Don Reisinger reports: Some sleight of hand will allow iOS 6.1 hackers to access your phone application, listen to your voice mails, and place calls. A YouTube video showing users how to “bypass iPhone 5 passcode” on Apple’s latest iOS releases, including iOS 6.1, has been published. The person who uploaded the video shows how anyone can access the…
Category: Business
Lawmakers reintroduce cyberthreat information-sharing bill
Grant Gross reports: Two U.S. lawmakers have reintroduced a controversial cyberthreat information-sharing bill over the objections of some privacy advocates and digital rights groups. As promised, Representatives Mike Rogers, a Michigan Republican, and C.A. “Dutch” Ruppersberger, a Maryland Democrat, have reintroduced the Cyber Intelligence Sharing and Protection Act (CISPA), a bill that would allow private…
Google Play privacy breach (updated with Google’s response)
Dan Nolan writes: About a month ago I put my money where my mouth was and built a version of the Paul Keating insult generator for Android (after the iOS version hit number 1 in the Australian App Store [tell your friends]). We sold a few hundred copies on Android in the last month, so…
The Privacy Legal Implications of Big Data: A Primer
David Navetta writes: By now many lawyers and business managers have heard of the term “Big Data,” but many may not understand exactly what it refers to, and still more likely do not know how it will impact their clients and business (or perhaps it already is). Big Data is everywhere (quite literally). We see…