromecast media streaming player, making it possible to force the device into “playing any YouTube video they want—including videos that are custom-made,” TechCrunch reported on Wednesday.

Read more…

LG's 2019 TVs add HDMI 2.1 and 8K

CES 2019 hasn’t started yet, but LG is already drip-feeding information about this year’s OLED and LCD TVs. While it didn’t mention the rollable OLED we’re expecting, it did list model numbers for two 8K sets, with an 88-inch Z9 OLED and SM99 8K LCD…

Spectra X electric skateboard brings you places

Getting around from point A to point B across short distances will normally require you to walk some bit. However, there has been developments in recent years that have allowed one to go down the road of a personal mobility device. Here is an idea from Walnut Technology: the e-skateboard that is all set to debut at CES 2019 later this month. A skateboard is an icon of America, having served young people for decades in moving about, so why not throw in an electric twist?

The Spectra X is touted to be a truly shareable electric skateboard, where it will provide users with the opportunity to experience new products before purchasing. This makes life far more easy and convenient than ever before, and the presence of a sharing feature through the eBoard Go app adds on a new dimension. Courtesy of P2P sharing, the Spectra X will connect people who share the same interests, which in turn allows more people to enjoy the fun of e-skateboarding as it builds up an e-skater ecosystem. There is just something about the Internet that helps build bridges and bring people together.

Apart from the sharing feature, the Spectra X also comes with a slew of upgraded functionality. We are looking at what could be the first 3D posture control in the world, where new sensors integrated in the Spectra X are lighter and more sensitive than before, with a trio of control modes to choose from: body posture, remote control, and the eBoard Go app.

To increase its durability, the Spectra X also boasts of an IP66 water-proofed body, in addition to replaceable rechargeable batteries, and replaceable wheels. The exterior has been designed after classic sports cars, where a combination of the maple board and FRP (fiber reinforced plastic) will further enhance the toughness and the intensity of the waterproof exterior body. Perhaps pricing details will be revealed at CES as it is unveiled then.

Press Release
[ Spectra X electric skateboard brings you places copyright by Coolest Gadgets ]

Interactive ‘Black Mirror’ Movie Now Available On Netflix

When it comes to shows, we pick a title, sit back and relax, and watch it. However back in 2017, Netflix started toying with the idea of interactive content where viewers could interact with the shows to help make things more interesting, which they later rolled out to some of its children’s shows.

Now if you’re interested in such content, then you’ll be pleased to learn that Netflix’s Black Mirror Bandersnatch movie has been released. For those hearing about this for the first time, the movie is based around the Black Mirror series and shares a similar concept in the story it is trying to tell. However the key difference is that this is an interactive movie.

This means that throughout the movie, there will be moments when a choice will be presented to users on how they want to proceed, which will ultimately affect how the movie and story progresses. Unlike video games that offer up similar choices, these choices will be more basic, but the point is that it will change the way you watch the show.

According to Netflix, based on your choices, there are a variety of ways that the movie could end, which means that you could rewatch it, make different choices, and see how that works out for you. Note that not all devices will support interactive content just yet, such as Chromecast and the Apple TV.

Interactive ‘Black Mirror’ Movie Now Available On Netflix , original content from Ubergizmo. Read our Copyrights and terms of use.

Olivia Newton-John Clears Up Rumors She’s ‘Clinging To Life’ With Video Message

The “Grease” star wants her fans to know that despite her cancer, reports she is dying have been “greatly exaggerated.”

This Handmade Jukebox Uses a Card Scanner to Select Tracks

Designer Chris Patty may have won Christmas. This year, his family decided all the gifts they gave each other had to be handmade. He decided to make his dad a fancy jukebox with some classic tunes inside.

This isn’t a jukebox like you’d see in a ’50s diner mind you, it’s more like a wooden cigar box with a computer inside. What makes it truly unique is the way that you select tunes to play on it. He connected a card reader to the Raspberry Pi, and programmed it to choose the song based on magnetic stripe information recorded on each card.

The system limits the listener to the specific songs that Chris has created cards for, but from the looks of it, there are lots of songs to enjoy. Patty has promised a tutorial for people wanting to build their own jukeboxes is coming, and is also working on a Kickstarter for a version you can buy for yourself. You can sign up for more information on the project here.

[via The Verge via Mashable]

Google sat on a Chromecast bug for years, now hackers could wreak havoc

Google was warned of a bug in its Chromecast media streaming stick years ago, but did not fix it. Now, hackers are exploiting the bug — and security researchers say things could get even worse.

A hacker, known as Hacker Giraffe, has become the latest person to figure out how to trick Google’s media streamer into playing any YouTube video they want — including videos that are custom-made. This time around, the hacker hijacked thousands of Chromecasts, forcing them to display a pop-up notice that’s viewable on the connected TV, warning the user that their misconfigured router is exposing their Chromecast and smart TV to hackers like himself.

Not one to waste an opportunity, the hacker also asks that you subscribe to PewDiePie, an awful internet person with a popular YouTube following. (He’s the same hacker who tricked thousands of exposed printers into printing support for PewDiePie.)

The bug, dubbed CastHack, exploits a weakness in both Chromecast and the router it connects to. Some home routers have enabled Universal Plug and Play (UPnP), a networking standard that can be exploited in many ways. UPnP forwards ports from the internal network to the internet, making Chromecasts and other devices viewable and accessible from anywhere on the internet.

As Hacker Giraffe says, disabling UPnP should fix the problem.

“We have received reports from users who have had an unauthorized video played on their TVs via a Chromecast device,” a Google spokesperson told TechCrunch. “This is not an issue with Chromecast specifically, but is rather the result of router settings that make smart devices, including Chromecast, publicly reachable,” the spokesperson said.

That’s true on one hand, but it doesn’t address the years-old bug that gives anyone with access to a Chromecast the ability to hijack the media stream and display whatever they want, because Chromecast doesn’t check to see if someone is authorized to change the video stream.

Hacker Giraffe sent this YouTube video to thousands of exposed Chromecast devices, warning that their streams could be easily hijacked. (Screenshot: TechCrunch)

Bishop Fox, a security consultancy firm, first found the bug in 2014, not long after the Chromecast debuted. The researchers found that they could conduct a “deauth” attack that disconnects the Chromecast from the Wi-Fi network it was connected to, causing it to revert back to its out-of-the-box state, waiting for a device to tell it where to connect and what to stream. That’s when it can be hijacked and forced to stream whatever the hijacker wants. All of this can be done in an instant — as they did — with a touch of a button on a custom-built handheld remote.

Two years later, U.K. cybersecurity firm Pen Test Partners discovered that the Chromecast was still vulnerable to “deauth” attacks, making it easy to play content on a neighbor’s Chromecasts in just a few minutes.

Ken Munro, who founded Pen Test Partners, says there’s “no surprise that somebody else stumbled on to it,” given both Bishop Fix found it in 2014 and his company tested it in 2016.

“In fairness, we never thought that the service would be exposed on the public internet, so that is a very valid finding of his, full credit to him for that,” Munro told TechCrunch. (Google said in a follow-up email that it’s working to fix the deauth bug.)

He said the way the attack is conducted is different, but the method of exploitation is the same. CastHack can be exploited over the internet, while Bishop Fox and his “deauth” attacks can be carried out within range of the Wi-Fi network — yet, both attacks let the hacker control what’s displayed on the TV from the Chromecast, he said.

Munro said Google should have fixed its bug in 2014 when it first had the chance.

“Allowing control over a local network without authentication is a really silly idea on [Google’s] part,” he said. “Because users do silly things, like expose their TVs on the internet, and hackers find bugs in services that can be exploited.”

Hacker Giraffe is the latest to resort to “Good Samaritan security,” by warning users of the issues and providing advice on how to fix them before malicious hackers take over, where tech companies and device makers have largely failed.

But Munro said that these kinds of attacks — although obnoxious and intrusive on the face of it — could be exploited to have far more malicious consequences.

In a blog post Wednesday, Munro said it was easy to exploit other smart home devices — like an Amazon Echo — by hijacking a Chromecast and forcing it to play commands that are loud enough to be picked up by its microphone. That’s happened before, when smart assistants get confused when they overhear words on the television or radio, and suddenly and without warning purchase items from Amazon. (You can and should turn on a PIN for ordering through Amazon.)

To name a few, Munro said it’s possible to force a Chromecast into loading a YouTube video created by an attacker to trick an Echo to: “Alexa, order an iPad,” or, “Alexa, turn off the house alarm,” or, “Alexa, set an alarm every day at 3am.”

Amazon Echos and other smart devices are widely considered to be secure, even if they’re prone to overhearing things they shouldn’t. Often, the weakest link are humans. Second to that, it’s the other devices around smart home assistants that pose the biggest risk, said Munro in his blog post. That was demonstrated recently when Canadian security researcher Render Man showed how using a sound transducer against a window can trick a nearby Amazon Echo into unlocking a network-connected smart lock on the front door of a house.

“Google needs to properly fix the Chromecast deauth bug that allows casting of YouTube traffic,” said Munro.