Millions of eBay users have already changed their passwords after the auction site was hacked, eBay has confirmed, updating its homepage to finally make clear to visitors that their information … Continue reading
DARPA Is Using Oculus Rift To Build The ‘Mega Man Battle Network’ Of Cyberwarfare
Posted in: Today's Chili In a surprising amount of futuristic visions of how hacking will work in the future, the experience is immersive, rather than something done hunched over a computer looking at lines of code scroll by. DARPA appears to agree with the full-body submersion vision of hacking’s future, as it’s working on an Oculus Rift-based interface for use by U.S. military hackers, one part of its Plan… Read More
Siri loves to give answers — often snarky — but she doesn’t do much outside of create reminders. The voice assistant for iOS is handy, but lacks a lot of … Continue reading
It might have taken some extra time, but Samsung quickly adopted biometric security on their new S5 flagship Android phone. However, it didn’t take hackers long to figure out a way to defeat it.
Apparently, the fingerprint scanner of the S5 isn’t hard to spoof. SRLabs have been able to spoof it using a lifted print. It took them only a few minutes to create a dummy finger to allow them access to the phone. This is also true of the scanner on the iPhone 5s, however the iPhone 5s has got a password to allow access to the scanner, which the Galaxy S5 doesn’t have yet.
Hopefully, a quick software update will patch this vulnerability. PayPal has already reacted with a statement, saying that there are plenty of additional safeguards that will allow users peace of mind when using biometric security. With any luck, your money is still safe.
[via BGR]
There aren’t that many Tesla Model S owners around, but those who are do seem to comprise of people who have a different way of seeing things. Apparently, some Tesla Model S owners have already tried to hack their ride by wiring into the Model S’ communications system. A forum user who goes by the moniker of “nlc” managed to locate a number of ports and tap into the data which flows straight to the center console and navigation screens. It seems that these “hackers” found out that the sub-system actually ran on a version of the Ubuntu operating system, which so happens to be a variant of Linux.
Heck, there was even someone who managed to circumvent this discovery in order to have Firefox up and running on the center console touchscreen, although it does not seem as though there are other more invasive efforts to be made via the Ethernet entry point.
Tesla is not too happy to hear about this news, where via its service center, it has already informed the original Ethernet exploiter that Tesla knows what has gone on, and that such activity would lead to the warranty being void. After all, the Motor Vehicle Purchase Agreement (MVPA) comes with a clause which reads, in part, “You may not, or may not attempt to, reverse engineer, disassemble, decompile, tamper with or engage in any similar activity in respect of a Tesla Vehicle, nor may you permit any third party to do so, save only to the extent permitted by applicable law.”
Tesla Model S Owners Hack Own Cars, Discover Ubuntu , original content from Ubergizmo, Filed in Transportation, Hack, tesla, ubuntu,
The NSA has not only known about the Heartbleed bug for at least two years, but exploited it in regular surveillance attacks, insider sources have alleged, opting to keep the … Continue reading
Once upon a time it was a rite of passage for car lovers to get under the hood and tinker with the mechanics; in the modern world of EVs, that’s … Continue reading
Apple builds in security features and the ability to track a lost or stolen iPhone into the iOS 7 and higher operating system. Those features allow a user to track … Continue reading
Security breaches in the digital world seem to be all too common these days, and such malicious activity does seem to have picked up in pace in recent times, too. Thankfully, what has happened with the email addresses of LinkedIn users this time around IS NOT a security breach, but rather, Sell Hack, a free extension for the Chrome browser, will rely on an algorithm in order for it to “guess” members’ email addresses. This would mean Sell Hack falls back upon publicly available data, after performing a comparison against the rest of the information online, resulting in storing such lookups that ends up in a giant database.
LinkedIn Email Addresses Exposed Via Browser Plug-In Software original content from Ubergizmo.
Sponsored by the game Watch Dogs, the folks at RatedRR explain how you can hack into anything in real life—from cameras to AC units to smart power outlets to wireless LED lights—to use those home devices as remote bomb detonators. And of course, their demonstration includes actual bombs and explosions for your cheering pleasure.