Military lightning gun parts sold on eBay, probably built in someone’s garage

Lightning gun parts

We’re not sure where to start with this one. It’s, in a word, unbelievable. Technologist Cody Oliver was digging through eBay for parts to build a robot car that Elon Musk could drive around Burning Man, when he came across surplus equipment from defense contractors Omnitech Robotics and Ionatron. The components were originally from the military’s Joint Improvised Explosive Device Neutralizers, or JINs — remote-controlled lightning guns designed to disable IEDs. But, the story quickly goes from interesting to terrifying. Oliver soon discovered the weapons were cobbled together largely from off-the-shelf parts, including a Linksys router with the serial numbers scraped off, and lacked even basic security. The now retired JINs were controlled over a standard 802.11 WiFi signal, with the encryption turned off — leaving the multimillion dollar devices vulnerable to insurgents. Ultimately the parts were deemed unfit for even Musk’s RC art car. You can read all of the horrifying details at the source link.

[Thanks, Chris]

[Image credit: Cody Oliver]

Military lightning gun parts sold on eBay, probably built in someone’s garage originally appeared on Engadget on Fri, 05 Aug 2011 20:34:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceWired  | Email this | Comments

Black Hat hackers demo Square card skimmer, feed it stolen credit card numbers

Square

Here’s some more fun out of Vegas, this time involving Jack Dorsey’s Square and a little thing we like to call credit card fraud. Researchers from Aperture Labs (seriously) held two demonstrations at the Black Hat Conference. The first used a script, written by Adam Laurie, to convert stolen credit card data into a series of audio tones that were then fed to the Square app via the headphone jack on a phone — removing the need to have a physical card. A second avenue of fraud, also using code authored by Laurie, turned the Square dongle into a skimmer. It intercepted incoming data, which is unencrypted, and spit out human readable numbers that could easily be used to clone a card. New hardware that encrypts information pulled from the magnetic strip is in the pipeline but, until then, it seems everyone’s favorite smartphone-based payment service has some troublesome holes to fill.

Black Hat hackers demo Square card skimmer, feed it stolen credit card numbers originally appeared on Engadget on Fri, 05 Aug 2011 17:17:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceCNET  | Email this | Comments

Microsoft offers ‘mad loot’ Bluehat prize to entice security developers (video)

Mere numbers aren’t enough to describe cash prizes for Microsoft, it seems. The firm’s inaugural Bluehat security competition’s introduction video opted for a clearer term: “mad loot, lots of it.” The big M hopes the hefty first prize of $200,000 will inspire the creation of the next generation of defensive computer security technology. The most innovative “novel runtime mitigation technology designed to prevent the exploitation of memory safety vulnerabilities” (phew!) will take home the aforesaid mad loot, while second and third places will receive $50,000 and an MSDN Universal subscription, respectively. The winner won’t be announced until Blackhat 2012, of course, and applicants have until April to submit their prototypes and technical descriptions. Hit the break for the official announcement video, complete with CG backgrounds and prize euphemisms.

Continue reading Microsoft offers ‘mad loot’ Bluehat prize to entice security developers (video)

Microsoft offers ‘mad loot’ Bluehat prize to entice security developers (video) originally appeared on Engadget on Fri, 05 Aug 2011 09:22:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceMicrosoft  | Email this | Comments

Virginia Tech Emergency Alert System Has Eight Ways of Finding You

After the 2007 massacre in which Seung Hui-Cho killed 33 people, Virginia Tech has gone to great lengths to improve its campus safety. The University’s latest system is designed to alert students and faculty whether they’re on campus or online. More »

Why Hackers Write Computer Viruses

Why do hackers hack? Why create a worm that sends out an email to everyone in your contact list, or a Trojan that deletes your term papers? Is it mischief, malice, money, or something else entirely? More »

Find My Mac Switched On for Developers

Findmymac

Find My Mac, perfect for stalkers everywhere. Picture: Mac Rumors

Apple has switched on Find My Mac, a feature from the upcoming iCloud service which lets careless or unlucky Mac owners track down their computers. Currently in beta, for testing by OS X Lion developers, Find My Mac works a lot like the iOS app Find My iPhone.

Instead of using GPS to work out where the Mac is, Lion instead uses other location info such as that from nearby Wi-Fi networks (and probably the external IP address, too). Once the Mac-less user has logged in to Find My Mac on the iCloud Web site, he can see his computer’s location on a map, send a message to it, lock the computer’s screen from afar, and even perform a remote wipe of the hard drive. This last, combined with Lion’s new full-disk encryption, makes for some powerful security.

When enabled, users will also be able to track their lost or stolen Macs from the comfort of their iPhone or iPad using the Find My iPhone app.

The service should go live for everyone as soon as iCloud is released in September. Until then, try not to get too drunk when you take your brand new MacBook out with you for the night. Yes, I’m looking at you, Cult of Mac’s John Brownlee.

Find My Mac Goes Live For Developers [Mac Rumors]

See Also:


Google search opens SCADA systems to doomsday scenarios

Google, the service so great it became a verb, can now add security risk to its roster of unintended results. The search site played inadvertent host to remotely accessed Supervisory Control and Data Acquisition (SCADA) systems in a Black Hat conference demo led by FusionX’s Tom Parker. The security company CTO walked attendees through the steps required to gain control of worldwide utility infrastructure — power plants, for one — but stopped short of actually engaging the vulnerable networks. Using a string of code, unique to a Programmable Logic Controller (the computers behind amusement park rides and assembly lines) Parker was able to pull up a water treatment facility’s RTU pump, and even found its disaster-welcoming “1234” password — all through a Google search. Shaking your head in disbelief? We agree, but Parker reassured the crowd these types of outside attacks require a substantial amount of effort and coordination, and “would be extremely challenging to pull off.” Panic attack worn off yet? Good, now redirect those fears to the imminent day of robot-helmed reckoning.

Google search opens SCADA systems to doomsday scenarios originally appeared on Engadget on Thu, 04 Aug 2011 05:26:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceCNET  | Email this | Comments

Portable device can sniff out anthrax in an hour, won’t bring the noise

Got some mysterious white powder sitting on your coffee table? A new, suitcase-sized device can tell you whether you’ve got dandruff, or anthrax. Developed by researchers at Cornell and the University of Albany, the detector uses a microfluidic chip (pictured on the left) to collect and purify the DNA on a given sample, before conducting a series of polymerase chain reactions — processes that can quickly identify biological materials. The machine, which has been in the works for seven years, is powerful enough to deliver test results in just one hour (requiring a sample of only 40 microscopic spores), but is slim enough to fit in an airline’s overhead luggage bin. Scientists say their creation could also be catered to pick up on other pathogens, including salmonella, and may even pay dividends for crime scene investigators handling forensic evidence. No word yet on when the device could hit the market, but we won’t touch an ounce of sugar until it does.

Portable device can sniff out anthrax in an hour, won’t bring the noise originally appeared on Engadget on Tue, 02 Aug 2011 14:05:00 EDT. Please see our terms for use of feeds.

Permalink PhysOrg  |  sourceCornell University  | Email this | Comments

New Android trojan can record phone calls, expose your embarrassing fantasy baseball talk

Malware PermissionsMobile malware is nothing new, especially for Android users who have trained themselves to navigate the sometimes shady back alleys of the Market. The fine folks at CA Technologies came across an interesting new trojan though, that does something slightly more unnerving than max out your credit cards — it records your conversations. There’s no evidence that this has actually found its way into the wild yet, but it’s entirely possible that some nefarious developer could capture your calls and upload them to a remote server. Obviously, this wouldn’t hold much interest for your traditional cyber crook, but suspicious significant others and corporate spies could have a field day with such capabilities. All we can do is suggest you remain vigilant and maintain a healthy dose of paranoia about any apps on your phone.

New Android trojan can record phone calls, expose your embarrassing fantasy baseball talk originally appeared on Engadget on Tue, 02 Aug 2011 11:41:00 EDT. Please see our terms for use of feeds.

Permalink Pocket Now  |  sourceCA Technologies  | Email this | Comments

Visidon AppLock for Android: Pretend You Work for the CIA and Unlock Apps with Your Face

I’ve always wanted a job that gave me a super high security clearance that required facial scans to make sure it’s me. Sadly, I’ll probably never be that important. INSTEAD, I’ll make myself feel important by programming my phone to unlock by scanning my freaking face. More »