In an about-face, Uber shows it's #TimesUp for forced arbitration that kept claims out of court. Still, class-action suits are off-limits.
Researchers said a team of hackers tied to North Korea recently managed to get the Google Play market to host at least three Android apps designed to surreptitiously steal personal information from defectors of the isolated nation.
The three apps first appeared in the official Android marketplace in January and weren’t removed until March when Google was privately notified. That’s according to a blog post published Thursday by researchers from security company McAfee. Two apps masqueraded as security apps, and a third purported to provide information about food ingredients. Hidden functions caused them to steal device information and allow them to receive additional executable code that stole personal photos, contact lists, and text messages.
The apps were spread to selected individuals, in many cases by contacting them over Facebook. The apps had about 100 downloads when Google removed them. Nation-operated espionage campaigns frequently infect a small number of carefully selected targets and keep the number small in an attempt to remain undetected. Thursday’s report is the latest to document malicious apps that bypassed Google filters designed to keep bad wares out of the Play market.
The tests begin Thursday in the US, Mexico and Brazil.
New pictures from LEGUS survey will help boffins understand how stars form
Astronomers have published the largest ultra-violet survey of the local universe, showcasing 50 active galaxies in high resolution using NASA’s Hubble Space Telescope.…
Securus wasted its money: the data was just sitting there
Updated The parade of bad privacy news this week has managed to get even worse, as one of the companies associated with the selling of phone locations for cash scandal was subject to a publicly exploitable bug.…
As pre-E3 hype ramps up, fans have reason to anticipate new sequels and entries from their favorite game series. Today brings a surprise announcement of a brand-new Halo game—the kind of news you might expect as an E3-keynote surprise.
There's almost certainly a reason this news is coming today as opposed to the middle of the E3 rush: it's not a traditional Halo first-person shooter, and it's not even coming to console. The new Halo: Fireteam Raven is an arcade-exclusive light-gun shooter, coming "this summer" exclusively to Dave & Busters arcades in the United States and Canada. (Other arcade chains will get a crack at the massive arcade game "later this year.")
Two alleged owners of Mugshots.com—Sahar Sarid and Thomas Keesee—have been arrested in south Florida on a recently issued California warrant. The notorious website publishes mugshots and then demands payment for their removal.
On Wednesday, the attorney general of California brought criminal charges against not only Sarid and Keesee, but also Kishore Vidya Bhavnanie and David Usdan. The quartet has been charged with extortion, money laundering, and identity theft.
Bhavnanie was arraigned by a Pennsylvania state judge also on Wednesday—his bail was reportedly set at $1.86 million. According to Tania Mercado, a spokeswoman for the California Attorney General's office, Usdan is also in custody.
Unlike Laurel and Yanny, you'll almost certainly be able to hear both.
New apps are bringing a greater range of services and features to the vital flows of money to families around the world
Parts of the upcoming instalment in the franchise were filmed at Fawley Power Station in Hampshire.
The findings from Which? come ahead of a major overhaul in how providers can advertise broadband speeds.
The move will boost PayPal's in-store presence as competition in the digital payments sector grow.
Panel unanimously approves amendment upholding sanctions against the Chinese phone maker.
Patent sought for honeycomb design that could massively lengthy battery life
Laptop and phone batteries could last 100 times longer if boffins at the University of Missouri come good on a new honeycomb design that they say greatly reduces the amount of energy dissipated inside power packs.…
Concerts in your living room and other ways tech is changing music.
US financier will be allowed to acquire memory biz after all
The government of China will not stand in the way of the Toshiba Memory Corporation's sale to US investment house Bain Capital.…
From an Xbox adaptive controller to Apple bringing coding tools to the blind and deaf, inclusivity is the topic of the day.
The meeting comes hot on the heels of Senate Democrats' vote to turn back the FCC's repeal of net neutrality.
A little-known service has been leaking the real-time locations of US cell phone users to anyone who takes the time to exploit an easily spotted bug in a free trial feature, security news site KrebsOnSecurity reported Thursday.
LocationSmart, as the service is known, identifies the locations of phones connected to AT&T, Sprint, T-Mobile, or Verizon, often to an accuracy of a few hundred yards, reporter Brian Krebs said. While the firm claims it provides the location lookup service only for legitimate and authorized purposes, Krebs reported that a demo tool on the LocationSmart website could be used by just about anyone to surreptitiously track the real-time whereabouts of just about anyone else.
The tool was billed as a demonstration prospective customers could use to see the approximate location of their own mobile device. It required interested people to enter their name, email address, and phone number into a Web form. LocationSmart would then text the phone number and request permission to query the cellular network tower closest to the device. It didn’t take long for Robert Xiao, a security researcher at Carnegie Mellon University, to find a way to work around the authorization requirement.