Skype exploit reveals user IP addresses

A simple Skype exploit can reveal IP addresses -- remote and local -- of any user.

A blog post by skype-open-source runs through the process of obtaining a user's IP address. Essentially, all a person has to do is start the process of adding a contact with a specific user name. Instead of sending a contact confirmation, the person can click on the information card to obtain the IP address of that particular user.

The process only works if the other user is online. The only method of protecting against this is to log off of Skype when you'… Read more

Jailbroken iPad 2, iPhone 4S running iOS 5.0.1

The fight to jailbreak Apple's A5-chip-powered devices, specifically the iPhone 4S and the iPad, is nearing its end. Hacker "pod2g" and his crew of iOS exploit seekers have released photos and videos of a jailbroken iPhone 4S and a jailbroken iPad 2, both running iOS 5.0.1.

The most compelling proof that an A5 jailbreak is close comes in the form of a video from pod2g and the Chronic Dev Team (via iDownloadBlog). The jailbreak, performed on the iPhone 4S, is completely untethered and seems to be working great.

Backing up the show of the iPhone … Read more

New zero-day vulnerabilities found in Adobe Flash Player

When it comes to malware exploits, Adobe's Flash and PDF software can't seem to catch a break recently.

Recently a vulnerability was found in both Mac and Windows versions of Adobe's Acrobat and Reader products that could allow an attacker to crash the programs and gain control of the system. So far only attacks on Windows machines have been found, but Mac systems could be affected as well.

Now two similar vulnerabilities have been found in Adobe's Flash Player, which likewise could result in arbitrary code being executed on the system.

Computerworld is reporting that the … Read more

Security threat in Reader and Acrobat poses threat to Macs

Yesterday Adobe released a security bulletin that discusses a new attack which is targeting a flaw in its Acrobat and Reader programs.

The flaw affects both version 9.4.6 and 10.1.1 of its Reader and Acrobat programs, on all supported platforms, which include both Windows and Macintosh PCs.

Described only as a "U3D memory corruption" vulnerability, if the attacker takes advantage of it by releasing a compromised PDF document that when opened causes the target system to crash, it allows the attacker to take control of the system. Adobe does not go into any additional … Read more

The 404 960: Where we tweet from our seats (podcast)

Leaked from 404 Podcast 960:

Facebook exploit exposes Mark Zuckerberg's private photos. Theaters set aside tweet seats for Twitter users. Finally: an app that can detect Photoshopping. Rumor: Apple to release 32-55 inch TVs next year.… Read more

Update Java to thwart active cross-platform exploit

There is a rather serious vulnerability in Java version 1.6.0_26 that is apparently being actively pursued by hackers, one that is easy to implement and allows hackers to compromise systems without being detected.

The exploit was found a couple of months ago and was addressed in the latest round of Java updates both from Oracle and from Apple for OS X users; however, many people have not yet updated their systems and hackers are working to take advantage of this flaw on these systems.

The vulnerability allows a maliciously crafted Java applet to run undetected on many browsers … Read more

iPhone security hole lets apps run unsigned code

A newly-discovered security hole in Apple's iOS opens up the door for third-party applications to add unapproved features, even after they've gone through Apple's App Store approval process.

Forbes today reports on new findings by Accuvant security researcher Charlie Miller, who next week is taking the wraps off a new iOS exploit he found that lets applications download unsigned code that's able to change their functionality after it's installed.

The exploit makes use of an exception that was added to Apple's Safari mobile browser in iOS 4.3 last year, which gives JavaScript special … Read more

FBI releases child ID iPhone app

The FBI has released the FBI Child ID app, the first mobile app created by the bureau. The app is designed to help parents notify authorities in the unlikely event that their child goes missing.

It is currently available only for the iPhone but also works on the iPad and iPod Touch. (A device with a camera is required to use the app to take a photo of the child.)

Parents can use the app to record information about each of their kids and take a photo of each kid from directly within the app. There are also fields for … Read more

Researcher: Mac notebook batteries can be hacked

The chip that helps control your Mac notebook's battery could be the latest target for attackers.

A report in Forbes today details the findings of Accuvant security researcher Charlie Miller, who claims to have found rather lackluster security guarding the firmware that controls various notebook battery functions and data stores.

Culling through a battery firmware update Apple released back in 2009, Miller pulled out two passwords that would grant access to that firmware, giving would-be attackers the ability to alter readings sent back to the OS and even add small software programs that stay off the hard drive. Miller … Read more

iOS 5 targets longtime iPhone jailbreak exploit

The software hole involved in a popular method for jailbreaking Apple's iOS devices has reportedly been patched by the company as part of iOS 5, the free system software update that's due out later this year.

Digging through the beta version of iOS 5, which Apple made available to developers earlier this month, the iPhone Dev-Team--a group of hackers that targets Apple devices and is not to be confused with Apple's group that designs the iOS software--has discovered a change that threatens to close a loophole the group has long exploited.

"Those of you who have been jailbreaking for a while have probably heard us periodically warn you to 'save your blobs' for each firmware.... Saving your blobs for a given firmware on your specific device allows you to restore *that* device to *that* firmware even after Apple has stopped signing it," the group wrote on its blog yesterday. "That's all about to change."

The group says Apple has implemented a system that checks for a uniquely generated chunk of data each time the phone is restored. The problem there is that only Apple has the keys to unlock that code to let the phone boot up successfully. The end result is that jailbreaking methods that took advantage of that vulnerability could be endangered if that same system is employed in the final version of the software.

The iPhone-Dev Team notes that "there may still be ways to combat this" but that it's not showing its cards just yet, since it might give Apple time to make a fix ahead of a general release. "They've stepped up their game!" the group said of Apple's security efforts.

Apple's iPhone and other iOS devices continue to be hot targets for hackers. Ahead of the release of the App Store, one of the most popular reasons to jailbreak an iOS device was to be able to install third-party software. Even after the launch of the App Store, places like third-party app repository Cydia became destinations for developers who couldn't get their applications through Apple's approval process. Another popular reason was to unlock the iPhone so that it would work on other carriers, an option Apple now offers to U.S. buyers at a hefty price premium.

iOS 5 is due out this fall. Last week Apple released a second beta of the software to developers so they could use it to test their applications for compatibility with the OS and its new features. The first beta of the software was allegedly jailbroken by a member of the iPhone-Dev Team in less than 24 hours.… Read more