hack

IP Box hardware used to bruteforce screenlock on iOS devices

IP Box hardware used to bruteforce screenlock on iOS devices

Word of an interesting device that can certainly be put to work for nefarious deeds has turned up that makes it easy for someone else to bruteforce the screenlock passcode on iOS devices. The device is called the IP Box and is apparently being used in the phone repair market now. The IP Box is inexpensive at around £200 and connects directly to the USB connection of the iOS device.

Continue Reading

Research project puts Android Wear notifications on a mirror

Research project puts Android Wear notifications on a mirror

Smart mirrors, or mirrors that can display information such as weather, news, and whatnot, aren't exactly a novel idea. Some have even taken great pains to try and make this sci-fi dream a reality. That's not to say we won't be impressed once in a while by implementations, especially those that promise to hook up with devices that we already have in the house, or in our hands, or even our wrists. Redditor Nick Nothom did just that, with his own version of a smart mirror that connected with his Android Wear smartwatch.

Continue Reading

DarNES: the insane implementation of Netflix on an NES

DarNES: the insane implementation of Netflix on an NES

Some people really just have a lot of time, or ideas, or both, in their hands. We've seen a lot of games lately that have tried to incorporate that classic 8 or 16 bit design into their graphics for the sake of simplicity, art, and nostalgia. But Netflix engineers Guy Cirino, Alex Wolfe and Carenina Motion wanted to take things even further. What if they could cram today's streaming content into that same retro experience. And they didn't stop at trying to emulate just the graphics. They actually worked on running Netflix on a NES console.

Continue Reading

Hack puts OS X Yosemite on a Wacom Cintiq Companion 2

Hack puts OS X Yosemite on a Wacom Cintiq Companion 2

Macs and OS X have a reputation of being the preferred hardware and platform of designers, but quite ironically, there is not a single official Apple computer that comes with an integrated Wacom display. Perhaps Apple considers it unnecessary because Wacom's Cintiq displays work perfectly with Macs anyway. But there is still a class of people that want to get the best of both worlds, like this latest hack that puts Apple's latest operating system inside a Cintiq Companion 2 tablet, though not everything is fine and dandy just yet.

Continue Reading

Gemalto: we were ‘probably’ hacked, but definitely affected

Gemalto: we were ‘probably’ hacked, but definitely affected

For a company that wasn’t even aware they’d been hacked years prior, Gemalto sounds pretty confident things are just fine. In a report outlining the ‘probable’ hack executed by the NSA and GCHQ, Gemalto says none of the encryption keys our SIM card have were compromised. Earlier this week, Gemalto said they believed the hack was less damaging than initially outlined by Edward Snowden, wherein he says the NSA and GCHQ played a kind of ‘man in the middle’ game to grab your SIM codes.

Continue Reading

Gemalto says NSA SIM card hack might not be so bad after all

Gemalto says NSA SIM card hack might not be so bad after all

Late last week, Edward Snowden revealed another bombshell. In his ongoing quest to reveal the scope of NSA spying, he announced the NSA and GCHQ (NSA’s UK counterpart) hacked a major SIM card provider, Gemalto, in an attempt to get the ‘keys’ to your phone. In hacking your phone via the SIM, the NSA and GCHQ would be able to bypass the carriers, and keep a watchful eye on you with no one being the wiser. In response to the report, Gemalto is now saying it might not be a problem at all.

Continue Reading

Snowden: NSA/GCHQ have nearly everyone’s SIM card codes

Snowden: NSA/GCHQ have nearly everyone’s SIM card codes

Edward Snowden’s cache of information is unsettling, but necessary. Periodically, he’ll release a tidbit of info that either follows up on something that came before it, or is entirely new and equally shocking. Today, we get the latter of the two, as Snowden reveals how the NSA — in conjunction with the UK’s GCHQ — hacked Gemalto, a major SIM card manufacturer. According to Snowden, the NSA/GCHQ hack of Gemalto gave them secret passcodes to SIM cards around the world, bypassing your carrier altogether.

Continue Reading

Anthem data breach could affect millions of Americans

Anthem data breach could affect millions of Americans

This week the second largest health insurer in the US disclosed that it has been hacked and the hackers potentially stole the personal data of tens of millions of Americans. Anthem says that the hackers gained access to its servers and stole social security numbers and other personal data on its insured from all of its business lines.

Continue Reading

‘Freedom Clip’ gets you past Keurig’s K-Cup rules

‘Freedom Clip’ gets you past Keurig’s K-Cup rules

If you’ve recently purchased a Keurig coffee machine, you know that many third-party pods won’t work in your machine. Protected by DRM, Keurig tamped the cottage industry that popped up around their machines with their latest kit, to the dismay of just about everyone. A new add-on might get you around Keurig’s rules, though. The Freedom Clip snaps into your existing Keurig, and allows for those now-bootleg K-Cups to be used in your new Keurig machine.

Continue Reading

Marriott mobile app: providing backdoor access since 2011

Marriott mobile app: providing backdoor access since 2011

Hotel chain Marriott might find itself in more trouble than its 2014 FCC fine. A senior developer at the XDA Developers Forum has revealed that the chain's mobile app might have allowed unauthorized people to gain access to private information, including names, addresses, contact numbers and credit card information. Though the app has said to have been plugged up now, the security flaw has been in existence for almost four years, exponentially increasing the possible ramifications and victims of this exploit.

Continue Reading

Google’s Project Zero targets OS X with three new exploits

Google’s Project Zero targets OS X with three new exploits

Google’s Project Zero has released more 0day vulnerabilities, and is this time aiming for Apple. Over the past few days, Project Zero has slowly released some exploits found in OS X Yosemite. The vulnerability exposure team at Google first provides their findings to the company in charge of the software. After that time, they’ve got 90 days to fix it before Google’s Project Zero team publishes it to the world. While Microsoft was responsive to Google’s release, Apple is much more tight-lipped.

Continue Reading

Minecraft was not hacked but user passwords phished

Minecraft was not hacked but user passwords phished

Given the recent rash of Internet security breaches, you'd think that users would be more careful about their online accounts and passwords. Apparently not so. In fact, according to a recent report, "123456" is still the most popular password around. That same disregard for security, or maybe just laziness, has resulted in as much as 1,800 Minecraft accounts, including their passwords, to be compromised. It might be too easy to presume that Minecraft's servers have been hacked, but apparently, it was all the result of a phishing scam.

Continue Reading