War texting is something that [Don] Bailey demonstrated earlier this year
with personal GPS locators. He demonstrated how to hack vendor Zoombak's
personal GPS devices
to find, target, and impersonate the user or equipment
rigged with those consumer-focused devices. Those low-cost embedded
tracking devices in smartphones or those personal GPS devices that track
the whereabouts of your children, car, pet, or shipment can easily be
intercepted by hackers, who can then pinpoint their whereabouts,
impersonate them, and spoof their physical location, he says.
looks at talk at the upcoming Black Hat conference
What he found is that the batteries are shipped from the factory in a state
called "sealed mode" and that there's a four-byte password that's required
to change that. By analyzing a couple of updates that Apple had sent to fix
problems in the batteries in the past, [Charlie] Miller found that password and was able to put the battery into "unsealed mode."
From there, he could make a few small changes to the firmware, but not what
he really wanted. So he poked around a bit more and found that a second
password was required to move the battery into full access mode, which gave
him the ability to make any changes he wished. That password is a default
set at the factory and it's not changed on laptops before they're
shipped. Once he had that, Miller found he could do a lot of interesting
things with the battery.
on a Black Hat talk about Apple laptop battery vulnerabilities
Stage 1 (hiding): All participants registered for the backdoor hiding
game are given a set of requirements for a software program. Before the
deadline, they must submit the source code for a program that fulfills
these requirements plus includes a backdoor. They must also send a
description explaining how to exploit the backdoor.
Stage 2 (finding): All players registered are given a bundle with the
different pieces of source code. To each bundle the organizers will add
a few placebos (source codes that fulfill the requirements but should
not include a backdoor). Before a deadline, the players must answer for
each source code if they believe it includes a backdoor or not.
-- The 2nd Open
Backdoor Hiding and Finding Contest
to be held at DEFCON 0x13
This archive contains 18,592 scientific publications totaling
33GiB, all from Philosophical Transactions of the Royal Society
and which should be available to everyone at no cost, but most
have previously only been made available at high prices through
paywall gatekeepers like JSTOR.
protests the charges against Aaron Swartz
to post comments)