Parties to a transaction cannot deny the transaction occurred.
Unless your digital camera or camera equipped cellphone is more than fifteen (15) years old, the chances are good that any pictures taken with that device contain metadata; which describes the (who, what, where, when and how) conditions under which the picture was taken. The metadata is stored with the picture in an image file, and goes everywhere the file is copied, uploaded or downloaded. But as Catherine (Cat) Schwartz learned in 2003, certain kinds of image file metadata can be rather embarrassing. At the completion of a three (3) month qualitative risk assessment, The Assurer answers the question, “How dangerous is image file metadata?” Some of the more interesting results are that high risk probability for the iPhone 4 decreased 11.5% from the 3gs, while the amount of metadata created by the Droid 2 increased by 16% over the original Motorola Droid…
The U.S. Cyber Command (USCYBERCOM) recently sponsored a contest with Wired.com, challenging people to figure out the code “9ec4c12949a4f31474f299058ce2b22a” that is embedded in their official logo. Within hours, Sean-Paul Correll of Panda Security, determined that the “secret code” was in fact the MD5 hash of the USCYBERCOM’s mission statement.
My Motorola Droid finally received the much anticipated Over The Air (OTA) software update (version 2.1-update1) from Verizon Wireless. So, is the Verizon Droid pattern lock bypass fixed? Yes. But there is one little caveat…
For users who allow Windows to automatically download and install changes on their computers, they will not be affected. But if you believe that your explicit knowledge and consent is required, in order to affect changes to your computer; Microsoft has declared Information Warfare on you.
On February 11th, Microsoft General Manager Joe Williams, discussed the upcoming Windows Activation Technologies Update for Windows 7. While this is considered an “important update,” he went on to “…stress that the Update is voluntary.” So what did Joe mean by important update, but voluntary? I found out this morning.
As smartphones become more popular, the use of mobile Augmented Reality (AR) applications has increased. But there lurks a “dark side” to Augmented Reality. One that is not being publicly discussed, that affects us on many personal, civil, criminal, and national security levels.
It has been observed that, as long as a Bluetooth device is paired, AND CONNECTED, to the Droid; the pattern lock bypass vulnerability does not occur.
One of the interesting features of Android smart-phones is the pattern lock screen. Instead of a four digit PIN, the phone is secured with a “pattern” of four to nine dots, arranged in a 3 by 3 square. This results in a possible 3,024 to 362,880 different combinations. Sounds pretty secure, right?
How can you be certain the person you are exchanging texts with, is who you think it is? The caller ID and that cute little contact picture, only tell you whose phone sent the message! Unlike phone calls there is no heuristic method by which you can be sure of who is on the other side of the keypad.
They say that “On the Internet, nobody knows you’re a dog.” But what happens if your ex-boyfriend is a dog, who is hounding you, in an effort to sully your online reputation?