Skip to main content

Security

Researcher discovers classified Army intel app, data on open public AWS bucket

posted onNovember 29, 2017
by l33tdawg

After uncovering a massive trove of social media-based intelligence left on multiple Amazon Web Services S3 storage buckets by a Defense Department contractor, the cloud security firm UpGuard has disclosed yet another major cloud storage breach of sensitive intelligence information. This time, the data exposed includes highly classified data and software associated with the Distributed Common Ground System-Army (DCGS-A), an intelligence distribution platform that DOD has spent billions to develop.

Google releases its year-long study into password and account hacking

posted onNovember 14, 2017
by l33tdawg
Credit:

Hackers are constantly trying to break into Google accounts, so Google researchers spent a year tracing how hackers steal passwords and expose them on the internet's black market.

To gather hard evidence about the tools hackers use to swipe passwords, Google collaborated with University of California Berkeley cybersecurity experts to track activity on some of these markets. On Thursday, they published their results.

OnePlus left a backdoor in its devices capable of root access

posted onNovember 14, 2017
by l33tdawg

Just a month ago, OnePlus was caught collecting personally identifiable data from phone owners through incredibly detailed analytics. While the company eventually reversed course on the data collection, another discovery has been made in the software of OnePlus phones. One developer found an application intended for factory testing, and through some investigation and reverse-engineering, was able to obtain root access using it.

Do you have a jailbroken Apple TV running Kodi? You are in danger of being hacked!

posted onNovember 14, 2017
by l33tdawg
Credit:

The Apple TV has long been a wonderful device for consuming media on your big-screen television. From video to music, it is a great experience. Some people weren't satisfied with the default functionality, however, opting to jailbreak Apple's media box. In fact, the jailbroken Apple TV 2 was one of the most popular XBMC/Kodi boxes for this reason.

Hackers say they broke Apple’s Face ID. Here’s why we’re not convinced

posted onNovember 14, 2017
by l33tdawg

Security researchers say they used a $150 mask to break the Face ID facial recognition system that locks Apple's new iPhone X. The work may be a significant, it may be little more than a stunt with few real-world consequences, or it could possibly be something in the middle. So far, it's impossible to know because the researchers have evaded key questions about how they went about breaking into the device.

Security firm claims to thwart iPhone X's Face ID with a mask

posted onNovember 12, 2017
by l33tdawg

When Apple introduced Face ID security alongside the iPhone X, it boasted that even Hollywood-quality masks couldn't fool the system. It might not be a question of movie-like authenticity, however -- security researchers at Bkav claim to have thwarted Face ID by using a specially-built mask. Rather than strive for absolute realism, the team built its mask with the aim of tricking the depth-mapping technology. The creation uses hand-crafted "skin" made specifically to exploit Face ID, while 3D printing produced the face model. Other parts, such as the eyes, are 2D images.