#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

Xbox account hacking | Breaking Cybersecurity News | The Hacker News

Gamer Drugged His Girlfriend So He Could Play Xbox for a Few More Hours

Gamer Drugged His Girlfriend So He Could Play Xbox for a Few More Hours

Jul 12, 2015
Yes, you heard it right. A gamer drugged his girlfriend to avoid interruption while playing on his Microsoft's Xbox Live . The 23-year-old German man, who has not been named, was fined EUR€500 (approx USD$555) by a judge in a Castrop-Rauxel district court, German website The Local reports . The man admitted in front of judge that he put between four and five drops of a sedative in his girlfriend's tea to make her fall asleep, so he could keep playing the video game on his console. His girlfriend fell asleep for more than 12 hours and wake up midday on the next day, but even after waking up she felt constantly drowsy.  "Then I got up and drove to work although I was nodding off again and again," the victim told. Girlfriends Broke-Up with her Boyfriend The offender's girlfriend, 24, broke up with her now-ex-boyfriend after he did this to her. Sentencing the man, the court judge said: "Your girlfriend slept long and deeply, wh
5-year-old Boy discovers Microsoft Xbox Password Bypass vulnerability

5-year-old Boy discovers Microsoft Xbox Password Bypass vulnerability

Apr 04, 2014
A 5-year-old San Diego boy managed to hack one of the most popular gaming systems in the world, Xbox and has now been acknowledged as a security researcher by Microsoft. Kristoffer Von Hassel uncovered a vulnerability in Xbox Live's password system, that would allow someone to log into a Xbox player's account without their password. Kristoffer's parents noticed he was logging into his father's Xbox Live account simply by tapping the space bar. YES, BACKDOOR ENTRY WITH JUST SPACE-BAR His father noticed that Kristoffer logged in as his Xbox Live account to play video games that he wasn't meant to be playing and asked how he had done it.  Kristoffer revealed that by typing in the wrong password and then by pressing the spacebar, he bypassed the password verification through a backdoor, and it was pretty simple! HIS FEELING, "was like yeah!" 5-year-old gamer actually hacked the authentication system of a multi-billion dollar company,
Code Keepers: Mastering Non-Human Identity Management

Code Keepers: Mastering Non-Human Identity Management

Apr 12, 2024DevSecOps / Identity Management
Identities now transcend human boundaries. Within each line of code and every API call lies a non-human identity. These entities act as programmatic access keys, enabling authentication and facilitating interactions among systems and services, which are essential for every API call, database query, or storage account access. As we depend on multi-factor authentication and passwords to safeguard human identities, a pressing question arises: How do we guarantee the security and integrity of these non-human counterparts? How do we authenticate, authorize, and regulate access for entities devoid of life but crucial for the functioning of critical systems? Let's break it down. The challenge Imagine a cloud-native application as a bustling metropolis of tiny neighborhoods known as microservices, all neatly packed into containers. These microservices function akin to diligent worker bees, each diligently performing its designated task, be it processing data, verifying credentials, or
Cybersecurity Resources