SparkFun intros IOIO for Android, a hack-free breakout box to get your mind spinning

Meet any seasoned techie, and they’ll likely spin whimsical tales of computing’s early days, and the challenge of finding a practical use for a device with seemingly limitless potential (you know, like feeding your cat while you sleep). A new product from SparkFun promises to bring this old-school awesomeness into the smartphone age: introducing IOIO (pronounced yo-yo), a breakout box that enables any Android 1.5+ device to control electronic circuits from within Android’s applications. Designed in collaboration with Google, Spark’s PCB connects to your phone over USB, working its magic through a Java library that hooks into your apps. This DIY paradise will begin shipping in a few weeks, and can be yours for $49.95 on pre-order. We’ve already witnessed some clever mods with IOIO, and when it sent a real alarm clock ringing, we couldn’t help but smile. Crack one yourself after the break.

Continue reading SparkFun intros IOIO for Android, a hack-free breakout box to get your mind spinning

SparkFun intros IOIO for Android, a hack-free breakout box to get your mind spinning originally appeared on Engadget on Sun, 10 Apr 2011 04:22:00 EDT. Please see our terms for use of feeds.

Permalink Microcontrollers, Electronics & Robotics, Android Community  |  sourceSparkFun  | Email this | Comments

Epsilon breach exposes TiVo, Best Buy email addresses, spambots stir into action

If you’re subscribed to any of TiVo‘s email-based communiqués, now would be a good time to make sure your spam filters are up to scratch. Epsilon, TiVo’s email service provider, has reported the discovery of a security breach that has compromised the privacy of some customers’ names and / or email addresses. A rigorous investigation has concluded that no other personal data was exposed, however it’s not just TiVo that’s affected — other big names, such as JPMorgan Chase, Citi, US Bank, Kroger, and Walgreens have also seen their users’ deets dished out to the unidentified intruder. As we say, no credit card numbers or any other truly sensitive data has escaped, so the only thing you really have to fear is fear itself… and an onslaught of spam.

Update: Best Buy and the US College Board have also joined the extremely broad list of affected organizations now, judging by the warning emails they’ve been sending off to our readers. Valued Best Buy customers should expect an email similar to the scawl posted after the break.

Update 2: You can also count Chase Bank customers among those also affected — not their bank accounts, mind, but their e-mail addresses.

[Thanks to everyone who sent this in]

Continue reading Epsilon breach exposes TiVo, Best Buy email addresses, spambots stir into action

Epsilon breach exposes TiVo, Best Buy email addresses, spambots stir into action originally appeared on Engadget on Sun, 03 Apr 2011 07:59:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceEpsilon, TiVo, Best Buy  | Email this | Comments

HTC Thunderbolt rooted for real, locked files nearly soured the deal

They thought it would be easy, but they were wrong — AndIRC developers reportedly spent the last 72 hours readying the new HTC Thunderbolt for custom ROMs. Today, they emerge victorious, but that victory is bittersweet, because it may signify the end of a generally hacker-friendly era from the folks at HTC. While devices from the Taiwanese manufacturer have traditionally been easy to modify, the hacker community found Verizon’s LTE flagship fully locked down, with a signed kernel, signed recovery image and a signed bootloader. FOF. Of course, if you’re just looking for a way to overclock your Thunderbolt, you probably don’t care about all that. You’ll find all the (exceptionally lengthy) instructions you need at Android Police. Just be careful out there!

[Thanks to everyone who sent this in]

Continue reading HTC Thunderbolt rooted for real, locked files nearly soured the deal

HTC Thunderbolt rooted for real, locked files nearly soured the deal originally appeared on Engadget on Sat, 19 Mar 2011 20:38:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceAndroid Police (1), (2)  | Email this | Comments

RSA hacked, data exposed that could ‘reduce the effectiveness’ of SecurID tokens

RSA hacked, data exposed that could 'reduce the effectiveness' of SecurID tokens

If you’ve ever wondered whether two-factor authentication systems actually boost security, things that spit out pseudorandom numbers you have to enter in addition to a password, the answer is yes, yes they do. But, their effectiveness is of course dependent on the security of the systems that actually generate those funny numbers, and as of this morning those are looking a little less reliable. RSA, the security division of EMC and producer of the SecurID systems used by countless corporations (and the Department of Defense), has been hacked. Yesterday it sent out messages to its clients and posted an open letter stating that it’s been the victim of an “advanced” attack that “resulted in certain information being extracted from RSA’s systems” — information “specifically related to RSA’s SecurID two-factor authentication products.”

Yeah, yikes. The company assures that the system hasn’t been totally compromised, but the information retrieved “could potentially be used to reduce the effectiveness of a current two-factor authentication implementation as part of a broader attack.” RSA is recommending its customers beef up security in other ways, including a suggestion that RSA’s customers “enforce strong password and pin policies.” Of course, if security admins wanted to rely on those they wouldn’t have made everyone carry around SecurID tokens in the first place.

[Thanks to everyone who sent this in]

RSA hacked, data exposed that could ‘reduce the effectiveness’ of SecurID tokens originally appeared on Engadget on Fri, 18 Mar 2011 08:49:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceRSA  | Email this | Comments

iPad 2 jailbroken, no ETA on public release

You knew this was coming — it was only a matter of time — and here it is, Apple’s latest creation sans the iOS 4.3 chains. The development community credits @comex with installing Cydia on this white iPad 2, and he’s apparently already hard at work on a public jailbreak. According to his Twitter feed, the hack required a brand new exploit, as previous bugs were squashed in iOS 4.3. We’ll keep you posted on when the hack’s ready for you to use, too.

[Thanks, Henrique and Vassilis]

iPad 2 jailbroken, no ETA on public release originally appeared on Engadget on Sun, 13 Mar 2011 20:45:00 EDT. Please see our terms for use of feeds.

Permalink   |  source@chpwn (Twitter), @comex (Twitter)  | Email this | Comments

Safari and IE8 get shamed at Pwn2Own, Chrome still safe… for now

Safari and IE8 get shamed at Pwn2Own, Chrome still safe... for now

Ahead of the most recent Pwn2Own, Google made a rather proud challenge: it’d pay $20,000 to any team or individual who could successfully hack Chrome. Two takers signed up for that challenge — and then both backed down. One individual didn’t show up and a second entry, known as Team Anon, decided to focus their efforts elsewhere. There’s still time left for someone to come out of the woodwork and scrape off that polish, but as of now no brave souls have registered intent. Meanwhile, IE8 was taken down by Stephen Fewer, who used three separate vulnerabilities to get out of Protected Mode and crack that browser’s best locks. Safari running on a MacBook Air got shamed again, cracked in just five seconds. Not exactly an improvement compared to how it fared in 2008.

Safari and IE8 get shamed at Pwn2Own, Chrome still safe… for now originally appeared on Engadget on Thu, 10 Mar 2011 07:56:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceComputerworld (1), (2)  | Email this | Comments

Motorola Atrix docks literally and figuratively torn apart, hack enables Webtop over HDMI port

Motorola’s got a fine smartphone in the Atrix 4G, but a mildly unsatisfactory pair of modular docks. Good thing, then, that you can gain the most intriguing functionality they add without buying one! Fenny of xda-developers reportedly figured out a way to modify the phone’s APK files to activate Webtop mode over a standard HDMI cable — with no dock needed as a go-between — allowing you to experience the Atrix’s PC-like functionality when connected to any HDMI-ready computer monitor or TV. Of course, you’ll need a rooted and deodexed phone to give it a try, but we hear those aren’t monumentally difficult to come by.

While Fenny’s hack could potentially make the desktop dock obsolete — assuming you’ve got a Bluetooth mouse and keyboard handy — Motorola’s LapDock is still something else. It’s razor-thin, it doesn’t require a separate monitor, and it charges your phone. So, before you write it off entirely, you might at least want to indulge your morbid curiosity about what’s inside, and thus there’s a complete teardown video after the break to show you what the guts look like. Enjoy!

[Thanks to everyone who sent this in]

Continue reading Motorola Atrix docks literally and figuratively torn apart, hack enables Webtop over HDMI port

Motorola Atrix docks literally and figuratively torn apart, hack enables Webtop over HDMI port originally appeared on Engadget on Sat, 05 Mar 2011 17:22:00 EDT. Please see our terms for use of feeds.

Permalink Android Community  |  sourcexda-developers, Tinhte.vn  | Email this | Comments

Motorola Atrix root found to be signed, hacking might not be so easy

Motorola Atrix root found to be signed, hacking might not be so easyThat the Atrix got itself rooted before it was even available made us wonder just how… receptive it would be to the caresses of the hacker community at large. Sadly we’re finding it’s perhaps a bit more frigid than its friendly demeanor might have lead us to believe. User adlx.xda over at the xda-developers forums has found that the phone’s system files are not encrypted, but they are signed. This will make the process of replacing them and loading custom builds and the like rather more complicated — but surely not impossible.

[Thanks, chaoslimits]

Motorola Atrix root found to be signed, hacking might not be so easy originally appeared on Engadget on Tue, 22 Feb 2011 11:33:00 EDT. Please see our terms for use of feeds.

Permalink xda-developers  |  sourcexda-developers forum  | Email this | Comments

PlayStation hackers reportedly able to unban selves, ban others, turn tables

PlayStation hackers reportedly able to unban selves, ban others, turn tables

Just last week Sony said that those found to have hacked their PlayStation 3 consoles would have their PlayStation Network access “terminated permanently.” Harsh words that, unsurprisingly, weren’t too warmly received by the hacking community. Destructoid is now reporting that not only have those tinkerers found a way to unban themselves, but that they can in turn ban any other console they want. There’s apparently a catch, though, with the hackers having to know the unique ID assigned to the other console that they’ll be banning, which makes this sound like perhaps the hack is simply swapping a “good” ID onto a “bad” console, but at this point we have no details on the supposed procedure here. Regardless, if some random girl with a cute avatar hits you up on IM and, after a few minutes of casual conversation, asks you for the serial number on your PS3, think twice before handing over those digits.

Update: We were a little leery about this given Destructoid‘s lack of a source, and thanks to a note from reader Omega we now have what looks to be the actual source — indeed this all is sounding rather theoretical.

PlayStation hackers reportedly able to unban selves, ban others, turn tables originally appeared on Engadget on Tue, 22 Feb 2011 10:26:00 EDT. Please see our terms for use of feeds.

Permalink Geek.com  |  sourceDestructoid  | Email this | Comments

CUPP crams ARM inside of a MacBook Pro, makes it run Android with a button press (video)

CUPP’s original prototype wasn’t exactly gorgeous, but the premise was sound — couple an ARM platform with an x86 CPU in order to give consumers the ability to run a desktop OS and a low-power OS such as Chrome OS or Android. It’s a tactic that has far-reaching potential. Imagine this: you’re on a flight attempting to finish up a document, but you only have ten percent of your battery remaining. On a standard desktop OS (like Window 7 or OS X), that’ll get you around 15 to 20 minutes of life; if you were instantly able to sleep that OS after saving your most recent copy on the hard drive, boot up Chrome OS and finish it there, you’d magically have at least an hour of usage time remaining. The fact is that ARM platforms require a fraction of the power that standard x86 systems do, with a demo unit here at MWC proving that a sleeping Windows 7 machine actually consumed more power than a typical ARM system that’s running. The company has shown off a beast of a machine before in order to prove that it’s concept was legit, but here at Barcelona’s mobile extravaganza, it brought something special: a modified MacBook Pro with a TI OMAP-based daughter-board module sitting in place of the optical drive. In theory, a battery similar to that found in the machine above could power an instance of Chrome OS or Android for 20 to 30 hours, just to give you some numbers to nibble on. Care to see how it all panned out? Hop on past the break for a few impressions along with a video.

Continue reading CUPP crams ARM inside of a MacBook Pro, makes it run Android with a button press (video)

CUPP crams ARM inside of a MacBook Pro, makes it run Android with a button press (video) originally appeared on Engadget on Mon, 14 Feb 2011 20:02:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceCUPP  | Email this | Comments