Hackers breach security at several U.S. defense contractors

Anonymous duplicate with data stolen Hackers have managed to breach the networks of several U.S. defense contractors, Reuters reported on Friday. Reuters received the information from a source with direct knowledge of the attacks. However, the source remained anonymous, as he was not authorized to discuss the security breaches. The hackers breached network security by creating duplicates of “SecurID” electronic keys from EMC Corp’s RSA security division. The hackers, in turn, learned how to create the duplicates using data stolen acquired during a successful attack on RSA that EMC publicly disclosed in March, the source added. It is unclear what[…]

Continue reading …

Intel TV: use a ‘Cloud DVR,’ subscribe by channel or even by show

For the past year or so, Intel has been rumored to be quietly been working on a set-top box. “Intel TV” is coming in 2013, according to a Sunday report, and it’s possible it could be better than any similar service currently offered by Apple, Google or Microsoft today. It’s still early, though. While Intel is expected to publicly announce the project the Consumer Electronics Show (CES) in January, Intel TV is not heading for your living room, unless you are in a limited beta expected to roll out in March. Intel TV could succeed by offering something customers been[…]

Continue reading …

Tweet seats’ bring social media addicts relief at theaters

As opposed to most theaters where the use of mobile devices during a performance is discouraged, the Guthrie Theater in Minneapolis, Minn. is encouraging the use of social media during a play, through the use of “tweet seats.” As reported on Saturday, Guthrie Theater audience members who sit in a special balcony section are “encouraged” to tweet comments about the live performance. By setting up the section, the management of the Guthrie Theater says Twitter users (and we assume Facebookers) “will not be disruptive to other patrons” who are able to stand living without exposure to social media for more[…]

Continue reading …

T-Mobile and Tim Tebow join forces to show how lack of a contract can be an advantage

Tim Tebow has made a quarterback sneak into Super Bowl XLVIII. T-Mobile has created a series of three ads using the former NFL (Denver, New York) QB, showing just how good it is to have no contract — something that both T-Mobile customers and Tebow can attest to. The nation’s no. 4 wireless carrier revealedthe ad program on Friday. The similarities are uncanny. All right, they really aren’t. It’s a stretch to make the connection between T-Mobile and Tim Tebow, but here goes. Tim Tebow is without an NFL contract. T-Mobile’s current UnCarrier program means that there are not contracts —[…]

Continue reading …

DOT to propose requirement that new cars and light trucks ‘communicate with each other’

The Department of Transportation (DOT) will propose requiring that automakers equip new cars and light trucks with technology that allows vehicles to communicate with one other, the organization announced on Monday. The move isn’t being made to allow cars to conspire with each other, a la “Maximum Overdrive.” Instead the agency wants to foster development of V2V technology to reduce accidents. In its statement, U.S. Transportation Secretary Anthony Foxx said: Vehicle-to-vehicle technology represents the next generation of auto safety improvements, building on the life-saving achievements we’ve already seen with safety belts and air bags. By helping drivers avoid crashes, this technology will[…]

Continue reading …

New Snowden documents show how GCHQ use DDOS attacks against Anonymous, Lulzsec

A new revelation coming from Edward Snowden’s leaked NSA documents, this time reported first by NBC News, points to a secret British division in its GCHQ spy agency. The division was tasked with performing cyber attacks on   the hacktivist Anonymous and LulzSec groups. The unit, known as the Joint Threat Research Intelligence Group (JTRIG), used a DDOS (distributed denial-of-service) attack, a typical hacker weapon, against the groups. The documents, which publicized JTRIG for the first time ever, came from a PowerPoint presentation prepared for a 2012 NSA conference called SIGDEV. According to intelligence sources familiar with the operation, JTBIG concentrated DDOS attacks against[…]

Continue reading …