hacking

AirCast Chromecast “any video” app released by Koush in Beta

AirCast Chromecast “any video” app released by Koush in Beta

Earlier this year Google's Chromcast device became (rather quickly) one of their biggest hardware hits, selling out not long after it was first put on sale. Almost as quickly, developer Koushik Dutta began work on prospective apps for the device, aiming to expand the functionality of the miniature HDMI-friendly dongle to allow more than Google's own services and a handful of 3rd party apps. Here Koush releases the beta of the first of a set of apps: AirCast - able to play any video to Chromecast.

Continue Reading

Syrian Electronic Army leader discusses Twitter hacks in interview

Syrian Electronic Army leader discusses Twitter hacks in interview

The Syrian Electronic Army has claimed responsibility for numerous Twitter hacks, most of which have proved more annoying than anything else. The hacking collective has stated its intentions in different ways through various tweets over the course of many hacks, but now has done so in a bit more direct way. The self-designated leader of the collective has discussed the group in an interview with The Daily Beast.

Continue Reading

Chromecast CyanogenMod tweak enables media streaming from any app

Chromecast CyanogenMod tweak enables media streaming from any app

If you've gotten the chance to play around with the Chromecast yet, then you'll know that streaming options are very limited, with only support for Netflix, YouTube, and Google Play. However, while we wait for more streaming services to add support for the Chromecast, CyangoenMod developer Koushik Dutta has a temporary fix, following up with a similar update he posted a couple days ago.

Continue Reading

NVIDIA SHIELD open source software release calls out walled garden competition

NVIDIA SHIELD open source software release calls out walled garden competition

As spoken of early on in the initial announcements of NVIDIA's gaming handheld SHIELD, the company has made good on their promise to allow full software modification and hacking with the release of open source downloads this week. What this actually means is that NVIDIA is making it rather easy for the development community as well as the hacker community (which to be fair, for Android, are often one in the same) to do their thing.

Continue Reading

Japanese “Satis” Smart Toilet warned hacker-vulnerable

Japanese “Satis” Smart Toilet warned hacker-vulnerable

While we're far from a fully smart toilet populated public here in 2013, signs of an unprecedented hacker attack have surfaced this week. The Japan-based My Satis toilet has received its very own security warning by the folks at Trustwave SpiderLabs due to its vulnerability in hard-coded Bluetooth PIN usability. Once you've got that code, you're apparently able to go toilet-wild!

Continue Reading

Crysis creators Crytek homepages hacked, users asked to change logins

Crysis creators Crytek homepages hacked, users asked to change logins

The development team behind the Crysis game family Crytek have suffered what appears to be a malicious attack - or at least "suspicious activity" - in the servers of several of their hero title websites. The developers from Crytek have taken down Crytek.com, Mycryengine.com, Crydev.net, and MyCrysis.com, making sure to mention that GFACE.com, Crysis.com, and Warface.com have been unaffected.

Continue Reading

Tor browser malware appears loaded by FBI to identify users

Tor browser malware appears loaded by FBI to identify users

This week the folks out there looking to be entirely anonymous (not to be mistaken for the Anonymous hacker collective) have been greeted by a message through the Tor web browser. Tor is a fork of Firefox - based in Firefox's code, recreated as a web browser here to allow entirely anonymous web browsing. According to reports, the malware in question exploits a bug present in Firefox 17 ESR, the same build on which Tor is based, allowing - through "Freedom Hosting" webpages specifically - a payload to be delivered which ultimately sends the location of the user to a 3rd party.

Continue Reading

Chinese hackers fall for decoy water plant, inadvertently confirm motives

Chinese hackers fall for decoy water plant, inadvertently confirm motives

The Chinese hacking collective known as APT1 has long been suspected of working with China's army, and as such has garnered its fair share of attention from the powers-that-be. Back in February, the hackers inadvertently revealed the extent of their intentions, doing so by falling for a "honeypot" - one of several decoy water plants. Though their methods were said to be low in sophistication, one Trend Micro researcher says there was no doubting their intentions.

Continue Reading