Years ago, the method used by criminals to see whether a stolen credit card was still active was to charge a penny to the account. If it was authorized, the criminal could then purchase more substantial goods using that card. Credit card companies and banks have both gotten wiser. Today, they look for penny purchases as well as random gas station purchases, for example, as early warning flags. Well, the criminals may have outsmarted everyone this time.
Less than a week after the iPhone was released, a group of dedicated individuals announced in a wiki this morning they have successfully unlocked the phone, potentially allowing the use of carriers other than AT&T.
The site and its various mirrors also plan to issue an Internet tool to "expand the functionality" of the device, perhaps later today. The site, which describes itself as "a place for people who want to make iPhone even more awesome than it is already out of the box," reminds those who want to try any these tasks that … Read more
Sometimes it feels like every day, there's word of another incident involving lost, hacked or pilfered personal data stores--and dire warnings about the potential consequences.
But according to a report just released by the Government Accountability Office (PDF), only a small fraction of those recent episodes have actually resulted in clear signs of identity theft.
After scrutinizing the 24 largest data breaches that got media attention between January 2000 and June 2005, the GAO found that only three of the incidents indicated fraud on existing accounts. One pointed to evidence that new accounts had been created based on the … Read more
Online consumers have become relatively slow shoppers, according to a recent report on digital window shopping.
Online shoppers are now being more cautious than they were two years ago, and are taking more than half a day longer before making a buying decision and completing a transaction, according to a report by ScanAlert, a security-certification company in Bay Area that analyzed 2.6 million online sales executed on 470 Web sites from May 2005 to May 2007.
Since May 2005, the average time between a consumer's first visit to a Web site and an actual purchase increased from 19 … Read more
Symantec has added Norton Antivirus 2008 and Norton Internet Security 2008 to it's Beta Center. Enhancements to Norton Antivirus 2008 include better performance and updated Symantec Online Network for Advanced Response (SONAR) heuristics. Enhancements to Norton Internet Security 2008 include those in Norton Antivirus 2008 plus Norton Identity Safe (from Norton Confidential), and enhanced network monitoring. Both pieces of software are expected to include new browser vulnerability protection, codenamed "Canary", in their final release.
As part of its July 2007 Patch Tuesday, Microsoft will patch at least six vulnerabilities. Three of the patches are deemed "critical" by Microsoft and affect software for Excel, Windows, and .Net Framework. Two are deemed "important" and affect software for Publisher and Windows XP. One is deemed "moderate" and affects Windows Vista. Details will be released on Tuesday, July 10, 2007.
Norwegian researcher Jon Lech Johansen, aka DVD Jon, has found a way to activate the iPhone via Windows without subscribing to an AT&T wireless plan. After using the hack, some Internet features, such as YouTube, may still not work. What you do get is use of the wide-screen iPod and Internet access through the Safari browser.
Details can be found on Johansen's So sue me blog. There, Johansen lists several values and offsets that he says must be entered in the itunes.exe file. This requires the use of a hex editor. A new host entry must … Read more
I was casually cruising the news sites yesterday when I came across a story about porting "ineligible" numbers to AT&T and iPhone. I clicked on the story because I know some of the people who lobbied for and won the rights to treat phone numbers more like personal property you own than corporate property you rent. I was right with the author until he said (without comment or outrage):On that screen, enter your name, Social Security number, and your current billing information and home telephone.
Apple and AT&T are demanding customers reveal SSNs to activate their iPhones. That should be the lead of every technology and business article written this week. If you don't believe me, read on.… Read more
The former employee allegedly sold 2.3 million consumer records to a data broker who, in turn, sold the information to various marketing organizations. The records contained information on 2.2 million bank accounts and 990,000 credit card accounts, according to FIS.
"We have no reason to believe that the theft resulted in any subsequent fraudulent activity or financial damage to the consumer, and we are taking the necessary steps to see that … Read more
Criminals and researchers alike have been working overtime to learn what they can about the hardware and operating system that runs the iPhone. While several researchers have quietly reported a few Bluetooth and Safari iPhone-related flaws directly to Apple, there is a public (albeit underground) effort to subvert the new mobile platform for fun and profit.
One underground site has collected information from the iPhone's Macintosh OS X Disk Copy Disk … Read more