Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

LG's 0.7mm Smartphone Bezel Is World's Narrowest

timothy posted 3 hours ago | from the ok-that's-pretty-neat dept.

Handhelds 18

SmartAboutThings (1951032) writes "LG Display has announced that it has developed a 5.3-inch Full HD LCD panel for smartphones with the world's narrowest bezel at 0.7mm. It's even thinner than a credit card, making the screen give you the impression that it 'overflows.' The company calls the construction Neo Edge technology; it uses an adhesive instead of double-sided tape to attach and seal the panel's circuit board and backlight unit.

Virginia Court: LEOs Can Force You To Provide Fingerprint To Unlock Your Phone

Soulskill posted 3 hours ago | from the now-where-am-i-going-to-store-my-incriminating-evidence dept.

Privacy 145

schwit1 writes with news of a Circuit Court decision from Virginia where a judge has ruled that a criminal defendant cannot use Fifth Amendment protections to safeguard a phone that is locked using his or her fingerprint. According to Judge Steven C. Fucci, while a criminal defendant can't be compelled to hand over a passcode to police officers for the purpose of unlocking a cellular device, law enforcement officials can compel a defendant to give up a fingerprint. The Fifth Amendment states that "no person shall be compelled in any criminal case to be a witness against himself," which protects memorized information like passwords and passcodes, but it does not extend to fingerprints in the eyes of the law, as speculated by Wired last year. Frucci said that "giving police a fingerprint is akin to providing a DNA or handwriting sample or an actual key, which the law permits. A passcode, though, requires the defendant to divulge knowledge, which the law protects against, according to Frucci's written opinion."

Android Co-Founder Andy Rubin Leaving Google

Soulskill posted 8 hours ago | from the so-long-and-thanks-for-all-the-droids dept.

Android 77

An anonymous reader writes: The Wall Street Journal reports that Andy Rubin is leaving Google. Rubin co-founded Android in 2003 and stayed on when the company was acquired by Google in 2005. Rubin led Android through the acquisition of over a billion users, until 2013 when he moved to Google's robotics division. He was replaced in the Android division by Sundar Pichai, who continues in charge of that, Chrome, Google+, and many other products. Rubin's robotics role will be filled by James Kuffner. "Mr. Rubin's departure is a blow to Google's robotics efforts. However, Mr. Kuffner is experienced in the sector, having worked on human-like robot technology for over two decades, including seven years at Carnegie Mellon University and five years on Google's self-driving car project."

Breaching Air-Gap Security With Radio

Soulskill posted 11 hours ago | from the hitting-you-where-you-live dept.

Security 75

An anonymous reader writes: Security researcher Mordechai Guri with the guidance of Prof. Yuval Elovici from the cyber security labs at Ben-Gurion University in Israel presented at MALCON 2014 a breakthrough method ("AirHopper") for leaking data from an isolated computer to a mobile phone without the presence of a network. In highly secure facilities the assumption today is that data can not leak outside of an isolated internal network. It is called air-gap security. AirHopper demonstrates how the computer display can be used for sending data from the air-gapped computer to a near by smartphone. The published paper and a demonstration video are at the link.

How Apple Watch Is Really a Regression In Watchmaking

timothy posted yesterday | from the maybe-they-could-merge-with-timex dept.

Power 405

Nerval's Lobster writes Apple design chief Jony Ive has spent the past several weeks talking up how the Apple Watch is an evolution on many of the principles that guided the evolution of timepieces over the past several hundred years. But the need to recharge the device on a nightly basis, now confirmed by Apple CEO Tim Cook, is a throwback to ye olden days, when a lady or gentleman needed to keep winding her or his pocket-watch in order to keep it running. Watch batteries were supposed to bring "winding" to a decisive end, except for that subset of people who insist on carrying around a mechanical timepiece. But with Apple Watch's requirement that the user constantly monitor its energy, what's old is new again. Will millions of people really want to charge and fuss with their watch at least once a day?

Lenovo Completes Motorola Deal

timothy posted yesterday | from the capital-is-mobile dept.

Android 58

SmartAboutThings writes If somehow you missed the reports of Lenovo buying Motorola – which was also bought by Google for $12.5 billion back in 2011 – then you should know that the deal is now complete. Lenovo has announced today that Motorola is now a Lenovo company — which makes Lenovo not only the number one PC maker in the world but also the third-largest smartphone maker.

Google Announces Project Ara Developer Conference, Shows Off First Prototype

samzenpus posted 2 days ago | from the save-the-date dept.

Google 63

An anonymous reader writes Google today announced it will be hosting the second iteration of its Project Ara Module Developers Conference for its modular device project early next year. The first event will be in Mountain View on January 14, 2015, with satellite locations at Google offices in New York City, Buenos Aires, and London. The same agenda will be repeated in Singapore on January 21, 2015, with satellite locations at Google offices in Bangalore, Tokyo, Taipei, and Shanghai. The company also released a video showing off the first prototype from Project Ara. Until now, all we've seen so far are industrial design models. This one actually boots up.

FTC Sues AT&T For Throttling 'Unlimited' Data Plan Customers Up To 90%

timothy posted 3 days ago | from the y'don't-say dept.

AT&T 173

An anonymous reader writes The U.S. Federal Trade Commission today announced it is suing AT&T. The commission is charging the carrier for allegedly misleading millions of its smartphone customers by changing the terms while customers were still under contract for "unlimited" data plans that were, well, limited. "AT&T promised its customers 'unlimited' data, and in many instances, it has failed to deliver on that promise," FTC Chairwoman Edith Ramirez said in a statement. "The issue here is simple: 'unlimited' means unlimited." How apropos.

Ask Slashdot: Unlimited Data Plan For Seniors?

timothy posted 3 days ago | from the goldarned-internet dept.

The Internet 170

New submitter hejman08 writes with a question probably faced by many whose parents, grandparents, and other relatives rely on them for tech support and advice, specifically one about finding an appropriate data plan for his grandmother, of whom he writes: She is on her own plan through Verizon with 1GB of data, and she literally blows through it in three days or less every month, then complains about having nothing to do. They have Wi-Fi at her senior center, but only in specific rooms, and she has bad ankles and knees so she wants to stay home. Internet service would cost 80 a month to add where she lives. What I am wondering, is if any of the genius slashdotters out there know of a plan that- regardless of cost of phone, which we could manage as a gift to her, once- would allow her to have at least 300 minutes, 250 texts, and truly unlimited data (as in none of that Unlimited* stuff that is out there where they drop you to caveman speeds within a gig of usage), all for the price of less than say, 65 a month? The big 4 carriers don't seem to have anything that would work for her. What would you recommend? (I might start with a signal repeater in a utility closet, myself, or some clandestine CAT5 from a friendly neighbor's place.)

Why CurrentC Will Beat Out Apple Pay

timothy posted 3 days ago | from the some-downsides-might-strike-your-mind dept.

Businesses 630

itwbennett writes Working closely with VISA, Apple solved many complex security issues making in-person payments safer than ever. But it's that close relationship with the credit card companies that may be Apple Pay's downfall. A competing solution called CurrentC has recently gained a lot of press as backers of the project moved to block NFC payments (Apple Pay, Google Wallet, etc.) at their retail terminals. The merchants designing or backing CurrentC reads like a greatest hits list of retail outfits and leading the way is the biggest of them all, Walmart. The retailers have joined together to create a platform that is independent of the credit card companies and their profit-robbing transaction fees. Hooking directly to your bank account rather than a credit or debit card, CurrentC will use good old ACH to transfer money from your account to the merchant's bank account at little to no cost.

LAX To London Flight Delayed Over "Al-Quida" Wi-Fi Name

timothy posted 3 days ago | from the low-threshold dept.

Transportation 339

linuxwrangler writes A flight from LAX to London was delayed after a passenger reported seeing "Al-Quida Free Terror Nettwork" as an available hotspot name and reported it to a flight attendant. The flight was taken to a remote part of the airport and delayed for several hours but "after further investigation, it was determined that no crime was committed and no further action will be taken." That seems an awfully low threshold for disrupting air traffic, since wireless access points can be had for just a few dollars these days.

Taking the Census, With Cellphones

Soulskill posted 3 days ago | from the there's-an-app-for-that dept.

Cellphones 57

sciencehabit writes: If you want to figure out how many people live in a particular part of your country, you could spend years conducting home visits and mailing out questionnaires. But a new study describes a quicker way. Scientists have figured out how to map populations using cellphone records — an approach that doesn't just reveal who lives where, but also where they go every day. The researchers also compared their results to population density data gathered through remote sensing technologies, a widely-used method that relies on satellite imaging to gather detailed information on population settlement patterns and estimate population counts. They found that the two methods are comparable in accuracy when checked against actual survey-based census data, but estimates from mobile phone data can provide more timely information, down to the hours.

FCC Postpones Spectrum Auction Until 2016

Soulskill posted about a week ago | from the no-extra-spectrum-for-you dept.

Wireless Networking 31

An anonymous reader writes: 2014 was supposed to be the year broadcasters would be allowed to sell off their unused spectrum to mobile carriers. That got pushed back to 2015 in December, and now the Federal Communications Commission has bumped it to 2016 in the face of a lawsuit from the National Association of Broadcasters. The FCC says the legal briefs aren't even due until January 2015, and it will take them until the middle of the year to review the documents and respond in court. The delay is just fine with the NAB, but probably bad news for anyone hoping that spectrum would help to improve mobile communications in the U.S. any time soon.

CHP Officers Steal, Forward Nude Pictures From Arrestee Smartphones

Soulskill posted about a week ago | from the your-tax-dollars-at-work dept.

Cellphones 275

sabri writes: Following the initial suspension of a California Highway Patrol officer earlier this week, news has come out that the CHP has an entire ring of officers who steal and subsequently share nude pictures. The nudes are stolen from women who are arrested or stopped. Officer Sean Harrington of Martinez reportedly confessed to stealing explicit photos from the suspect's phone, and said he forwarded those images to at least two other CHP officers. Where is the ACLU when you need them the most?

Microsoft Now Makes Money From Surface Line, Q1 Sales Reach Almost $1 Billion

timothy posted about a week ago | from the but-that's-just-on-the-surface dept.

Microsoft 117

SmartAboutThings writes Microsoft has recently published its Q1 fiscal 2015 earnings report, disclosing that it has made $4.5 billion in net income on $23.20 billion in revenue. According to the report, revenue has increased by $4.67 billion, compared to $18.53 billion from the same period last year. However, net income has decreased 14 percent compared to last year's $5.24 billion mainly because of the $1.14 billion cost associated with the integration and restructuring expenses related to the Nokia acquisition.

But what's finally good news for the company is that the Surface gross margin was positive this quarter, which means the company finally starts making money on Surface sales. Microsoft didn't yet reveal Surface sales, but we know that Surface revenue was $908 million this quarter, up a massive 127 percent from the $400 million this time last year. However, if we assume that the average spent amount on the purchase of this year's Surface Pro 3 was around $1000, then we have less than 1 million units sold, which isn't that impressive, but it's a good start.

AT&T Locks Apple SIM Cards On New iPads

timothy posted about a week ago | from the well-that's-not-cricket dept.

AT&T 112

As reported by MacRumors, the unlocked, carrier-switchable SIM cards built into the newest iPads aren't necessarily so -- at least if you buy them from an AT&T store. Though the card comes from Apple with the ability to support (and be switched among with software, if a change is necessary) all major carriers, "AT&T is not supporting this interchangeability and is locking the SIM included with cellular models of the iPad Air 2 and Retina iPad mini 3 after it is used with an AT&T plan. ... AT&T appears to be the only participating carrier that is locking the Apple SIM to its network. T-Mobile's John Legere has indicated that T-Mobile's process does not lock a customer in to T-Mobile, which appears to be confirmed by Apple's support document, and Sprint's process also seems to leave the Apple SIM unlocked and able to be used with other carrier plans. Verizon, the fourth major carrier in the United States, did not opt to allow the Apple SIM to work with its network." The iPad itself can still be activated and used on other networks, but only after the installation of a new SIM.

Verizon Injects Unique IDs Into HTTP Traffic

Soulskill posted about a week ago | from the doing-the-wrong-thing-badly dept.

Verizon 206

An anonymous reader writes: Verizon Wireless, the nation's largest wireless carrier, is now also a real-time data broker. According to a security researcher at Stanford, Big Red has been adding a unique identifier to web traffic. The purpose of the identifier is advertisement targeting, which is bad enough. But the design of the system also functions as a 'supercookie' for any website that a subscriber visits. "Any website can easily track a user, regardless of cookie blocking and other privacy protections. No relationship with Verizon is required. ...while Verizon offers privacy settings, they don’t prevent sending the X-UIDH header. All they do, seemingly, is prevent Verizon from selling information about a user." Just like they said they would.

Deutsche Telecom Upgrades T-Mobile 2G Encryption In US

timothy posted about two weeks ago | from the tell-all-your-grandparents dept.

Encryption 27

An anonymous reader writes T-Mobile, a major wireless carrier in the U.S. and subsidiary of German Deutsche Telecom, is hardening the encryption on its 2G cellular network in the U.S., reports the Washington Post. According to Cisco, 2G cellular calls still account for 13% of calls in the US and 68% of wireless calls worldwide. T-Mobile's upgrades will bring the encryption of older and inexpensive 2G GSM phone signals in the US up to par with that of more expensive 3G and 4G handsets. Parent company Deutsche Telecom had announced a similar upgrade of its German 2G network after last year's revelations of NSA surveillance. 2G is still important not only for that 13 percent of calls, but because lots of connected devices rely on it, or will, even while the 2G clock is ticking. The "internet of things" focuses on cheap and ubiquitous, and in the U.S. that still means 2G, but lots of things that might be connected that way are ones you'd like to be encrypted.

'Microsoft Lumia' Will Replace the Nokia Brand

timothy posted about two weeks ago | from the not-many-years-from-dominance dept.

Cellphones 150

jones_supa writes The last emblems of Nokia are being removed from Microsoft products. "Microsoft Lumia" is the new brand name that takes their place. The name change follows a slow transition from Nokia.com over to Microsoft's new mobile site, and Nokia France will be the first of many countries that adopt "Microsoft Lumia" for its Facebook, Twitter, and other social media accounts. Microsoft has confirmed to The Verge that other countries will follow the rebranding steps in the coming weeks. Nokia itself continues as a reborn company focusing on mapping and network infrastructure services.

Delivering Malicious Android Apps Hidden In Image Files

timothy posted about two weeks ago | from the best-case-never-touch-a-phone dept.

Android 113

An anonymous reader writes "Researchers have found a way to deliver a malicious app to Android users by hiding it into what seems to be an encrypted image file, which is then delivered via a legitimate, seemingly innocuous wrapper app. Fortinet malware researcher Axelle Apvrille and reverse engineer Ange Albertini created a custom tool they dubbed AngeCryption, which allows them to encrypt the payload Android application package (APK) and make it look like an image (PNG, JPG) file . They also had to create another APK that carries the "booby-trapped" image file and which can decrypt it to unveil the malicious APK file and install it. A malicious app thusly encrypted is nearly invisible to reverse engineers, and possibly even to AV solutions and Google's Android Bouncer." (Here's the original paper, from researchers Axelle Apvrille and Ange Albertini.)

Slashdot Login

Need an Account?

Forgot your password?