Xfinity Home Security makes home monitoring and management Comcastic (video)

It looks like Comcast’s trial bubble has been something of a success, and now the company is announcing that its Xfinity Home Security Service will be branching out beyond Houston to arm alarms, dim lamps and keep home automation freaks appraised of sports scores in an additional six markets (including Philadelphia, Portland, Jacksonville, Sarasota/Naples, Chattanooga and Nashville). Powered by iControl Networks’ Open Home automation and security platform, packages start at $40 a month and feature live video monitoring, lighting and climate control, burglar and fire alarm monitoring, and more — via touchscreen interface, web portal, and iPhone app. Now you too can put your family’s safety in the same hands that bring Gilligan’s Island into your home! Video, PR-palooza after the break.

Continue reading Xfinity Home Security makes home monitoring and management Comcastic (video)

Xfinity Home Security makes home monitoring and management Comcastic (video) originally appeared on Engadget on Thu, 09 Jun 2011 18:01:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceComcast  | Email this | Comments

Sony Pictures breach affects 37,500 users, far less than Lulz Security claimed

LulzSec

Well, Lulz Sec may have overstated its level of success by declaring it had stolen 1,000,000 passwords from Sony Pictures — turns out the number is closer to 37,500. Now granted, any breach of user data is unacceptable, but when a hacker collective’s haul is less than four percent of what it claimed, everyone can breathe a little easier. The troublemakers may have made off with email addresses, phone numbers, and passwords, but Sony says no credit card or social security numbers were compromised. The company issued a statement, which you’ll find after the break, and is working with the FBI to track down those responsible. Hopefully this finally closes the door on Sony’s security woes, and we can go back to bringing you stories about Angry Birds ports and Kinect hacks.

Continue reading Sony Pictures breach affects 37,500 users, far less than Lulz Security claimed

Sony Pictures breach affects 37,500 users, far less than Lulz Security claimed originally appeared on Engadget on Thu, 09 Jun 2011 02:39:00 EDT. Please see our terms for use of feeds.

Permalink   |   | Email this | Comments

IATA’s Checkpoint of the Future uses biometric IDs to separate do-gooders from terrorists (video)

This, ladies and gentlemen, could be your Checkpoint of the Future — a new airport security prototype that promises to move away “from a system that looks for bad objects, to one that can find bad people.” Unveiled at the IATA’s annual conference in Singapore yesterday, the setup is comprised of three, 20-foot long detectors — one for “known travelers,” one for high-risk flyers, and one for everyone else. Instead of funneling passengers through the same checkpoint, then, the prototype would use eye scanners and biometric chips to verify their identities and analyze their personal history, before dividing them into groups. People who complete and pass government background checks would waltz through the fast pass lane with their carry-on luggage in tow, whereas those deemed particularly risky would have to undergo a more intensive, full-body scan within the “Enhanced” security lane. The rest of us, meanwhile, would be directed to the “Normal” detector, which would automatically scan us for liquids, metals and everything that is evil. The IATA says this risk-based approach would reduce security lines and lower airport costs, but it would still require governments to share data on their own citizens, which could pose a major hurdle to widespread adoption. For now, the IATA and governmental agencies are still hammering away at the details and have yet to announce a pilot program, but you can check out an audio-less demo video of the prototype, after the break.

Continue reading IATA’s Checkpoint of the Future uses biometric IDs to separate do-gooders from terrorists (video)

IATA’s Checkpoint of the Future uses biometric IDs to separate do-gooders from terrorists (video) originally appeared on Engadget on Wed, 08 Jun 2011 09:59:00 EDT. Please see our terms for use of feeds.

Permalink AP / Yahoo! Finance  |   | Email this | Comments

GPS stations trace nuclear explosions, summon end to underground mushroom clouds?

A team of researchers recently revealed findings that could turn GPS stations into tools for detecting illegal nuclear explosions. According to a report, being presented to the Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO) this week, the group found that nearby GPS stations showed a change in ionospheric electron density, following a 2009 nuclear test performed by North Korea. That discovery led to the realization that the same technology we use to track everything from dogs to children can more accurately detect nuclear explosions — even when they take place underground. By measuring the time it takes for a resulting shockwave to reach and affect surrounding stations, researchers can accurately determine the origin of the blast. The team is currently seeking funding to further its explosive (sorry, we had to) research.

GPS stations trace nuclear explosions, summon end to underground mushroom clouds? originally appeared on Engadget on Wed, 08 Jun 2011 06:22:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceOhio State University  | Email this | Comments

How to Upgrade to iOS 5 Today, Without Any Developer Account

One day and iOS 5 has been hacked already. Gizmodo reader and Apple lover Mert Erdir has discovered how to upgrade to iOS 5 without developer accounts, using a simple backdoor. Everyone can do it following these extremely simple instructions: More »

RSA offering SecurID replacements following Lockheed Martin attack

We’d already had a pretty clear indication that information obtained in the massive RSA hack back in March was used in the attack on Lockheed Martin last month, and RSA has now confirmed that itself for the first time. What’s more, Executive Chairman Art Coviello has also announced that the company is willing to provide security monitoring services to those concerned, and even replace existing SecurIDs free of charge for “virtually every customer” it has. Considering that millions of the tokens are now in use, that could add up to quite the bill. Not surprisingly, however, he isn’t divulging many more details about the attack itself, noting only that the attacker’s “most likely motive” was to use the information to “target defense secrets and related IP, rather than financial gain.”

RSA offering SecurID replacements following Lockheed Martin attack originally appeared on Engadget on Tue, 07 Jun 2011 16:23:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceRSA  | Email this | Comments

Microsoft Wireless Desktop 2000 protects that sensitive area between your peripherals

Microsoft’s new wireless keyboard-and-mouse duo aims to thwart keystroke spies with full AES 128-bit encryption on over-the-air data — an improvement on older wireless models that have proven to be easy pickings for hacker-types. You can pick up the Wireless Desktop 2000 now for $40, but that won’t buy you protection from more common threats like Shandong phishmongers, nor will it make up for security loopholes in your other peripherals. Speaking of which, are you still using that seemingly innocent USB coffee-cup warmer?

Microsoft Wireless Desktop 2000 protects that sensitive area between your peripherals originally appeared on Engadget on Sat, 04 Jun 2011 19:04:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceMicrosoft  | Email this | Comments

PSN ‘Welcome Back’ package is here, our long global nightmare is over

Welcome Back, Please Don't Hate Us

O frabjous day! Callooh! Callay! Seriously, even a few Engadget editors are chortling in joy. PSN and Qriocity service has been restored in the Americas, Europe, and Asia and to celebrate (and soothe the seething frustration of its customers) Sony has launched its “welcome back” program. To be eligible you’ll have to have been a member before April 20th but, otherwise, it’s relatively qualifier free. Fire up the PlayStation Store and head to the “Welcome Back” tab to claim your pair of free games (you’ve got five different options on the PS3 and four on the PSP). In addition everyone gets a month of PlayStation Plus gratis and there’s a selection of “On Us” movie rentals available over the weekend. There are a few other freebies to placate the masses too, like 100 free items in PlayStation Home, while Current Plus and Music Unlimited Premium subscribers get a 60 and 30 day handout respectively. If you’ve got any burning questions yet to be answered, check out the rather lengthy FAQ at source link and enjoy! It’s not everyday that a company just throws open the flood gates on free stuff.

PSN ‘Welcome Back’ package is here, our long global nightmare is over originally appeared on Engadget on Fri, 03 Jun 2011 21:08:00 EDT. Please see our terms for use of feeds.

Permalink Joystiq  |  sourcePlayStation Blog  | Email this | Comments

Google admits sensitive email accounts have been hacked, some users knew months ago (update: US says no government accounts compromised)

The Contagio security blog posted evidence back in February of targeted attacks against government and military officials on Gmail. Today, nearly four months later, Google has finally admitted this is true: hundreds of personal accounts have been compromised by hackers it believes to be working out of Jinan, the capital of China’s Shandong province. The accounts include those of “senior U.S. government officials, Chinese political activists, officials in several Asian countries (predominantly South Korea), military personnel and journalists.” The hijackers’ aim appears to have been to spy on their targets using Google’s automatic forwarding function. But unlike the PSN fiasco, Google insists its internal systems “have not been affected.” Instead it seems the hackers used a phishing scam, possibly directing users to a spoof Gmail website before requesting their credentials. Google says its own “abuse detection systems” disrupted the campaign — but in a footnote right down at the bottom of their official blog page they also credit Contagio and user reports.

Update: And in comes China’s response, courtesy of Foreign Ministry spokesman, Hong Lei. “Allegations that the Chinese government supports hacking activities are completely unfounded and made with ulterior motives.” Ok then, that settles that.

Update 2: And the saga continues… According to an AP story published earlier today, the Obama administration has stated that the FBI is looking into allegations that hackers broke into Google’s email system, but denied that any official government accounts were compromised. A White House spokesman went on to say that government employees are free to use Gmail for personal purposes, and can not be sure who in the administration might have been affected by the attack. Let’s just hope they know how to leave the sensitive stuff at the office.

Google admits sensitive email accounts have been hacked, some users knew months ago (update: US says no government accounts compromised) originally appeared on Engadget on Thu, 02 Jun 2011 18:54:00 EDT. Please see our terms for use of feeds.

Permalink Washington Post  |  sourceGoogle  | Email this | Comments

Sony Pictures hacked by Lulz Security, 1,000,000 passwords claimed stolen

Oh, Sony — not again. We’ve just received numerous tips that Lulz Security has broken into SonyPictures.com, where it claims to have stolen the personal information of over 1,000,000 users — all stored (disgracefully) in plain text format. Lulz claims the heist was performed with a simple SQL injection — just like we saw the last time around. A portion of the group’s exploit is posted online in a RAR file, which contains over 50,000 email / password combos of unfortunate users. We’ve downloaded this file (at our own risk, mind you) and can verify these sensitive bits are now in the wild, though it remains unclear if what’s published matches reality. In addition to user information, the group has blurted out over 20,000 Sony music coupons, and the admin database (including email addresses and passwords) for BMG Belgium employees. Fresh off the heels of the PlayStation Network restoration, we’re guessing the fine folks in Sony’s IT department are now surviving solely on adrenaline shots.

[Thanks to everyone that sent this in]

Sony Pictures hacked by Lulz Security, 1,000,000 passwords claimed stolen originally appeared on Engadget on Thu, 02 Jun 2011 17:47:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceLulz Security (1), (2)  | Email this | Comments