French telecom Iliad reportedly bid to buy T-Mobile, in an effort to counter a potential Sprint-T-Mobile merger that neither U.S. carrier will admit is being negotiated. The Wall Street Journal stated that people familiar with the matter said that Iliad views the deal as a “one-time opportunity” to enter the U.S. wireless market. While it’s […]
The Internet of Things offers consumers the opportunity to have all manner of devices connected to the Internet. However, a new study from Hewlett-Packard has pointed out that with the great power to connect also comes great risks. The company found a host of common vulnerabilities across 10 major IoT devices that it scanned for […]
Black Hat USA, Fake ID, Google, Bluebox Security, Android, Adobe, Hewlett-Packard, DefCon, Fortify on Demand, HP Fortify, Cisco, Application Centric Infrastructure, Google Drive, email, iOS, Apple, App Store, Google Play, At the 2013 Black Hat USA conference, Jeff Forristal revealed the Master Key vulnerability impacting millions of Android users. For this year’s conference, Forristal is […]
Samsung is delaying the launch of the Samsung Z, its first smartphone to run the Tizen operating system. Samsung issued a statement saying that it needed to “further enhance” the OS. Samsung was originally scheduled to release the phone in Russia this quarter before introducing it in additional markets. So far the company has offered […]
The Amazon Fire smartphone, which went on sale on July 25, comes with advanced features such as Dynamic Perspective, which is generated by four low-power special cameras, four infrared LEDs, a dedicated processor, real-time computer-vision algorithms and a high-performing graphics-rendering engine. While this feature is certainly interesting, it is also very difficult to fix. The […]
Apple, iOS, hackers, mobile devices, packet sniffer, National Security Agency, Tim Cook, iPhone, iPhone 5C, Oracle, Linux 7, Red Hat Enterprise Linux 7, XFS file system, Tails Linux, Amnesic Incognito Live System, Exodus Intelligence, Invisible Internet Project, Apple has denied a security researcher’s claim that its iOS devices collect a lot of personal data without […]
Despite the fact that all signs point to Apple releasing the new iPhone in September, the company announced it sold 35.2 million units of current and older iPhone models in the June quarter. Apple also saw revenue of $37.4 billion, a net profit of $7.4 billion and its earnings per share grow to their highest […]
Blackberry officials have seemed pretty unconcerned about leaks regarding its upcoming Passport smartphone—to the point that CEO John Chen has cracked jokes about the fact that so much information is available online about the phone. Now, there’s a video demonstration of the new phone online. The video shows that the phone has a wide, three-row […]
Activist investor Elliott Management made headlines earlier this year by pressing Juniper Networks and Riverbed Technology to make changes in how they operate. Now, it is preparing to push data storage giant EMC to spin off virtualization pioneer VMware. The Wall Street Journal reported that Elliott Management has acquired more than $1 billion worth of […]
Independent security consultant Jesus Molina will expose the risks of hotel automation systems at the upcoming Black Hat security conference that starts Aug. 5. One hotel he visited was the St. Regis Shen Zhen hotel in China. While there, he noticed that there is an Apple iPad that hotel guests can use to control various […]