Tag Archive for: early

Early Grand Theft Auto 6 footage may have just leaked


Rockstar Games appears to be the victim of a massive security breach, as a hacker reportedly stole at least 90 video clips from the company showing off an early build of Grand Theft Auto 6.

The clips appear to have surfaced online late on Saturday night on GTAForums, a message board dedicated to the Grand Theft Auto series. A user named “teapotuberhacker” posted a folder containing 90 video clips, noting that the link contained “GTA 5 and 6 source code and assets, GTA 6 testing build.” The hacker notes that they may “leak more data soon,” indicating that this could just be the beginning of a much longer leak.

While fans have spent the hours since the leak debating the authenticity of the clips, reports indicate that they are legitimate. Bloomberg’s Jason Schreier notes that Rockstar sources confirmed the leak. “Not that there was much doubt, but I’ve confirmed with Rockstar sources that this weekend’s massive Grand Theft Auto VI leak is indeed real,” Schreier tweets. “The footage is early and unfinished, of course. This is one of the biggest leaks in video game history and a nightmare for Rockstar Games.”

Not that there was much doubt, but I’ve confirmed with Rockstar sources that this weekend’s massive Grand Theft Auto VI leak is indeed real. The footage is early and unfinished, of course. This is one of the biggest leaks in video game history and a nightmare for Rockstar Games

— Jason Schreier (@jasonschreier) September 18, 2022

Considering the quality of the clips, their authenticity wouldn’t be surprising. The 90 videos show off several aspects of the open-world crime game, including armed robberies. While the visuals still look early, some of the videos include full voice acting. They also feature both a male and female protagonist, which backs up a Bloomberg report from July. Most notably, code and debug tools appear on top of the clips. While Schreier’s sources indicate the videos are real, Rockstar itself still hasn’t made an official statement and the videos have yet to be scrubbed from the internet.

A leak of this scale would be somewhat unprecedented for the highly secretive video game industry. While small leaks are somewhat…

Source…

Amazon plans more home robots despite early skepticism about Astro – GeekWire


Ken Washington, Amazon’s VP of consumer robotics, with the Amazon Astro home robot. (GeekWire Photo / Todd Bishop)

Amazon unveiled Astro, its first home robot, in September, after developing the rolling Alexa device in secret for several years. In an introductory video, the company anticipated the skepticism Astro would face.

“A robot?” a mom in the video asks. “What are we going to do with a robot?”

In this fictional world, of course, Astro wins people over with its ability to navigate autonomously through a house, serve as a mobile security and video conferencing hub, check the stove with its periscoping camera, help family members check in on older relatives, start a dance party, and deliver a drink to someone on the couch.

In the real world, however, Astro still has some convincing to do.

Astro “is a solution in search of a problem,” concluded CNET’s David Priest in his review. “It’s cool, undeniably, and I’m excited to see what home robots look like in the near future … But for now, Astro remains an interesting device with a lot of potential, but too little utility to really be worth that price tag.”

That price tag, for now, is $1,000, if you’re one of the limited number of customers whose request to purchase Astro is approved through Amazon’s Day One Editions preview program. Eventually, when Astro is more widely released to the general public, the price is expected to go up to $1,500.

Astro is 17-inches tall with a 10-inch display, a rear cargo hold and a periscoping camera.

It rolls around autonomously on two wheels. In essence, it’s a mobile Echo device, responding to questions in the voice of Alexa. Astro otherwise communicates through beeps and blips and a pair of expressive digital “eyes” in the form of simple animated emoticons on its screen.

Amazon acknowledges the skepticism about Astro but makes it clear that it’s not giving up so easily. The company is working on improvements based on initial feedback, and it describes Astro as the first in a line of home robots.

“This is the beginning of the journey for us,” said Ken Washington, Amazon’s vice president of consumer…

Source…

The Log4J Software Flaw Is ‘Christmas Come Early’ for Cybercriminals


Researchers have just identified a security flaw in a software program called Log4J, widely used by a host of private, commercial and government entities to record details ranging from usernames and passwords to credit card transactions. Since the glitch was found last weekend, the cybersecurity community has been scrambling to protect applications, services, infrastructure and even Internet of Things devices from criminals—who are already taking advantage of the vulnerability.

“For cybercriminals this is Christmas come early, because the sky’s the limit,” says Theresa Payton, a former White House chief information officer and the CEO of Fortalice Solutions, a cybersecurity consulting company. “They’re really only limited by their imagination, their technical know-how and their own ability to exploit this flaw.” Payton spoke with Scientific American about what Log4J does, how criminals can use its newly discovered weakness, and what it will take to repair the problem.

[An edited transcript of the interview follows.]

What is Log4J, and how is it used?

In both technology and cybersecurity teams, everybody needs really good logs. You need logging for audit trails, in the event of a ransomware event, to do forensics, sometimes for regulatory considerations. And so [Log4J] is a Java feature and function where you log things. You could log the fact that somebody used this particular type of credit card, you could log the fact that somebody just logged in today, any number of different types of events could be captured.

But Log4J has a major security flaw.

This type of vulnerability means somebody can inject instructions into the logs and make the logs do anything they want them to do. Researchers discovered this vulnerability—and I always say thank goodness for the researchers—in early December. Basically, it allows an attacker to have unauthenticated remote code access to the servers. So they can send instructions, they can execute things, and potentially do it completely undetected. There’s already been examples of where attackers have leveraged the Log4J vulnerability. They’ve installed cryptocurrency mining malware on unknowing machines. If we recall the…

Source…

The 115+ Best Early Cyber Monday Deals 2021 – The New York Times



The 115+ Best Early Cyber Monday Deals 2021  The New York Times

Source…