Two arrested for iPad security breach

Two arrests have been made connected to the security breach that exposed thousands of iPad users’ email addresses and other info last year. Daniel Spitler and Andrew Auernheimer (yeah, that guy again) have been taken into custody and charged with conspiracy to access a computer without authorization and fraud, for allegedly using a custom script (built by Spitler) called iPad 3G Account Slurper to access AT&T’s servers, mimic an iPad 3G, and try out random ICC identifiers. Once a valid ICC was found, one could harvest the user’s name and email address. Of course, the hackers maintain that this was all done to force AT&T to close a major security flaw, and we’ll be interested to see what exactly the company does to make things right.

Two arrested for iPad security breach originally appeared on Engadget on Tue, 18 Jan 2011 14:07:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceWall Street Journal  | Email this | Comments

AIRPrint performs ranged fingerprint scanning, won’t let the terrorists win

While ears may be the new biometric du jour, Advanced Optical Systems (AOS) is doing its best to keep fingerprints as the preferred method for identifying enemies of the state. The company has built a fingerprint scanner with the ability to accurately read a print up to two meters away, and our military views the system as a means to reduce the risk to soldiers at security checkpoints all over the world. The AIRPrint system is a significant upgrade over previous biometric security systems because it allows a person’s identity to be confirmed by military personnel from behind the safety of a blast wall or armored vehicle, which keeps our serviceman out of harm’s way. AIRPrint uses a source of polarized light and two 1.3 megapixel cameras (one to receive vertically polarized light and another to receive horizontally polarized light) in order to produce an accurate fingerprint. The prototype is able to scan and verify a print in under five seconds, but the device can presently only process one finger at a time, and that finger must stay a fixed distance from the cameras to get a precise reading. Despite these current limitations, AOS claims that soon the equipment will be capable of reading five prints simultaneously while a person is moving toward or away from the device. The system will be ready for market in the third quarter of this year, which is bad news for terrorists and soccer hooligans, but a windfall for Big Brother.

AIRPrint performs ranged fingerprint scanning, won’t let the terrorists win originally appeared on Engadget on Tue, 18 Jan 2011 07:12:00 EDT. Please see our terms for use of feeds.

Permalink Technology Review  |  sourceAdvanced Optical Systems  | Email this | Comments

Research shocker! Keyless car entry systems can be hacked easily, elegantly

We know you are vigilant enough not to trust your car’s security to a wireless system, but plenty of other folks like the convenience of putting away the metallic keys and getting into their vehicles with a bit of Bond-like swagger. Professor Srdjan Capkun of ETH Zurich found himself perched on the fence between these two groups when he recently purchased a vehicle with a keyless entry system, so he did what any good researcher would: he tried to bypass its security measures. In total, he and his team tested 10 models from eight car makers and their results were pretty conclusive: each of the tested vehicles was broken into and driven away using a very simple and elegant method. Keyless entry systems typically work by sending a low-powered signal from the car to your key fob, with the two working only when they’re near each other, but the wily Zurich profs were able to intercept and extend that signal via antennas acting as repeaters, resulting in your key activating your car even when it’s nowhere near it. The signal-repeating antennae have to be pretty close to both the key and the car, but that’s why heist movies stress the importance of teamwork. Hit the source link for all the chilling details.

Research shocker! Keyless car entry systems can be hacked easily, elegantly originally appeared on Engadget on Sun, 16 Jan 2011 19:07:00 EDT. Please see our terms for use of feeds.

Permalink CNET  |  sourceMIT Technology Review  | Email this | Comments

US opts to derez virtual fence along Mexico border, replacing it with more affordable measures

Remember that hugely ambitious “virtual fence” that the US Homeland Security department was so keen on blowing a few billion dollars on? Well, following a bunch of setbacks and delays in its development, it’s now been determined to be too darn expensive and is being scrapped. That’s not without splashing some cash, however, as it’s estimated that a billion dollars has already been spent on installing sensor towers along a 53-mile stretch of the Arizona border with Mexico. The plan now is to redirect funds to more conventional (and commercially available) surveillance measures, such as thermal imaging and unmanned aerial drones, which is estimated to cost $750 million to cover the remaining 323 miles of Arizona’s border. Whatever happens, keeping illegal immigration and contraband smuggling to a minimum isn’t going to be a cheap task. Almost makes you wonder if this isn’t a problem better solved by non-technological means.

US opts to derez virtual fence along Mexico border, replacing it with more affordable measures originally appeared on Engadget on Sat, 15 Jan 2011 23:59:00 EDT. Please see our terms for use of feeds.

Permalink Slashdot  |  sourceReuters  | Email this | Comments

CyberDefender Promises to Protect Against STDs

cyberdefender_ logo.gif

What’s the point of working at a security software company if you can’t laugh at yourself, right? I have to admit, I was a bit thrown by CyberDefender’s latest campaign–that’s what I get for skimming my e-mails… The company promises to protected against STDs–just in time for Valentine’s Day.

Turns out that “STD” is security software guy slang for a “search transmitted diseases.” Naturally, the company is taking the joke to its logical conclusion. “These unprotected searches can result in infection by viruses or malware and lost data. We’ve all been there (and are equally ashamed to admit it!).”

Ew. Well, anything to avoid that painful burning sensation when I download….

NZXT Bunker keeps your USB peripherals secure, even at dodgy LAN parties

So, here’s the situation: you roll into a LAN party in a less-than-ideal section of town. The lights are dim, the bouncer looks suspect, and Mike Tyson’s tiger is situated there in the rear of the room. Even the Ethernet cables are grimy. Everyone’s got their eyes on you and your new Alienware, and that stash of Razer peripherals just feels ripe for the taking. You aren’t about to make a beeline back to your Daewoo, so you wrap each and every USB cable around your right arm just to make sure you go home with everything you came with. Sadly enough, that’s not exactly an awesome way to trample your nearby enemies, but it seems that NZXT has a delightful solution. The company’s new Bunker USB Locking Drive is designed to fit within a spare 5.25-inch slot in whatever tower you own, offering a foursome of USB 2.0 sockets and a potent, daunting locking mechanism. The idea here is that your webcam, mouse, keyboard and USB headset can be plugged in, and you can keep your mind at ease that nothing is going anywhere when you waltz over to the restroom. Unfortunately, critics over at Overclocks Online noticed that the shallow depth prevented all but the smallest of flash drives from fitting in, further proving that this thing is designed specifically for use with PC peripherals. Hit the links below to learn more, and get ready to shell out $24.99 come March if it’s something you’re into.

Continue reading NZXT Bunker keeps your USB peripherals secure, even at dodgy LAN parties

NZXT Bunker keeps your USB peripherals secure, even at dodgy LAN parties originally appeared on Engadget on Thu, 13 Jan 2011 09:49:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceNZXT  | Email this | Comments

GVI Security Launches VideoPlus Line of Security Cams

vp_top.jpg

Keep an eye out, even when you can’t be there. GVI Security has just announced its new line of VideoPlus analog CCTV products, designed to offer fully-featured performance at a lower price. The new line includes a complete family of cameras and DVRs, including box, dome, bullet, and PTZ cameras. It also offers professional monitors.

While the rest of the world has gone digital, it seems that a lot of the video security market is still analog. Joe Restivo, the COO for GVI Security, says that 60 percent of the market is still using analog products and that the market is growing. This line will helps those users continue to grow their systems. The line will be available in the first quarter of this year, and will include the company’s “epic” five-year warranty and 120-day money back guarantee.

Android Trojan Discovered, Sounds Terrifying

Android Meet Android.jpg

Android owners–be afraid. A new botnet-lke bit of malware for Google’s open mobile OS has been discovered in China–and it ain’t pretty. The Trojan, named “Geinimi,” has been called “the most sophisticated Android malware we’ve seen to date” by security firm Lookup.

According to the firm, Geinimi can “receive commands from a remote server that allow the owner of that server to control the phone.” The malicious little bit of software sneaks onto phones by being “grafted” on to games and other non-malicious mobile apps.

“The affected applications request extensive permissions over and above the set that is requested by their legitimate original versions,” says Lookup. “Though the intent of this Trojan isn’t entirely clear, the possibilities for intent range from a malicious ad-network to an attempt to create an Android botnet.”

Lookup recommends that users download from trusted app stores, check permission requests on apps, monitor suspicious activity on their handsets, and download a mobile security app to help avoid the wrath of Geinimi.

Million-Volt Zap Cane Is Like Real-World Lightsaber

Owning the Zap Cane is about as close as you’ll ever get to being Yoda, combining walking-stick and Lightsaber into one ugly but effective package. The cane is adjustable between 32 and 36-inches (still too high for Dagobah’s favorite Jedi master) for when you’re hobbling around, trying to teach that lazy, whining Skywalker kid to do some work, and it has a flashlight built in to cut through swampy mists.

But what if you need to battle Count Dooku (or, more likely, that hoodie-wearing ne’er-do-well) following down a dark street)? Then you brandish your Zap Cane, jab the mugger with the tip and fire. A one-million volt charge will be dumped into his surprised body, dropping him like Darth dropped Ben in the first movie. As the product blurb joyously says, “They’ll think it is just a cane until it is too late!”

The Zap Cane isn’t available everywhere, If you live in HI, MA, MI, NJ, NY, RI, WI or PA you’ll be glad to know that the grumpy old man harassing you in the line at the store can’t suddenly turn nasty. For everyone else, the cane will cost around $103.

ZAP Cane With Flashlight [Budk via Oh Gizmo]

See Also:


Researchers eavesdrop on encrypted GSM call: all you need is a $15 phone and 180 seconds

It’s hardly a fresh idea — researchers have claimed that GSM calls could be cracked and listened in on for years. But there’s a difference between being able to do something with a $50,000 machine and a warrant, and being able to do the same thing with a few $15 Motorola phones, a laptop, open source software and 180 seconds of spare time. Security Research Labs researcher Karsten Nohl and OsmocomBB project programmer Sylvain Munaut recently spoke about a new GSM hack at the Chaos Communication Conference in Berlin, and they were able to walk the audience through the eavesdropping process in a matter of minutes. According to them, it’s not terribly difficult to use a $15 handset to “sniff out” location data used to correctly route calls and texts, and once you’ve nailed that down, you could use modified firmware to feed raw data into a laptop for decryption. Using a 2TB table of precomputed encryption keys, a cracking program was able to break in within 20 seconds — after that, you’re just moments away from recording a live GSM call between two phones. Of course, speeches like these are made to encourage security officials to beef up the layers between you and ill-willed individuals, but it’s hard to say what (if anything) will change. For now, we’d recommend just flying to each and every person you’d like to speak with. Unless you live in the Greater New York area — you’re probably better off risking a hacked conversation than heading out to LGA / JFK / EWR.

Researchers eavesdrop on encrypted GSM call: all you need is a $15 phone and 180 seconds originally appeared on Engadget on Wed, 29 Dec 2010 09:17:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceWired  | Email this | Comments