Skip to content

Whatever you’re looking for in a Mad Max game, Mad Max isn’t it.

Whatever you’re looking for in a Mad Max game, Mad Max isn’t it. published on No Comments on Whatever you’re looking for in a Mad Max game, Mad Max isn’t it.

Yellow-white salt wastes stretch a thousand miles in every direction. The only signs of civilization among the dunes are pockmarks of ramshackle scarecrows with oil fire apexes and the trailing dust plumes of rust-razor buggies. One such vehicle stands apart, piloted by a legend of the desert. He tears through a rival rider’s lifeline in the parched pavement. It’s nothing personal, but he needs 600 scrap to afford the harpoon launcher that will let him pass into the scorched ebon around Gastown, where his true prize awaits.

As the legend scavenges through the auto’s wreckage, he finds what he’s looking for. Ten long minutes of hard-fought vehicular combat have led to this. He crouches down, collects his prize, and… “1 Scrap.”

It’s a moment he — that is, Max Rockatansky, aka Mad Max — has repeated ad nauseam through half a dozen different methods, and will do so again countless times before his seemingly endless quest for a V8 engine is complete. It’s a fairly simple mission, as video game plots go, but it’s one fraught with complication after complication that begin to feel contrived very, very quickly.

Read 18 remaining paragraphs | Comments

Extorting money from Ashley Madison customers is actually pretty easy

Extorting money from Ashley Madison customers is actually pretty easy published on No Comments on Extorting money from Ashley Madison customers is actually pretty easy

In the wake of the recent Ashley Madison e-mail dump, some customers have gotten demand e-mails like this one.

So that begs the question: does it work? In the words of Omar Little, “Oh, indeed.”

As Toshiro Nishimura, a security researcher with Cloudmark, concluded in a blog post earlier this week, “this extortion campaign could have yielded a worthwhile sum for very little effort.”

Read 5 remaining paragraphs | Comments

Mozilla: data stolen from hacked bug database was used to attack Firefox

Mozilla: data stolen from hacked bug database was used to attack Firefox published on No Comments on Mozilla: data stolen from hacked bug database was used to attack Firefox

An attacker stole security-sensitive vulnerability information from the Mozilla’s Bugzilla bug tracking system and probably used it to attack Firefox users, the maker of the open-source Firefox browser warned Friday.

In an FAQ published (PDF) alongside Mozilla’s blog post about the attack, the company added that the loss of information appeared to stem from a privileged user’s compromised account. The user appeared to have re-used their Bugzilla account password on another website, which suffered a data breach. The attacker then allegedly gained access to the sensitive Bugzilla account and was able to “download security-sensitive information about flaws in Firefox and other Mozilla products.”

Mozilla added that the attacker accessed 185 non-public Firefox bugs, of which 53 involved “severe vulnerabilities.” Ten of the vulnerabilities were unpatched at the time, while the remainder had been fixed in the most recent version of Firefox at the time.

Read 6 remaining paragraphs | Comments

Mind-blowing secrets of NSA’s security exploit stockpile revealed at last

Mind-blowing secrets of NSA’s security exploit stockpile revealed at last published on No Comments on Mind-blowing secrets of NSA’s security exploit stockpile revealed at last

Incredible document has to be seen to be believed

PDF  The NSA has revealed for the first time in public how it handles and reports critical unpatched security flaws its snoopers discover in software.…

Man who helped code highly destructive financial malware pleads guilty

Man who helped code highly destructive financial malware pleads guilty published on No Comments on Man who helped code highly destructive financial malware pleads guilty

The Latvian man accused of helping create the Gozi virus, which United States prosecutors dubbed “one of the most financially destructive computer viruses in history,” has pleaded guilty.

As the original indictment stated: “The Gozi Virus has caused, at a minimum, millions of dollars in losses.”

According to Reuters, Deniss Calovskis made the admission in federal court in Manhattan on Friday.

Read 9 remaining paragraphs | Comments

Hackers spent at least a year spying on Mozilla to discover Firefox security holes – and exploit them

Hackers spent at least a year spying on Mozilla to discover Firefox security holes – and exploit them published on No Comments on Hackers spent at least a year spying on Mozilla to discover Firefox security holes – and exploit them

Bugzilla infiltrated, private vulns slurped since at least 2014

Hackers have known about unpublicized and unpatched critical security holes in the Firefox web browser for a year or more – all by invading Mozilla’s systems.…

Ex-Tesla engineer accused of illegally accessing former boss’ e-mail

Ex-Tesla engineer accused of illegally accessing former boss’ e-mail published on No Comments on Ex-Tesla engineer accused of illegally accessing former boss’ e-mail

A former Tesla mechanical engineer is facing two counts of felony computer intrusion, according to a Thursday press release from the FBI.

Nima Kalbasi, a 28-year-old Canadian citizen, is accused of illegally accessing his former boss’ e-mail account nearly 300 times during a period of about 30 days in late 2014 and early 2015.

The 28-year-old Canadian citizen appeared before a federal judge in San Jose, California late last month. He was arrested days earlier while crossing the border from Canada into Vermont.

Read 4 remaining paragraphs | Comments

Federal bust of long-running escort site Rentboy.com leads to protests

Federal bust of long-running escort site Rentboy.com leads to protests published on No Comments on Federal bust of long-running escort site Rentboy.com leads to protests

Rentboy.com isn’t the first website to be shut down for allegedly promoting an illegal business. But federal prosecutors may not have expected the backlash stemming from last week’s bust of the 19-year-old gay escorting site.

Six Rentboy employees, including the company’s CEO Jeffrey Hurant, have been charged with violating the Travel Act by promoting prostitution. They each face up to five years in prison.

In describing the bust, acting US Attorney Kelly Currie denounced the site as a thinly veiled “Internet brothel,” that made millions promoting prostitution.

Read 11 remaining paragraphs | Comments

FTC gives FBI the finger over govt backdoor encryption demands

FTC gives FBI the finger over govt backdoor encryption demands published on No Comments on FTC gives FBI the finger over govt backdoor encryption demands

Commissioner joins CTO in its ‘don’t be stupid’ rationale

The US Federal Trade Commission (FTC) has fired a second shot at the FBI over its demand for backdoors in encryption systems.…

Reg readers select infosec A-Team to save Ashley Madison

Reg readers select infosec A-Team to save Ashley Madison published on No Comments on Reg readers select infosec A-Team to save Ashley Madison

Good news for the bad boy; bad news for the good girl…

It’s a week since – with some prescience – we launched a poll to find out who, in the wide world of IT and beyond, might be man (or woman) enough to rescue troubled infidelity site Ashley Madison.…

%d bloggers like this:
Skip to toolbar