Skip to main content

Home/ Fabroa ICS2O/ Group items tagged Exploitation

Rss Feed Group items tagged

Melissa Yu

Is It Immoral to Own an iPhone 5? - 0 views

  •  
    With the thin, sleek design, the shiny screen, and the convenient touch screen, the iphone has grown to become one of the most wanted phones in our country. Behind the high-tech phones and tablets though there's a much more serious issue. Iphones are often created in factories in China that exploit their workers. Things like child labor and abuse are practiced often in these factories. However, this article didn't only bring up the issue of human rights violations, but also our role in it. In the past, companies like Nike have been forced to improve the quality and treatment in these factories after many people boycotted the brands once discovering the ethical issues in the production process. We have not let the exploitation of workers in China pass before, so why are we doing it now with these Apple products. Every time we lay down our money and pick up a new iphone or ipad, we are encouraging this type of production and becoming a part of it. Even our simple, silly complaints about the Apple products can make the conditions worse for those poor workers. They are forced to work even harder and longer, no matter how tired, underpaid and overworked they already are. Has it become important for us to own the best phone, that the rights and sufferings of other human beings no longer matters? Why are we not taking the action necessary to help those workers and send a clear message of opposition? Before, reading this article I also wanted an iphone. It's a great phone, very convenient and high-tech. Knowing the conditions these phones are made in though has started to really make me doubt what I used to consider an amazing phone. It's an ethical issue. Do I want this phone so badly that I'm willing to turn a blind eye to the places it came out of? What scared me was that as much as I knew what the clear answer was, it was still a hard decision to make. Exploiting other humans is wrong and no matter how big Apple is, they are not an exceptio
Adrian Galope

Sony pulls another game from PlayStation Store after new Vita exploit found -- Engadget - 0 views

  •  
    This article is about Sony pulling out another PS Vita game. As all of may already know, PS Vita is the new portable game console from Sony. The game, Everybody's Tennis to be exact, was withdrawn because of an exploit that was discovered on the 28th of March. This is the second game to be pulled out since "Motorstorm Artic Edge" because of the same hacker that was nicknamed, "Wololo". Wololo claims that they've got access to around 10 more undiscovered exploits.
Cindy Huang

How Secure Is the Passcode on My Phone? - 0 views

  •  
    Recently, there have been a lot of passcode exploits, especially on the iPhone and Samsun Galaxy. On the iPhone, it can allow the attacker to access their way into the Phone app, letting them place calls, see/edit contacts, and access photos via the "assign new picture" option. On the Samsung Galaxy, the attacker can flash whatever was open before the phone was locked for a second. This is enough time to launch an app, which can be repeatedly downloaded and completely unlock your phone. The article suggests the user of the phone should download the Apple's Find my iPhone app or Prey, which can track the location of your smartphone if it is ever lost or stolen. This, they say is the best protection for your personal information stored on your phone. These passcode exploits can let one worry and doubt how much protection the lock screen actually provides. The truth is they are no more secure than any other password or PIN, which means they can eventually be cracked. However, it is still suggested to always lock your screen, just in case it is robbed by someone who does not know anything about getting around locked screens. Many companies are aware of the issues and is releasing new techniques, like the iOS 6.1.3. Hopefully, with time, these password problems will not be an issue anymore.
Rom Perez

New Trojans Use Old Tricks to Infiltrate Macs - 0 views

  •  
    Could it be, that Apple products can finally get viruses? Security analysis have identified a pair of Trojans using the same exploit that's worked on Window system for years.
James Harris

iPhone App Contains Secret Game Boy Advance Emulator, Get It Before It's Gone [Update: ... - 0 views

  •  
    Early in the afternoon today, a clever developer managed to sneak a Game Boy Advance emulator into an innocent looking app named "Awesome Baby Names". The secret emulator is activated by a series of taps on the touchscreen inside of the app. Once it is activated you can play your classic gba games just like you did in 2005. Apple was quick to catch this security breach as it was only in the App Store for twenty something minutes, but in that time many people including myself managed to download the app. This kind of sneaky activity from developers happens very seldom, but when something is smuggled into the App Store, it is usually very important. As stated in the article, it is a very easy process to unlock the emulator from the app, but getting the games and the BIOS onto the iPhone is the hard part. You must first download a program that lets you access the phone's file directory, then you must find the app's directory and drop the relevant BIOS and game files there. I chose the portable computing tag for this article because it deals with mobile technology and exploiting it to run handheld gaming software. This idea is not knew and has been around for a long time, but the idea of hiding the identity of apps and smuggling them into the App Store is a new idea. Apple is updating their security daily, but clearly couldn't spot this "child naming app" and make it out for the emulator that it was. I chose the privacy and security tag because Apple has a high priority for the security of their ecosystem and operating system, but clever people can still find ways to bypass this and get unidentified files into the operating system. I believe that Apple must keep a close eye on how they approve future apps into the app store because one day we may see cydia disguised as a senseless app make its way into the app store. If this happens, Apple with really have some explaining to do!    
Jonathan Barbieri

Remains of the Day: iOS 6.1.3 May Kill the Evasi0n Jailbreak - 0 views

  •  
    the iOS hackers who wrote the evasi0n jailbreak for iOS 6, the beta for iOS 6.1.3 will patch at least one of the vulnerabilities that the evasi0n exploits in order to work. After 6.1.3, Wang stated that they may have to build a new jailbreak from scratch. Reports indicate that iOS 6.1.3 will also fix the passcode bug that's gone unpatched since 6.0.1 as well as the newly-discovered passcode bug in 6.1. This will deny any access to free aps that people want to download. Apple has stated a more serious security issue to push out its latest update. The patch also fixes a bug discovered earlier this month that allows anyone who gains physical access to a phone to bypass its lockscreen in seconds and access contacts and photos
James Harris

iOS evasi0n jailbreak used 1.7 million times in first day | Apple - CNET News - 0 views

  •  
    There was a lot of hype around the jailbreak community when the evasi0n iOS 6.1 jailbreak was released on Monday. It saw 1.7 million downloads on the first day alone. This jailbreak works by exploiting "bugs" in Apple's iOS code to allow users to write data to the kernel. This article relates to the legal tag because over the past decade, jailbreaking has become a very controversial topic and some people consider jailbreaking unethical or illegal. This article also relates to the economics tag because jailbreakers are pirating App Store apps which digs into Apple's and app developers' profits. I was once a jailbreaker myself, but have recently learned that developers work hard to make their apps and they deserve the credit and money for them. Overall, this article shows that the jailbreak community is still going strong and there are still those people who like pirating apps and taking profit away from developers 
Lynn Bui

Exclusive: Apple, Macs hit by hackers who targeted Facebook | Reuters - 0 views

  •  
    This article is about how Apple was hacked on Tuesday February the 19th, 2013. Basically, unknown hackers infected some Apple workers computers when they visited a website for software developers This website had been infected with malicious software that was designed to target Mac computers. Some people are saying that the malware could have originated from China, but there is no proof. Some of the malware was distributed through a site aimed at iPhone developers. It might still be infecting visitors who haven't disabled Java in their browser. F-Secure a security firm wrote that the hackers might have been trying to get access to codes for apps on smartphones which would allow them to infect millions of app users. Hackers recently found out a sophisticated way to attack Macs by exploiting a flaw in Adobe Systems Inc's Flash software. What I find very interesting is that the breaches described by Apple mark the highest-profile cyber-attacks to date on businesses running Mac computers. This shows that we should make an effort to protect our information especially since one of the largest technology companies has been breached. With cyber security attacks on the rise, we should all be aware and careful of the sites that we are visiting. Apple workers simply visited a website for software developers and became infected with the virus. The hackers are breaking many laws by hacking Apple, Apple intents to find the hackers with the help of the police.
Dragos Penelea

How to Crack a Wi-Fi Network's WPA Password with Reaver - 1 views

  •  
    This post is on cracking Wi-Fi WPA passwords with "Reaver." Many people know that cracking a WEP password is fairly easy, so they use the more bulletproof WPA security protocol. Reaver is a program that exploits a security hole in wireless routers and can crack most routers' passwords with relative ease. First off, you will need the BackTrack 5 Live DVD. Download the Live DVD from BackTrack's download page and burn it to a DVD. Next, you need a computer with Wi-Fi and a DVD drive. Lastly, you need a nearby WPA-secured Wi-Fi Network. Using four steps you can hack into a WPA Wi-Fi Network. Step 1: Boot into BackTrack, Step 2: Install Reaver, Step 3: Gather the Router's information, and Step 4: Crack the WPA password to the Wi-Fi Network. Now I will explain how you can protect against Reaver attacks. Since the vulnerability lies in the implementation of WPS, your network should be safe if you can simply turn off WPS (or, even better, if your router doesn't support it in the first place), however Reaver may still be able to crack your password, even with WPS manually turned off. You could also set up MAC address filtering on your router (which only allows specifically whitelisted devices to connect to your network), but a sufficiently savvy hacker could detect the MAC address of a whitelisted device and use MAC address spoofing to imitate that computer. The good news is that there is a way to surely protect against Reaver. You can get the open-source router firmware DD-WRT installed on your router. Reaver has been tested on routers with this firmware and it was not able to crack the password. As it turns out, DD-WRT does not support WPS, so there's yet another reason to love the free router-booster.
robford-jlm

Goldman Sachs: Bitcoin Is Not A Currency | TechCrunch - 0 views

  •  
    Bitcoin; the once elusive currency reserved for shady transactions on the deep web has become popular over the past 12 months, but a recent collapse has its integrity in question. Firstly, it is important to understand what bitcoin is. For the uneducated, Bitcoin is a digital only 'currency' that is used like regular money, to make transactions, with the added bonus of (possibly) being anonymous. Due to an exploit in Bitcoin and in the online wallet service, Mt. Gox, Many people are raising an eyebrow about the reliability and integrity of the currency. Goldman Sachs, a HUGE investment banking company, recently weighed in and called Bitcoin a "speculative financial asset", not a currency. Personally, I think the currency, which was created with the purpose of being an anonymous hard currency, has failed because it has gone to the mainstream. The money isn't heavily secured, as the recent online bank heists have shown, and has no real advantage for the public. Bitcoin worked fine, amazing even, as a P2P currency only used by the deep web community, but its gotten to big and needs regulation to stay constant. This, however, is against the very nature of BTC and will therefore not be supported by the community. All in all, BTC is an interesting idea that worked on the micro scale, but cannot hope to function on the macro.
1 - 10 of 10
Showing 20 items per page