AntiSec Leaks 1 Million Apple Device IDs Obtained During FBI Breach (Updated) [Hacking]

Antisec has released 1 million Apple Unique Device Identifiers (UDIDs), claiming that it obtained them after breaching an FBI computer. It also claims to have over 12 million IDs in total, along with user names, device names, cell phone numbers and addresses to go with them. This is very not good. More »

Modder builds $150 open-source thermal imaging camera to help insulate his house (video)

Modder builds $150 thermal imaging camera to help insulate his house video

Modder Andy Rawson thinks he’s found the secret to turning smartphones into super-cheap thermal imaging hardware. Inspired by his quest to find leaks in his old home and the high cost of professional gear, he set about building his own. A 64-zone temperature sensor connects to his iPhone via the dock, overlaying the data onto his camera display. He’s planning to open-source the $150 hardware, and an Android variant of the hardware is currently in the works — although details for both are currently thin on the ground, you can see his announcement video after the break.

Continue reading Modder builds $150 open-source thermal imaging camera to help insulate his house (video)

Filed under: , ,

Modder builds $150 open-source thermal imaging camera to help insulate his house (video) originally appeared on Engadget on Mon, 03 Sep 2012 17:50:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceInstructables  | Email this | Comments

Verizon Galaxy Nexus Jelly Bean available from Google now

A slightly less than simple to install version of Android 4.1 Jelly Bean is now available from Google for you Verizon Galaxy Nexus users – straight from the source. If you’ve never heard of “AOSP” before, you may want to avoid this situation – but if you’re perfectly willing to break your warrantee and unlock your bootloader, you’re welcome to make it work. Here with Android 4.1 Jelly Bean for the Verizon Galaxy Nexus you’ll finally be able to do all that awesome Google Now and voice command and search action you’ve heard so much about – and the notifications pull-down menu is updated to the max as well!

This version of the software goes by the name of JRO03O and is what’s known as an incremental update. You’ll find that this version has not yet been approved by Verizon – if it were, this would be easier – and that you’ll be flashing zip files straight from Google to make it all happen. This build isn’t a whole lot different from what we’ve seen thus far from developers in the wild making AOKP work for this device, and it’s certainly nothing like CyanogenMod 10, that’s for certain.

If you’ve hacked your device before, released it from its software bonds in so many ways, you’ll have a relatively simple time changing over to this new version of Android. ClockworkMod Recovery will make the process so simple your ears will be burning. Custom build users already working with odd software should of course wipe out all data and install the IMM76Q package you should be more than familiar about before doing anything else. Flashing this new JRO03O build on top of that will hopefully do the trick.

And if it’s not been clear enough up until now, the process you’ll be going through here includes “safety not guaranteed” as all software modifications do. You can access both the IMM76Q package and the JRO03O update from Google now – and be cautious! SlashGear assumes no responsibility for your actions with the software linked here! You can also get a rooted version of this software over at Droid Life with instructions on how to use it.

Have a peek at the Jelly Bean timeline below to get more information on how Android 4.1 will be working with your Galaxy Nexus – and enjoy!

[via Android Community]


Verizon Galaxy Nexus Jelly Bean available from Google now is written by Chris Burns & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Dropbox two-step login verification available in experimental build, coming to all accounts soon

Dropbox twostep login verification available in experimental build, coming to all accounts soonFollowing up on its promise to tighten account security following a recent breach, Dropbox is now offering two-step login authentication to users who install the service’s latest experimental desktop build. The team says the functionality will roll out to all users in the coming days, but listed full instructions to forum users who just can’t wait. Those who op-in only need to download a new version of the Dropbox desktop software and activate the feature in their account settings. Once set up, Dropbox will require all unrecognized machines to provide a code, culled from an authenticator app or received via text message. The firm also provides an emergency back-up code that’ll disable the feature should you lose your phone. Feeling insecure? Check out the source link below to get started.

Update: Dropbox just made it official, detailing set up instructions once more on the Dropbox blog.

Dropbox two-step login verification available in experimental build, coming to all accounts soon originally appeared on Engadget on Mon, 27 Aug 2012 04:39:00 EDT. Please see our terms for use of feeds.

Permalink Verge  |  sourceDropbox (1), (2), (3)  | Email this | Comments

An Unknown Hacker Group Claims That It Shut Down the World’s Largest Oil Company—And That They’ll Do It Again [Hacking]

The NY Times is reporting that unknown computer hackers who call themselves “Cutting Sword of Justice” have claimed responsibility for spreading a malicious virus into Saudi Aramco, the Saudi government-owned oil company that’s also the world’s largest, and destroying three-quarters of all its computers. The hackers used a similar virus as the government created virus, Flame. More »

DSLR gets dollop of Raspberry Pi for future home-baked camera accessories

DSLR gets dollop of Raspberry Pi for future homebaked camera accessories

We love a tasty mélange of gadgets, and that’s just what photographer / hacker David Hunt has served up with a Raspberry Pi board inserted into his DSLR’s battery grip. He used the handle for power, while exposing the Pi’s USB, network and video ports for easy on-camera access, and so far he’s managed to transmit images via WiFi and ethernet. But the Raspbian Linux OS opens up a world of potential DIY accessories, like wireless tethered shooting (with the addition of a WiFi dongle), cheap USB instant backup, storage, remote control from anywhere in the world and an intervalometer for timelapse photography. That’s just for starters — with the credit card sized board now in so many hands, the permutations are endless.

Filed under: ,

DSLR gets dollop of Raspberry Pi for future home-baked camera accessories originally appeared on Engadget on Sat, 18 Aug 2012 10:20:00 EDT. Please see our terms for use of feeds.

Permalink Hackaday  |  sourceDavid Hunt Photography  | Email this | Comments

Millions of Hotel Room Locks Have a Glaring Security Flaw That Won’t Get Fixed [Security]

With less than $50 worth of parts and only a few seconds, millions of hotel room keycard locks around the world can be hacked and unlocked by robbers-cum-hackers trying to break into your room. The good news? The security flaw can be fixed. The bad news? No one wants to pay to fix them. More »

Someone’s Trying To Shut Down Power Plants—With a Virus [Hacking]

Earlier this year, a devastating virus dubbed Flame made its way through power plants in Iran, wreaking havoc on system software, and prompting the country to disconnect itself from the internet. Now comes word from Kaspersky Labs that there’s a copycat virus doing the same thing to “at least one organization in the energy sector.” More »

Reuters hack appears political in nature

It appears that the blogging platform backing up Rueters news source has been hacked twice in two weeks, the most recent being this past weekend with a false death announcement being posted as a result. At the moment Rueters officials have not announced any suspects, nor have they got any information they want to share with the public at the moment. What they do know, though, is that their blue had been hacked once before, earlier this month, when the result was similar – the hackers simply posted a rather legitimate-looking post regarding events closely related to the subject of the newest “attack.”

The folks at eSecurity Planet have several reports being pushed this afternoon on the subject, each of them coming to a bit of a consensus over the source of the attack: none of them have a clue. It may seem relatively obvious to you, the reader, on the other hand once you see the subjects of both of the posts that Rueters did not post, and promptly deleted once they realize they’d been posted. Again, Rueters maintains that they were hacked twice in essentially the same way in two weeks, both times the result being a single news blog post on their site.

The first post, according to CNET, was about “the rebel Free Syrian Army suffering setbacks in their battle against Syrian President Bashar al-Assad’s regime.” The second post, according to CBR Online, was “a false reporting that claimed Saudi Arabia’s Foreign Minister Prince Saud al-Faisal had died.” Reuters News’ director of global communications Barb Burg had a statement when the first attack occurred which read as follows:

“Reuters did not report the false story and the post was immediately deleted. We are working to address the problem.” – Burg for Rueters

What do you think, folks? What does a major news network do when their most precious resource – their journalistic integrity – is the victim of an attack?


Reuters hack appears political in nature is written by Chris Burns & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Verizon Galaxy S III bootloader unlocked by hackers

The Samsung Galaxy S III Android smartphone has been released internationally as well as on each of the major carriers here in the USA, and now the Verizon model has had its bootloader unlocked. The first and perhaps most important reason this is important is that Verizon’s model of the Samsung device was the only one to have a locked bootloader – and a separate model made for developers with said bootloader unlocked. The second reason this is important is that an unlocked bootloader, for those of you unfamiliar, means that users will be able to work with whatever software build now that they so choose.

This hack – or development, if you prefer, has been presented by some intrepid folks over at XDA Developers Forums, where an abnormal amount of Android development talk always does occur. Here they’ve sent out instructions on how to make this hack work with Linux and Apple’s OS X computers. Strangely enough, Windows will be no help to you here – not yet, at least. Once you’ve gotten in, you’ll be able to root to your hearts’ desire.

With this device’s bootloader unlocked, you’ll be able to run CyanogenMod, you’ll be able to get all kinds of overclocking done, and you’ll be able to completely destroy the innards of your device. Verizon warns that if you should decide to hack your phone in such a way and find yourself in hot water – if your phone goes blank and does not wake up, for example – you’ll be out of luck. Verizon’s warranty for smart devices does not cover hacking like this.

Have a peek at our timeline below to check out all sorts of interesting Samsung Galaxy S III news and hands-on experiences, and make sure to let us know if you’ve unlocked your Verizon Galaxy S III too – how did it go? Also note that we do not recommend you hack in any way at all due to the fact that it’s dangerous for your device and dangerous for your wallet as well. Stay safe!


Verizon Galaxy S III bootloader unlocked by hackers is written by Chris Burns & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.