Kinect keeps surgeons on task, Nintendo 3DS might assist optometrists with diagnoses

The latest generation of gaming gadgets do some nifty tricks, and one of the niftiest they might perform is assisting the realm of medicine. Microsoft’s Kinect sounded like a candidate for surgery, and this month real-life surgeons have actually put it to use — Sunnybrook Hospital in Toronto, Canada rigged the Xbox 360 depth camera to its medical imaging computer. Now, doctors don’t have to scrub out to manipulate an MRI scan, or even appoint a peon to the task — rather, they simply raise their bloodied glove, and dive into the digital imagery with a wave of a dextrous hand.

Meanwhile, the American Optometric Association has expanded upon its initial praise of Nintendo’s 3DS, saying the autostereoscopic 3D handheld “could be a godsend for identifying kids under 6 who need vision therapy.” Though Nintendo’s warning labels had originally incited a bit of fear among parents, the organization says that kids who can’t experience the 3DS to its full potential may have amblyopia (or other vision disorders) that can be more easily treated the earlier it’s caught, though one doctor interviewed by the Associated Press contends that kids with amblyopia may not know what they’re missing to begin with — so don’t necessarily expect a panacea, folks.

Kinect keeps surgeons on task, Nintendo 3DS might assist optometrists with diagnoses originally appeared on Engadget on Mon, 21 Mar 2011 07:34:00 EDT. Please see our terms for use of feeds.

Permalink Joystiq  |  sourceAP, The Canadian Press  | Email this | Comments

HTC Thunderbolt rooted for real, locked files nearly soured the deal

They thought it would be easy, but they were wrong — AndIRC developers reportedly spent the last 72 hours readying the new HTC Thunderbolt for custom ROMs. Today, they emerge victorious, but that victory is bittersweet, because it may signify the end of a generally hacker-friendly era from the folks at HTC. While devices from the Taiwanese manufacturer have traditionally been easy to modify, the hacker community found Verizon’s LTE flagship fully locked down, with a signed kernel, signed recovery image and a signed bootloader. FOF. Of course, if you’re just looking for a way to overclock your Thunderbolt, you probably don’t care about all that. You’ll find all the (exceptionally lengthy) instructions you need at Android Police. Just be careful out there!

[Thanks to everyone who sent this in]

Continue reading HTC Thunderbolt rooted for real, locked files nearly soured the deal

HTC Thunderbolt rooted for real, locked files nearly soured the deal originally appeared on Engadget on Sat, 19 Mar 2011 20:38:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceAndroid Police (1), (2)  | Email this | Comments

AT&T Tells Free Tethering Customers It’s Time to Pay Up

The front and back of Apple's iPhone 4 are composed of glass. Photo: Jim Merithew/Wired.com

With some unauthorized hacks, you can share your smartphone’s internet connection with other devices, free of charge — and AT&T has had enough of that.

On the iPhone, for example, the hack MyWi has been a popular tool for “tethering” the handset’s internet connection for free, and just recently users of MyWi reported receiving text messages and e-mails from AT&T requiring them to “update” their plans.

Well, that was fun while it lasted,” a MyWi user posted in a forum. “It was a good 3 years. Goodbye iPhone tethering.”

AT&T is telling users of free tethering that they have three options:

  1. Stop using free tethering.
  2. Contact AT&T to activate a legitimate tethering plan and start paying up.
  3. Go ahead and keep tethering, and AT&T will automatically sign you up for a tethering plan and bill you.

Also known as mobile hot-spotting, the official tethering service provided by both AT&T and Verizon costs an additional $20 per month on top of data and voice plans. Free, unauthorized tethering has been accessible on the iPhone for years, and AT&T is only now beginning to crack down on people using the service without paying.

“We’ve just begun sending letters, e-mails, and text messages to a small number of smartphone customers who use their devices for tethering but aren’t on our required tethering plan,” an AT&T spokesman told Wired.com. “Our goal here is fairness for all of our customers.”

AT&T told Wired.com that it’s “able to determine if a smartphone customer is using the device as a broadband connection for other devices,” which isn’t surprising, because telecom carriers carefully monitor our mobile activities, counting the number of texts we send, voice-call minutes placed, and data used per month.

It’s unclear whether Verizon will take similar action on smartphone customers using free tethering tools. Verizon did not immediately respond to a request for comment.

Wired readers: Take our poll below! If you’re an AT&T customer and you’ve been tethering with your phone, we want to know whether you’ve heard from the carrier about it.

See Also:


Hacking Competition Leaves Android and Windows Phone 7 Devices Undefeated

The Nexus S is the Android phone target in the 2011 Pwn2Own competition.

From the results of the Pwn2Own hacking competition, it looks like Android and Windows Phone 7 are tough nuts to crack.

It took only two days for hackers to crack into the Apple and Blackberry operating systems during the three-day Pwn2Own tournament last week, while Android and Windows Phone 7 models were abandoned and left unhacked by the end of the contest.

Is this because their operating systems are more secure? Yes and no.

“The survival of a target at Pwn2Own does not automatically declare it safer than a target that went down,” last year’s Internet Explorer Pwn2Own winner Peter Vreugdenhil cautions. The contestants who were lined up to beat the Android and WP7 devices in the competition withdrew for a variety of reasons.

Pwn2Own, now in its fifth year, is a hacking competition divided into two areas: web browsers and mobile phones.

This year, Microsoft Internet Explorer 8, Apple Safari 5.0.3, Mozilla Firefox, and Google Chrome were the web-browser targets. In the mobile phone category, the Dell Venue Pro (Windows Phone 7), Apple iPhone 4 (iOS), BlackBerry Torch 9800 (Blackberry 6) and Nexus S (Android) were targeted. The OS and browser versions were frozen last week (so for example, Apple’s Safari 5.0.4 update was not used), ensuring that all contestants are working on the same version of each OS.

Pwning and owning occurs if the hacker defeats the frozen version. If the exploit they used still exists in the current firmware, they are also eligible to receive a monetary prize. The 2011 Pwn2Own competition ran March 9 to 11.

Vreugdenhil says many different factors determine how hard a target is to hack. There’s the safety of the software itself, the exploit mitigations that are already in place for that software, and then the amount of research that has already been conducted (which can speed up the process of writing an actual exploit).

Firefox and Chrome web browsers were also left undefeated because contestants withdrew from Pwn2Own.

“Chrome has the advantages of having multiple exploit-mitigation techniques that certainly make it more difficult to hack. As for Android, we see no particular reason why Android would be harder to hack than one of the other targets.”

Safari, Chrome, iPhone, Android and Blackberry all use WebKit in their browsers, which means that they are all susceptible to exploitation through the browser — and that’s exactly how the iPhone and Blackberry were attacked.

Charlie Miller, a Pwn2Own veteran, worked with Dion Blazakis to hack the iPhone 4 in this year’s competition using a flaw in its Mobile Safari Web browser and a “specially-crafted webpage.” A team of 3 (Vincenzo Iozzo, Willem Pinckaers, and Ralf Philipp Weinmenn) defeated the BlackBerry Torch using a similar technique.

So what did the contest’s organizers think of the outcome of 2011’s Pwn2Own?

Vreugdenhil and other organizers were not surprised that the iPhone went down quickly. It has been a major target and a lot of research has already been done on that platform.

Android’s survival was a bit of a surprise, since it is also a big target and had four contestants lined up.

Although no device is unhackable, some factors contribute to a safer product. For those that are out to find the safest phone on the market, Vreugdenhil says you’ll want to compare features such as DEP (Data Execution Prevention), ASLR (address space layout randomization), Sandboxing, code signing and the ease with which software can be updated on the device.

Pwn2Own Day 2 [Ars Technica]


Wireless Keyboard Keyloggers Steal Your Data

This article was written on December 05, 2007 by CyberNet.

Wireless Cartoon We all know about hackers stealing data from wireless networks by breaking their encryption, but has the security of your wireless keyboard ever concerned you? If you think about it your keyboard sends anything you type (websites, passwords, instant messenger conversations, etc…) to your computer. What’s stopping hackers from tapping into your keyboard’s wireless stream and gathering data that could potentially compromise your security?

As expected wireless keyboard vendors like Microsoft and Logitech provide encryption techniques to prevent this kind of stuff from happening. One group of researchers, however, were able to crack Microsoft’s wireless security scheme (PDF report) and intercept any of the text that was being sent. According them even very slow computers would be able to brute force the encryption key because of how insecure it is:

To our surprise, only the actual keystroke data seems to be encrypted. The Metaflags and identifier bits aren’t encrypted or obfuscated. The one byte USB Hid code is encrypted using a simple XOR mechanism with a single byte of random data generated during the association procedure.

This means that there are only 256 different key values possible per keyboard and receiver pair. We did not notice any automated key change interval and therefore assume that the encryption key stays the same until the user reassociates the keyboard. 256 key combination can be brute forced even with very slow computers today.

Using simple wordlist checking in combination with a weightening algorythm, every data in range can be decrypted within only a few keystrokes.

They tested this technique on the Microsoft Wireless Optical Desktop 1000 and 2000 keyboards, but they assume that other Microsoft wireless keyboards would produce the same results. As for Logitech they say that they have “additional software that seems to add another layer of encrpytion on top of the communication channel.

For the sake of security the researches are withholding how to do this yourself, but they have submitted the information to Microsoft in hopes of seeing a patch soon. Good thing I’m still using an old fashioned wired keyboard. ;)

[via The Register & CrunchGear]

Copyright © 2011 CyberNetNews.com

Related Posts:


iPad 2 jailbroken, no ETA on public release

You knew this was coming — it was only a matter of time — and here it is, Apple’s latest creation sans the iOS 4.3 chains. The development community credits @comex with installing Cydia on this white iPad 2, and he’s apparently already hard at work on a public jailbreak. According to his Twitter feed, the hack required a brand new exploit, as previous bugs were squashed in iOS 4.3. We’ll keep you posted on when the hack’s ready for you to use, too.

[Thanks, Henrique and Vassilis]

iPad 2 jailbroken, no ETA on public release originally appeared on Engadget on Sun, 13 Mar 2011 20:45:00 EDT. Please see our terms for use of feeds.

Permalink   |  source@chpwn (Twitter), @comex (Twitter)  | Email this | Comments

Katamari Hack rolls across your favorite websites, leaving swath of HTML5 destruction in its wake

Google Chrome may have come out of Pwn2Own unscathed, but you can rip through any website it (or another HTML5-compliant browser) displays — just pull out your handy Katamari Damacy ball and wreak havok on the page. Na NAaaa, na na na na na na na, na na na na na naaaa…

Alternatively, paste the following Javascript into a bookmark, and then click it when you’re tiring of a page.

javascript:var i,s,ss=[‘http://kathack.com/js/kh.js’,’http://ajax.googleapis.com/ajax/libs/jquery/1.5.1/jquery.min.js’];
for(i=0;i!=ss.length;i++){s=document.createElement(‘script’);s.src=ss[i];document.body.appendChild(s);}void(0);

Katamari Hack rolls across your favorite websites, leaving swath of HTML5 destruction in its wake originally appeared on Engadget on Sun, 13 Mar 2011 16:46:00 EDT. Please see our terms for use of feeds.

Permalink Kotaku, GamePro  |  sourceKatamari Hack  | Email this | Comments

iPad 2 installed in Ford F-150 truck, does FaceTime while you roll over stuff (video)

SoundMan Car Audio’s done it again, and this time on day one — they’ve stuffed an iPad 2 into the dashboard of an unsuspecting vehicle, in this case a 2010 Ford F-150 pickup. While that doesn’t sound like the most exciting hack in the world, we have to give credit where it’s due — Doug and company now have a truck that can make FaceTime video calls, browse to world-class technology websites (we’re blushing) and play Pandora too. See the SoundMan crew show off the fruits of their labors in a video after the break.

[Thanks to everyone who sent this in]

Continue reading iPad 2 installed in Ford F-150 truck, does FaceTime while you roll over stuff (video)

iPad 2 installed in Ford F-150 truck, does FaceTime while you roll over stuff (video) originally appeared on Engadget on Sun, 13 Mar 2011 09:39:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceSoundMan Car Audio  | Email this | Comments

Kinect hacked for home automation, does your mood lighting for you (video)

Microsoft’s Kinect has become quite the hacking hotbed — the fields of medicine, music, and even shadow puppeteering have all benefitted from the peripheral’s incredible versatility. And now, to the delight of home automation nerds everywhere, an enterprising young hacker has rigged a Kinect to automate the lighting in his home. By positioning the camera bar in a corner to track his movements, connecting it to the automation controller, and coding on / off commands, he’s able to control the lights throughout his geektastic domicile. The automation logic then turns on the lights when entering the room, localizes them according to location, and turns them off upon leaving. One less thing to worry about — here’s hoping a method for spotting our perpetually misplaced keys is in version 2.0. Vid’s after the break.

Continue reading Kinect hacked for home automation, does your mood lighting for you (video)

Kinect hacked for home automation, does your mood lighting for you (video) originally appeared on Engadget on Fri, 11 Mar 2011 11:04:00 EDT. Please see our terms for use of feeds.

Permalink SlashGear  |  sourceNitrogen’s Posterous  | Email this | Comments

NES becomes world’s least efficient flash drive (video)

Hold on to your Zapper, because we’re about to blow some minds — this Nintendo Entertainment System has been outfitted with a USB port, and its Tetris cartridge transformed into an 8GB USB flash drive. Not only that, there are simple step-by-step instructions to craft your own online, so you too can slot, socket, mount and feel blissfully anachronistic all the same time. Speaking of time — it looks like we’ve finally got a sufficiently retro alternative to your Iomega ZIP drive.

NES becomes world’s least efficient flash drive (video) originally appeared on Engadget on Wed, 09 Mar 2011 06:58:00 EDT. Please see our terms for use of feeds.

Permalink Technabob  |  sourceInstructables  | Email this | Comments