Post Thumbnail

Security research firm ReVuln has discovered a fairly simple way (in theory, at least) for unscrupulous folks and their hacking machines to execute malicious code on your computer, by way of EA's Origin platform. The exploit takes advantage of Origin's uniform resource identifier -- the protocol th...

2 years ago 0 Comments
Post Thumbnail

If you're an iPhone owner, you may want to use good judgment before responding to any out-of-the-blue text messages in the near future. French jailbreak developer and security researcher pod2g finds that every iPhone firmware revision, even iOS 6 beta 4, is susceptible to a flaw that theoretically...

2 years ago 0 Comments
Post Thumbnail

In any combat situation it is key to be as well-informed as possible: to know where your enemy is (hopefully not right behind you), what resources you have on hand (dual Twinkies), what you're up against (spouse aggro), and so on. The makers of the upcoming MechWarrior Online have devoted their s...

3 years ago 0 Comments
Post Thumbnail

Caller ID spoofers, your days are numbered! The "Truth in Caller ID Act of 2010" has just passed the House. The bill -- which has been kickin' around in one form or another since 2007, and which only passed the Senate as recently as this February -- makes it illegal "to cause any caller ID service ...

4 years ago 0 Comments
Post Thumbnail

The days of countermining caller ID systems could be coming to an end, at least for those who prefer to live life lawfully. A recent bill introduced in the US Congress, dubbed the "Truth in Caller ID Act of 2007," seems to have ripped a line from Suncom commercials of days past, and also seeks to "m...

7 years ago 0 Comments