TechSpot

Weekend tech: Hacked DVRs, cameras behind massive DDoS, AT&T to buy Time Warner, RIP David Bunnell

By Julio Franco
Oct 22, 2016
Post New Reply
  1. Hacked Cameras, DVRs Powered Today’s Massive Internet Outage At first, it was unclear who or what was behind the attack on Dyn. But over the past few hours, at least one computer security firm has come out saying the attack involved Mirai, the same malware strain that was used in the record 620 Gpbs attack on my site last month. At the end September 2016, the hacker responsible for creating the Mirai malware released the source code for it, effectively letting anyone build their own attack army using Mirai. Krebs on Security

    Remembering PC Magazine founder David Bunnell We mourn the passing of the man who started PCMag, PC World, and many other publications after his start in computing working on the legendary Altair 8800. PCMag & FastCo

    AMD drops prices on the Radeon RX 460 and RX 470 Nvidia's GeForce GTX 1050 and GTX 1050 Ti graphics cards don't start hitting store shelves until next Tuesday, but it seems AMD is already girding itself for a battle over budget and mainstream graphics superiority. Tech Report

    AT&T Agrees to Buy Time Warner for Around $80 Billion AT&T has agreed to buy Time Warner for more than $80 billion, a person briefed on the matter said on Saturday, a move that would create a new colossus in the worlds of media and telecommunications. Putting together AT&T, a sprawling video and internet empire that encompasses cellphone and cable service along with DirecTV, and Time Warner’s media holdings, which include HBO, CNN and the movie studio Warner Bros., would create a formidable new player and potentially spur even more deals. NYTimes

    One day later, additional Nintendo Switch details dribble out "The dock is not the main console unit of Nintendo Switch": Nintendo confirmed to IGN that "the main unit of Nintendo Switch is the unit that has the LCD screen." The dock's main functions are TV output and power/charging, Nintendo said, which suggests the dock won't actually have much in the way of additional hardware to enable higher-fidelity play on an HDTV. Ars Technica

    AMD beats Q3 expectations The company's revenues were up 23 percent year over year, primarily because of its record semi-custom SoC and higher GPU and mobile APU sales. ZDNet

    LG Electronics to Eliminate ‘Modules’ for Its Next Smartphone (G6) LG Electronics is not going to apply modularized structure for its next strategic Smartphone called ‘G6 (tentative)’ that is expected to be released in 2017. It is basically withdrawing its strategy of modularization that was first introduced to G5 in just a year. ETNews

    Pittsburgh's AI Traffic Signals Will Make Driving Less Boring Idling in rush-hour traffic can be mind-numbing. It also carries other costs. Traffic congestion costs the U.S. economy $121 billion a year, mostly due to lost productivity, and produces about 25 billion kilograms of carbon dioxide emissions, Carnegie Mellon University professor of robotics Stephen Smith told the audience at a White House Frontiers Conference last week. In urban areas, drivers spend 40 percent of their time idling in traffic, he added. IEEE

    Google Has Quietly Dropped Ban on Personally Identifiable Web Tracking The practical result of the change is that the DoubleClick ads that follow people around on the web may now be customized to them based on your name and other information Google knows about you. It also means that Google could now, if it wished to, build a complete portrait of a user by name, based on everything they write in email, every website they visit and the searches they conduct. ProPublica

    Permalink to story.

     
    Last edited by a moderator: Oct 23, 2016
  2. Uncle Al

    Uncle Al TS Evangelist Posts: 1,663   +774

    Will show my ignorance here a bit and perhaps I'm just day dreaming. It would seem to me that it should be possible to develop a simple Router that had both hard and soft coding so the homeowner could change either, or both at the first sign of trouble. Hard coding could be something as simple as the old dip switches. Can't remember seeing such a thing, but it shouldn't be too hard to build .... the question is, would it be effective?

    Comments? Recommendations? I'll read all about it later after my nap(s) ....
     
  3. yRaz

    yRaz TS Evangelist Posts: 1,898   +941

    Pittsburgh traffic isn't bad because of the traffic lights, it's bad because the roads suck and everyone slows down when going through a tunnel or under an overpass.
     
  4. wiyosaya

    wiyosaya TS Evangelist Posts: 1,038   +269

    Cameras, DVRs, surprise, surprise. Next it will be IoT devices.
     
    MoeJoe and wastedkill like this.
  5. Forebode

    Forebode TS Booster Posts: 80   +7

    do you mean like dual bios's on motherboards and vcards? And how "simple" would the router be?
     
  6. Yynxs

    Yynxs TS Enthusiast Posts: 84   +16

    A lot of security solutions are surprisingly simple but no one wants to deal with them. "...that takes too long...". If you remember a number of years ago, there were 2 inch CDs that were touted great for electronic business cards. Using them or something similar or higher density that is NOT REWRITABLE and a power on reload of the bios would mean every compromised device would have to be black hat reacquired whenever the owner feels threatened or is requested to do so. Even a physically timed power cut (the old wind it tick-tick-tick switches) would make compromising systems a logistical nightmare.

    New BIOS or upgrades CDs could be mailed (yes mailed) from manufacturers to device owners that honestly want a secure device. Equally, the device purchaser can make their own.

    Right now, the manufacturers are not being held monetarily responsible for the damage. If and when someone (and hopefully a government or two) get started on the court processes and charges for damages, fines for failure to comply, and jails for greed, the problem will get fixed.

    Personally, I'm in favor of firing squad for hackers, televised on international channels. Might also get the attention of the two-bit device makers.
     
  7. Yynxs

    Yynxs TS Enthusiast Posts: 84   +16

    ...It also means that Google could now, if it wished to, build a complete portrait of a user by name, based on everything they write in email, every website they visit and the searches they conduct....

    I need to forward this article to DOD. Just realized they probably still don’t have
    people in the Google server area and all their web sites and personnel using and sending to and receiving from gmail are at risk of being 'revealed' to any foreign power WITH people in google servers. With Google being used on EVERY government web site except the Patent Office.....hmmm.
     
  8. Kibaruk

    Kibaruk TechSpot Paladin Posts: 2,507   +498

    The question is... Why would you want to do this? What is the need or problem it will solve?
     
    Uncle Al likes this.
  9. Uncle Al

    Uncle Al TS Evangelist Posts: 1,663   +774

    No real purpose, just giving a little play thing for us old Techie's ..... kind of like using colored beads on our abacus!
     

Similar Topics

Add New Comment

You need to be a member to leave a comment. Join thousands of tech enthusiasts and participate.
TechSpot Account You may also...