Blue Ray hacked
It’s all been cracked open in the Doom9 forum. DRM is not a cure, it has been cured again!
It’s all been cracked open in the Doom9 forum. DRM is not a cure, it has been cured again!
Well, it looks pretty damn complete to mii 🙂
SNEAKEY is a system that can take a poor resolution picture of a key and from that create a prefect working duplicate.
After an update with which Nintendo killed new homebrew channel installations, this part has been circumvented allready.
This wiki explains how to set up your Wii for homebrew, how to install the homebrew channel and the homebrew softwares you can then get.
Nintendo says the SD card size limit is 2GB. Basically what it comes down to, is if you ensure there’s always less than 1.99GB of free space on an SD card, it doesn’t seem to matter what size the SD card is. So you fill up the space with crap, and when your SD card Read more about The Inclusive 4GB SD Card Workaround Solution for Wii![…]
well, that only took Dark Alex 2 days…
It turns out that PIN machines usually process your transaction properly, but every so often they send some packets containing PIN transaction detailas to an unknown destination. The random and slow skimming of details makes it very difficult to track down what’s happening.
Unbelievably, after losing data on all current and ex- RAFpersonell plus dependents (and yes, that includes financial and bank account as well as personal data: NB. the numbers range from 5,000 to 50,000 to everyone depending on what you read) from a cupboard in a deserted (and minimally guarded by the army) airbase at Innsworth Read more about UK MoD determined to give away all it’s base[…]
If you want the ability to clone your RFID passport with photo and name changes included, go here quickly before it’s taken down!
Online poker sites Absolute Poker and UltimateBet have had a security flaw in them, which allowed certain players to see the hole cards of all the other players. An Australian, Michael Josem, used statistical analysis to prove that certain accounts were winning around 100 times more often than other accounts. Now there’s a whole suing Read more about Poker sites ripping off[…]
Well, the apple version of QuickPwn 2.1 for the 2.1 firmware was broken beginning of last week, now the dev-team supports windows as well!
Without any legal approval, it seems the Bavarian police would like to turn Germany into a police state. They seem to have developed a trojan that latches on to Skype clients and allows eavesdropping as well as sending technical details of the client PC.
Turns out she uses her Yahoo account for work, so as to escape accountability and federal laws on data retention.
Denver airport security screeners have been given a new uniform with a metal badge that sets off the metal detectors. Solution? Simple! Don’t screen anyone wearing a screener uniform.
Plug this tiny stick into a Motorola / Samsung phone and retrieve all their data in one fell swoop – contacts, emails, sms messages, deleted stuff, anything. Now retailing for around $200,-. More phone models to follow ASAP.
The videos after the jump show exactly how easy it is to hack the voting machines. It’s not just in an isolatied system that it’s possible.
Well, due to the trusting relationship of BGP routing peers it turns out you can reroute a whole load of traffic fairly easily if you have a BGP router.
So after having had 3000 new blank ‘unbreakable’ passports stolen during delivery from the truck, they’ve (well, specifically, Jeroen van Beek of the UvA) now discovered that the passports can be cloned and altered (eg. have digital images inserted on them or other different biometrics, such as thumbprints, eyeprints) within a few minutes. The fraudulent Read more about UK Passport troubles… again![…]
So this is what we all had to fix for: basically a cache poisoning attack.
Hacking At Random 2009 has just been announced and the first post is on the wiki!
Kris Kaspersky claims to have found an exploit which he plans to release into the wild with working proof of concept code at the upcoming Hack In The Box in Malaysia. He claims that every intel box ever made is vulnerable, OS independent, as long as it’s running TCP/IP or javascript.
It’s been fixed though and everyone SERIOUSLY needs to patch this.
s. Specific domains that were hijacked included “icann.com ” “icann.net ” “iana.” By changing the DNS entries! How cheeky can you get?! Well done netdevilz
The Image Fulgurator is a device for physically manipulating photographs. It intervenes when a photo is being taken, without the photographer being able to detect anything. It intervenes when a photo is being taken, without the photographer being able to detect anything. The manipulation is only visible on the photo afterwards. The manipulation is only Read more about Image Fulgurator[…]