Tag

Hack

Browsing

unCAPTCHA Google reCAPTCHA

The AI-powered unCAPTCHA system designed by University of Maryland reseachers can now defeat Google’s latest audio-based reCAPTCHA challenges with 90% accuracy. Simply put, the unCAPTCHA system downloads the audio challenge, splits it into several clips, then runs them through several text-to-speech systems to determine exact and near-homophones, weighing the aggregate results by confidence level before sending the most probable answer back to Google. Read more to see the first version in-action.

White Hat Hacker Teenager

Photo credit: BBC
Sam Curry, an 18-year-old student in Omaha, Nebraska, has tinkered with computers from a young age, but not in the way most use them. As a sophomore in high school, he found a way into the system that allowed him to pose as an administrator, meaning that he could have changed student grades, but Sam just wanted to enter the network as a prank. Subsequently when school administrators found out, he was suspended for two weeks. The next time he discovered a security vulnerability, he reported the bug to the high school administration instead of exploiting it, and received a $50 gift card to Subway as a reward. Since that time, he’s earned more than $100,000 from legally hacking well known institutions including the U.S. Department of Defense, Valve, and Yahoo. Read more for a video interview and additional information.

PlayStation Classic Hack

Sony’s PlayStation Classic was heavily criticized for using the European versions of the 20 included games, mainly because they’re slower due to the PAL television standard, which has a refresh rate of 50 Hz. Now, the miniature console has been hacked to run the games that should have came loaded with it. Since the device is basically an ARM-powered mini PC running an open-source emulator, BleemSync (or gpghax) lets you run any PS1 game you want off a USB drive. This software modifies the PlayStation Classic’s game database to enable one to swap out games with new ones. Simply put, the steps involve modifying the console’s database file to add your desired game(s), load that on a pen drive and then copy your desired game(s) onto it. Read more for another video tutorial and additional information.

PlayStation Classic Secret

Sony’s PlayStation Classic may not have lived up to the hype, but for those who did pick one up, there’s at least one hidden Easter egg that we know of, and it’s fairly easy to access. Simply plug in just a compatible USB keyboard (Apple, Logitech and Razer keyboards confirmed to be incompatible), press the ESC button, and you’ll be greeted with hidden settings menus. These reveal a few things about the miniature console, including that it runs the open-source PCSX ReARMed emulator as well giving users the ability to change the video output mode, complete with scan lines, and the option of playing the games using an analog controller. Read more for a full video review and additional information.

ATM Jackpotting FBI

The FBI sent a confidential alert on Friday to warn that cyber criminals are planning a global ‘cash-out scheme’ using malware to hack ATMs, also known as ATM jackpotting. The most vulnerable targets are smaller banks without sophisticated security systems. “The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach. Historic compromises have included small-to-medium size financial institutions, likely due to less robust implementation of cyber security controls, budgets, or third-party vendor vulnerabilities,” said the alert. Continue reading for another ATM jackpotting demonstration and more information.

Switch Hack Tegra

The Nintendo Switch was hacked back in February to run Linux, but now a team has revealed a flaw that enables users to run arbitrary code through an exploit of an unpatchable flaw in the console’s Nvidia Tegra X1 chip. That’s right, it’s at the silicon level of the Tegra X1 chip’s USB recovery mode, which normally prevents hardware hackers from accessing the system’s bootROM, thus the vulnerability allows for the entire ‘root-of-trust’ for the processor to be compromised. Continue reading for another video and more information.

Nintendo Switch Linux

The Nintendo Switch is a fine game console, but unfortunately, you’re not able to load your own software on it, that is unless…hacker team “FailOverflow” has gotten their hands on the device. That’s right, they managed to get a full Linux distro running on a hacked Switch, complete with touchscreen support, web browser, as well as a GPU-powered demo application. Continue reading for another video and more information.

Mercedes Keyless Entry Hacked

What you’re looking at above is newly released security footage that shows a Mercedes-Benz C-Class being stolen in the British town of Solihull. The two perpetrators approach the car with two relay boxes, and these little devices are reportedly able to receive the signals from a keyless remote through walls, doors, and even windows. Once the signal is captured, it’s automatically transmitted through to a second box being held near the car, thus opening its doors. Continue reading for another video and more information.

DIY iPad Holder

Photo credit: Bored Panda

Wall hooks are great for hanging clothes, pictures, and apparently, tablets as well. For those who want to watch their favorite videos in the shower, provided you have a water-resistant case, there’s specialized hooks for that job too. That is just one of the many everyday life hacks that you can actually use on a regular basis. Continue reading to see more. Click here for a few bonus life hacks.

Equifax Hack

Equifax, a provider of consumer credit scores, announced today that a hack exposed the personal details of potentially 143 million U.S. consumers between mid-May and July. Cyber criminals allegedly accessed details, including names, social security numbers, and, in some cases, driver’s license numbers by exploiting a U.S. website application Plus, credit card numbers of around 209,000 U.S. consumers and certain dispute documents with personal identifying information of around 182,000 U.S. consumers were accessed. Continue reading for the news report and more information, including a link to check yourself.