Apple power adapter security flaw to be patched in iOS 7

A security flaw in Apple's iOS 6 that could theoretically allow malware to be uploaded to iOS devices via a malicious power adapter will be patched in the next version of Apple's mobile operating system, Apple said Wednesday.

The hack, dubbed Mactrans by the three researchers from the Georgia Institute of Technology who discovered the flaw, was demonstrated Wednesday at the Black Hat security conference in Las Vegas. The trio announced in June that they had developed a proof-of-concept that showed how a malicious iPhone charger lets them hack into the mobile device running the latest version of … Read more

ATM hacker Barnaby Jack dies

The computer-security community is in mourning following news that superstar hacker Barnaby Jack died on Thursday. The San Francisco resident was 35 years old.

The New Zealand native was the director of embedded device security at IOActive, a Seattle-based security evaluation company. He rose to prominence beyond the hacker community in 2010 when he demonstrated what he called "jackpotting" an ATM. He dragged two ATMs on-stage in front of a rapt audience, and then forced them to spew fake cash into the air.

The demonstration had been highly anticipated, delayed by a year after an ATM vendor pressured … Read more

Phishing scam piggybacks on Apple Dev Center hack

The recent attack against Apple's Web site for developers has prompted a flood of phishing e-mails asking people to change their passwords.

Users have taken to Twitter to warn others of the attacks. But as convincing as the e-mail might be at a glance, grammar mistakes, a missing capital letter in "Apple," and a fake Apple domain for the Web site the e-mail points to mark the message and the site as bogus.

Still, scammers often use emotional responses to a recent event to induce panic in users -- which may make them less likely to double-check … Read more

Man forces lover to beat video game before getting proposal

The subject of love bedevils us all.

Yet once you've found it, how do you propose to the woman with whom you want to spend your doddering dotage?

For one gamer, there was an absolute solution: create a game that she would have to play to the end to win his heart.

I am tearfully grateful to Kotaku for revealing the tale of EquinnoxX, a passionate gamer.

He decided to meddle with a Contra cartridge in order to create the perfect proposal for his one true love.… Read more

Feds accuse five men of largest U.S. hacking scheme

Five men have been accused by the U.S. government of perpetrating the largest hacking scheme ever prosecuted in the United States.

Court documents revealed Thursday in federal court in New Jersey said the five men from Russia and Ukraine were able to hack into the computer systems at the Nasdaq, J.C. Penney, 7-Eleven, and JetBlue Airways, among other companies. Obtaining around 160 million credit and debit card numbers, the individuals allegedly were able to steal more than $300 million from at least three of the targeted companies, The Wall Street Journal has reported.

The hacking began in 2005 … Read more

'Digital carjackers' are the worst sort of backseat drivers

Our vehicles are becoming more like consumer electronics -- more like mobile computers on wheels -- and a pair of "digital carjackers" demonstrated what happens when all of the tech beneath the sheet metal falls into mischievous hands.

More and more components of modern vehicles have begun to fall under the control of computers. And we're not just talking about infotainment and dashboard apps. Think about it: a modern vehicle's engine, brakes, electronic power steering, active safety systems, and sometimes even the throttle are ultimately controlled by little electronic brains somewhere behind the dashboard.

In the … Read more

Apple lays out plans to resurrect developer site, services

After nearly a week, Apple's developer Web site and most of its connected services are still unavailable.

The company on Wednesday provided a small update on its progress.

On an updated version of its downtime page, Apple laid out its plans to bring services back online, saying things will occur in three phases.

"We plan to roll out our updated systems, starting with Certificates, Identifiers & Profiles, Apple Developer Forums, Bug Reporter, pre-release developer libraries, and videos first," Apple wrote. "Next, we will restore software downloads, so that the latest betas of iOS 7, Xcode 5, … Read more

Chipotle stages bogus Twitter hack for promotional campaign

When fast-food chain Chipotle sent out a series of confusing and nonsensical tweets Sunday, it was clear the company's Twitter account had been hacked.

In fact, the chain even sent out a final tweet at the end of the day saying, "Sorry all. We had a little problem with our account. But everything is back on track now!"

However, it seemed strange when no hackers stepped forward to claim responsibility for working to topple the restaurant's Twitter feed. But it turns out that was because it was Chipotle itself that staged the hack.

That's right, … Read more

Syrian Electronic Army hacks into Viber database

The Syrian Electronic Army sent out a warning over Twitter earlier Tuesday that said, "If you have 'Viber' app installed we advise you to delete it."

The hacking group was claiming responsibility for both breaching Viber's database and defacing its Web site, according to The Hacker News.

Right after the breach, Viber's support page on its Web site displayed a banner that said "Hacked by Syrian Electronic Army" and a note that said "Dear All Viber Users, the Israeli-based 'Viber' is spying and tracking you." As of this writing, the banner is … Read more

Cyberattacks account for up to $1 trillion in global losses

While still costly, cyberattacks might not be depleting government cash at the rate previously thought.

A new joint report released Monday by security firm McAfee and the Center for Strategic and International Studies has lowered the estimate from $1 trillion in global annual losses to a range of $300 billion to $1 trillion.

The report's authors say that estimating the annual costs of cyberattacks is extremely difficult because some companies hide their losses, while others don't even know the value of what has been stolen from them.

In the new report, the authors look at losses in six … Read more