Don’t tell us where you’re going, Nissan Leaf driver, we already know (video)

That cute little bugger above certainly looks innocent enough, but it might have been spreading some pretty detailed gossip behind your back. Leaf-driver Casey Halverson was playing around with the RSS reader in his Carwings system when he discovered that it wasn’t just collecting feeds from RSS servers, it was also telling those servers his car’s current location, speed, heading and even the destination he’d set in the sat nav. Strangely, Halverson’s undercover tattletale appears to have halted its indiscretions after he posted the discovery on his blog, but we’re surmising there’s still hundreds of server logs up and down the country that prove it really happened, not to mention his video after the break. Cue Rockwell, fade to black.

Continue reading Don’t tell us where you’re going, Nissan Leaf driver, we already know (video)

Don’t tell us where you’re going, Nissan Leaf driver, we already know (video) originally appeared on Engadget on Thu, 16 Jun 2011 14:11:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceCasey Halverson  | Email this | Comments

LulzSec Leaks 62,000 Email/Password Combo Internet Goodie Bag (Updated)

Fresh off their face-kicking of the CIA’s website, LulzSec just decided to go with something a little less political: a 60k+ set of login info for… they won’t say. But they’re encouraging everyone to try ’em out across the web. More »

Codemasters website hacked, ‘tens of thousands’ of personal accounts compromised

This must be the season of the hacking witch as we’ve now seen yet another company’s online security walls breached. Independent UK games developer Codemasters, responsible for titles like Dirt 3 and Overlord, has reported that its website was hacked on the third of June, exposing the names, addresses (both physical and email), birthdays, phone numbers, Xbox gamer tags, biographies, and passwords of its registered users. Payment information wasn’t compromised, but when you consider that almost everything else was, that feels like hollow consolation. For its part, Codemasters says it took the website offline as soon as the breach was detected and a subsequent investigation has revealed the number of affected users to be in the tens of thousands. Those who might have been affected directly are being emailed with penitent apologies, while the rest of us are being pointed to the company’s Facebook page while its web portal is kept offline.

Codemasters website hacked, ‘tens of thousands’ of personal accounts compromised originally appeared on Engadget on Mon, 13 Jun 2011 04:03:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceBBC  | Email this | Comments

Tennessee law bans ‘distressing images,’ opens your Facebook inbox

Distressing Images

Congratulations Tennessee! Governor Bill Haslam has put your state in the national spotlight and, for once, it has nothing to do with Bonnaroo or how bad the Titans are. The republican executive of the state signed a ban on “distressing images” into law last week that we’re sure constitutional lawyers are going to have a field day with. Anyone who sends or posts an image online (and yes, that includes TwitPics) that they “reasonably should know” would “cause emotional distress” could face several months in jail and thousands of dollars in fines. The best part? Anyone who stumbles across the image is a viable “victim” under the law and the government doesn’t even have to prove any harmful intent. So, Tennessee residents who aren’t cautious enough using Google image search could get a few people in trouble. Another, and perhaps more perturbing, part of the same bill also seeks to circumvent restrictions on obtaining private messages and information from social networking sites without a search warrant. We give it about a month before this gets struck down on obvious grounds that it’s unconstitutional.

Tennessee law bans ‘distressing images,’ opens your Facebook inbox originally appeared on Engadget on Fri, 10 Jun 2011 16:19:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceTechdirt, Ars Technica  | Email this | Comments

Netflix, Foursquare, LinkedIn, and Square apps expose your data

Failsquare

Here’s a little tip for app developers: encrypt everything, especially passwords. Security firm viaForensics fed some popular iPhone and Android apps through its appWatchdog tool and found that Netflix, LinkedIn, and Foursquare all stored account passwords unencrypted. Since the results were first published on the 6th, Foursquare has updated its app to obscure users’ passwords, but other data (such as search history) is still vulnerable. While those three were the worst offenders, other apps also earned a big fat “fail,” such as the iOS edition of Square which stores signatures, transaction amounts, and the last four digits of credit card numbers unencrypted. Most of this data would take some effort to steal, but it’s not impossible for a bunch of ne’er-do-wells to create a piece malware that can harvest it. Let’s just hope Netflix and LinkedIn patch this hole quickly — last thing we need is someone discovering our secret obsession with Meg Ryan movies.

Netflix, Foursquare, LinkedIn, and Square apps expose your data originally appeared on Engadget on Thu, 09 Jun 2011 19:38:00 EDT. Please see our terms for use of feeds.

Permalink Wall Street Journal  |  sourceviaForensics  | Email this | Comments

FaceNiff makes Facebook hacking a portable, one-tap affair (video)

FaceNiff

Remember Firesheep? Well, the cookie snatching Firefox extension now has a more portable cousin called FaceNiff. This Android app listens in on WiFi networks (even ones encrypted with WEP, WPA, or WPA2) and lets you hop on to the accounts of anyone sharing the wireless connection with you. Right now it works with Facebook, Twitter, YouTube, and Nasza-Klasa (a Polish Facebook clone), but developer Bartosz Ponurkiewicz promises more are coming. You’ll need to be rooted to run FaceNiff — luckily, we had such a device laying around and gave the tap-to-hack app a try. Within 30 seconds it identified the Facebook account we had open on our laptop and had us posting updates from the phone. At least with Firesheep you had to sit down and open up a laptop, now you can hijack Twitter profiles as you stroll by Starbucks and it’ll just look like you’re sending a text message (but you wouldn’t do that… would you?). One more image and a video are after the break.

Continue reading FaceNiff makes Facebook hacking a portable, one-tap affair (video)

FaceNiff makes Facebook hacking a portable, one-tap affair (video) originally appeared on Engadget on Thu, 02 Jun 2011 02:28:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceFaceNiff  | Email this | Comments

Best Buy Mobile Upgrade Checker reveals other numbers on your Sprint account, invites scaremongering

Some crack reporting from an NBC affiliate news station has revealed a little foible in Best Buy‘s cellphone upgrade checking utility. If you punch in your Sprint mobile number and ZIP code, you get taken to a screen showing all the other numbers on your account as well. This applies only when yours is the main number on the account, mind you, but the issue is in the obviously lax approach to securing data you might care to keep private — Verizon, AT&T and T-Mobile customers have to pass a security check first. Of course, the actual risks resulting from someone being able to find other numbers associated with your cellular account are so small as to verge on the benign (“somebody can use that… for something”, as the KXAN report sagely advises), though that hardly excuses Best Buy from being sloppy with Sprint subscribers. They’re human too, you know!

Best Buy Mobile Upgrade Checker reveals other numbers on your Sprint account, invites scaremongering originally appeared on Engadget on Thu, 26 May 2011 09:07:00 EDT. Please see our terms for use of feeds.

Permalink KXAN.com  |  sourceBest Buy Mobile Upgrade Checker  | Email this | Comments

Sony Ericsson’s Canadian online store hacked, more than 2,000 customers’ data taken

The hackers just won’t give poor Sony a break, will they? Following the infamous PSN breach last month and an attack on the company’s Greek online music service earlier this week, Sony Ericsson has now seen another intrusion that extracted personal data of more than 2,000 Canadian Eshop customers. Fortunately, the company claims that passwords taken were encrypted and no credit card details were lost, but this is still worrisome nevertheless. Right now, the Eshop service has been taken off line — for the sake of Sir Howard and his Japanese chums, let’s just hope that this will be the last Sony breach we hear about.

[Thanks to everyone who sent this in]

Sony Ericsson’s Canadian online store hacked, more than 2,000 customers’ data taken originally appeared on Engadget on Wed, 25 May 2011 03:14:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceThe Star, BBC  | Email this | Comments

New CyanogenMod lets you rule Android app permissions with an iron fist

We’ve recently seen Google crack down on rogue apps and patch some server-side security issues, but let’s not forget Android does have a small measure of built-in security: app permissions. But as with those pesky EULAs, many users tend to breeze through the permissions screen. And Android forces even the most attentive readers to accept or deny all permissions requested by an app. But the newest nightly builds of the CyanogenMod custom ROM include a clever patch allowing users to grant and revoke permissions individually — something like the TISSA security manager we’re still awaiting. Obviously playing God with permissions can crash your applications: with great power comes great responsibility. But we figure if you’re running aftermarket firmware on a rooted phone, you’re comfortable experimenting. See how it works in the video after the break, then hit the source link to download.

Continue reading New CyanogenMod lets you rule Android app permissions with an iron fist

Filed under: ,

New CyanogenMod lets you rule Android app permissions with an iron fist originally appeared on Engadget on Tue, 24 May 2011 13:34:00 EDT. Please see our terms for use of feeds.

Permalink Androinica  |  sourceCyanogenMod  | Email this | Comments

App Shrinks iPhone Data Usage System-Wide

Onavo runs your incoming data through a proxy server, saving bandwidth

Onavo is an app which cuts your cellphone data use drastically. Amazingly, it works in the background even on the iPhone and iPad, which sounds like some kind of impossible voodoo given Apple’s strict multitasking rules.

It turns out that the app does actually compress data, but not how you think. Once installed, it performs some tweaks to your network settings and runs all you non-Wi-Fi data through a proxy. Thus, any incoming data to Safari, Mail, Facebook, Google Maps and Twitter passes through Onavo’s servers where it is heavily compressed before being forwarded on to your iPhone.

This is similar to what Opera does when you use its iOS browser, but it works system wide.

Comments on the iTunes App Store page say that it works, with several caveats. First, images are compressed so drastically that they can pixelate, making the tiles in the Maps app hard to read, for example. Also, sometimes visual voicemail disappears, and you’ll lose the ability to tether your data connection. And of course you are running your data through a third-party server, which could give you the privacy heebie-jeebies.

Onavo is free, and although its probably not worth using at home thanks to the above problems, it could save you a lot of money when you’re on vacation with a roaming plan. What it won’t do is compress streaming video or VoIP calls, which are probably your biggest data-sinks, further limiting its utility. An Android version is coming “soon.”

Onavo product page [Onavo]
FAQ [Onavo]

See Also: