It seems like something out of an old episode of Mission Impossible or Inspector Gadget?an ultra-secure phone that self destructs. But such a phone might be close to reality, courtesy of Boeing and BlackBerry.
According to Reuters (via Recode), Boeing and BlackBerry are currently jointly developing a super-secure smartphone geared toward governments and other groups or individuals who require high security standards. And if someone goes and tampers with the device, it'll render itself inoperable.
We're not talking about something that burns itself or explodes or anything like that, though; instead, Slashgear says that "all data will be erased" from the phone "if the tamper-proof casing is taken apart." So it's not as dramatic as, say, something from spy movies, but it certainly sounds effective.
Denying responsibility for a major hack on Sony Pictures, North Korea has proposed a joint investigation with the U.S. but promised ?serious consequences? should its offer be rejected.
On Friday, the FBI said it had concluded North Korean responsibility because of several similarities in the malware code, the computer control network used and the software tools used against Sony and that used in previous attacks in South Korea that had been blamed on North Korea.
North Korea?s Ministry of Foreign Affairs, however, said in a statement Saturday that it needed to see ?clear evidence? and said comparisons with previous cyberattacks were irrelevant to the Sony case.
The data breach at the Staples office-supply chain may have affected roughly 1.16 million payment cards as criminals deployed malware to point-of-sale systems at 115 stores, the company said Friday.
The affected stores cover 35 states from California to Connecticut, according to a list Staples released Friday. The chain has more than 1,400 stores in the U.S.
The malware, which allowed the theft of debit and credit card data, was removed in mid-September upon detection, Staples said. The retailer had previously confirmed the incident in October. A previous report from security researcher Brian Krebs around that time cited fraudulent transactions traced to cards that were used for purchases at Staples stores in the Northeastern U.S., but apparently the attack was much wider than that.
A federal judge on Friday questioned the strength of a key lawsuit challenging the constitutionality of the government?s Internet surveillance program known as ?upstream? data collection.
Judge Jeffrey White heard oral arguments by attorneys from the Electronic Frontier Foundation, which filed the suit, and the government, during a hearing in a federal district court in Oakland, California. The EFF says its suit is the first challenge in public court to the government?s upstream data program, which copies online data from the main cables connecting Internet networks around the world.
The EFF first filed its suit in 2008 after an AT&T technician provided evidence that the company routed copies of its Internet traffic records to the NSA.
Once upon a time, life in the enterprise IT shop was fairly simple, at least conceptually speaking.
IT issued computers and laptops to employees, and maintained enterprise software, databases and servers that supported the company, which were mostly run in-house.
These days, IT?s basic firmament is giving way to a more breathtaking geography that the IT pro must traverse, based on pay-as-you-go cloud computing, building applications and performing deep data analysis. Perhaps more fundamentally, IT operations are moving from merely supporting the business to driving the business itself, which requires agility and making the most of resources.
Security is rising to the top of the list of issues that the Internet Society (iSoc) is tackling in Africa, joining its efforts to develop infrastructure and promote an inclusive ?bottom-up? governance model for the Web.
?We are going to support the deployment of security technologies,? said Dawit Bekele, director of the iSoc African Bureau, in a webinar this week.
ISoc is a nonprofit international organization that works to promote standards and inclusive Internet governance policies. The Internet Engineering Task Force (IETF), which works on Internet standards .
ISoc?s African bureau plans to measure interconnection and promote open standards in Africa. It also will continue to help develop traffic exchange and DNS programs in partnership with ICANN, and promote local success stories, Bekele said.
Hydrogen is the most common kind of normal matter in the universe. Perhaps the universe is trying to tell us something, for the most common chemical element makes an excellent energetic rocket fuel. That does not mean, however, that it is easy to manage. Odorless and colorless hydrogen gas becomes liquid, and thus dense enough […]
The post Centaurs, Soviets, and Seltzer Seas: Mariner 2’s Venusian Adventure (1962) appeared first on WIRED.
In the latest episode of Geek's Guide to the Galaxy, writer Naomi Klein discusses dystopian fiction and her new capitalism-vs.-the-climate nonfiction book This Changes Everything.
The post Dystopian Fiction’s Popularity Is a Warning Sign for the Future appeared first on WIRED.
From the reactions to Sony pulling The Interview to the end of the beloved Serial, a lot happened on the Internet last week. Catch up here.
The post While You Were Offline: 30,000 People Buy Bull Poop, George R.R. Martin Freaks Out Over The Interview appeared first on WIRED.
Finished the Serial podcast and want to know what all those people and places looked like without just using your imagination? Here's every Google image search you were scared to do until it was over.
The post Every Serial-Related Google Image Search You’ve Been Afraid to Do appeared first on WIRED.
On Friday, Google filed a lawsuit in federal court against Mississippi Attorney General Jim Hood.
The post Google and Hollywood Return to Bickering Over SOPA appeared first on WIRED.
When asked to predict the future, it?s hard to forget that the totally automated future that expo organizers and Sci-Fi prognosticators prepared us for has not come to pass. We are all still waiting for our flying cars ? not to mention the end of email spam. In fact, we?ve recently come to realize that without […]