Some basic electronic gear is all tech-minded car thieves would need to steal many recent models, according to Swiss researchers. They successfully hacked into 10 vehicles from eight manufacturers in the latest of a growing number of studies exposing potential security risks as vehicles become more computerized and connected.
Source: Break Out The Aluminum Foil To Secure Yourself From Hackers – Autoblog
There is something to be said for “old” security systems, like physical keys and actually keeping secrets to yourself in your head.
A computer chip that performs imprecise calculations could process some types of data thousands of times more efficiently than existing chips.
Source: The surprising usefulness of sloppy arithmetic | MIT News
Computerized surveillance systems can protect hospital patients, watch for criminals — or invade your privacy.
Source: Smarter Than You Think: When Computers Keep Watch – The New York Times
The European Newspaper Publisher Association claims that Apple’s new in-app subscriptions limit user choice and offer fewer subscriber details to publishers.
Source: European publishers call out Apple over in-app subscriptions | Ars Technica
Do in-app purchases take advantage of children and inadvertently cost parents way more money than they intended to spend?
Source: FTC asked to investigate kids and in-app purchases | Ars Technica
What’s the world’s largest technology company? The answer depends on which measure you use.
Source: Which company is biggest? A primer on corporate valuation | Ars Technica
“There is one key used for communication between the operators and the SIM card that is very well protected, because that protects their monetary interest,” Nohl said. “The other key is less well protected, because it only protects your private data.”
Source: $15 phone, 3 minutes all that’s needed to eavesdrop on GSM call | Ars Technica
Just because you pay for a service (or device) doesn’t mean you can trust it.