Forgot your password?
typodupeerror
Communications

Legal Spying Via the Cell Phone System 139

An anonymous reader writes "Two researchers say they have found a way to exploit weaknesses in the mobile telecom system to legally spy on people by figuring out the private cell phone number of anyone they want, tracking their whereabouts, and listening to their voice mail."

Submission + - Legal spying via the cell phone system (cnet.com)

An anonymous reader writes: Two researchers say they have found a way to exploit weaknesses in the mobile telecom system to legally spy on people by figuring out the private cell phone number of anyone they want, tracking their whereabouts, and listening to their voice mail.
Microsoft

Microsoft's Urgent Patch Precedes Black Hat Session 232

Julie188 writes "Mystery solved! Microsoft's latest emergency out-of-band patch was weird beyond belief. A notice was sent to journalists and researchers late Friday evening that the patch was coming Tuesday, but Microsoft refused to explain the flaw and even put a cone of silence around researchers who would have otherwise talked about it. But finally, one researcher broke ranks and explained that the patch was caused by a flaw introduced in Microsoft's own development tools. This flaw was also the source of the emergency ActiveX patch, which took about 18 months to complete and which supposedly fixed the problem by turning off ActiveX (setting a 'killbit' on the control). Researchers at Black Hat on Wednesday will be demonstrating how to override the killbit controls and get access to vulnerabilities supposedly stopped with a killbit. What's really scary is that Microsoft has issued 175 killbits fixes so far."
Portables

Ericsson and Intel Offer Remote Notebook Lockdown 105

MojoKid writes "Ericsson and Intel have announced that they are collaborating on a way to keep your laptop's contents safe when your laptop goes MIA. Using Intel's Anti-Theft Technology — PC Protection (Intel AT-p) and Ericsson's Mobile Broadband (HSPA) modules, lost or stolen laptops can be remotely locked down. Similar to Lenovo's recently announced Lockdown Now PC technology, the Ericsson-Intel technology uses SMS messages sent directly to a laptop's mobile broadband chip. Once the chip receives the lock-down message, it passes it to the Intel AT-p function, which is integrated into Intel's Centrino 2 with vPro technology platform. Unlike Lenovo's anti-theft solution, the Ericsson module includes GPS functionality as well."
Cellphones

Security Flaw In Android Web Browser 59

r writes "The New York Times reports on a security flaw discovered in the new Android phones. The article is light on details, but it hints at a security hole in the browser, allowing for trojans to install themselves in the same security partition as the browser: 'The risk in the Google design, according to Mr. Miller, who is a principal security analyst at Independent Security Evaluators in Baltimore, lies in the danger from within the Web browser partition in the phone. It would be possible, for example, for an intruder to install software that would capture keystrokes entered by the user when surfing to other Web sites. That would make it possible to steal identity information or passwords.'"
The Internet

Al D'Amato: Online Freedom Fighter 63

netbuzz writes "Former New York Sen. Al D'Amato is giving lobbying a good name by providing an insider's political savvy to a fledgling group called the Poker Players Alliance, which is attempting to overturn the federal prohibition against online poker. The New York Times has the details, including an enlightening look at D'Amato's passion for the game. As with all forms of gambling, online poker should be legal, regulated and taxed. Go, Al. "
Businesses

Can Apple Penetrate the Corporation? 500

coondoggie sends us a NetworkWorld story on the prospects for Apple gaining market share in the corporation. A number of factors are helping to catch the eye of those responsible for upgrading desktops and servers, the article claims: "Apple's shift to the Intel architecture; the inclusion of infrastructure and interoperability hooks, such as directory services, in the Mac OS X Server; dual-boot capabilities; clustering and storage technology; third-party virtualization software; and comparison shopping, which is being fostered by migration costs and hardware overhauls associated with Microsoft's Vista." On this last point, one network admin is quoted: "The changes in Vista are significant enough that we think we can absorb the change going to Macs just as easily as going to Vista."

Comment Re:SPF! (Score 1) 119

Doesn't Gmail require users to verify they can receive E-mail on an account before they are able to send with that account? Or is there a way around that I'm not aware of?
Privacy

Neuroscience, Psychology Eroding Idea of Free Will 867

pragueexpat writes "Do we have free will? Possibly not, according to an article in the new issue of the Economist. Entitled 'Free to choose?', the piece examines new discoveries in the fields of neuroscience and psychology that may be forcing us to re-examine the concept of free will. The specifically cite a man with paedophilic tendencies who was cured when his brain tumor was removed. 'Who then was the child abuser?', they ask. The predictable conclusion of this train of thought, of course, leads us to efforts by Britain: 'At the moment, the criminal law--in the West, at least--is based on the idea that the criminal exercised a choice: no choice, no criminal. The British government, though, is seeking to change the law in order to lock up people with personality disorders that are thought to make them likely to commit crimes, before any crime is committed.'"

Slashdot Top Deals

"A great many people think they are thinking when they are merely rearranging their prejudices." -- William James

Working...