Anonymous claims new PSN hack, Sony says it didn’t happen

Here’s something that’s rather interesting: Anonymous is claiming that it has hacked the PlayStation Network, making off with information on 10 million accounts. Anonymous announced the hack on its Twitter account just over an hour ago (though that tweet has since been removed), and someone claiming to be “the man behind Anonymous” posted this list of emails and encrypted passwords reportedly stolen from PSN as proof of the attack.


Reports of a new PSN security breach make us immediately recall the bad memories from spring 2011, but there may not be reason to worry just yet. The list which was posted to Pastebin is apparently just a duplicate of a list posted back in March. Kotaku says that SCEA’s Shane Bettenhausen has stated on Twitter that claims of the hack are “totally fake,” but that tweet appears to have been taken down too.

It’s all very confusing, but at the moment, it seems that the PlayStation Network is safe. It’s a good thing too, because PS3 owners definitely still remember last year’s attack all too well. The attack was severe enough that Sony had to take PSN down for a month as it worked on boosting security and investigated what all was stolen. When Sony reported that credit card details may have been stolen in the attack, that made things go from bad to worse, and Sony had to do a lot to restore faith in the company.

Luckily, it seems that history won’t be repeating itself quite yet, but with Sony claiming that it greatly improved security after the first attack, you know that there are plenty of hackers trying to bring PSN down for a second time. With that in mind, it seems that it’s only a matter of time before someone gets in, but who knows? It could be that Sony’s defenses are as strong as the company says. In any case, we’ll be bringing you more information as this rather strange story develops, so keep it tuned here to SlashGear!


Anonymous claims new PSN hack, Sony says it didn’t happen is written by Eric Abent & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Battle.net hack: how to keep yourself safe

Earlier today we received word that Blizzard’s battle.net servers have been hacked, and with a recent influx of 10 million users thanks to Diablo III‘s launch, that makes this potentially devastating for a lot of people. Blizzard has since released an FAQ on battle.net, telling users what exactly was compromised and what remains secure. Those with a North American account (which includes people in Latin America, Australia, New Zealand, and Southeast Asia) were hit the hardest, so if that’s you, read on to find out what you can do to keep your account safe.


When it comes to staying safe after the hack, the first place you’ll probably want to start is changing your password. Blizzard says that the intruders only made off with cryptographically scrambled versions of passwords – meaning that it wasn’t your actual password that was stolen – but its investigation is still ongoing. It could find more evidence of password theft as time goes on, but even if it doesn’t, changing your password as soon as you can isn’t a bad idea. This is especially true if your password for battle.net is the same one you use for other online accounts (if that’s the case, be sure to change those too).

Blizzard says in the FAQ that while mobile and dial-in authenticators were compromised (dial-in authenticators to a lesser degree), physical authenticators are still believed to be intact. This means that if you have a physical authenticator, now is the time to use it, and keep on using it if you were already. In the event that these hackers do manage to figure out your password, the physical authenticator will provide an extra layer of defense. Some claim that Blizzard’s authenticators aren’t a sure thing, and that may be the case, but in this situation there isn’t much reason to believe you’re actually better off without one.

Now for something that is a bit alarming: answers to secret questions were taken during this breach. When paired with an email address, that could provide an easy way into your account, and the bad news is that there currently isn’t a way to change the answers to your secret questions. Even worse is the fact that Blizzard has opted not to suspend secret questions, as it believes that leaving them active does more good than harm. In any case, Blizzard will be asking battle.net users to update their security questions soon, and it’s a very good idea that you do so as soon as possible after receiving the prompt. Doing so closes a backdoor that hackers could use to easily gain access to your account.

Make no mistake, this breach could have been a lot worse, but the steps above will still help ensure that you stay safe as Blizzard continues its investigation and begins rolling out software updates. We’ll likely be finding out more about the breach in the coming days, so keep it tuned to SlashGear for more information.


Battle.net hack: how to keep yourself safe is written by Eric Abent & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Blizzard hacked: Battle.net leaks emails and more

Diablo developer Blizzard has warned gamers that their personal information may have been leaked, after the company was the target of a network hack. No financial information is believed to have been stolen, Blizzard said in a statement on the data breach, but some email addresses, personal security question answers, and authentication details for some types of connections were all extracted before the unauthorized access was blocked.

The investigation is still ongoing, Blizzard concedes, but so far has found “no evidence that financial information such as credit cards, billing addresses, or real names were compromised.”  What did get poached were cryptographically scrambled versions of Battle.net passwords for those on North American servers, which includes players from North America, Latin America, Australia, New Zealand, and Southeast Asia.

“We use Secure Remote Password protocol (SRP) to protect these passwords, which is designed to make it extremely difficult to extract the actual password, and also means that each password would have to be deciphered individually. As a precaution, however, we recommend that players on North American servers change their password … Moreover, if you have used the same or similar passwords for other purposes, you may want to consider changing those passwords as well” Blizzard

According to an FAQ on the breach, the most likely result is that users could see an uptick in phishing emails as the list of addresses is worked through. Only China-based accounts are unaffected; all accounts outside of the country saw email addresses leaked, and those on the North American servers had the most data leaked:

  • Email addresses
  • Answers to secret security questions
  • Cryptographically scrambled versions of passwords (not actual passwords)
  • Information associated with the Mobile Authenticator
  • Information associated with the Dial-in Authenticator
  • Information associated with Phone Lock, a security system associated with Taiwan accounts only

Blizzard will be automatically prompting those on North American servers to change secret questions and matched answers in the coming days, while those using mobile authenticator will get an update. Although actual passwords have not been leaked, it’s perhaps advisable to change those too: you can do that here.

The attack was first identified on August 4, Blizzard said, with the company then working “to re-secure our network” before proceeding “simultaneously on the investigation and on informing our global player base.” Blizzard is working with law-enforcement agencies and security experts to investigate the potential hackers and look at further securing systems to avoid repeats of the breach in future.


Blizzard hacked: Battle.net leaks emails and more is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Blizzard says Battle.net Password Breach occurred, security compromised

Since a chain is only as strong as its weakest link, hackers have managed to discover a weak link in Blizzard Entertainment’s Battle.net service, where it was successfully hacked with scrambled passwords and email addresses being revealed to the culprits as part of the consequences. Law enforcement bodies have been been contacted, and it goes without saying that Blizzard has already responded by launching an investigation into this matter. The hackers have managed to retrieve email addresses for users located outside of China for Battle.net, where some of the affected regions include North America, Latin America, Australia, New Zealand and Southeast Asia. (more…)

By Ubergizmo. Related articles: Kinect hacked to let you play World of Warcraft sans keyboard, Diablo 3 patch 1.0.4 outlined, developer blogs incoming,

HTC G1 auditions CyanogenMod 10, runs Jelly Bean at a snail’s pace (video)

Image

Putting Google’s latest candy-coated OS update on the very first Android phone? We’ve got a guy for that. Jcarrz1, the same wizard from XDA-Developers who ported Ice Cream Sandwich to the HTC G1, has managed to port a buggy build of CyanogenMod 10 to the handset — which puts Jelly Bean on the oldest hardware possible. Sadly, the old handset isn’t up to Project Butter’s 60FPS interface, but brave tweakers can still use the device’s touchscreen for apps, CM10 features and a partially functional Google Now. WiFi is also up and running, but cellular data is MIA. Check out the video above to see the pre-alpha build in action, or try it out for yourself at the source link below.

Filed under:

HTC G1 auditions CyanogenMod 10, runs Jelly Bean at a snail’s pace (video) originally appeared on Engadget on Thu, 09 Aug 2012 03:07:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceXDA-Developers  | Email this | Comments

Time, patience and a taste for danger demanded for DIY Retina MacBook Pro fixes

Apple’s MacBook Pro with Retina Display was strongly criticized from some quarters for its resilience to DIY-repair, but new unofficial guides suggest it’s more a case of how determined you are to complete your own tweaks. iFixit has pushed out a fifteen-part tutorial for removing and replacing different elements of the flagship Apple notebook, with the pinnacle of difficult probably being switching out the battery.

“Removing the battery is very difficult” iFixit warns. “There is always a chance of inhaling noxious fumes and lighting the battery on fire. Work in a well ventilated area.” The preliminary steps involve wiggling out fans and other components from within the tightly-packed computer – tricky but not necessarily dangerous – but gets significantly more worrisome when you’re actually trying to peel up the battery from the glue holding it in place.

“You will be using a plastic putty knife and a spudger to release the adhesive holding the battery to the upper case” iFixit describes, going on to point out that “the adhesive is very strong, and will require a lot of strength and patience to remove.”

If all that sounds like too much hard work and death-dicing, Apple will happily do it for you – albeit for $199. That could actually be something of a bargain, however; iFixit estimates that “third party battery replacements will cost over $500 if technicians follow the safer Apple-suggested procedure and replace the entire upper case assembly along with the battery.”

In short, if you’re keen to have a MacBook Pro you can repair yourself, the older-style model is probably what you should be looking to; a slim machine like the Retina Display version demands some compromises. Apple is yet to release sales breakdowns indicating exactly how many people have made that compromise in return for the notebook’s undoubtable charms, though the company apparently struggled to keep up with demand post-launch as shipping times extended into several weeks.

[via 9 to 5 Mac]


Time, patience and a taste for danger demanded for DIY Retina MacBook Pro fixes is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Apple freezes over-the-phone password resets

The hack performed against Wired writer Mat Honan serves as a cautionary tale for others to ensure they back up their data, but what about the security issues found with the companies that helped facilitate the crime? Amazon fixed its own security hole yesterday, and now Apple has blocked customer service representatives from issuing password changes over the phone for Apple IDs.

According to an Apple employee that spoke to Wired, the company has placed a 24 hour freeze on any new over-the-phone password changes in order to give the team more time to think about and implement new security measures. When Wired once again tried to duplicate the social engineering used against Apple customer service representatives, they were told that the systems were prevented from resetting passwords, and that users had to do so via Apple’s website instead.

There’s still no official comment from Apple regarding the freeze, however, and it’s not yet clear what the company intends to do to prevent similar situations from occurring in the future. Amazon quietly fixed its own security issue yesterday, with a new policy in place that prevents callers from simply providing a name, email address, and home address to gain access to an account.

The hacker who reset Honan’s various Apple devices first went after his Amazon account, providing the easily gathered information to customer service representatives over the phone in order to gain access. Once the hacker managed that, the last four digits of Honan’s credit card were displayed in his account, information that Apple representatives happily accepted as proof as identity, allowing the individual to perform a password reset and gain access to the iCloud account.


Apple freezes over-the-phone password resets is written by Ben Kersey & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Apple freezes iCloud password change over the phone

Remember the case of Mat Honan’s iCloud account being hacked a couple of days ago? Well, Apple has not sat still, and the fruity company decided to pull the plug on one of their support staff’s functions – that is, to stop processing AppleID password changes that are requested over the phone immediately. This bit of information flew onto the Internet thanks to Apple employees who prefer to remain unidentified (for obvious reasons). One of them who knows just what is going on internally informed Wired that the over-the-phone password freeze will not be a permanent solution, but it should last for 24 hours at the minimum. This was done, as some speculate, so that Apple will be able to figure out just what kind of changes need to be made to their iCloud security policies, if any.

I guess it is now no use for you to make a similar attempt at hacking Honan’s iCloud account by using the same exploit on Apple’s system, as any such attempts would surely have left you hitting a brick wall.

By Ubergizmo. Related articles: iCloud account of Mat Honan hacked, iCloud hacked?,

Amazon, Apple stop taking key account changes over the phone after identity breach

Amazon Kindle Store on iPad

By now, you may have heard the story of the identity ‘hack’ perpetrated against Wired journalist Mat Honan. Using easily obtained data, an anonymous duo bluffed its way into changing his Amazon account, then his Apple iCloud account, then his Google account and ultimately the real target, Twitter. Both Amazon and Apple were docked for how easy it was to modify an account over the phone — and, in close succession, have both put at least a momentary lockdown on the changes that led to Honan losing much of his digital presence and some irreplaceable photos. His own publication has reportedly confirmed a policy change at Amazon that prevents over-the-phone account changes. Apple hasn’t been as direct about what’s going on, but Wired believes there’s been a 24-hour hold on phone-based Apple ID password resets while the company marshals its resources and decides how much extra strictness is required.

Neither company has said much about the issue. Amazon has been silent, while Apple claims that some of its existing procedures weren’t followed properly, regardless of any rules it might need to mend. However the companies address the problem, this is one of those moments where the lesson learned is more important than the outcome. Folks: if your accounts and your personal data matter to you, use truly secure passwords and back up your content. While Honan hints that he may have put at least some of the pieces back together, not everyone gets that second chance.

Filed under:

Amazon, Apple stop taking key account changes over the phone after identity breach originally appeared on Engadget on Tue, 07 Aug 2012 23:40:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceWired (1), (2)  | Email this | Comments

Cat Immersion Project creates crowdsourced kitty cocoon

Here’s something Google’s Glass can’t do: create a virtual tent of cats for those times when you can’t be around your favorite furball. The Cat Immersion Project is the bizarre and brilliant DIY handiwork of the staff at the Seattle Children’s Hospital, projecting photos of more than 3,000 cats into a tented space – complete with purring sound effects – so that 16-year-old cancer patient Maga Barzallo Sockemtickem could get her dose of felines despite being in protective isolation.

Sockemtickem was forced spend more than seven months in hospital in 2011, and then spent a further month more recently in post-transplant recovery. During all that time she was unable to see her own cat, Merry, because of the risk of damage to her immune system.

In response, staff at the Children’s hospital put out a call on Facebook for messages of support and photos of cats, and received a huge number of responses in return. With the help of some sheets, speakers and projectors, the “virtual cat cocoon” was born.

Technically straightforward, then, but with a huge potential to change someone’s day through the awesome power of cats. We’ll be petitioning Google for the inclusion of a virtual cat plugin for Project Glass.

[via Wired]


Cat Immersion Project creates crowdsourced kitty cocoon is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.