Jump to content

Search the Community

Showing results for tags 'hack'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Categories

  • Articles
    • Forum Integration
    • Frontpage
  • Pages
  • Miscellaneous
    • Databases
    • Templates
    • Media

Forums

  • Cars
    • General Car Discussion
    • Tips and Resources
  • Aftermarket
    • Accessories
    • Performance and Tuning
    • Cosmetics
    • Maintenance & Repairs
    • Detailing
    • Tyres and Rims
    • In-Car-Entertainment
  • Car Brands
    • Japanese Talk
    • Conti Talk
    • Korean Talk
    • American Talk
    • Malaysian Talk
    • China Talk
  • General
    • Electric Cars
    • Motorsports
    • Meetups
    • Complaints
  • Sponsors
  • Non-Car Related
    • Lite & EZ
    • Makan Corner
    • Travel & Road Trips
    • Football Channel
    • Property Buzz
    • Investment & Financial Matters
  • MCF Forum Related
    • Official Announcements
    • Feedback & Suggestions
    • FAQ & Help
    • Testing

Blogs

  • MyAutoBlog

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Found 16 results

  1. Lots of kids will be crying homework and assignments all gone 😭
  2. Victor68

    Hacked

    I am receiving this lately,. Then M1 advertisement appears. Am I hacked or something wrong? How to remove this?
  3. https://www.hardwarezone.com.sg/tech-news-hacker-leak-190gb-samsung-data-source-code-security Hackers leak 190GB of data allegedly from Samsung, includes source code and biometric unlocking algorithms By Kenny Yeo - on 7 Mar 2022, 9:48am (Image source: Samsung) The Lapsus$ hacking group has just leaked a huge collection of data that they claim to be from Samsung. The leaked data is presently being shared on a torrent and is presented as three compressed files that amount to nearly 190GB. At the time of writing, the report says they are more than 400 peers sharing the file. And earlier, the group posted a screenshot with C/C++ directives in a Samsung software earlier. And according to the group, the torrent contains data of the following: Source code for every Trusted Applet (TA) installed in Samsung’s TrustZone environment used for sensitive operations (e.g. hardware cryptography, binary encryption, access control) Algorithms for all biometric unlock operations Bootloader source code for all recent Samsung devices Confidential source code from Qualcomm Source code for Samsung’s activation servers Full source code for technology used for authorizing and authenticating Samsung accounts, including APIs and services If it looks bad, that's because it is. If the claims are accurate, Samsung is looking at a major breach that could cause substantial damage to the company. Lapsus$ is the same group behind the recent NVIDIA breach. They are demanding the graphics giant remove limitations on cryptocurrency mining or they will leak the company's source code. However, it is unknown at this time if they have made similar demands of Samsung. In a statement to The Korea Herald, Samsung says it is investigating the incident. Most recently, Samsung was caught throttling the performance of some apps. Source: BleepingComputer https://www.techspot.com/news/93663-nvidia-hackers-leak-190gb-sensitive-data-samsung.html Nvidia hackers leak 190GB of sensitive data from Samsung The leaks includes Samsung's encryption data and source code By Vann Vicente March 6, 2022, 10:12 AM What just happened? Lapsus$, a hacking group that leaked confidential information from Nvidia just last week, has reportedly moved to a new target: Samsung. The hackers have claimed an attack that leaked 190GB of confidential information from the South Korean technology giant, including encryption data and source code for Samsung's most recent devices. The hackers behind the Nvidia security breach are setting their sights on the biggest tech companies in the world. Last week, South American hacker group Lapsus$ claimed to have perpetrated a major hacking attack on Nvidia, stealing over 1TB of information and holding it ransom. The Telegraph reported that Nvidia's internal systems were "completely compromised." On Saturday, the hackers leaked nearly 190GB of data from Samsung, subsequently publishing the files through torrent. This reportedly includes sensitive information that may be used to compromise Samsung devices. The publication vx-underground, which tracks information about malware across the web, tweeted a message that Lapsus$ released to their followers. It alleges that the hack includes "source code from every Trusted Applet installed on all Samsung devices" and "confidential source code from Qualcomm." The leak also purportedly includes the algorithms for biometric unlock operations and the source code for Samsung Accounts, a login service associated with Samsung's mobile devices. According to Bleeping Computer, the torrent has been shared by more than 400 peers, and includes a text file that describes the content available in the download: "Part 1 contains a dump of source code and related data about Security/Defense/Knox/Bootloader/TrustedApps and various other items Part 2 contains a dump of source code and related data about device security and encryption Part 3 contains various repositories from Samsung Github: mobile defense engineering, Samsung account backend, Samsung pass backend/frontend, and SES (Bixby, Smartthings, store)" The Nvidia hack was reported to be a ransom plot, with the hackers threatening to leak Nvidia's mining limiter bypass algorithm. Lapsus$ claimed that Nvidia hacked them back but maintained that they still had a copy of Nvidia's confidential data. Currently, there is no information about an extortion plot associated with the Samsung incident, with all files in the hack being released simultaneously. It is unknown if Lapsus$ has attempted to extort Samsung for a ransom. Samsung has yet to respond to the security breach.
  4. Ysc3

    Wechat kenah hack

    for the past few months I have been getting notifications from wechat that someone is logging into my account at a new device and I will be kicked out of my a/c if the login is successful. initially I thought maybe my wife's iPhone had logged into my a/c unknowingly on home wifi ... but since last night got samsung phone try to log into my a/c !! anyone also got this issue ?? these hackers damn free ... just whack only ... I only use wechat to communicate with my family ... nothing worth hacking also ... *I have both whatapps and wechat ... I know some may complain about privacy issues with wechat but its damn functional.
  5. https://www.channelnewsasia.com/news/singapore/eatigo-data-breach-personal-information-millions-account-13425082 I don't think I do redmart but I have Eatigo... The most stupid thing about Eatigo is that they still claim that your passwords are safe while they are using md5 encryption which is very outdated and is supposedly very easy to break...
  6. Dunno why my accounts keep kenah hack... Even when I don't use them.... Just received two emails asking me to reset my instagram account password. I only register after someone asked me to view some pics there... After that, I don't even view instagram! Weird hackers.
  7. legal hackers invited to try hacking into MINDEF's system to expose vulnerabilities... Mindef invites hackers to test public-facing systems for vulnerabilities http://www.todayonline.com/singapore/mindef-hire-hackers-test-public-facing-systems-vulnerabilities
  8. any bros got into trouble due to the hack? better own up now to your spouse before she finds out! http://www.reuters.com/article/2015/08/19/us-ashleymadison-cybersecurity-idUSKCN0QN2BN20150819 (for full article, click on the link) .....The data dump began to make good on the hackers' threat last month to leak nude photos, sexual fantasies, real names and credit card information for as many as 37 million customers worldwide of Ashley Madison, which uses the slogan: "Life is short. Have an affair." The public embarrassment and emotional toll is likely to be enormous on unsuspecting people whose extra-marital affairs may have been exposed on the web or even whose emails were used without their knowledge to sign up for the site.....
  9. Looking forward to self driving autonomous vehicle in the near future ? Why wait ? You can now remotely hack someone's modern car via your 3G/4G cellnet into the vehicle's CANBUS network. Question is what are you going to do with it when empowered with that remote control. http://www.forbes.com/sites/andygreenberg/2013/07/24/hackers-reveal-nasty-new-car-attacks-with-me-behind-the-wheel-video/
  10. Edward Snowden again! Hot topic in Europe but here... not reported. For everybody's awareness. Your mobile phone might not be secured. Uncle Sam might be reading your smses... HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE https://firstlook.org/theintercept/2015/02/19/great-sim-heist/ AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQdocument, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data. With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.
  11. https://www.youtube.com/watch?v=NIGPiI4TelQ
  12. 35-year-old James Raj Arokiasamy has been charged under the Computer Misuse and Cybersecurity Act for carrying out suspected hack attacks. Lawyer M Ravi © shows the charge sheet for James Raj, the suspected "Messiah" hacker, to reporters outside the Subordinate Courts on Nov 12, 2013. (TODAY/Sion Touhig) SINGAPORE: A 35-year-old man has been charged with hacking the website belonging to Ang Mo Kio Town Council. James Raj Arokiasamy is accused of doing so from a unit in Dorchester Apartment at Jalan Sri Hartamas in Kuala Lumpur, Malaysia, on October 28 at about 1.35pm. He is said to have committed the offence by accessing the content management system of the town council and modifying the contents by adding the image of a Guy Fawkes mask to the website. James Raj is also said to have added a banner with the text: "I have been to various sites and seen how they take the initiative to secure their systems. You have a brain & you have money. You had a choice. Don't blame external factors (Anonymous) for this hack. The Messiah ;)". He also allegedly added a banner with a text stating that Member of Parliament Ang Hin Kee would like to resign from his post. Besides one charge under the Computer Misuse and Cybersecurity Act, James Raj also faces three prior drug charges, which have been amended. He is accused of consuming drugs on May 25, 2011. Earlier in court, the prosecution applied for the accused to be remanded at the Institute of Mental Health for psychiatric evaluation. It also asked for him to be further remanded thereafter to help with police investigations. The prosecution said James Raj had told the police that he suffers from attention deficit hyperactivity disorder, borderline disorder and has suicidal tendencies. It added that since investigations are still in the preliminary stages, no access should be granted to third parties. This request was met with strong objections by James Raj's lawyer, Mr M Ravi, who argued that so far, he has not had access to his client. He said such access should be granted after the accused is held for 48 hours and that denial would be a breach of the constitution. But the prosecution rebutted that under the law, an individual can be held as long as a 20-day period. Mr Ravi also asked the court for permission to speak with his client for five minutes, which was denied. The district judge has asked both parties to come back in the afternoon to sort out the matter. If convicted of hacking a website, an offender can be jailed up to three years and fined S$10,000. On a second or subsequent conviction, the maximum sentence is five years' jail and S$20,000 fine. For consuming drugs, James Raj is looking at 10 years' jail and a S$20,000 fine on each count. Hope this guy gets put away for a long long time...
  13. Did anyone visit Channel News Asia website today? The top left LOGO is GREEN.. LOL Tio hacked? or kena H1N1 ???
  14. OK I found this on eBay: http://cgi.ebay.com/ebaymotors/20HP-O2SENS...1QQcmdZViewItem It basically tricks the ECU to thinking that the engine is running fuel poor and hence blast in more fuel through the injection cycle. I think it can be hacked in a way to make it believe it is running fuel rich as well therefore causing the ECU to lean things out. Air intake volume is still the same. Ingenious or scam? I know if it runs too rich, you basically get the IATS hack situation with blacken spark plugs. Too lean, you gonna see things blow like a hole in the piston. Comments?
  15. Below is a link to Daewootech.com http://www.daewootech.com/forum/viewtopic.php?t=549 Basically he describes how you can hack an IAT sensor so that the engine thinks the air outside is -40 deg C. Doesn't just apply to Daewoos but all cars utilizing an IAT sensor. I'm looking into this. Drawback is that you have to use higher grade petrol but since he described the use of a potentiometer, you can tune your car back to normal.
×
×
  • Create New...