Researcher will enable hackers to take over millions of home routers

WRT54G

Cisco and company, you’ve got approximately seven days before a security researcher rains down exploits on your web-based home router parade. Seismic’s Craig Heffner claims he’s got a tool that can hack “millions” of gateways using a new spin on the age-old DNS rebinding vulnerability, and plans to release it into the wild at the Black Hat 2010 conference next week. He’s already tested his hack on thirty different models, of which more than half were vulnerable, including two versions of the ubiquitous Linksys WRT54G (pictured above) and devices running certain DD-WRT and OpenWRT Linux-based firmware. To combat the hack, the usual precautions apply — for the love of Mitnick, change your default password! — but Heffner believes the only real fix will come by prodding manufacturers into action. See a list of easily compromised routers at the more coverage link.

Researcher will enable hackers to take over millions of home routers originally appeared on Engadget on Wed, 21 Jul 2010 06:33:00 EDT. Please see our terms for use of feeds.

Permalink Forbes, Ars Technica  |  sourceBlack Hat 2010  | Email this | Comments

"Tickling Miss Silvia": Mark Frauenfelder Hacks Coffee’s God-Shot [Coffee]

Most companies aren’t interested in creating maker-friendly products, but sometimes, apparently by accident, a product comes off the assembly line that way. The Rancilio Silvia is just such a machine. More »

Researchers say any USB peripheral could steal your data, even a coffee-cup warmer

USB cup warmerSo you’ve got a nice secure thumbdrive, but did you ever think to lock its port? Engineers at the Royal Military College of Canada say the plug and play functionality built into most computers automatically trusts whatever’s plugged into the USB slot. That doesn’t just go for flash drives left out on the street, but all manner of other peripherals as well, as the trio of triumphant researchers demonstrated when they (presumably) infiltrated colleagues’ offices with a totally sweet spy keyboard. That particular device flashed an LED or made the mark’s sound card warble to covertly transmit stolen data, but such exotic methods are reportedly not required — so you’ve yet another reason to cringe when your coworker trots out his Humping Dog.

Researchers say any USB peripheral could steal your data, even a coffee-cup warmer originally appeared on Engadget on Mon, 05 Jul 2010 05:09:00 EDT. Please see our terms for use of feeds.

Permalink Switched  |  sourceNew Scientist  | Email this | Comments

iPad arcade cabinet brings April Fools’ joke to life (video)

Nope, this isn’t the first iPad mod you’ll have seen, but it’s likely to be the biggest crowd pleaser yet. Inspired by the iCade cabinet — an April Fools’ joke that had most of us asking where we could buy one — this really real arcade cabinet integrates Apple’s slate, hooks it up to a set of old school controls, and lets users go to town with such old timer classics as Mr. Do! It’s still in prototype form, hence the boxy exterior, but the action on screen is looking as good as you’d expect. See it on video after the break.

Continue reading iPad arcade cabinet brings April Fools’ joke to life (video)

iPad arcade cabinet brings April Fools’ joke to life (video) originally appeared on Engadget on Mon, 28 Jun 2010 07:41:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceFreekade (YouTube)  | Email this | Comments

EVO 4G loses 30fps limit thanks to devoted community (video)

Whatever the reason HTC instituted that 30fps cap on the EVO’s graphical output, the issue has just been remedied by — surprise, surprise — coders over at xda-developers. We’ve come across video evidence of the EVO 4G rolling along at a swift 54fps average clip, and another motion picture reel shows the positive effect this has had on the touch-tracking of the handset. Check them both out after the break and hit the source to get educated on how to make this happen on your own EVO. You should be warned that there are still some issues to resolve before the whole thing’s buttery smooth, but hey, it’s still a lot better than waiting for HTC to do it.

[Thanks to everyone who sent this in]

Continue reading EVO 4G loses 30fps limit thanks to devoted community (video)

EVO 4G loses 30fps limit thanks to devoted community (video) originally appeared on Engadget on Wed, 23 Jun 2010 05:24:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourcexda-developers  | Email this | Comments

Droid made to work with iPod docks using unholy homemade adapter

What, our ultra-special Droid dock‘s not enough for you? There’s now another way to avoid buying Motorola’s official accessories, though this one’s a bit more blasphemous. Thijs Bosschert over in the Netherlands has put together a fully fledged adapter for his Milestone (aka Droid European Edition), which allows it to interface with docks designed for iPods and iPhones. He’s done it using mostly parts he had lying around — and a well-placed magnet, of course — though he had to resort to using the 3.5mm headphone jack to extract audio from the device. The result might not look like a million bucks, but then it didn’t cost that much either. See more pictures and Thijs’ full how-to guide at the source.

Droid made to work with iPod docks using unholy homemade adapter originally appeared on Engadget on Thu, 17 Jun 2010 06:33:00 EDT. Please see our terms for use of feeds.

Permalink Hack A Day  |  sourceThice.nl  | Email this | Comments

AT&T hacker’s home raided, drugs found, dude detained (update)

Man, one day you have the whole world’s ear to talk about slack network security, and the next you’re in the joint. Andrew Auernheimer, Goatse Security’s hacker-in-chief and a key player in the unearthing of a major security flaw exposing iPads surfing AT&T’s airwaves, is today facing felony charges for possession of a variety of potent drugs. That wouldn’t be such intriguing news by itself, but the discovery was made by local law enforcers who were in the process of executing an FBI search warrant. Hey, wasn’t the FBI going to look into this security breach? Yes indeedy. While nobody is yet willing to identify the reasons behind this warrant, it’s not illogical to surmise that Andrew’s crew and their online exploits were the cause for the raid. So there you have it folks, it’s the first bit of advice any publicist will give you: if you’re gonna step out into the glaring light of public life, you’d better clean out your closet first.

Update: Before y’all get in an uproar about “white hacker this” and “Police State that,” let’s keep in mind that this Andrew Auernheimer character (a.k.a. “Weev”) is one unsavory dude (not to mention a raving anti-Semite): check out this New York Times piece on Internet Trolls if you don’t believe us. After all, it’s not really a stretch that law enforcement might be after someone who’s in possession of ecstasy, cocaine, LSD, and various other pharmaceuticals.

AT&T hacker’s home raided, drugs found, dude detained (update) originally appeared on Engadget on Wed, 16 Jun 2010 06:34:00 EDT. Please see our terms for use of feeds.

Permalink CNET  |  sourceWashington County Sheriff’s Office  | Email this | Comments

iPad still has a major browser vulnerability, says group behind AT&T security breach

You know that tiny little security snafu that allowed over a hundred thousand iPad users’ email addresses out? The one that the FBI felt compelled to investigate? Well, Goatse Security — the group that discovered that particular hole (stop laughing) — isn’t best pleased to be described as malicious by AT&T’s response to the matter, and has requited with its own missive to the world. Letting us know that the breach in question took “a single hour of labor,” the GS crew argues that AT&T is glossing over the fact it neglected to address the threat promptly and is using the hackers’ (supposedly altruistic) efforts at identifying bugs as a scapegoat.

As illustration, they remind us that the iPad is still wide open to hijacking thanks to a bug in the mobile version of Safari. Identified back in March, this exploit allows hackers to jack in via unprotected ports, and although it was fixed on the desktop that same month, the mobile browser remains delicately poised for a backdoor entry — should malevolent forces decide to utilize it. This casts quite the unfavorable light on Apple as well, with both corporations seemingly failing to communicate problematic news with their users in a timely manner.

iPad still has a major browser vulnerability, says group behind AT&T security breach originally appeared on Engadget on Tue, 15 Jun 2010 05:43:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceCNN  | Email this | Comments

Adobe’s Flash and Acrobat have ‘critical’ vulnerability, may allow remote hijacking

When Adobe said Flash gives you the full web experience, it meant it. Part and parcel of the web, as we all know, is the good old hacking community, which has been “actively exploiting” a vulnerability in Flash Player 10.0.45.2 (and earlier versions) and Adobe Acrobat and Reader 9.x to overtake people’s machines and do hacky stuff with them. This so-called flaw also causes crashes, but that’s probably not what’s worrying you right now. Adobe says the 10.1 Release Candidate for Flash Player looks to be unaffected, while versions 8.x of Acrobat and Reader are confirmed safe. To remedy the trouble, the company advises moving to the RC for Flash, and deleting authplay.dll to keep your Acrobat from performing undesirable gymnastics. Oh boy, Steve‘s gonna have a field day with this one.

Adobe’s Flash and Acrobat have ‘critical’ vulnerability, may allow remote hijacking originally appeared on Engadget on Sat, 05 Jun 2010 17:45:00 EDT. Please see our terms for use of feeds.

Permalink CNET  |  sourceAdobe  | Email this | Comments

Cut My SIM does as its name commands

In case you haven’t noticed, all the cool kids are using Micro SIMs nowadays. But help is at hand if you’re stuck with an old and busted Module, thanks to this stainless steel SIM trimmer. Painfully simple to use, it accepts old school chips, smashes down on them with the full force of modernity, and spits out an appropriately streamlined Micro SIM. But wait, you can reverse the modification too — just use the included “back to normal” kit to turn back time and restore compatibility with your dated gear. The first batch of 500 has already sold out, but the next is expected to ship by the end of this month at a price of $25 or just under €20, depending on where you reside. What else do you need, a written invitation?

Cut My SIM does as its name commands originally appeared on Engadget on Fri, 04 Jun 2010 15:28:00 EDT. Please see our terms for use of feeds.

Permalink Engadget German  |  sourceCut My SIM  | Email this | Comments