Google Glass has been out for less than a month, but newfound owners are already wondering how they can break it, hack it, and make it work in ways that, perhaps, don’t fulfill Google’s vision for Glass. Enter Jay Freeman, who hacked and rooted his Glass while he ate dinner with friends.
Either it’s right on time or two hacks too late. Twitter is reportedly testing its two-factor authentication system before releasing it — incrementally according to Wired — to users.
Lookout Mobile Security, a security research firm, has discovered a new Android-based malware family dubbed — in what must be considered one of the more apt names for more malware — “BadNews.” And it is, truly, bad news: the affected applications, according to Lookout, have been downloaded 2,000,000 to 9,000,000 times from the Google Play store.
NPR’s web publishing system, along with its social media accounts, were compromised late Monday night by a group supporting embattled Syrian President Bashar Al-Assad. The group, calling itself the “Syrian Electronic Army,” claimed credit for incident which resulted in several headlines being rewritten as “Syrian Electronic Army Was Here.” The headlines popped up across the public news provider’s main and affiliate websites.
Matthew Keys, the now-suspended Reuters deputy social media editor accused of assisting the hacking conglomerate known as “Anonymous,” has gotten himself two lawyers and a defense.
Matthew Keys, 26, former web producer and current social media editor for Reuters, has been charged by the Department of Justice with assisting the hacker collective “anonymous” with defacing the Los Angeles Times website in December 2010. Keys faces up to 25 years in prison if convicted on all three charges. He also faces a fine of $250,000 for each charge.
What appears to be personal details of up to 20 public figures have been posted online. In what appears to be a connected incident, credit record firm Equifax has confirmed records for four people have been accessed unlawfully.
In the United States, the police have always been allowed to search and inspect any item a suspect may be carrying on their person at the time of their arrest. These searches typically turned up little due to the limits of what a person can carry. Enter the cell phone, which can often give officers of the law access to every little embarassing detail in cell phone user’s life.
The phone numbers, emails, and email subject lines of users who contacted three major Internet companies for support have been compromised after hackers infiltrated Zendesk’s system. The three customers: Twitter, Pinterest and Tumblr, according to a Wired report.
The Chinese government says claims the country’s military is running a major hacking operation lack technical merit. A spokesman said that by the logic of a report pointing the finger at China, the US is the world’s biggest hacker.
President Barack Obama signed an executive order to boost security for corporations and companies critical to the United State infrastructure. Obama’s signature on the order has some Internet-rights advocates worried the U.S. government may rekindle its efforts to pass the Cyber Intelligence Sharing and Protection Act (CISPA) — a bill which, they argue, would have violated the privacy of consumers.
Emails of several of the Presidents’ Bush’s family and friends were hacked by Guccifier. The emails revealed personal family correspondence concerning the elder President Bush’s health and the younger President Bush’s self portraits. Apparently the hacker “only” obtained personal family information and not national security secrets. Still revealing personal family emails about President George H. W. Bush’s failing health that feels incredibly intrusive.
The New York Times claims that it suffered a major hacking operation, and was infiltrated by what appears to be Chinese hackers over the last four months, according to a report published by the Times on Wednesday, January 30th. The hackers were apparently retaliating against the international news organization for its critical story of new Chinese prime minister Wen Jiabao’s wealth, and gained access to the passwords of every Times employee. Especially targeted were the journalists who wrote the story on Wen and his family.
Fancy new encryption methods and the promise of 50 gigabytes of free space has lured many to Kim Dotcom’s new site, Mega. Dotcom’s new file-hosting website, launched on Sunday, was greeted with a level of hype and fanfare rarely seen outside of an Apple launch. It’s too bad then that Dotcom’s brand-spanking new site, billed as “the privacy site,” has hole upon hole in terms of security.