Personal Tech Pipeline | News | xBox 360 May Be Juicy Target For Hackers

White Papers

Sponsor Resources

WebCasts
Free Newsletter GlossaryContact UsAbout Us
Players & CamsPhones & PDAsHome & AutoOnline

October 21, 2005

xBox 360 May Be Juicy Target For Hackers



Courtesy of TechWeb News

Even game consoles are under attack by hackers, a security company noted Friday. But although the current crop poses little risk to the average player, the next generation may if attackers decide to take on the Internet-centric xBox 360, Microsoft's next game machine.

Panda Software said that over the last several days, it has tracked a trio of Trojans that aimed to reduce Sony's PSP (PlayStation Portable) and the Nintendo DS game consoles into expensive bricks.

The three pieces of malware -- Format.a, Tahen.a, and Tahen.b -- pose as tools to run unsigned code (games that have been cracked, and then illegally copied) on the PSP or as homemade applications for the Nintendo. When users install them, however, the Trojans overwrite portions of the consoles' firmware -- the software embedded in the machines) and make then unusable.

While that may sound vicious -- rival security firm F-Secure posted a 14MB video file of a PSP being infected, and obliterated -- it's not as dangerous as it sounds, Panda said.

"Videogame consoles are not designed for using third-party software," said Luis Corrons, the director of Panda's research labs, in a statement. "In order for the malicious codes detected so far to reach one of these consoles, users would have to voluntarily run applications from unauthorized sources. Remember that just as with PCs, downloading and running software from dubious sources is always a serious security risk."

Soon, however, the risk to gamers may get a boost from the xBox 360, the Microsoft console expected to ship next month.

xBox 360 is much more Internet-centric than other consoles," argued Patrick Hinojosa, the chief technology officer of Panda, in an interview. "It has a lot more online capabilities, and because of that I think that malicious code will be more prevalent than on other systems."

While he doesn't see a risk in the xBox 360-Windows XP Media Center connection -- the two devices don't share a similar operating system -- Hinojosa expects that hackers will post code online disguised, for instance, as a game crack. "It may not happen in the immediate future, but I think it's a potential danger," he said.

In part, the fact that xBox has a Microsoft nameplate will draw attackers. "There's a certain segment of people who just don't like Microsoft, and the numbers in the black hat [hacker] community are even greater.

E-mail This Story
Print This Story
Reprint This Story




Get the latest Personal Tech news, product info, and trends every week.


Related Content

  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Main RSS Feed
  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Blog RSS Feed



Keeping Up To Date On Enterprise Server Tech?
Review our compilation of columns on server security, database software, and Linux issues.
How to Achieve High Performance Through IT
Learn to achieve high performance by aligning IT to
strategic objectives and solutions to unlock that value.
Using Current Performance to Shape
Future Results

Hear new strategies for improving business
performance and results.

Editor's Picks

Well, Microsoft has "unfolded" its "Origami" ultra-mobile PC platform Thursday. It turned out to be a full-featured PC smaller than a tablet but bigger than a PDA. Are you impressed?
Yes! I want one!
Sort of. We'll see.
No! It's too big for a pocket and too small for real computing. What's the point?


In search of personal tech products? See our new Product Finder, where you'll find personal computing devices, communications solutions, security products, and more.



PERSONAL TECH PIPELINE MARKETPLACE (sponsored links)
Transform your IT infrastructure with IBM
Successful CIOs see IT as a prime stimulus for business innovation-and themselves as key participants in a process that develops business and IT strategies in concert. Read an executive summary and register to download the full IBM paper.

Symantec Backup Solutions
Desktop to Data Center Protection. Explore the Official Symantec Site.

SEC & HIPAA IM Compliance
Satisfy regulatory and compliance requirements for instant messaging.

Secure & Easy Console Management with Digi CM
The Digi CM console server provides secure, intelligent & easy access to network devices with a serial console port. With Digi CM, you can securely monitor & control servers, routers, switches & other devices even when your network is down.

Understand the financial impact of open source.
Will open source pay off? Open source is becoming standard within enterprises, often because of cost savings. Find out how much of a financial impact it can have on your organization. Get this methodology and calculator now, compliments of JBoss. Go!


Buy a Link Now


Top ten search terms from the TechWeb TechEncyclopedia
How does your pay rate? Check the InformationWeek Salary Survey
Mobilized Solutions Guide: Find and compare solutions for your business
Top Requested White Paper Categories from TechWeb White paper Library
Top ten search terms from the TechWeb TechEncyclopedia