HP Accused of Sabotaging Non-HP Ink Cartridges
123inkt, a Dutch reseller of printer ink cartridges, has accused HP of intentionally sabotaging non-HP ink cartridges through a failure date, pre-programmed in the firmware of some HP laser ink printers.
Tests revealed that all the HP printers started showing the error during September 2013. After media coverage and complaints on its support forums, HP issued a statement via Dutch TV. HP stated “the failure point is there to protect innovation and intellectual property”. HP could face serious legal repercussions from the EU’s strict customer protection agencies.
USB Killer Damages Computers and Other Devices with USB Ports
A device allegedly has the ability to fry a number of electrical devices by sending an electrical charge to USB ports.
“Hardware designers/testers of public machines: photo booths, copy machines, airline entertainment systems, ticket terminals, etc. with exposed USB ports should ensure that their systems resist electrical attacks via the USB port.
Leaked NSA Hacking Tools Were ‘Mistakenly’ Left By an Agent on a Remote Server
A former NSA employee carelessly left hacking tools on a remote server three years ago after an operation and a group of Russian hackers found them according to Reuters news services.
The leaked hacking tools enable hackers to exploit vulnerabilities in systems from big vendors like Cisco Systems, Juniper, and Fortinet, were dumped online by the “The Shadow Brokers.”
NSA officials have admitted to the FBI that their employee acknowledged the error shortly afterward, and hence the agency was aware of this for the last three years. Instead of warning the affected companies that their customers were at risk, the NSA maintained the silence.
“After the discovery, the NSA tuned its sensors to detect the use of these tools by other parties, especially foreign adversaries with strong cyber espionage operations, such as China and Russia.”
Cisco and Fortinet confirmed that the vulnerabilities were legitimate and issued patches to fix those exploits. Cisco and Fortinet are still waiting for comments from the NSA, the FBI and the Office of the Director of National Intelligence.
Yahoo Admits 500 Million Accounts Were Hacked by ‘State Sponsored’ Hackers
Over a month ago, a hacker was found to be selling login information related to 200 million Yahoo accounts on the Dark Web, although Yahoo acknowledged that the breach was much worse than initially expected.
User account information was stolen from the company’s network in late 2014 by what it believes is a state-sponsored actor,” reads the statement.
Users’ names, email addresses, dates of birth, phone numbers, passwords, and in some cases, encrypted and unencrypted security questions-answers were stolen from millions of Yahoo users. Yahoo says it does not believe the stolen information includes credit card information or any bank details of the affected users.
These reports come just as the company is trying to negotiate a deal to sell itself to Verizon for $4.8 Billion. The breach could negatively impact its share price, if so it could cost the company and its shareholders a large slice of its buyout value.
iPhone 7 Jailbreak Has Already Been Achieved In Just 24 Hours!
It has only been a few days since the launch of Apple’s brand new iPhone 7 and iPhone 7 Plus and it appears that the new iPhone has already been jail broken.
Someone is Dropping Malware-infected USB Sticks
Don’t plug in that found USB stick. It will probably infect your computer with malware and viruses. Smash it with a hammer.
A group of researchers from the University of Illinois, the University of Michigan and Google revealed that nearly half of people would not only plug a USB drive they’ve found on the ground into their PCs, but would also open files and click on unfamiliar links.
Photos on Dark Web Reveal Geo-locations Of 229 Drug Dealers
Two Harvard students have unmasked around 229 drug and weapon dealers with the help of pictures taken by criminals and used in advertisements placed on dark web markets.
Digital images contain image dimensions, date and time (when it was originally taken and modified), the model of camera and its settings, information about the software used for editing, it’s creator and copyright information, as well as GPS co-ordinates of the location where the photo was taken.
Thousands play Pokemon Go while driving, US research suggests
Thousands of people are playing Pokemon Go while driving, say US researchers who have studied social media posts. There were “more than 110,000 instances where drivers or pedestrians were distracted by Pokemon Go,” the study, which looked at 10 days of Twitter activity, suggests. Some of these distractions also resulted in crashes, doctors who worked on the research say.
Comcast is Getting Into Cellphone Service
Comcast is to offer cellphone service next year, targeting its existing customers. It will use a combination of cellphone towers leased from Verizon and its own wireless hotspots. Customers Own Routers Part of Network
That network is so large because it not only covers devices in public places such as coffee shops but also uses a “guest mode” on the wireless routers of many cable customers. That setup already allows customers to access the Internet wirelessly when they are near the property of another Comcast customer who also has the mode activated. Exactly how the cellphone service will work hasn’t been confirmed, but it appears voice calls and text messaging will go through the Verizon network. Data use such as mobile web browsing will go through the WiFi hotspots where available with Verizon’s data network used as a backup.
Comcast won’t be totally reliant on Verizon if the cellphone service takes off. It’s reported to be among the bidders in a series of secretive government auctions of unused wireless spectrum that could be used for cellphone services. Of course, there’s no guarantee it will win enough of those auctions to be able to go it alone, or that it would be prepared to build equipment such as cellphone towers to take advantage.