Hamsterdan writes "The German government's spokesman said it believes Chancellor Angela Merkel's mobile phone may have been monitored by the National Security Agency, Der Spiegel reports.
Obama "assured" Merkel that the U.S. "is not monitoring and will not monitor" her phone calls, but there was no mention of the past.
Merkel said that targeting her phone would be unacceptable."Link to Original Source
Hamsterdan writes "The time capsule was buried in 1983 during the International Design Conference in Aspen, Colo., and was supposed to be exhumed in 2000, but when the landscape changed, the time capsule was lost. The capsule was uncovered by members of National Geographic Channel's Diggers team who worked closely with one of the former design-team members who buried the capsule, Harry Teague."Link to Original Source
Hamsterdan writes "Called DropTag, the gadget combines a battery, a low-energy Bluetooth transmitter, an accelerometer and a memory chip. Stuck on a parcel as it leaves an e-commerce warehouse, it logs any g-forces above a set risky shock level that it experiences. The idea is that when the courier puts it in your hands, you turn on Bluetooth on a smartphone running a DropTag app and scan it before you sign for it."Link to Original Source
Hamsterdan writes "Hey, Windows users — seeing ads in your Skype calls? Fret not, it isn't a rouge version of the software; it's just a new twist on "free" VoIP calling. Skype has today announced the launch of Conversation Ads, finally, a way to make cash off of free calls. These new display ad units will appear within the calling window of users who do not have Skype Credit or subscriptions when they're making 1:1 Skype-to-Skype audio calls using Skype for Windows. Strangely, no other platforms — desktop or mobile — are mentioned; perhaps ads are being ported elsewhere as we speak."Link to Original Source
Hamsterdan writes "Apple released an update to kill the Flashback malware several weeks ago, in early April. However, until today, Cupertino had yet to issue a patch for users running its older operating system. Apple's Flashback Removal Security Update removes the most common variants of the Flashback malware. If the Flashback malware is found, a dialog will notify the user that the malware was removed. A second update disables versions of Adobe Flash Player that do not include the latest security updates and provides the option to get the current version from Adobe's website. If you're running anything earlier than Mac OS X v10.5.8, you'll also need to update your OS before you can install these two new updates."Link to Original Source
Hamsterdan writes "Symantec has confirmed that the hacker group Anonymous stole source code from the 2006 versions of several Norton security products and the pcAnywhere remote access tool.
Although Symantec says the theft actually occurred in 2006, the issue did not come to light until this month when hackers related to Anonymous said they had the source code and would release it publicly. Users of the Norton products in question are not at any increased risk of attack because of the age of the source code and security improvements made in the years since the breach, but the vendor acknowledged on Tuesday night that "Customers of Symantec's pcAnywhere have increased risk as a result of this incident.""Link to Original Source
Hamsterdan writes "After idahc successfully discovered vulnerabilities on an Apple business website, a dump of more than two dozen usernames and hashed passwords appeared on Pastebin — though he claims the data was not posted by him. Access appears to have been gained via a flaw in a survey posted on the Apple Consultants network site that was being served from abs.apple.com. That server remains offline for the time being, presumably while Apple attempts to batten down the network hatches.
While idahc admits that the situation is “not yet serious,” the breach still means that Apple could find itself scrutinized by the same people who have recently gained entry into dozens of high-profile sites — from PBS and Citibank to just about every Sony site and service imaginable."Link to Original Source
Hamsterdan writes "The CIA website at cia.gov is currently inaccessible, having apparently fallen foul of a distributed denial-of-service (DDoS) attack by hackers.
Almost inevitably, fingers are pointing towards the notorious LulzSec hacktivist group who have made a name for themselves recently with a series of attacks against corporations, organisations and websites — sometimes forcing them offline, and on other occasions stealing personal information by exploiting security flaws.
A post to LulzSec's Twitter feed appears to confirm their participation in the attack..."Link to Original Source
Hamsterdan writes "RSA Security is to replace virtually every one of the 40 million SecurID tokens currently in use as a result of the hacking attack the company disclosed back in March. The EMC subsidiary issued a letter to customers acknowledging that SecurID failed to protect defense contractor Lockheed Martin, which last month reported a hack attempt.
SecurID tokens are used in two-factor authentication systems. Each user account is linked to a token, and each token generates a pseudo-random number that changes periodically, typically every 30 or 60 seconds. To log in, the user enters a username, password, and the number shown on their token. The authentication server knows what number a particular token should be showing, and so uses this number to prove that the user is in possession of their token."Link to Original Source
Hamsterdan writes "The ongoing PSN saga has taken a dramatic turn for the worse with evidence that hackers responsible for the PSN breach last week are attempting to sell users' credit card details online.
It's believed that hackers have obtained unencrypted databases including names, addresses, phone numbers, emails, email passwords, date of births, credit card numbers, expiry dates and the all important security codes found on the back of credit cards."Link to Original Source
Hamsterdan writes "ABC, CBS and NBC are blocking TV programming on their websites from being viewable on Google Inc.'s new Web-TV service, exposing the rift that remains between the technology giant and some of the media companies it wants to supply content for its new products.
Full-length episodes of shows like NBC's "The Office," CBS's "CSI: Crime Scene Investigation," and ABC's "Modern Family" can't be viewed on Google TV, a service that allows people to access the Internet and search for Web videos on their television screens, as well as to search live TV listings. Logitech International S.A. and Sony Corp. began ...
Read more: http://online.wsj.com/article/SB10001424052702303339504575566572021412854.html#ixzz136swdEfQ"Link to Original Source
Hamsterdan writes "The callous souls over at AMD have decided that our little consumer brains aren't sophisticated enough to handle two awesome brands, so they're just axing the use of the ATI moniker from here on out."Link to Original Source
Hamsterdan writes "Microsoft on Tuesday denounced Yahoo! Japan's Internet search alliance with Google, saying it would give Google near-total control over the third-largest market for search queries in the world."Link to Original Source
Hamsterdan writes "The Rogers HTC Dream is not having a good start to 2010, actually the Dream is turning into a bit of a nightmare. First the beloved Android was informed that it would not receive an upgrade to a new OS and stay exactly how it is Dream owners didn’t like this news and decided to revolt. Rogers heard the feedback and said Dream customers can upgrade to a Magic if they wish.
However, news came early this morning from Rogers that the HTC Dream has been pulled off the shelf from all locations and online. The reason is because an urgent software fix that is needed for 911 calls to be completed. Kinda important. All Dream owners were contacted by text message about the issue."Link to Original Source
Hamsterdan writes "Lose/Lose is a video-game with real life consequences. Each alien in the game is created based on a random file on the players computer. If the player kills the alien, the file it is based on is deleted. If the players ship is destroyed, the application itself is deleted."Link to Original Source