Hacking

Monday, August 27, 2007

Teen 'unlocks' iPhone from AT&T network
by Delia Cruceru


A seventeen year old from Glen Rock, New Jersey became the second person in the world that succeeded in hacking the iPhone. According to his blog, George Hotz unlocked Apple's iPhone and used it on his carrier, T-Mobile a rival for the iPhone carrier, AT&T. He said that unlocking the device requires experience taking about two hours and involving an amount of soldering and software, missteps may render the iPhone useless. Hotz confirmed the unlocking the phone in front of a AP reporter that brought his T-Mobile SIM card for replacing with the original AT&T card. He was able to connect to the T-Mobile's network and placed calls using the reporter's account. By using Hotz's instructions, iPhone's functions remain intact but the visual voicemail it is disabled. "Some of my friends think I wasted my summer but I think it was worth it," he told The Record of Bergen County, which reported Hotz's hack Friday. Analysts say that Apple still has time to modify the iPhone production line to make new phones invulnerable, but the procedure if very difficult and is likely to keep it confined to hardcore hobbyists. "I'm having a hard time figuring out where the real pain is going to come from in this," said David Chamberlain, principal analyst with market researcher In-Stat who follows mobile devices and services. "Just selling the piece of hardware, they've made a nice profit off that."

related story: http://news.yahoo.com/s/ap/20070825/ap_on_hi_te/iphone_unlocked;_ylt=Ahy4chpm3PFlY10zMsHVJJGs0NUE
by Delia Cruceru
for PocketNews (http://pocketnews.tv)

PocketNews is a new real-time news broadcaster delivering the latest and hottest news right to your pocket ! With global clients who want to be kept up to date, PocketNews is everyone's way of keeping in touch with the World.

Tuesday, August 7, 2007

Hackers sought as allies in war on terrorism and cyber crime
by Delia Cruceru

The US federal agents are trying to convince hackers to help them in fighting terrorism and cyber crimes. At DefCon, the international gathering of hackers in Las Vegas, where almost 6000 hackers and computer security specialist made it to the conference, the National Security Agency (NSA), the Department of Defense and the FBI were present too. NSA vulnerability analysis chief Tony Sager spoke at DefCon in a try to bring hackers to be allies for cyber security. "I think we are part of a larger community. In the old days it was about what we found was really precious, because what we had was all there was. Now, it's less important what we find and more important what everybody finds," Sager said. Although hackers and federals got along well, many of the hackers are concerned about the privacy matters. One hacker from Leuven University in Belgium, Len Sassaman said that "the balance of privacy and public safety swung way out of whack with people on the Internet being so trackable. I believe the need for privacy is fundamental to a working democracy." Roger Dingledine, working on an "anonymity network" called Tor, which tracks who is doing what online said he is happy that NSA finally realized that other people can help them. "The NSA spent decades trying to do things themselves and that didn't work," Dingledine said.

related story: http://news.yahoo.com/s/afp/technologyitinternetpolicerights;_ylt=Al4gZ6fSY.5wS_uhl3Iz5_Cs0NUE
by Delia Cruceru
for PocketNews (http://pocketnews.tv)

PocketNews is a new real-time news broadcaster delivering the latest and hottest news right to your pocket ! With global clients who want to be kept up to date, PocketNews is everyone's way of keeping in touch with the World.

Sunday, August 5, 2007

SigEx Ventures : The poor American Economy...
by Ana Maria Ciobanu


Illegal hardware made overseas and imported in the USA raised a huge scandal about people who bought and played counterfeit software on Sony's PlayStation 2, Microsoft's Xbox and Xbox 360, and Nintendo's Wii.. After a year-long investigation federal agents executed 32 search warrants against trafficking in illegal devices. I understand why one would pirate PlayStation and sell it cheaper, but how cheap can you sell the Wii?! It's kind of funny that the U.S. Chamber of Commerce estimated that the U.S. economy loses from $200 billion to $250 billion each year because of counterfeiting and piracy. How can they assume that everybody who used counterfeit items, mp3's, game console cracks, videos would have really gone out and bought the real things? Why do people use counterfeit items?Are they snobs who simply want to sabotage industries or are they people who can't afford certain stuff the legal way? The majority is represented by people who can't afford to buy original CDs or DVDs or to pay $499 for a game console. And here's another thought, just because the money is being spent illegally it doesn't necessarily mean the money leaves the U.S.A. Economy. I do not want by any chance to encourage traffic or counterfeiting, but the U.S. Chamber of Commerce can't make me feel sorry for the recording industries, for Sony's PlayStation, for Microsoft or for Nintendo with such unrealistic calculus.
by Ana Maria Ciobanu
for SigEx Ventures (http://sigexventures.com)

SigEx Ventures's matrix of properties are quickly becoming leaders in digital telebroadcasting, free content delivery allowing people to easily talk, view, upload and share through free online TV broadcasting, free unlimited global calls, video blogs and SMS. SigEx Ventures invests in projects deploying "free" to add-on royalty revenue models

SigEx Telecom : Rush to Ajax makes for happy hackers
by Delia Cruceru

Wednesday at the Black Hat USA conference in Las Vegas, security researchers warned software developers using Asynchronous Javascript and XML (Ajax) techniques that they might face security issues, sites enabled with Ajax being dangerously vulnerable to a variety of Web-based threats of which they're not even aware. Ajax techniques are very popular among web developers, it allows web sites to be more responsive to user input compared to traditional pages. Sites like Google, Yahoo and other popular sites are already using Ajax, considering it more efficient because they don't have to reload the Web page every time content needs to be refreshed. A site coded with Ajax may offer to hackers opportunities like: to tear the application to shreds, booking free flights, accessing coupon codes, hijacking the administration functions and stealing everyone's account information. All this by using flaws that popular AJAX resource ignore: Improper use of client-side XSLT; Use of overly- or underly-granular server-side APIs; and storing secrets (either data or functionality) in client-side code; exploiting Ajax race conditions, and Applying static analysis to deobfuscate client-side JavaScript. "Any secrets stored in JavaScript, whether secret data like discount codes or database connection strings, or secret functionality like backdoor administrative access, will be found and exploited," says Billy Hoffman, lead R&D engineer at Web security vendor SPI Dynamics in Atlanta.

related story: http://www.cbronline.com/article_news.asp?guid=269108A6-C941-42BA-90C5-217AAF282396
by Delia Cruceru
for SigEx Telecom (http://sigex.com)

SigEx Telecom is quickly becoming the leading telebroadcasting communications provider allowing people to easily talk, view, upload and share video clips through free online TV broadcasting, free unlimited global calls, websites, blogs, video-mails and SMS. SigEx Telecom captures many add-on services for its clients generating royalties and fees in a broad spectrum of marketing services including public relations and promotions.