Barnes & Noble experience credit card data breach

Barnes & Noble logoRaise the alarms! Hackers have successfully nicked credit card information that belonged to customers who shopped as recently as last month at 63 Barnes & Noble stores throughout the US, where some of the more notable stores include those in New York City, San Diego, Miami and Chicago. Sad to say, this credit card data theft was discovered by Barnes & Noble sometime in the middle of September, but they decided to keep quiet about it so that the F.B.I. were able to determine, or at least investigate further as to the culprits behind this digital theft.

Basically, hackers who broke into the keypads in front of registers which were used by customers to swipe their credit cards followed by entering their personal identification numbers (PINs) managed to scoot away with such information, and Barnes & Noble has alerted customers who shopped at any of the 63 Barnes & Noble using their credit card to change their PINs, while making sure their accounts do not have any unauthorized transactions. Makes you wish we were back in the days when the barter trade flourished, no?

By Ubergizmo. Related articles: One more reason to root the NOOKcolor: Bluetooth, World of Warcraft hack suspected in turning cities into deathtraps,

Barnes & Noble hackers gain customers’ credit card information

Over 60 Barnes & Noble stores have been used by hackers to gain the credit card data, including the PINs, of customers. The security breach was discovered in the middle of September, but was not revealed per request by government agencies so that the hackers could be identified. The data was gathered via compromised keypads, which recorded each swiped card’s information.

A total of 63 stores had the compromised keypads, and were located around the country, including Chicago, San Diego, New York City, and Miami. Barnes & Noble issued a statement saying that customers who shopped at any of the 63 stores should change their PINs as a precaution, as well as check out their recent bank statements for anything out of the ordinary.

As can be imagined, some customers aren’t terribly happy that they weren’t informed about the security breach. Barnes & Noble says that its decision to withhold the info from customers was due to “the direction of the U.S. government,” which instructed the company to keep quiet. Barnes & Noble says that it notified credit card companies of the breach, however.

It continued to say that the company received two letters from the South District of New York’s attorney’s office stating that it wasn’t obligated to share the security breach with customers while the investigation was ongoing. Barnes & Noble, in an effort to identify and eradicate the compromised hardware, sent all 7,000 of its keypads from every store to a company that checked them out. The result was that one keypad was compromised per store, for a total of 63 hacked devices.

[via New York Times]


Barnes & Noble hackers gain customers’ credit card information is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Googler loads Ubuntu on an ARM-based Samsung Chromebook, gives solace to the offline among us

Googler slips Ubuntu on an ARMbased Samsung Chromebook, gives solace to the offline among us

Samsung’s ARM-running Chromebook is barely out of the starting gate, and it’s already being tweaked to run without as much of an online dependency. By a Google employee, no less. Not content to rely solely on Chrome OS, Olof Johansson has loaded Ubuntu on the Chromebook by partitioning an SD card, mixing OS components and booting from USB. The technique unsurprisingly requires being more than a little comfortable with a Linux command line as well as playing fast and loose with the warranty. It also won’t be cheap or quick — commenters note that you’ll ideally have a partitioning-friendly SD card, and running a desktop OS from a slower kind of flash storage creates an inherent bottleneck. Anyone who likes the Chromebook’s $249 price, but isn’t as enraptured with the cloud as most of the team in Mountain View, might still want to try Johansson’s step-by-step process for themselves.

Filed under: , , ,

Googler loads Ubuntu on an ARM-based Samsung Chromebook, gives solace to the offline among us originally appeared on Engadget on Mon, 22 Oct 2012 23:28:00 EDT. Please see our terms for use of feeds.

Permalink TG Daily  |  sourceOlof Johansson (Google+)  | Email this | Comments

Meet the Arduino Due, the 32-bit board that’ll let your projects fly (really)

Meet the Arduino Due, the 32bit board thatll let your projects fly really

As much as we love the Arduino Uno, it’s not the most powerful of hobbyist microcontrollers. Fortunately, the folks in Turin have just put the finishing touches on a 32-bit upgrade with buckets of potential. At the heart of the Arduino Due is an 84MHz Atmel CPU, based on ARM’s Cortex M3 Architecture, which is capable of being the brains inside your own flying drone or homemade 3D printer. It should start trickling out onto shelves from today, setting you back $49, but hey, that’s a small price to pay to automate your drinking adventures.

Continue reading Meet the Arduino Due, the 32-bit board that’ll let your projects fly (really)

Filed under:

Meet the Arduino Due, the 32-bit board that’ll let your projects fly (really) originally appeared on Engadget on Mon, 22 Oct 2012 09:22:00 EDT. Please see our terms for use of feeds.

Permalink   |   | Email this | Comments

JailbreakMe hacker Comex let go by Apple after failing to respond to offer letter

JailbreakMe hacker Comex let go at Apple after failing to respond to offer letter

After developing JailBreakMe, cracking such devices as the iPad 2 or iPhone 4 and finally scoring a paying intern gig with his nemesis, hacker Comex tweeted that he’s no longer working at Apple. Also known as Nicholas Allegra, the talented coder’s Cupertino situation apparently came asunder when he failed to respond to an email offer to re-up with the company, though he also told Forbes that the situation was more complicated than that. He added that “it wasn’t a bad ending,” and that he has fond memories of his Apple experience, but if you’re hoping the Brown University student will have an iOS 6 jailbreak soon, don’t hold your breath — he’s concentrating strictly on his studies, for now.

Filed under: , , ,

JailbreakMe hacker Comex let go by Apple after failing to respond to offer letter originally appeared on Engadget on Fri, 19 Oct 2012 08:44:00 EDT. Please see our terms for use of feeds.

Permalink 9 to 5 Mac  |  sourceForbes, Twitter  | Email this | Comments

Hacked Pacemaker Transmitters Could Turn Pacemakers to Literal Heartstoppers

Pacemakers save millions of lives, but a security researcher has shown that they can be used to kill on a massive scale as well. Speaking at the Breakpoint security conference, Barnaby Jack of IO Active reverse engineered a pacemaker transmitter – a device like this one used to monitor installed pacemakers – eventually enabling him to wirelessly deliver 830v shocks to a pacemaker using his laptop. Yikes.

no pacemaker sign by library mistress

Image Credit: Library Mistress

Even worse, Jack warned that a hacked transmitter could control all pacemakers within 30ft. Aside from jolting people, the compromised device could also be used to read and write patient data or load infected firmware into a pacemaker. These infected firmware could even be made to jump and infect other pacemakers, extending a malicious attackers’ range and possibly resulting to mass murder. Jack says he demonstrated this flaw in order to warn pacemaker manufacturers to step up the security of their device. Let’s hope they do.

[via SC Magazine via DVICE]

 

 


Hacker pleads guilty to Sony Pictures breach

Back in June, a massive hack was conducted on the Sony Pictures Website. The attack led to the theft of details on over 1 million accounts and was linked to the hacker group Lulzsec. At the time, the hacker group claimed to have used a “very simple SQL injection” attack. Samples of the compromised data were later posted online.

Out of the details stolen 39,000 e-mail address and password combinations were posted. The hackers also posted e-mail, password, home addresses, and dates of birth on 12,500 different users. Sony Pictures and the authorities began an investigation into the hack, and eventually an Arizona man was arrested and charged with the crime.

The arrested hacker was 20-year-old Raynaldo Rivera. Rivera was taken into custody in August and made a plea agreement with authorities where he admitted to hacking the Sony Pictures website and stealing personal information of thousands of individuals. The Hacker says that in May of 2011, use a third-party service to mask his IP address and then hit the Sony Pictures website with commands to exploit security vulnerabilities in the website servers.

The information that the hacker stole resulted in over $605,000 in financial losses. Part of the plea agreement will see Riviera paying restitution to the victims of the crime and facing prison time. The hacker is facing a maximum of five years in prison, and the fine will be at least $250,000.

[via ArsTechnica]


Hacker pleads guilty to Sony Pictures breach is written by Shane McGlaun & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


1980s Camcorder Recycled into Craziest iPhone Dock Yet

Ever since my iPhone 5 showed up with its tiny new Lightning connector, I don’t use a dock anymore. Maybe once my overpriced 30-pin adapter shows up, I will, and maybe it’ll be this one.

camcorder iphone dock

In one of the more unusual examples of “upcycling” old tech, iasVintage took an old Panasonic Newvicon Omnipro camcorder from the 1980s and transformed it into an iPhone dock. Why? To prove it could be done, I suppose. But wait – there’s more. This thing isn’t just a dock for your iOS device, no. It’s also a lamp! Now all they need to do is turn that weird little fold-out keyboard into a Bluetooth keyboard for the iPhone, and it’ll be perfect.

If you long for the days of camcorders you had to carry on your shoulder, you can grab this oddity over on Etsy for $65(USD). You’ll have to pony up a few more dollars if you want one of those cool vintage filament bulbs like the one in the picture, though.


Your Portal gun isn’t as cool as Hack-a-Day’s Portal gun (which actually levitates a companion cube)

Your Portal gun isn't as cool as HackaDay's Portal gun which actually levitates a companion cube

There you were, thinking your NECA-produced Portal gun replica was super neat all on its own. Well, okay — it is — but wouldn’t it be even cooler if you could use it to make a baby companion cube levitate in mid-air with it? That question is exactly what lead to Hack a Day’s creation of just such a device, as seen in the video below the break. By reappropriating a magnetic floating globe’s parts and attaching said parts to both the gun and a homemade companion cube, Hack a Day were able to recreate at least part of the magic Chell experiences in her Aperture Science adventures. Of course, if you move the gun too much, the companion cube will fall out. Just think what that does to its psyche! You monster.

[Image credit: Caleb Kraft, Hack a Day]

Continue reading Your Portal gun isn’t as cool as Hack-a-Day’s Portal gun (which actually levitates a companion cube)

Filed under: ,

Your Portal gun isn’t as cool as Hack-a-Day’s Portal gun (which actually levitates a companion cube) originally appeared on Engadget on Fri, 12 Oct 2012 02:29:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceHack a Day  | Email this | Comments

Facebook goes down around the world in apparent Anonymous attack

If you’re trying to get on Facebook at the moment and the site isn’t cooperating, you’re definitely not alone. The Next Web is reporting that throughout the day, Facebook has gone down in places like Austria, Norway, Germany, Greece, France, Italy, and Sweden. Making things much more interesting is Twitter user AnonymousOwn3r, who is claiming to be the one bringing Facebook to its knees.


If AnonymousOwn3r is telling the truth, then that would mean the now-infamous group Anonymous is behind the Facebook outage. Just a few minutes ago, he tweeted that he’d be halting his attack so people could get back on the social network, but it’s hard to tell if he’s telling the truth. As far as we can see, he hasn’t given a reason for his attack on Facebook, only saying that he tried to carry out the attack yesterday but was unsuccessful.

It seems that he has enjoyed plenty of success today, though, apparently bringing Facebook down across Europe. The Next Web reminds us that this is the same Anonymous member who claimed the attack on GoDaddy last month. That attack brought down millions of GoDaddy-hosted sites and kept them down for hours, effectively making millions of site owners angry in the process.

It seems that this was an attack on Facebook’s DNS servers, as trying to access touch.facebook.com brings up the site with no problems. If AnonymousOwn3r is serious when he says that he’s halting his attack on Facebook (and he’s responsible for bringing Facebook down in the first place), then the service should be coming back across Europe soon. If you live in Europe, do you have access to Facebook yet, or is it still down for you?


Facebook goes down around the world in apparent Anonymous attack is written by Eric Abent & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.