Burger King Twitter account hacked to show McDonald’s superiority [UPDATE]

Hacking into systems and servers to play some harmless pranks isn’t anything new, but today Burger King’s official Twitter account was breached and the hackers appeared to be die-hard McDonald’s fans, because they ended up changing the page’s branding to the McDonald’s logo and name, and mentioned that Burger King “just got sold to McDonald’s because the Whopper flopped.”

burger-king-twitter

Burger King’s Twitter account, which has almost 90,000 followers, was made to look like McDonald’s own Twitter feed, with a McDonald’s logo and all. The only difference was that the username remained unchanged. Many of the tweets beared the hashtag “#DFNCTSC”, which seem to suggest that the hackers behind this comical trick are a part of the Defonic Team Screen Name Club, who are best known for hacking into Paris Hilton’s phone.

The hackers continued to tweet for 30 minutes before the account was finally suspended for the time being. Tweets were filled with text, photos, and videos that made fun of Burger King and its employees, including a couple of tweets mentioning employees doing drugs in the bathroom. The rest of the tweets were pretty random and some didn’t really make sense.

Twitter has recently been a huge target for hackers, with over 250,000 passwords leaked from a hacker who broke into the service’s servers. This also isn’t the first time that verified accounts, and popular Twitter users have been targeted. Major League Baseball was recently hacked, as well as the New York Yankees account, which made fun of Derek Jeter.

UPDATE: We’ve received some stats about the hacking from Unmetric regarding the Twitter account. The number of followers that the account gained jumped from 83,000 to 110,000 within 60 minutes, and the hackers sent a total of 55 tweets before the account was eventually suspended, 33 of which were either replies or retweets. McDonald’s also chimed in on the Burger King hack, assuring users that they had nothing to do with the fiasco.

[via ABC News]


Burger King Twitter account hacked to show McDonald’s superiority [UPDATE] is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Facebook security reveals zero-day Java attack

It’s never good when you have to make an official report to the public about a hacker attack your multi-billion dollar social network has had. That’s what’s happened this week as Facebook’s Chief Security Officer Joe Sullivan lets it be known that several engineers on staff with Facebook had been the subject of a zero-day Java exploit. The good news is that no customer data was exposed (that’s your stuff), the bad news is that Facebook wasn’t the only company targeted by this attack.

brownie

According to Sullivan, this attack worked as a “watering hole”, using an unnamed “popular mobile developer Web forum” as a trap for unsuspecting visitors. When the first user on Facebook’s engineering team visited the site, that engineer tripped a wire, so to speak, that let the zero-day Java exploit begin to take hold of machines at Facebook. The attack here is related back to a Java exploit documented by Oracle earlier this month.

Similar attacks have been popping up recently in several places, one of them relating to Twitter’s recent incident in which 250,000 account passwords were stolen. Another related event occurred with Mozilla as they made Java instances blocked by default – can’t be too careful!

With the Facebook situation it would appear that even the patch from Oracle wouldn’t have helped the engineers as Sullivan notes that this attack was “injected into the site’s HTML.” In this case any user visiting the site with Java enabled would have been infected, bar none. This situation did allow the hackers to gain access to some “corporate data, email, and come software code.” How much and how serious this breach really was is not being made entirely clear.

What is being made clear by Sullivan is that Facebook’s engineers are attempting to reduce the amount of products they use that are dependent on Java. Of course that’s not the end of the story as the hacking attack community rolls on – a cat and mouse game ensues for all time. Check the timeline below for more Java-related history to see how one bit of software history may be on its way out.

[via Ars Technica]


Facebook security reveals zero-day Java attack is written by Chris Burns & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Evad3rs member Planetbeing talks iOS 7 jailbreaking

The iOS 6 jailbreak is officially out and it’s had plenty of time to get into the hands of eager jailbreakers, specially 7 million of them. Now that the Evad3rs dev team has had some time to relax, one of the members was available to answer questions on Reddit today. Planetbeing, the hacker also behind the first jailbreak ever, discussed his thoughts on jailbreaking iOS 7.

Screen-Shot-2013-02-01-at-11.46.34-AM-580x4291

When asked if iOS 7 may possibly be harder or more easier to jailbreak than iOS 6, Planetbeing says that “it’s hard to say,” since he’s not quite sure what Apple will do, but he guesses that the next major version of iOS will be harder to jailbreak, and while the time it takes to jailbreak each major iOS version has kept rising, Planetbeing really isn’t sure how long it might take to get iOS 7 exploited.

He continues by saying that, when iOS 7 eventually comes out, the dev team will study it and see what they can do with it. He says that you “can’t really plan on” things beforehand, since it’s so difficult to know what to expect. Planetbeing says that it’s all a “specialized game with a steep learning curve.”

As far as what Planetbeing does when he’s not hacking into Apple devices, he actually works at a web analytics company for his day job, and as far as his free time, he says that “if jailbreaking is no longer possible,” he would most likely play all those Steam games he bought on sale that he never gets around to playing.


Evad3rs member Planetbeing talks iOS 7 jailbreaking is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Pebble watch jailbreak tweak shows all notifications from iPhone

The Pebble smartwatch is finally shipping to customers after a number of delays, and we even got our hands on the thing during CES 2013 last month. Jailbreakers and app developers are also getting in on the fun, and now we’re seeing what looks to be the first jailbreak tweak for iPhone built for the Pebble smartwatch.

pebble_smartwatch_hands-on_sg_23

Developer Conrad Kramer released the “BTNotificationEnabler” tweak today in the Cydia app store, and it’s a fairly simple tweak that allows the iPhone to push all notifications to the Pebble smartwatch. Since the Pebble watch uses Bluetooth to connect to the iPhone, any notification from any app will be sent to the watch.

Granted, Pebble is allowing for third-party apps to use its SDK, so it would probably be just a matter of time before most apps eventually support push notifications on the smartwatch itself, but jailbreaking leaves the door wide open for possibly even better tweaks, since these kinds of apps aren’t subjected to Apple’s rules.

Then again, if you want seamless integration with your iPhone, it’s rumored that Apple is working on their own smartwatch, which may or may not happen of course, but it’ll be interesting to see how that plays out in the next few months. If an Apple smartwatch does happen, the seamless integration could be quite good for iOS users, and it may even integrate with OS X as well, which would be even better.

[via Cult of Mac]


Pebble watch jailbreak tweak shows all notifications from iPhone is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Jawbone MyTalk Experiences Limited Hack

Jawbone MyTalk Experiences Limited Hack

Jawbone has announced that a small number of accounts had been compromised by cyber-attacks. The company did not mention how many, but did use the word “limited” to describe the scope of the attack. In any case, some user data (email, password, address) may have been stolen,  but Jawbone doesn’t think that more than that was accessed. Note that the password information that was accessed was encrypted, and if Jawbone used a different encryption key for each account, it should be hard (or at least very long) for hackers to do anything at scale with them. (more…)

By Ubergizmo. Related articles: Instagram Competitor Molome Will Be Arriving On Windows Phone 8, Android 4.2.2 Update Arrives For Nexus 4 Owners,

9 Reasons to Root Your Android Device

To root or not to root? That is the question. Rooting your Android device definitely pushes you up a level or two in your geekdom. It requires a certain level of commitment, at least a little savvy, and even a modicum of risk. So, why would you want to bother? More »

Jawbone User Accounts Compromised in Hack

If you use a Jambox, now might be a real good time to change your MyTalk password: Jawbone’s servers have been hacked, and a swathe of users have had their details swiped. More »

Jawbone says ‘limited’ number of MyTALK accounts hacked

Jawbone MyTALK accounts compromised,

If you have a Jawbone headset and MyTALK account, you may have received an email from the outfit warning that you’ll need to reset your password due to a security compromise in a “limited” number of accounts. The company said it halted the hack after “several hours,” however, and that thieves only stole names, email addresses and encrypted passwords — but no other user information, so far as it can tell. If affected, you’ll need to reset your password by following the instructions (in the PR after the break), and Jawbone also advised you to change it on other sites too, if used elsewhere — never a good practice, incidentally.

[Thanks to everyone who sent this in.]

Filed under: ,

Comments

Hackers warn of zombie apocalypse in news station hack

While hackers are usually notorious for breaking into databases and stealing personal information, some hackers simply breach into systems just for the fun of it. Case in point: someone (or possibly even a group) hacked their way into the KRTV affiliate of the Montana News Network and its CW station, prompting an emergency alert message warning viewers of an impending zombie apocalypse.

CODBOII-Nuketown-Zombies-for-DLC-Season-Pass_1280-580x326

In several counties in Montana, KRTV says that the hackers broadcasted an emergency alert message that informed viewers that “dead bodies are rising from their graves,” and that the bodies were “attacking the living,” warning people not to “approach or apprehend these bodies as they are extremely dangerous.”

While the hackers used an alert system normally meant for weather emergencies, the network The network assures viewers that there actually isn’t any such emergency, and its engineers are investigating the situation to see what happened. Apparently, the message sparked four calls to local police to see if the zombie apocalypse was real.

It’s certainly an interesting way to hack into a news station, and from what we’ve been hearing about recently with Anonymous and other takedown hacker groups, it’s nice to take a break from that and have a laugh over what seems to be a completely-harmless hack, although we’re sure that KRTV officials and engineers will be working overtime to make their system more secure for the future.

[via FOX]


Hackers warn of zombie apocalypse in news station hack is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Hacker Channels Men In Black, Straps Virus Information to Feral Cat’s Collar

Scavenger hunt-loving hacker, Yusuke Katayama was arrested today after months on the run. Disgruntled for some reason, he sent viral death threats, and while evading Japanese police, he mentioned that information about his virus was strapped to a cat roaming Tokyo. Months later the cat was found, leading to his arrest. More »