SIM card hack possible with a couple of text messages

Almost every phone in existence uses a SIM card, especially GSM-based devices. It turns out, that while SIM cards are encrypted, they can easily be breached with just a couple of text messages, and it apparently takes only a couple of minutes. The hack allows someone to listen in on calls and steal mobile data from a phone.

HT4192-micro_sim-001-en-580x386

The hack consists of cloaking a text message so that it looks like it was sent from the carrier, and about a quarter of the time, an error message is sent back containing information about the SIM card that can be used to break into it. After that, another text can be sent that officially finishes the job, allowing hackers into your phone.

Security researcher Karsten Nohl of Security Research Labs discovered the exploit and says that up to 750 million handsets could be vulnerable to the hack. However, he notes that only SIM cards using older data encryption methods are at risk, while SIM cards using the newer Triple DES encryption are safe.

Out of all the mobile phones littering the world, about half of them use SIM cards that still use the older DES encryption. However, the exploit probably won’t last for long, since Nohl reported the vulnerability to the GSM Association, and they plan to speak with all carriers about fixing the exploit.

Nohl also plans to reveal his findings during the upcoming Black Hat conference. Don’t worry too much, though, as Nohl believes cyber criminals haven’t figured out the hack, and it would most likely take around six months for someone to figure it out. By then, carriers are hoping to have already patched the vulnerability.

VIA: New York Times


SIM card hack possible with a couple of text messages is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2013, SlashGear. All right reserved.

The World’s Biggest Data Breaches, Visualized

The World's Biggest Data Breaches, Visualized

It sometimes feels like there’s a big data breach in the news every week—but some are far worse than others. This data visulization shows the world’s biggest data breaches to date, and how they compare over time.

Read more…

    

All It Took to Hijack Google Glass Was a Dumb QR Code

The scariest Google Glass hack just got fixed before anyone evil could actually use it, but the details are a little unsettling. Using nothing more than Glass’s camera and a malicious QR code, hackers would have been able to steal total control of the device if you so much as looked at the wrong thing.

Read more…

    

Wearable Computers Create New Security Vulnerabilities

Wearable Computers Create New Security Vulnerabilities

Among other things, Google Glass is bringing to light how wearable computers and the new wave of web-connected objects collectively known as the Internet of Things are introducing new security vulnerabilities to the puzzle of mobile computing.

    

Oculus Rift hack puts user inside Black Armor Drone with first-person view

The Oculus Rift virtual reality headset was originally developed with only gaming in mind, but since the company has been sending out units to game developers, the headset has been used for all sorts of neat things. Most recently, the Oculus Rift has given users a first-person view of RC drones thanks to a little hack.

Screen Shot 2013-07-16 at 1.44.03 PM

Co-founder of Intuitive Aerial Erik Torkel Danielsson took his company’s Black Armor Drone and paired it with the Oculus Rift. Since the VR headset essentially uses two displays, two cameras were mounted on top of the drone to stream video simultaneously. The drone also has a laptop on board that encodes the video as it’s being received.

From there, the video is then sent to the computer on the ground, from which it is then transmitted to the Oculus Rift. You’re probably thinking this creates a lot of lag, and you’re almost correct, as Danielsson noticed a latency of about 120 milliseconds, which isn’t bad, but it’s ultimately not ideal.

Danielsson and company are working to make the system better, though, including using newer hardware and cutting down the weight of the electrics on board the drone, as well as upgrade the cameras and increase the range of the transmitters.

If you’re wondering what the company will do with this technology, they haven’t mentioned whether or not they plan to sell these kits to the public at some point in the future, but Oculus Rift and drone owners would undoubtedly love to get their hands on this type of technology, and frankly, it’s possible for anyone to do this with a little know-how.

VIA: Hackaday


Oculus Rift hack puts user inside Black Armor Drone with first-person view is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2013, SlashGear. All right reserved.

Femtocell Verizon hack allows exposure of phone conversations, text messages

Hacking into mobile phones isn’t anything new, but a recently-discovered hacking trick has gone undetected for years, and it has opened doors for hackers to expose phone conversations, text messages, and even web browser activity. Research has revealed that low-cost low-power cell base stations called femtocells have been able to hack into mobile phones for years.

lock

Femtocells are devices that bring wireless service to low-coverage zones and hard-to-reach spots that a regular cell tower couldn’t reach to. You may not have had a need for one if you’ve been living in the a city for most of your life, but analysts predict that 50 million of them may possibly be in use by the time next year rolls around.

Security consultant for iSEC Partners Tom Ritter was able to hack into NPR host Laura Sydell’s phone to find out her phone number and when she called someone, with the ability to record and playback the entire conversation with ease. Ritter says he was able to do it all with some free software and a $250 femtocell that you can buy at Best Buy.

Ritter points out that he’s able to “see everything that your phone would send to a cell phone tower,” and this includes phone calls, text messages, picture messages, and mobile web surfing. Ritter was using a Verizon femtocell at the time, and the wireless carrier says that they have patched all of their femtocells since then, but other carriers’ models could still be left open.

How easy is it to hack into someone’s phone using a femtocell? iSEC doesn’t provide details, but Ritter notes that “you do need some level of technical skills, but people are learning those skills in college.” However, “breaking into one of these devices, or a device like this, is within the realm of people working at home.” Ritter will be presenting his femtocell findings later in August at this year’s DefCon hacking conference.

VIA: CNN Money


Femtocell Verizon hack allows exposure of phone conversations, text messages is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2013, SlashGear. All right reserved.

Dropbox hack allows bypass of two-factor authentication

Many online services are implementing two-factor authentication to bulk up security and prevent unauthorized access to sensitive information. Dropbox is just one of those online services that offers the feature, but it’s been recently discovered that the company’s two-factor authentication method is still vulnerable to breaching.

dropbox-568x500

It turns out that as long as someone has the username and password of your Dropbox account, they can bypass the two-factor authentication and log right into your account with a couple of clever tricks. Since Dropbox doesn’t verify email addresses when users sign up for a new account, a hacker can use a new email address that’s similar to an existing one by placing a period in somewhere, similar to how Gmail addresses work.

For this fake account, two-factor authentication is enabled and an emergency code is generated in case users ever lose their phone. The hacker will then login to the victim’s account, but will be prompted to enter the code for that account. However, the hacker will simply select that the victim lost their phone and they’ll be promoted for that emergency code.

Since the email address that the hacker signed up with is similar to the victim’s email address. the emergency code will work on the victim’s account. From there, the hacker can disable two-factor authentication and gain access into the victim’s Dropbox account. This is because that “baseballboy@yahoo.com” is registered as being the same “baseball.boy@yahoo.com,” just like how Gmail handles email addresses.

Of course, you have to know the user’s password before you can do this, but once you get a hold of it, it seems relatively easy to bypass Dropbox’s two-factor authentication. However, the security team that found the vulnerability is already said to be working with Dropbox to fix the bug.

VIA: The Hacker News


Dropbox hack allows bypass of two-factor authentication is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2013, SlashGear. All right reserved.

What Could Be Better Than a Laser? Try a Six-Barrel Laser Gatling Gun

The last time we checked in with Patrick Priebe he’d crafted a replica of the Dead Space plasma cutter using a pair of 1.5-watt blue lasers. This time he’s back with a ridiculous spinning gatling gun packing a total of six 1.4-watt blue lasers, and a less intense green laser used for targeting. Watch in awe and horror as a wall of 26 balloons gets wiped out by its intense blue glare.

Read more…

    

Drone In a Suitcase Kit Turns Anything Into a DIY Flying Menace

If you don’t find yourself particularly enthralled with the small assortment of pre-assembled quadcopters already on the market, Jasper van Loenen’s DIY—or Drone It Yourself—kit lets you turn almost anything into an unmanned aerial vehicle. Or at least anything light enough for its four rotors to lift.

Read more…

    

Ubisoft hack spawns Watch Dog promo conspiracy theories

Yesterday, game publisher Ubisoft was hacked, leading to usernames and passwords on their ubi.com website being stolen. However, it seems that a lot of Ubisoft fans are wondering if it’s a serious situation or just a publicity stunt for a marketing campaign for Ubisoft’s upcoming game Watch Dogs, which is a game based on hacking into various computer systems.

watch-dogs

When Ubisoft posted about the hack on their Facebook page, many fans commented on and questioned whether or not the hack was actually legitimate, or just propaganda for Watch Dogs. Users asked questions like, “Are you sure its not just a watch dogs promotional stunt?” and commenting, “this is probably a Watch Dogs stunt,” and “hacked by Aiden Pearce.”

It seems the questionable hack was brought up after the fact that users received an email from Ubisoft, but noted that the email looked like spam with some users saying that the email was in German and full of grammatical mistakes. Other users noted that there was no signature attached to the email, so they couldn’t tell who it was from. Even the email address seemed a bit weird: email_ubi@email.ubi.com.

39386826

However, Ubisoft clarified over and over that it was a real hack, giving users a link to change their passwords. While the game publisher says that passwords are encrypted, there’s still a chance that they could be cracked by the hackers, so they’re warning all users to change their passwords before the hackers end up cracking them to get access to further information.

Ubisoft also says that financial information is safe, as the publisher doesn’t host that information on their website or server, but rather through a third-party. Then again, if a hacker ended up logging into your account, they could eventually find their way to your financial information and other personal info. Hacked or not, it’s always a good idea to change your password every so often to prevent peeping eyes from gaining access to your info.


Ubisoft hack spawns Watch Dog promo conspiracy theories is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2013, SlashGear. All right reserved.