Nokia celebrates its users’ inventiveness in latest N8 ad (video)

There might be a tiny bit of upheaval up at the peaks of Nokia management today, but that doesn’t mean we all need to stand around looking serious and forecasting who’ll leverage what synergies in order to actuate the requisite paradigmatic shift in the company’s device portfolio. No, we’re much more inclined to go check out a new ad video that show off the mods and hacks Nokia users have put together with their handsets. It’s quite the breathless run-through, this ad, but if you’re careful you’ll spot a few of your old favorites used in quirky new ways. March past the break for a gander.

Continue reading Nokia celebrates its users’ inventiveness in latest N8 ad (video)

Nokia celebrates its users’ inventiveness in latest N8 ad (video) originally appeared on Engadget on Fri, 10 Sep 2010 09:34:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceNokia (YouTube)  | Email this | Comments

NES controller pressed into service to Android overlord (video)

Perhaps the worst, and least repairable, shortcoming of touchscreens is their failure to act as viable game controllers. Keyboard-equipped smartphones alleviate that pain a little (particularly if you pair them with a Game Gripper), but ultimately we’d all prefer real controllers for our real games. Such was clearly the thinking behind the homebrewed setup here, which combines an HTC EVO 4G — with Android and an NES emulator inside — with an Arduino board, a BlueSMiRF Bluetooth module, and a classic NES control pad. The result might look like a mess of wires, but who cares when you can rock Super Mario 3 the way Nintendo surely intended?

Continue reading NES controller pressed into service to Android overlord (video)

NES controller pressed into service to Android overlord (video) originally appeared on Engadget on Fri, 03 Sep 2010 03:07:00 EDT. Please see our terms for use of feeds.

Permalink Hack a Day  |  sourcesketchsk3tch (YouTube)  | Email this | Comments

Dell Streak procures a hacked-up mini USB adapter, gets friendly with your dusty cables

Even if you can look beyond the SIM lock and the aging Android 1.6 OS on the Dell Streak, there’s still one irksome problem: the lack of a mini or micro-USB port (Dell clearly missed the USB party last summer). Dissatisfied with this state of affairs, John from Linux Slate decided to build an adapter for his tabletphone’s dock connector, which he confirmed to be PDMI instead of a proprietary design. The procedure was simple: John cut up his Streak’s cable plug, soldered a mini USB socket onto the board, and housed the new assembly within the Streak’s cable clip. Voilà! Until third-party USB-to-PDMI cables start to show up in the stores, it’s either this mod or cough up $20 for a spare cable from Dell. See the adapter in action after the break.

Continue reading Dell Streak procures a hacked-up mini USB adapter, gets friendly with your dusty cables

Dell Streak procures a hacked-up mini USB adapter, gets friendly with your dusty cables originally appeared on Engadget on Tue, 24 Aug 2010 09:12:00 EDT. Please see our terms for use of feeds.

Permalink Streak Smart  |  sourceLinux Slate  | Email this | Comments

E-voting whistleblower Hari Prasad arrested, taken to Mumbai for questioning

In America, when you demonstrate what a racket e-voting is, you get to play Pac-Man. In India? You just might get arrested. Security researcher Hari Prasad made waves earlier this month when he demonstrated how an e-voting machine might be compromised, live on national television. It is now being reported that police have taken Prasad into custody, ostensibly for the theft of the machine, although folks in the know are suggesting that a cover-up is in the works. For Prasad’s part, he refuses to give up the source of the machine — and has been taken by police to Mumbai (a fourteen hour drive) to undergo questioning. According to researcher Alex Halderman there are some 1.4 million e-voting machines in use in India, all of which the government keeps out of the hands of researchers on intellectual property grounds — and all of which might be vulnerable to fraud. There’s a brief discussion with Prasad after the break.

Continue reading E-voting whistleblower Hari Prasad arrested, taken to Mumbai for questioning

E-voting whistleblower Hari Prasad arrested, taken to Mumbai for questioning originally appeared on Engadget on Mon, 23 Aug 2010 12:46:00 EDT. Please see our terms for use of feeds.

Permalink Slashdot  |  sourceTechDirt  | Email this | Comments

USB Dongle Claims to Deliver First Easy Hack for PS3

If it works as advertised, a USB dongle could soon break the PlayStation 3’s seemingly hackproof seal.

An obscure group called PS Jailbreak is selling a USB dongle that will supposedly modify the PS3 so users can dump backed up (aka pirated) games onto the system’s hard drive to play them just like legitimate copies.

We write this with such cautious language because hackers have hailed the PlayStation 3 as a console Everest. Sony baked extremely strong security into the system, and though the PS3 has been hacked by a few tinkerers (including George Hotz, the first person to unlock the iPhone), no tried-and-true mod has emerged.

Until we can get our hands on a one of these USB dongles, color us skeptical. (The fact that the “PS Jailbreak” website doesn’t seem to be working right now doesn’t give us much confidence.) Meanwhile, check out the video above claiming to demonstrate the mod running a backup copy of a game and let us know what you think.

PS Jailbreak via Engadget

See Also:


PS3 modchip claims to finally allow backing up games without invasive console surgery (video)

Who needs George Hotz anyway? A USB modchip for the PS3 has emerged from the mists this morning, purporting to allow the dumping of games onto nearby storage — the console’s internal HDD and external drives are both a-ok — as well as the subsequent playing of said games without the need for the original disc. Could it be the backup/piracy nirvana Sony loyalists have been awaiting for so long? Well, there’s a video showing the little USB device apparently working, and the PSX-Scene team say they have personally verified that it does what it claims to do, but skepticism remains advisable here. The PS3 has been a fortress of hacker unfriendliness, so we’d rather kick back, relax, and wait for some braver souls than us to do the testing. For now, the video awaits after the break.

[Thanks to everyone who sent this in]

Continue reading PS3 modchip claims to finally allow backing up games without invasive console surgery (video)

PS3 modchip claims to finally allow backing up games without invasive console surgery (video) originally appeared on Engadget on Thu, 19 Aug 2010 05:31:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourcePSX-Scene, PS Jailbreak  | Email this | Comments

GPUs democratize brute force password hacking

It seems that the availability of increasingly powerful GPUs, when combined with brute-force password cracking tools, is making it increasingly easy to crack passwords — even if they’re extremely well thought out, with symbols and quirky capitalization and all that. How short is too short? According to computer scientists at the Georgia Tech Research Institute, “a seven-character password is hopelessly inadequate, and as GPU power continues to go up every year, the threat will increase.” A better alternative, he suggested, would be a 12-character combination of upper and lower case letters, symbols and digits. Of course, processors are only getting more powerful and hardware less expensive — soon even seven-plus character passwords may become the digital equivalent of unlocked doors. And if that weren’t bad enough, a recent study by an Internet security company called BitDefender has determined that some 250,000 user names, email addresses, and passwords used for social networking sites are freely available online — and seventy-five percent of these folks use the same password for their email and social networking. So, when dreaming up fancy new twelve character passwords, make sure you’re creating unique passwords for all your various accounts. It would be a shame if your Starsky & Hutch FanFicForum account left you vulnerable to identity theft.

GPUs democratize brute force password hacking originally appeared on Engadget on Mon, 16 Aug 2010 16:11:00 EDT. Please see our terms for use of feeds.

Permalink The Register  |  sourceBBC News, Security Week  | Email this | Comments

Charlie Miller and Kim Jong-Il could pwn the Internet with two years, $100 million

Well there’s one thing we can say about Charlie Miller — he sure is an ambitious rascal. When not busy exposing security holes in OS X, our fave security expert (aside from Angelina Jolie in Hackers, of course) has laid out a shocking expose based on the following premise: if Kim Jong-Il had a budget of $100 million and a timeline of two years could North Korea’s de facto leader (and sunglasses model) take down the United States in a cyberwar? It seems that the answer is yes. Using a thousand or so hackers, “ranging from elite computer commandos to basic college trained geeks,” according to AFP, the country could target specific elements of a country’s infrastructure (including smart grids, banks, and communications) and create “beacheads” by compromising systems up to two years before they pulled the trigger. Speaking at DEFCON this weekend, Miller mentioned that such an attack could be carried out by anyone, although North Korea has a few advantages, including the fact that its infrastructure is so low tech that even destroying the entire Internet would leave it pretty much unscathed. That said, we’re not worried in the least bit: if the diminutive despot brings down the entire Internet, how is he ever going to see Twilight: Eclipse?

Charlie Miller and Kim Jong-Il could pwn the Internet with two years, $100 million originally appeared on Engadget on Mon, 02 Aug 2010 11:53:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceAFP, Venture Beat  | Email this | Comments

Hacker intercepts phone calls with homebuilt $1,500 IMSI catcher, claims GSM is beyond repair

In 2009, Chris Paget showed the world the vulnerabilities of RFID by downloading the contents of US passports from the safety of his automobile. This year, he’s doing the same for mobile phones. Demonstrating at DefCon 2010, the white hat hacker fooled 17 nearby GSM phones into believing his $1,500 kit (including a laptop and two RF antennas) was a legitimate cell phone base station, and proceeded to intercept and record audience calls. “As far as your cell phones are concerned, I’m now indistinguishable from AT&T,” he told the crowd. The purpose of the demonstration was highlight a major flaw in the 2G GSM system, which directs phones to connect to the tower with the strongest signal regardless of origin — in this case, Paget’s phony tower.

The hacker did caveat that his system could only intercept outbound calls, and that caller ID could tip off the owner of a handset to what’s what, but he says professional IMSI catchers used by law enforcement don’t suffer from such flaws and amateur parity would only be a matter of time. “GSM is broken,” Paget said, “The primary solution is to turn it off altogether.” That’s a tall order for a world still very dependent on the technology for mobile connectivity, but we suppose AT&T and T-Mobile could show the way. Then again, we imagine much of that same world is still using WEP and WPA1 to “secure” their WiFi.

Hacker intercepts phone calls with homebuilt $1,500 IMSI catcher, claims GSM is beyond repair originally appeared on Engadget on Sat, 31 Jul 2010 22:28:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceWired, AP, MobileBeat, Forbes, IDG  | Email this | Comments

Some Windows CE-based ATMs especially generous (and vulnerable to hackers)

Speaking at the Black Hat conference in Las Vegas, a fellow named Barnaby Jack (really!) used custom software to hack Windows CE-based ATMs on stage. After using an industry standard key to gain entry to the machines (apparently many ATM owners are too lazy to install new locks) Jack was able to load a rootkit on the device using a USB thumb drive. From that point, it was just a matter of running another program that caused all the cash therein to shoot out in a comical manner. The machines used in the presentation were manufactured by Trannax and Triton, both of which have have had a chance to send a security patch to customers prior to the demonstration. However, there are four different machines in common use that are still vulnerable. And no, he won’t tell us which ones.

Some Windows CE-based ATMs especially generous (and vulnerable to hackers) originally appeared on Engadget on Thu, 29 Jul 2010 12:02:00 EDT. Please see our terms for use of feeds.

Permalink Slashdot  |  sourceVenture Beat  | Email this | Comments