Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Unity Starts Pushing Open Source

September 4, 2014 by  
Filed under Computing

Comments Off on Unity Starts Pushing Open Source

Unity Technologies has stepped up its commitment to democratising game development by making key components of its ubiquitous engine open source.

At present, that applies to the Unity Test Tools and the engine’s new graphical user interface system, which was demonstrated in the opening keynote of Unite 2014. The features will be available under the MIT/X11 license, giving users the freedom to “control, customise and extend” their functionality.

The source code for the components will be hosted on BitBucket, and Unity has prepared a guide for any interested open source contributors. The source for the Unity Test Tools is already available, with the GUI to follow.

“Beyond that, we don’t have a concrete plan, but we have a lot of things in the pipeline,” the company said in a statement. “These components will all be isolated from Unity in such a way that you can modify them and use your own modified version with the official public Unity release.

“Although Unity Technologies has been active in the open-source community for quite some time, this is the first time we’ll be opening the source to components of Unity itself.

“We’re excited to see what you do with it.”

Source

Did The British Go After Anonymous?

February 17, 2014 by  
Filed under Around The Net

Comments Off on Did The British Go After Anonymous?

Did a British Spy agency linked to GCHQ attacked hacktivists of the Anonymous and Lulzsec collectives, according to leaked US National Security Agency (NSA) documents?

NBC published documents obtained by NSA whistleblower Edward Snowden showing that the group codenamed the Joint Threat Research Intelligence Group (JTRIG) proactively attempted to shut down and spread misinformation throughout the Anonymous collective.

The leaked document allege that the unit attempted to phish Anonymous members and launched attacks designed to disrupt and infiltrate its networks as part of an operation called Rolling Thunder.

The documents show the spies mounted a sophisticated espionage campaign that enabled intelligence officers to phish a number of Anonymous members to extract key bits of information.

The documents include conversations between intelligence officers and Anonymous members G-Zero, Topiary and pOke in 2011.

One log shows that a GCHQ spy duped the hacker pOke into clicking on a malicious link dressed up to look like a news article about Anonymous. The link used an unspecified method to extract data from the virtual private network (VPN) being used by pOke.

The documents allege pOke was not arrested, but that the information acquired during the phishing attack was used in the arrest of Jake Davis, who was known as Topiary, in July 2011.

Davis’ arrest was taken as a key victory for law enforcement. British citizen Davis was believed to have acted as a spokesman for many Anonymous cells and is credited as having written several of its statements.

A GCHQ spokesman declined The INQUIRER’s request for comment on NBC’s report, but reiterated the agency’s previous insistence that all of its operations are carried out within the letter of the law.

“It is a longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ’s work is carried out in accordance with a strict legal and policy framework,” read the statement.

Experts in the security community have questioned the GCHQ’s argument. Corero Network Security COO Andrew Miller said that the secret unit’s use of blackhat tactics was at the very least morally questionable.

“We have to remember that cyber-spooks within GCHQ are equally if not more skilled than many black hat hackers, and the tools and techniques they are going to use to fight cybercrime are surely going to be similar to that of the bad guys,” he said.

“Legally, we enter a very grey area here, where members of Lulzsec were arrested and incarcerated for carrying out DDoS attacks, but it seems that JTRIG are taking the same approach with impunity.”

The campaign against Anonymous is one of many revelations from the leaked Snowden files.

The files initially were leaked to the press in 2013 and detailed several intelligence operations carried out by the UK GCHQ and US NSA. Documents emerged in January alleging that GCHQ and NSA used mobile apps such as Angry Birds to spy on citizens.

Source

Some Hackers Going To Jail

October 15, 2013 by  
Filed under Computing

Comments Off on Some Hackers Going To Jail

Thirteen people have been indicted, accused of being members of the Anonymous hacktivist group and allegedly involved in Operation Payback.

Operation Payback was the retaliation against payment firms that Anonymous put in motion following their blocking of Wikileaks donations.

The 13 are accused of taking part in a series of distributed denial of service (DDoS) attacks, and the US Department of Justice filed a federal grand jury indictment in US District Court in Alexandria, Virginia. The indictment charges them with conspiracy to intentionally cause damage to protected computers.

Anonymous is a loosely linked digital rights collective. In its early days it pulled together volunteers from all walks of life.

Operation Payback struck a number of organisations including Mastercard, Visa, Paypal and the Motion Picture Association of America. The attacks lasted between September 2010 and January 2011. As well as retaliating against payment providers, part of Operation Payback was aimed at parties thought to be involved in a campaign against The Pirate Bay.

Agence France Presse (AFP) has seen the indictment and named those indicted in it. They are Dennis Owen Collins, Jeremy Leroy Heller, Chen Zhiwei, Joshua Phy, Ryan Russel Gubele, Robert Audubon Whitfield, Anthony Tadros, Geoffrey Kenneth Commander, Austen Stamm, Timothy Robert McLain, Wade Carl Williams and Thomas Bell.

According to AFP the 13 alleged Anonymous members “planned and executed a coordinated series of cyber-attacks against victim websites by flooding those websites with a huge volume of irrelevant internet traffic with the intent to make the resources on the websites unavailable to customers and users of those websites.”

In short, they are accused of having conducted a digital sit-in protest.

Source