Language Selection

English French German Italian Portuguese Spanish

Sony battles hackers over hijacked games

Filed under
Gaming

Hackers have cracked piracy protections on Sony Corp.'s PlayStation Portable in the United States, the latest chapter in the company's battle to block unauthorized game use on its new hand-held device.

The world's top maker of video game consoles rolled out a downloadable fix for the software flaw that opened the door for the latest attack by hackers, who quickly cracked the original version of the PSP shortly after its release in Japan late last year.

In their latest move, hackers have enabled PSP users to download some games from pirate Web sites onto removable memory sticks and then to insert the games to run on the PSP.

Currently available titles include "Mercury," Ubisoft's "Lumines," "Coded Arms" from Konami, Taito Corp.'s "Puzzle Bobble" and Sony's own "Intelligent License," according to gaming Web sites.

The new game duplicating trick works on the PSP's 1.5 version firmware, which serves as the PSP operating system. The PSP was released in the U.S. in March with the 1.5 version firmware.

Sony released firmware version 1.51 in May, patching the hole that made room for the hack. Upcoming game titles will require PSP users run updated firmware, a move aimed at preventing users from copying games.

Sony Computer Entertainment America said in an e-mailed statement that hacking or the operation of "homebrew" software programs may damage the PSP, and void the warranty.

The PSP boasts a high-resolution viewing screen and has been in the sights of technology enthusiasts and software programmers, who want to use it to run copies of everything from games and music to e-books to movies.

Groups of hackers are close to releasing new technology that would allow any copied game -- rather than the current, limited set -- to be played on the PSP, an editor at gaming site PS2NFO.com, who identified himself as "CJ," said in an e-mail on Tuesday.

The PSP European launch is set for September.

The world's top maker of video game consoles rolled out a downloadable fix for the software flaw that opened the door for the latest attack by hackers, who quickly cracked the original version of the PSP shortly after its release in Japan late last year.

Source.

More in Tux Machines

GNOME 3.25.3 Released, GTK Development

  • GNOME 3.25.3 Now Available
    GNOME 3.25.3 is now available as the latest stepping stone towards September's release of GNOME 3.26.
  • GNOME 3.26 Desktop Environment Development Continues, New Milestone Is Out Now
    Matthias Clasen has informed the community via an email announcement that the third milestone of the upcoming GNOME 3.26 desktop environment is now ready for public testing. After a one day delay, GNOME 3.25.3 is now available, and it's the third development release of the upcoming GNOME 3.26 desktop environment that could be used by default in popular GNU/Linux distributions, such as the Ubuntu 17.10 (Artful Aardvark) or Fedora 27, both due for release later this year. It brings a bunch of updates and new features to several of its components and apps.
  • Eight years since first release and still no usable theme?
    Well, let me be frank. Ever since gtk-3.0 I've been skeptical of it, especially of the theming aspect. In gtk-2 we had (and still have) many themes ranging from trash to excellent, almost every kind of taste could have been satisfied. Not so in gtk-3. First issue is constant changes to theming API, meaning that despite there being hundreds of themes, only handful of them actually work right :( And among them, I still have yet to find one that would work on my fairly usual 15,6″ laptop screen with 1366×768 px resolution. Basicaly I have two issues.

Microsoft Dirty Tricks and Entryism

Security: Windows Causes Chaos, Routers With Back Doors, Patching of UNIX/Linux

  • Traffic lights in Australia hit by WannaCry ransomware [Ed: Well, who uses Microsoft Windows to manage traffic?!?!]

    Radio station 3aw reports that dozens of pole based traffic calming measures are infected and that this came as a surprise to the local minister and Road Safety Camera Commissioner when radio reporters told him about it.

  • Honda shuts down factory after finding NSA-derived Wcry in its networks
    The WCry ransomware worm has struck again, this time prompting Honda Company to halt production in one of its Japan-based factories after finding infections in a broad swath of its computer networks, according to media reports. The automaker shut down its Sayama plant northwest of Tokyo on Monday after finding that WCry had affected networks across Japan, North America, Europe, China, and other regions, Reuters reported Wednesday. Discovery of the infection came on Sunday, more than five weeks after the onset of the NSA-derived ransomware worm, which struck an estimated 727,000 computers in 90 countries. The mass outbreak was quickly contained through a major stroke of good luck. A security researcher largely acting out of curiosity registered a mysterious domain name contained in the WCry code that acted as a global kill switch that immediately halted the self-replicating attack.
  • GhostHook: CyberArk finds new way to attack Windows 10

    Researchers at CyberArk Labs have discovered a new way of gaining access to the innards of Windows 10 64-bit systems that can bypass existing safeguards, including the kernel patch protection known as PatchGuard that Microsoft developed to improve system security.

  • John McAfee claims 'every router in America has been compromised' by hackers and spies

    Technology pioneer John McAfee believes that every home internet router in America is wide open to cyberattacks by criminal hackers and intelligence agencies. He makes the claim speaking after revelations from WikiLeaks that the Central Intelligence Agency (CIA) targets the devices.

  • 'Stack Clash' Smashed Security Fix in Linux
    What's old is new again: an exploit protection mechanism for a known flaw in the Linux kernel has fallen to a new attack targeting an old problem.
  • Continuous defence against open source exploits
    Register for next month's expo for the public sector DevOps community to hear key speakers from the front line of public sector digital transformation and see the latest technologies at first hand. Andrew Martin, DevOps lead in a major government department, has been added to the line-up of speakers to talk about the importance of getting the approach to security right with open source software.
  • IoT goes nuclear: creating a ZigBee chain reaction [iophk: "use 6lowpan instead"]

    If plugging in an infected bulb is too much hassle, the authors also demonstrate how to take over bulbs by war-driving around in a car, or by war-flying a drone.

  • Passengers given a freight as IT glitch knocks out rail ticket machines

    The network of machines are operated by the individual franchises, but share a common infrastructure from German software company Scheidt and Bachmann.

OpenBSD Development News

  • OpenBSD now has Trapsleds to make life harder for ROPers
  • Historical: My first OpenBSD Hackathon

    I was a nobody. With some encouragement, enough liquid courage to override my imposter syndrome, and a few hours of mentoring, I'm now doing big projects. The next time you're sitting at a table with someone new to your field, ask yourself: how can you encourage them? You just might make the world better.

    Thank you Dale. And thank you Theo.

  • Finish the link-kit job
    We've had the linkkit components in the tree for a while, but it has taken nearly 20 rounds between rpe/tb/myself to get the last few bits finished. So that the link kit is cleanly used at reboot, but also fits in with the practices kernel developers follow.