hacking

Wii U GamePad hacked to stream PC games, NVIDIA SHIELD up next

Wii U GamePad hacked to stream PC games, NVIDIA SHIELD up next

Hackers have taken a liking to the idea of streaming games from their PC to their handheld devices over the past couple of years, this bit of interest sparked greatly by the coming of NVIDIA SHIELD. This week a couple of developers on the hacking side of the bar have shown off a bit of game streaming functionality with the Wii U GamePad. While this device was created to work with Wii U games, these fellows have successfully reverse engineered the machine to stream PC games too.

Continue Reading

NSA catalog lets agents deliver cloned hardware to targets

NSA catalog lets agents deliver cloned hardware to targets

A new examination of the seemingly bottomless well of Snowden documents describes an internal NSA catalog of dead ringers for consumer hardware that the NSA can deploy on unsuspecting targets' systems. For example, when a target orders a new hard drive, router, monitor cable, or USB plug online, the NSA can intercept the order and send a bugged clone, which the target would then install by his own volition. The catalog includes hardware by Seagate, Samsung, Cisco, Huawei, Dell and many others.

Continue Reading

Nintendo games go 3D with FCEUX hack

Nintendo games go 3D with FCEUX hack

If you're in the mood for some next-generation action on your past-generation emulated games, a fellow by the name of plotor has just the bit for you. What this hacker/developer has done is to create a rather simple modification for the game emulator FCEUX. This emulator takes the pixels that make up each original Nintendo Entertainment (NES) ROM and converts them all into voxels - 3D, that is.

Continue Reading

CyanogenMod brand stage 2: more new things more often

CyanogenMod brand stage 2: more new things more often

This week the team at CyanogenMod - a real-deal company now, mind you - have revealed that they've attained a second round of major funding from new funders Andreessen Horowitz and Tencent as well as previously contributing groups Benchmark and Redpoint. This investment round brings up a whopping $23 million to the Android-based brand, this adding to the already invested $7 million from earlier this year - that's a cool $30 million the group is now working with.

Continue Reading

Remote webcam activation without warning light confirmed: Johns Hopkins

Remote webcam activation without warning light confirmed: Johns Hopkins

Researchers at Johns Hopkins University have positively confirmed the long-discussed ability of government entities and private parties to remotely activate a webcam without the warning light turning on. While this privacy vulnerability has already been anecdotally admitted by a variety of sources, this research is the first time it has been proven by an established public-facing organization. The results were published last week in a paper entitled "iSeeYou: Disabling the MacBook Webcam Indicator LED".

Continue Reading

Xbox One and PlayStation 4 launches brought hacker frenzy, reports Kaspersky Lab

Xbox One and PlayStation 4 launches brought hacker frenzy, reports Kaspersky Lab

The launch of the PlayStation 4 and Xbox One brought about a frenzy to more than just the gamer front. According to Kaspersky Lab, coinciding with the consoles' respective launches, instances of cyber attacks skyrocketed as hackers sought -- and continue to seek -- to take advantage of the latest onslaught of gamers. The attacks aren't limited to just the latest consoles, however, with attacks increasing against PC gamers and such as well.

Continue Reading

Hackers stole data from five European nations at September G20 Summit

Hackers stole data from five European nations at September G20 Summit

Network security company FireEye has reported a coordinated malware attack on five European foreign ministries. The attack took place last August just prior to the G20 Summit in September. It was achieved by sending the ministries email attachments bearing file names pertaining to the primary topic of the summit: military options in Syria. Once downloaded, the files allowed the hackers to monitor communications and steal data from the host machines. FireEye believes the hackers are from China, but it stopped short of alleging collusion with the Chinese government.

Continue Reading

Two million social media account credentials stolen and published

Two million social media account credentials stolen and published

The credentials for two million compromised accounts for social media sites and other websites have been posted online. They include credentials for Facebook, Yahoo, Google, Twitter, LinkedIn, a payroll service, and many others. The security breaches are believed to have been made possible through malware installed on user computers, not weaknesses in the websites themselves.

Continue Reading

Chromecast apps readied for December hackathon

Chromecast apps readied for December hackathon

There's a type of event that's been happening in recent months and years that hardware manufacturers call "hackathons", events where developers are encouraged to bring their biggest and best to the table. For the most part, these hackathon events are pushed to bring apps to platforms that have a distinct lack of software partners. In the case of the upcoming Chromecast hackathon, Google is encouraging the world to continue boosting the already-blossoming environment of Chromecast apps in place today.

Continue Reading

Prev 3 4 5 6 7 8 9 10 11 Next