Far Cry 3: Blood Dragon Spotted On Torrent Sites After Ubisoft Uplay Service Hack

Far Cry 3: Blood Dragon Spotted On Torrent Sites After Ubisoft Uplay Service HackMost modern companies that rely heavily on information technology to ensure that their business is capable of moving forward at all times would definitely also invest a fair amount of money into security, considering the very real threat of hacking these days. It seems that a group of hackers has gotten their hands on Far Cry 3: Blood Dragon and other gaming titles, circumventing DRM (Digital Rights Management) in the process. This happened after hackers broke into Ubisoft’s Uplay service, and it was not too long after that that the recently announced Far Cry 3: Blood Dragon has already been spotted on torrent sites as we mentioned in our earlier story.

If there is anything to add to the hacking of Uplay, it would be this – there is a silver lining in every cloud, and the silver lining here would be the equivalent of assurance from Ubisoft that no user information was compromised along the way. As they work to resolve security issues, Uplay services will remain available, and this is what Ubisoft mentioned, “We are aware of the issue and are working to resolve it quickly. No personal information was compromised. Uplay’s PC download service will be unavailable until the problem is fixed, however all other Uplay services remain available.”

By Ubergizmo. Related articles: Mega Man Plush Arm Blaster, Helmet Instantly Turns You Into The Blue Bomber, Xbox 720 Will Be Able To Take Control Of TV And Set Top Box,

    

Guys Hack IKEA Furniture into a Kid’s Bike: Should be Named BIKKLO

One thing that’s great about IKEA furniture is that it’s so cheap that you can feel comfortable hacking it into other forms without fear of damaging your grandma’s prized antique Chippendale. Take, for example, this epic IKEA hack, which transformed a couple of ordinary stools into a functional kid’s bicycle.

ikea bike frosta

With the help of FabShop, Samuel Bernier and Andreas Bhend took parts from a couple of $15 FROSTA birch plywood stools, along with a handful of 3D printed parts, and fabricated a bicycle out of them. While using some 3D printed parts might be looked at as “cheating” by some, I think it just gave their design a minor boost, and the bike still captures the spirit of the original furniture upon which it’s based.

ikea bike kit

Bernier and Bhend get bonus points for creating a fake IKEA instruction manual to go with their design too. They called the bike the “Draisienne“, named after an antique bicycle, but I would have gone with more of an IKEA friendly name like “BIKKLO” or “KICKLA.”

ikea bike instructions

If you’re interested in building your own IKEA bike, head on over to Instructables for the build details.

[via FastCo Design via Cheezburger]

Anonymous hacks North Korea’s social media in net freedom bid

Hacking collective Anonymous has apparently selected its next high-profile target, in the shape of any sites or social network accounts related to North Korea, seizing control of Flickr and Twitter pages in the process. The activists cracked the Uriminzokkiri accounts and uploaded images of their own, which still remain online at time of writing, in addition to claiming to have extracted 15,000 usernames and passwords from the site, the BBC reports. Anonymous’ goal appears to be loosening the restrictions on internet access North Koreans face from their government.

anonymous_Uriminzokkiri_hack

To draw attention to that cause, Anonymous has been spreading its mischief as broadly as it can. The Uriminzokkiri Twitter account remains apparently hacked, and the main site itself has been taken down, though it’s unclear whether that’s due to a hack or a denial-of-service attack.

In an expletive-punctuated release the purported team responsible for the hacks describe the campaign as one targeting “oppressing and violent regimes” and calls for an end to the North Korean nuclear program and the resignation of Kim Jong-un. There are also demands for a “free direct democracy” in the country, alongside “uncensored internet access.”

A follow-up release went on to describe a “a chain of long distance WiFi repeaters with proprietary frequencies” that had been used to bring internet access some way into North Korea itself. The system is described as “slow and unstable” however, and subject to retaliation by the government.

Attitudes toward internet access in North Korea had seemed to be loosening in recent months, with the country even allowing visitors to access the web on their mobile devices in early March. However, the freedom was short-lived, lasting only a few weeks before North Korea clamped back down on it.


Anonymous hacks North Korea’s social media in net freedom bid is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

The War Z player data compromised after security breach

Those of you who play Hammerpoint’s The War Z may want to change your passwords. Hackers have breached databases in The War Z that held personal player info. Players’ email addresses, passwords, in-game names, IP addresses, and game log-in credentials have all been compromised. Hammerpoint has temporarily shut down its servers for The War Z and for its forums to address the issue and find out the scope of the damage.

Hackers breach The War Z database players data compromised

Hammerpoint assures The War Z players, however, that their payment credentials have not been compromised since it uses a 3rd party to handle all of its transactions. It also says that its players’ real names and addresses should not be compromised, unless the players themselves posted the information on the forums. Hammerpoint also says that player passwords and the email addresses that they use to log into the game are encrypted, so hackers should not be view them without using a “brute force” attack. Nonetheless, change your passwords.

Hammerpoint is currently working with external investigators and security experts in order to determine just how wide-spread the breach was. It has enhanced its security systems to better protect its players’ personal information. It has notified all of its players of the security breach, and is taking the steps necessary to ensure that an incident like this will not happen again in the future.

For those of you who are unfamiliar with The War Z, it’s a zombie survival MMO that many gamers say is a rip off of Arma II’s DayZ mod. It has also received bad press for falsely advertising its game. It launched the game on Steam with misinformation. It lied about how the game has a skill tree system and private servers, and it also over-exaggerated its offerings. This outraged many players who purchased the game but realized that they had no access to many of the promised features. The game was removed from Steam, and was reinstated 2 months later after it amended its description.

Hammerpoint didn’t release an ETA on when the investigation and security updates will be finished, so we’ll update you when we find out. Security breaches seem to be going around a lot recently. Earlier last month, Evernote suffered from a similar breach where user emails and passwords were compromised. It had to initiate a mandatory password reset for all users in order to protect their data.

[via The War Z]


The War Z player data compromised after security breach is written by Brian Sin & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Hacker turns Kindle Paperwhite into wireless Raspberry Pi terminal

Hacker turns Kindle Paperwhite into wireless Raspberry Pi terminal

The Raspberry Pi is all about low-cost computing, which makes this particular hack quite fitting, as it allows you to make a terminal for your lil’ Linux machine out of something you may already have at home: a Kindle Paperwhite. Displeased with the glare from his laptop’s screen on a sunny day, Max Ogden was inspired to find something better and ended up with this Paperwhite hack. It builds on the original “Kindleberry Pi” method for the Kindle Keyboard, although Ogden had to massage it for the newer model and added some extra hardware to make the setup as wireless as possible. You wouldn’t call the end result a monitor, as such — the Paperwhite logs into an SSH session running on the Pi, so it “pretty much only works for terminals.” That’s probably for the best, as Ogden guesses the lag between wireless keyboard and e-ink screen is around 200ms, but at least it has portability, battery life and sunlight readability in the ‘pros’ column. Details of the project can be found at the source below, meaning only time (and probably, a few peripherals) stands between you and the ultimate hipster coffee shop machine.

Filed under: , ,

Comments

Via: Raspberry Pi

Source: Max Ogden

PBS shows how hacking is reclaiming its good name after a bad rap (video)

PBS explains how hacking got a bad rap and is reclaiming its good name video

Hacking is still a loaded concept for many, often conjuring negative images of corporate espionage, fraudsters and prank-minded script kiddies. PBS’ Off Book wants to remind us that hacking wasn’t always seen this way — and, thanks to modern developments, is mending its reputation. Its latest episode shows that hacking began simply as a desire to advance devices and software beyond their original roles, but was co-opted by a sometimes misunderstanding press that associated the word only with malicious intrusions. Today, hacking has regained more of its original meaning: hackathons, a resurgence of DIY culture and digital protests prove that hacks can improve our gadgets, our security and even our political landscape. We still have a long way to go before we completely escape movie stereotypes, but the mini-documentary may offer food for thought the next time you’re installing a custom ROM or building your own VR helmet.

Filed under: , , ,

Comments

Internet Slows Down After History’s Biggest Cyber Attack

Internet Slows Down After History’s Biggest Cyber AttackIs it possible to experience a “traffic jam” on the anecdotal information superhighway? The simple answer, yes! I noticed it around 9 hours ago, but did not give too much thought into it, thinking that my local ISP’s underwater cable somewhere is experiencing issues as normal, but it seems that there is more than meets the eye. The Internet has apparently slowed down due to what security experts have deemed to be the biggest cyber-attack ever experienced in the short history of the Internet.

It seems that a particular row that sparked off being a spam-fighting group and hosting firm resulted in retaliation attacks that of course, affected the Internet in a negative manner, including impacting popular services such as Netflix. Experts have this albatross around their neck that it could potentially escalate to a level that disrupts banking and email systems. So far, five national cyber-police-forces are looking into these attacks.

Spamhaus has been identified as one of the two groups, as the London and Geneva based group is known to be a non-profit organisation who intends to assist email providers filter out spam and other unwanted content. They recently blocked servers maintained by Cyberbunker, a Dutch web host who claims that it has the right to host anything except child pornography and terrorism-related material. Cyberbunker saw Spamhaus as abusing its position, and this is where the tiff started, much to the detriment of everyone else. Hopefully the DDoS attacks against one another will cease so that the world can get on with our normal lives.

By Ubergizmo. Related articles: Intel Expects $599 Ultrabooks To Arrive In The Market This Holiday Season, Microsoft Confirms Windows Blue, But Probably Will Not Be The Retail Name,

Top Chinese university linked to Chinese hacking group

Faculty members at one of the top universities in China have been linked to the People’s Liberation Army Unit 61398, the same group that has been accused of hacking several U.S. based companies as well as several media outlets. The university in question, Shanghai Jiaotong University, is a prestigious school known for its successful graduates, most who end up doing well in politics and in business.

Top Chinese school linked with Chinese espionage group

While Shanghai Jiaotong University is linked with PLA Unit 61398, there’s no evidence that shows that they were involved in the cyber-espionage attacks against the United States. However, faculty at the university’s School of Information Security Engineering (SISE) have collaborated with the PLA Unit on several research papers centered around cyber-security.

Xue Zhi, the Vice President of SISE and who is also well known for developing China’s leading cyber-attack platform, collaborated with Chen Yi-qun, a researcher for the PLA, on a paper about improving security by designing a collaborative network monitoring system. Fan Lei, an associate professor at the university, also worked on a research paper with Chen. Fan said, however, that he had no idea Chen was part of PLA Unit 61398 and that he only worked with him because he was a SISE graduate. His statement was proven false by the research paper, which clearly stated that Chen was part of the PLA unit.

While most of these papers are centered mainly around cyber-security, the information can also be used to develop efficient cyber attacks. Adam Meyers, the Director of Intelligence at a security tech company named CrowdStrike, stated, “The research seems to be defensive, but cyber-security research can be dual purpose.” He goes on to say that in order to develop the best cyber security, one must think “about the most effective means of attack.”

[via Reuters]


Top Chinese university linked to Chinese hacking group is written by Brian Sin & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Apple ID accounts reportedly vulnerable to password reset hack, forgot password page taken offline for maintenance (update 2: back)

Apple ID accounts reportedly vulnerable to password reset hack, forgot password page taken offline for maintenance

Gaping security holes are a pretty terrifying thing, especially when they involve something as sensitive as your Apple ID. Sadly it seems that immediately after making the paranoid happy by instituting two-step authentication a pretty massive flaw in Cupertino’s system was discovered and first reported by The Verge. Turns out you can reset any Apple ID password with nothing more than a person’s email address and date of birth — two pieces of information that are pretty easy to come across.

There’s a little more to the hack, but it’s simple enough that even your non-tech savvy aunt or uncle could do it. After entering the target email address in the password reset form you can then select to answer security questions to validate your identity. The first task will be to enter a date of birth. If you enter that correctly then paste a particular URL into the address bar (which we will not be publishing for obvious reasons), press enter, then — voilà — instant password reset! Or, at least that’s the story. While we were attempting to verify these claims Apple took down the password reset page for “maintenance.” Though we’ve received no official confirmation from Apple, it seems the company is moving swiftly to shut down this particularly troublesome workaround before word of it spreads too far.

Update: We’ve heard back from Apple on the matter, which stated, “Apple takes customer privacy very seriously. We are aware of this issue, and working on a fix.” No real surprises that a fix is in the works, but there you have it from the horse’s mouth.

Update 2: The forgotten password page is back as of late Friday evening — that was (relatively) quick. iMore reports (and we’ve verified ourselves) that the security hole is now closed.

Filed under: ,

Comments

Source: The Verge, iMore

Samsung’s Android phones affected by another lockscreen bypass, fix is in the works

Since lockscreen bypass methods are apparently what’s hot in the streets, it’s no surprise that yet another one has surfaced, this time targeting Samsung’s Android phones. A variant of another, earlier uncovered method, this one does not fully unlock the phone by itself, but does provide access to apps and settings for a brief period. Given that, as demonstrated in the video by Terence Eden, it’s possible to use Google Play to download an app to disable the locked screen and fully access the phone.

According to Terence, this problem is confirmed on the Galaxy Note II, possibly the Galaxy S III and potentially on other TouchWiz UI Samsung Android phones. Disabling screen animations under developer options should reduce the vulnerability, but doesn’t eliminate it without switching to another ROM. He also mentions Samsung is aware of the issue and is working on a fix, but that leaves phones accessible right now. We’ve certainly seen enough of these recently (Apple’s latest version of iOS has also been victimized again in the last day) to know leaving our phones out, locked or unlocked, is foolish. At the same time, if a manufacturer insists on adding customized software to the existing platform, it could at least have the courtesy to do so without causing security leaks — check after the break for a “bonus” vid sent in by another tipster that shows a way to activate voice commands on a locked Galaxy S II.

Filed under: , , ,

Comments

Via: Rootzwiki

Source: Terence Eden Has A Blog