Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Privacy

Submission + - Half Of Used Phones Still Contain Personal Info (eweekeurope.co.uk)

jhernik writes: Personal details left on used mobile phones make it easier for ID thieves to access sensitive data

More than half of second-hand mobile phones still contain personal information of the previous owner, posing a risk of identity fraud, CPP has warned.

The study found 247 pieces of personal data stored on handsets and SIM cards purchased from eBay and second-hand electronics shops. The information ranged from credit card numbers to bank account details, photographs, email address and login details to social networking sites like Facebook and Twitter.

According to data security firm CPP, 81 percent of previous owners claim they have wiped personal data from their mobile phones and SIM cards before selling them. However, deleting the information manually is “a process that security experts acknowledge leaves the data intact and retrievable”.

Facebook

Submission + - Facebook Questions EU ‘Right To Be Forgotten (eweekeurope.co.uk) 1

jhernik writes: The EU’s right to be forgotten is not what users actually want from a social network, says Facebook

Facebook has acknowledged online privacy control as a major challenge, but says that the European Union’s proposal to legislate for ‘a right to be forgotten’ runs counter to what people actually want.

Under EU proposals, online citizens could have their information deleted from social sites after a certain time by default, unless they opt to let the sites store it for longer. This is the opposite of what users actually want, according to a senior Facebook executive.

The Courts

Submission + - Apple Sues Amazon Over App Store Trademark (eweekeurope.co.uk)

jhernik writes: As Amazon.com launches Appstore for Android, Apple has sued over alleged infringement of its App Store mark

Apple on Friday filed a lawsuit against Amazon.com over Amazon’s use of the term “Appstore”, arguing it violates Apple’s “App Store” trademark.

Amazon has been using the Appstore name for its developer programme, and on Tuesday launched Appstore for Android, a service selling Android smartphone applications.

Injunction and damages
In its complaint filed on Friday in a federal court for the Northern District of California, Apple demanded an injunction stopping Amazon from using the name as well as unspecified damages.

Submission + - Online Poker Chips Thief Jailed (eweekeurope.co.uk)

jhernik writes: A British hacker who pilfered billions of Zynga’s virtual poker chips faces years behind bars

A 29-year-old gambler from Paignton, Devon, has been sentenced to two years in jail after hacking into an online gambling site and stealing billions of poker chips.

Ashley Mitchell admitted to hacking into the servers of American gaming company Zynga Corporation in 2009 and making off with $12 million (£7.5 million) worth of gambling chips.

Exeter Crown Court’s judge Philip Wassall said the hacker had deliberately “exploited” security weaknesses he had found in Zynga’s website.

“People rely on computer systems,” said Wassall, “Anyone who has managed to get into these systems for their own ends should expect a stiff sentence.”

Gambling addiction
Mitchell was handed a two-year prison sentence for computer misuse and money laundering. In 2009, he broke into Zynga’s main servers and stole the account details of two staff members, before transferring four billion virtual chips to his own account.

Microsoft

Submission + - Despite 2.3mln Downloads IE9 Still Faces Issues (eweekeurope.co.uk)

jhernik writes: "Microsoft claims massive interest in Internet Explorer 9 but long-term dominance challenges lie ahead

Microsoft claims more than 2.35 million downloads of Internet Explorer 9 in the new browser’s first 24 hours of release.

“That is over 27 downloads every second,” Ryan Gavin, senior director for Internet Explorer, wrote in a March 16 posting on The Windows Blog, “or over 240 downloads every nine seconds.” The number of IE9 downloads in 24 hours, apparently, is double that of the IE9 Beta and “four times that of the IE9 RC”."

Security

Submission + - Crooks Target Olympic Games Ticket Buyers (eweekeurope.co.uk)

jhernik writes: "Tickets for the 2012 Olympics went on sale on Tuesday, creating a security dilemma for online ticket buyers

As tickets for the 2012 Olympic Games went on sale on Tuesday, security experts said users should be on their guard for potential cyber-criminals looking to cash in on the event by luring users to fake ticketing websites.

VeriSign Authentication, part of Symantec, on Tuesday released research saying that more than one in ten (11 percent) UK web users have admitted to halting an event ticket purchase because of suspicions over a ticketing site’s authenticity.

Criminal activity
And if that’s the figure in normal times, the Olympics is sure to bring in additional criminal activity, VeriSign Authentication warned."

IBM

Submission + - IBM Funds Glasgow Smarter City Initiative (eweekeurope.co.uk)

jhernik writes: "Big Blue will work with organisations in Glasgow to help find better ways to live, work and play

Glasgow has today become the first UK city to receive funding from the IBM Smarter Cities Challenge initiative.

The grant is designed to provide Glasgow with access to IBM experts, who will analyse and recommend ways the city can use technology to improve efficiency, support growth and deliver better services and levels of citizen engagement.

Financially backed initiative
The Smarter Cities Challenge is awarding a total of $50 million (£31m) worth of technology and services to 100 municipalities worldwide over the next three years.

Glasgow is among 24 cities IBM selected to receive grants this year, based on the cases each made for participating in the challenge. It said the approximate value of each Smarter Cities Challenge grant is equivalent to as much as $400,000, or approximately £250,000."

Microsoft

Submission + - Microsoft’s Patch Tuesday Fixes Windows (eweekeurope.co.uk)

jhernik writes: Microsoft’s latest round of patches includes only one ‘critical’ bug and several ‘important’ flaws

Microsoft’s Patch Tuesday is a relatively minor one, with a single bulletin rated “critical” and two “important”. Affected software includes applications within Windows and Office.

The MS11-015 update, rated “Critical”, patches vulnerabilities in DirectShow, Windows Media Player and Windows Media Centre. In order for an outside entity to exploit said vulnerabilities, the user would need to open a specially crafted Microsoft Digital Video Recording (DVR-MS) file.

Android

Submission + - Google Issues Android Security Patch, After Attack (eweekeurope.co.uk)

jhernik writes: "Tight-lipped Google has finally admitted that DroidDream infected more than 50 apps on the Android Market

Google has removed over 50 malicious apps from its Android Market and issued a security patch, after eventually admitting multiple malware attacks that compromised a number of Android-powered handsets last week.

According to the company, its Android team has also suspended the associated developer accounts and “remotely” deleted the infected apps from affected devices.

“This remote application removal feature is one of many security controls the Android team can use to help protect users from malicious applications,” wrote Android security engineer Rich Cannings on the company’s official mobile blog.

Google believes the attackers were able to acquire only “device-specific” information – IMEI/IMSI, unique codes used to identify mobile devices, and the operating system version detail – but admitted other data could have been accessed"

Networking

Submission + - ISPs Defend ‘Up To’ Broadband Speed Cl (eweekeurope.co.uk)

jhernik writes: "Service providers are scrambling to defend themselves against Ofcom’s criticism of broadband advertising

Internet service providers in Britain are defending their use of the term ‘up to’ in broadband advertising, claiming that every line is different and that basing marketing on ‘average’ speeds could damage the government’s plans for digital inclusion.

The news comes in response to research published by Ofcom earlier this week, which claims that very few consumers are able to get the headline speeds advertised by ISPs. The research revealed that just 14 percent of customers on ‘up to’ 20Mbps services received average download speeds of more than 12Mbps, while 58 percent received 6Mbps or less.

Ofcom is recommending that speeds used in broadband advertising should be based on a Typical Speeds Range (TSR), so consumers have a clearer idea of what speeds to expect, and that the TSR should be given at least equal prominence to any maximum ‘up to’ speed. A maximum speed should only be used if it is achievable in practice by “a material number of consumers”."

Facebook

Submission + - IBM Shows The Two Faces Of Social Media (eweekeurope.co.uk)

jhernik writes: "Social media makes your company all nice and warm inside, and brutally analytic and competitive outside, according to IBM’s Sandy Carter

There are two faces to social media. Inside the company, social media is a nice thing to encourage staff, and make the company a more humane environment. Outside, social media is a hard-nosed analytic tool to capture and manipulate customers.

That, more or less, is what I took away from a conversation with IBM’s top social media guru, and while she might dispute the latter point, I think it’s a fair summary of what she said – and both sides of social media roundly contradict the opinion of eWEEK Europe readers, who said in a recent poll that social media is a waste of time."

Piracy

Submission + - Encryption’s Weak Point Exploited By Data Sc (eweekeurope.co.uk)

jhernik writes: "Pervasive Data Scraping attacks encrypted data at its weak point and is increasingly being used by hackers

Encrypted data is not the security panacea that it is popularly believed to be, according to Ed Skoudis, a founder of InGuardians and its senior security consultant.

It is no secret that encrypted data is revealed as plain text at various stages of its lifecycle and especially when it is called into an application. Hackers are now capable of accessing the data and stealing it through a process known as “pervasive memory scraping”, he said.
Part Of Metasploit’s Expanding Toolkit

Skoudis used this form of attack as one of his topics when pointing out the most threatening attack techniques for 2011 to attendees at the RSA Conference last week. Once a hacker has gained access to a system, he said, they will try a cocktail of attacks to grab information. A good example was the HBGary Federal attack which used SQL injection, rainbow tables to decrypt hashed passwords, simple brute force password dictionaries – basically anything that might reveal something useful."

Google

Submission + - Google Launches New Zealand Earthquake Website (eweekeurope.co.uk)

jhernik writes: "Google has created a website to help people locate survivors of the Christchurch earthquake

With reports that up to 150 people are feared dead in the earthquake that hit Christchurch in New Zealand, search engine giant Google has set up a website to help people locate survivors.

As of Tuesday afternoon, 65 people are confirmed dead, but there it has been suggested that over 100 people are unaccounted for, with more than 200 people trapped in collapsed buildings.

The earthquake measured 6.3 on the Richter scale and has been described as the worst earthquake to hit New Zealand in 80 years. It struck in the middle of the day, where local time was 12.51pm Tuesday (23:51 GMT Monday in the UK)."

Privacy

Submission + - Cyber War Mass Hysteria Is Hindering Security (eweekeurope.co.uk)

jhernik writes: Cyber-war stories from the defence industry may be a distraction, pundits told the RSA conference

nternational cyber threat initiatives are in danger of becoming overblown, the US government’s security chief told the RSA Conference in San Francisco.

” Cyber war is a terrible metaphor,” said the US government’s cybersecurity czar Howard Schmidt. Don’t make it something it’s not.” Internet attacks from hackers, spies and terrorist groups deserves serious attention, he said, but this should not be “to the extent of mass hysteria”.
Cyber-war hype is a distraction

Other thinkers seemed agreed on this. Bruce Schneier, security chief at the BT Group, said that this mass hysteria is being stoked up by government initiatives creating the impression of a “cyber arms race”. He does not believe that a cyber war is raging but that heavy-handed responses to issues such as the Stuxnet attacks are creating that impression.

News

Submission + - Samsung Galaxy S II: First Look (eweekeurope.co.uk)

jhernik writes: Samsung unveiled its Galaxy S II over the weekend, during the run-up to Mobile World Congress in Barcelona, touting it as “the world’s thinnest smartphone”.

On the second day of the show, eWEEK Europe paid a visit to Samsung’s stand, to get some hands-on time with the device and see if it lived up to the hype. The verdict: we liked what we saw.

Sleek and well designed
At less that 8.5mm thick and weighing in at just 116g, the Galaxy S II is a very sleek device, and surprisingly comfortable to hold. With a dual-core 1GHz processor and generous 4.3-inch Super AMOLED Plus display, the graphics appear particularly bright and colourful.

With this latest addition to the Galaxy S range, Samsung has opted for Android 2.3 (Gingerbread), which the company claims offers a faster, more user-friendly experience.

The Galaxy S II comes with version 4.0 of TouchWiz, Samsung’s proprietary Android user interface. Content on the device is organised into four new ‘Hubs’ – the Readers Hub, Music Hub, Social Hub and Game Hub – designed to increase user interactivity. Users can organise their media files as they wish, for example searching music tracks, listening to previews and creating playlists.

The Social Hub also allows users to combine their contact lists from different sources such as GTalk, Yahoo and Windows Live, and categorise them into groups. In this way they can send group updates to friends about a heavy night on the town without having to suffer the dispproval of work colleagues the following day.

The Readers Hub seems particularly intuitive, and the large screen makes reading text a relatively pleasant experience. Texts are divided into news, books and magazines, and allow users to access media from all over the world. They can even access a newspaper before it is fully downloaded, and the file will continue to download as the user reads.

Slashdot Top Deals

The key elements in human thinking are not numbers but labels of fuzzy sets. -- L. Zadeh

Working...