Just a couple days ago, Antisec claimed to have hacked 12 million Apple unique device IDs (UDID) from a FBI laptop. Antisec then decided to release 1 million UDIDs to the public, in the sake of internet security (ironic?). In result of the whole fiasco, Apple released a statement claiming that they never provided the FBI with any UDIDS. Included in the statement, they also reminded us that they are switching UDIDs to APIs in iOS 6. Now, how do we tell who’s bluffing?
Posted in Internet
- Tagged AntiSec, Apple, Apple Unique Device Identifiers, Dell Vostro, device ids, fbi, fbi agent, Federal Bureau of Investigation, fiasco, hack, hacker, Hacking, hacking group, IOS, IPhone, Java, UDID
Security has always been a problem for the American government, from Chinese hackers to WikiLeaks. This time around, AntiSec a hacking group has obtained over 12 million Apple Unique Device Identifiers (UDIDs). The hack was obtained through a Java exploit on a FBI Agent’s Dell Vostro notebook. At the end of the day, it shows how much governments secretly monitoring people, nevertheless this is probably illegal for both the hackers and the FBI.
Posted in Finance, Software
- Tagged AntiSec, Apple, Apple Unique Device Identifiers, Dell Vostro, fbi, fbi agent, Federal Bureau of Investigation, hack, hacker, Hacking, hacking group, Java, UDID
Have you ever thought that you could use your hacking skills and earn money legally? Well, now Google is hosting Pwnium 2, a black hat conference that has over 2 million dollars in prizes. Google has decided, that rewarding people to find exploits in their web browser was so successful that now their doing it again. As this is a great business model, little investment is needed, and lots of rewards are gained by Google. So remember hacking is useful for criminals and law abiding citizens too.
Source: Google Blog
Posted in Internet
- Tagged Black Hat, chrome, Chromium, exploit, exploited, Google, Google Chrome, hack, hacked, hacker, hackers, Hacking, hacks, Internet, malicious, prize, Pwnium, Pwnium 2, Pwnium2, security, security hole, SecurityHole, technology, Web browser