Blog

The Cone of Silence: Apple iPhone Glitch Causes Audio Lockdown for Thousands of Toyotas

June 24, 2014

Toyota, one of the world’s top auto makers, issued an alert to 200 dealers that a software glitch in the Apple iPhone, iPod Touch, and iPod Nano 6G can affect the audio in many of their cars. Upon discovery of this technical issue, Toyota warns that Apple’s operating systems are incompatible with the car’s audio. When used, the iPod displays a “Loading” message, and the USB input for the device is completely unusable, leaving the consumer in unexpected silence.

This software glitch with iPhone and iPad devices, which occurred when the iOS4.1 iTunes software update was released last fall, has already impacted tens of thousands of Toyota’s best-selling models that include the Yaris, Corolla, Prius, and LandCruiser.

Read More

Only a Matter of Weeks Before the World Runs Out of IP Addresses

June 24, 2014

The proclaimed “Father of the Internet,” Google VP Vint Cerf, warns that there won’t be enough IP addresses left to accommodate people and businesses connected via the Internet. What does this mean? The Internet is dependent on an internet protocol called IPv4, and when Cerf first began the experiment, he had no idea that the Internet would reach its capacity. IPv4 enables one computer to communicate with another, and until the next version of the protocol is put in place, the way that we unite over the Web will be seriously compromised.

The Sydney Morning Herald reports that,

Read More

10 New Ways That Computer Hackers Are Breaking into Your Machines

June 24, 2014

An article by io9 (Gawker Media) provides an insider glimpse from the 2011 Chaos Communication Congress in Berlin, which headlined a variety of international hackers, scientists, and high-tech gurus who demonstrated how easy it is to break into an individual’s computer, phone, bank card, and more.

Are PDFs no longer safe? The PDF file is one of the most commonplace formats today, but is one of the easiest to break. In fact, the PDF format is so insecure that a hacker can embed a program inside of it, which you would never be able to see, and enable it to attack your computer.

Read More

High-Tech Traffic Lights Prove Valuable to Thieves

June 24, 2014

Thieves in Johannesburg, South Africa have been racking up thousands in unauthorized charges by making phone calls using stolen SIM cards. But these aren't pick-pockets swiping cell phones from unsuspecting victims. These SIM cards come from a much less expected source--wireless traffic lights.

Read More

The Internet of Things Expanding on Mobile Networks

June 24, 2014

An informative post on the GigaOM blog discusses some significant forecasting recently released by Swedish research group Berg Insight. Looking at the current and future utilization of mobile network traffic, the data seems to indicate that the Internet of Things--including sensors, smart meters, e-book readers and other devices--will constitute a major portion of mobile network data.

Read More
COMMENTS