Ubisoft working with Kaspersky Lab to make Watch Dogs’ hacking more true to life

Ubisoft working with Kaspersky Lab to make Watch Dogs' hacking more true to life

Upcoming third-person action game Watch Dogs is set in a near-future environment modeled on Chicago, a city that’s overseen by computers that can be manipulated. And while the game has some instances of fantastical hacking perpetrated by main character Aiden Pearce, Ubisoft’s creative team is also working with security firm Kaspersky Lab to bring an air of realism to the game’s hacking themes.

“They have really hardcore experts there on hacking. We send them some of our designs and we ask them [for] feedback on it, and it’s interesting to see what gets back,” Ubisoft Montreal senior producer Dominic Guay told our sister site, Joystiq. “Sometimes they say, ‘Yeah, that’s possible, but change that word,’ or, ‘That’s not the way it works.'” Check out the full piece right here.

Along with a new Assassin’s Creed game, Ubisoft is bringing Watch Dogs to next-gen consoles this year (as well as current-gen and PC), leading its next-gen push.

Filed under: , ,

Comments

Source: Joystiq

Diablo III market down: rollback axed as gold-dupers hunted

If you’ve been playing Diablo III (or Diablo 3, if you prefer), this week, you know that there’s been a bit of a break in the normal everyday action in both the Gold and Real-Money Auction Houses. It is there that users have unleashed an exploit which allows the earning of billions in in-game gold, this being the virtual cash currency aside from the real-cash currency available in the auction house. Players have reported the axing of accounts due to this procedure stacking up to a head this Wednesday.

diabloiii_auction_house

At approximately midnight Pacific time here on the 8th of May, 2013, the servers for Diablo III were kept in good standing where a consideration was cut: administrators decided not to roll back the entire game. Where administrators were forced to consider rolling the game back to an earlier point in time this week, they’ve instead made a move to find the creators of the bug and destroy them. Or boot them from the game, that is.

This mess began late last night when a gold duplication bug was identified by Battle.net. It was then that they began cutting all gold trades across the game’s online servers from top to bottom, keeping then normal trades of items where no gold was involved. As maintenance concluded less than an hour later, administrators suggested a fix was in the works that’d be implemented soon after.

“At this time (and after careful consideration), we’ve decided to not move forward with rolling back the servers. We feel that this is the best course of action given the nature of the dupe, how relatively few players used it, and the fact that its effects were fairly limited within the region. We’ve been able to successfully identify players who duplicated gold by using this specific bug, and are focusing on these accounts to make corrections.

While this is a time-consuming and very detailed process, we believe it’s the most appropriate choice given the circumstances. We know that some of you may disagree, but we feel that performing a full roll back would impact the community in an even greater way, as it would require significant downtime as well as revert the progress legitimate players have made since patch 1.0.8 was released this morning.” – Administrator Lylirra for Battle.net

So no worries for those of you out there worrying about the awesome number of levels you’ve jumped since yesterday: you’re good to go. Meanwhile Battle.net will be hunting down the culprits of this terrible economy-wrecking madness non-stop until they are found. This auction house has been under fire since the beginning of the game, having most recently been the subject of scrutiny via former Diablo III director Jay Wilson who made it clear: if they could pull the plug on the real-money part of the auction house, they would.


Diablo III market down: rollback axed as gold-dupers hunted is written by Chris Burns & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Anonymous OpUSA cyberattack plan goes out with a fizzle

On Monday, Anonymous and various extremist Islamic hacking collectives announced their OpUSA mission, which was a planned cyberattack against nine big-name US agencies/institutions that the hackers wanted to take down. The attack was announced in a manifesto of sorts on Pastebin, which you can read here if poor grammar is of no bother to you. Not surprisingly, the attack appears to have fizzled out with little effect.

anonymous1

The OpUSA cyberattack was set to take place on May 7, which has come and gone for most of those in the US, and thus far no reports have surfaced regarding cyberattacks against the intended targets, among which was the Pentagon, NSA, FBI, the White House’s website, Capital One, Bank of America, and many more banks. A YouTube video was also specified as a target.

YouTube hosted a video titled “Innocence of Muslims,” which Islamist hacking collective Izz al-Din Qassam Cyber Fighters would remove from the website, said Anonymous. Several other Islamic hacking collectives were also specified in the cyberattack’s announcement. For all the grand talk, however, little came of it and websites were by-and-large unaffected.

The Department of Homeland Security issued a statement earlier this week akin to an amused pat on the head, stating that the attack, at the most, would temporarily disrupt websites and nothing else. According to Mashable, the Honolulu Police Department and one hundred or so obscure small businesses had their websites hacked. That took place on May 6, however, and may have been unrelated.

[via Mashable]


Anonymous OpUSA cyberattack plan goes out with a fizzle is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Pentagon report marks first direct accusations of Chinese cyber-espionage

US defense report marks first direct Chinese cyberespionage accusations

The US Department of Defense has taken the unusual step of singling out China’s cyber-spying activities in its annual report. Though the government has tacitly chided such deeds before and even threatened sanctions, yesterday’s document marks the DoD’s first direct allegation of Chinese espionage. It said that hacks directed toward government and business “appear to be attributable directly to the Chinese government and military” for the purpose of “exfiltrating information” to benefit its defense and industry. The paper also highlighted China’s “lack of transparency” with regard to its military, saying that expenditures on cyber-military operations and other defense spending were likely far in excess of the $114 billion it reported. Meanwhile, China denied the accusations, saying it was equally the victim of similar breaches, and suggested that the two nations work together to resolve the problem.

Filed under:

Comments

Via: BBC

Source: US Department of Defense

Samsung GALAXY S 4 ROM CyanogenMod 10.1 spreads to T-Mobile variant

This week the folks at famed hack CyanogenMod have pushed their customized Android system over to the T-Mobile variant of the Samsung GALAXY S 4. This comes after some controversy over the idea that the team would cease working with Samsung devices after finding difficulty with Samsung’s Exynos processor software and builds earlier this year. As the AT&T version of the software was shown to be working earlier this month, now so too do we see the T-Mobile variant active.

samsunggalaxys4cyanogenmod

CyanogenMod 10.1 is the version being pushed to the newest Android devices on the block, this bringing a variant of Google’s Android 4.2.2 Jelly Bean along with its software features such as Google Now. The CyanogenMod team of developers works to bring a customized system to devices that are rooted, this meaning they’re hacked and able to be modified by 3rd party systems. Android has been notoriously “hackable” since inception, this part of Google’s open source intentions with the mobile software.

The software included in the CyanogenMod build has been influential to many software builds since it first arrived on the scene several years ago, including Google’s own source build. CyanogenMod developers have also been incepted into hardware and software companies across the board in the past several years, their influence seen on devices of all types. Head CyanogenMod man Steve Kondik recently left a job at Samsung, continuing to pursue 3rd party work and the development of the ROM.

The Samsung GALAXY S 4 is either available at or is headed to each of the major mobile retailers in the United States and is making its spread abroad here in the Spring of 2013. This device joins the Samsung Galaxy Note II and the rest of the Samsung Galaxy Tab tablets family as the brand continues to strengthen with a common “nature” theme in both hardware and software – curved edges have served Samsung well enough that the wave will move forward through the year to the next release as well, without a doubt. Expect the Samsung Galaxy Note III sooner than later!


Samsung GALAXY S 4 ROM CyanogenMod 10.1 spreads to T-Mobile variant is written by Chris Burns & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Wii U allegedly hacked, Nintendo addresses would-be pirates (updated)

DNP Nintendo addresses rumors of possible Wii U hack

While some people associate the word “jailbreaking” with prison riots or smartphone hacking, the most mainstream of cracking subcultures also takes on video game consoles. A mod chip developer known as WiiKey is now claiming to have reverse engineered the Wii U‘s disk encryption, making it possible to play “backed up” copies of games via a USB drive. The group says its “WiikeU” optical drive emulator is region free and compatible with all Wii U console models. So far the hacking brood has yet to furnish any proof of its claims, but Nintendo is very much aware of the situation.

Nintendo is aware that a hacking group claims to have compromised Wii U security; however, we have no reports of illegal Wii U games nor unauthorized applications playable on the system while in Wii U mode. Nintendo continuously monitors all threats to its products’ security and will use technology and will take the necessary legal steps to prevent the facilitation of piracy.

Filed under: , ,

Comments

Via: Eurogamer

Source: WiiKey (1), (2)

GALAXY S 4 runs CyanogenMod 10.1 in final hack rumor debunk

As the Samsung GALAXY S 4 sees its first public bootloader unlock today, so too does it see the final confirmation that earlier reports that famed hack CyanogenMod would not be coming to the handset. In a push to inform the masses that the smartphone would indeed be supported by the hacker team, head developer Steve “Cyanogen” Kondik revealed to Google+ the screenshot you see below, saying how lovely it was to be running. It’s not clear at the moment if all versions of the GALAXY S 4 will be supported.

Screenshot_1970-01-02-00-03-12

The version of the Samsung GALAXY S 4 you’re seeing here hacked and modded with CyanogenMod is from T-Mobile. The AT&T iteration of the phone was the one seen with an unlocked bootloader earlier today. While one modification is certainly done at a different difficulty level than the other, users can assume that one will be compatible with the other relatively soon.

P3142787-galaxy-s-4-580x3261

The original note on the subject of CyanogenMod not working with the GALAXY S 4 seems to have come from a developer who was ill-informed. As it stands, the CyanogenMod team will be bringing the most popular ROM in the world to smartphones using Samsung’s Exynos processor for some time to come, the same being true of those working with Qualcomm’s Snapdragon processors as well.

The CyanogenMod rom continues to grow in popularity here through 2013 as it reaches version 10.1, this including Android 4.2.2 Jelly Bean and additional modifications unavailable to the basic build of Google’s mobile operating system. This modification is available to any Android owner whose device is supported and whose willing to unlock their device without fear of being kicked from customer support at their local carrier. Know what you’re getting into before you move forth!

[via Android Community]


GALAXY S 4 runs CyanogenMod 10.1 in final hack rumor debunk is written by Chris Burns & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Nintendo confirms hacker claim for Wii U mod chip

If you’re a legacy fan of the original PlayStation, you know good and well that there’s nothing quite like an internationally unlocked mod-chipped gaming console. That’s what hackers have claimed to have developed in the way of the Wii U this week, and Nintendo has confirmed that they’re on the case. While the system itself has not yet been seen or detected playing illegal copies of games, it would appear that Nintendo’s ears are perked.

wiikey

With the barrage of mod chips delivered over the long span of the original PlayStation’s lifetime, abilities ranging from complete inside-out turns of homebrew games to the allowance of Japanese-restricted games played on USA consoles has been seen. Here with the tip on the Wii U, hackers have claimed they’ve been able to reverse the console’s drive authentication, file system, disk encryption, and more.

That means, basically, that once this process they’ve inflicted has been unleashed, the Wii U will be unrestricted as far as illegally sources games goes. Just as the same group did with the original Wii, here with the Wii U they’ve claimed to break the security holding the system to store-bought games. Nintendo is not pleased, as they’ve shared in a statement with the press earlier today.

“Nintendo is aware that a hacking group claims to have compromised Wii U security; however, we have no reports of illegal Wii U games nor unauthorized applications playable on the system while in Wii U mode. Nintendo continuously monitors all threats to its products’ security and will use technology and will take the necessary legal steps to prevent the facilitation of piracy.” – Nintendo

The hack in question also suggests that it would allow users to play both Wii and Wii U games on the Wii U console without the use of disks. With this hack, users would be able to keep all of their games on a flash drive for easier carrying. Users speaking with SlashGear since the announcement of the WiikeU, the system created by this hacker group (Wiikey), have suggested that it’s this convenience they seek most, not necessarily the ability to play stolen games.

Let us know what you think about the situation! Also make sure you’re not breaking the law, folks- stay green!

UPDATE: Wiikey has responded to Nintendo with a few lines of code that they say Nintendo will understand. Have a peek at the image below and see if you’re the giggling type.

asfdsa


Nintendo confirms hacker claim for Wii U mod chip is written by Chris Burns & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Hacker attack arrest pins Spamhaus incident on Dutchman

This week an arrest was made in Spain of a man suspected of taking part in a major hacker attack that earlier this year attacked the organization known as Spamhaus. The Spamhaus Project attack was reported as one that would have an epic scale, said by the spam group themselves to have slowed the internet due to support by many high-ranking assistant webpages. It was later contested as a smaller attack than suggested by Spamhaus, but the results remain: arrests are being made.

SPAMHAUS_DROP

The arrest made this week was made in response to the DDoS attack made in March and took place in Barcelona based on a warrant that covered what appears to be the entirety or Europe. The capture of the man who is at the moment remaining anonymous is a 35-year-old Dutchman and is expected to be transfered to the Netherlands relatively soon.

The attack in March has since been claimed by several companies that’d been previously flagged by Spamhaus in association with spam or otherwise unfriendly hacking activities. According to a source speaking with PC World, the arrest has been made on the top spokesperson for the group said to be responsible for the attacks, the Stophaus Movement, created to protest Spamhaus’ authority in Europe. At the time, this spokesperson said that his involvement in the project was non-existent, suggesting Stophaus members from China and Russia were to blame.

Have a peek at the timeline below for more information on the attacks from earlier this year ans stay tuned to SlashGear as we follow the fallout through the future. And make sure you’re safe from all the spam and the hacks as well – they’re nothing to mess with.


Hacker attack arrest pins Spamhaus incident on Dutchman is written by Chris Burns & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

What a DDoS Attack Looks Like

When hackers do cyber-battle, there isn’t much to see. Maybe you’ll wind up on a crashed website, but the real carnage is happening behind the scenes, perpetrated by a diffuse army of computers a world away. This is what it looks like. More »