The Cone of Silence: Apple iPhone Glitch Causes Audio Lockdown for Thousands of Toyotas

By JDavis | 2/10/11 7:33 AM

Toyota, one of the world’s top auto makers, issued an alert to 200 dealers that a software glitch in the Apple iPhone, iPod Touch, and iPod Nano 6G can affect the audio in many of their cars. Upon discovery of this technical issue, Toyota warns that Apple’s operating systems are incompatible with the car’s audio. When used, the iPod displays a “Loading” message, and the USB input for the device is completely unusable, leaving the consumer in unexpected silence.

This software glitch with iPhone and iPad devices, which occurred when the iOS4.1 iTunes software update was released last fall, has already impacted tens of thousands of Toyota’s best-selling models that include the Yaris, Corolla, Prius, and LandCruiser.

Read More >

Only a Matter of Weeks Before the World Runs Out of IP Addresses

By JDavis | 1/27/11 8:20 AM

The proclaimed “Father of the Internet,” Google VP Vint Cerf, warns that there won’t be enough IP addresses left to accommodate people and businesses connected via the Internet. What does this mean? The Internet is dependent on an internet protocol called IPv4, and when Cerf first began the experiment, he had no idea that the Internet would reach its capacity. IPv4 enables one computer to communicate with another, and until the next version of the protocol is put in place, the way that we unite over the Web will be seriously compromised.

The Sydney Morning Herald reports that,

Read More >

10 New Ways That Computer Hackers Are Breaking into Your Machines

By JDavis | 1/24/11 2:16 AM

An article by io9 (Gawker Media) provides an insider glimpse from the 2011 Chaos Communication Congress in Berlin, which headlined a variety of international hackers, scientists, and high-tech gurus who demonstrated how easy it is to break into an individual’s computer, phone, bank card, and more.

Are PDFs no longer safe? The PDF file is one of the most commonplace formats today, but is one of the easiest to break. In fact, the PDF format is so insecure that a hacker can embed a program inside of it, which you would never be able to see, and enable it to attack your computer.

Read More >

High-Tech Traffic Lights Prove Valuable to Thieves

By JDavis | 1/7/11 7:02 AM

Thieves in Johannesburg, South Africa have been racking up thousands in unauthorized charges by making phone calls using stolen SIM cards. But these aren't pick-pockets swiping cell phones from unsuspecting victims. These SIM cards come from a much less expected source--wireless traffic lights.

Read More >

The Internet of Things Expanding on Mobile Networks

By JDavis | 1/4/11 5:35 AM

An informative post on the GigaOM blog discusses some significant forecasting recently released by Swedish research group Berg Insight. Looking at the current and future utilization of mobile network traffic, the data seems to indicate that the Internet of Things--including sensors, smart meters, e-book readers and other devices--will constitute a major portion of mobile network data.

Read More >

"SMS of Death" Could Wreak Havoc on GSM Networks

By JDavis | 12/31/10 5:05 AM

Wired's Threat Level blog recently reported on a demonstration by German researchers of vulnerabilities in common GSM phones that, when exploited--using what the researchers refer to as the "SMS of Death," a maliciously coded text message--could not only shut a phone out of its network, rendering it unusable, but if launched on a large scale could potentially shut down entire networks.

Read More >

VIDEO: Freescale Explores Connected Intelligence

By JDavis | 12/29/10 6:06 AM

In a stunning new video, Freescale Semiconductor offers their vision of the emerging era of connected, smart technology--what they refer to as the "world without PCs."

Read More >

Mocana CEO Adrian Turner Speaks to WSJ On Mobile Security

By JDavis | 12/23/10 4:07 AM

With more and more computing happening on smartphones, the proactive development of security solutions for these devices is critical, in order to prevent the kinds of major attacks from viruses and hackers that have already plagued PCs. And in a recent article, The Wall Street Journal looks at how carriers and hardware makers alike are devoting resources to increasing the security of their smartphone devices, including AT&T's new mobile security lab, staffed by 13 Ph.Ds. Additionally, they spoke to Mocana CEO Adrian Turner about securing devices on the chip level:

Read More >

The Latest Mobile Threat: Exploding Smartphones?

By JDavis | 12/6/10 5:27 AM

We've blogged before about the need to protect today's high-tech smartphones from equally high-tech security threats. But one man's recent experience with his Droid phone makes us wonder if we need to protect ourselves from our phones instead.

Read More >

Mocana Op-ed: Computer Worm Could Multiply San Bruno Type Disasters

By JDavis | 11/8/10 12:21 PM

Citing the recent gas pipeline explosion in San Bruno, CA as well as the Stuxnet worm that has infected industrial control systems worldwide, Mocana CEO Adrian Turner addresses the critical need to secure the Internet of Things in his recent op-ed in the San Jose Mercury News.

Read More >
COMMENTS