HackDig : Dig high-quality web security articles for hackers

iOS version of Pokémon Go is a possible privacy trainwreck [Updated]

Update: Niantic has confirmed in a statement that the Pokémon Go app requests more permissions than it needs but that it has not accessed any user information. Google will automatically push a fix on its end to reduce the app's permissions, and Niantic will release an update to the app to make it request fewer permissions in the first place. The full stateme
Publish At:2016-07-12 08:25 | Read:6222 | Comments:0 | Tags:Opposable Thumbs Risk Assessment apple iOS pokemon pokemon g

Rainbow Six: Siege reportedly reveals your IP address to potential attackers

Rainbow Six: Siege players are complaining that the game continues to make their global IP address available to other players, putting those players at risk for DDoS attacks from bitter opponents.The problem seems to stem from the way the game implements voice chat between players. Back in September, Ubisoft confirmed that while the game uses dedicated serve
Publish At:2016-04-28 18:25 | Read:4451 | Comments:0 | Tags:Opposable Thumbs Risk Assessment DDoS hole ip peer-to-peer r

Steam hacker says more vulnerabilities will be found, but not by him

Further ReadingHow a hacker snuck a game onto Steam without Valve’s knowledge"Watch paint dry" exploited now-patched Steamworks vulnerability.The teenager who grabbed headlines earlier this week for hacking a fake game listing on to Valve's Steam store says there are "definitely" more vulnerabilities to be found in the popular game distribution service. But
Publish At:2016-04-01 17:50 | Read:5519 | Comments:0 | Tags:Opposable Thumbs Risk Assessment hacking security Steam Valv

Steam tightens trading security amid 77,000 monthly account hijackings

Further ReadingMy brief life as a Diablo III hacking victimA tale of disappearing items, late authenticators, and few concrete answers.Account theft is a common and longstanding problem for all kinds of online gaming services, as I can personally attest after losing all of my Diablo III loot to a hacker a few years ago. But Valve says the problem is reaching
Publish At:2015-12-10 15:10 | Read:4977 | Comments:0 | Tags:Opposable Thumbs Risk Assessment security Steam two-factor V

Valve patches security hole that enabled takeover of Steam accounts

Valve has patched a bug in its Steam system that let an attacker easily take over an arbitrary account using nothing but the account's username.The hijacking exploit took advantage of a hole in Steam's password recovery feature, which sends a recovery code to the registered e-mail address associated with the account. That e-mailed code needs to be entere
Publish At:2015-07-27 12:20 | Read:2610 | Comments:0 | Tags:Opposable Thumbs Risk Assessment

Just-released Minecraft exploit makes it easy to crash game servers

A flaw in the wildly popular online game Minecraft makes it easy for just about anyone to crash the server hosting the game, according to a computer programmer who has released proof-of-concept code that exploits the vulnerability."I thought a lot before writing this post," Pakistan-based developer Ammar Askar wrote in a blog post published Thursday, 21
Publish At:2015-04-16 22:40 | Read:4225 | Comments:0 | Tags:Opposable Thumbs Risk Assessment Technology Lab denial of se

Twitch-targeting botnets use infected PCs to inflate viewer audiences

With video streaming site Twitch paying lucrative wages to celebrity gamers, it was inevitable—botnet-for-hire services that use hacked computers to fraudulently inflate viewership.Further ReadingA newbie’s guide to why so many people are watching TwitchLike sports, watching other people game can be as addictive as gaming yourself.According to a report p
Publish At:2015-03-27 22:10 | Read:4403 | Comments:0 | Tags:Law & Disorder Opposable Thumbs Risk Assessment Technology L

Malicious user hides trojan links in cloned Steam Greenlight pages

A malicious user exploited the somewhat open submission structure of Steam's Greenlight section over the weekend to briefly hide malware links in cloned versions of legitimate game pages.Polygon reports that a Steam user going by the handle bluebunny14 posted copies of pages for five games to the Steam's Greenlight section over the weekend. The cloned pa
Publish At:2015-03-25 06:10 | Read:4475 | Comments:0 | Tags:Opposable Thumbs Risk Assessment clone Greenlight malware St

CryptoLocker look-alike searches for and encrypts PC game files

Crypto-based "ransomware" has become a lucrative business for cybercriminals. Since the arrival of CryptoLocker on the scene last year, a number of copycat malware packages have appeared to compete in the cyber-extortion market, encrypting victims' photos and other personal files with a key that will be destroyed if they don't contact the malware's opera
Publish At:2015-03-13 05:40 | Read:3569 | Comments:1 | Tags:Opposable Thumbs Risk Assessment Technology Lab cryptolocker

Exploit allows 3DS to run arbitrary Game Boy ROMs

The emulator behind the Nintendo 3DS' Virtual Console is usually locked down to only run ROMs officially distributed through the Nintendo eShop. A new exploit released this week, however, opens the platform to load and run any existing Game Boy or Game Boy Color ROM.The exploit relies on a buffer overflow error in the current version of the 3DS' Web brow
Publish At:2015-01-29 01:50 | Read:4416 | Comments:0 | Tags:Opposable Thumbs Risk Assessment 3DS Game Boy game boy color

Grinches steal Christmas for Xbox Live, PlayStation Network users

There's nothing like waking up early on Christmas morning, unwrapping your gifts after your parents finally get out of bed, getting the game you'd asked Santa for, and popping it into your console for some online gaming—only to find out you can't log on. That was the sad reality for gamers all around the world on Christmas Day as an apparent Distributed
Publish At:2014-12-26 02:10 | Read:5894 | Comments:0 | Tags:Opposable Thumbs Risk Assessment DDoS PSN XBox Live

Hacker exploits printer Web interface to install, run Doom

On Friday, a hacker presenting at the 44CON Information Security Conference in London picked at the vulnerability of Web-accessible devices and demonstrated how to run unsigned code on a Canon printer via its default Web interface. After describing the device's encryption as "doomed," Context Information Security consultant Michael Jordon made his point by
Publish At:2014-09-16 02:30 | Read:4364 | Comments:0 | Tags:Opposable Thumbs Risk Assessment 44con Canon context informa


Tag Cloud