Target says no PIN numbers were lifted in credit card breach

Target was hacked during the busy Christmas shopping season and the resulting data breach is believed to have compromised as many as 40 million credit cards. This breach is notable … Continue reading

Dogecoin online wallet service hacked

We can thank Bitcoin and the popularity of the virtual currency for other forms of virtual money popping up. One of those copycat virtual currencies that has cropped up is … Continue reading

Xbox One DIY immersive lighting concept blends hue with Illumiroom

Microsoft’s Illumiroom immersive lighting system didn’t arrive alongside the Xbox One, but that hasn’t stopped impressive DIY efforts integrating the console with Philips’ remote control hue bulbs. The handiwork of … Continue reading

Researchers Listen To Computer CPU Sounds In Order To Crack Encryption Code

Researchers Listen To Computer CPU Sounds In Order To Crack Encryption CodeThey say that a chain is as strong as its weakest link, and when it comes to cracking the encryption code of a computer, a bunch of researchers have made a rather startling discovery. What they did was to listen to the different sounds that a computer’s CPU made, before using that data in order to crack open the computer, which theoretically speaking, would allow even the world’s toughest encryption to be cracked wide open.

4096-bit RSA happens to be one of the most secure encryption algorithms worldwide, but researchers Daniel Genkin, Adi Shamir (co-creator of the algorithm itself) and Eran Tromer enlisted the help of a microphone in order to tune in to the sounds a computer’s CPU whenever it decrypts data. The sound is the result of the CPU regulating its voltage, with each sound emitted to represent a certain RSA key. Once you understand the RSA system of encryption, it is a simple matter of cracking the code in order to obtain full access to the data. RSA happens to be the only encryption method to be tested, and if it could be cracked, less secure methods would not be able to stand a chance either, using the same principle. Security and privacy issues, first world problems.

  • Follow: Computers, , , ,
  • Researchers Listen To Computer CPU Sounds In Order To Crack Encryption Code original content from Ubergizmo.

        



    Target hack confirmed: 40m cards potentially hit

    Target has confirmed a credit and debit card hack potentially affecting up to 40m customers shopping in its US stores, with the stolen data including everything thieves could need to … Continue reading

    Target investigates data breach tips sources

    Hackers have been at it again this week. We mentioned earlier this morning that the Washington Post was attacked by hackers that gained access to the paper’s servers. Target has … Continue reading

    Washington Post servers hacked again

    The Washington Post is a major print newspaper that was purchased by Amazon’s Jeff Bezos last summer. The paper also has a digital arm with servers that were hacked a … Continue reading

    Researchers Discover Method To Hack The MacBook’s iSight Camera

    Researchers Discover Method To Hack The MacBooks iSight CameraOne of the ways we would be able to tell that our webcams are active, regardless whether used as a microphone or as a webcam, would be a light on the device that basically lets us know that it is on. Unfortunately it would seem as though there are ways to go around disabling that, as researchers from the John Hopkins University have shared in which they demonstrated how hackers are able to remotely control MacBook iSight cameras without alerting the user, namely due to their ability to disable the LED indicator light.

    According to the report, “We describe how to disable the LED on a class of Apple internal iSight webcams used in some versions of MacBook laptops and iMac desktops […] This enables video to be captured without any visual indication to the user and can be accomplished entirely in user space by an unprivileged (non- root) application.” This is accomplished by reprogramming the camera’s micro-controller, from which they were able to turn on the webcam separately from the light.

    The semi-good news is that the hack affects older MacBook computers up to 2008’s models, include the iMac G5, so if you’re a new owner of a MacBook Air/Pro or iMac, you can rest easy, but if you want to be safe, you could always place a tape over the iSight camera when not in use.

  • Follow: Apple, Computers, , , ,
  • Researchers Discover Method To Hack The MacBook’s iSight Camera original content from Ubergizmo.

        



    Google Glass Getting A Face Recognition App This Month, But It Won’t Get Google’s Blessing

    Screen Shot 2013-12-18 at 10.55.44 AM

    Google Glass use cases are many, but one that inevitably comes to mind is facial recognition. Google already does a lot with reverse image searching and identifying faces in photos, so it would not be such a leap to imagine it doing something like comparing the faces of those you meet at networking events to publicly available photos from Google+ and other sources to make sure you never again forget a name. But Google has forbidden that kind of software in the official Glassware app store. Still, startup Lambda Labs and its founder Stephen Balaban are building that software anyway, for installation via sideloading.

    That workaround means the app, called FaceRec, will only ever make it onto a fraction of Glass devices, and a Google spokesperson had this to say when contacted for comment as confirmation it’ll never get broad distribution through any official channels:

    As our Glass Developer Policies make clear, we will not be approving any Facial Recognition Glassware.

    A subset of the Explorer crop can’t add up to many installs, but that’s exactly who it’s intended for, Lambda tells Forbes. The app works by storing a record of every face that a user encounters while wearing glass, on a cycle that refreshes to capture new faces every ten seconds. In this early version, it can’t ID faces in real-time, and doesn’t have a reference database from which to draw. Instead, like with iPhoto and other services, you can tag pictures with names so that they’ll be recognized the next time you see them. Users can also roll their own script for mining data from their Facebook network for automatic identification, but it’s not built into the product since it violates Facebook’s rules of usage.

    The first version of Lambda’s Glass facial recognition app might be limited, but it’s a first step to something more on par with what we might expect from sci-fi examples, where you glance at someone and get a profile of them, shared interests and more provided via a heads-up display. Which is great, because getting to know people the old fashioned way through conversation and a gradual deepening of mutual understanding is for the birds.

    Seriously though, there does seem to be a general level of anxiety around the idea of Google Glass and facial recognition. But over time we’ve proven ourselves to be quite changeable on the definition of what is and isn’t acceptable when it comes to how much information we share with others via the web, and facial recognition could become something that people grow more comfortable with time. It definitely has a range of positive possible use cases, including for treatment of genuine medical conditions like prosopagnosia or the aftermath of strokes.

    Google may eventually relax its privacy restrictions to make this kind of app officially supported on its Glass platform, but Lambda is also building its own Android-based wearable device called the “Lambda Hat” that will be available for pre-orders Friday. This and other platforms developed outside of Google likely won’t carry similar strictures about face recognition tech, so Balaban’s concept of a world where we can know people just by looking using computer vision might come to pass regardless of Google’s reservations, and the serious privacy implications such a concept entails.

    This may be a particularly interesting example of unauthorized Glass software, but software outside the bounds of platform restrictions is nothing new. Apple has a far-reaching and active iOS jailbreak community, after all, and Android devs have created many apps that can be sideloaded but don’t make it into the Play Store. Glass is bound to play host to a few of those as well, but novel technology makes for novel takes on what constitutes ‘out-of-bounds’ software. None of these unauthorized apps really make it beyond outlier or curiosity status, unless policies change and they gain access to official channels, but they can still be worth watching as barometers of what users find interesting and/or acceptable in specific examples of mobile software.

    Glass camera app adds much-requested preview framing

    A new app for Google Glass addresses one of the most common complaints for Explorers using it as a wearable camera: the fact that you don’t see what you’ve photographed until after its happened. Glass, in its standard form, only displays the results from the camera after the photo has been taken: while video recording […]