arit writes: Three recent Boston University grads demonstrate software and hardware attacks on the Square Reader used by many mobile vendors to process credit card transactions. One of the attacks converts a standard reader into an efficient credit card skimmer with very little effort.
They can return on a full- or part-time basis, and even take subsequent time off later in the year if needed. Netflix will "keep paying them normally,"
The TIME comments that this Netflix’s policy "deserves high marks for extending leave to fathers, as well as understanding that the entire first year after childbirth can be challenging for new parents".
ErnieKey writes: The US military is working with technology that will allow them to create exact virtual replicas of their soldiers. Then in case of an injury, these replicas, which are created using x-rays, MRI and Ultrasound technology, will be able to be restored for surgeons to 3D print both exact medical models for rebuilding the injured patient's body and even 3D print exact replica implants. Could we all one day soon have virtual backups of ourselves that we can access and have new body parts 3D printed on demand? It appears as though we are getting closer. Link to Original Source
SonicSpike writes: A Houston man has been arrested after Google sent a tip to the National Center for Missing and Exploited Children saying the man had explicit images of a child in his email, according to Houston police.
The man was a registered sex offender, convicted of sexually assaulting a child in 1994, reports Tim Wetzel at KHOU Channel 11 News in Houston.
"He was keeping it inside of his email. I can't see that information, I can't see that photo, but Google can," Detective David Nettles of the Houston Metro Internet Crimes Against Children Taskforce told Channel 11.
After Google reportedly tipped off the National Center for Missing and Exploited Children, the center alerted police, who used the information to get a warrant.
A search of the man's other devices revealed more suspicious images and text messages. Police arrested him and he's being held on a $200,000 bond.
On one hand, most people would certainly applaud the use of technology to scan email in a case like this.
On the other, debate rages about how much privacy users can expect when using Google's services like email. In a word: none.
A year ago, in a court brief, Google said as much. Then, in April, after a class-action case against Google for email scanning fell apart, Google updated its terms of service to warn people that it was automatically analyzing emails .
Considering Google has been working to fight online child sexual abuse since 2006, it stands to reason the company would scan emails looking for those sorts of images. Google has never come right out and said so, but hinted strongly at it about a year ago when Jacquelline Fuller, director of Google Giving, specifically mentioned the National Center's "CyberTipline" in a blog post . The CyberTipline receives leads and tips regarding suspected crimes. Link to Original Source
Taco Cowboy writes: The Israel — Hamas conflict in Gaza is not only about bombs, missiles, bullets, but also about cyberwarfare, battles of the mind over social media, smart underground tunnels and cloud-based missile launching systems
The tunnels that Hamas has dug deep beneath Gaza are embedded with high tech gadgets, courtesy of Qatar, which has funded Hamas with billions to equipped their tunnels with intelligent sensors which are networked to control centers enabling the command and control staff to quickly notify operatives nearby that IDF units are advancing inside a certain tunnel, allowing for rapid deployment of attack units and the setting up of bobby traps inside the tunnel
In addition, Hamas has automated its rocket firing system using networked, cloud-based launching software provided by Qatar which can set off a rocket from any distance, and set them to go off at a specific time, using timers. “Anyone who thinks they have dozens of people sitting next to launchers firing rockets each time there is a barrage is mistaken,” said Aviad Dadon, a senior cyber-security adviser at several Israeli government ministries
While Doha is allowing Hamas to use its technology to fight Israel, it’s their own cyber-security the leaders of Qatar are worried about. For the Qataris, the war between Israel and Hamas is a proving ground to see how their investments in cyber systems have paid of — Qatar is very worried that one of its Gulf rivals — specifically Saudi Arabia — will use technology to attack it, and Qatar spends a great deal of money each year on shoring up its cyber-technology Link to Original Source