New submitter haberb writes "I always thought my HTC phones were of average or above average quality, and certainly no less secure than an vanilla Android install, but it turns out someone was still not impressed. 'Mobile device manufacturer HTC America has agreed to settle Federal Trade Commission charges that the company failed to take reasonable steps to secure the software it developed for its smartphones and tablet computers, introducing security flaws that placed sensitive information about millions of consumers at risk.' Perhaps this will push HTC to release some of the ICS upgrades they promised a few months ago but never delivered, or perhaps the reason they fell through in the first place?"
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×
s122604 writes "Automakers aren't too happy about a recent U.S. Federal Communications Commission (FCC) proposal, which uses part of the wireless spectrum assigned to vehicle-to-vehicle technology for Wi-Fi instead. The FCC announced that it plans to free up 195 MHz of spectrum in the 5 GHz band for unlicensed use in an effort to address the U.S.' spectrum crisis. This could potentially lead to Wi-Fi speeds faster than 1 gigabit per second."
An anonymous reader writes "Back in late 2012, New York City Mayor Michael Bloomberg attributed the increase in statistical city-wide crime to Apple, noting that thieves had a propensity to target folks using iPhones and iPads. As an illustration of the problem, there were 3,890 more Apple product thefts than in 2012 than there were in 2011. At the time, Mayor Bloomberg's press secretary Marc La Vorgna explained that 'if you just took away the jump in Apple', crime in New York City would have been down year over year. Indeed, the number of major crimes reported in 2011 in NYC came in at 104,948 compared to 108.432 in 2012. If you exclude Apple related thefts from the figures, then the crime rate in 2012 is essentially the same as it was in 2011. In light of that, a new report from the New York Post details that Apple is now working with the NYPD in an effort to curb iPhone and other Apple related thefts."
An anonymous reader writes "The BBC reports that the reclusive country of North Korea is planning to enable 3G mobile internet access. It will not be available to the country's estimated one million mobile users, however. The service will be available only to international visitors, who have been allowed to bring their own mobile devices into the country since January of this year. The decision comes shortly after Google Chairman Eric Schmidt said enabling 3G internet in the country would be 'very easy' during his recent visit there. Currently, North Korean citizens can only access a small number of state-controlled sites. Might this decision open the door for some of them to surreptitiously access the open net?"
First time accepted submitter Lirodon writes "Just when you thought Google's rumored Chrome OS laptop, the Chromebook Pixel, was an elaborate fake, think again. This high-end Chromebook with a 12.85-inch high resolution touchscreen (available in both Wi-Fi only and Verizon LTE versions) and an Intel Core i5 processor under the hood is super fancy, and also super expensive: starting at $1299. Would you want to pay that much for what is essentially a premium netbook?" Engadget has a hands-on with the device.
An anonymous reader writes "A White House petition to make unlocking cell phones legal again has passed the 100,000 signature mark. Passing the milestone means the U.S. government has to issue an official response. On January 26th, unlocking a cell phone that is under contract became illegal in the U.S. Just before that went into effect, a petition was started at whitehouse.gov to have the Librarian of Congress revisit that decision. 'It reduces consumer choice, and decreases the resale value of devices that consumers have paid for in full. The Librarian noted that carriers are offering more unlocked phones at present, but the great majority of phones sold are still locked.'"
First time accepted submitter Dngrsone writes "Some two million people have bought cell-phone wireless signal boosters and have been using them to get better communication between their phones and distant cell towers. But now, the FCC says they all have to turn their boosters off and ask permission from their providers, and register their devices with those providers, before they can turn them back on."
codegen writes "The Ontario Court of Appeal has just ruled that the police can search your cellphone if you are arrested without a warrant if it is not password protected. But the ruling also stated that if it is password protected, then the police need a warrant. Previous to this case there was no decision on if the police could search your phone without a warrant in Canada."
coondoggie writes "The Federal Communications Commission said it wants to make up to 195 megahertz of additional spectrum in the 5 GHz band available to unlicensed wireless devices with the idea that such a move would enable Wi-Fi equipment that can offer faster speeds of one gigabit per second or more, increase overall capacity, and reduce congestion. 'Unlicensed National Information Infrastructure devices today operate in 555 megahertz of spectrum in the 5 GHz band, and are used for short range, high speed wireless connections including Wi-Fi enabled local area networks and fixed outdoor broadband transceivers used by wireless Internet service providers to connect smart phones, tablets and laptops to the broadband network,' the FCC stated."
On January 26th, unlocking a cell phone that is under contract became illegal in the U.S. Just before that went into effect, a petition was started at whitehouse.gov to have the Librarian of Congress revisit that decision. "It reduces consumer choice, and decreases the resale value of devices that consumers have paid for in full. The Librarian noted that carriers are offering more unlocked phones at present, but the great majority of phones sold are still locked." The 30 days time limit on the petition is almost up, and it's about 11,000 signatures shy of the amount necessary to ensure a response from the Obama administration (100,000 total, recently increased from 25,000). The creator of the petition received a Cease & Desist letter from Motorola in 2005 for selling software that would allow users to unlock their phones, and he thinks it's only a matter of time before such legal threats begin again. This is part of a larger battle to protect the way consumers can use their devices. While it's still legal for people to root their phones, the Librarian of Congress failed to expand that legal protection to tablets, even though the devices are incredibly similar. The Librarian's decision (PDF) needs further review, and if the White House petition doesn't get enough signatures by February 23, such a review may not happen.
An anonymous reader writes "Recently, I had found out (through my log files) that my wireless router was subject to a Wi-Fi Protected Setup (WPS) brute force PIN attack. After looking on the Internet and discovering that there are indeed many vulnerabilities to WPS, I disabled it. After a few days, I noticed that I kept intermittently getting disconnected at around the same time every day (indicative of a WPA deauthentication handshake capture attempt). I also noticed that an evil twin has been set up in an effort to get me to connect to it. Through Wi-Fi monitoring software, I have noticed that certain MAC addresses are connected to multiple WEP and WPA2 access points in my neighborhood. I believe that I (and my neighbors) may be dealing with an advanced Wi-Fi leech. What can I do in this situation? Should I bother purchasing a directional antenna, figuring out exactly where the clients are situated, and knocking on their door? Is this something the local police can help me with?"
KermMartian writes "The TI-84 Plus C Silver Edition isn't the first color-screen graphing calculator, or even TI's first color calculator, but it's a refresh of a 17-year-old line that many have mocked as antiquated and overpriced. From an advanced review model, the math features look familiar, solid, and augmented with some new goodies, while programming looks about on par with its siblings. The requisite teardown uncovers the new battery, Flash, ASIC/CPU, and LCD used in the device. Although there are some qualms about its speed and very gentle hardware upgrades beyond the screen, it looks to be an indication that TI will continue this inveterate line for years to come." Lots of screenshots and pictures of the innards too.
Following up on yesterday's news that Ubuntu for Tablets has been announced, Mark Shuttleworth answered questions about the purpose of the new version of Canonical's OS and what its intended strengths will be. He made special note of how Canonical wants the transition between desktop-Ubuntu and mobile-Ubuntu to be smooth. "When you transition from the tablet to the desktop, things don't move around. Your indicators, things like network status and time, they don't jump around on screen, they stay in the same place. That's what's really different certainly between our approach to convergence and for example Windows 8, where when you're in the desktop mode, which looks like Windows 7, and suddenly you get the new tile-based interface, it's a stark transition that can be jarring for users. In our case, you can almost think of those as gentle phase changes. When you go from phone to tablet you're stretching the device in very obvious ways. People who've used iOS on both phones and tablets would expect that. What's nice about Ubuntu is the phase change to the PC experience up from the tablet really just introduces window management, and it also introduces things like menus and dialog boxes. You aren't moving things around in dramatic ways." He added that they expect the user experiences to converge in Ubuntu 14.04. Shuttleworth also addressed the fragmentation problem faced by Android. He says manufacturers and carriers don't want to fall into that trap again, and that they've been receptive to the idea of leaving the core of Ubuntu alone while tweaking their individual services instead.