Tag Archives: hack

The Unpatchable Malware That Infects USBs Is Now on the Loose | WIRED

thumbdrive1

Alex Washburn / WIRED

 

[…]

 

In a talk at the Derbycon hacker conference in Louisville, Kentucky last week, researchers Adam Caudill and Brandon Wilson showed that they’ve reverse engineered the same USB firmware as Nohl’s SR Labs, reproducing some of Nohl’s BadUSB tricks. And unlike Nohl, the hacker pair has also published the code for those attacks on Github, raising the stakes for USB makers to either fix the problem or leave hundreds of millions of users vulnerable.

via 

FBI informant led cyberattacks on Turkey’s government | The Kernel

turkey-1200px

After Federal Bureau of Investigation agents raided Hector Xavier Monsegur’s Manhattan apartment in June 2011, the FBI gave him a choice: Help take down the international hacktivist collective Anonymous, or go to prison for the rest of your life. He promptly flipped.

 

[…]

 

The Daily Dot previously revealed that, contrary to official reports, Monsegur, 30, orchestrated the devastating attack on Stratfor in December 2011. The breach caused an estimated $3.78 million in damages and left thousands of customers vulnerable to fraud.

 

For the first time, The Kernel can now confirm Monsegur also led cyberattacks on Turkey’s government. The revelation further calls into question the role of federal investigators and their apparent willingness to exploit both hackers and major security flaws.

via 

Hackers reverse-engineer NSA’s leaked bugging devices – tech – 18 June 2014 | New Scientist

Turn on, tune in, sneak out (Image: Michael Olivers/Alamy)

Turn on, tune in, sneak out (Image: Michael Olivers/Alamy)

RADIO hackers have reverse-engineered some of the wireless spying gadgets used by the US National Security Agency. Using documents leaked by Edward Snowden, researchers have built simple but effective tools that can be attached to parts of a computer to gather private information in a host of intrusive ways.

 

The NSA’s Advanced Network Technology catalogue was part of the avalanche of classified documents leaked by Snowden, a former agency contractor. […]

 

Having figured out how the NSA bugs work, Ossmann says the hackers can now turn their attention to defending against them – and they have launched a website to collate such knowledge, called NSAPlayset.org. „Showing how these devices exploit weaknesses in our systems means we can make them more secure in the future,“ he says.

via 

Microsoft warns against Windows XP security update hack | Technology | theguardian.com

Windows XP

Microsoft warns against hack that allows continued Windows XP updates Photograph: Mark Sykes/Alamy

Microsoft warned that Windows XP customers may face problems if they install the updates. “The security updates that could be installed are intended for Windows Embedded and Windows Server 2003 customers and do not fully protect Windows XP customers,” Microsoft said in a statement released to ZDnet. “Windows XP customers also run a significant risk of functionality issues with their machines if they install these updates, as they are not tested against Windows XP.”

via 

I, Cringely Did the NSA help kill UWB? | I, Cringely

2-UWB-1

Today I’m really curious about the impact of the NSA on the troubled history of Ultra Wide Band (UWB) communication.

 

I stumbled on this topic with the help of a reader who pointed me at a story and then a paper about advances in secure communication. Scientists at the University of Massachusetts came up with a method of optical communication that they could mathematically prove to be immune to snooping or even detection up to a certain bit rate. To an eavesdropper who didn’t know what to listen for or when to listen for it the communication just looks like noise. […]

 

This is all just speculation on my part, but Snowden got me thinking. Did the NSA help the FCC to kill UWB? That’s exactly the kind of idea that would have appealed to the second Bush Administration. Did the U.S. intelligence and defense communities pick up UWB to advance their own secret communication capabilities while silencing any VC outrage by covering some of their losses?

 

That’s what I would have done were I Dick Cheney.

via 

Eclectic Method – Hackers | YouTube

 

You don’t use the same password over and over right? Let’s be honest this is the day and age of the hacker. Eclectic Method brings you „Hackers“ , Hollywood’s celebration of basement dwelling 128 bit encryption masters. They’ll shut down before you can trace them, hack into the mainframe and go straight for the kernel, hell they might even insert a worm on the back of a trojan. Keanu Reeves has been one, Angelina Jolie has been one and Matthew Broderick was one before he was Ferris Bueller.

Shall we play a game? Spot every movie in this hackisode….

via 

Airchat | Vimeo

 

Free Communications for Everyone.

„So far we have played interactive chess games with people at 180 miles away. we have shared pictures and

established encrypted low bandwidth digital voice chats. We have 3D printed over distances of 80 miles and transmitted medical orders at distances of over 100 miles.All without phones or internet access…“

coming soon spring 2014

via

s.a.: github.com/lulzlabs/AirChat/

Kommentar Netzneutralität und EU: Monopolisten unter sich | taz.de

Wer ein freies Netz will, kann sich nicht auf die Tagesform von EU-Parlamentariern verlassen. Es hilft nur, sich selbst die Technologie anzueignen.

Alles schön bunt und überall will jemand Geld verdienen – grad so wie im Internet. Bild: dpa

Mit großen Worten haben wir uns im ausgehenden 20. Jahrhundert die Informationsgesellschaft versprochen. Der freie Fluss der Daten sollte die Lebensader von Ökonomie, Kultur und intellektuellem Austausch sein. Stattdessen setzte sich in kürzester Zeit eine aggressive Dominanzkultur durch. Monopolisten mit durchkommerzialisierten Angeboten bestimmen das Netz, wie wir es heute erleben: Google/YouTube, Facebook, Amazon, Netflix.

[…]

Die einzigen, die dieser Entwicklung wirksam entgegenstehen, sind nicht EU-Parlamentarier, deren Entscheidungen von der Überzeugungskraft der Groß-Lobbyisten abhängt. Es sind die vielen kleinen Projekte in Kamerun, Indien, amerikanischen Reservaten und auch der Freifunk-Initiative in Deutschland, die mit preisgünstiger Funktechnik etwas völlig neues schaffen: ein dezentrales funktionierendes Netz.

Weiterlesen »

via