Safari/MacBook First To Fall At Pwn2Own 2011
Again… hahahaha – 5 seconds is all it took 🙂 Safari/MacBook First To Fall At Pwn2Own 2011 – Slashdot.
Again… hahahaha – 5 seconds is all it took 🙂 Safari/MacBook First To Fall At Pwn2Own 2011 – Slashdot.
Using statistical analysis of the amount of times that numbers only appear once on a scratch lottery card, Mohan Srivastava can easily double his chances on the cards and has done way way better than that. The companies aren’t taking him very seriously, so here’s a hole which is still way open. Cracking the Scratch Read more about Cracking the Scratch Lottery Code[…]
This forum has links to the sites which explain the hack and to the software itself, for as long as it’s up. The hack comes down to filling up your anonymous chipcard once, then making a copy and restoring the copy every now and again. This is undetectable, especially during the week. Weekends are apparently Read more about OV chipkaart hacked, software available[…]
It turns out that every Tunisian ISP was keylogging all login attempts to facebook and other sites from Christmas. The Inside Story of How Facebook Responded to Tunisian Hacks – Alexis Madrigal – Technology – The Atlantic.
The European Commission (EC) suspended trading in carbon credits on Wednseday after unknown hackers compromised the accounts of Czech traders and siphoned off around $38 million, according to published reports. EU countries including Estonia, Austria, The Czech Republic, Poland and France began closing their carbon trading registries yesterday after learning that carbon allowances had been Read more about EU Emissions Trading System down after hack siphons off $38 million from Czech traders[…]
This ZAP Stun Cane features an adjustable walking cane, an ultra-bright LED flashlight and a stun gun with an unheard of 1-million volt charge that will knock down any attacker. The cane has a weight capacity of 250 lbs and is adjustable from 32″ to 36″. They’ll think it is just a cane until it Read more about ZAP Cane With Flashlight[…]
Using GnuRadio you record the data from the air, Airporbe parses the data, Kraken cracks the A5/1 key and Airprobe decodes voice. GSM is broken. Fortunately, UMTS isn’t. Decrypting GSM phone calls | srl.
Posing as a legitimate URL shortening service, it serves users the requested pages in an iFrame, while simultaneously participating in a DDoS attack in the background. No interaction is required beyond clicking the link and staying on the page. This makes it relatively trivial to quickly mount large-scale DDoS attacks, and affords willing participants plausible Read more about D0z.me — the Evil URL Shortener[…]
On Sunday night, hackers posted online a trove of data from Gawker Media’s servers, including the usernames, email addresses and passwords of more than one million registered users. The passwords were originally encrypted, but 188,279 of them were decoded and made public as part of the hack. Using that dataset, we found the 50 most-popular Read more about The Top 50 Gawker Media Passwords[…]
With the US Government suddenly having become a muscle-flexing player in the DNS root servers, many don’t trust DNS any more and are developing and using alternatives. This is a roundup of several possible contenders. Gov’t crackdown spurs initiatives to route around DNS | ITworld.
Basically they’re violating RFC-3390. You’re supposed to check the speed the receiver can handle before sending another packet, and then up your speed if it’s good, or stabilise if it isn’t. What they do is instead of waiting for the return packet confirming or denying the uprate in speed is good (initial window / IW), Read more about How Google and MS load so quickly: they cheat on slow start[…]
Awesome! Presentation at Hack.lu: Reversing the Broacom NetExtreme’s firmware – Sogeti ESEC Lab.
Windows Phone 7 unlocker released Today we have an exciting breakthrough for the Windows Phone 7 homebrew community – the ability for anyone to unlock a WP7 device without a Marketplace developer account. Unlocking allows the sideloading of experimental applications that would otherwise can’t be published to the Marketplace, such as those which access private Read more about Windows 7 Phone Jailbroken[…]
Lees dit aandachtig door! IK LEG NIET UIT HOE JE GRATIS REIST OF HOE JE EEN KAART MANIPULEERT, IK LEG ALLEEN UIT HOE JE DE SLEUTELS VAN DE MIFARE CLASSIC 1K EN 4K BEVEILIGING VERKRIJGT EN DE INHOUD VAN DE KAART NAAR EEN BESTAND OPSLAAT!!! Alles geschreven een weergegeven op deze website is uitsluitend bedoeld Read more about Howto: hack the OV-chipkaart[…]
It’s got a serial port!!! The great iPhone serial port hack – Slideshow – Computerworld.
Talk about fighting fire with fire! Keep the police out of your PC! Politie over de schreef bij botnetontmanteling – UPDATE | Webwereld.
Some good settings to change and try in your bittorrent client How to Boost Your BitTorrent Speed and Privacy.
A nasty glitch in iOS 4.1 lets anyone easily access both the phone and photos app on every model of the iPhone. The bug was found by a MacRumors forum member last week, but has just recently received major attention. To bypass the password protected lock-screen, all you have to do is tap “Emergency Call”, Read more about iOS 4.1 Bug Allows Access to Contacts, Photos – iPod touch, iPhone, and iPad news[…]
Firefox: Firesheep sniffs out and steals cookies—and the account and identity of the owner in the process—of popular web sites (like Facebook and Twitter) from the browsing sessions of other users on the Wi-Fi hot spot you’re attached to. Firesheep is a proof-of-concept Firefox extension created by Eric Butler to show how leaky the security Read more about Firesheep Sniffs Out Facebook and Other User Credentials on Wi-Fi Hotspots[…]
BERLIN (Reuters) – A German entrepreneur is bypassing a European Union ban on light bulbs of more than 60 watts by marketing his own brand as mini heaters. Siegfried Rotthaeuser and his brother-in-law have come up with a legal way of importing and distributing 75 and 100 watt light bulbs — by producing them in Read more about Buy light bulbs as heatballs[…]
PhoneSnoop demonstrates how a BlackBerry can be used to spy on its owner. You call it using a preprogrammed trigger number, and it turns on the speakerphone for you to hear what’s going on. via Chirashi Security | Remote Listening for the BlackBerry.
Phone creeper is for Windows Phone. An Android version is coming soon. It can be silently installed by just inserting an sd card with the files below on it.The program does not show up under installed programs or running programs and allows for a useful array or features. Phones running this software can be remotely Read more about Phone Creeper V0.95 BETA Espionage Suite[…]
Some games are very complex – Minecraft, Little Big Planet and Dwarf Fortress, for example. These games allow you to build a working computer inside them – if you have the time for it! Geeky Gamers Build Working Computers out of Virtual Blocks.
Any Android phone can now be easily rooted. [APP]SuperOneClick v1.4 (Root, Enable Non-Market App, Get UNLOCK code) – xda-developers.
This easy to implement attack means that basically any ASP.NET application is vulnerable. Oops. Demo of ASP.NET Padding Oracle Attack | threatpost.