JudoChinX writes: Jason Trent with GoozerNation writes: "Ever since I was introduced to the Resident Evil franchise at the age of 10, I've always had a soft spot for the survival horror genre of games. I might be a little masochistic, but feeling uneasy while enjoying entertainment has appealed to me for as long as I can remember. Scary movies, games, books: I love them all. As my tastes in such material matured, I began appreciating the more psychological side of things. It wasn't enough to have things jump out at me. I wanted the characters and stories to get inside my head and stay with me. I had to be afraid even after it was over. Alan Wake caught my attention for these reasons and has been in development for what seems like an eternity. It's finally complete and it was worth the wait." Link to Original Source
An anonymous reader writes: Hayley Williams, the 21-year-old lead singer of the American rock band Paramore, is once again making waves because of her revealing photographs — but this time because malicious hackers are using the lure of her naked body in a clickjacking attack which has spread widely across Facebook today.
Messages saying "<name> likes Paramore n-a-k-ed photo leaked!" have been appearing on thousands of users' Facebook profiles, in the latest exploitation of the site's controversial "Like" facility.
According to security blogger Graham Cluley, who provides instructions on how to identify and clean-up the infection, "Facebook needs to tighten up the way it handles the 'liking' of external webpages before it is even more widely abused by malicious hackers and spammers."
Meanwhile, the cybercriminals are adopting another tactic for those victims who do not fit into the demographic of users likely to be interested in Hayley Williams' naked torso, by offering the phone number and address of teen heart throb Justin Bieber.
tcd004 writes: Since the gulf oil crisis began, PBS NewsHour and NPR have transcoded the BP live video stream and rebroadcast it in FLV format to reach the widest possible audience. We feel strongly that we are providing a public service by streaming a reliable, consistent feed of the goings on 5,000 feet below the surface of the gulf. But our bandwidth budget is running out. We're looking for a CDN or other organization willing to donate the bandwidth to cover this story to its conclusion. Give us a hand. If you can help us out, please email us at firstname.lastname@example.org. Thanks!
alphadogg writes: Hoping to understand what a new generation of mobile malware could resemble, security researchers will demonstrate a malicious "rootkit" program they've written for Google's Android phone next month at the Defcon hacking conference in Las Vegas.
Once it's installed on the Android phone, the rootkit can be activated via a phone call or SMS message, giving attackers a stealthy and hard-to-detect tool for siphoning data from the phone or misdirecting the user. "You call the phone, the phone doesn't ring, and when the phone realizes that it's being called by an attacker's phone number, it sends him back a shell [program]," said Christian Papathanasiou, a security consultant with Chicago's Trustwave, the company that did the research.
Because the rootkit runs as a module in Android's Linux kernel, it has the highest level of access to the Android phone and can be a very powerful tool for attackers. For example, it could be used to reroute a victim's 911 calls to a bogus number. The rootkit could also track a victim's location or even reroute his browser to a malicious Web site. On its own, Trustwave's rootkit isn't much of a threat to Android users. That's because a criminal would first need to figure out how to install the software on a victim's phone. This could be done by building the rootkit into a rogue application sold via the Android Market, or by exploiting a new, unpatched bug in Android's Linux kernel that could allow the program to be installed. Link to Original Source