WatchOut! For Offenders is obviously meant to be a little satirical and probably aimed at girls who might be wondering if their new beau is also a child molester. The devil theme continues in the app with map markers sporting devil horns and retro-horror typefaces sprinkled here and there, and it all serves as a […]
Tags:
Sex offenders
The problem lies in the BlackBerry Browser, specifically in the dialog box that alerts users if the URL they have clicked on does not match the domain they are being sent to, the company warned in an advisory on Monday. To exploit the flaw, a hacker could craft a malicious website that spoofs a trusted website, […]
Tags:
blackberry
If you use Gmail, you have something to be excited about today, because you can finally have new email messages pushed directly to your iPhone when they arrive. To understand why push services have not been available before, let’s first discuss what exactly push is. When a client (be it a mail program, Twitter client, or […]
Tags:
gmail,
iphone,
push
Contact lenses have traditionally been engineered to help the visually impaired see the world around them more clearly–to attain perfect, or close to perfect, vision. But why not super vision? Why not a lens that could superimpose holographic driving control panels over a pilot’s otherwise normal view? Enable Web surfing on the go? Provide a […]
Tags:
bionic,
Superhuman
Facebook is cautioning its users to be more watchful, as a group of some Eastern European hackers are reportedly offering an online password hacking service that can help others accessing their user accounts on the website for just $100. Security firm PandaLabs has come up with this striking revelation about the service that can enable […]
Tags:
cracking,
facebook,
hacking
Hackers are better organized to attack critical government and business IT systems than the government and business are structured to defend their cyber assets, the Department of Homeland Security’s top cybersecurity official told a Senate panel Monday. “Hackers, in some way, have remained better in information sharing than we in government have been, so that’s […]
Tags:
governments,
hacker
In simple terms, it means what you say on your iPhone — or any GSM phone, which includes all phones on AT&T, T-Mobile, Rogers, and almost all phones internationally — can be intercepted, decrypted, and listened to if a person has several thousand dollars worth of equipment and the motivation to do it
Tags:
A5/1,
gsm
“The FBI (Federal Bureau of Investigation) is seeking a senior security consultant for a permanent position.” This is probably the next job offer that will appear on the FBI job site (fbijobs.gov) as they got defaced yesterday.
Tags:
fbi,
hacker
Conventional wisdom is that Web wanderers are safe as long as they avoid sites that serve up pornography, stock tips, games and the like. But according to recently gathered research from Boston-based IT security and control firm Sophos, sites we take for granted are not as secure as they appear. Among the findings in Sophos’ threat report […]
Another day, another dumb criminal gets snared by Apple technology. In this case, 2 dumb criminals. This latest foiled crime involved the theft of 4 iPhones from the Apple Palisades store in West Nyack, New York. According to the Journal News up that way, the two crooks ran from the store, and police put out a description of […]
Tags:
Apple,
gps,
tracking