Sunday, March 29, 2009

Weekend PSA; subscribe to the Smartphones & Cell Phones blog


My ZDNet Mobile Gadgeteer blog has thousands of RSS subscribers and I noticed that this still rather young Smartphones & Cell Phones blog has just a few of you subscribed to the feed. Thus, as a weekend public service announcement I wanted to make you aware that you can subscribe via RSS using your favorite client and know when I post new articles. Did you know you can also sign up for email alerts if you don’t use RSS?

I also wanted to take the time to THANK all of you who read and comment on my blog posts. I do this because I am passionate about mobile technology and have a mission to educate as many people as I can because I think the technology can be used to improve and enhance our lives if used properly. I always welcome your comments and feedback so if there is anything you want to see me write about, feel free to get in touch with me.

Read More......

Monday, March 16, 2009

Health Danger With Cell Phone

BACKGROUND: Cell phones are everywhere. It is estimated that more than 90 percent of the Western world uses cell phones. Some recent estimates show that more than 3 billion people have cell phones worldwide. As the technology becomes cheaper and more accessible, its usage will likely increase among adults and children. While the device is undoubtedly convenient, several new studies show that cell phones may be harmful.


CANCER LINK? A recent study published in the Journal of Epidemiology found heavy cell phone users were subject to a higher risk of benign and malignant tumors of the salivary gland. Those who used a cell phone heavily on the side of the head where the tumor developed were found to have an increased risk of about 50 percent for developing a tumor of the main salivary gland compared to those who did not use cell phones.


FERTILITY PROBLEMS: A study conducted by researchers at the Cleveland Clinic found cell phone use may be linked to infertility problems. Men who used their cell phones for more than four hours per day had the lowest quality of sperm.


SKIN ISSUES: Nickel allergy is common, and people who are allergic to nickel may get a rash on their cheek or ear if they spend a lot of time talking on a cell phone containing nickel. They might also get a rash on their fingers if they send lots of text messages, according to the British Association of Dermatologists. Not all cell phones contain nickel. Recently, researchers at Brown University tested 22 wireless communication devices and found 10 of them contained nickel.


AFFECTING SLEEP: Researchers at Loughborough University in England found that after a 30-minute exposure to cell phone signals in talk mode, people took nearly twice as long to fall asleep as they did when the phone had been off or in standby mode. The scientists believe the effect probably reflects the time it takes the brain to relax after being agitated by the phone's electrical field.


LIMITING USAGE: Experts from the University of Pittsburgh Cancer Institute suggest limiting cell phone exposure. Some of their tips include not allowing children to use a cell phone, except for emergencies. The developing organs of a fetus or child are the most likely to be sensitive to any possible effects of exposure to electromagnetic fields. They also suggest keeping your cell phone away from your body as much as possible, avoiding using your cell phones in places like on a bus where you can passively expose others to your phone's electromagnetic field and switching sides regularly while communicating on your cell phone to spread out your exposure.

Read More......

Tuesday, October 28, 2008

The Most And Top 10 Mysterious Cyber Crimes On The Earth

The best criminal hacker is the one that isn't caught—or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about).


The most nefarious and crafty criminals are the ones who operate completely under the radar. In the computing world security breaches happen all the time, and in the best cases the offenders get tracked down by the FBI or some other law enforcement agency.

But it's the ones who go uncaught and unidentified (those who we didn't highlight in our Cyber Crime Hall Fame that are actually the best. Attempting to cover your tracks is Law-Breaking 101; being able to effectively do so, that's another story altogether.

When a major cyber crime remains unsolved, though, it probably also means that those of us outside the world of tech crime solving may never even know the crime occurred.

These are some of the top headline-worthy highlights in the world of unsolved computing crime—cases in which the only information available is the ruin left in their wake.


The WANK Worm (October 1989)
Possibly the first "hacktivist" (hacking activist) attack, the WANK worm hit NASA offices in Greenbelt, Maryland. WANK (Worms Against Nuclear Killers) ran a banner (pictured) across system computers as part of a protest to stop the launch of the plutonium-fueled, Jupiter-bound Galileo probe. Cleaning up after the crack has been said to have cost NASA up to a half of a million dollars in time and resources. To this day, no one is quite sure where the attack originated, though many fingers have pointed to Melbourne, Australia-based hackers.


Ministry of Defense Satellite Hacked (February 1999)
A small group of hackers traced to southern England gained control of a MoD Skynet military satellite and signaled a security intrusion characterized by officials as "information warfare," in which an enemy attacks by disrupting military communications. In the end, the hackers managed to reprogram the control system before being discovered. Though Scotland Yard's Computer Crimes Unit and the U.S. Air Force worked together to investigate the case, no arrests have been made.


CD Universe Credit Card Breach (January 2000)

A blackmail scheme gone wrong, the posting of over 300,000 credit card numbers by hacker Maxim on a Web site entitled "The Maxus Credit Card Pipeline" has remained unsolved since early 2000. Maxim stole the credit card information by breaching CDUniverse.com; he or she then demanded $100,000 from the Web site in exchange for destroying the data. While Maxim is believed to be from Eastern Europe, the case remains as of yet unsolved.


Military Source Code Stolen (December 2000)

If there's one thing you don't want in the wrong hands, it's the source code that can control missile-guidance systems. In winter of 2000, a hacker broke into government-contracted Exigent Software Technology and nabbed two-thirds of the code for Exigent's OS/COMET software, which is responsible for both missile and satellite guidance, from the Naval Research Lab in Washington, D.C. Officials were able to follow the trail of the intruder "Leaf" to the University of Kaiserslautern in Germany, but that's where the trail appears to end.

Anti-DRM Hack (October 2001)
In our eyes, not all hackers are bad guys (as evidenced by our list of the Ten Greatest Hacks of All Time); often they're just trying to right a wrong or make life generally easier for the tech-consuming public. Such is the case of the hacker known as Beale Screamer, whose FreeMe program allowed Windows Media users to strip digital-rights-management security from music and video files. While Microsoft tried to hunt down Beale, other anti-DRM activists heralded him as a crusader.


Dennis Kucinich on CBSNews.com (October 2003)
As Representative Kucinich's presidential campaign struggled in the fall of 2003, a hacker did what he could to give it a boost. Early one Friday morning the CBSNews.com homepage was replaced by the campaign's logo. The page then automatically redirected to a 30-minute video called "This is the Moment," in which the candidate laid out his political philosophy. The Kucinich campaign denied any involvement with the hack, and whoever was responsible was not identified.


Hacking Your MBA App (March 2006)
Waiting on a college or graduate school decision is a nail-biting experience, so when one hacker found out how to break into the automated ApplyYourself application system in 2006, it was only natural that he wanted to share the wealth. Dozens of top business schools, including Harvard and Stanford, saw applicants exploiting the hack in order to track their application statuses. The still-unknown hacker posted the ApplyYourself login process on Business Week's online forums; the information was promptly removed and those who used it were warned by schools that they should expect rejection letters in the mail.


The 26,000 Site Hack Attack (Winter 2008)
MSNBC.com was among the largest of the thousands of sites used by a group of unknown hackers earlier this year to redirect traffic to their own JavaScript code hosted by servers known for malware. The malicious code was embedded in areas of the sites where users could not see it, but where hackers could activate it.


Supermarket Security Breach (February 2008)
Overshadowed only by a T.J Maxx breach in 2005, the theft of at least 1,800 credit and debit card numbers (and the exposure of about 4.2 million others) at supermarket chains Hannaford and Sweetbay (both owned by the Belgium-based Delhaize Group) in the Northeast United States and Florida remains unsolved more than six months later. Chain reps and security experts are still unclear as to how the criminals gained access to the system; the 2005 T.J.Maxx breach took advantage of a vulnerability in the chain's wireless credit transfer system, but Hannaford and Sweetbay do not use wireless transfers of any sort. Without more information, the difficulty in tracking down those responsible grows exponentially.


Comcast.net Gets a Redirect (May 2008)
A devious hack doesn't always mean finding a back door or particularly crafty way into a secure network or server; sometimes it just means that account information was compromised. Such was the case earlier this year when a member of the hacker group Kryogeniks gained unauthorized access to Comcast.net's registrar, Network Solutions. The domain name system (DNS) hack altered Comcast.net's homepage to redirect those attempting to access webmail to the hackers' own page (pictured). Spokespeople for Comcast and Network Solutions are still unclear as to how the hackers got the username and password.

Read More......

Friday, October 3, 2008

LG Lotus is fashion inspired

If you’re one who prefers form over function, I am pretty sure the LG Lotus cell phone will catch your eye. After all, this is one handset that is the result of a love affair between LG Electronics and fashion designer Christian Siriano. In case that name sounds rather familiar to some of you, that’s because Christian Siriano is the winner of season IV of the reality show known as Project Runway. LG Lotus will be available for preview at the New York City Fashion week from today onwards, aiming to elevate the humble cell phone as some sort of fashion accessory. I thought that place was already taken up by the iPhone 3G, so will this be the new king of the hill?

The LG Lotus is a Sprint exclusive, so those of you who want a piece of the action might have to jump ship if you’re currently attached to a different subscirber. The LG Lotus definitely makes a “distinctive fashion statement”, featuring a full QWERTY keyboard that comes in a clamshell form factor. It takes on a special square shape and will be available in a couple of colors - textured purple or satin black. This will also be one of the initial Sprint devices that boast One Click, a highly-customizable user interface that aims to make texting, Web access, email, Sprint Navigation, Sprint TV, Sprint Music Store and other features a whole lot easier to access.

Just in case you’re wondering whether the international design community thinks this is up to par to go against your thinking that the Lotus is but one man’s wild dream, it has already picked up the Red Dot Design Award, which coincidentally is one of the largest and most renowned design competitions in the world by virtue of the Lotus’ original form factor. Other features that complete this clamshell phone are a 2 megapixel camera with video recording capability, stereo Bluetooth connectivity, music playback with external controls and a microSD memory card slot that is able to handle up to 12GB of storage space. It will hit all Sprint retail channels this October.

Press Release

Read More......

USB Multi-Cellular Phone Charger


I don’t think that all families use only one brand of cell phone, and this is where the USB Multi-Cellular Phone Charge comes in handy. This device is able to cater for all popular brands in the market, including Motorola, Sony Ericsson and Nokia among others. It relies on USB power to juice up your exhausted handsets, which makes it all the more convenient since you can always plug it into your laptop while you’re on a trans-Atlantic flight. Each $18 purchase comes with eight different connectors.

Read More......
Free Unlimited International Calls, Free SMS, free Applications, free Games, free VoIP Calls, Mobile, Landline, GSM, CDMA, PC to Phone Calls, Free Calls: Skype, RebTel, Free SMS to India, Cheap Mobile Calls, Cell Phone, Nokia, Motorola, Sony Ericsson, Haier, LG, Samsung, Wi-Fi, GPRS, IPTV, Mundu Streaming FM, GPS, Bluetooth, iPods, i phone, Nokia , Ringtones, PDA

Free Calls & Free Sms Headline