Name.com hacked: Encrypted card details and more stolen

Domain retailer Name.com has been hacked, the company has informed customers today, with usernames, email addresses, and encrypted passwords and credit card details all stolen from the company’s servers. The hack, Name.com said in an email to registered users, is believed to have targeted “information on a single, large commercial account” with the company, with the other stolen data being taken along for the ride.

name-com_hacked

However, Name.com is also keen to point out that, even though the data has fallen into unauthorized hands, the most important parts are encrypted. Credit card details, stored at the site for easier domain registration renewals, had their private encryption keys “stored physically in a separate remote location that was not compromised,” Name.com insisted.

Meanwhile, the EPP codes needed for domain transfers are also safe, since they too are stored in a different location to the bulk the user registration data. “We have no evidence to suggest that your data has been used for fraudulent activities” Name.com concludes.

Nonetheless, all Name.com subscribers will have to change their password before they can log back into their account, even if their information wasn’t among that extracted. The company also suggests changing your login credentials if you use the same username and password combination with other sites and services.

Data hacks have become more commonplace in recent years, as databases of consumer information become increasingly tempting to spammers, those committing credit card fraud, and other criminals. Last month, Amazon-owned daily deals site LivingSocial admitted that its servers had been compromised, with data of 50m users extracted.


Name.com hacked: Encrypted card details and more stolen is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

US directly accuses Chinese government of cyberespionage

After months of suggesting that China is behind high-profile hacking attempts on businesses and the US government, the US has finally laied some blame for cyber attacks directly at the feet of the Chinese government and military. The Pentagon issued a report Monday making a more direct accusation of cyberespionage perpetrated by China than it’s ever issued in the past.

gw19b-china-flag-great-wall1

The United States has long suggested that China is one of the top sources of cyber attack on the planet. China has continually denied these accusations. However, the new Pentagon report directly attributes some cyber attacks to the Chinese government and the Chinese military. The technologies that cyber attacks carried out by China target are designed to both benefit China’s defense and technology industries and to give an insight into the thought process of US policymakers.

The report says that China is using cyber attacks to support intelligence collection against the United States’ diplomatic, economic, and defense industrial base. Chinese officials have responded to the Pentagon report reiterating that the Chinese government opposes any form of cyberespionage. Chinese officials also said that the United States has a history of criticizing its “legitimate and normal defense building.”

The report issued by the Pentagon also claims that China has deployed anti-ship cruise missiles on its naval vessels. Those anti-ship missiles pose a threat to American naval vessels according to the report. Defense analysts also say that the report shows China’s military modernization is allowing it to expand its focus from Taiwan to the wider region in Asia.

[via Wall Street Journal]


US directly accuses Chinese government of cyberespionage is written by Shane McGlaun & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

All-in-one Atari 2600 controller crafted to curtail retro gaming clutter

Allinone Atari 2600 controller crafted to curtail retro gaming clutter

Ahhh, the venerable Atari 2600. The godfather of console gaming has, in recent years, seen a resurgence as a hacker’s muse — mods to its innards and controllers are legion on the web. Recently, a new mod emerged: a controller that combines the capabilities of the Atari’s joystick, paddle and keyboard controllers. It’s crafted from a small wooden box, a cannibalized joystick, an Ethernet cable, some switches and a smattering of other electronic bits, and there’s a full how-to on making one of your own on Instructables, courtesy of user x2Jiggy. If the mere mention of such an all-in-one has those DIY juices flowing, head on past the break for a construction video and see how it’s done. It’s high time you dust off your stock 2600 and break out Pitfall, Adventure or, well, Breakout.

Filed under:

Comments

Via: Hack a day

Source: Instructables

Google Glass Winky app takes snaps as you flirt

For years, winking has been the universal “come hither” gesture; now, for those flirting while wearing Google Glass, it can also grab a lasting memory of whoever caught your eye. A new, unofficial Glass app called Winky enables wink-photography, snapping an image whenever the internal camera notices the wearer specifically blinking their eye.

google_glass_winky

The tweak is the handiwork of Mike DiGiovanni, Emerging Technology Lead at Roundarch Isobar, who you might remember from yesterday’s “Bulletproof” lockscreen for securing Glass when it’s not gripping your face. Winky is an Android app that monitors the Glass user’s eye and, when they give an exaggerated blink, fires off a photo without them having to use the “OK Glass, take a photo” spoken command, or the physical shutter-release button on top of the frame.

We use “exaggerated” on purpose, since Winky doesn’t trigger when you’re blinking naturally. Instead, as DiGiovanni’s brief demo video shows, you need to make it reasonably obvious what you’re doing before the sensor picks it up.

“Winking really changes things. You might not think it’s hard to say “Ok, Glass Take a Picture” or even just tap a button. But it’s a context switch that takes you out of the moment, even if just for a second. Winking lets you lifelog with little to no effort. I’ve taken more pictures today than I have the past 5 days thanks to this. Sure, they are mostly silly, but my timeline has now truly become a timeline of where I’ve been” Mike DiGiovanni

It also required some heavy-handedness with how the internal sensor is used. Although the wink motion is already supported by Glass, it turns out Google’s software disables it if the software is a user-build. Mike had to intercept the wink ahead of anything else in order to use it as a trigger.

glass_internal_eye_sensor

He’s also released the code for those lucky enough to have a Glass Explorer Edition, though you’ll need to compile it and run it as an APK before you can use it. The app also needs calibrating with your wink, too.

Photos triggered by more commonplace gestures are unlikely to go down well with the privacy advocates already worried by Glass, though at least the eyepiece kicking into action to preview the shot just taken will give some indication that an image has been taken. Still, there are calls for Google to add a notification LED to the front of Glass, to give those around the wearer a more obvious sign that the camera is being used.

[Thanks Mike!]


Google Glass Winky app takes snaps as you flirt is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

E-Sports Entertainment involved in bitcoin mining scandal

The E-Sports Entertainment Association is currently in hot water right now after several of its subscriber’s discovered a Bitcoin miner in the ESEA’s anti-cheat client. For a period of 2 weeks, gamers noticed that their computers were generating unusually high GPU loads and frequent BSOD errors. Some gamers stated that their GPUs were damaged due to them reaching temperatures above 90 degrees Celsius.

E-Sports Entertainment admin uses gamers' computer to mine bitcoins

Eric Thunberg, co-owner of ESEA, stated that the Bitcoin miner was meant to be part of an April Fools joke, however, they weren’t able to finish it in time. They then decided to put some of the test code into the clients belonging to a few ESEA administrators. They wanted to see if the bitcoin miner would offer any benefits to the ESEA community. After 2 days of testing, they decided to cancel the project altogether.

Unfortunately, according to an official statement released by Craig Levine, the other co-owner of ESEA, an employee involved in the test decided to use the test codes for his own personal gain. The employee, not Thunberg, enabled the Bitcoin miner which operated on an idle user’s computer. Initially, it was believed that the miner only generated $280 worth of Bitcoins, but after further investgation, it was discovered that $3713.55 worth of Bitcoins were mined.

The ESEA is currently investigating the situation to find out who was the employee involved. Levine assures everyone that the employee will be disciplined and that nothing like this would happen again. It has also updated its client to remove all code relating to the Bitcoin Miner. As an apology, The ESEA is giving a free month of ESEA Premium to all those who subscribed for Premium in the month of April. The ESEA also asks that anyone who suffered hardware damage because of this situation to open a support ticket so that ESEA can rectify the problem.

To further attempt to make up for this transgression, ESEA is donating all of the money that was mined by its clients to the American Cancer Society. It is also matching that donation with a donation of its own, giving a total of $7427.10 to the charity. And to make things up to the ESEA community, the ESEA will also be donating an additional $3713.55 to the Season 14 League prize pot.

[via ESEA]


E-Sports Entertainment involved in bitcoin mining scandal is written by Brian Sin & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Fake Firefox spreads spyware as makers Mozilla retort

Mozilla has sent out a cease-and-desist letter to Gamma International, who has been disguising commercial malware as Mozilla’s Firefox web browser. Gamma’s software uses Mozilla’s trademarks and brand to mislead consumers into thinking its product is affiliated with the company. In the properties of the fake Firefox browser, all of the information, including version number, copyright, trademark claims, and more are exactly the same as the genuine Firefox browser.

Fake Firefox spreads spyware as makers Mozilla retort

Mozilla was alerted to Gamma’s illegal activities by a group known as the Citizen Lab. The group discovered that the spyware posing as Mozilla Firefox is called either FinSpy or FinFisher, and it was sold to various governments for usage in criminal investigations. FinSpy has command-and-control servers in 36 countries, including the United States, Canada, Japan, and the UK.

Gamma’s fake Firefox was used in a variety of harmful and deceitful ways. The Citizen Lab provided 3 examples of how it was used, including a spyware attack in Bahrain against pro-democracy activists, tricking the people of Malaysia by posing as a document that discusses Malaysia’s upcoming General Elections, and being demonstrated in promotional videos and brochures by Gamma itself.

Luckily for Firefox users, Mozilla assures everyone that the spyware does not infect the real Firefox. Unluckily for Mozilla, this isn’t the first time its product has been misued for the purpose of evil. Back in 2010, there were nearly 200 sites deceitfully using Mozilla’s brands for illegal activities, including distributing malware or requiring users to pay for the sites’ service. Mozilla developer Asa Dotzler’s statement back then still echoes on today, “If you’re being asked to pay for Firefox, it’s a scam.” Also, always make sure that you download Firefox straight from Mozilla, and not some sketchy site.

[via Mozilla]


Fake Firefox spreads spyware as makers Mozilla retort is written by Brian Sin & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Hexa drone is half-hexacopter, half-hexapod, 100% terrifying

When the robots finally come to harvest us, they’ll probably descend from the skies and then scuttle, spider-like, into our homes and shelters, just like MadLab Industries‘ terrifyingly ominous Hexa. The combined horror of a six-bladed hexacopter and a 6-legged hexapod, the omnidirectional robot can either tackle terrain on-foot or take to the air to avoid obstacles, then using the multipurpose legs as a grapple to snatch up objects (objects that, it has to be said, are roughly the size of a human baby’s head in MLI’s demo video).

hexa

The DIY ‘bot pairs a PhantomX Hexapod kit and a custom MLI hexacopter, using carbon-fiber and aluminum components to keep the weight down. In total, the whole thing tips the scales at 10.8 pounds, and is strong enough to not only transport its own weight, but light objects it can grasp with its legs.

Possible future improvements could include the ability for the two sections to detach and be independently controlled, meaning Hexa could fly in, deposit the hexapod, and then fly back out again. That could eventually be useful for search & rescue operations, transporting Hexa-style hunting drones to a disaster area and then leaving them to rummage through the rubble for survivors.

The MLI team said back in December that, if demand was deemed sufficiently strong, it would consider Kickstarter for a Hexa kit. No word on what stage that project is up to, nor how much it might eventually cost.

Of course, right now there are human controllers in charge of Hexa, but AI research is doing its level best to cook up autonomous versions that are so ominous that even Google’s Eric Schmidt is calling for drone increased regulation. The situation is only likely to get more serious, however, with recent DARPA proposals suggesting potential funding for companies capable of delivering self-controlled flying gadgets.

[via Hack’n’Mod]


Hexa drone is half-hexacopter, half-hexapod, 100% terrifying is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Google Glass Bulletproof lockscreen adds unofficial wearable security

Security concerns around Google Glass and what data access those casually – or nefariously – picking up your wearable might have has prompted the first DIY lock system for the headset, Bulletproof. Resembling the standard Android lockscreen, but adding some head-detection smarts to prevent you from having to swipe in a code every time you want to use Glass, Bulletproof is the handiwork of Explorer Edition owner Mike DiGiovanni.

glass10

As others have observed, Glass lacks any sort of locking system, which means that when you’re not wearing it – or supervising it – it’s possible that anybody could pick the wearable up and start digging through your data. That’s potentially not the most worrying exploit, however; as arch-tinkerer Jay Freeman pointed out this week, with the right software and a microUSB cable, a well-placed hacker could install surveillance malware onto your Glass and joyride every app you use, every photo and video you take, and potentially even track your location when wearing the headset.

google_glass_bulletproof_lockscreen

DiGiovanni’s app addresses that concern in a straightforward way. Since Glass has no keypad, it uses a combination of user-customizable swipes and taps on the trackpad on the side of the eyewear to enter an unlock code. That access then stays valid all the time you’re actually wearing Glass.

Take it off – or have it pulled off your head, whether by a thief or someone keen to try it themselves – and Glass automatically re-locks.

Since Google isn’t exactly keen on native apps running on Glass at this point, preferring web-based services that hook up through the Mirror API, you’ll need to do a little modification if you want Bulletproof on your headset. As it’s a native Android app, Glass needs to be put into debug mode, and then ADB used to install it. You can find the source on GitHub.

Glass has thrown wearables security back into the spotlight in recent weeks, as issues of privacy and data management become increasingly discussed as more of the headsets work their way into the wild. Much of the concern voiced has been about what goes on in-front of the camera, particularly since the Explorer Edition units lack any sort of clearly visible indicator that recording might be taking place. At present, only the glow of the eyepiece could be used as a sign that Glass is capturing video; some have suggested that Google should have fitted a red LED on the outside, or even a sliding cover that could entirely block out the lens.

[via LivingThruGlass]


Google Glass Bulletproof lockscreen adds unofficial wearable security is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Wiikey hacks Wii U to play games from USB drives

Wiikey, the hackers who invented mod chips and soft mods for the Nintendo Wii and many other consoles, have developed a new hack for the Wii U that lets them play content and games from a custom USB drive. With the new hacking method, it looks like you won’t need to do any hardware modifications to your system to hack it. All you need to do is connect the custom USB device, WiikeÜ, too your Wii U and you’re good to go.

Wiikey hacks Wii U to play games from USB drives

The WiikeÜ isn’t available to consumers just yet, but Wiikey will be releasing updates regarding the product soon. In a statement on their website, Wiikey stated that they were able to completely reverse “the WiiU drive authentication, disk encryption, file system, and everything else.” When the WiikeÜ becomes available, gamers will be able to install homebrew software on their Wii U, and unfortunately for Nintendo, play pirated games.

The WiikeÜ spells trouble for game developers, however it may do wonders for the Wii U. The sales for the Wii U failed to even meet Nintendo’s lowered expectations, selling only a measly 3.45 million units since its launch. People who purchase the WiikeÜ will inevitably use it to pirate games (with a few using it solely for homebrew purposes), and while it may be damaging to game sales, it may offer enough incentive for people to purchase a Wii U.

It’ll be a bittersweet situation for Nintendo, who just replaced its North American CEO with Nintendo Global President Satoru Iwata. Nintendo planned on improving sales of the Wii U by bringing more “key” titles to the platform, enticing more consumers to purchase the device, but that plan may be thwarted by Wiikey. We’ll see. But at this rate, anything would help the struggling platform.

[via Wiikey]


Wiikey hacks Wii U to play games from USB drives is written by Brian Sin & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Wireless charging nightstand mod injects Nokia Qi into IKEA

Nokia has been flirting with wireless charging support integrated into cafe tables and Virgin Atlantic lounges, but if you want seamless rejuicing at home, a DIY wireless charging nightstand may be the way forward. The handiwork of Lumia 920 owner Lobbamobba, who turns out to be pretty handy with a chisel, the 90 minute project embeds a Nokia wireless charging pad into the top of an IKEA nightstand, meaning you can power up your phone by simply dropping it in place.

diy_wireless_charging_nightstand

The mod takes advantage of the fact that the Qi wireless charging system which Nokia relies upon operates even if there’s something in-between the pad and the phone itself. The exact distance depends on what the material is: anything from around 5mm to a few centimeters or so.

Actually fitting the pieces together is a simple case of shaving away sufficient wood in the top of the IKEA table – or, indeed, any furniture you’ve a mind to cut up – and then fixing the Nokia charger underneath. There’s some flexibility in where you can position the phone and still get it to charge, and of course the Lumia phones give a useful alert tone when they connect properly.

A second video goes through some of the technical details, including answering those who worry that an inductive charging plate mere inches from your head all night might not be such a great idea, health-wise. Best of all, it’s not Lumia-specific; numerous companies have adopted Qi, including LG for the Nexus 4, and so even if you upgrade your phone, there’s still a fair chance you’ll be able to use the same nightstand mod with it.

DIY Qi Wireless Charging Nightstand:

Nightstand mod Q&A:


Wireless charging nightstand mod injects Nokia Qi into IKEA is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.