Tag Archives: Hack

‘Live’ TV Piracy Watermarking Defeated by Devices Sold on eBay

“So-called ‘HashCode removal tools’ work in near real-time to strip away any kind of visual marks from a video feed. This ranges from unique fingerprints right down to the broadcaster’s on-screen logo that’s so familiar on many channels, both helping pirates to cover their tracks,” [Irdeto] explains. – Andy, TorrentFreak https://ift.tt/2lyqLNo
Advertisements

Comcast website bug leaks Xfinity customer data

Only a customer account ID and that customer’s house or apartment number is needed — even though the web form asks for a full address. That information could be grabbed from a discarded bill or obtained from an email. In any case, a determined attacker could simply guess the house or apartment number. – Zack Whittaker, ZDnet https://ift.tt/2ICpv5y

Every Nintendo Switch Can Be Hacked, And The Tools Just Went Public

Hilariously, Fail0verflow points out that you can use a simple piece of wire to bridge Pin 10 and Pin 7 on the console’s right Joy-Con connector. They’ve also linked to a 3D-printable accessory that can be created in tandem with a micro-USB connector. It’s only a few short steps, and acts as a “permanent” solution since the exploit needs to be executed at every boot. For now. – Jason Evangelho, Forbes https://ift.tt/2HWbIHw

YouTube hack hits popular music videos, causes biggest video ever to disappear

The most-viewed YouTube video of all time, Luis Fonsi and Daddy Yankee’s “Despacito,” disappeared from YouTube today after being defaced by hackers. The video’s image was altered and replaced with a masked gang holding guns (from Netflix show Casa de Papel), and the description was changed by hackers calling themselves Prosox and Kuroi’sh. – Tom Warren, The Verge https://ift.tt/2qjgpDL

In just 24 hours, 5,000 Android devices are conscripted into mining botnet

The previously unseen malware driving the botnet has worm-like capabilities that allow it to spread with little or no user interaction required, researchers with Chinese security firm Netlab wrote in a blog post published Sunday. Once infected, Android phones and TV boxes scan networks for other devices that have Internet port 5555 open. Port 5555 is normally closed, but a developer tool known as the Android Debug Bridge opens the port to perform a series of diagnostic tests. Netlab’s laboratory was scanned by infected devices from 2,750 unique IPs in the first 24 hours the botnet became active, a figure that led researchers to conclude that the malware is extremely fast moving. – Dan Goodin, Ars Technica http://ift.tt/2E4H641

12,000 Social Media Influencers, Mostly Women, Exposed by Marketing Firm Data Breach

UpGuard’s researchers discovered the database in early January and were able to quickly linked it to the Octoly, a French company which maintains a virtual office based in Manhattan. Octoly’s Amazon server was publicly accessible, meaning virtually anyone could view its contents without a password. Securing the data proved challenging. Compared to most companies whose sensitive data has been unearthed in this way, Octoly was strikingly slow to respond. – Dell Cameron, Gizmodo http://gizmo.do/RofBd82
« Older Entries Recent Entries »