Salta al contenuto principale


The Halo 3C is a vape detector installed in schools and public housing. A young hacker found it contains microphones and that it can be turned into an audio bug, raising privacy concerns.#News #Hacking


It Looks Like a School Vape Detector. A Teen Hacker Showed It Could Become an Audio Bug


This article was produced with support from WIRED.

A couple of years ago, a curious, then-16-year-old hacker named Reynaldo Vasquez-Garcia was on his laptop at his Portland-area high school, seeing what computer systems he could connect to via the Wifi—“using the school network as a lab,” as he puts it—when he spotted a handful of mysterious devices with the identifier “IPVideo Corporation.”

After a closer look and some googling, Garcia figured out that a company by that name was a subsidiary of Motorola, and the devices he’d found in his school seemed to be something called the Halo 3C, a “smart” smoke and vape detection gadget. “They look just like smoke detectors, but they have a whole bunch of features like sensors and stuff,” Garcia says.

As he read more, he was intrigued to learn that the Halo 3C goes beyond detecting smoke and vaping—including a distinct feature for discerning THC vaping in particular. It also has a microphone for listening out for “aggression,” gunshots, and keywords such as someone calling for help, a feature that to Vasquez-Garcia immediately raised concerns of more intrusive surveillance.

Upgrade to continue reading


Become a paid member to get access to all premium content
Upgrade


Breaking News Channel reshared this.



The wiping commands probably wouldn't have worked, but a hacker who says they wanted to expose Amazon’s AI “security theater” was able to add code to Amazon’s popular ‘Q’ AI assistant for VS Code, which Amazon then pushed out to users.

The wiping commands probably wouldnx27;t have worked, but a hacker who says they wanted to expose Amazon’s AI “security theater” was able to add code to Amazon’s popular ‘Q’ AI assistant for VS Code, which Amazon then pushed out to users.#News #Hacking





A class-action lawsuit filed against the surgeon claims he also did nothing to protect his patients’ data, including their financial information and nude photos of them.#News #Hacking


Hackers behind the breach of “nearly all” of AT&T customers’ metadata searched for records associated with members of the Trump family, Kamala Harris, and Marco Rubio’s wife.#News #Hacking


The forums for Path of Exile 2 have been awash with people claiming they’ve been hacked and their inventories emptied of valuable items. Now there’s an explanation for at least dozens of the account compromises.#News #Hacking


Members of an underground criminal community are targeting U-Haul because of the wealth of non-public information it can hold on targets.#News #Hacking


The indictment also charges a second hacker that 404 Media previously reported as being linked to the AT&T breach.#News #Hacking


Connor Moucka said he didn't have a lawyer yet. He was arrested at the request of the U.S.

Connor Moucka said he didnx27;t have a lawyer yet. He was arrested at the request of the U.S.#News #Hacking



For more than a week Judische, the hacker linked to the AT&T, Ticketmaster and other breaches, has not been responding to messages. That's because he's been arrested.

For more than a week Judische, the hacker linked to the AT&T, Ticketmaster and other breaches, has not been responding to messages. Thatx27;s because hex27;s been arrested.#News #Hacking



The breach does not appear to impact the main consumer Verizon network, and instead involves the company’s push to talk (PTT) product, marketed to public sector agencies and enterprises.#News #Hacking


Fin7 has made multiple ‘nudify’ sites that promise to use AI to undress photos of people but which are actually vehicles for malware, according to researchers. 404 Media found one advertised on one of the web's biggest porn aggregators.

Fin7 has made multiple ‘nudify’ sites that promise to use AI to undress photos of people but which are actually vehicles for malware, according to researchers. 404 Media found one advertised on one of the webx27;s biggest porn aggregators.#News #Hacking



A security researcher managed to pull a list of Ghost users, resellers, and even customer support messages from an exposed server. It shows how as organized criminals move to making their own encrypted platforms, they might make vulnerable products.#News #Hacking


As security researchers circle around Judische, and authorities takedown his servers, how much longer will a hacker responsible for breaching Ticketmaster, AT&T, and many more companies remain free?#Features #Hacking


Infostealer malware is often hidden in pirated or cracked software, and hackers then post the harvested credentials and other data online. Criminals have been infected too.#News #Hacking



A set of credentials related to the GPS tracking company Trackimo let a hacker access an internal troubleshooting tool and retrieve customers’ recent locations.#News #Hacking


Inside the FBI's Dashboard for Wiretapping the World

Never-before-published screenshots of an internal FBI tool show how the agency monitored millions of messages from the secretly backdoored messaging app Anom.#News #Hacking




“As you may or may not know, a well-known hacking convention will be held in Las Vegas during your stay,” Resorts World Las Vegas writes. “We will be conducting scheduled, brief visual and non-intrusive room inspections daily,” it adds.#News #Hacking