TweakTown
Tech content trusted by users in North America and around the world
6,155 Reviews & Articles | 39,555 News Posts

TweakTown News

Refine News by Category:

Hacking & Security Posts - Page 87

Apple slap 24-hour suspension on phone-based resets of Apple ID passwords in a bid to stem more hacks

And so they should. After having the joy of a daisy-changed hack, Mat Honan has been keeping the tech world up-to-date on the going ons of the recent hack over at Apple, and what companies are doing to make sure that it doesn't happen to anyone else.

 

TweakTown image news/2/5/25200_03_apple_slap_24_hour_suspension_on_phone_based_resets_of_apple_id_passwords_in_a_bid_to_stem_more_hacks.jpg

 

Apple have improved their services, issuing a 24-hour ban on calling Apple support to change your Apple ID password. Honan's hack involved some social engineering, meaning that a hacker actually made a voice call, setting up accounts pretending to be him. Wired reported on the ban, saying:

 

Apple on Tuesday ordered its support staff to immediately stop processing AppleID password changes requested over the phone, following the identity hacking of Wired Reporter Mat Honan over the weekend, according to Apple employees.

 

An Apple worker with knowledge of the situation, speaking on condition of anonymity, told Wired that the over-the-phone password freeze would last at least 24 hours. The employee speculated that the freeze was put in place to give Apple more time to determine what security policies needed to be changed, if any.

Continue reading 'Apple slap 24-hour suspension on phone-based resets of Apple ID passwords in a bid to stem more hacks' (full post)

Three Windows 8 exploits found before official release

It's a sad reality that there's always someone trying to break into Windows. This is due to the wide use that Windows has over other operating systems. Even before the official release, people are doing their best to break into Microsoft's upcoming Windows 8, and sadly, they've found three exploits to do just that.

 

TweakTown image news/2/5/25088_1_windows_8_exploits_found_before_official_release.jpg

 

With three months left before the actual release of Windows 8, Microsoft has time to take care of these exploits that have been found. Sung-Ting Tsai of Trend Micro is the person who found the exploits, so he's helping Microsoft patch them rather than working on exploiting them for nefarious reasons.

 

The exploits are in the kernel level advanced local procedure call, the component object model (COM) application programming interface, and the Windows Runtime API. Tsai worked on several methods to attack the vulnerabilities, and while he wasn't completely successful, he says that someone with enough time could find a way to compromise the system.

Ubisoft accidentally installed a backdoor with its DRM

Earlier today, stories were hitting the web that Ubisoft's DRM installed a browser plug-in that contained a backdoor. Ubisoft acted quickly and has released a patch to fix the security hole as it turns out that the backdoor was an accident and was in no way meant to be there, or at least not exploitable as it was.

 

TweakTown image news/2/5/25067_1_ubisoft_accidentally_installed_a_backdoor_with_its_drm.png

 

Tavis Ormandy, a Google security engineer, found the backdoor and wrote about it on the Seclists.org mailing list on Sunday. Mr. Ormandy went as far as to post a few lines of Javascript as an untested proof of concept. This morning, the story made it onto Hacker News along with a working proof of concept.

 

The list of games which come with Uplay, and the vulnerability, are as follows:

 

Assassin's Creed II

Assassin's Creed: Brotherhood

Assassin's Creed: Project Legacy

Assassin's Creed Revelations

Assassin's Creed III

Beowulf: The Game

Brothers in Arms: Furious 4

Call of Juarez: The Cartel

Driver: San Francisco

Heroes of Might and Magic VI

Just Dance 3

Prince of Persia: The Forgotten Sands

Pure Football

R.U.S.E.

Shaun White Skateboarding

Silent Hunter 5: Battle of the Atlantic

The Settlers 7: Paths to a Kingdom

Tom Clancy's H.A.W.X. 2

Tom Clancy's Ghost Recon: Future Soldier

Tom Clancy's Splinter Cell: Conviction

Your Shape: Fitness Evolved

Continue reading 'Ubisoft accidentally installed a backdoor with its DRM' (full post)

Another OS X Trojan has been identified, this one bypasses user permissions

Apple have been hit again, with security firm Intego and their virus team identifying yet another Trojan horse that attacks Apple's Mac platform. The new Trojan called "Crisis", hasn't been seen in the wild yet, but Intego says that the Trojan is engineered to make analysis of the malware difficult for security experts.

 

TweakTown image news/2/4/24993_03_another_os_x_trojan_has_been_identified_this_one_bypasses_user_permissions.png

 

Intego have stressed alertness regarding Crisis, as it appears to be quite smart, having the ability to bypass OS X security features and install itself, all without any user interaction.

 

Crisis has been tracked, back to the IP address of 176.58.100.37, which it then calls back to every five minutes for instructions. There's only two OS X versions that are said to be susceptible to Crisis, OS X 10.6 and 10.7. Crisis can install and run itself without the need for the user to enter in their password. It's also resistant to reboots, and will run until it is detected and removed.

Continue reading 'Another OS X Trojan has been identified, this one bypasses user permissions' (full post)

Your hotel keycard lock is vulnerable to hackers

A word of warning to our readers: next time you check into a hotel room, realize you're probably not the only one that can get in. Take a moment to run your fingers along the bottom of the keycard lock and check for a power port. If you find one, it means a hacker with a couple of cheap hardware parts could gain access to your room without leaving a trace.

 

[img]2[/img]

 

24-year-old Mozilla software developer and self-described hacker Cody Brocious has issued this warning after he found the vulnerability while reverse engineering Onity-manufactured locks. By connecting $50 in hardware to the DC port, the door will supposedly unlock and provide access. However, in practice, it's not quite that reliable.

 

While demonstrating it to a Forbe's journalist, it only worked on one of the three doors they tried and only on the second try after Brocious tweaked his software. Still, with a bit of time, a hacker could perfect the software and technique and somewhere around 4 million doors would immediately be able to be opened.

 

The method to do this will be released by Cody Brocious at the Black Hat security conference in Las Vegas on Thursday. Once released, other hackers can begin working on perfectly the method. Furthermore, the NSA and other governments most likely already know about this exploit and could have already perfected it and be using it.

Gamigo's breach sees 8 million logins leaked

Earlier this year, German gaming company Gamigo was hacked where over 11 million e-mail addresses and encrypted passwords were stolen. It has been the biggest breach of its kind for 2012.

 

TweakTown image news/2/4/24974_06_gamigo_s_breach_sees_8_million_logins_leaked.jpg

 

Gamigo is a free-to-play MMORPG site, and after the hack security researchers analyzed the dump, which included 3 million US (.com) e-mail address, 2.4 million German (.de) addresses, 1.3 million French (.fr) addresses, and 100,000 t-online.de addresses. Gamigo have forced password resets ahead of time, meaning if you're a member of the site, you don't have to worry just yet.

 

But, for people who use the same e-mail address and password on multiple sites may have something to worry about. The leak contains addresses for various services including Windows Live Hotmail, Gmail and Yahoo, as well as other accounts at companies like Allianz, Deutsche Bank, ExxonMobil, IBM and Siemens.

New malware out is targeting OS X, Linux and Windows at the same time

Security firms Sophos, and F-Secure have both noted that there's a new piece of malware floating round that is targeting Mac, Windows and Linux users all at the same time. The malware pretends to be a required add-on.

 

TweakTown image news/2/4/24899_15_new_malware_out_is_targeting_os_x_linux_and_windows_at_the_same_time.png

 

Of course, it's not, and in reality its victims are opening up a Java archive file, which then detects the platform the victim is using, before connecting to a remote server to fetch the additional code, creating a back door for hackers. THe Mac-based malware is identified by F-Secure is "Backdoor:OSX/GetShell.A."

 

What makes this new piece of malware stand out from the very crowded sea of infectious crap that is out there is that this particular code is targeting multiple platforms at once. Most hackers usually stick to attacking Windows, or OS X. Hopefully it doesn't get too much more widespread, and people continue to educate themselves on what to, and what not to, click, open or accept.

Yahoo! confirms server breach, had 400k accounts compromised as a "wake-up call"

We've seen some serious hacking over the last few years, with the last notable tech-related hack being Sony, but now Yahoo! have joined the ranks of victims being hit. Yahoo! confirmed that it had the usernames, and passwords of over 400,000 accounts stolen from its servers earlier this week, and that data from these accounts were posted online briefly.

 

TweakTown image news/2/4/24889_06_yahoo_confirms_server_breach_had_400k_accounts_compromised_as_a_wake_up_call.jpg

 

The data has since been yanked offline, but it turns out that it wasn't just for Yahoo! accounts, as Gmail, AOL, Hotmail, Comcast, MSN, SBC Global, Verizon, BellSouth and Live.com login info was also taken on the day and placed online. Those who hacked the servers said that they did it simply to show Yahoo! the weaknesses in their security software, elaborating:

 

We hope that the parties responsible for managing the security of this subdomain will take this as a wake-up call, and not as a threat. There have been many security holes exploited in Web servers belonging to Yahoo Inc. that have caused far greater damage than our disclosure. Please do not take them lightly. The subdomain and vulnerable parameters have not been posted to avoid further damage.

Continue reading 'Yahoo! confirms server breach, had 400k accounts compromised as a "wake-up call"' (full post)

NVIDIA shut down the NVIDIA forums, suspect they've been hacked

NVIDIA have just announced they've "suspended operations" of the NVIDIA Forums, for what seems like a breach of their systems. They've run a preliminary investigation, where they've identified that unauthorized third-parties gained access to some user information including usernames, e-mail addresses, hashed passwords, and public-facing "About Me" profile information.

 

TweakTown image news/2/4/24882_03_nvidia_shut_down_the_nvidia_forums_suspect_they_ve_been_hacked.jpg

 

NVIDIA state that they didn't store any passwords in clear text, and that their "About Me" optional profiles could include a user's title, age, birthdate, gender, location, interests, e-mail, and website URL, all of which was publicly accessible. NVIDIA also add that they're continuing their investigation, and hope to restore the Forums soon. They're also implementing additional security measures in order to minimize the impact of future attacks.

 

All passwords will be reset when the Forums go live again, and at that time NVIDIA will send out an e-mail with a temporary password, as well as instructions on how to change the password. NVIDIA (as well TweakTown) recommend that if you have any identical passwords on any other site, that you change them as soon as possible.

Spam being sent from a botnet composed of Android devices

Spam e-mail is nothing new. Most users have figured out ways to combat it either through the use of spam boxes or spam blockers on the e-mail servers themselves. This spam is traditionally sent out via compromised computers that have been pulled together into a botnet. The botnet can be ordered to do whatever nefarious activities its commander wants.

 

TweakTown image news/2/4/24796_1_spam_being_sent_from_a_botnet_composed_of_android_devices.jpg

 

With Windows becoming more secure, however, it has been harder for hackers to gain these computers for botnets. Terry Zink of Terry Zink's Cyber Security Blog on the MSDN noticed something interesting about the spam he has been receiving lately. At the bottom of the message it says "Sent from Yahoo! Mail on Android."

 

Furthermore, he examined the headers of the e-mail and found "Message-ID: 1341147286.19774.androidMobile(at)web140302.mail.bf1.yahoo.com" I'm sure you can see where this is going. A spammer somewhere has a botnet that lives on Android devices, much like the rumors we've all heard. What's even more interesting is where these devices are located.

 

Yahoo places the IP of the device in the header so Terry Zink took a gander at where these IPs were located on the globe. The IPs come from Chile, Indonesia, Lebanon, Oman, Philippines, Russia, Saudi Arabia, Thailand, Ukraine, and Venezuela. The majority of these countries are developing countries and Zink has an explanation:

Continue reading 'Spam being sent from a botnet composed of Android devices' (full post)

Latest Tech News Posts

View More News Posts

Forum Activity

View More Forum Posts

Press Releases

View More Press Releases