| Monday April 21st 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

‘hax’ Archives

Governments turn to hacking techniques for surveillance of citizens

Governments turn to hacking techniques for surveillance of citizens

"It's an open market. You cannot stop the flow of surveillance equipment." -- Jerry Lucas, head of the Intelligence Support Systems conference showcasing technology that corrupt regimes around the world use to spy on, and censor, their citizens. (more…)

Hackers break SSL encryption

Hackers break SSL encryption

Researchers have discovered a serious weakness in virtually all websites protected by the secure sockets layer protocol that allows attackers to silently decrypt data that's passing between a webserver and an end-user browser. The vulnerability resides in versions 1.0 and earlier of TLS, or transport layer security, the successor to the secure [...]

Xbox hack allows unsigned code

Xbox hack allows unsigned code

You may now run unsigned code on any xbox. Discovered by GliGli, the exploit requires a chip, but works on any 360: "it sends little pulses to the processor in order to destabilize the console and make it believe a modified CB is correctly hashed and signed. This operation doesn't succeed every time, but it is repeated till it works." [...]

Anon hacks Monsanto and posts 2500 employee names and contact info

Anon hacks Monsanto and posts 2500 employee names and contact info

Normal crop rotation works like this; you plan something, it grows, you harvest and then re-seed using the seeds gathered in the harvest. Monsanto managed to patent the DNA of it's genetically modified seeds, any attempt to replant using the seeds you have results in being sued by Monsanto. How do they know you replanted using their seeds? They [...]

Murdered schoolgirl was among cellphone “hacking” victims

Murdered schoolgirl was among cellphone “hacking” victims

British tabloid News of the World illegally accessed the messages left on the cellphone mailbox of missing schoolgirl Milly Dowler, then deleted them to allow more to arrive. According to The Guardian, its staff interfered with the police investigation, destroyed evidence, and gave her family the false hope of seeing their desperate pleas [...]

Hacker Typer produces code from keybashing

Hacker Typer produces code from keybashing

The Hacker Typer allows you to produce convincing code the way the movie-hackers do: simply bash at the keyboard and hey-presto, you are 1337! Hacker Typer

Fake but cool video hacking in Times Square

Looks like a guy has created a video repeater that "somehow" manages to overwhelm the inputs of any screen in the vicinity. The demo shows the inventor taking over a couple of small screens at ground level, before attaching the device to a huge red balloon and floating it up high to hax bigger screens up above. The iPhone doesn't transmit [...]

Geohot freestyles a message to Sony

Geohot (the iPhone jailbreaker) can rap! In case you hadn't heard, he moved his jailbreaking on to the Sony Playstation platform and Sony sued him. Maybe they should just sign him instead. Lyrics after the jump.... (more…)

Visualization of an attack on a VOIP server

The Australian Honeypot Project is a group of volunteers who set up tantalizing decoy targets for cyber criminals. By carefully monitoring those honeypots, the group can gather data about the tactics and tools criminals use to attack real sites and servers. This video they made turns data in pictures to show what's happening during the early [...]

Fraunhofer cracks iPhone password in 6 minutes, exposes stored passwords

"What’s the one thing that could make losing your iPhone worse? If the person who happens to find your AWOL iPhone knows exactly what they’re doing. In a two-minute video clip published by German engineering firm Fraunhofer, the company demonstrates how an iPhone’s password security can be rendered completely moot. The demonstration [...]

Kindle 3.1 Jailbreak

Kindle 3.1 Jailbreak

With Amazon Kindle firmware 3.1 released just days ago, both the jailbreak(s) and the source can be found in the link below... http://yifan.lu/p/kindle-jailbreak The jailbreak will allow you to install custom packages (hacks) such as the screensaver hack and the usbnetworking hack. It is tested and works on Kindle 3 on 3.1. It should work on [...]

Car key fob technology hacked

Car key fob technology hacked

The ubiquitous key fob is convenient and now proven to be less than secure. This Technology Review article describes researchers successfully attacking cars from eight different manufacturers. Open doors and trunks give thieves easy access for relative low cost ($50 - $100 - $1000 for the components). A car with keyless or fob enabled starting [...]

PS3 completely hacked. Security on the system is apparently the worst security ever seen.

Basically, the ps3 has a hard outer shell, but once you break through the outer layer there is absolutely nothing stopping you... (more…)

Richard Stallman: The actions against MasterCard and Amazon are not “hacking.” People are just finding a way to protest in a digital space, the internet equivalent of a mass demonstration

Richard Stallman: The actions against MasterCard and Amazon are not “hacking.” People are just finding a way to protest in a digital space, the internet equivalent of a mass demonstration

I fully expect Stallman probably has thrown out his master card visa, and paypal account, if he had any of these to begin with. In open source matters, Stallman is the the religious equivalent of an ascetic with a vow of closed source celibacy. To the extent that I doubt the man even owns a microwave. Whether or not you believe with his [...]

The push-button tool being used to shut down Visa, MasterCard, and other sites

The push-button tool being used to shut down Visa, MasterCard, and other sites

Terrific piece by Joel Johnson from Gizmodo about the software tool being used to take down MasterCard, Visa, and Sarah Palin's websites. LOIC ("Low Orbit Ion Cannon") is an application developed by 4Chan-affiliated hackers designed to--when used en masse by thousands of anonymous users--launch Distributed Denial of Service (DDoS) attacks on [...]

Bunnie explains the technical intricacies and legalities of Xbox hacking

Bunnie explains the technical intricacies and legalities of Xbox hacking

Andrew "bunnie" Huang, who literally wrote the book on hacking Xboxes, was to be a witness in last week's first-of-its-kind trial for Xbox modding. However, the government prosecutor bungled his case so badly that he was forced to withdraw the charge and walk away, leaving the defendant unscathed. However, Bunnie had already prepared an [...]

WikiLeaks: Chinese Politburo responsible for Google hacking

WikiLeaks: Chinese Politburo responsible for Google hacking

You had to know something interesting would come out of the quarter million diplomatic cables that WikiLeaks just, well, leaked late on Sunday, and the New York Times has picked out a doozie for us. As it turns out, that big brouhaha in China surrounding the hacking of Gmail accounts was actually a state-authorized attack. Such was the report from [...]

Evoting security researchers at U Michigan root DC’s voting machines with ease

Evoting security researchers at U Michigan root DC’s voting machines with ease

DC election officials put a test version of their voting system up in a mock primary and invited white hat attacks. U. Michigan broke it completely within 36 hours. DC officials reply, in a nutshell, "Well, that's why we asked people to test it." D.C. voting officials knew there might be openings in the upload procedure, said Paul Stenbjorn, [...]

Senators Don’t Expect Cyber Security Bill to Pass this Year

Senators Don’t Expect Cyber Security Bill to Pass this Year

Much of the critical infrastructures of developed nations like the U.S. depend on computer and network systems to operate and communicate. Hackers from nefarious nations and those who hack for fun can get into some of these critical systems potentially causing a security threat to the country. In an effort to give the president the power to [...]

Hacker finds iOS 4.1 bootrom vulnerability that can jailbreak all current hardware

Hacker finds iOS 4.1 bootrom vulnerability that can jailbreak all current hardware

Yesterday’s release of iOS 4.1 was good news for iPhone gamers and iPhone 3G owners who had performance issues post-4.0, but bad news for jailbreakers, with the Dev Team themselves warning users not to upgrade to 4.1 as there was no known way to reverse the baseband post-update. As usual, though, what’s true in the cat-and-mouse [...]

 Page 1 of 6  1  2  3  4  5 » ...  Last »