As it turns out, if hackers are able to send a certain kind of fax to your fax machine, they could gain access to everything on your network! According to the research, 45 million fax machines may be at risk.
The CEO of Epic Games is sick and tired of being shortchanged by “digital storefronts” who really do nothing else besides list their games and take a percentage for payment processing. He’s not the only one as Fallout 76 may be going in a similar direction. Here’s what we know so far…
The cryptocurrency also suffered a similar attack last month and lost over $1 million.
This is not a good year for the Verge cryptocurrency. The privacy-oriented cryptocurrency has experienced many security issues over the last few months. An attack in April resulted to a theft of 250,000 XVGs and in March, had their Twitter account hacked.
The latest attack lasted a few hours and resulted to a loss of approximately 35 million XVGs. This is worth more than $1.7 million as per the latest Coinmarketcap price.
Verge mentioned the attack in a Twitter post, explaining:
“It appears some mining pools are under DDoS attack, and we are experiencing a delay in our blocks. We are working to resolve this.”
Reddit user ocminer first noticed the attack. He was the same user who pointed out the first attack as well. According to him, hackers have exploited the same glitch that allowed them to steal thousands of XVGs previously. They were able to mine multiple blocks one second apart using the same (scrypt) algorithm.
He previously pointed out that Verge’s system had not been properly repaired since April. Additionally, he noted that “since nothing really was done about the previous attacks (only a band-aid), the attackers now simply use two [algorithms] to fork the chain for their own use and are gaining millions.”
Want to be more involved with the selection of what we report? Or buy us a coffee, maybe?
Be one of our patrons and help keep this place alive with the latest and trendiest tech, games and gadget news. Click here for a SHORT explanation. (We only give cool stuff. Pinky swear!)
Hackers will ever find their way just to bring trouble
You might think that Nintendo Switch is the only one that’s very popular to hackers, well the PS4 is now already targeted. The Playstation 4 system has been hacked, have a lot of pirated software and an opportunity for some users to play their own PS2 games on the newer console.
Eurogamer said that the exploit in the console’s software was discovered earlier this month, but it’s limited to consoles running system software 4.05. Well most of the users update their consoles each time there is a new update and as of now, we are on 5.05. It’s somehow a relief that there are only a few who are taking advantage of this issue.
But that didn’t stopped the hackers to spread the virus. Not long after the release of the exploit, we’re seeing Linux support and the creation of a homebrew enabler called PS4HEN. Hackers can install package files on the PS4 consoles, use some tools to decrypt games and then re-package and install them on hacked consoles.
There’s this popular idea,the backwards compatibility where you may use the PlayStation 4 with games from PS2.
PlayStation 2 emulation is a feature that exists at system-level on the PlayStation 4 console. It can offer you to tap into a resolution and performance boost. Well, it’s not yet possible.
For users emulating all their PS2 games, they have to rely the very limited number of titles on the PlayStation Store. But using this hack, there are tools that allows user to put their own ISO files into a package. Where users can install and operate it on exploited consoles. But not every game will operate perfectly using this hack.
It’s not even a question why these hackers are finding their way to make their lives easy and to cause trouble, well because it’s what they do best. Now, the challenge is that companies have to tightened up the security and to protect its consumers from these troublemakers.
World of Warcraft players may have encountered piles and piles of skeletons as they played the other day. Though this site is uncommon to WoW players, but gamers have reported that they have indeed seen these odd sights during their game.
According to reports, hackers were able to breach and find an exploit that enabled them to kill every non-player character or every player for that matter in two towns in the game, Orgrimmar and Stormwind.
WoW developer Blizzard was able to fix the exploit after they found out that there indeed was an attack to their system.
According to community manager Nethaera in an forum post, “We apologize for the inconvenience some of you experienced as a result of this and appreciate your understanding.”
The killing spree occurred after developers weren’t able to detect an exploit that allows level one characters access to the kill commands for every player and computer controlled characters of the game in the area.
One of those who were responsible for the hack told Eurogamer, “We didn’t do any permanent damage.”
“Some people liked it for a new topic of conversation and a funny stream to watch, and some people didn’t. The people who didn’t should be blaming Blizzard for not fixing it faster,” he added.
Many people still believe that due to technology the iPhone 4S and the Samsung Galaxy S III are the world’s most secure phones. The two companies would love to claim that no one can compromise the two of the world’s most popular smartphones.
But in a security conference this week, hackers from Netherlands and Great Britain were able to crack the two devices.
Chief Executive Officer of Dutch Research Firm Certified Security Joost Pol and Daan Keuper were able to hijack the browsing history, videos, address book, photos from a fully patched iPhone 4S as part of mobile Pwn2Own contest in Amsterdam.
According to Pol, “We specifically chose this one because it was present in iOS 6 which means the new iPhone coming out this week will be vulnerable to this attack.”
He added that the exploit is also compatible for the iPad, iPhone 4 and the iPod Touch.
Members of a UK team on the other hand was able to beam a file via NFC to a Samsung Galaxy S III that was able to exploit an unknown vulnerability in the operating system. They were able to have access to the data via an unknown hole.
Both teams were awarded $30,000 for their exploits.
How do you feel now about your Galaxy S III or iPhone 4S?
Bad news for Guild Wars 2 players as it has come to light that about 11,000 user accounts were hacked by password crackers.
According to ArenaNet officials, they have received numerous amounts of support requests that are related to accounts that were hacked on a span of four days.
ArenaNet advised users to choose long and random passwords that they only use on their Guild Wars 2 accounts.
According to a statement by an ArenaNet official, “If you don’t want your account hacked, don’t use the same email address and password for Guild Wars 2 that you’ve used for another game or web site. Hackers have big lists of email addresses and passwords that they’ve harvested from malware and from security vulnerabilities in other games and web sites, and they’re systematically testing Guild Wars 2 looking for matching accounts.”
One Guild Wars 2 users who just recently joined the game received an email regarding someone was trying to log in to her account using her details from China.
The player based in Norway said, “It’s been just over a week since the game launched, and I’ve now had 10 emails detailing attempts to access my account from China. I live in Europe. Thankfully, creators Arenanet make players confirm login locations via email, so all these hacking attempts have failed.”
Google is backing words with actions, as the search engine giant is set to award cash prizes to everyone that could successfully exploit their Chrome browser.
Last Wednesday, Google announced the Pwnium 2 project. Pwnium 2 is a contest that will award $60,000 for whoever it is that can exploit their Chrome and Chromium browsers.
According to Google, this contest will be held in Malaysia this October in the Hack In The Box security conference. For those who can partially exploit the browser, Google is going to award them $50,000. While a non-Chrome exploit in Windows, apps and Adobe Flash on the other hand will fetch the hacker $40,000.
According to Google software engineer Chris Evans, “You may have noticed that we’ve compressed the reward levels closer together for Pwnium 2. This is in response to feedback, and reflects that any local account compromise is very serious. We’re happy to make the web safer by any means – even rewarding vulnerabilities outside of our immediate control.”
The company is set to award a handful of individuals the prize. Their threshold will be $2 million. If that is reached, the contest will be over.
Prepare you hacking abilities and test your mettles in the Pwnium 2!
No matter how many times people are reminded to make sure that their passwords are strong and distinct, they still disregard this and create passwords that are weak and can easily be hacked.
But, circumventing the defenses to enter your account is something that we should also be wary about, since tough and strong passwords do not need to be broken to gain access to your vital information and files.
Wired reporter Mat Honan experienced this, as an Apple tech support was able to allow a hacker to have access to the former’s iCloud account.
Honan’s Gmail account, Twitter account and Gizmodo’s Twitter account were all breached. Honan gave a timeline to the hack. He said that the hacker wiped his iPhone at about 5 PM, wiped his iPad at [5:01] and wiped his MacBook air at [5:05] all done remotely.
Honan said in his blog, “I know how it was done now. Confirmed with both the hacker and Apple. It wasn’t password related. They got in via Apple tech support and some clever social engineering that let them bypass security questions.”
His Gmail and Twitter accounts are now back online but unfortunately, he is still working on retrieving his files from his Apple devices.
Are your passwords strong enough? Can passwords really protect us from hackers then?
A mobile security firm has discovered that a malicious software that was specifically created to download to Android phones from infected sites.
Named the NotCompatible, this hides from an updated file that automatically downloads itself. Though it does this, it still needs permission from the user before it starts installation.
Once installed in the device, the malware acts as a TCP relay that can use its host as a mask to send traffic like a proxy.
Infected sites URL’s have not been made public as of the moment as is the real number of those infected by the malware.
Symantec says that this number could easily reach thousands of sites.
Security firm lookout is suggesting that these attacks may be targeted to enable anonymous hosting for criminal activity. They say that it’s a “well-written and stable” code.
According to co-founder and CTO of Lookout Security Kevin Mahaffrey, “There are a couple of ways [the hackers] can profit from this. One is general online fraud. The other is targeted attacks against enterprises.”
He added, “This is the first time that [hackers] have used legitimate websites to serve Android malware. We see Android malware all the time, but it’s usually served using social engineering.”
Hackers may soon find a new way into getting personal and sensitive information from you without you noticing it.
A group of researchers have created a malware that is able to read passwords, your phone numbers and other sensitive data in your phone using your device’s built-in motion sensors.
According to Zhi Xu of Pennsylvania University, “The fundamental problem here is that sensing is unmanaged on existing smartphone platforms.”
He warned smartphone users that there is a risk from your phone’s integrated motion sensors. He added that this cannot be corrected unless the OS developers will do fundamental changes to it.
The “TapLogger” app brands itself as a game of Androids. What this app actually does is monitor your reading by the phone’s built-in accelerometer, gyroscope and orientation sensors to infer phone number and other digits that are entered into the device.
Xu added, “TapLogger shows that those unmanaged ‘insensitive sensors’ can really be used to infer very sensitive user information. Inspired by TapLogger, we believe that more and more sensor-based attackers will be introduced in the near future.”
The TapLogger app works by using your phone’s motion sensors to record changes of orientation as a user enters numbers to unlock your phone, when you dial a number or provide your social security information during a call.