• LulzSec Could Have Hit Apple Servers


    WSJ is reporting that the AntiSec hackers known as LulzSec that have been horsing around the internet using SQL injectors to steal username and password have hit Apple’s servers and taken usernames and passwords.

    The hackers said in a statement posted to Twitter that they had accessed Apple’s systems due to a security flaw used in software used by the Cupertino, Calif.-based gadget maker and other companies. “But don’t worry,” the hackers said, “we are busy elsewhere.” A spokesman for Apple didn’t immediately respond to a request for comment. The posted information comes as part of a two-month campaign of digital heists targeting corporations including Sony Corp. and AT&T Inc., as well as government agencies such as the U.S. Senate, the Central Intelligence Agency and the Arizona Department of Public Safety.

    However in a Previous postings by the group, titled “LulzSec into the iCloud,” they have claimed a much bigger bounty:

    Some weeks ago, we smashed into the iCloud with our heavy artillery Lulz Cannons and decided to switch to ninja mode. From our LFI entry point,we acquired command execution via local file inclusion of enemy flee. Apache vessel. We then found that the HTTPD had SSH auth keys, which let our ship SSH into other servers. See where this is going? We then switched to root ammunition rounds.And we rooted… and rooted… and rooted… After mapping their internal network and thoroughly pillaging all of their servers, we grabbed all their source code and database password which we proceeded to shift silently back to our storage deck.

    Nothing yet whether these info are true.

    LulzSec, short for Lulz Security, the hacker group behind hacking the CIA, U.S. Senate, Nintendo, Sony and others. They took down the CIA’s website, hacked Sony’s servers, released sensitive documents from the Arizona state government and attacked the U.S. Senate’s website. While a suspected member of LulzSec was recently apprehended, the group claims he was not its leader.

    The team claim that they intended to only operate for 50 days as an attempt to revive the AntiSec movement, which is opposed to the computer security industry.

  • Leaked AT&T Documents Hint at LTE 4G iPad


    LulzSec, the 6-man hacking group ended their 50 days reign of “hackery” but after revealing/embarrassing/corrupting/exposing numerous corporations/governments/servers, the guys came with one last act of mischief.

    They once again published confidential data recovered from their latest attack. One prominent folder is titled “AT&T.” other dumped files were leaked from AOL, Disney, Universal, EMI and the FBI.

    Digging through the data, the guys over at iFans have come across some interesting information. The internal AT&T documents reveal that the carrier is planning to roll out their new LTE network in the first week of July, and more ineterstingly hinting at what seems to be an LTE-capable iPad.

    If you’re up for it, the leaked presentation is embedded here. The LTE iPad is mentioned on page 4.

    Pre-LTE scenarios. Testing will include iPad new activations HLS using the new rate plan, as well as a regression on netbooks and dongles. During validation E2E execution should ensure all functionality new and current is still functioning properly by validating account set up, provision, usage and notifications.

    Apple’s 3rd iteration of their popular tablet line is expected to be a major upgrade, with speculation suggesting everything from a Retina display to LTE capabilities.

    LulzSec, short for Lulz Security, the hacker group behind hacking the CIA, U.S. Senate, Nintendo, Sony and others. They took down the CIA’s website, hacked Sony’s servers, released sensitive documents from the Arizona state government and attacked the U.S. Senate’s website. While a suspected member of LulzSec was recently apprehended, the group claims he was not its leader.

    The team claim that they intended to only operate for 50 days as an attempt to revive the AntiSec movement, which is opposed to the computer security industry.

  • Cydia Tweak Brings Lock Screen Camera Button to iOS 4


    As we await the launch of iOS 5, jailbreak developer Filippo Bigarella provides us with a taste of the goodies we’ll be getting our hands on this fall. CameraLock — a great tweak that introduces a camera button to your lock screen.

    The button introduced by CameraLock is customizable, so you can modify its functionality to suit you. You can launch a third-party app instead of the built-in camera.

    How to install?

    • In Cydia -> Add source: http://filippobiga.me/repo/
    • Search for CameraLock and push install
    • Its free
  • JailbreakMe 3.0 For iPad 2 Jailbreak is Imminent?


    iPad 2 is the only device left without jailbreak or accurately Apple’s A5 processor-based architecture in iPad 2 and later iPhone 4S/5 seems a hard puzzle to solve. The Limera1n exploit, which worked on A4-based iOS devices like iPod touch 4G and iPhone 4, is hardware-based and, since iPad 2 is A5-based, the exploit doesn’t work on it. And so the community has to find an all-new exploit this time around.

    iPhone hacker Comex and his JailbreakMe tool, which worked on a userland exploit, used to jailbreak iOS 4.0/4.0.1 with a very simple method of “slide to jailbreak” bar and Comex’s tool did the rest. However the exploit was later patched in iOS 4.0.2.

    Today, Comex has updated his website for the tool JailbreakMe. The updated page teases an image:

    The image shows a signboard with the word “PDF” written on top of it. this is might be pointing towards a potential PDF-based exploit. however its highly likely the new tool would work on iPad 2. Comex teased a lot of tweets:

    We just pin our hopes for an untethered jailbreak for iPad 2 as well as other iOS devices on iOS 5 which is set to release this fall.