The NSA Has Crazy Good Backdoor Access to iPhones

We already knew that the NSA had developed a taste for intercepting packages to put backdoors in electronics . Now, it turns out that those hacks provide it with almost complete access to the iPhone , too. Read more…        

View article:
The NSA Has Crazy Good Backdoor Access to iPhones

Google Play Music All Access customers are next in line for Glass

Google is expanding its pool of Explorers, slowly but surely. First it was people attending I/O, then friends of existing Explorers, now its subscribers to Play Music All Access . To celebrate the release of Play Music on Glass (albeit a little belatedly), the tech giant is offering subscribers to its streaming service a chance to buy the fledgling wearable. Emails apparently started going out this morning (though, no Engadget editors have received theirs yet) inviting those eligible to request a place in the Explorer program. Of course, entry to the exclusive club still costs $1, 500. Though, we’re sure you’ll been looking for something frivolous to spend your tax return on in a couple of months. Filed under: Wearables , Google Comments Source: Android Central

Originally posted here:
Google Play Music All Access customers are next in line for Glass

Why NSA spied on inexplicably unencrypted Windows crash reports

The National Security Agency’s X-KEYSCORE program gives the spy agency access to a wide range of Internet traffic. Any information that isn’t encrypted is, naturally, visible to passive Internet wiretaps of the kind the NSA and other intelligence agencies use. This in turn will typically expose such things as e-mails, online chats, and general browsing behavior. And, according to slides published this weekend by Der Spiegel , this information also includes crash reports from Microsoft’s Windows Error Reporting facility built in to Windows. These reports will tell eavesdroppers what versions of what software someone is running, what operating system they use, and whenever that software has crashed. Windows also sends messages in the clear whenever a USB or PCI device is plugged in as part of its hunt for suitable drivers. Read 3 remaining paragraphs | Comments

Read the original:
Why NSA spied on inexplicably unencrypted Windows crash reports

Nokia Closes Out 2013 With 92% Of The Windows Phone Market

The fine folks at AdDuplex have provided Paul Thurrott with an early look at their final Windows Phone market data for 2013 , giving us in the public a final look at the key statistics of Microsoft’s smartphone platform’s OEM and device makeup. The figures are much as they have been all year, only more so. Nokia continues to control the lion’s share of Windows Phone hardware, ending the month up a few points at 92.1 percent (this is a calculation of usage share, tracked through AdDuplex’s network). And the Lumia 520 handset continues to dominate its brethren, with a new high of 39.3 percent share. And that Windows Phone 8 grew against the now-fading Windows 7.x system, with record relative market share of 78.3 percent. Windows Phone’s 2013, if you had to put it into basic trends, would be that Nokia cleaned up, and its Lumia 520 was the weapon of choice. Thurrott well describes the current low-ending of Windows Phone (bolding original): Almost no high-end phones are popular . Worldwide, only the Lumia 920 makes the top 10 list for usage among all Windows Phone handsets, and if you look just at Windows Phone 8 handsets, only two high-end devices make the list: The Lumia 920 and the 925. In the US, there are three: The Lumia 920, 928, and 1020. All the rest are new low-end devices or old devices. The Lumia 1520 phablet doesn’t appear anywhere in this report. What this means is that the sales momentum that Windows Phone has comes at the cost of per-unit revenue. Margin pressure increases at lower price points. The list of sacrifices that had to be made to produce the Lumia 520 is not small . So, as we tally what could be the final month in which Nokia rules Windows Phone, it’s important to note that rising unit volume has come at a cost. The Lumia 1020 is a hit among a subset of the technology elite, but perhaps few else. Can you build a mobile empire on predominantly low-end phones? Apple managed the opposite, so perhaps this, too, is possible.

More:
Nokia Closes Out 2013 With 92% Of The Windows Phone Market

Wii U gamepad hacked, reverse engineered to stream from a PC

Reverse engineering the Wii U gamepad was non-trivial. libdrc The Wii U’s tablet controller isn’t moving as many consoles as Nintendo might like, but the technology itself is still interesting enough to draw the attention of the hacker community. Engadget reports that the libdrc team gave a presentation at the Chaos Communication Congress explaining how it managed to hack the Wii U’s gamepad to communicate with and stream content from a standard Linux PC. The full talk is available in video form here . The 64-slide deck describes the many, many hoops the team had to jump through to get the gamepad working—dumping the gamepad’s firmware helped the team reverse-engineer the Wi-Fi encryption system, at which point the team also needed to reverse-engineer the protocols Nintendo is using to stream video, audio, and input data. The team included a screenshot of an emulated  Final Fantasy VII  in its deck to prove that the software works and was also able to get the GameCube version of The Legend of Zelda:  Wind Waker working live onstage. While the project is, at this point, “very buggy” and “not meant for end users,” the team thinks that the project is “a good prototype that can be improved on.” The team also wants to add the ability to pair other tablets with the Wii U, to port the project to Windows and to OS X, and to make it possible to stream things to the gamepad over the Internet. It may be some time before the layperson can take advantage of the libdrc team’s work, but even as an early alpha the project is an interesting proof-of-concept. Read on Ars Technica | Comments

View article:
Wii U gamepad hacked, reverse engineered to stream from a PC

NSA can hack WiFi devices from eight miles away (video)

The NSA may have the ability to intercept data from around the world , but we now know that it has some impressive (and intimidating) equipment for snooping on nearby targets. Security guru Jacob Appelbaum told those at the Chaos Communications Congress this weekend that the NSA’s big box of tools includes Nightstand , a custom device that can compromise WiFi networks for the sake of inserting spy software. The Linux-powered device can exploit Windows systems from up to eight miles away; it’s unlikely that you’ll catch agents wardriving in the parking lot . Nightstand may not see significant use today given that it dates back to 2008, but its existence suggests that the NSA also has newer, more advanced WiFi surveillance gear at its disposal. Filed under: Wireless , Networking , Internet Comments Via: The Verge Source: Albert Veli (YouTube) , LeakSource

View post:
NSA can hack WiFi devices from eight miles away (video)

Pirate Bay uploads up by 50% in 2013

2013 was a banner year for the Pirate Bay, despite having been forced to change domain names half-a-dozen times. The site saw a 50% increase in uploads in 2013 , to 2.8 million links, presently being swarmed by nearly 19 million users. The Pirate Bay is reportedly developing a peer-to-peer browser that will be much harder to block using existing censorship techniques. Pirate Bay Uploads Surge 50% in a Year, Despite Anti-Piracy Efforts [Ernesto/TorrentFreak]        

Read more here:
Pirate Bay uploads up by 50% in 2013

Apple’s incremental 2013—and what to expect in 2014

The trouble with the Apple beat is that everyone wants it to be as exciting and newsworthy as it was in 2007 when Apple announced the iPhone, or in 2010 when the original iPad dropped. Among both the tech press and enthusiasts, Apple is a victim of its own success—every year that the company doesn’t redefine a product category, the pundits get a bit more bored. In 2013, almost every one of Apple’s new hardware and software releases refined something that came before. While that might seem boring to early adopters, Apple continues to be a master of iteration, improving its products in noticeable and useful ways every single year. Here, we’ll look back at everything Apple has put out this year—and what we might expect in 2014. The iPhone Apple put a whole lot of marketing muscle behind the iPhone 5C, which is essentially a year-old phone. Andrew Cunningham In the strictest sense, Apple actually delivered two new iPhones this year: the iPhone 5S and the  iPhone 5C . The 5S was the only truly new one, though—it delivered the expected improvements to the SoC and the camera while introducing a new hardware feature in the form of the TouchID fingerprint sensor. In contrast, the 5C is just an iPhone 5 with slightly upgraded cellular hardware and some colorful plastic. Read 21 remaining paragraphs | Comments

More:
Apple’s incremental 2013—and what to expect in 2014

NSA can reportedly bug computer equipment before it reaches buyers

Don’t think that the NSA always has to wait until people are using technology to start snooping on it. Spiegel has obtained documents which claim that the agency’s Tailored Access Operations (TAO) group can intercept computer equipment orders and install tracking hardware or software before the shipments even reach their buyers. The division can target a wide array of hardware, too. Another NSA section, ANT, reportedly has a catalog of tools that can install back doors in everything from Cisco and Huawei network systems through to hard drives from most major manufacturers, including Seagate and Western Digital. Some of these bugs can give the NSA “permanent” access, since they’re designed to persist if the owner wipes a device’s storage or upgrades its firmware. The leak suggests that the targeted manufacturers aren’t aware of what’s happening; Cisco and other firms tell Spiegel they don’t coordinate with the NSA. These hardware interceptions are also limited in scope next to remote surveillance programs. The agency isn’t confirming any specifics, but it maintains that TAO is focused on exploiting foreign networks. Whether or not that’s true, the discoveries show that the NSA’s surveillance can reach the deepest levels of many networks. Filed under: Networking , Internet , Dell Comments Via: Gizmodo Source: Spiegel (1) , (2)

View the original here:
NSA can reportedly bug computer equipment before it reaches buyers