Apple Has Finally Stuck A Dagger Into SMS.

Comments Off on Apple Has Finally Stuck A Dagger Into SMS.

By MG Siegler
Techcrunch.com

Now that the WWDC keynote is over and I’ve had a little bit of time to reflect, I’ve been thinking about what excited me the most from today’s announcements. The list is long, no doubt. But I think I’m going to have to go with something that surprised me – while at the same time making me look smarter than perhaps I really am. (Again, just perhaps.) iMessages.

As one of the core new features highlighted today in iOS 5, iMessages has one purpose: to kill SMS. That is, traditional carrier-controlled text messages. iMessages will do this by replacing SMS with a service that Apple is in control of across all of their iOS devices. And here’s the real death blow: iMessages will be completely free.

Click here to read more.. »

Posted on June 8th 2011 in Cell Phones, Internet, Macintosh, Technology

Secret Meanings Behind Punctuation in Text Messages

Comments Off on Secret Meanings Behind Punctuation in Text Messages

By Guest Blogger
Wired.com

Texting removes the vocal cues we once used to overanalyze if someone liked us. Now we have to look at 140 to 160 characters — and with less raw data to work with, our overanalyzing hits a whole different level of insanity. One key aspect of that insanity is reading way too much into every nuance of every text message, especially punctuation. So … here are the clues his/her punctuation choices are sending (and also the clues you’re sending right back).

1. Period.

Meaning: You don’t want to keep going back and forth all night.

In texting, you don’t have to end a sentence with any punctuation. It’s totally acceptable to just let it dangle. So using a period gives a certain air of finality to a statement. Compare:

I’m heading out to the party now.

I’m heading out to the party now

In the first one, the meaning is clear: we’ve had our back-and-forth over text, but I have plans, and they do not include continuing this conversation — period. In the second one, without the period, it feels much more open-ended — I’m heading out to the party now but who knows what I’m doing later, and you just might be part of it. Periods end things. Leaving one out keeps things open.

2. Exclamation Point!

Meaning: Something between playful and desperate, depending on usage.

The exclamation point is the most valuable punctuation mark you have in your arsenal, but it’s also the most dangerous. When used properly, a single exclamation point can set a light tone, convey excitement, and even demonstrate interest. Compare:

Sounds good. Not sure if we’re going but I might see you at the party. If you leave, let me know

Sounds good. Not sure if we’re going but I might see you at the party. If you leave, let me know!

The person in the second example seems far, far more interested in getting together … and did it without changing a word.

Click here to read more.. »

Posted on June 8th 2011 in Cell Phones, Entertainment

One in four US hackers ‘is an FBI informer’

Comments Off on One in four US hackers ‘is an FBI informer’

By Ed Pilkington
Guardian.co.uk

The underground world of computer hackers has been so thoroughly infiltrated in the US by the FBI and secret service that it is now riddled with paranoia and mistrust, with an estimated one in four hackers secretly informing on their peers, a Guardian investigation has established.

Cyber policing units have had such success in forcing online criminals to co-operate with their investigations through the threat of long prison sentences that they have managed to create an army of informants deep inside the hacking community.

In some cases, popular illegal forums used by cyber criminals as marketplaces for stolen identities and credit card numbers have been run by hacker turncoats acting as FBI moles. In others, undercover FBI agents posing as “carders” – hackers specialising in ID theft – have themselves taken over the management of crime forums, using the intelligence gathered to put dozens of people behind bars.

So ubiquitous has the FBI informant network become that Eric Corley, who publishes the hacker quarterly, 2600, has estimated that 25% of hackers in the US may have been recruited by the federal authorities to be their eyes and ears. “Owing to the harsh penalties involved and the relative inexperience with the law that many hackers have, they are rather susceptible to intimidation,” Corley told the Guardian.

“It makes for very tense relationships,” said John Young, who runs Cryptome, a website depository for secret documents along the lines of WikiLeaks. “There are dozens and dozens of hackers who have been shopped by people they thought they trusted.”

Click here to read more.. »

Posted on June 7th 2011 in Technology, Web Site

Sorry Facebook, Apple’s iOS 5 Has Team Up With Twitter

Comments Off on Sorry Facebook, Apple’s iOS 5 Has Team Up With Twitter

By Bianco Bosker
Huffingtonpost.com

Apple has revamped the software that powers its iPhone, iPad and iPod touch to include, for the first time ever, a major integration with a social network — but not the one you might think.

For the social media features in the new version of its iOS operating system, Apple, the world’s most valuable technology company, did not partner with Facebook, the world’s largest social networking site.

Instead, the Cupertino company opted to team up with Twitter, a micro-blogging service that has around half as many members as Facebook and remains far from attaining its mainstream status.

Twitter will be built in to iOS 5 and integrated across multiple Apple applications. By signing into Twitter just once, users will be able to instantly send tweets containing photos, videos, links and more.

Experts suggest the Facebook snub stemmed from Apple’s desire to maintain control over the user experience and preserve its direct relationship with its customers, aims that clashed with Facebook’s own ambitions.

Click here to read more.. »

Posted on June 7th 2011 in Computers, Macintosh, Technology

Malware for Smartphones

Comments Off on Malware for Smartphones

By Troy Gill
zdnet.com

Cyber crooks are infecting popular mobile platforms through malicious applications and, unfortunately, no mobile platform is immune from the destruction it can cause. According to McAfee’s report, Symbian remains the most targeted mobile platform, though vulnerabilities in both the Android and Apple IOS should not be overlooked.

Android’s open source software is something that gives the platform great appeal, but it is also the basis of its vulnerability. Users may enjoy the freedom to acquire apps both inside and outside the Android Market, but it doesn’t come without risk. The Android Market allows developers to upload apps without first running through an established screening process like one that you might find at Apple’s App Store or when using RIM’s application for BlackBerry. As a result, Google detected more than 50 malicious apps within the Android Market, downloaded to approximately 260,000 Android mobile devices. (Google later remedied the infections remotely via an auto installed software update.)

Click here to read more.. »

Posted on May 26th 2011 in Cell Phones, Internet, Security

Feds Demand Firefox Remove Add-On

Comments Off on Feds Demand Firefox Remove Add-On

By David Kravets
Wired.com

The Department of Homeland Security has requested that Mozilla, the maker of the Firefox browser, remove an add-on that allows web surfers to access websites whose domain names were seized by the government for copyright infringement, Mozilla’s lawyer said Thursday.

But Mozilla did not remove the MafiaaFire add-on, and instead has demanded the government explain why it should. Two weeks have passed, and the government has not responded to Mozilla’s questions, including whether the government considers the add-on unlawful and whether Mozilla is “legally obligated” to remove it. The DHS has also not provided the organization with a court order requiring its removal, the lawyer said.

Click here to read more.. »

Posted on May 5th 2011 in Internet, Technologies, Technology

FBI Hijacks ‘Coreflood’ Botnet, Sends Kill Signal

Comments Off on FBI Hijacks ‘Coreflood’ Botnet, Sends Kill Signal

By Kim Zetter
Wired.com

In an extraordinary intervention, the Justice Department has sought and won permission from a federal judge to seize control of a massive criminal botnet comprised of millions of private computers, and deliver a command to those computers to disable the malicious software.

The request, filed Tuesday under seal in the U.S. District Court in Connecticut, sought a temporary restraining order to allow the non-profit Internet Systems Consortium to swap out command-and-control servers that were communicating with machines infected with Coreflood — malicious software used by computer criminals to loot victims’ bank accounts.

According to the filing, ISC, under law enforcement supervision, planned to replace the servers with servers that it controlled, then collect the IP addresses of all infected machines communicating with the criminal servers, and send a remote “stop” command to infected machines to disable the Coreflood malware operating on them.

A Justice Department spokeswoman confirmed that the takeover occurred Tuesday evening, and the shutdown command was sent to infected computers based in the U.S.

“Under the authority granted by the court in the TRO, we have responded to requests from infected computers in the United States with a command that temporarily stops the malware from running on the infected computers,” wrote spokeswoman Laura Sweeney in an e-mail.

Click here to read more.. »

Posted on April 14th 2011 in Hacks, Security, Technology

iTunes Hack Allows Streaming to Any Device

Comments Off on iTunes Hack Allows Streaming to Any Device

By Charlie Sorrel
http://www.wired.com

Programmer James Laird wanted to help his girlfriend stream her iTunes music in her new house, so he hacked away at Apple’s private key for streaming music, reverse-engineered the script, and made it available to the public.

Laird calls his open source Perl script Shairport, which lets hardware and software receive AirTunes music from iTunes.

Apple uses a public-key encryption scheme for AirTunes streaming. This lets anyone encrypt and stream audio to the AirPort Express (or other compatible device), but iTunes would only stream to Apple devices. Now, with Shairport, iTunes can be tricked into streaming audio to anything at all.

Click here to read more.. »

Posted on April 12th 2011 in Audio, Hacks, Technology

Web-privacy concerns, are we safe?

No Comments »

Judge Lets Sony Unmask Visitors to PS3-Jailbreaking Site
By David Kravets

A federal magistrate is granting Sony the right to acquire the internet IP addresses of anybody who has visited PlayStation 3 hacker George Hotz’s website from January of 2009 to the present.

Thursday’s decision by Magistrate Joseph Spero to allow Sony to subpoena Hotz’s web provider (.pdf) raises a host of web-privacy concerns.

Respected for his iPhone hacks and now the PlayStation 3 jailbreak, Hotz is accused of breaching the Digital Millennium Copyright Act and other laws after he published an encryption key and software tools on his website that allow Playstation owners to gain complete control of their consoles from the firmware on up.

Click here to read more.. »

Posted on March 25th 2011 in Hacks, Technology

iPad cracked? iPhone hacker thinks he’s done it.

No Comments »

By Brian X. Chen

George Hotz, famously known as the first hacker to unlock the iPhone, says he’s done it again. The whiz kid on Thursday evening said he had cooked up a new hack for all iPhone OS devices, and he’s betting it will work on the iPad, too.

When the hack is released (Hotz won’t disclose a release date), it should be as simple to use as Blackra1n, Hotz’s one-click solution to jailbreak current iPhones, he said.

“It is completely untethered, works on all current tethered models (ipt2, 3gs, ipt3), and will probably work on iPad too,” Hotz said in his blog post.

Click here to read more.. »

Posted on March 25th 2011 in Cell Phones, Hacks, Technology