In a talk at the Derbycon hacker conference in Louisville, Kentucky last week, researchers Adam Caudill and Brandon Wilson showed that they’ve reverse engineered the same USB firmware as Nohl’s SR Labs, reproducing some of Nohl’s BadUSB tricks. And unlike Nohl, the hacker pair has also published the code for those attacks on Github, raising the stakes for USB makers to either fix the problem or leave hundreds of millions of users vulnerable.
After Federal Bureau of Investigation agents raided Hector Xavier Monsegur’s Manhattan apartment in June 2011, the FBI gave him a choice: Help take down the international hacktivist collective Anonymous, or go to prison for the rest of your life. He promptly flipped.
The Daily Dot previously revealed that, contrary to official reports, Monsegur, 30, orchestrated the devastating attack on Stratfor in December 2011. The breach caused an estimated $3.78 million in damages and left thousands of customers vulnerable to fraud.
For the first time, The Kernel can now confirm Monsegur also led cyberattacks on Turkey’s government. The revelation further calls into question the role of federal investigators and their apparent willingness to exploit both hackers and major security flaws.
#Programming in movies vs. programming in real life with @m_janko. #hacker
RADIO hackers have reverse-engineered some of the wireless spying gadgets used by the US National Security Agency. Using documents leaked by Edward Snowden, researchers have built simple but effective tools that can be attached to parts of a computer to gather private information in a host of intrusive ways.
The NSA’s Advanced Network Technology catalogue was part of the avalanche of classified documents leaked by Snowden, a former agency contractor. […]
Having figured out how the NSA bugs work, Ossmann says the hackers can now turn their attention to defending against them – and they have launched a website to collate such knowledge, called NSAPlayset.org. „Showing how these devices exploit weaknesses in our systems means we can make them more secure in the future,“ he says.
Microsoft warned that Windows XP customers may face problems if they install the updates. “The security updates that could be installed are intended for Windows Embedded and Windows Server 2003 customers and do not fully protect Windows XP customers,” Microsoft said in a statement released to ZDnet. “Windows XP customers also run a significant risk of functionality issues with their machines if they install these updates, as they are not tested against Windows XP.”
The FBI has a problem. The agency needs to hire hackers to build out its cyber crime division, but it also will not hire anyone who’s smoked weed in the past three years. And guess what? A lot of hackers like to smoke weed.
Today I’m really curious about the impact of the NSA on the troubled history of Ultra Wide Band (UWB) communication.
I stumbled on this topic with the help of a reader who pointed me at a story and then a paper about advances in secure communication. Scientists at the University of Massachusetts came up with a method of optical communication that they could mathematically prove to be immune to snooping or even detection up to a certain bit rate. To an eavesdropper who didn’t know what to listen for or when to listen for it the communication just looks like noise. […]
This is all just speculation on my part, but Snowden got me thinking. Did the NSA help the FCC to kill UWB? That’s exactly the kind of idea that would have appealed to the second Bush Administration. Did the U.S. intelligence and defense communities pick up UWB to advance their own secret communication capabilities while silencing any VC outrage by covering some of their losses?
That’s what I would have done were I Dick Cheney.
You don’t use the same password over and over right? Let’s be honest this is the day and age of the hacker. Eclectic Method brings you „Hackers“ , Hollywood’s celebration of basement dwelling 128 bit encryption masters. They’ll shut down before you can trace them, hack into the mainframe and go straight for the kernel, hell they might even insert a worm on the back of a trojan. Keanu Reeves has been one, Angelina Jolie has been one and Matthew Broderick was one before he was Ferris Bueller.
Shall we play a game? Spot every movie in this hackisode….
Free Communications for Everyone.
„So far we have played interactive chess games with people at 180 miles away. we have shared pictures and
established encrypted low bandwidth digital voice chats. We have 3D printed over distances of 80 miles and transmitted medical orders at distances of over 100 miles.All without phones or internet access…“
coming soon spring 2014
Wer ein freies Netz will, kann sich nicht auf die Tagesform von EU-Parlamentariern verlassen. Es hilft nur, sich selbst die Technologie anzueignen.
Mit großen Worten haben wir uns im ausgehenden 20. Jahrhundert die Informationsgesellschaft versprochen. Der freie Fluss der Daten sollte die Lebensader von Ökonomie, Kultur und intellektuellem Austausch sein. Stattdessen setzte sich in kürzester Zeit eine aggressive Dominanzkultur durch. Monopolisten mit durchkommerzialisierten Angeboten bestimmen das Netz, wie wir es heute erleben: Google/YouTube, Facebook, Amazon, Netflix.
Die einzigen, die dieser Entwicklung wirksam entgegenstehen, sind nicht EU-Parlamentarier, deren Entscheidungen von der Überzeugungskraft der Groß-Lobbyisten abhängt. Es sind die vielen kleinen Projekte in Kamerun, Indien, amerikanischen Reservaten und auch der Freifunk-Initiative in Deutschland, die mit preisgünstiger Funktechnik etwas völlig neues schaffen: ein dezentrales funktionierendes Netz.