High-end poker cheating devices

This is a crazy story about custom hardware designed to allow for card game cheating, including not only poker but nearly any other card game. Custom hardware made to look like a cell phone plus IR marked cards equals total knowledge about what’s happening on the table.

Upon ordering the poker cheating device I kinda expected, based on the screenshots I had seen early on, to get a dedicated piece of hardware that kinda looked like a fake phone. However, to my surprise, the device, showcased in the picture above, far exceeded my expectations by being a fully functional phone with extra hardware dedicated to cheating. Also to my surprise, the device not only allows to cheat at Poker but to cheat at almost any kind of card games you can think of.

Source: Full(er) House: Exposing high-end poker cheating devices

Mac malware that can tap into live webcam and mic feeds

Security is hard, and the bad guys are clever.

Security researcher and former NSA staffer Patrick Wardle is this afternoon demonstrating a way for Mac malware to tap into live feeds from the built-in webcam and microphone. His presentation is being delivered at the Virus Bulletin conference in Denver later today.

Although any unauthorized access to the webcam will light the green LED – a firmware-level protection that is exceedingly difficult to bypass – Wardle’s presentation shows how a malicious app can tap into the outgoing feed of an existing webca

Source: Former NSA staffer demonstrates Mac malware that can tap into live webcam and mic feeds | 9to5Mac

Source Code for IoT Botnet ‘Mirai’ Released

The source code that powers the “Internet of Things” (IoT) botnet responsible for launching the historically large distributed denial-of-service (DDoS) attack against KrebsOnSecurity last month has been publicly released, virtually guaranteeing that the Internet will soon be flooded with attacks from many new botnets powered by insecure routers, IP cameras, digital video recorders and other easily hackable devices.

Source: Source Code for IoT Botnet ‘Mirai’ Released — Krebs on Security