Hackin9

Six people have been charged in what prosecutors say was a scheme to hack Connecticut state lottery terminals so they produced more winning tickets and fewer losing ones.

At least two of the suspects have been charged with felonies, including first-degree larceny, first-degree computer crimes, and rigging a game, according to an article published by The Hartford Courant. The suspects allegedly owned or worked at retail stores that produced winning tickets in numbers that were much higher than the state average. Of tickets generated at one liquor store, for instance, 76 percent were instant winners in one sample and 59 percent in another sample. The state-wide average, meanwhile, was just 24 percent. After manipulating the terminals, the suspects cashed the tickets and took the proceeds, prosecutors alleged.

The charges come several months after lottery officials suspended a game called the 5 Card Cash after they noticed it was generating more winning tickets than its parameters should have allowed. The game remains suspended. Investigators say more arrests may be made in the future. Almost a year ago, prosecutors in Iowa presented evidence indicating the former head of computer security for the state's lottery association tampered with lottery computers prior to buying a ticket that won a $14.3 million jackpot.

Read 2 remaining paragraphs | Comments

 
[CVE-2016-2164] Arbitrary file read via SOAP API
 
[CVE-2016-2163] Stored Cross Site Scripting in Event description
 
[CVE-2016-0783] Predictable password reset token
 

Techworm

Amazon's guide to make your own Raspberry Pi powered Alexa device
Techworm
If you ever wanted to make your own Alexa device, the only thing that you will require is a Raspberry Pi, and the rest is going to be handled by Amazon. That is correct, the leading e-commerce giant has made its own guide on how you can make your own ...

and more »
 
[security bulletin] HPSBGN03563 rev.1 - HPE IceWall Products using OpenSSL, Remote Denial of Service (DoS), Local Denial of Service (DoS), Disclosure of Information
 
[security bulletin] HPSBMU03562 rev.2 - HPE Service Manager using Java Deserialization, Remote Arbitrary Code Execution
 
Internet Storm Center Infocon Status