Jim Stickley of Stickley Online Security uses his handy $8 Utili-Key to open a locked hotel safe at the Horseshoe Hotel in Bossier City, LA. He unscrews the nameplate on the safe, which reveals a physical lock. He then unbends a paper clip, wiggles it around for a while, and viola! the safe is open. He says a thief could use this method to take something from the safe without any sign that the safe had been opened. Read the rest
Wall Street Journal columnist Geoffrey A Fowler: "There’s a fight brewing between giant tech companies and tinkerers that could impact how we repair gadgets or choose the shop where we get it done by a pro. At issue: Who owns the knowledge required to take apart and repair TVs, phones and other electronics?" Read the rest
Self-proclaimed Ashley Madison hackers the Impact Team today released what looks like another 20 gigabytes of ill-gotten data. The just-dropped “other shoe” includes emails from the cheater-dating website's CEO.
A phone slams into an acoustic coupler on the desk. Screeching beeping sounds. Two people sitting side-by-side in front of a computer. One is a socially awkward nerd. The other is cooler, but dumber.
The nerd types something really fast on the keyboard. A rotating Necker cube appears on the green monochrome monitor. SECTOR-INFILTRATE SEQUENCE INITIATED. We see rapidly scrolling strings of hexadecimals reflected in the nerd's wireframe glasses.
They stop scrolling, and begin to disintegrate, and are replaced by a jolly roger. "HA HA HA!" it says, lower jaw cycling.
"We're in," says the nerd, grinning. "How did you do that!?" interrobangs the cool person. Enjoy this supercut of computer hacking scenes from the 1980s.
"Hacking Team" is a badly-named security contractor that helps governments spy on activists and journalists. It got hacked, badly, and more than 400GB of its data is now public.
Widely shared online, the stolen data includes a list of the countries that have bought Hacking Team's main surveillance tool, Da Vinci, and emails suggesting intelligence agencies use it to spy on activists and journalists. The list includes: Azerbaijan, Chile, Egypt, Kazakhstan, Russia, Saudi Arabia, Spain, Sudan.
… Confirmation of the breach came via the Twitter account of Hacking Team engineer Christian Pozzi.
"We are awake. The people responsible for this will be arrested. We are working with the police at the moment," he said in one message.
Soon after, this and other messages about the breach were removed as Mr Pozzi's Twitter account was deleted.
What better outcome for this company than tweeted authoritarian outrage, sputtering its way into the memory hole. Read the rest