Wireless presentation controllers prove juicy targets for hackers

Wireless presentation controllers prove juicy targets for hackers

Wireless presentation controllers have changed corporate life forever. Instead of businessmen and women staying tethered to their keyboards while delivering boring PowerPoint presentations, they can wander about the room, gesticulating authoritatively with an ego-boosting gadget in-hand… while delivering that same boring presentation. Now a security researcher by the name of Nields Teusink is showing that those wild gesticulations open the door to crazy hacks, with most wireless presenters being recognized as full keyboards — some even as keyboards and mice. With no encryption provided it’s a (reasonably) simple task for an attacker to replicate the signal, escape the presentation, and completely compromise the machine. Teusink uses an Arduino board for his work here, impressing us while sending a chill into the hearts of slide gurus everywhere.

Wireless presentation controllers prove juicy targets for hackers originally appeared on Engadget on Tue, 06 Jul 2010 07:38:00 EDT. Please see our terms for use of feeds.

Permalink Slashdot  |  sourceblog.teusink.net  | Email this | Comments

Researchers say any USB peripheral could steal your data, even a coffee-cup warmer

USB cup warmerSo you’ve got a nice secure thumbdrive, but did you ever think to lock its port? Engineers at the Royal Military College of Canada say the plug and play functionality built into most computers automatically trusts whatever’s plugged into the USB slot. That doesn’t just go for flash drives left out on the street, but all manner of other peripherals as well, as the trio of triumphant researchers demonstrated when they (presumably) infiltrated colleagues’ offices with a totally sweet spy keyboard. That particular device flashed an LED or made the mark’s sound card warble to covertly transmit stolen data, but such exotic methods are reportedly not required — so you’ve yet another reason to cringe when your coworker trots out his Humping Dog.

Researchers say any USB peripheral could steal your data, even a coffee-cup warmer originally appeared on Engadget on Mon, 05 Jul 2010 05:09:00 EDT. Please see our terms for use of feeds.

Permalink Switched  |  sourceNew Scientist  | Email this | Comments

Scottevest’s Carry-On Coat houses all of your portable electronics, stolen hotel shampoo bottles

Truth be told, it’s been awhile since we’ve seen a gadget-laced jacket that really caught our eye. There’s the occasional winter coat with a built-in iPod slot, and there’s a few unaffordable threads that don’t much matter to the vast majority of you, but it’s difficult to think of a single overcoat that’s as connected as this. Teased by Scottevest, the forthcoming Carry-On-Jacket is as functional as it is delightful, with an internal pocket made specifically for touchscreen devices so you’ll never even have to reach inside to skip tracks. There’s also an internal Personal Area Network (PAN), a dedicated BlackBerry (or any smartphone, really) holder, passport pouch, a digital camera compartment, iPad pocket (er, “PadPocket”) and a separate area made specifically for those zip-locked liquids that you’ll need easy access to at the TSA screening zone. Needless to say, the avid traveler with a pinch of geek lust should be grinning from ear-to-ear just gazing at this masterpiece, and honestly, we could see this converting even the hardest of hardcore Rollaboard warriors. Now all we need is a price and release date, STAT.

Scottevest’s Carry-On Coat houses all of your portable electronics, stolen hotel shampoo bottles originally appeared on Engadget on Sun, 04 Jul 2010 08:58:00 EDT. Please see our terms for use of feeds.

Permalink Gadling  |  sourceScottevest  | Email this | Comments

Should UK Police Use GPS-Equipped ‘Bait-Bikes’ to Catch Thieves?

British police are using poorly-locked or even unlocked “bait-bikes” to catch thieves. The bikes are loaded with hidden GPS tracking devices so the cops can simply wait for the stolen ride to end up at its final destination, letting them bust Mr. Big instead of just constantly pruning the teen-gangs and junkies that do the actual stealing.

According to test schemes, it works. After Cambridge police used bait-bikes, theft at a local railway station fell by 45%, reports the Guardian. The same article tells us that even in London, theft fell by 30%.

Bike theft is driven by the market. Recently I spoke to a bike polo player from Amsterdam, and he told me that people will buy two bikes for around €10 each if they lose their own bike, just so they have a spare. He knew that this was fueling the problem, but the alternative is to buy a brand new bike and have that stolen instead.

To me, the bait-bikes sound like a great idea. Not only do they allow the cops to catch the organized gangs behind the crimes, they sow paranoia amongst the foot-soldiers, making all bikes a less attractive target.

Inevitably, though, there is opposition. Some cite “entrapment” (not illegal in the UK, it seems), and others complain of false positives, as in the case of a drunken student who rode an unlocked bike home and then got a visit from the police (he was let off). These are technical issues, which will vary from country to country. I’m more interested in what you think. I know we have a lot of cyclists reading Gadget Lab, so let us know your opinions in the comments. Is it morally wrong to use bait-bikes? Or is anything acceptable if it stops people from stealing our rides?

Sure, we’ll never reach a lock-free utopia where we can just leave our bikes out in the street overnight, propped naked against a wall (unless we move to Canada), but it would be nice not to have to wrap the bike in twice its weight in chains and hardened-steel shackles just to stop off for a six-pack.

Bait bikes: the way to beat theft gangs or entrapment? [Guardian]

Photo: gen gibson/Flickr


Why Are You Pointing Your Car Remote at Me?

RemoteCam.jpgPretty sneaky. The latest offering from Swann Security is the RemoteCam, a video camera cleverly designed to look like a car’s keychain remote. Use it to take videos or still shots.

The RemoteCam captures AVI videos and JPEG photos at the press of a button. It comes with a 2GB microSD card, which you can use to record up to 25 minutes of video. If you need more time, expand that with an 8GB card.

The device can last for up to 60 minutes on a charge, and it comes with a USB cable for both charging and transferring footage. You can get one for $99.99.

Google Flips Remote Kill-Switch on Android Apps

In a blog post, Google has described how it remotely removed two safe but “practically useless” applications from Android phones. The two free applications billed themselves as being for “security research” but because they “misrepresented their purpose in order to encourage user downloads”, the Android team nuked them from afar using its remote kill-switch, removing them from connected users’ phones.

The post on the Android Developers blog is written by Android Security Lead Rich Cannings. Cannings cites violations of the Android Market Terms of Service as the reasons behind the deletions. Far from being controversial, these terms were clearly stated as far back as October 2008, and only apply to apps from the Android Market itself. Back then I predicted the fuss that would come about if ever the switch was used in public:

If Google gets serious about throwing the kill switch for apps which violate the agreement, there is likely to be a fuss, from the technology blog world at least.

This isn’t the first time Google has wiped apps from users’ phones, although its the first we remember that has an accompanying blog post. While it is reassuring to know that Google is patrolling its App Store, its a little disturbing to know that your favorite, non-malicious app could disappear without your permission. In this case Apple – ironically – wins, for users at least. Remember Netshare, the iPhone data tethering app that briefly made it into the App Store? It was soon pulled by Apple, presumably at AT&T’s request, but those people who downloaded it continue to use it to this day.

Exercising Our Remote Application Removal Feature [Google / Android Developers Blog]

See Also:

Photo: laihiu/Flickr


Droid Incredible saves browser screenshots to internal memory, turns into a privacy nightmare?


June must be the month when privacy issues leave their hibernation and return to trouble our fragile minds. First we had Flash going loco, then AT&T’s airwaves exploded with iPad users’ email addresses, iPhone 4 pre-orders started sending people to the wrong account, and now this. Boy Genius Report has come across a rather worrying “feature” of the HTC Sense bookmarking widget on the Incredible, which takes sporadic screenshots of your browsing sessions. That wouldn’t be so bothersome in itself, but try to remove said pictures, and you find where the problem lies. Ending the browsing session, deleting your history, and even a full reset to factory settings failed to eviscerate the indiscreet imagery. You have to manually discover their location and delete them by hand. Considering the high likelihood of Incredibles being sold and resold for years to come, this could turn the phone into a little cache of treasure for the proactive identity thief. And since it’s a Sense issue, it might be affecting other HTC handsets as well. Wunderbar.

Droid Incredible saves browser screenshots to internal memory, turns into a privacy nightmare? originally appeared on Engadget on Thu, 17 Jun 2010 03:22:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceBoy Genius Report  | Email this | Comments

AT&T hacker’s home raided, drugs found, dude detained (update)

Man, one day you have the whole world’s ear to talk about slack network security, and the next you’re in the joint. Andrew Auernheimer, Goatse Security’s hacker-in-chief and a key player in the unearthing of a major security flaw exposing iPads surfing AT&T’s airwaves, is today facing felony charges for possession of a variety of potent drugs. That wouldn’t be such intriguing news by itself, but the discovery was made by local law enforcers who were in the process of executing an FBI search warrant. Hey, wasn’t the FBI going to look into this security breach? Yes indeedy. While nobody is yet willing to identify the reasons behind this warrant, it’s not illogical to surmise that Andrew’s crew and their online exploits were the cause for the raid. So there you have it folks, it’s the first bit of advice any publicist will give you: if you’re gonna step out into the glaring light of public life, you’d better clean out your closet first.

Update: Before y’all get in an uproar about “white hacker this” and “Police State that,” let’s keep in mind that this Andrew Auernheimer character (a.k.a. “Weev”) is one unsavory dude (not to mention a raving anti-Semite): check out this New York Times piece on Internet Trolls if you don’t believe us. After all, it’s not really a stretch that law enforcement might be after someone who’s in possession of ecstasy, cocaine, LSD, and various other pharmaceuticals.

AT&T hacker’s home raided, drugs found, dude detained (update) originally appeared on Engadget on Wed, 16 Jun 2010 06:34:00 EDT. Please see our terms for use of feeds.

Permalink CNET  |  sourceWashington County Sheriff’s Office  | Email this | Comments

iPad still has a major browser vulnerability, says group behind AT&T security breach

You know that tiny little security snafu that allowed over a hundred thousand iPad users’ email addresses out? The one that the FBI felt compelled to investigate? Well, Goatse Security — the group that discovered that particular hole (stop laughing) — isn’t best pleased to be described as malicious by AT&T’s response to the matter, and has requited with its own missive to the world. Letting us know that the breach in question took “a single hour of labor,” the GS crew argues that AT&T is glossing over the fact it neglected to address the threat promptly and is using the hackers’ (supposedly altruistic) efforts at identifying bugs as a scapegoat.

As illustration, they remind us that the iPad is still wide open to hijacking thanks to a bug in the mobile version of Safari. Identified back in March, this exploit allows hackers to jack in via unprotected ports, and although it was fixed on the desktop that same month, the mobile browser remains delicately poised for a backdoor entry — should malevolent forces decide to utilize it. This casts quite the unfavorable light on Apple as well, with both corporations seemingly failing to communicate problematic news with their users in a timely manner.

iPad still has a major browser vulnerability, says group behind AT&T security breach originally appeared on Engadget on Tue, 15 Jun 2010 05:43:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceCNN  | Email this | Comments

IPhone Leash Prevents Dropped Calls

Of course, a retractable wire restraint won’t actually help the iPhone play any nicer with AT&T’s beleaguered network, but it will stop the screen of your iPhone (or any other phone, despite the name) from ending up like a crystalline spiderweb after hitting the floor.

The extremely dorky process goes like this: You stick an adhesive pad onto the back of the phone, which adds a plastic loop. This loop then connects to the painful-sounding “split ring connector” and that in turn hooks onto a 30-inch steel cable.

The cable retracts into the belt-clip, just like a metal tape measure swishing back into its case, and the clip is held on by a locking carabiner. If there is a nerdier accessory in all the world I want to see it.

The leash will not only keep you phone from fatal impacts; it will also stop you from dropping it in water (something that Wired Science editor Betsy Mason might find useful to stop her dumping yet another iPhone in the toilet) and helps to prevent theft. Or not: a cable running into your pocket means one thing to a thief, and that’s that you have something valuable in there.

It gets a whole lot less ridiculous if you use this to secure your phone whilst inside a bag, but for those who insist on wearing their dorkiness on their belts, an optional extra can make you look even sillier. The Designer Label puts “a crystal clear polyurethane dome” over the design or photo of your choice, mimicking those old-fashioned key-fobs.

The iPhone Leash will cost $25 in money. In cost to your street-cred, its price cannot be overestimated.

iPhone Leash [My Phone Leash. Thanks, Daniel!]