Ashley Madison is a social network for people who want to cheat on their spouses. It's been hacked and "large caches of user data posted online," reports Krebs on Security.
The privacy of some 37 million account-holders is at stake, though the bulk of the dataset is apparently being withheld and its contents remain uncharted territory.
The social network's boss, bless his stupid nylon socks, thinks that he'll be able to take their "intellectual property" off the 'net.
Reached by KrebsOnSecurity late Sunday evening, ALM Chief Executive Noel Biderman confirmed the hack, and said the company was “working diligently and feverishly” to take down ALM’s intellectual property. Indeed, in the short span of 30 minutes between that brief interview and the publication of this story, several of the Impact Team’s Web links were no longer responding.
“We’re not denying this happened,” Biderman said. “Like us or not, this is still a criminal act.”
The claimed hackers say they were motivated by the site's hypocrisy. Ashley Madison apparently had a "remove your data from our servers for a fee" wheeze going on—a practice unnervingly reminiscent of some revenge porn operators.
The Next Web's Abhimanyu Ghoshal.
The Impact Team said that the ‘full delete’ feature didn’t actually wipe profiles as advertised and that it brought ALM $1.7 million in revenue last year.
The hackers said:
Users almost always pay with credit card; their purchase details are not removed as promised, and include real name and address, which is of course the most important information the users want removed.
The Impact Team also demanded that ALM take down AshleyMadison and Established Men permanently:
Avid Life Media has been instructed to take Ashley Madison and Established Men offline permanently in all forms, or we will release all customer records, including profiles with all the customers’ secret sexual fantasies and matching credit card transactions, real names and addresses, and employee documents and emails. The other websites may stay online.
"Life is short," the site promises. "Have an affair."
The BBC reports that after two "hackers" spotted security holes in its website, United rewarded them with a million miles each.
One security expert said the scheme was a big step forward for online security.
"Schemes like this reward hackers for finding and disclosing problems in the right way. That makes the internet safer for all of us," said security consultant Dr Jessica Barker.
"Bug bounties are common in tech companies as they tend to understand online security a bit more, but other industries are catching up," said Dr Barker.
Never a good look, at least not to prosecutors.
“The U.S. government will get a rare chance to prosecute one of the world's most-wanted cybercriminal suspects with the extradition of a Turkish man accused of orchestrating a global operation to hack automated teller machines,” reports Tribune News.
Read the rest
The password management service was hacked last week, but its layers of security prevented a serious breach. Here's what users should do to make sure they're unaffected.
Tl;dr: change your master password.
LastPass says in its blog entry, “Encrypted user vaults were not compromised.” This is a critical fact because changing your master password will immediately make the stolen password information useless. If crackers had stolen vaults, they would be able to churn on them forever or return to them to the future and crack them with more advanced or powerful technology. Since people often don’t change passwords for years at a time or forever, that could have still been a risk.
LastPass also advises changing your password at any other account for which you use the identical password
If technical descriptions of how they achieved the amazing graphical feat flew over your head, this pictorial explanation makes clearer just how insane this thing is.
The idea that such multi-color trickery was possible came to me some time ago, as I was looking at reenigne's code for patching up composite CGA emulation in DOSBox; messing with that patch during development gave me a much better picture of composite CGA's inner workings. When I had ironed out the basic concept for this hack, I divulged it to reenigne for 'peer review' and for testing on real hardware. Soon enough, we had an improved recipe:
Take two familiar (though officially undocumented) tweaks. Blend to an even mixture producing a new effect.
Add one crucial new trick – an ingredient of reenigne's devising.
Test and calibrate until blue in the face.
It's also a great look at the workings of CGA for the interested but nontechnical layman.
Released at the Revision 2015 demo party, 8088 MPH is a vision of previously undiscovered possibility (a perfect entrypoint to the 19A0s!)—there's even MOD music, including digital samples, at 6:40m, like it's just no big deal at all to do that with 1981 hardware
It's not so much that the scammers themselves are becoming better at their jobs, just that off-the-shelf scripts are so much more powerful
According to a leaked NSA document, the spy agency can snoop on personal iPhone communications
such as SMS messages, location and cellular data. Though any
device could be compromised likewise given the physical access required, the document demonstrates that the NSA a) is actually doing it, and b) is working on (and may also have successfully developed) remote hacks. Apple says it has never worked with the NSA to create a backdoor in any of its products
and is unaware of the shenanigans. [Daily Dot]
Valentin Squirelo and friends at HackerLoop built a miniature model of the flying house from UP! outfitted with a Raspberry Pi computer and floated it above Paris where it posted live photos to Instagram. This was particularly interesting because generally photos can only be uploaded to Instagram via the official iOS or Android app. HackerLoop worked around that limitation. HackerLoop's #Upstagram
You know how some media love "he said, she said" journalism? The kind in which any issue, no matter the facts or relative degrees of extremism, is narrated in perfect equilibrium between two opposed, yet indistinguishably-intractable sides. Doesn't that stuff suck? OK! Cool.
Moving on, Slate's Daniel Engber has an interesting article up today about how Democrats and Republicans all hate science just as much as one another: "Willful ignorance of science is a bipartisan value."
YouTube makes available a set of different-sized thumbnails for every video through its API, but sometimes you just need to grab 'em and go. So I made a plain-jane widget to grab what's available, at-a-glance, for any given YT URL
Yesterday, GoDaddy went down, taking with it countless hosted sites. A hacker claimed credit
, gaining the attention of the entire tech press. But his story was soon debunked
: a DNS configuration mistake was the real cause. At Threat Level, Robert McMillan recounts the greatest hacks that never were
Jason Torchinsky of Jalopnik shows how to turn old car parts into a video game controller.
The idea came to me while adjusting the mirrors in a car, and realizing that the little mirror-control joystick was better than many video game joysticks I used. I then had a waking dream of the grand possibilities of playing old videogames with control pads sourced from cars. The dream was a beautiful, fantastical vision of a world we could all achieve. I woke up hours later behind a CVS, and headed straight to a junkyard to make this dream real.
Super-sleuth readers may note that in the final project I used a seat control panel instead of a mirror controller. There's a reason for that. When I got the mirror control pads and joysticks home and tested them, I uncovered one of the auto industry's darkest secrets: the "up" and "left" directions on mirror controllers are THE SAME DAMN THING. They're wired together! Think of all the times you've thought you were adjusting your mirror up, not left, thinking you were hot shit? IT'S ALL BEEN A FILTHY LIE. So I soon learned to look elsewhere. Luckily, 70s-80s American cars provided the solution, since they're full of funny little chrome joysticks for seat controls and other various duties.
How to turn old car parts into a video game controller
To avoid a return to work, an unemployed Austrian man apparently sawed his own foot off
to stop people rooting
their PlayBooks are failing
. But it will keep trying! Because sunk costs aren't just about money, you know!
The next time you log into your Sony Playstation Network account, the company is going to ask you to click through a EULA whereby you promise not to sue them in a class action
if they get hacked again, even if they're negligent, and even if you get screwed over as a result. If you don't agree, no more PSN for you. (Thanks, @sickkid1972!
At Macworld, Lex Friedman looks at recent reports of hacked iTunes accounts, where hundreds of users say gift card credit was wiped out by purchases made without their permission. Apple is issuing refunds, but is otherwise mostly silent on the matter.
This is a mystery story, but it’s not a great one. A great mystery generally involves a detective who gathers the evidence, performs an investigation, and finally issues the spectacular reveal: the motive, the guilty party, and—if all goes well—the punishment. In the mystery of the Towson Hack, unfortunately, we’ve got a crime, evidence, and a motive, but no justice, and no real resolution. Consider yourself warned.
The Towson Hack: The mystery of vanishing iTunes credit