- Apple finally unveils the new iPad Air Read more »
- Google's Nexus 5 is rumored to be launched this Novembe... Read more »
- Microsoft Offers Another $100 Discount to their Origina... Read more »
- Lenovo Desktop PC Doubles as a Large Tablet Read more »
- Robotic Vehicle Gets Wheelchair Bound Person to Stand U... Read more »
- Human-Powered Roller Coaster Offered in Japan Bicycle T... Read more »
- Analog Camera Filter for DSLR Cameras Offers Instagram-... Read more »
It's the end of the world for PSN users! Another hack exploit another down result.
Another round battle for Sony team to fix several problem issue. PSN is currently down due to another hack incident, PSN password reset page could be violated using info stolen in original hack. The exploit allows people to change users’ password via the “PSN password reset page” using only a PSN account email and date of birth – both of which were obtained by hackers in the original breach. As a result, PSN sign-in is now unavailable on a number of Sony’s sites. The site that password reset emails direct users to has also been taken down. “Unfortunately this also means that those who are still trying to change their password via Playstation.com or Qriocity.com will be unable to do so for the time being,” a Sony statement confirmed. You can go to this link to have news and update for this incident.View Article Source »
This is how cutting corners ironically lengthen an entire competition.
Records have been shattered in Gran Turismo, but in ways that aren’t tolerable by developer or any other standards. Cheaters have risen again after the second round of Sony’s Gran Turismo Academy (GT Academy) racing competition as reports state that several players have cut corners and exploited course flaws and glitches to reach impossible lap times. As a result, Sony has ultimately voided the second round results thus allowing everyone to move on to the next.
Developer Polyphony Digital has announced that they are currently in the works of fixing any other potential exploits before proceeding to the third round. The original schedule of the third round of the GT Academy competition was supposed to be on the 14th of February, but due to recent events, the competition has been delayed indefinitely.
Sony’s GT Academy competition is a virtual racing stint to give the world’s best Gran Turismo 5 players a chance to become real race drivers by using their gaming skills to win.View Article Source »
Adobe acknowledged another flaw on their Flash player, as Mila Parkour reported the bug. Users must be aware of some PDF files that are sleeping inside their computers. Or else it may drop a bomb.
Adobe confirmed today that hackers are exploiting a critical un-patched bug in Flash Player. According to a security advisory issued by the company: “There are reports that this vulnerability is being actively exploited in the wild against Adobe Reader and Acrobat.”
Mila Parkour, an independent security researcher, reported that a malicious PDF file document exploits the bug in Reader, then drops a malware on the victimized machine. All versions of Flash on Windows, Mac, Linux, and Android carries the bug by the “Authplay” component of Reader and Acrobat 9.x. And while no patch is available yet, users can protect themselves by deleting the authplay.dll. However, it will crash the Reader and Acrobat when it access a file that contains a Flash content.
Adobe promised to issue a fix by November 9, and will update the Reader and Acrobat a week after that.View Article Source »
It's a big "fire in the hole" with Adobe's Acrobat Reader 9.3.4 as exploits has been discovered by the company. There's not patch available yet, so move over before the bomb explodes right at your face.
According to a company statement, Adobe learned last Tuesday that their Acrobat Reader is being exploited in the wild. The vulnerability was found in Adobe Reader 9.3.4 and earlier versions for Macintosh, Windows and Unix. As stated in a security advisory, the hole can enable an attacker to take control of an affected computer and eventually millions of other PCs that uses the Adobe Software. Unfortunately, there no mitigations that can be provided by the company as of the moment. Still, Adobe is actively sharing the information about this issue with partners in the security community to quickly develop detection and quarantine methods. Until a patch becomes available, the schedule for a security update release is still under evaluation.View Article Source »
After jailbreaking an iOS device was announced as legal, Apple created a patch for the flaw. User of iPhone, iPod Touch and iPad can now work on their devices without breaking their warranty.
Apple has released the security updates for iPhone, iPod touch and iPad today. The update address the flaw in PDF handling and I/O that have been recently exploited to create a web-based jailbreak for Apple’s portable devices. iOS 4.0.2 for iPod touch and iPhone and 3.2.2 for iPad is now available via iTunes.
The web-based jailbreak is dependent on two vulnerabilities in order to work. An open source from FreeType Library is used by iOS’s PDF rendering engine, that can result in and overflow of stack buffer whenever it handles a CFF data. The flaw can be exploited to execute an arbitrary code with the help of an especially designed PDF. Once the overflow occurs, and integer counterpart flaw in IOSurface could be misused to elevate privileges from the user to the root. With heightened freedom, a code from jailbreakme.com removes the security features that prevent other apps in running on any iOS-based devices.Read the rest of the article »
Written on January 03, 2013
Written on December 28, 2012
Written on December 21, 2012
Written on December 17, 2012
Written on December 17, 2012