Federal Aviation Administration says Android plane hijacking isn’t possible

On Thursday, a man named Hugo Tesco demonstrated at the Hack in a Box security conference a way to hijack an airplane using an Android device – and nothing else. Obviously, such a claim drew quite a bit of attention, including from the Federal Aviation Administration and European Aviation Safety Administration, both of which have come forward with statements that it simply isn’t possible.

airbus-a350-580x366

According to Tesco, an airplane could be hijacked because two aviation systems, the Automated Dependent Surveillance-Broadcast and the Aircraft Communications Addressing and Reporting System, are unauthenticated and unencrypted. He acquired flight code software off eBay and a radio transmitter, and got to work with creating his plane hijacking method.

Tesco used the code to find vulnerabilities in virtual aircraft, and via these problems he used his Android app called PlaneSploit to take control of a Boeing jet in autopilot mode. Rockwell Collins, which is a company that make the systems that were hijacked, says the problem is that Tesco is using a virtual plane, and that such a method wouldn’t work with a real aircraft. The FAA agrees, publishing a statement that says:

“The FAA is aware that a German information technology consultant has alleged he has detected a security issue with the Honeywell NZ-2000 Flight Management System (FMS) using only a desktop computer … The described technique cannot engage or control the aircraft’s autopilot system using the FMS or prevent a pilot from overriding the autopilot. Therefore, a hacker cannot obtain ‘full control of an aircraft’ as the technology consultant has claimed.”

[via The Register]


Federal Aviation Administration says Android plane hijacking isn’t possible is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

The War Z player data compromised after security breach

Those of you who play Hammerpoint’s The War Z may want to change your passwords. Hackers have breached databases in The War Z that held personal player info. Players’ email addresses, passwords, in-game names, IP addresses, and game log-in credentials have all been compromised. Hammerpoint has temporarily shut down its servers for The War Z and for its forums to address the issue and find out the scope of the damage.

Hackers breach The War Z database players data compromised

Hammerpoint assures The War Z players, however, that their payment credentials have not been compromised since it uses a 3rd party to handle all of its transactions. It also says that its players’ real names and addresses should not be compromised, unless the players themselves posted the information on the forums. Hammerpoint also says that player passwords and the email addresses that they use to log into the game are encrypted, so hackers should not be view them without using a “brute force” attack. Nonetheless, change your passwords.

Hammerpoint is currently working with external investigators and security experts in order to determine just how wide-spread the breach was. It has enhanced its security systems to better protect its players’ personal information. It has notified all of its players of the security breach, and is taking the steps necessary to ensure that an incident like this will not happen again in the future.

For those of you who are unfamiliar with The War Z, it’s a zombie survival MMO that many gamers say is a rip off of Arma II’s DayZ mod. It has also received bad press for falsely advertising its game. It launched the game on Steam with misinformation. It lied about how the game has a skill tree system and private servers, and it also over-exaggerated its offerings. This outraged many players who purchased the game but realized that they had no access to many of the promised features. The game was removed from Steam, and was reinstated 2 months later after it amended its description.

Hammerpoint didn’t release an ETA on when the investigation and security updates will be finished, so we’ll update you when we find out. Security breaches seem to be going around a lot recently. Earlier last month, Evernote suffered from a similar breach where user emails and passwords were compromised. It had to initiate a mandatory password reset for all users in order to protect their data.

[via The War Z]


The War Z player data compromised after security breach is written by Brian Sin & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Hacker turns Kindle Paperwhite into wireless Raspberry Pi terminal

Hacker turns Kindle Paperwhite into wireless Raspberry Pi terminal

The Raspberry Pi is all about low-cost computing, which makes this particular hack quite fitting, as it allows you to make a terminal for your lil’ Linux machine out of something you may already have at home: a Kindle Paperwhite. Displeased with the glare from his laptop’s screen on a sunny day, Max Ogden was inspired to find something better and ended up with this Paperwhite hack. It builds on the original “Kindleberry Pi” method for the Kindle Keyboard, although Ogden had to massage it for the newer model and added some extra hardware to make the setup as wireless as possible. You wouldn’t call the end result a monitor, as such — the Paperwhite logs into an SSH session running on the Pi, so it “pretty much only works for terminals.” That’s probably for the best, as Ogden guesses the lag between wireless keyboard and e-ink screen is around 200ms, but at least it has portability, battery life and sunlight readability in the ‘pros’ column. Details of the project can be found at the source below, meaning only time (and probably, a few peripherals) stands between you and the ultimate hipster coffee shop machine.

Filed under: , ,

Comments

Via: Raspberry Pi

Source: Max Ogden

China agrees to discuss cyber security with U.S.

China is willing to talk with the United States about the ongoing cyber security issues that have befallen them recently. It’s been a back and forth war between both the United States and China. The U.S. accused China of hacking into various businesses and news sites, while China insists that they have been the victims of many cyber attacks as well, many of the attacks which supposedly came from the U.S.

China agrees to discussing cyber security with U.S.

It all seems like the blame game so far, but hopefully things will come to an end soon. China’s Foreign Ministry spokeswoman, Hua Chuying, said that China is willing to discuss the issues and cooperate with the international community “on the basis of the principles of mutual respect and mutual trust.” She stated that cyber security is a big issue and that China is one of the biggest victims of the attacks.

This statement comes one day after Tom Donilo, the national security adviser to President Obama, gave the Chinese government 3 courses of actions to follow in order to end the cyber attacks. He told China to give public recognition of the issue, give their assurance that the Chinese hackers would be targeted and dealt with, and give their consent to taking part of forming worldwide cyberspace standards.

Senior officers of the People’s Liberation Army were outraged by the United States’s accusations and demands. Major General Liu Lianhua from the Guangzhou Military District stated, “This talk from the U.S. has no foundation whatsoever. And what evidence is there? There isn’t any!” Another deputy from the Nanjing Military District called the United States a “thief calling others a thief.” Mandiant, a U.S security firm, provided a 60-page report indicating that a majority of the cyber attacks came from China, a report that China dismissed because they believe the IP addresses were spoofed to place the blame on them.

[via Reuters]


China agrees to discuss cyber security with U.S. is written by Brian Sin & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Colin Powell’s Facebook hacker also breached Bush Family e-mail accounts

It turns out that Colin Powell’s Facebook hack wasn’t just an isolated incident performed by a 13-year old with good password-guessing skills. The hacker, who is known as Guccifer, is also the same hacker who breached e-mail accounts belonging to over a dozen of George W. Bush’s friends and family members. He obtained “interesting e-mails”, photos, list of home addresses, cell phone numbers, and more. The hacker even obtained the gate code to Bush’s home.

Colin Powell's Facebook hacker also hacked Bush Family e-mail accounts 1

Guccifer took over Colin Powell’s Facebook and made posts that were vulgar, juvenile, and in all caps. Guccifer had also uploaded various private photos to Colin Powell’s Facebook as well. One of the photos showed George H. W. Bush lying in a hospital bed, another showed George W. Bush “wearing” a Ku Klux Klan hat, and there were a few self-portraits of Bush in a bath, taking a shower, and attending church.

Colin Powell's Facebook hacker also hacked Bush Family e-mail accounts

There were many references made on Powell’s Facebook page that claimed George W. Bush was affiliated with the Ku Klux Klan, and that the entire Bush family were “puppets of the Illuminati.” Guccifer posted on Powell’s wall, “Kill the Illuminati! Tomorrow’s world will be a world free of Illuminati or will be no more.” The hacker has stated that he has no intentions of stopping his attacks on the Bush administration.

There has been a federal criminal investigation on Guccifer ever since he breached Bush’s e-mail accounts back in early February. Along with those e-mail accounts, Guccifer had also accessed the accounts of U.S. Senator Lisa Murkowski, a senior UN official, security contractors in Iraq, and several former FBI agents. Colin Powell’s hack is the latest attack in this case, and judging from the timing of the attacks, there may be another hit within the next 2-3 weeks.

[via The Smoking Gun]


Colin Powell’s Facebook hacker also breached Bush Family e-mail accounts is written by Brian Sin & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

China calls for global “rules and cooperation” on hacking issues

China has once again denied its involvement in a series of hacks that plagued various entities in the United States, including The Washington Post, The New York Times, The Wall Street Journal, Bloomberg, and several U.S. companies. The Chinese government believes that the allegations were based on groundless facts and that this is just some scheme to worsen China’s reputation.

China calls for global rules and cooperation on hacking issues

The Chinese government has issued a call for international “rules and cooperation” on the recent hacking issues. China has stated that they have been the target of several internet hacks as well, and that it’s not just the United States who are the victims. They stated that by tracing the cyber attacks, they discovered that the hackers were located in the United States. This could just be a case of finger pointing, or the attacks may be a case of retaliation.

A United States security firm, Madiant, issued a 60+ page report that provides evidence that there is a link between the cyber attacks on U.S. businesses, the Chinese hacking groups, and also the Chinese government. The cyber attacks originated at the HQ for the People’s Liberation Army Unit 61398 in China. China has stated that those accusations were false and that the IP addresses could have been easily spoofed in order to plant the blame on them.

Yang Jiechi, China’s Foreign Minister, stated that the “international community is closely interconnected on the Internet, therefore cyberspace needs rules and cooperation, not war.” He says that he hopes the accusations against China would stop because they will “not be able to blacken the name of others nor whitewash themselves.” However, it’s hard to refute the report from Mandiant, that shows that around 141 companies had their data stolen by the People Liberation Army, and 115 of those companies were from the United States.

[via New York Times]


China calls for global “rules and cooperation” on hacking issues is written by Brian Sin & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Galaxy Note II vulnerability lets attackers (briefly) access home screen apps (video)

Galaxy Note II vulnerability lets attackers briefly access home screen apps video

A security flaw discovered by Terence Eden on the Galaxy Note II with Android 4.1.2 may make that device less secure than you think when it’s locked by a code or other method. He discovered that the homescreen can be accessed, albeit it just for a split second, by pressing the “Emergency Call” icon, then the ICE button and finally pressing the physical home key for several seconds. While brief, it’s still enough time to click on any of your homescreen apps, which normally wouldn’t present a problem since access goes away when the home page disappears again. However, if one of your apps is a “direct dial” widget, for instance, a call can actually be placed by a hacker, and many other programs that perform an action at launch could also leave the device vulnerable. We’ve confirmed the flaw on our own handsets and the individual who discovered it says that after reporting it five days ago, Samsung has yet to respond. We’ve reached out to the Korean company ourselves and will let you know about any further developments.

Filed under: ,

Comments

Via: @Whatleydude (Twitter)

Source: Terence Eden (blog)

Hacker Channels Men In Black, Straps Virus Information to Feral Cat’s Collar

Scavenger hunt-loving hacker, Yusuke Katayama was arrested today after months on the run. Disgruntled for some reason, he sent viral death threats, and while evading Japanese police, he mentioned that information about his virus was strapped to a cat roaming Tokyo. Months later the cat was found, leading to his arrest. More »

Eric Schmidt predicts China’s hacker war

This week the soon to be released book “The New Digital Age” authored by Google’s Eric Schmidt has been reviewed and spilled early by the Wall Street Journal, this note including words from the author regarding the future digital dominance of China across out planet. This is not the first time Schmidt has predicted political waves coming crashing in before they’ve gone ahead and happened – an essay by Schmidt and colleague Jared Cohen in 2010 called “The Digital Disruption” which correctly predicted Arab Spring. Could this be the next great digital high tide coming towards us?

china_flag_digital

Speaking back in the essay from 2010, Schmidt and Cohen let it be known that soon “governments will be caught off-guard when large numbers of their citizens, armed with virtually nothing but cell phones, take part in mini-rebellions that challenge their authority.” This prediction essentially became a hard and fast real-world situation when events such as the Free Iran movement spread and was maintained with Twitter as a large proponent. Everyone knew what the green flags meant because Twitter let them know it.

In the new book authored by Schmidt, “The New Digital Age” is a section in which the next generation will see the information age take hold fully of political uprisings and movements between countries. Schmidt also make clear that he believes China will be a “dangerous and menacing superpower”, as the WSJ says. This book is also go-authored by Cohen as the essay from 2010 was, they here saying that “the disparity between American and Chinese firms and their tactics” will be putting the USA at a real disadvantage when it comes to future business and politics.

Cohen and Schmidt ass that the United States will be at a disadvantage against China because the country is not willing to “take the same page of digital corporate espionage”, for two reasons: moral values and laws. The “American sense of fair play” will be the reason China gains an upper hand because in the USA “the laws are much stricter (and better enforced)”. Schmidt’s book will be released in full with details far more in-depth than what we’ve got available today – in April is when the public will be able to see it.

In addition to being able to dominate the USA in several digitally-influenced ways in the future, Schmidt and Cohen note that China will be seeing “some kind of revolution in the coming decades”. What that revolution will be is anyone’s guess.


Eric Schmidt predicts China’s hacker war is written by Chris Burns & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Hacked Xbox 360 Leads To Police Raid On Unrelated Family

Hacked Xbox 360 Leads To Police Raid On Unrelated Family

Dealing with other gamers on Xbox Live can be considered a true test in patience as the majority of them spend their time online badmouthing other players for their gender, sexual preferences or for having a mother. But in this story, it seems dealing with someone on Xbox Live can lead to the police surrounding your home in the middle of the night with guns drawn.

According to a WFTV report, hackers made their way into a teenager’s Xbox 360 to demand information in regards to a video game. The teenager refused to help them, which resulted in the hackers to submitting the teenager’s personal information tied to his account to local police. The messages from the hackers were false reports of the teenagers home currently undergoing a murder and hostage situation.

(more…)

By Ubergizmo. Related articles: WSJ: PS4 Coming On February 20th, Sony Teases Something PlayStation Related For The 20th Of February,