President Obama has just signed the E-Label act into law today, which will see the logos on the back of our smartphones not required in the future.
The labels will be replaced by software on the device itself, with the device that will benefit the most being the iPhone, which has logos splashed along the bottom of it. The E-Label law passed through the House unanimously, and then again through the Senate without an issue. Manufacturers can now remove the logos, which will also save them money.
The FBI stepped over its boundaries with this particular case, where the US agency wanted to gain entry into a particular hotel guest's room, all without a warrant. When they couldn't secure one, they did the next best thing: posed as Internet technicians, gaining access to the hotel room, all without a warrant.
From the motion to suppress, we find out: "The next time you call for assistance because the internet service in your home is not working, the "technician" who comes to your door may actually be an undercover government agent. He will have secretly disconnected the service, knowing that you will naturally call for help and -- when he shows up at your door, impersonating a technician -- let him in. He will walk through each room of your house, claiming to diagnose the problem. Actually, he will be videotaping everything (and everyone) inside. He will have no reason to suspect you have broken the law, much less probable cause to obtain a search warrant. But that makes no difference, because by letting him in, you will have "consented" to an intrusive search of your home".
The FBI agents secured evidence from the hotel room, and submitted it to a magistrate to get a warrant. Kind of the reverse of what should happen, but they obviously wouldn't have told the judge that they posed as the Internet technicians in order to get into the room to secure the evidence they required to obtain the warrant in the first place.
The Syrian Electronic Army hacking group have recently attacked the commenting platform Gigya, implementing popups in popular news websites such as The Independent - starting as of early this morning.
The affected websites include large-names such as The Telegraph, CNBC, PC World and The Chicago Tribune. According to Patrick Salyer, Gigya's chief executive, these hackers were able to alter the 'whois' domain registration record for Gigya.
Company executives should be concerned - and prepared - if their company ends up getting hit by a successful cyberattack, possibly leading to a data breach. However, a general misconception that the IT staff is proactive and ready to defend against cyberattacks often is not the case, especially with overworked IT teams unable to keep up.
Although there are steps to make a data breach preventable, they certainly aren't fool-proof - and every company should have plans in place if a breach occurs.
It's also worth noting that cybercrime is done for a number of reasons, and it's not just about stealing personal information, such as debit and credit card data. Although that appears to be the basis of the Target, Home Depot and other retailer breaches, there is a growing worry of cyberespionage targeting companies and their host nation.
Apple has released another ad for its iPhone 6, highlighting its Voice Text feature on iOS 8. Voice Text for iOS 8 will instantly send audio messages through iMessage, in the same way Facebook Messenger does.
The ad points out that it is sometimes easier to send a quick voice message than it is to type it, especially when there are longer, more complicated words to use. You could even sing to someone, which is something that is next to impossible to do over text messages.
Nintendo have just had a patent go public in the United States Patent and Trademark Office (USPTO) that has been discovered by a NeoGAF named "Rösti".
This patent refers to Gameboy emulation being allowed on other hardware - including mobile phones. This patent also covers emulation on in-flight entertainment models for aircraft, trains and PDA devices.
I have seen Gameboy Advance Emulator's around since the mid-2000s, with one of the most popular between my friends being Visual Boy Advance. However, these aren't only illegal, but do not draw any profit for Nintendo themselves as they are downloaded off various internet sites dedicated to the cause. Alongside computer emulation programs, emulators have seen light on PDA's in the mid-2000s such as the Palm Treo.
Apple has updated the site for its Watch wearable, giving the world a much more detailed look at its first wearable. We get a look at pretty much every angle of Apple's upcoming wearable, form the top, side, the lush corners and most of all; the features.
The company has split the site into seven different sections; Timekeeping, New Ways to Connect, Health & Fitness, Design, Technology, Gallery and Films. All of which are filled with information on Watch, and a different story to be told. Check out the Apple Watch website for a super-detailed look on Apple's first wearable.
We've just received confirmation that Razer's new smartband, the Nabu, is finally confirmed for release - coming next week, first to the North American market, followed by the rest of the world soon after.
We've covered the Nabu's specifications and features before. As quoted by Razer CEO Min-Liang Tan, the Razer Nabu is designed to work as "a cross between a smartwatch and a fitness band. It's a wearable device focused on helping you live smarter."
According to email contact between Razer's Australian promoters, Surprise Attack, the Razer Nabu release will begin next week. Coming at a price of $99.99, this new technology offering has been tested by "500 of Razer's most loyal fans" whom were given the ability "to buy the bands earlier in the year for a single dollar".
OnePlus has opened up its own retail store in Beijing, China, which is a temporary store at the moment. The OnePlus retail shop won't open up to the public until December 20, just before Christmas.
The company is only stocking its "flagship killer" OnePlus One handset, and a few accessories. For a company that only has a single smartphone on the market, this is an interesting move.
News of malware attacks targeting point-of-sale (POS) systems became common place in 2014, and the problems are spreading away from retailer checkouts. The d4re|dev1 (daredevil) malware is able to compromise Harmony WinPOS, Figure Gemini POS, OSIPOS Retail Management System, and QuickBooks Point of Sale - able to launch keylogging features and can be used as an advanced backdoor.
Next-generation security measures are needed to help keep POS malware in check, and that doesn't seem to be happening soon enough.
"IntelCrawler believes that such kind of devices will become the new target for cybercriminals," the company said in a blog post. "These kiosks and ticket machines don't usually house large daily lots of money like ATMs, but many have insecure methods of remote administration allowing for infections payloads and the exfiltration of payment data in an ongoing and undetected scheme."