Droid fragmentation visually represented, mind blown

Android Malware

Android Malware

There are so many different Droid phones and tablets, each running a custom and more importantly, incompatible, version of Google’s Android operating system that there is an official name for it: fragmendroid”. The is a very important concept to understand because these devices do not receive security or operating system updates past the first month or two of sales (if at all), making most if not all their customers insecure again hacker attacks and identity theft. Considering that Droid comprises 99% of all mobile malware, Droid owners have a target on their back with little to no chance of getting a security update from anyone. Continue reading Droid fragmentation visually represented, mind blown

Droid apps so insecure that they can attack each other, steal passwords, credit-card numbers, photos

Android Malware

Android Malware

Here we go again. Droid (Google’s Android operating system for phones and tablets) which is based on Linux is not a secure product. Linux cannot ever, by definition, be secure because of its haphazard management of how they define open source. Thats fine if you are a penniless college student thats cobbling together computers and need to scrimp regardless of outcome. This leads to a free environment where you can do whatever you feel like it but it also means that the OS is unstable, full of security holes and ridden with malware. This acceptable for the starving college student because they can’t do any better and because they don’t have any credit cards, bank accounts, retirement accounts, etc. that can be attacked and robbed. If you’re an adult, with valuable assets that you want to keep, then read on. Continue reading Droid apps so insecure that they can attack each other, steal passwords, credit-card numbers, photos

Blackphone, the allegedly “secure” Droid phone hacked in under five minutes

Android Malware

Android Malware

PrivatOS, the modified version of Android 4.2 Jelly Bean (Droid OS), for the Blackphone, that promised a secure smartphone experience, superior to all other smartphones, has been hacked in less than 5 minutes at he DefCon Conference by @TeamAndIRC. Not only is this embarrassing, it proves that despite all the hype about Android  security, in reality Droid security is so poor that even the most allegedly highly secure version, PrivatOS, is so inherently insecure that it was immediately defeated in its very first security challenge. Continue reading Blackphone, the allegedly “secure” Droid phone hacked in under five minutes

AT&T Brings U-verse High-Speed Internet, TV And Voice Services To 10,400 Additional Customer Locations In San Francisco Area

AT&T

AT&T

Velocity IP Plan Makes Award-Winning U-verse Services Available to More Customers in June

SAN FRANCISCO, Aug. 5, 2014 /PRNewswire/ – Thousands more San Francisco-area residents have a new choice for their television and broadband, thanks to wider availability of AT&T U-verse® services. AT&T* today announced that U-verse expanded to about 10,400 local customer locations in June. More than 122,000 customer locations were added across AT&T’s wireline territory in the same month. Continue reading AT&T Brings U-verse High-Speed Internet, TV And Voice Services To 10,400 Additional Customer Locations In San Francisco Area

Comcast customer service scam blown wide open

Comcast

Comcast

Adrianne Jeffries is the new people’s hero, her series on The Verge, titled Comcast Confessions picks up where Ryan Block‘s viral YouTube video of his horrifying Comcast experience left off. Continue reading Comcast customer service scam blown wide open

NSA cannot turn your phone on to listen to you

Edward Snowden -Whistleblower

Edward Snowden -Whistleblower

Edwards Snowden’s interview was quite revealing, verifying our concerns about NSA spying in the US and even more important is the meme that was birthed during that interview: “The NSA Can Turn Your Phone On, Even If You Turned It Off’. No. if its an iPhone, they can’t. It was misspoken or possibly Edward did not complete his response. Either way, this is not true in the way that you think it is. Continue reading NSA cannot turn your phone on to listen to you

Verizon admits throttling Unlimited Plan users

Verizon

Verizon

Verizon has publicly admitted that they are throttling heavy data users with unlimited plans. This is not a shocker but is completely unacceptable. These consumers paid for Unlimited Data and they should get it at all times. There really is no excuse for this behavior, we knew before cell phones gained the ability to access the internet that our world was headed for constantly increasing data demands in the future, so Verizon should have always planned their network capacity to commodity what they sold to these users. It really does not matter that their cell towers are overloaded, that is their fault for not doing the appropriate capacity planning or network upgrades, or both. Continue reading Verizon admits throttling Unlimited Plan users

Jonathan Zdziarski backpedals, takes back claim of Apple backdoors in iPhone

NSA by EFF

NSA by EFF

Jonathan Zdziarski made headlines recently by creating an illusion that Apple had intentionally installed backdoors into iOS for the NSA to use to spy on everyone. The problem is that never showed any evidence of this happening, never produced any independent verification of any connection between Apple and the NSA, but the media once against joined in on the mudslinging and smeared Apple, all without one bit of fact checking. Now Jonathan Zdziarski is backpedalling and clearly states that the now does not allege any NSA backdoors or cooperation between NSA and Apple. Continue reading Jonathan Zdziarski backpedals, takes back claim of Apple backdoors in iPhone

Yosemite Beta Flash Drive Installer

OS X Yosemite Beta

OS X Yosemite Beta

By now you might be tempted to install the OS X 10.10 Yosemite Beta on your Mac, as I have already done. The download took a long time on the first day of availability but the initial mad rush is over and downloads are proceeding smoothing now, but does this mean that you should install this software. This is a very valid question since this is the very first time that a public Beta of OS X has become available to the general public. Continue reading Yosemite Beta Flash Drive Installer

TOR is now in Russian Government’s crosshairs

TOR

TOR

TOR’s days appear numbered. Not only is the NSA rumored to be working on ways to easily crack TOR, they have already put up dummy TOR routes that intercept traffic, and in addition, researchers have disclosed that entry and exit traffic on TOR is now routinely monitored is unencrypted and is easily read, but now we have news that TOR has been targeted by the Russian Government. Continue reading TOR is now in Russian Government’s crosshairs