Heartbleed Bug Causes Serious Security Issue for Everyone

Heartbleed LogoOn Monday, April 7th a very serious internet security bug was discovered. This bug affects nearly two-thirds of all internet websites. The bug is called Heartbleed and it causes a vulnerability in the OpenSSL cryptographic library.

Everyone should know what the Heartbleed bug is, how it affects them, and what they need to do about it.

How bad is the Heartbleed bug?

Heartbleed is being considered one of the Internet’s biggest security threats since it has been around for two years, but it was only recently discovered.

Continue reading Heartbleed Bug Causes Serious Security Issue for Everyone

Charlotte, NC Potentially Getting Google Fiber

Current and potential Google Fiber cities
Current and potential Google Fiber cities

Currently, Google Fiber is only available in Kansas City, Kansas, Kansas City, Missouri and Provo Utah, and will be available in Austin, Texas later this year. The exciting news in that Google is looking at bringing their Google Fiber internet to Charlotte, NC!

Google will work side-by-side with city leaders on a two-part joint planning process to evaluate whether they can bring Google Fiber to the Charlotte area. Google will work closely with Continue reading Charlotte, NC Potentially Getting Google Fiber

The Internet of Things is Scary

The Internet of Things. We are headed in that direction. In some ways, we are already there. What really scares me is that one day a hacker may hack into my fridge and cause my milk to spoil.

In computing, the Internet of Things (also known as the Internet of Objects) refers to the networked interconnection of everyday objects.
source

spoiled milk glass
looks yummy, huh?

Cell phone carriers team up to cut down on stolen cell phone market

-source

In an effort to deter cell phone theft, U.S. wireless carriers have made a first step towards “a joint ‘blacklist’ database of identifying information about cell phones reported lost or stolen”. Now, cell phone companies check phones against the database before reactivating phones. Before this joint action, carriers would suspend the service on a phone after was reported as lost or stolen; this phone could still be reactivated by a thief on a new account. According to Chris Guttman-McCabe, vice president of regulatory affairs for CTIA, “the point of the blacklist database is to dry up the aftermarket for stolen phones. If you can’t reactivate a stolen phone, it’s just a worthless hunk of plastic and metal.” [1]

Cell phone theft is common because many users will leave them laying around and not keep a close eye on them. One the device has been stolen, Continue reading Cell phone carriers team up to cut down on stolen cell phone market

LG Scares the Crap Out of People in an Elevator to Show Off Its Monitors

LG has introduced this video of people getting a big scare thanks to the company’s high-res monitors.

To show off just how life-like the picture on its monitors can be, the company re-fitted the bottom of an elevator with the screens. The brand then recorded people’s reactions as the monitors — screens pointed up — displayed what looked like the bottom of the elevator floor dropping out. True, you could probably do that with a lot of monitors, but LG thought of it first. –source

Lining up a week before the iPhone 5 release

Jessica Mellow in the iPhone 5 waiting line.
(Credit: Greg Sandoval)

People have already begun to line up outside of the Cube, Apple’s 5th Avenue store. They have been there since Friday afternoon—one week before the release data for the iPhone 5. These people are sitting and sleeping out on the sidewalk in front of the store. Many will come to line up so they can buy an iPhone 5 on the very first day; however, some people do not just line up to buy the latest iPhone. People like Hazem Sayed and Jessica Mellow also camp out in line to promote or market something when interviewers come by. Sayed desires to get publicity for a software application. In addition to waiting in line to get an iPhone, Mellow camped out last October before the release of the iPhone 4s to promote a company. [1]

When it comes to Apple releasing new products, people can act strangely. Even Apple’s co-founder Steve Wozniak lines up to wait for a device. While waiting, he chats with Apple fans and signs their iPhones. Wozniak must love the experience because he “could certainly buy the product before it come[s] out”. Some will try to sell their spot in line; however, they have Continue reading Lining up a week before the iPhone 5 release

Hacker Group Steals Millions of Apple Device ID’s

source

AntiSec, short for anti-security, claims they stole 12 million Apple iOS device Unique Device Identifiers (UDIDs) by breaching FBI security. The group released a million of them on a website. AntiSec alleges they had a computer belonging to a FBI agent to gain access “to a file containing the list of the Apple IDs”. The online posting “did not identify the agent or who the ID numbers belonged to.” [1]

AntiSec said that they chose to only “release a portion of the Apple IDs list to get people’s attention to its claims that the FBI is gathering people’s Apple device details.” In the note that AntiSec posted online, AntiSec said they have learned that people do not pay attention when one says, “hey, FBI is using your device detail.” The AntiSec group claims that a portion of the devices on the list contains names, telephone numbers, addresses, and ZIP codes, but they chose to only reveal Continue reading Hacker Group Steals Millions of Apple Device ID’s