SparkFun Releases RGB Button Controller

rgb_button

SparkFun has been selling button pad parts for some time and we used them in our RGB door lock project. A excellent part, but you needed to implement your own interface to use the boards. SparkFun has just released two additional versions to make it easier on builders. The first is their Button Pad Controller USB. It has a 4×4 grid of buttons lit by RGB LEDs and a USB interface. This board can be expanded using the Button Pad Controller SPI. The SPI bus means it should be easy to add the button pad to embedded projects. This newest release puts you much closer to building your own RGB monome clone or other custom controller than ever before. The unit pictured above is their own project and they have no plans on selling anything like it.

ToorCamp 2009 To Be Held At Missile Silo

toorcamp

After running a successful hacker convention for ten solid years, the people who brought you ToorCon are planning a new event to shake up the US hacker scene. ToorCamp will be held July 2nd-5th, 2009 at a former missile silo in central Washington state. Hackers will camp on-site for two days of talks followed by two days of workshops. Art and music events are planned for every night. Camps like this are already help biannually in Europe: What the Hack in 2005, Chaos Communication Camp 2007, and Hacking at Random 2009, coming this fall. The complex is one of three Titan 1 missile complexes in the Moses Lake area. The sites were in operation less than three years between 1962 and 1965. The former missile command center has been converted to a secure data center run by Titan I, LLC. ToorCamp promises to be a very unique experience and we’re looking forward to attend this and future years.

Pandora Case Prototype

[youtube=http://www.youtube.com/watch?v=6T6zzV1vmOI]

The last time we checked in on Pandora it was just being shown in dev unit form. Embedded above is a video of the first case prototype. It doesn’t have any components yet, but it definitely looks like a good formfactor with a lot of potential. The Pandora is a Linux based portable game console with an 800×480 touchscreen.

[via Gizmodo]

Malware Posing As Change.gov

change

PandaLabs has identified a botnet running a malware campaign impersonating president-elect Obama’s website. The front page of the site features a sensational story titled “Barack Obama has refused to be a president”. Clicking the link will download the malware and make the target’s machine part of the botnet. They’re using fast-flux to assign the malicious domains to the massive number of compromised nodes that are hosting the actual site. The team has contacted the domain name registrar in China to get the domains removed. Using a sensational headline is not new to malware; it’s how the Storm Worm got its name.

[via lithium]

IPod Touch 2G Jailbreak Demoed

redsn0w

Now that the iphone-dev team has unlocked the iPhone 3G they’re moving onto jailbreaking the iPod Touch 2G. While they have a fully working jailbreak, it’s not yet in a user friendly format. [MuscleNerd] did a live video demo this afternoon to show what progress they had made. It starts with him showing the iPod on but not booting. He’s already patched the kernel, but it’s failing the signature check in iboot. He then uses the team’s recoverytool to exploit a hole in iboot and patch out the signature check. The ipod then boots normally and he shows non-App Store software like Mobile Terminal, Cydia, and an NES Emulator (which makes use of the iPod’s internal speaker).

The redsn0w jailbreak works, but it has to be applied via tether every time the iPod boots. The team won’t release anything until they’ve found a way around this problem. For more insight into the boot process, check out our coverage of their Hacking the iPhone talk at 25C3.

Dismantling The Storm Worm Botnet

malware

Zero Day has an interview with German researchers who have found a way to take down the Storm Worm botnet. Their program, Stormfucker, takes advantage of flaws in Storm’s command network: Nodes that are NAT‘d only use a four-byte XOR challenge. Nodes that aren’t NAT’d are only using a trivial 64bit RSA signature. Their solution can clean infected machines and also distribute to other nodes. Unfortunately, installing software without the user’s consent is the exact same behavior as malware. Don’t expect to see this in any sort of widespread use. The researchers did point out that some ISPs have moved to shutting off service for infected customers until their machines are cleaned.