Six million Virgin Mobile user accounts at risk, says developer

If you are a company will millions of users, it is usually expected that you would ensure fool-proof security of your user’s accounts. A developer has now claimed that Virgin Mobile USA entirely fails on this front, citing a very basic security vulnerability in the company’s website.

Kevin Burke says that when he first came across the vulnerability, he contacted Virgin Mobile USA directly. However, after numerous to-and-fro communications, the company didn’t do anything to eliminate the vulnerability. It was then that Burke took to venting on his own blog. (more…)

By Ubergizmo. Related articles: Apple UDID Leak: Why Does It Matter?, LulzSec hangs up its hat,

Developers Suspect the New Kindle Fires Will Be Hack-Resistant [Amazon]

If you were banking on hacking a new Kindle Fire to take advantage of cheap hardware without Amazon’s modded Android OS, you perhaps better think again. Developers over at XDA are speculating that they expect the new range of Fires to be too sophisticated to hack. More »

GoDaddy offers 30% discounts to make up for service outage

Recently, GoDaddy had to face rather critical network issues when millions of websites hosted by the company went down. Before soon, a member of the hacktivist group, Anonymous, claimed responsibility for the attack, boasting that he did so to expose the security vulnerabilities of the service.

However, the company soon responded by rebuffing such claims and stated that the entire issue was the result of some internal network failure which was addressed and fixed within hours. Once all the affected GoDaddy services were back on, the company issued an apology for the service outage that affected a lot of its customers. (more…)

By Ubergizmo. Related articles: GoDaddy says internal network issues responsible for crash, GoDaddy restores service after hacking incident,

GoDaddy says internal network issues responsible for crash

GoDaddy recently underwent a crash which also took down millions of sites hosted by it. An Anonymous member, AnonymousOwn3r, claimed that he was responsible for the crash and that he accomplished it through a Distributed Denial-of-Service (DDoS) attack. He also said that he launched the attack in his individual capacity, not representing Anonymous.

GoDaddy was quick to respond to this, stating that it was aware of the problem and was working actively to resolve it. The company was able to restore the services within 24 hours and stated that no customer data was compromised during the entire fiasco. (more…)

By Ubergizmo. Related articles: GoDaddy restores service after hacking incident, GoDaddy Attacked, Millions Of Sites Down,

Go Daddy: yesterday’s outage resolved, ‘was not a hack’

According to domain registrar Go Daddy, things are back to normal after yesterday’s massive outage. The company noted that service outages started at around 1PM ET, with service being “fully restored” by 7PM. Contrary to claims of an attack from hackers, the company’s interim CEO Scott Wagner insists that the outage “was not a ‘hack’ and it was not a denial of service attack (DDoS).” Instead, Go Daddy is chalking the problem up to “a series of internal network events that corrupted router data tables,” adding that the company has taken steps to avoid a repeat of the problem. According to Wagner, data was never at risk during yesterday’s issue.

Filed under:

Go Daddy: yesterday’s outage resolved, ‘was not a hack’ originally appeared on Engadget on Tue, 11 Sep 2012 12:40:00 EDT. Please see our terms for use of feeds.

Permalink   |   | Email this | Comments

GoDaddy restores service after hacking incident

Earlier today, the Internet was abuzz about web hosting company GoDaddy being hacked by the hacker collective known as Anonymous, and in an announcement over on Twitter, GoDaddy mentioned that the majority of their customer-hosted sites are now up and running, stating, “Most customer hosted sites back online. We’re working out the last few kinks for our site & control centers. No customer data compromised.” That certainly sounds like a ray of light at the end of a long, dark tunnel, doesn’t it?

Anonymous Own3r claimed responsibility for today’s attack that actually affected numerous sites, where GoDaddy’s DNS servers were taken offline and the downtime clocked in at several hours. Not only that, Anonymous Own3r claims that this particular attack was just from a single member and not made on Anonymous’ behalf, making us wonder what happens when the collective flex their muscles.

GoDaddy spokeswoman Elizabeth Driscoll mentioned, “All services are restored and at no time was sensitive customer information, such as credit card data, passwords, names, addresses, ever compromised.” Does that make you sleep easier at night if you hosted a site on GoDaddy?

By Ubergizmo. Related articles: GoDaddy Attacked, Millions Of Sites Down, Arizona man gets 30-months in prison after infecting 72,000 computers,

Ben Heck fashions a pocket computer with an Xbox Chatpad and Arduino Uno

Ben Heck fashions a pocket computer using an Xbox 360 Chatpad and an Arduino Uno

It’s great to see Ben Heck focus his efforts of do-gooder projects like that foot-controlled wheelchair, but we’ll always have a soft spot for the modfather’s more nostalgic undertakings, like this BASIC pocket computer. Heck created the device for the latest episode of his web show, and if you’re following along at home, you’ll need the Chatpad from an Xbox 360 controller, an Arduino Uno and a LCD display — a Hitachi HD 44780, in this case. The modder-turned-host is quick to point out that the project’s purpose isn’t solely nostalgic — you can also use it to control real world objects, which in the Heck’s case means a ghost on a pinball playfield. Check out a video of the invention in action after the break.

Continue reading Ben Heck fashions a pocket computer with an Xbox Chatpad and Arduino Uno

Filed under:

Ben Heck fashions a pocket computer with an Xbox Chatpad and Arduino Uno originally appeared on Engadget on Mon, 10 Sep 2012 22:04:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceElement 14  | Email this | Comments

Anonymous attack brings down tons of GoDaddy sites

Today is not a good for those working behind the scenes at GoDaddy. TechCruch is reporting that an Anonymous member has brought GoDaddy down and, by extension, has brought down many of the sites GoDaddy hosts. Apparently, the attack was carried out by someone going by the name of “AnonymousOwn3r” on Twitter, and he says that he worked alone in bringing the website hosting service down.


Of course, this is causing a headache for more than just the folks at GoDaddy, as many business owners are seeing their sites go down as a result of the attack as well. Since the attack makes a number GoDaddy’s DNS servers inaccessible, many site owners who were using GoDaddy’s DNS service were affected by this breach. Customers are also saying that the company’s email and phone services are down as well.

GoDaddy itself has had to deal with a number of angry customers this afternoon, and at the time of this writing, the hosting service is still down for many. GoDaddy seems to be making progress, with one of its most recent tweets claiming that service has returned for some customers. With tens of millions of sites down, however, GoDaddy has its work cut out for it.

What’s interesting is that AnonymousOwn3r did this whole thing by himself. He hasn’t really given a reason for his attack on GoDaddy, saying in a tweet that the breach was meant to test GoDaddy’s “cyber security,” among other reasons that he can’t talk about now. A lot of GoDaddy customers are understandably calling him out on Twitter, so let’s just hope that the company can get everything back to normal soon. Stay tuned, as we’ll have more details for you as this story develops.


Anonymous attack brings down tons of GoDaddy sites is written by Eric Abent & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Leaked Apple IDs didn’t come from FBI after all

By now, many of you probably know about last week’s AntiSec hack. The group claimed to have stolen 12 million Apple UDIDs – 1 million of which were posted to Pastebin – from the computer of an FBI agent. At the time, the FBI said that it didn’t have any involvement in the hack, and that AntiSec had made the whole story up. While that seemed like just an FBI attempt to distance itself from the breach, it turns out that the FBI was telling the truth – at least when it comes to whether or not the information was stolen from an FBI computer.


NBC News has reported on the real victim of the breach: publishing company BlueToad, which operates out of Florida. CEO Paul DeHart says that the information Anonymous shared last week was stolen from BlueToad’s servers two weeks ago, and that the company came to this conclusion by comparing the stolen information to its own collection of UDIDs. The result? 98% of the data matched up, which leads DeHart to believe that the data originally came from his company’s servers.

“That’s 100 percent confidence level, it’s our data,” DeHart said. “As soon as we found out we were involved and victimized, we approached the appropriate law enforcement officials, and we began to take steps to come forward, clear the record and take responsibility for this.” BlueToad has since posted a statement about the breach to its blog, apologizing about the information getting loose. DeHart didn’t give much more information about the breach, saying that an investigation is still ongoing.

It sounds like BlueToad has quite a few UDIDs in its database, too – though you probably don’t recognize the name, the company provides app building services for 6,000 other publishers. This realization seems to mesh well with statements made by both the FBI and Apple last week. When the data was leaked, the FBI claimed that it didn’t come from any of its computers and Apple insisted that it wasn’t sharing UDIDs with the organization. As a publisher, on the other hand, BlueToad would have access to those UDIDs, though DeHart admits that the stolen information could have made it onto FBI computers in the time since the breach.

Still, even if that information was taken from an FBI computer, it seems that it didn’t originate there. The good news is that BlueToad, at the request of Apple earlier this year, stopped storing UDIDs, and updated its apps so they would stop collecting the information. Stay tuned for more on this rather strange story, as more information will likely develop in the coming days.


Leaked Apple IDs didn’t come from FBI after all is written by Eric Abent & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Arizona man gets 30-months in prison after infecting 72,000 computers

A man from Arizona has been handed a prison sentence that amounts to 30 months after infecting up to an estimated 72,000 computers, and this is a byproduct of using botnets and selling access to them to a willing buyer. Joshua Schichtel is said to be connected to a ring of hackers known as DDOS Mafia who relied on denial-of-service (DOS) attacks that targeted businesses on behalf of a business owner. Charges were filed in 2004 in California, but those failed to stick because the prosecutors there failed to file an indictment by the required deadline.

Still, the long arm of the law has finally caught up to Joshua’s antics, where he pleaded guilty on August 17th last year in Washington, D.C., to one count of attempting to cause damage to multiple computers without prior authorization via the transmission of programs, codes or commands, which is classified as a violation of the U.S. Computer Fraud and Abuse Act. He was paid $1,500 for his criminal act, making that average out to around $50 amounting to one month in prison as “payment” for his crime.

By Ubergizmo. Related articles: FBI denies Apple Device ID leak, Apple UDID Leak: Why Does It Matter?,