hacked

Latest

  • Windows 7 Activation Technologies Update coming down the pike, will tell you things you (should) already know

    by 
    Darren Murph
    Darren Murph
    02.11.2010

    Wondering why your PC has been infested with malware, random popups, intermittent shut downs and all sorts of other atypical garbage since the day you installed that downloaded copy of Windows 7? In case you aren't capable of determining that your copy of Windows isn't genuine (as in, you didn't buy it from a legitimate source), Microsoft is about to lend you a serious hand. In the "coming days," the software behemoth will be pushing out a new update for Windows Activation Technologies, which will look for over "70 known and potentially dangerous activation exploits." It sounds as if the update is intended to alert folks who purchased complete PCs from the back of their local White Van that they may have gotten ripped off, but either way, we're not particularly stoked about having yet another item running in the background, consuming system resources and telling us that we've been naughty. Thankfully it's a voluntary update, but keep your eyes peeled if you don't want to okay the installation accidentally. [Thanks, Troy]

  • Moto CLIQ hacked to enable FM radio, easy listenin' coming soon

    by 
    Tim Stevens
    Tim Stevens
    01.28.2010

    We wouldn't rate the ability to tune FM radio highly on our wishlist of missing features on Motorola's CLIQ, but nonetheless an Android tweaker by the name of Eugene has figured out how to deliver it. The necessary receiving hardware for pulling down the Weekly Top 40 was actually there all the time, Eugene just needed some binary files -- and to believe. Once he believed hard enough, clapped his hands, and copied over those files, presto he was groovin'. He hasn't released a working version of his tweak to the world just yet, but we presume that will be coming soon enough.

  • PS3 finally properly hacked?

    by 
    Tim Stevens
    Tim Stevens
    01.23.2010

    In a post titled "Hello hypervisor, I'm geohot," hacker George Hotz (already known in the iPhone community) has made a strong claim: that he has cracked the PS3. The system has remained (mostly) uncompromised for over three years now, with a few exceptions here and there. But, this one pledges full read/write access to the entire system memory and complete control over the processor -- all without a mod chip. Has he really done it, if so how, and what comes next? That all remains to be seen. This exploit supposedly "isn't really patchable, but [Sony] can make implementations much harder," meaning he isn't tipping his hat until he's ready, because once he does the never-ending firmware update war begins, and as we've seen on the PSP, Sony can really knock out those updates. [Thanks, Deepak]

  • Help! My account has been hacked!

    by 
    Robin Torres
    Robin Torres
    01.21.2010

    There are so many scams going around like the Catclysm Alpha invite and the WoW Armory phishing site, that people's accounts are getting stolen more than ever. With all of the work that Blizzard has to do to keep up with the problem, it's no wonder they are offering the fast solution of care packages. We've talked about how to avoid scams as well as how to protect yourself. Here is a guide as to what to do if your account gets stolen. Important note: The following guide assumes that you have not put an Authenticator on your account. There are no confirmed cases of accounts being stolen if they are protected by an Authenticator.

  • Microsoft patches IE security hole, human rights activities fully resume

    by 
    Darren Murph
    Darren Murph
    01.21.2010

    Ready for an update? Good. If you're still using Microsoft's Internet Explorer (versions 5.01 to 8) for some inexplicable reason, there's a patch that you should probably install on the double -- that is, if you're a hardcore human rights activist that just might end up on a Chinese hit list. All kidding aside, the devs in Redmond have broken free from their usual monthly update cycle in order to push out a patch to fix the hole that was exploited by a group of sophisticated hackers last week. Refresh that Windows Update if you're scared, or -- you know -- just download one of the many other free web browsers that are far, far superior to IE.

  • Droid gets overclocking, Nexus One gets tethering, Android hackers get mad props

    by 
    Tim Stevens
    Tim Stevens
    01.09.2010

    If there's one problem with Motorola's Droid it's that the battery life is just too long. We can almost make it through an entire day without a recharge and really, who wants that? Thank goodness there's a hack to enable an extra 50MHz boost, bumping the Droid up to a full 600 and, according to at least one user, significantly decreasing stability in the process. We'll go ahead and skip that one, but on the more alluring side there's a new add-on to the (already rooted) Nexus One that enables wired or wireless tethering. It's not a full ROM but does entail a kernel update, and as always these things can go horribly wrong if you don't know what you're doing. Not sure if you know what you're doing? Chances are you have your answer.

  • Nexus One gets a custom ROM

    by 
    Joseph L. Flatley
    Joseph L. Flatley
    01.08.2010

    It's been but a week since the gang at Modaco rooted the Nexus One -- and what do we have here? A quick visit to the self-same forums today has revealed that the handset has a new custom ROM. Based on the 22607 release (in case you're curious), this bad boy sports many new and exciting features, including the Nano 2.09 text editor, wireless tether, Titanium Backup, Busybox 1.15.3, and more. Feelin' adventurous? Hit the source link to give it a go. And make sure you drop us a line and let us know how it goes. (You don't think we're going to be the first to try it, do you?) [Thanks, Jules]

  • Nexus One rooted already?

    by 
    Ross Miller
    Ross Miller
    12.30.2009

    No, you still can't have one (not yet, at least), but we've received a number of tips directing us Modaco forums, where admin Paul claims to have rooted Google's not-so-mysterious Nexus One. We can't validate the "superboot" file works, but the adjacent picture has popped up from another forum member as apparent anecdotal confirmation. Instructions for Windows, Linux, and OS X users can be found along with the necessary materials. What do you say, hacker community, any chance we can get multitouch loaded into the device before it ever becomes official to the world at large? [Thanks to everyone who sent this in]

  • Motorola Cliq gets rooted by the Dude

    by 
    Tim Stevens
    Tim Stevens
    12.23.2009

    Sick of Motorola meting out Android firmware updates when it chooses? Trust in The Dude -- TheDudesAndroid, to be specific, a user over at ModMyMoto who has posted The Dudes Root for Cliq (following up an earlier and similarly unkempt version for the G1). The install process looks about as complicated as you might expect, so make sure you keep Walter away while you're re-flashing lest your handset go all nihilistic on ya. At this point it's just another 1.5 ROM being installed, but the hope is for a 2.1 port coming in the not too distant future. Unless you're really pining to get full control over your handset we'd go ahead and wait for that version of the Dude to abide. Update: The Dude mentioned in comments that credit is also due to fellow Android magicians danation, Skilrax_CZ, and others. We can't think of any funny movie references for those names so we'll just leave it at that. [Thanks to everyone who sent this in]

  • Motorola Droid now just a (hacked) firmware update away from WiFi tethering

    by 
    Tim Stevens
    Tim Stevens
    12.23.2009

    Add one more item to the "Droid does" column -- unofficially, at least. WiFi tethering from Motorola's hottest is now possible straight from the phone itself, over WiFi even. PDANet already enabled the thing to share its connection, but relies on an external driver installed on a Windows or Mac device. This latest fix does away with that, but does require the installation of a hacked version of the 2.0.1 firmware. The process, laid out at the read link by DroidForums.net user webacoustics, doesn't sound that bad, but warnings like "if your phone stays at the white Motorola logo for longer than a minute or two, you probably bricked [it]" will leave many users sticking with PDANet or waiting for the official Verizon solution -- and paying out the nose for it.

  • Google Maps Navigation hacked for extra-American use

    by 
    Vlad Savov
    Vlad Savov
    11.23.2009

    Guess what, prospective Milestone owners, the Droid's one major advantage over its Euro cousin has just been coded out of existence by those proactive, un-American XDA Developers. The free Google Maps Navigation service, whose US announcement was so shocking as to decimate the stock prices of satnav purveyors Garmin and TomTom, has now been ported to work outside the land of the free as well. Not only that, but you can use the app on other Android devices, meaning your old G1 can get a breath of fresh air for absolutely free. That is if you don't count the time it takes you to learn how to insert all the code properly and the risk of bricking your device in the process. But we know our readers eat iron nails for breakfast and fashion elegantly optimized code before lunch, so we expect all of you to be using this by day's end, you hear?

  • iCombat's stats on app pirates

    by 
    Mike Schramm
    Mike Schramm
    05.15.2009

    Miguel Sanchez-Grice, creator of the iCombat app (a remake of the old Atari game), sent us these stats on piracy of his app after writing a blog post about the same thing, and I find them fascinating. Instead of building DRM into his app, he just detected if the player was using a copy that wasn't from the App Store, and then forwarded them onto a web page that he could track. It seems like he equates unique visitors to his Pinch Media site as users (though he doesn't go into detail about exactly where those "Pinch Media New Uniques" numbers come from), and then subtracts legit app sales from those numbers to get the number of pirates. And while he says the numbers are lower than he expected, they seem pretty high to me: there is a substantial number of people out there using cracked apps.

  • VHS casette hacked into USB drive? Yes, please

    by 
    Laura June Dziuban
    Laura June Dziuban
    04.22.2009

    Don't bother asking questions, just admit to yourself that you really might want one (if not several) of these. Using very few materials, you can make yourself a USB storage device which looks just like a VHS tape with a giant wire sticking out of it! It's not a terribly complicated affair -- connecting the USB cable to a thumb drive inside the tape, some simple circuit board wiring -- and presto! If you're willing to spend three or four hours and around $10-15 a pop, you could finally make use of your lonely, disused 227 collection. Check out an informative, educational video of the process after the break.

  • Sony PSP hacked for use as PC status monitor

    by 
    Darren Murph
    Darren Murph
    03.31.2009

    No money for a secondary display? No use for that worn-down PSP? There's hope for the future, friend. Hacker avi has discovered that Sony's handheld makes for a wonderful status monitor, providing a clean look at your PC's CPU usage, memory allocation and system temperature levels. All you'll need is a bit of training in Python, Lua for the PSP and a sister willing to stop watching UMD movies long enough for you to give this a go.

  • Account security is your responsibility, not Blizzard's

    by 
    Amanda Miller
    Amanda Miller
    02.27.2009

    PlayNoEvil recently published an article explaining why they think it is that hackers target gamers by stealing their passwords and other account information. While there is some truth in the premises offered, articles like this one only serve to fuel conspiracy rumors and encourage players to think of themselves as victims rather than take responsibility for their own account security. Gaming companies do place some of the blame for a compromised account on the account holder, and for good reason. The hacker certainly didn't gain access to your computer because of their actions, and their computers that store your information are as yet untouchable.The browsers you use, sites you visit, firewall settings, anti-virus software and update practices are just a few of the ways that you contribute to your own hacking experience. Sharing your account information with your lover, best friend and mother may sound safe, but you don't control the security of their computers, or their friends' computers. The majority of people I know who have been hacked signed into their accounts on their sibling's computer or a publically shared machine. In fact, NASA ended up with a keylogger targeted at gamers on the International Space Station. It traveled aboard on the laptop of one of the astronauts. You just can't trust any computer that isn't your own.It may be hard to hear, but a hacked account is because of something you did, whether it was an unfortunate stroke of luck, such as stumbling onto a redirect on a legitimate website in the small window before the site addresses it, or a serious oversight in security on your part.

  • iPhone robot is ambulatory, still wants physical keyboard

    by 
    Laura June Dziuban
    Laura June Dziuban
    11.06.2008

    Robots are awesome, we can all probably agree on that. Robots made from iPhones are basically an extension of that awesomeness, crossed with an element of unimaginable, ludicrous fun, which is why we're pleasantly surprised to see that such a device finally exists. Using a jailbroken iPhone 3G running some Ruby code, an Arduino CPU, a TA7291P motor, and 4 AA batteries, the creator is able to pilot the bot via WiFi from a nearby computer, all the while recording its view for later playback. The results look pretty cool, and trust us, you're definitely going to want to check out the video after the break. As far as we can tell, by the way, the lyrics to the song in the video are "iPhone with keyboard," which seemingly refers to this, um... iPhone with keyboard we saw earlier today -- apparently from the hands of the same craftsman, who seems like a very busy guy. Especially if he wrote the song! [Via iPhone World]

  • Jailbroken iPhone 3G gets external keyboard, says "Hello"

    by 
    Laura June Dziuban
    Laura June Dziuban
    11.05.2008

    If you're one of those people always complaining about the iPhone keyboard (the lack of one, that is), then this is probably a vital piece of news, even if it's not totally practical. Or practical in any way, actually. Some very enterprising citizen of the world seems to be running a chunk of Ruby code on his jailbroken iPhone 3G, which allows it to recognize what appears to be a Palm / Visor external keyboard connected via a custom cable. The results of this intense bit of modification? Well -- not much, honestly, but it's still kinda cool. "Hello Keyboard," indeed. Check out the video of it in action after the break. [Thanks to everyone who sent this in]

  • DSi already hacked, greets us with a lusty 'Hello World!'

    by 
    Joseph L. Flatley
    Joseph L. Flatley
    11.04.2008

    We love those two magic words: "Hello World!" It's not even been a week since the DSi's Japanese launch and someone has hacked the handheld, stirring up all our homebrew dreams in the process. The coder in question has yet to release any specifics, but the touchscreen seems to be blank (you can make of that tidbit what you will). Exciting, yes? Still, until any other details emerge we're inclined to be a little skeptical. Just a little. In the meantime, be sure to catch the glorious video of the event after the break.

  • WoW Insider Interview: Blizzard speaks about Authenticator security

    by 
    Mike Schramm
    Mike Schramm
    09.18.2008

    About a month and a half ago, we reported on the story of a player who had apparently gotten their account hacked while they were using the new Blizzard Authenticator key, and it raised a lot of questions in players' minds about the only hardware Blizzard's ever made: just what does the Authenticator do to protect players' accounts? Have Authenticators actually prevented accounts from being hacked? And what would it take to, through social engineering or other methods, actually remove an Authenticator from an account?At the time we published that first story (which was later disputed by a customer support representative), Blizzard contacted us here at WoW Insider, offering to clear up players' concerns about the new keys. We quickly submitted to them a few questions pulled from our own writers and a few submitted by readers, and they've now returned the answers to us -- you can find Blizzard's answers to our questions about the Authenticator after the break. Thanks to Blizzard for answering our questions about how these keys work, and clarifying some of the issues around their security.

  • Hackers hit LHC computer system, deemed "scary experience"

    by 
    Donald Melanson
    Donald Melanson
    09.12.2008

    Those already fearful of the Large Hadron Collider's potential Earth-ending capabilities may want to turn away for this one, as it looks like the situation has managed to get a bit more perilous, with a team of hackers apparently successful in mounting an attack on a system that is "one step away" from the computer system that controls of one of the LHC's massive detectors. According to The Telegraph newspaper, the group, calling itself the "Greek Security Team," left behind a half a dozen files on the system and damaged one CERN file, in addition to displaying the page above on the cmsmon.cern.ch website, which still remained inaccessible as of Friday. Somewhat disconcertingly, one of the scientists working at CERN simply described the incident as a "scary experience," with a CERN spokesperson further adding that they thought it was just someone "making the point that [the system] was hackable." Um, okaaaay.[Via CNET News]