WikiLeaks must be stopped
WikiLeaks is not a news organization; it is a criminal enterprise. Its reason for existence is to obtain classified national security information and disseminate it as widely as possible -- including to the United States' enemies. These actions are likely a violation of the Espionage Act, and they arguably constitute material support for terrorism. The Web site must be shut down and prevented from releasing more documents -- and its leadership brought to justice.
Assange is a non-U.S. citizen operating outside the territory of the United States. This means the government has a wide range of options for dealing with him. It can employ not only law enforcement but also intelligence and military assets to bring Assange to justice and put his criminal syndicate out of business.
Hacker Spoofs Cell Phone Tower to Intercept Calls
The device tricks the phones into disabling encryption and records call details and content before they're routed on their proper way through voice-over-IP.
Paget's system costs only about $1,500, as opposed to several hundreds of thousands for professional products. Most of the price is for the laptop he used to operate the system.
Encrypted calls are not protected from interception because the rogue tower can simply turn it off.
But Paget said he could also capture phones using 3G by sending out jamming noise to block 3G. Phones would then switch to 2G and hook up with his rogue tower. Paget had his jammer and an amplifier on stage but declined to turn them on saying they would "probably knock out all Las Vegas cell phone systems."
How much does cost matter in first wave of EVs?
Cars powered by electricity are going to be cheaper to run per mile than gasoline cars, which provides some comfort to electric vehicle buyers.
The key question for the auto industry is what happens in a few years after the early adopters, the people willing to pay more for new technology and a greener ride, already have their EVs. Here, the economics of fueling and daily driving patterns loom much larger in the decision.
U.S. Copyright Group 'Steal' Competitor's Website
By itself the mere existence of this settlement portal wouldn't really be newsworthy, but this changed when we realized that they had copied it from a competitor.
Instead of coding the site themselves, they had simply copied the code (including the copyright statement) and images from a company in the same line of work.
They are so incompetent and probably blinded by the dollar signs in their eyes, that they can't even put a website together without breaking the law themselves - copyright law.
ATM hack gives cash on demand
Exploiting bugs in two different ATM machines, the researcher from IOActive was able to get them to spit out money on demand and record sensitive data from the cards of people who used them.
After experimenting with his own machines, Jack developed a way of bypassing the remote authentication system and installing a homemade rootkit, named Scrooge, that lets him override the machine's firmware.
The machines Jack hacked were, however, based on Microsoft's Windows CE operating system.
Details of 100m Facebook users collected and published
Ron Bowles used a piece of code to scan Facebook profiles, collecting data not hidden by the user's privacy settings.
Mr Bowles said he published the data to highlight privacy issues, but Facebook said it was already public information.
Earlier this year there was a storm of protest from users of the site over the complexity of Facebook's privacy settings. As a result, the site rolled out simplified privacy controls.
Military Disputes Its Own WikiLeaked Missile Report
The document - from May 30, 2007 - claims that insurgents shot down a Chinook transport helicopter over Helmand Province with a surface-to-air missile, or SAM. But a spokesman for the NATO command in Afghanistan, U.S. Army Col. Wayne Shanks, tells Danger Room, "We have no reports of any aircraft being damaged by SAMs."
Easily fired by infantry or a guy on a flatbed truck, MANPADs are capable of locking on to the heat generated by an aircraft within distances of around 6 miles, meaning that helicopters and low-flying fixed-wing aircraft are vulnerable - as are all aircraft at takeoff and landing.
U.S. Declares iPhone Jailbreaking Legal, Over Apple's Objections
Federal regulators lifted a cloud of uncertainty when they announced it was lawful to hack or "jailbreak" an iPhone, declaring Monday there was "no basis for copyright law to assist Apple in protecting its restrictive business model."
Apple also told regulators that the nation's cellphone networks could suffer "potentially catastrophic" cyberattacks by iPhone-wielding hackers at home and abroad if iPhone owners are permitted to legally jailbreak their shiny wireless devices.
BP chief Tony Hayward 'negotiating exit deal'
BP's chief executive Tony Hayward has been negotiating the terms of his exit, with a formal announcement likely within 24 hours, the BBC has learned.
BP is due to release its results for the second quarter on Tuesday. It is expected to reveal a provision of up to $30bn (£19bn) for the costs of the clean-up, compensation claims and fines to be paid, resulting in a massive quarterly loss. It has also lost 40% of its market capitalisation.
90% of web snoop document censored
The federal government has censored approximately 90 per cent of a secret document outlining its controversial plans to snoop on Australians' web surfing, obtained under freedom of information (FoI) laws, out of fear the document could cause "premature unnecessary debate".
Hernandez went further to say that she considered disclosure of the document uncensored "could be misleading to the public and cause confusion and premature and unnecessary debate".