What Google knows about you
Rupert Murdoch in a snit over iPhone loophole
The WSJ simply had to release an app for the iPhone if it was going to remain relevant. Unfortunately for the Journal, Apple hasn’t yet figured out a safe or easy way to charge iPhone users for the things they do within apps. So anything from the Journal that you can read on an iPhone (or an iPod Touch) is not charged.
EU poised to hit Intel with mega fine
Linux : Login Graphically to A Computer in Remote Location.
The ability to login graphically into any computer from a remote location has a number of uses. In my case it allows me to create a setup were students in my school can easily login graphically into the universities computer lab and use many of the applications which are installed there (like Matlab which is only licensed to run on our lab computer
Android to grow faster than iPhone in 2009
The number of phones shipped using Google’s Android platform is set to grow much faster than the iPhone this year, estimates from Strategy Analytics maintain today. Devices like the T-Mobile G1 have just a small fraction of shipments today but are expected to grow 900 percent in 2009; iPhones will grow only by 79 percent.
DOJ Nixes Lax Policy, Hardens Antitrust Enforcement
eldavojohn writes “A policy from the Bush era seen as a hurtle to the government prosecuting companies under antitrust laws has been withdrawn by Obama’s Department of Justice. From the article, ‘The DOJ’s Antitrust Division has withdrawn a September report that “raised too many hurdles to government antitrust enforcement and favored extreme caution” toward antitrust enforcement action, the DOJ said. The change in policy could mean that the department looks harder at the actions of technology vendors such as Google, Oracle and IBM, as detractors have raised antitrust concerns about all three in recent months.’ You may recall that Google has come under some antitrust scrutiny recently and the pressure may have just gotten a little more intense.”
Read more of this story at Slashdot.
3,800 Vulnerabilities Detected In FAA’s Web Apps
ausekilis sends us to DarkReading for the news that auditors have identified thousands of vulnerabilities in the FAA’s Web-based air traffic control applications — 763 of them high-risk. Here is the report on the Department of Transportation site (PDF). “And the FAA’s Air Traffic Organization, which heads up ATC operations, received more than 800 security incident alerts in fiscal 2008, but still had not fixed 17 percent of the flaws that caused them, ‘including critical incidents in which hackers may have taken over control of ATO computers,’ the report says. … While the number of serious flaws in the FAA’s apps appears to be staggering, Jeremiah Grossman, CTO of WhiteHat Security, says the rate is actually in line with the average number of bugs his security firm finds in most Web applications. … Auditors were able to hack their way through the Web apps to get to data on the Web application and ATC servers, including the FAA’s Traffic Flow Management Infrastructure system, Juneau Aviation Weather System, and the Albuquerque Air Traffic Control Tower. They also were able to gain entry into an ATC system that monitors power, according to the report. Another vulnerability in the FAA’s Traffic Flow Management Infrastructure leaves related applications open to malware injection.”
Read more of this story at Slashdot.
Adult Website Use At Work Leads To Hacker Conviction
safesorry notes that several sources are talking about a recent tale of woe about Richard Wolf, a lonely guy looking for love in all the wrong places. Wolf used his work computer to visit the Adult Friend Finder website and upload personal nudes to prospective “friends.” Now he’s been convicted under a “hacker” law targeted at employees who steal data or access information they shouldn’t. “Richard Wolf acknowledged that his behavior was inappropriate when he used his work computer to upload nude photos of himself to an adult web site and view other photos on porn sites, but he didn’t think he should be convicted of hacking for doing so.”
Read more of this story at Slashdot.