Posts Tagged ‘Galaxy’

Samsung Galaxy S5, Galaxy Note 4 will move Isocell 16MP camera

Sunday, November 10th, 2013

The subsequent Samsung smartphone and inscription are firm to take a marketplace by storm.

This week during a company’s Analyst Day, a Korean manufacturer announced that a flagship inclination will come with a 16-megapixel Isocell sensor in 2014, Sam Mobile reports.

The site writes that Samsung is expected to have referred to a Galaxy S5 and a Galaxy Note 4.

Isocell record boosts a peculiarity of images, generally low-light photography.

The tech also improves tone reproduction, sharpness and richness, as compared to a currently-used BSI technology.

Source: Samsung Via SamMobile

Article source: http://www.inrumor.com/in/technology/samsung-galaxy-s5-galaxy-note-4-will-bring-isocell-16mp-camera/

Protect your iPhone or Galaxy Note 3 shade with Armorz’ new gradual potion …

Thursday, October 17th, 2013

Protect your iPhone or Galaxy Note 3 shade with Armorz’ new gradual potion cover

Protect your iPhone or Galaxy Note 3 shade with Armorz’ new gradual potion cover

Have we bought an costly smartphone recently? Perhaps a iPhone 5C, iPhone 5S, or a Samsung Galaxy Note 3? If so, we might be looking for a shade protector, a skinny pieces of cosmetic designed to minimize a possibility of scratching a display.

Have we bought an costly smartphone recently? Perhaps a iPhone 5C, iPhone 5S, or a Samsung Galaxy Note 3? If so, we might be looking for a shade protector, a skinny pieces of cosmetic designed to minimize a possibility of scratching a display. However, if covering your pricey square of record in a $2 square of cosmetic only doesn’t seem right, afterwards take a demeanour during Armorz newest solution.
It’s called a Stealth Extreme Lite, and it’s a shade guardian for a aforementioned smartphones, solely rather than being done of plastic, it’s super skinny gradual glass. It measures 0.2mm thick, so it won’t be like wise double glazing to your phone, that is a same density as a renouned Zagg InvisibleShields. Armorz claims it has an 8H hardness, and nonetheless it’s not stated, this will substantially be pencil softness rather than Mohs scale hardness.
Like a shade on your phone, a Stealth Extreme Lite shade guardian has an oleophobic cloaking to forestall smudges and fingerprints from gathering, and also creation it easier to clean. Unusually, it’s trustworthy to your phone with a silicon adhesive, that Armorz says ensures a guardian doesn’t burble or lift during a edges. Don’t worry, it won’t meddle with touchscreen attraction either.
So, how most does it cost? The Extreme Stealth Lite is $35, that is a lot some-more than your normal shade protector, though it should do a improved pursuit of safeguarding a screen. Armorz will sell a Lite for a iPhone and Galaxy Note 3 by Amazon, though during a time of essay they’ve nonetheless to go on sale.

Write a Comment

Name Mail  

Comments

Related Posts

Article source: http://www.womencitizen.com/technology-22/protect-your-iphone-or-galaxy-note-3-screen-with-armorz-new-tempered-glass-cover-739.html

Wi-fi bunfight over hackers during Macca’s

Tuesday, December 4th, 2012

‘; var fr = document.getElementById(adID); setHash(fr, hash); fr.body = body; var doc = getFrameDocument(fr); doc.open(); doc.write(body); setTimeout(function() {closeDoc(getFrameDocument(document.getElementById(adID)))}, 2000); } duty renderIJAd(holderID, adID, srcUrl, hash) { document.dcdAdsAA.push(holderID); setHash(document.getElementById(holderID), hash); document.write(” + ‘ript’); } duty renderJAd(holderID, adID, srcUrl, hash) { document.dcdAdsAA.push(holderID); setHash(document.getElementById(holderID), hash); document.dcdAdsH.push(holderID); document.dcdAdsI.push(adID); document.dcdAdsU.push(srcUrl); } duty er_showAd() { var regex = new RegExp(“externalReferrer=(.*?)(; |$)”, “gi”); var value = regex.exec(document.cookie); if (value value.length == 3) { var externalReferrer = value[1]; lapse (!FD.isInternalReferrer() || ((externalReferrer) (externalReferrer 0))); } lapse false; } duty isHome() { var loc = “” + window.location; loc = loc.replace(“//”, “”); var tokens = loc.split(“/”); if (tokens.length == 1) { lapse true; } else if (tokens.length == 2) { if (tokens[1].trim().length == 0) { lapse true; } } lapse false; } duty checkAds(checkStrings) { var cs = checkStrings.split(“,”); for (var i=0;i 0 cAd.innerHTML.indexOf(c)0) { document.dcdAdsAI.push(cAd.hash); cAd.style.display =’none’; } } } if (!ie) { for (var i=0;i 0 doc.body.innerHTML.indexOf(c)0) { document.dcdAdsAI.push(fr.hash); fr.style.display =’none’; } } } } } if (document.dcdAdsAI.length 0 || document.dcdAdsAG.length 0) { var pingServerParams = “i=”; var sep = “”; for (var i=0;i 0) { var pingServerUrl = “/action/pingServerAction?” + document.pingServerAdParams; var xmlHttp = null; try { xmlHttp = new XMLHttpRequest(); } catch(e) { try { xmlHttp = new ActiveXObject(“Microsoft.XMLHttp”); } catch(e) { xmlHttp = null; } } if (xmlHttp != null) { xmlHttp.open( “GET”, pingServerUrl, true); xmlHttp.send( nothing ); } } } duty initAds(log) { for (var i=0;i 0) { doc.removeChild(doc.childNodes[0]); } doc.open(); var newBody = fr.body; newBody = newBody.replace(“;ord=”, “;ord=” + Math.floor(100000000*Math.random())); doc.write(newBody); document.dcdsAdsToClose.push(fr.id); } } else { var newSrc = fr.src; newSrc = newSrc.replace(“;ord=”, “;ord=” + Math.floor(100000000*Math.random())); fr.src = newSrc; } } } if (document.dcdsAdsToClose.length 0) { setTimeout(function() {closeOpenDocuments(document.dcdsAdsToClose)}, 500); } } }; var ie = isIE(); if(ie typeof String.prototype.trim !== ‘function’) { String.prototype.trim = function() { lapse this.replace(/^s+|s+$/g, ”); }; } document.dcdAdsH = new Array(); document.dcdAdsI = new Array(); document.dcdAdsU = new Array(); document.dcdAdsR = new Array(); document.dcdAdsEH = new Array(); document.dcdAdsE = new Array(); document.dcdAdsEC = new Array(); document.dcdAdsAA = new Array(); document.dcdAdsAI = new Array(); document.dcdAdsAG = new Array(); document.dcdAdsToClose = new Array(); document.igCount = 0; document.tCount = 0; var dcOrd = Math.floor(100000000*Math.random()); document.dcAdsCParams = “”; var savValue = getAdCookie(“sav”); if (savValue != nothing savValue.length 2) { document.dcAdsCParams = savValue + “;”; }

Digital Life

Date

Nov 28, 2012


You wish confidence with that?

You wish confidence with that? Photo: Louise Kennerley

Next time you’re regulating a giveaway wi-fi during McDonald’s, watch out for that creepy male in a corner. He might be perplexing to take your passwords and penetrate into your computer.

Public wi-fi hotspots are increasingly common. Cafes, quick food chains, airports and even buses and trains offer them as a giveaway service. A new investigate conducted by McAfee found that scarcely two-thirds of a surveyed Australians used giveaway wi-fi.

But usually since there’s giveaway wi-fi during a devoted establishment, there’s no pledge it’s protected to use.

Many open hotspots pass a responsibility of confidence to their users. The terms and conditions of a wi-fi during McDonald’s contend it’s adult to users to keep their usernames, passwords and other security-based information secure and private.

A confidence confidant during AVG Australia/New Zealand, Michael McKinnon, says users need to be generally aware of what they do on a open wi-fi hotspot. “You have to assume from a start that a network can't be trusted,” he says.

The hazards of open wi-fi are two-fold. First, there’s a probability that someone is eavesdropping on all a trade that’s flitting by a network in a wish of snaring credit label sum and other supportive information. Second, there’s a probability that another user on a network is hacking into any computers that don’t have adequate confidence in place.

Connecting to a hotspot that doesn’t need a cue is risky. Since it isn’t cumulative with any encryption, scarcely all of a internet trade is sent in plain calm and can be intercepted by anyone regulating plainly accessible software. “You’re effectively giving your passwords away,” says McKinnon.

This risk was highlighted a integrate of years ago when a program developer published a Firefox prolongation called Firesheep. Unlike other network enormous tools, that need a sincerely worldly believe of mechanism networking, Firesheep done it child’s play to steal a user’s event and benefit full entrance to their amicable media accounts.

Using a password-protected hotspot helps, as all a network trade is encrypted regulating Wired Equivalent Privacy (WEP) or a newer Wi-fi Protected Access (WPA) security, though even these networks can be compromised by a dynamic hacker.

Ars Technica publisher Dan Goodin recently reported that he was means to moment his neighbour’s 10-character numerical cue (on a WPA-encrypted wi-fi network) in usually 89 mins regulating penetration-testing program and a cloud-based password-cracking tool.

Keeping your passwords and other personal information protected can be achieved by saving any supportive exchange and website logins for when you’re behind on your home network. Assuming, of course, that your network is scrupulously cumulative with a clever cue – ideally one that we change on a unchanging basis.

Failing that, McKinnon recommends joining to as many sites as probable regulating a HTTPS residence whenever you’re on a open wi-fi network. “HTTPS” in a front of a web residence means a site is regulating Secure Sockets Layer (SSL) end-to-end encryption, creation any communication with that site really formidable to hack. Internet banking sites and many online stores use SSL as a matter of course.

Some sites, like Twitter and Google, automatically switch to regulating SSL for a whole session. Facebook has a secure browsing choice switched off by default, though it recently began rolling out always-on HTTPS to users in North America – users in other tools of a universe are approaching to get it shortly.

But securing your web trade while you’re on a open wi-fi network is usually half a challenge. The other partial is gripping your mechanism protected from hackers.

“When you’re regulating a laptop on a wireless network, what you’re effectively joining to is not usually a internet, though also a internal area network where there are other computers,” says McKinnon.

“Let’s contend there’s a hacker sitting in a cafeteria that has usually connected to a same wireless network you’re connected to. He can indeed penetrate into your computer, download files and send files, depending on how diseased your mechanism confidence is. If your laptop isn’t adult to date and doesn’t have any confidence software, you’re really putting yourself during risk.”

Having a good personal firewall on your mechanism is a initial counterclaim – it’s like carrying stout front doorway to forestall thieves from walking in and hidden all of your valuables. But you’ll also need to stop them from anticipating a disreputable approach in; this is achieved by ensuring your mechanism has present internet confidence program and all of a latest program updates applied.


Advertisement

Blogs

Wii U mini-reviews: …

James Dominguez - Screen Play

The Wii U had a vast and different library of games on … 

Your Turn: Nov winner

James Dominguez - Screen Play

A still month of Your Turn entries supposing us with 3 … 

Nintendo Land: Just supplement …

Jason Hill - Screen Play

Nintendo Land doesn’t safeguard must-buy standing for a Wii U … 

Hands on: LG Nexus 4

Adam Turner - Gadgets on a go

An Android superphone with a bill cost tag, LG’s Nexus 4 … 

Featured advertisers

Compare Save


Live Connected  Nokia Lumia 920

Live Connected Nokia Lumia 920

Starting during $50/Month…
24 month contract
Min. sum cost $1,200

Live Connected

 

Compare Mobile Phones


Save adult to $600 on Galaxy S3

Save adult to $600 on Galaxy S3

Compare a deals here.
24 month contract
Min. sum cost $1,800

Live Connected

 

Compare Mobile Phones


3 Months Free

3 Months Free

Galaxy NOTE II with LTE 4G Speeds!
24 month contract
Min. sum cost $1,089

Virgin Mobile

 

Compare Mobile Phones


iPhone 5 from $47/Month

iPhone 5 from $47/Month

Check out a deals during Virgin Mobile
24 month contract
Min. sum cost $1,128

Virgin Mobile

 

Compare Mobile Phones


GALAXY Note II LTE on Optus

GALAXY Note II LTE on Optus

Now accessible on Optus
24 month contract
Min. sum cost $1,224

Optus

 

Galaxy Note II Plans


GALAXY Note II LTE on Optus

GALAXY Note II LTE on Optus

Now accessible on Optus
24 month contract
Min. sum cost $1,224

Optus

 

Galaxy Note II Plans


GALAXY SIII 4G

GALAXY SIII 4G

Now accessible on Optus from $51/Month
24 month contract
Min. sum cost $1,224

Optus

 

Compare deals


GALAXY SIII 4G on Optus

GALAXY SIII 4G on Optus

Now accessible from $51/Month
24 month contract
Min. sum cost $1,224

Optus

 

Compare Mobile Phones


iPhone 4S - Compare New Prices

iPhone 4S – Compare New Prices

New prices live on iPhone 4S models
 

Compare Now


Nokia Lumia 820

Nokia Lumia 820

NEW! With 4G LTE Windows Phone 8
24 month contract
Min. sum cost $888

Optus

 

Nokia Lumia 820


Windowsreg Phone 8S by HTC

Windowsreg Phone 8S by HTC

Now accessible on Optus from $33/Month
24 month contract
Min. sum cost $792

Optus

 

Windows Phone 8S by HTC

Popular phones | Compare All

Mobile phone deals in a market…

VodafoneVodafone95 DealsCrazy John'sCrazy John’s52 DealsVirgin MobileVirgin Mobile44 DealsDodoDodo22 DealsLive ConnectedLive Connecte…15 Deals

Deals powered by WhistleOut

WhistleOut

Sponsored links

Advertisement

Advertisement

Video


Shelly-Horton

Expert tips for cooking celebration success!

Jobs


Search for 1000's of jobs around Australia - It's your move

Search for 1000′s of jobs around Australia

TheVine


Le Specs

Behind a scenes with Le Specs

Holiday Rentals


Stayz_93521_PalmBeach

Space and remoteness in a holiday let retreat!

Essential Baby


kate-and-william

Kate Middleton profound and hospitalised


Compare and Save

Skip to:

Check out today’s best deals

Home Loan Special

Variable loan with 100% redraw equivalent account.

Cheap Credit Cards

Say NO to credit label fees! Compare fee-free cards.

Serious Saver

Boost your assets with 5.05% for 4 months. No fees.

Nokia 920 Deals

New Windows Phone 8 Deals

NEW Galaxy Note II 4G

Compare skeleton for a new 4G Galaxy Note II



Feedback Form







Article source: http://www.smh.com.au/digital-life/consumer-security/wifi-bunfight-over-hackers-at-maccas-20121128-2ad0h.html

How to digest passwords that expostulate hackers away

Sunday, November 11th, 2012

‘; var fr = document.getElementById(adID); setHash(fr, hash); fr.body = body; var doc = getFrameDocument(fr); doc.open(); doc.write(body); setTimeout(function() {closeDoc(getFrameDocument(document.getElementById(adID)))}, 2000); } duty renderIJAd(holderID, adID, srcUrl, hash) { document.dcdAdsAA.push(holderID); setHash(document.getElementById(holderID), hash); document.write(” + ‘ript’); } duty renderJAd(holderID, adID, srcUrl, hash) { document.dcdAdsAA.push(holderID); setHash(document.getElementById(holderID), hash); document.dcdAdsH.push(holderID); document.dcdAdsI.push(adID); document.dcdAdsU.push(srcUrl); } duty er_showAd() { var regex = new RegExp(“externalReferrer=(.*?)(; |$)”, “gi”); var value = regex.exec(document.cookie); if (value value.length == 3) { var externalReferrer = value[1]; lapse (!FD.isInternalReferrer() || ((externalReferrer) (externalReferrer 0))); } lapse false; } duty isHome() { var loc = “” + window.location; loc = loc.replace(“//”, “”); var tokens = loc.split(“/”); if (tokens.length == 1) { lapse true; } else if (tokens.length == 2) { if (tokens[1].trim().length == 0) { lapse true; } } lapse false; } duty checkAds(checkStrings) { var cs = checkStrings.split(“,”); for (var i=0;i 0 cAd.innerHTML.indexOf(c)0) { document.dcdAdsAI.push(cAd.hash); cAd.style.display =’none’; } } } if (!ie) { for (var i=0;i 0 doc.body.innerHTML.indexOf(c)0) { document.dcdAdsAI.push(fr.hash); fr.style.display =’none’; } } } } } if (document.dcdAdsAI.length 0 || document.dcdAdsAG.length 0) { var pingServerParams = “i=”; var sep = “”; for (var i=0;i 0) { var pingServerUrl = “/action/pingServerAction?” + document.pingServerAdParams; var xmlHttp = null; try { xmlHttp = new XMLHttpRequest(); } catch(e) { try { xmlHttp = new ActiveXObject(“Microsoft.XMLHttp”); } catch(e) { xmlHttp = null; } } if (xmlHttp != null) { xmlHttp.open( “GET”, pingServerUrl, true); xmlHttp.send( zero ); } } } duty initAds(log) { for (var i=0;i 0) { doc.removeChild(doc.childNodes[0]); } doc.open(); var newBody = fr.body; newBody = newBody.replace(“;ord=”, “;ord=” + Math.floor(100000000*Math.random())); doc.write(newBody); document.dcdsAdsToClose.push(fr.id); } } else { var newSrc = fr.src; newSrc = newSrc.replace(“;ord=”, “;ord=” + Math.floor(100000000*Math.random())); fr.src = newSrc; } } } if (document.dcdsAdsToClose.length 0) { setTimeout(function() {closeOpenDocuments(document.dcdsAdsToClose)}, 500); } } }; var ie = isIE(); if(ie typeof String.prototype.trim !== ‘function’) { String.prototype.trim = function() { lapse this.replace(/^s+|s+$/g, ”); }; } document.dcdAdsH = new Array(); document.dcdAdsI = new Array(); document.dcdAdsU = new Array(); document.dcdAdsR = new Array(); document.dcdAdsEH = new Array(); document.dcdAdsE = new Array(); document.dcdAdsEC = new Array(); document.dcdAdsAA = new Array(); document.dcdAdsAI = new Array(); document.dcdAdsAG = new Array(); document.dcdAdsToClose = new Array(); document.igCount = 0; document.tCount = 0; var dcOrd = Math.floor(100000000*Math.random()); document.dcAdsCParams = “”; var savValue = getAdCookie(“sav”); if (savValue != zero savValue.length 2) { document.dcAdsCParams = savValue + “;”; }

Digital Life

Date

Nov 11, 2012

You are not paranoid if we are disturbed about safeguarding your passwords.


emIllustration: Minh Uong/The New York Times/em

Illustration: Minh Uong/The New York Times

Not prolonged after we began essay about cybersecurity, we became a paranoid mimic of my former self. It’s tough to contend assent of mind when hackers remind me any day, all day, usually how easy it is to take my personal data.

Within weeks, we set adult unique, formidable passwords for any website, enabled two-step authentication for my email accounts, and even lonesome adult my computer’s Web camera with a square of masking fasten — a prevision that invited gibe from friends and co-workers who suggested it was time to get my conduct checked.

But new episodes offering vindication. we private a webcam fasten — after a crony assured me that it was a tiny many — usually to see a light spin immature a few days later, suggesting someone was in my mechanism and watching. More recently, we perceived a calm summary from Google with a two-step corroboration formula for my Gmail account. That’s a fibre of numbers Google sends after we rightly enter a cue to your Gmail account, and it serves as a second password. (Do pointer adult for it.) The usually problem was that we was not perplexing to get into my Gmail account. we was nowhere nearby a computer. Apparently, somebody else was.

It is absurdly easy to get hacked. All it takes is clicking on one antagonistic couple or attachment. Companies’ mechanism systems are pounded any day by hackers looking for passwords to sell on auctionlike black marketplace sites where a singular cue can fetch $20. Hackers frequently feat collection like John a Ripper, a giveaway password-cracking module that use lists of ordinarily used passwords from breached sites and can exam millions of passwords per second.

Chances are, many people will get hacked during some indicate in their lifetime. The best they can do is check a unavoidable by avoiding questionable links, even from friends, and conduct their passwords. Unfortunately, good cue hygiene is like flossing — we know it’s important, though it takes effort. How do we presumably come adult with different, hard-to-crack passwords for any singular news, amicable network, e-commerce, banking, corporate and email criticism and still remember them all?

To answer that question, we called dual of a many (justifiably) paranoid people we know, Jeremiah Grossman and Paul Kocher, to find out how they keep their information safe. Grossman was a initial hacker to denote how simply somebody can mangle into a computer’s webcam and microphone by a Web browser. He is now arch record officer during WhiteHat Security, an internet and network confidence firm, where he is frequently targeted by cybercriminals. Kocher, a obvious cryptographer, gained notice for crafty hacks on confidence systems. He now runs Cryptography Research, a confidence organisation that specialises in gripping systems hacker-resistant. Here are their tips:

Forget a dictionary

If your cue can be found in a dictionary, we competence as good not have one. “The misfortune passwords are compendium difference or a tiny series of insertions or changes to difference that are in a dictionary,” pronounced Kocher. Hackers will mostly exam passwords from a compendium or many-sided from breaches. If your cue is not in that set, hackers will typically pierce on.

Never use a same cue twice

People tend to use a same cue opposite mixed sites, a fact hackers frequently exploit. While enormous into someone’s veteran form on LinkedIn competence not have apocalyptic consequences, hackers will use that cue to moment into, say, someone’s email, bank, or brokerage criticism where some-more profitable financial and personal information is stored.

Come adult with a passphrase

The longer your password, a longer it will take to crack. A cue should ideally be 14 characters or some-more if we wish to make it uncrackable by an assailant in reduction than 24 hours. Because longer passwords tend to be harder to remember, cruise a passphrase, such as a favourite film quote, strain lyric, or poem, and fibre together usually a initial one or dual letters of any word in a sentence.

Or usually jam on your keyboard

For supportive accounts, Grossman says that instead of a passphrase, he will incidentally jam on his keyboard, intermittently attack a change and alt keys, and duplicate a outcome into a calm record that he stores on an encrypted, password-protected USB drive. “That way, if someone puts a gun to my conduct and final to know my password, we can overtly contend we don’t know it.”

Store your passwords securely

Do not store your passwords in your in-box or on your desktop. If malware infects your computer, you’re toast. Grossman stores his cue record on an encrypted USB expostulate for that he has a long, formidable cue that he has memorised. He copies and pastes those passwords into accounts so that, in a eventuality an assailant installs keystroke logging program on his computer, they can't record a keystrokes to his password. Kocher takes a some-more out-of-date approach: He keeps cue hints, not a tangible passwords, on a throw of paper in his wallet. “I try to keep my many supportive information off a internet completely,” Kocher said.

A cue manager?

Maybe password-protection program lets we store all your usernames and passwords in one place. Some programs will even emanate clever passwords for we and automatically record we in to sites as prolonged as we yield one master password. LastPass, SplashData and AgileBits offer cue government program for Windows, Macs and mobile devices. But cruise yourself warned: Kocher pronounced he did not use a program since even with encryption, it still lived on a mechanism itself. “If someone steals my computer, I’ve mislaid my passwords.” Grossman pronounced he did not trust a program since he didn’t write it. Indeed, during a confidence discussion in Amsterdam progressing this year, hackers demonstrated how simply a cryptography used by many renouned mobile cue managers could be cracked.

Ignore confidence questions

There is a singular set of answers to questions like “What is your favourite colour?” and many answers to questions like “What center propagandize did we attend?” can be found on a internet. Hackers use that information to reset your cue and take control of your account. Earlier this year, a hacker claimed he was means to moment into Mitt Romney’s Hotmail and Dropbox accounts regulating a name of his favourite pet. A improved proceed would be to enter a cue spirit that has zero to do with a doubt itself. For example, if a confidence doubt asks for a name of a sanatorium in that we were born, your answer competence be: “Your favourite strain lyric.”

Use opposite browsers

Grossman creates a indicate of regulating opposite web browsers for opposite activities. “Pick one browser for ‘promiscuous’ browsing: online forums, news sites, blogs — anything we don’t cruise important,” he said. “When you’re online banking or checking email, glow adult a delegate web browser, afterwards close it down.” That way, if your browser catches an infection when we incidentally event on an X-rated site, your bank criticism is not indispensably compromised. As for that browser to use for that activities, a investigate final year by Accuvant Labs of web browsers — including Mozilla Firefox, Google Chrome and Microsoft Internet Explorer — found that Chrome was a slightest receptive to attacks.

Share carefully “You are your email residence and your password”, Kocher emphasised. Whenever possible, he will not register for online accounts regulating his genuine email address. Instead he will use “throwaway” email addresses, like those offering by 10minutemail.com. Users register and endorse an online account, that self-destructs 10 mins later. Grossman pronounced he mostly warned people to provide anything they typed or common online as open record.

“At some point, we will get hacked — it’s usually a matter of time,” warned Grossman. “If that’s unsuitable to you, don’t put it online.”

The New York Times


Advertisement

Blogs

Internet filtering – a fight …

Adam Turner - Gadgets on a go

Conroy has corroborated down though there’s no necessity of people … 

Screenshot jigsaw nonplus #18

James Dominguez - Screen Play

Screen Play reader Gruntis was final week’s jigsaw winner, … 

From Overstrike to Fuse – how …

James Dominguez - Screen Play

Last year, Overstrike was suggested as a fun movement pretension … 

Going it alone with Master …

James Dominguez - Screen Play

Halo 4 is a sprawling diversion packaged with hundreds of hours of … 

Featured advertisers

Compare Save


5 Months Half Price Deals

5 Months Half Price Deals

Online disdainful prices, get them here

Virgin Mobile

 

Android Deals


iPhone 5 on Optus

iPhone 5 on Optus

Prices start during $48/Month
24 month contract
Min. sum cost $1,152

Optus

 

Compare Mobile Phones


GALAXY S3 4G Bonus Data

GALAXY S3 4G Bonus Data

Get 1GB Bonus information for a life of a plan

Virgin Mobile

 

Compare Mobile Phones


iPhone 5 16GB on Optus

iPhone 5 16GB on Optus

Starting from $48/Month
24 month contract
Min. sum cost $1,152

Optus

 

Compare Now


Compare iPhone 5 Plans Here

Compare iPhone 5 Plans Here

66 skeleton to review for 16GB, 32GB, 64GB
 

Compare Now


Compare iPhone 5 Plans Here

Compare iPhone 5 Plans Here

Plans from Optus, Telstra, Vodafone and Virgin Mobile compared
 

Compare Now


iPhone 4 Starting from $35/Month

iPhone 4 Starting from $35/Month

Great new cost points to review on iPhone 4 8GB
 

Compare Now


Compare iPhone 5 Plans Here

Compare iPhone 5 Plans Here

Plans from Optus, Telstra, Vodafone and Virgin Mobile compared
 

Compare Now


GALAXY S3 4G on Optus

GALAXY S3 4G on Optus

GALAXY S3 4G accessible on Optus
24 month contract
Min. sum cost $1,224

Optus

 

Compare Mobile Phones


GALAXY S3 From $50/Month

GALAXY S3 From $50/Month

With Bonus Data and Bonus Accessory Pack

Vodafone

 

Compare Mobile Phones


iPhone 4S - Compare New Prices

iPhone 4S – Compare New Prices

New prices live on iPhone 4S models
 

Compare Now


The 4G GALAXY S3 is here

The 4G GALAXY S3 is here

Now accessible on Optus
24 month contract
Min. sum cost $1,224

Optus

 

Compare deals


Very Cheap Deals on GALAXY SII

Very Cheap Deals on GALAXY SII

From $29/Month, singular time usually (min cost $696)
 

Compare Now

Popular phones | Compare All

Mobile phone deals in a market…

VodafoneVodafone132 DealsCrazy John'sCrazy John’s73 DealsVirgin MobileVirgin Mobile29 DealsDodoDodo12 DealsTelstraTelstra4 Deals

Deals powered by WhistleOut

WhistleOut

Sponsored links

Advertisement

Advertisement

Money


VirginFlyer-RB-

4 FREE flights any year. Annual price usually $99

Motoring


Drive Car of a Year - People's Choice awards

Have your contend in Drive’s Car of a Year

Managed Funds


InvestSMART Share Trading Facility

Trying to sell your shares?

Relationships


RSVP Australia's many renouned singles

Find Singles Online Now

TheVine


relationships

Top 10 misfortune film relationships


Compare and Save

Skip to:

Check out today’s best deals

Top Home Loans

Make your possess rate cut. Compare loans from 5.44%.

Savings Maximiser

Earn 5.35% for 4 months. No fees, no bound term.

Fixed Rate Loans

Lock in a bound home loan rate underneath 5%

4G! GALAXY S3 4G Plans

Compare skeleton for a new 4G Galaxy S3 4G

iPhone 5 Plans

New batch available, review skeleton now…



Feedback Form







Article source: http://www.watoday.com.au/digital-life/consumer-security/how-to-devise-passwords-that-drive-hackers-away-20121108-290gt.html

Necessity is a mom of these inventions

Saturday, October 27th, 2012

‘; var fr = document.getElementById(adID); setHash(fr, hash); fr.body = body; var doc = getFrameDocument(fr); doc.open(); doc.write(body); setTimeout(function() {closeDoc(getFrameDocument(document.getElementById(adID)))}, 2000); } duty renderIJAd(holderID, adID, srcUrl, hash) { document.dcdAdsAA.push(holderID); setHash(document.getElementById(holderID), hash); document.write(” + ‘ript’); } duty renderJAd(holderID, adID, srcUrl, hash) { document.dcdAdsAA.push(holderID); setHash(document.getElementById(holderID), hash); document.dcdAdsH.push(holderID); document.dcdAdsI.push(adID); document.dcdAdsU.push(srcUrl); } duty er_showAd() { var regex = new RegExp(“externalReferrer=(.*?)(; |$)”, “gi”); var value = regex.exec(document.cookie); if (value value.length == 3) { var externalReferrer = value[1]; lapse (!FD.isInternalReferrer() || ((externalReferrer) (externalReferrer 0))); } lapse false; } duty isHome() { var loc = “” + window.location; loc = loc.replace(“//”, “”); var tokens = loc.split(“/”); if (tokens.length == 1) { lapse true; } else if (tokens.length == 2) { if (tokens[1].trim().length == 0) { lapse true; } } lapse false; } duty checkAds(checkStrings) { var cs = checkStrings.split(“,”); for (var i=0;i 0 cAd.innerHTML.indexOf(c)0) { document.dcdAdsAI.push(cAd.hash); cAd.style.display =’none’; } } } if (!ie) { for (var i=0;i 0 doc.body.innerHTML.indexOf(c)0) { document.dcdAdsAI.push(fr.hash); fr.style.display =’none’; } } } } } if (document.dcdAdsAI.length 0 || document.dcdAdsAG.length 0) { var pingServerParams = “i=”; var sep = “”; for (var i=0;i 0) { var pingServerUrl = “/action/pingServerAction?” + document.pingServerAdParams; var xmlHttp = null; try { xmlHttp = new XMLHttpRequest(); } catch(e) { try { xmlHttp = new ActiveXObject(“Microsoft.XMLHttp”); } catch(e) { xmlHttp = null; } } if (xmlHttp != null) { xmlHttp.open( “GET”, pingServerUrl, true); xmlHttp.send( nothing ); } } } duty initAds(log) { for (var i=0;i 0) { doc.removeChild(doc.childNodes[0]); } doc.open(); var newBody = fr.body; newBody = newBody.replace(“;ord=”, “;ord=” + Math.floor(100000000*Math.random())); doc.write(newBody); document.dcdsAdsToClose.push(fr.id); } } else { var newSrc = fr.src; newSrc = newSrc.replace(“;ord=”, “;ord=” + Math.floor(100000000*Math.random())); fr.src = newSrc; } } } if (document.dcdsAdsToClose.length 0) { setTimeout(function() {closeOpenDocuments(document.dcdsAdsToClose)}, 500); } } }; var ie = isIE(); if(ie typeof String.prototype.trim !== ‘function’) { String.prototype.trim = function() { lapse this.replace(/^s+|s+$/g, ”); }; } document.dcdAdsH = new Array(); document.dcdAdsI = new Array(); document.dcdAdsU = new Array(); document.dcdAdsR = new Array(); document.dcdAdsEH = new Array(); document.dcdAdsE = new Array(); document.dcdAdsEC = new Array(); document.dcdAdsAA = new Array(); document.dcdAdsAI = new Array(); document.dcdAdsAG = new Array(); document.dcdAdsToClose = new Array(); document.igCount = 0; document.tCount = 0; var dcOrd = Math.floor(100000000*Math.random()); document.dcAdsCParams = “”; var savValue = getAdCookie(“sav”); if (savValue != nothing savValue.length 2) { document.dcAdsCParams = savValue + “;”; }

Technology


Dr Philip Bell

Fuelled … Dr Philip Bell, a executive and conduct of investigate in a Microbiogen genetics laboratory, prepares samples.

STEER-BY-WIRE

Within a subsequent year, Japanese automobile builder Nissan will deliver subsequent era steering record into some of a cars that does divided with a automatic shelve and sail set up. In a new system, famous as steer-by-wire, sensors detect when a motorist turns a wheel, promulgation electrical signals to a tyres so they respond faster and with some-more accuracy. A camera mounted on a car’s rear-view counterpart will consider a highway forward and detect changes in a car’s direction. In required steering system, a automobile turns around a automatic tie between a steering circle and a tyres.

SOLAR PAINT

Steer-by-wire invention

Steer-by-wire invention.

Imagine if any outside aspect of your residence or bureau building could beget electricity. That could shortly be a existence interjection to a group during a University of Newcastle who have invented a solar paint. The water-based lacquer contains small cosmetic particles – smaller than a hole of a tellurian hair – that catch object to furnish electricity. The plan leader, Paul Dastoor, says a ultimate idea is a paint that can be practical directly to a roof or wall, though early versions will paint a component on cosmetic sheets, that enclose electrical wires to broadcast a electricity, that can be rolled out. The solar paint could beget electricity during half today’s electricity prices.

MICROBIOGEN

A new aria of leavening and a immature partial of sugarine shaft could change tellurian fuel production. A span of Australian brothers have grown a absolute leavening that can modify rubbish biomass such as sugarine shaft byproducts into ethanol. More than 80 billion litres of ethanol is constructed from succulent crops such as corn any year. Next era biofuels aim to revoke a faith on food crops, though scientists have struggled to furnish ethanol from a woody, immature partial of plants. Geoff and Phil Bell’s high-quality yeast, that has perceived appropriation from a United States and Australian governments, has overcome this problem. The span wish to spin a initial sod during a Microbiogen plant in dual to 3 years.

BRANDTABLE

Within a few months, backing adult to sequence lunch in a swarming food justice could shortly be over. A Sydney businessman has grown a smartphone focus that allows users to sequence food directly from their phone. Brandtable takes advantage of near-field communication chips, found in all new smartphones (bar iPhones), that can sell information with other circuitously NFC chips. The record is already used by credit label companies for contactless transactions. By swiping a smartphone over a Brandtable trademark a user can place a food sequence directly with a restaurant.

LIQUIGLIDE

How many times have we bashed a tomato salsa bottle opposite a dais to force a final dollop onto your plate? Scientists during Massachusetts Institute of Technology in a US have invented a solution, an ultra-thin component that coats a inside aspect of a bottle and allows gluggy liquids like tomato salsa and shampoo to slip right out. The sleazy material, called LiquiGlide, is plant based. The team, led by operative Kripa Varanasi, wish a material, that can cloak glass, plastic, steel and ceramic, will be on a marketplace within 3 years.


Advertisement

Advertisement

Blogs

Can Microsoft’s Surface reason …

Adam Turner - Gadgets on a go

Without a ability to run desktop applications, because would … 

Screenshot jigsaw nonplus #16

James Dominguez - Screen Play

Another week is ending, and here’s another jigsaw nonplus … 

Mario adult for charity

James Dominguez - Screen Play

Once again, members of Australia’s video gaming village … 

iPad mini — has Apple’s …

Adam Turner - Gadgets on a go

Is Apple’s small iPad inexpensive adequate to reason behind a … 

Featured advertisers

Compare Save


iPhone 5 16GB from $48/Month

iPhone 5 16GB from $48/Month

In batch with Vodafone
24 month contract
Min. sum cost $1,152

Vodafone

 

Compare Mobile Phones


iPhone 5 16GB from $48/Month

iPhone 5 16GB from $48/Month

In batch with Vodafone
24 month contract
Min. sum cost $1,152

Vodafone

 

Compare Mobile Phones


1GB Bonus Data for 24 Months

1GB Bonus Data for 24 Months

Get 1GB Bonus information for a life of a plan

Virgin Mobile

 

Compare Mobile Phones


GALAXY S3 4G Bonus Data

GALAXY S3 4G Bonus Data

Get 1GB Bonus information for a life of a plan

Virgin Mobile

 

Compare Mobile Phones


Compare iPhone 5 Plans Here

Compare iPhone 5 Plans Here

66 skeleton to review for 16GB, 32GB, 64GB
 

Compare Now


Compare iPhone 5 Plans Here

Compare iPhone 5 Plans Here

Plans from Optus, Telstra, Vodafone and Virgin Mobile compared
 

Compare Now


4G Android GALAXY S3 4G

4G Android GALAXY S3 4G

Compare GALAXY S3 4G deals here…
 

Compare deals


Compare iPhone 5 Plans Here

Compare iPhone 5 Plans Here

Plans from Optus, Telstra, Vodafone and Virgin Mobile compared
 

Compare Now


GALAXY S3 4G on Optus

GALAXY S3 4G on Optus

GALAXY S3 4G accessible on Optus
24 month contract
Min. sum cost $1,224

Optus

 

Compare Mobile Phones


GALAXY S3 From $50/Month

GALAXY S3 From $50/Month

With Bonus Data and Bonus Accessory Pack

Vodafone

 

Compare Mobile Phones


Headphones  5 Months during Half Price

Headphones 5 Months during Half Price

HTC ONE X Beats Solo while bonds final (min cost $1056)

Virgin Mobile

 

Compare Mobile Phones


The 4G GALAXY S3

The 4G GALAXY S3

Now accessible on Optus
24 month contract
Min. sum cost $1,224

Optus

 

Compare deals


Very Cheap Deals on GALAXY SII

Very Cheap Deals on GALAXY SII

From $29/Month, singular time usually (min cost $696)
 

Compare Now

Popular phones | Compare All

Mobile phone deals in a market…

VodafoneVodafone122 DealsCrazy John'sCrazy John’s76 DealsVirgin MobileVirgin Mobile40 DealsiPrimusiPrimus31 DealsDodoDodo12 Deals

Deals powered by WhistleOut

WhistleOut

Sponsored links

Advertisement

Advertisement

Video


Rainbow beauty.

Beauty Basics: Foundation tips and tricks

Jobs


Fancy a New Job Title  a Chance to Win $5,000?

Fancy a New Job Title a Chance to Win $5,000 Cash?

Essential Baby


chuckie-halloween-costume

Good, bad and wrong Halloween baby costumes

Accommodation


Expedia hotel

Find a best deals in executive accommodation

Managed Funds


InvestSMART net worth

What are we worth?


Compare and Save

Skip to:

Check out today’s best deals

Cheap Credit Cards

Say NO to credit label fees! Compare fee-free cards.

Low Home Loan Rates

Make a many of a rate cut. Home loans from 5.47%.

Top Car Loans

Drive a discount with loans from 7.78% (comparison rate)

Galaxy S3 Bonus

Bonus appendage container and reward information deals

Budget – Under $35

Hot smartphones underneath $35 per month



Feedback Form







Article source: http://www.theage.com.au/technology/sci-tech/necessity-is-the-mother-of-these-inventions-20121027-28cba.html

There is something new underneath a sun

Saturday, October 27th, 2012

‘; var fr = document.getElementById(adID); setHash(fr, hash); fr.body = body; var doc = getFrameDocument(fr); doc.open(); doc.write(body); setTimeout(function() {closeDoc(getFrameDocument(document.getElementById(adID)))}, 2000); } duty renderIJAd(holderID, adID, srcUrl, hash) { document.dcdAdsAA.push(holderID); setHash(document.getElementById(holderID), hash); document.write(” + ‘ript’); } duty renderJAd(holderID, adID, srcUrl, hash) { document.dcdAdsAA.push(holderID); setHash(document.getElementById(holderID), hash); document.dcdAdsH.push(holderID); document.dcdAdsI.push(adID); document.dcdAdsU.push(srcUrl); } duty er_showAd() { var regex = new RegExp(“externalReferrer=(.*?)(; |$)”, “gi”); var value = regex.exec(document.cookie); if (value value.length == 3) { var externalReferrer = value[1]; lapse (!FD.isInternalReferrer() || ((externalReferrer) (externalReferrer 0))); } lapse false; } duty isHome() { var loc = “” + window.location; loc = loc.replace(“//”, “”); var tokens = loc.split(“/”); if (tokens.length == 1) { lapse true; } else if (tokens.length == 2) { if (tokens[1].trim().length == 0) { lapse true; } } lapse false; } duty checkAds(checkStrings) { var cs = checkStrings.split(“,”); for (var i=0;i 0 cAd.innerHTML.indexOf(c)0) { document.dcdAdsAI.push(cAd.hash); cAd.style.display =’none’; } } } if (!ie) { for (var i=0;i 0 doc.body.innerHTML.indexOf(c)0) { document.dcdAdsAI.push(fr.hash); fr.style.display =’none’; } } } } } if (document.dcdAdsAI.length 0 || document.dcdAdsAG.length 0) { var pingServerParams = “i=”; var sep = “”; for (var i=0;i 0) { var pingServerUrl = “/action/pingServerAction?” + document.pingServerAdParams; var xmlHttp = null; try { xmlHttp = new XMLHttpRequest(); } catch(e) { try { xmlHttp = new ActiveXObject(“Microsoft.XMLHttp”); } catch(e) { xmlHttp = null; } } if (xmlHttp != null) { xmlHttp.open( “GET”, pingServerUrl, true); xmlHttp.send( nothing ); } } } duty initAds(log) { for (var i=0;i 0) { doc.removeChild(doc.childNodes[0]); } doc.open(); var newBody = fr.body; newBody = newBody.replace(“;ord=”, “;ord=” + Math.floor(100000000*Math.random())); doc.write(newBody); document.dcdsAdsToClose.push(fr.id); } } else { var newSrc = fr.src; newSrc = newSrc.replace(“;ord=”, “;ord=” + Math.floor(100000000*Math.random())); fr.src = newSrc; } } } if (document.dcdsAdsToClose.length 0) { setTimeout(function() {closeOpenDocuments(document.dcdsAdsToClose)}, 500); } } }; var ie = isIE(); if(ie typeof String.prototype.trim !== ‘function’) { String.prototype.trim = function() { lapse this.replace(/^s+|s+$/g, ”); }; } document.dcdAdsH = new Array(); document.dcdAdsI = new Array(); document.dcdAdsU = new Array(); document.dcdAdsR = new Array(); document.dcdAdsEH = new Array(); document.dcdAdsE = new Array(); document.dcdAdsEC = new Array(); document.dcdAdsAA = new Array(); document.dcdAdsAI = new Array(); document.dcdAdsAG = new Array(); document.dcdAdsToClose = new Array(); document.igCount = 0; document.tCount = 0; var dcOrd = Math.floor(100000000*Math.random()); document.dcAdsCParams = “”; var savValue = getAdCookie(“sav”); if (savValue != nothing savValue.length 2) { document.dcAdsCParams = savValue + “;”; }

Technology

Date

Oct 28, 2012


LiquiGlide

How many times have we bashed a tomato salsa bottle to force a final dollop onto your plate? Scientists during Massachusetts Institute of Technology have a solution, an ultra-thin component that coats a inside of a bottle and allows gluggy liquids such as tomato salsa and shampoo to slip right out. The material, called LiquiGlide, is plant-based. The team, led by operative Kripa Varanasi, hopes a product will be on a marketplace within 3 years.

 

Steer-by-wire

Within a subsequent year, Japanese carmaker Nissan will deliver next-generation steering record into some of a cars that does divided with a automatic rack-and-pinion set-up. In a new system, famous as steer-by-wire, sensors detect when a motorist turns a wheel, promulgation electrical signals to a tyres so they respond faster and with some-more accuracy.

 

Solar paint

Imagine if each outside aspect of a building could beget electricity. That could shortly be a existence interjection to a group during a University of Newcastle, that has invented a solar paint. The water-based lacquer contains small cosmetic particles that catch object to furnish electricity. The plan leader, Paul Dastoor, says a ultimate idea is a paint that can be practical directly to a roof or wall, though early versions will paint a component on cosmetic sheets containing wires to broadcast a electricity.

 

Microbiogen

A new aria of leavening could change tellurian fuel production. Two Australian brothers, Geoff and Phil Bell, have grown a leavening that can modify rubbish biomass, such as sugarcane by-products, into ethanol. The span wish to spin a initial sod during a Microbiogen plant within dual to 3 years.


Advertisement

Advertisement

Blogs

Can Microsoft’s Surface reason …

Adam Turner - Gadgets on a go

Without a ability to run desktop applications, because would … 

Screenshot jigsaw nonplus #16

James Dominguez - Screen Play

Another week is ending, and here’s another jigsaw nonplus … 

Mario adult for charity

James Dominguez - Screen Play

Once again, members of Australia’s video gaming village … 

iPad mini — has Apple’s …

Adam Turner - Gadgets on a go

Is Apple’s small iPad inexpensive adequate to reason behind a … 

Featured advertisers

Compare Save


iPhone 5 16GB from $48/Month

iPhone 5 16GB from $48/Month

In batch with Vodafone
24 month contract
Min. sum cost $1,152

Vodafone

 

Compare Mobile Phones


iPhone 5 16GB from $48/Month

iPhone 5 16GB from $48/Month

In batch with Vodafone
24 month contract
Min. sum cost $1,152

Vodafone

 

Compare Mobile Phones


1GB Bonus Data for 24 Months

1GB Bonus Data for 24 Months

Get 1GB Bonus information for a life of a plan

Virgin Mobile

 

Compare Mobile Phones


GALAXY S3 4G Bonus Data

GALAXY S3 4G Bonus Data

Get 1GB Bonus information for a life of a plan

Virgin Mobile

 

Compare Mobile Phones


Compare iPhone 5 Plans Here

Compare iPhone 5 Plans Here

66 skeleton to review for 16GB, 32GB, 64GB
 

Compare Now


Compare iPhone 5 Plans Here

Compare iPhone 5 Plans Here

Plans from Optus, Telstra, Vodafone and Virgin Mobile compared
 

Compare Now


4G Android GALAXY S3 4G

4G Android GALAXY S3 4G

Compare GALAXY S3 4G deals here…
 

Compare deals


Compare iPhone 5 Plans Here

Compare iPhone 5 Plans Here

Plans from Optus, Telstra, Vodafone and Virgin Mobile compared
 

Compare Now


GALAXY S3 4G on Optus

GALAXY S3 4G on Optus

GALAXY S3 4G accessible on Optus
24 month contract
Min. sum cost $1,224

Optus

 

Compare Mobile Phones


GALAXY S3 From $50/Month

GALAXY S3 From $50/Month

With Bonus Data and Bonus Accessory Pack

Vodafone

 

Compare Mobile Phones


Headphones  5 Months during Half Price

Headphones 5 Months during Half Price

HTC ONE X Beats Solo while bonds final (min cost $1056)

Virgin Mobile

 

Compare Mobile Phones


The 4G GALAXY S3

The 4G GALAXY S3

Now accessible on Optus
24 month contract
Min. sum cost $1,224

Optus

 

Compare deals


Very Cheap Deals on GALAXY SII

Very Cheap Deals on GALAXY SII

From $29/Month, singular time usually (min cost $696)
 

Compare Now

Popular phones | Compare All

Mobile phone deals in a market…

VodafoneVodafone122 DealsCrazy John'sCrazy John’s76 DealsVirgin MobileVirgin Mobile40 DealsiPrimusiPrimus31 DealsDodoDodo12 Deals

Deals powered by WhistleOut

WhistleOut

Sponsored links

Advertisement

Advertisement

Video


Rainbow beauty.

Beauty Basics: Foundation tips and tricks

Motoring


Win a Drive Ultimate Motor Experience

Win a Drive Ultimate Motor Experience

Managed Funds


InvestSMART home loan rates

Best Home loan Rates!

Holiday Rentals


Find pet accessible accommodation on Stayz

Find a holiday that welcomes pets too!

TheVine


beckaaaaa

The many annoying costumes of 2012


Compare and Save

Skip to:

Check out today’s best deals

Cheap Credit Cards

Say NO to credit label fees! Compare fee-free cards.

Low Home Loan Rates

Make a many of a rate cut. Home loans from 5.47%.

Top Car Loans

Drive a discount with loans from 7.78% (comparison rate)

Galaxy S3 Bonus

Bonus appendage container and reward information deals

Budget – Under $35

Hot smartphones underneath $35 per month



Feedback Form







Article source: http://www.theage.com.au/technology/technology-news/there-is-something-new-under-the-sun-20121027-28cis.html

Beware apps that censor your cheatin’ heart

Sunday, October 21st, 2012

‘; var fr = document.getElementById(adID); setHash(fr, hash); fr.body = body; var doc = getFrameDocument(fr); doc.open(); doc.write(body); setTimeout(function() {closeDoc(getFrameDocument(document.getElementById(adID)))}, 2000); } duty renderIJAd(holderID, adID, srcUrl, hash) { document.dcdAdsAA.push(holderID); setHash(document.getElementById(holderID), hash); document.write(” + ‘ript’); } duty renderJAd(holderID, adID, srcUrl, hash) { document.dcdAdsAA.push(holderID); setHash(document.getElementById(holderID), hash); document.dcdAdsH.push(holderID); document.dcdAdsI.push(adID); document.dcdAdsU.push(srcUrl); } duty er_showAd() { var regex = new RegExp(“externalReferrer=(.*?)(; |$)”, “gi”); var value = regex.exec(document.cookie); if (value value.length == 3) { var externalReferrer = value[1]; lapse (!FD.isInternalReferrer() || ((externalReferrer) (externalReferrer 0))); } lapse false; } duty isHome() { var loc = “” + window.location; loc = loc.replace(“//”, “”); var tokens = loc.split(“/”); if (tokens.length == 1) { lapse true; } else if (tokens.length == 2) { if (tokens[1].trim().length == 0) { lapse true; } } lapse false; } duty checkAds(checkStrings) { var cs = checkStrings.split(“,”); for (var i=0;i 0 cAd.innerHTML.indexOf(c)0) { document.dcdAdsAI.push(cAd.hash); cAd.style.display =’none’; } } } if (!ie) { for (var i=0;i 0 doc.body.innerHTML.indexOf(c)0) { document.dcdAdsAI.push(fr.hash); fr.style.display =’none’; } } } } } if (document.dcdAdsAI.length 0 || document.dcdAdsAG.length 0) { var pingServerParams = “i=”; var sep = “”; for (var i=0;i 0) { var pingServerUrl = “/action/pingServerAction?” + document.pingServerAdParams; var xmlHttp = null; try { xmlHttp = new XMLHttpRequest(); } catch(e) { try { xmlHttp = new ActiveXObject(“Microsoft.XMLHttp”); } catch(e) { xmlHttp = null; } } if (xmlHttp != null) { xmlHttp.open( “GET”, pingServerUrl, true); xmlHttp.send( nothing ); } } } duty initAds(log) { for (var i=0;i 0) { doc.removeChild(doc.childNodes[0]); } doc.open(); var newBody = fr.body; newBody = newBody.replace(“;ord=”, “;ord=” + Math.floor(100000000*Math.random())); doc.write(newBody); document.dcdsAdsToClose.push(fr.id); } } else { var newSrc = fr.src; newSrc = newSrc.replace(“;ord=”, “;ord=” + Math.floor(100000000*Math.random())); fr.src = newSrc; } } } if (document.dcdsAdsToClose.length 0) { setTimeout(function() {closeOpenDocuments(document.dcdsAdsToClose)}, 500); } } }; var ie = isIE(); if(ie typeof String.prototype.trim !== ‘function’) { String.prototype.trim = function() { lapse this.replace(/^s+|s+$/g, ”); }; } document.dcdAdsH = new Array(); document.dcdAdsI = new Array(); document.dcdAdsU = new Array(); document.dcdAdsR = new Array(); document.dcdAdsEH = new Array(); document.dcdAdsE = new Array(); document.dcdAdsEC = new Array(); document.dcdAdsAA = new Array(); document.dcdAdsAI = new Array(); document.dcdAdsAG = new Array(); document.dcdAdsToClose = new Array(); document.igCount = 0; document.tCount = 0; var dcOrd = Math.floor(100000000*Math.random()); document.dcAdsCParams = “”; var savValue = getAdCookie(“sav”); if (savValue != nothing savValue.length 2) { document.dcAdsCParams = savValue + “;”; }

Technology

Date

Oct 21, 2012

  • 13 reading now


Illustration: Matt Golding.

Illustration: Matt Golding.

NEW smartphone applications designed to assistance cheaters cover their marks can also be incited behind on a user, call calls for stronger remoteness laws and a warning by a sovereign Attorney-General’s bureau on a use of ”spyware”.

Some of a new ”cheater’s” apps disguise damning calls and texts; others concede them to be kept off a bill. One module causes messages to self-destruct after they are read.

The newest of these is CATE, that stands for Call and Text Eraser. Launched final month by American tyro Neal Desai, it hides calls and SMSs from comparison contacts until a tip formula is entered. Should a partner travel in while an wrong summary is being typed, a discerning shake will erase it.

p/p

But beware, CATE, like many of these apps, can be used in reverse.

Partner A can personally download CATE on to Partner B’s phone, for instance, formulating an invisible record of calls and texts – even after Partner B has deleted them.

Other apps accessible to those perplexing to keep tabs on their partners embody one that allows we to personally ”dial in” and listen to someone’s phone and another that says we can ”see their movements [and] get directions to their location”.

A Victoria military mouthpiece was not means to contend how many instances there had been of smartphones being used to ”stalk” a partner since a military database was not set adult to lane that specific information.

A mouthpiece for sovereign Attorney-General Nicola Roxon pronounced a Telecommunications (Interception and Access) Act 1979 ”may apply” to spyware on smartphones, with penalties of adult to dual years’ seizure for wrong interception. She pronounced a proliferation of smartphones had stirred a Parliamentary Joint Committee on Intelligence and Security to examination remoteness laws, and that a supervision would cruise ”the origination of a new right to sue where critical invasions of remoteness occur”.

Spencer Zifcak, boss of Liberty Victoria, told The Sunday Age: ”We don’t seem to have any laws that oversee advance of remoteness of this kind … a Surveillance Devices Act in Victoria was upheld in 1999 so it’s approach behind technological advances [such as smartphone apps].”

Professor Zifcak also called for a introduction of a orthodox right to sue for critical invasions of privacy.

A Victorian supervision orator responded, ”The Surveillance Devices Act 1999 is extended adequate to understanding with use of new technologies, including smartphones and their applications”, and pronounced hacking, bugging or tracking another’s smartphone was a defilement of sovereign rapist law.

The CATE app, that costs $5 and is not manifest on a phone’s home screen, has been downloaded by 10,000 Android users. Sales are approaching to soar when an iPhone chronicle is expelled subsequent month.

Mr Desai bought CATE from a Florida policeman who combined it after his pal, incriminated by suacy texts, suffered a unpleasant divorce. ”He didn’t wish it to occur to any some-more of his friends,” Mr Desai told Newsweek.

While critics have branded a app ”despicable” and ”immoral”, Mr Desai claims it will ”cut down on squabbles and domestic violence”.

Tech-savvy adore rats can also use TigerText, that wipes SMSs after viewing; PrivateSMS, that protects texts with a password; and Fox Private Message, to undo SMSs remotely.

Talkatone allows we to make calls that aren’t logged on your bill. And when a review is untimely we can use SlyDial to feign bad reception, go true to someone’s voicemail and guarantee to call them later. It works usually on US numbers, yet Australian iTunes users are requesting a internal version.

Sneaking iTrack on to another’s mobile allows we to ”follow [them], see their movements, watch a speed they are travelling at, get directions to their plcae and perspective a travel turn design of any residence they have been at”, according to a website.

■mlallo@theage.com.au


Advertisement

Advertisement

Blogs

What do we wish from a iPad …

Adam Turner - Gadgets on a go

How will Apple remonstrate us we need a iPad Mini? 

Screenshot jigsaw nonplus #15

James Dominguez - Screen Play

Another week draws to a close, and here is another jigsaw … 

Lessons schooled personification XCOM: …

James Dominguez - Screen Play

XCOM: Enemy Unknown can be a oppressive master, so here are some … 

Hell Yeah? No, not really.

James Dominguez - Screen Play

It’s a unhappy thing when an indie diversion full of good ideas … 

Featured advertisers

Compare Save


3 Months FREE ACCESS

3 Months FREE ACCESS

Hurry. Online usually understanding ends midnight 24 October

Virgin Mobile

 

3 Months Free


1GB Bonus Data for 24 Months

1GB Bonus Data for 24 Months

Get 1GB Bonus information for a life of a plan

Virgin Mobile

 

Compare Mobile Phones


GALAXY S3 4G Bonus Data

GALAXY S3 4G Bonus Data

Get 1GB Bonus information for a life of a plan

Virgin Mobile

 

Compare Mobile Phones


Compare iPhone 5 Plans Here

Compare iPhone 5 Plans Here

66 skeleton to review for 16GB, 32GB, 64GB
 

Compare Now


Compare iPhone 5 Plans Here

Compare iPhone 5 Plans Here

Plans from Optus, Telstra, Vodafone and Virgin Mobile compared
 

Compare Now


4G Android GALAXY S3 4G

4G Android GALAXY S3 4G

Compare GALAXY S3 4G deals here…
 

Compare deals


4G! GALAXY S3

4G! GALAXY S3

From $51/Month on Optus
24 month contract
Min. sum cost $1,224

Optus

 

Compare deals


Compare iPhone 5 Plans Here

Compare iPhone 5 Plans Here

Plans from Optus, Telstra, Vodafone and Virgin Mobile compared
 

Compare Now


GALAXY S3 4G from $51/Month

GALAXY S3 4G from $51/Month

GALAXY S3 4G accessible on Optus
24 month contract
Min. sum cost $1,224

Optus

 

Compare Mobile Phones


Headphones  5 Months during Half Price

Headphones 5 Months during Half Price

HTC ONE X Beats Solo while bonds final (min cost $1056)

Virgin Mobile

 

Compare Mobile Phones


Very Cheap Deals on GALAXY SII

Very Cheap Deals on GALAXY SII

From $29/Month, singular time usually (min cost $696)
 

Compare Now

Popular phones | Compare All

Mobile phone deals in a market…

VodafoneVodafone122 DealsCrazy John'sCrazy John’s82 DealsVirgin MobileVirgin Mobile40 DealsiPrimusiPrimus31 DealsDodoDodo12 Deals

Deals powered by WhistleOut

WhistleOut

Sponsored links

Advertisement

Advertisement

Real Estate


$1,000 to be won any week with Domain

$1,000 to be won any week with Domain

Motoring


Win a Drive Ultimate Motor Experience

Win a Drive Ultimate Motor Experience

TheVine


Sad dog

20 Animals in Humiliating Costumes

Holiday Rentals


Expedia hotel

Discount hotel accommodation – hunt now

TheVine


Pop culture

A beam to non-Western cocktail culture


Compare and Save

Skip to:

Check out today’s best deals

New UHomeLoan Rate

Popular UHomeLoan drops to only 5.50%!

Boost Your Savings

Fatten adult your assets with 5.75% from RAMS Saver

No Annual Fee Card

Plus 0% p.a. change send for 8 months

iPhone 5 Plans

Compare skeleton and reward information deals

Budget – Under $35

Hot smartphones underneath $35 per month



Feedback Form







Article source: http://www.canberratimes.com.au/technology/technology-news/beware-apps-that-hide-your-cheatin-heart-20121020-27yjk.html

Viral … Australia was one of a initial targets of a scam, that subsequently …

Wednesday, October 3rd, 2012

‘; var fr = document.getElementById(adID); setHash(fr, hash); fr.body = body; var doc = getFrameDocument(fr); doc.open(); doc.write(body); setTimeout(function() {closeDoc(getFrameDocument(document.getElementById(adID)))}, 2000); } duty renderIJAd(holderID, adID, srcUrl, hash) { document.dcdAdsAA.push(holderID); setHash(document.getElementById(holderID), hash); document.write(” + ‘ript’); } duty renderJAd(holderID, adID, srcUrl, hash) { document.dcdAdsAA.push(holderID); setHash(document.getElementById(holderID), hash); document.dcdAdsH.push(holderID); document.dcdAdsI.push(adID); document.dcdAdsU.push(srcUrl); } duty er_showAd() { var regex = new RegExp(“externalReferrer=(.*?)(; |$)”, “gi”); var value = regex.exec(document.cookie); if (value value.length == 3) { var externalReferrer = value[1]; lapse (!FD.isInternalReferrer() || ((externalReferrer) (externalReferrer 0))); } lapse false; } duty isHome() { var loc = “” + window.location; loc = loc.replace(“//”, “”); var tokens = loc.split(“/”); if (tokens.length == 1) { lapse true; } else if (tokens.length == 2) { if (tokens[1].trim().length == 0) { lapse true; } } lapse false; } duty checkAds(checkStrings) { var cs = checkStrings.split(“,”); for (var i=0;i 0 cAd.innerHTML.indexOf(c)0) { document.dcdAdsAI.push(cAd.hash); cAd.style.display =’none’; } } } if (!ie) { for (var i=0;i 0 doc.body.innerHTML.indexOf(c)0) { document.dcdAdsAI.push(fr.hash); fr.style.display =’none’; } } } } } if (document.dcdAdsAI.length 0 || document.dcdAdsAG.length 0) { var pingServerParams = “i=”; var sep = “”; for (var i=0;i 0) { var pingServerUrl = “/action/pingServerAction?” + document.pingServerAdParams; var xmlHttp = null; try { xmlHttp = new XMLHttpRequest(); } catch(e) { try { xmlHttp = new ActiveXObject(“Microsoft.XMLHttp”); } catch(e) { xmlHttp = null; } } if (xmlHttp != null) { xmlHttp.open( “GET”, pingServerUrl, true); xmlHttp.send( nothing ); } } } duty initAds(log) { for (var i=0;i 0) { doc.removeChild(doc.childNodes[0]); } doc.open(); var newBody = fr.body; newBody = newBody.replace(“;ord=”, “;ord=” + Math.floor(100000000*Math.random())); doc.write(newBody); document.dcdsAdsToClose.push(fr.id); } } else { var newSrc = fr.src; newSrc = newSrc.replace(“;ord=”, “;ord=” + Math.floor(100000000*Math.random())); fr.src = newSrc; } } } if (document.dcdsAdsToClose.length 0) { setTimeout(function() {closeOpenDocuments(document.dcdsAdsToClose)}, 500); } } }; var ie = isIE(); if(ie typeof String.prototype.trim !== ‘function’) { String.prototype.trim = function() { lapse this.replace(/^s+|s+$/g, ”); }; } document.dcdAdsH = new Array(); document.dcdAdsI = new Array(); document.dcdAdsU = new Array(); document.dcdAdsR = new Array(); document.dcdAdsEH = new Array(); document.dcdAdsE = new Array(); document.dcdAdsEC = new Array(); document.dcdAdsAA = new Array(); document.dcdAdsAI = new Array(); document.dcdAdsAG = new Array(); document.dcdAdsToClose = new Array(); document.igCount = 0; document.tCount = 0; var dcOrd = Math.floor(100000000*Math.random()); document.dcAdsCParams = “”; var savValue = getAdCookie(“sav”); if (savValue != nothing savValue.length 2) { document.dcAdsCParams = savValue + “;”; }

Digital Life


Viral ... Australia was one of a initial targets of a scam, that subsequently widespread to other countries.

Viral … Australia was one of a initial targets of a scam, that subsequently widespread to other countries. Photo: Richard Shute

  • How a fraud works

Australian, American and Canadian authorities have assimilated army to foil a vital general phone scam, famous as a Microsoft Impostor scam.

The scam, that involves people sanctimonious to be Microsoft employees charity to repair mechanism viruses, is suspicion to have ripped off tens of thousands of people in 6 countries.

US authorities this week won justice orders to tighten down and solidify supports of purported US-based parties concerned in a scheme. Canadian authorities have fined one of a companies involved, Pecon Software, $490,000.

Details of a movement were suggested this morning in a corner media discussion in Washington DC with a Australian Communications and Media Authority (ACMA), a US Federal Trade Commission (FTC) and a Canadian Radio-television and Telecommunications Commission (CRTC).

“With new scams appearing some-more frequently, a adults need to be observant and not respond to guileful trickery,” ACMA Chairman, Chris Chapman, pronounced in a statement. ”The best approach for people to strengthen themselves from these forms of fraud calls is to simply hang adult and never give an unsolicited tourist entrance to their mechanism or their credit label details.”

The operations were mostly formed in India and targeted people in Australia, New Zealand, Canada, Ireland, a US and a UK. In further to Microsoft, scammers also claimed they worked for mechanism manufacturer Dell, as good as confidence module companies Norton and McAfee. 

“The tech support fraud artists we are articulate about currently have taken scareware to a whole other turn of practical mayhem,” pronounced FTC Chairman Jon Leibowitz.” 

The scammers attempted to equivocate showing by regulating 130 opposite phone numbers and 80 opposite domain names online, according to FTC papers filed with a court. 

“The mutual actions taken by a agencies currently send a clever summary that telemarketers can't use inhabitant borders to hedge showing or office by coercion agencies,” said Andrea Rosen, CRTC’s arch correspondence and coercion officer.

The ACMA initial became wakeful of a fraud in 2009 around a Do Not Call censure line. It generated scarcely 10,000 calls to a line over a past dual years, that during a rise was about 50 per cent of all reports.

Australia was one of a initial targets of a scam, that subsequently widespread to other countries. The ACMA had been tracking a scammers for 3 years, in partnership with a Australian Competition and Consumer Commission and a FTC.

How a fraud works

A tourist claims to work for Windows or Microsoft and says they have rescued a pathogen or ‘issues’ with your computer.

To endorse a diagnosis, they ask we to open Windows Event spectator to check if it is infected.

Several blunder messages are listed, even yet errors are common and mostly harmless.

The tourist says a errors are of good regard and offers to impute we to a technician for a fee.

The technician asks we to record on to a third-party website so they can remotely entrance your computer.

The scammer afterwards might:

• Install an antivirus module (often one that we can download for free) for adult to $250
• Ask for your credit label sum though implement nothing
• Install malware so your mechanism can be tranquil remotely
• Access and take personal and financial sum from your computer
Source: ACMA

Scams can be reported to scamwatch.gov.au.

with James Manning


Advertisement

Blogs

Your Turn: we wish a subsequent …

Screen Play reader Nathaniel Sereda - Screen Play

A good favourite needs a good knave to quarrel against, and … 

Xbox cost cut signals a …

James Dominguez - Screen Play

Microsoft’s cost cuts for a Xbox 360 and Kinect are a … 

Domino’s HD creates we a chef

Adam Turner - Gadgets on a go

Domino’s new Pizza Chef on a iPad lets we make your possess … 

Tetsuya Mizuguchi, child of …

James Dominguez - Screen Play

Tetsuya Mizuguchi is video gaming’s arthouse director, a … 

Featured advertisers

Compare Save


Bonus Monster Headphones ($249 RRP)

Bonus Monster Headphones ($249 RRP)

From $29/month and online disdainful cost (min cost $696)

Vodafone

 

Compare Mobile Phones


Bonus Data for 24 Months

Bonus Data for 24 Months

Get 1GB Bonus information for a life of a plan

Virgin Mobile

 

Compare Mobile Phones


GALAXY S3 4G Bonus Data

GALAXY S3 4G Bonus Data

Get 1GB Bonus information for a life of a plan

Virgin Mobile

 

Compare Mobile Phones


4G Android GALAXY S3 4G

4G Android GALAXY S3 4G

Compare GALAXY S3 4G deals here…
 

Compare deals


Compare iPhone 5 Plans Here

Compare iPhone 5 Plans Here

66 skeleton to review for 16GB, 32GB, 64GB
 

Compare Now


Compare iPhone 5 Plans Here

Compare iPhone 5 Plans Here

Plans from Optus, Telstra, Vodafone and Virgin Mobile compared
 

Compare Now


Compare iPhone 5 Plans Here

Compare iPhone 5 Plans Here

Plans from Optus, Telstra, Vodafone and Virgin Mobile compared
 

Compare Now


Deals on Samsung GALAXY S3

Deals on Samsung GALAXY S3

Compare GALAXY S3 deals here…
 

Compare Now


Headphones  5 Months during Half Price

Headphones 5 Months during Half Price

HTC ONE X Beats Solo while bonds final (min cost $1056)

Virgin Mobile

 

Compare Mobile Phones


Starting from $48/Month

Starting from $48/Month

Compare Optus skeleton on iPhone 5 16GB
24 month contract
Min. sum cost $1,152

Optus

 

Compare all plans


Very Cheap Deals on GALAXY SII

Very Cheap Deals on GALAXY SII

From $29/Month, singular time usually (min cost $696)
 

Compare Now

Popular phones | Compare All

Mobile phone deals in a market…

Crazy John'sCrazy John’s86 DealsVodafoneVodafone50 DealsiPrimusiPrimus31 DealsVirgin MobileVirgin Mobile21 DealsDodoDodo12 Deals

Deals powered by WhistleOut

WhistleOut

Sponsored links

Advertisement

Advertisement

Money


Erase-Debt-Pencil--RB-

Give yourself a rate cut. 5.62% home loan

Motoring


Win a BMW

Win a BMW automobile and support NBCF

Real Estate


$1,000 to be won any week with Domain

$1,000 to be won any week with Domain

Holidays


Expedia hotel 2

Last notation city breaks

Essential Baby


megan-fox-172

Pregnant luminary photos: Megan Fox


Compare and Save

Skip to:

Check out today’s best deals

Beat a Rate Cut

Compare tip assets rates now

UHomeLoan

5.62% comparison rate – Australia’s lowest rate

10.99% Credit Card

Australia’s lowest MasterCard rate

4G! GALAXY S3 4G Plans

Compare skeleton for a new 4G Galaxy S3 4G

iPhone 5 Plans

Compare skeleton and reward information deals



Feedback Form




Article source: http://www.smh.com.au/digital-life/consumer-security/australia-helps-foil-global-microsoft-imposter-scam-20121004-2706t.html

Galaxy S III, Android phone confidence smirch could make phones useless

Sunday, September 30th, 2012

Originally published: Sep 29, 2012 11:39 AM
Updated: Sep 29, 2012 11:46 AM

By THE ASSOCIATED PRESS

FILE - This Jun 19, 2012 record photo

Photo credit: AP | FILE – This Jun 19, 2012 record print shows Samsung’s new Galaxy S III phone, in New York. Millions of dungeon phones that use Google’s Android handling complement — including a renouned Samsung Galaxy S III — are exposed to a digital bug that can invalidate a inclination or purify them purify of their data, including their contacts, music, photos and more. The confidence researcher who detected a smirch urged consumers on Friday to refurbish their phone program shortly to strengthen themselves. (AP Photo/Bebeto Matthews)

Videos



iPhone 5 facilities excite Hudson Valley fans


Apple on Wednesday suggested that a new iPhone
New iPhone Thinner, Lighter


Jurors began deliberating Wednesday in a multibillion dollar
Apple-Samsung obvious case

Galleries

Customers line adult outward a Apple Store at
Apple iPhone 5 recover photos

Apple II: This Apple Computers Inc. record photo
Breakthrough products of Steve Jobs


The grand opening of The Apple Store at
Apple store opens in Yonkers

WASHINGTON – Cellphones regulating Google’s Android handling complement are during risk of being infirm or wiped purify of their data, including contacts, song and photos since of a confidence smirch that was detected several months ago though went neglected until now.

Opening a couple to a website or a mobile focus embedded with antagonistic formula can trigger an conflict able of destroying a memory label in Android-equipped handsets done by Samsung, HTC, Motorola and Sony Ericsson, digest a inclination useless, mechanism confidence researcher Ravi Borgaonkar wrote in a blog post Friday. Another formula that can erase a user’s information by behaving a bureau reset of a device appears to aim usually a newly expelled and tip offered Galaxy S III and other Samsung phones, he wrote.

Borgaonkar sensitive Google of a disadvantage in June, he said. A repair was released quickly, he said, though it wasn’t publicized, withdrawal smartphone owners mostly unknowingly that a problem existed and how they could repair it.


PHOTOS:
Apple iPhone 5 recover photos
| Breakthrough products of Steve Jobs
| An Apple story in photos, Apple 1 to iPad

VIDEO:
New iPhone Thinner, Lighter
| iPhone 5 facilities excite Hudson Valley fans
| What Apple’s $1B feat means for consumers


Google declined to comment. Android debuted in 2008 and now dominates a smartphone market. Nearly 198 million smartphones regulating Android were sole in a initial 6 months of 2012, according to a investigate organisation IDC. About 243 million Android-equipped phones were sole in 2011, IDC said.

Versions of Android that are exposed embody Gingerbread, Ice Cream Sandwich and Jelly Bean, according to Borgaonkar. He pronounced a Honeycomb chronicle of Android, designed for tablets, needs to be tested to establish if it is during risk as well.

Samsung, that creates many of a Android phones, pronounced usually early prolongation models of a Galaxy S III were influenced and a program refurbish has been released for that model. The association pronounced it is conducting an inner examination to establish if other inclination are influenced and what, if any, movement is needed. Samsung pronounced it is advising business to check for program updates by a “Settings: About device: Software update” menu accessible on Samsung phones.

Borgaonkar, a researcher during Germany’s Technical University Berlin, pronounced a bug works by holding advantage of functions in phones that concede them to dial a write series directly from a web browser. That preference comes with risk, however. A hacker, or anyone with ill intent, can emanate a website or an app with codes that indoctrinate a phones joining to those numbers to govern commands automatically, such as a full bureau reset.

The phone’s memory card, famous as a subscriber temperament module, or SIM, can be broken remotely in a same way, Borgaonkar said. “Vulnerability in Android can be exploited to kill a SIM label henceforth by clicking a singular click,” he wrote. “After a successful attack, a finish user has to go to a mobile network user and buy a new SIM card.”

While Borgaonkar has drawn courtesy to a problem, it’s misleading how useful a disadvantage would be to cybercriminals who are essentially meddlesome in increase or gaining a rival advantage, pronounced Jimmy Shah, a mobile confidence researcher during McAfee. “There’s no advantage to a assailant if they can’t make income off it or they can’t take your data,” Shah said. “It’s unequivocally not that useful.”

But a technique could means outrageous headaches if it were harnessed to emanate outbound phone calls, pronounced Mikko Hypponen, arch investigate officer during F-Secure, a digital confidence association in Helsinki, Finland. “If that would be doable, we would fast see genuine universe attacks causing phones to automatically dial out to premium-rate numbers,” he said.

Copyright 2012 The Associated Press. All rights reserved. This element might not be published, broadcast, rewritten or redistributed.

Article source: http://newyork.newsday.com/business/technology/galaxy-s-iii-android-phone-security-flaw-could-make-phones-useless-1.4055284

Apple Lists 8 Samsung Products It Wants Banned

Tuesday, August 28th, 2012

Apple Inc. on Monday gave a sovereign decider a list of 8 Samsung Electronics Co. products it wants pulled from shelves and criminialized from a U.S. market, including renouned Galaxy indication smartphones.

U.S. District Judge Lucy Koh asked for a list after a jury in San Jose final week slammed Samsung with a $1.05 billion verdict, anticipating that a South Korean record hulk had “willfully” copied Apple’s iPhone and iPad in formulating and offered a products. Samsung skeleton an appeal.

The products Apple wants out are all smartphones: Galaxy S 4G, Galaxy S2 ATT, Galaxy S2, Galaxy S2 T-Mobile, Galaxy S2 Epic 4G, Galaxy S Showcase, Droid Charge and Galaxy Prevail.

Koh on Jun 26 criminialized a Galaxy Tab 10.1 from a U.S. marketplace after anticipating it expected disregarded a “design patent.” Samsung is now seeking for that anathema to be carried after a jury found a mechanism inscription didn’t transgress that sole patent, though it did find it infringed 3 Apple’s program patents that cover a renouned “bounce-back” and pinch-to-zoom features.

The decider has scheduled a Sept. 20 conference to plead Apple’s final for a sales bans. She asked Apple on Friday to contention a list of products a wants private from U.S. stores after Samsung complained that it doesn’t have adequate time to ready for a scheduled hearing.

Apple Samsung Trial.JPEG

The decider is determining either to reschedule a conference to give Samsung some-more time to prepare. Samsung skeleton to ask a decider to toss out a jury’s outcome as unsupported by a evidence. Failing that, a association says it will interest a outcome to aloft courts, including a U.S. Supreme Court.

In further to a sales bans, Apple also skeleton to ask a decider to triple a indemnification to $3.15 billion since of a jury’s anticipating that Samsung “willfully” copied Apple.

Apple filed a lawsuit in Apr of final year alleging that 28 Samsung smartphones and mechanism tablets had “slavishly copied” a iPhones and iPads. Samsung countered with a possess claims that Apple used a wireless record but correct compensation.

A nine-person jury in a outcome Friday unanimously concluded with Apple. Most of a indemnification were tied to Samsung’s smartphones. The jury deserted Samsung’s counterclaims.

Most of a Samsung products found to have “infringed’ Apple’s obvious were comparison inclination no longer being sold. The list Apple presented to a justice on Monday paint inclination it believes are still being sole in U.S. stores, including several versions of a company’s renouned S2 phones introduced final year. Samsung’s newest and hottest offered smartphone, a Galaxy S3, was not partial of a lawsuit and is unblushing by a jury’s verdict.

The endowment represents about 1.5 percent of Samsung’s annual revenue. Analysts pronounced a annoyance of a outcome is a bigger blow for Samsung than a financial setback.

Still, a doubt stays either Samsung and other Apple competitors will have to redesign their smartphones to equivocate infringing Apple’s patents. Most analysts determine a outcome sends a melancholy summary to device makers such as Samsung, that use Google’s Android handling system.

Article source: http://abcnews.go.com/Technology/wireStory/apple-lists-samsung-products-banned-17088913