LG Smart TV Phones Home

The owner of an LG Smart TV says he’s got evidence that the TV is sending details about his viewing habits and the names of some video files he watched on the TV back to LG, against his instructions. The British blogger Dr Beet (who the BBC names as IT consultant Jason Huntley) says he […]



Rounding error robot no multi-million dollar operation

A Romanian security researcher has created a machine that can take advantage of rounding errors to make money at the expense of banks. Yes, that’s a key plot point in Office Space (among other movies), and no, it wouldn’t exactly be as profitable as in the movie. Adrian Furtuna is a penetration tester for KPMG […]

Google to Share DDoS Defenses

Google has unveiled three tools expressly designed to aid people whose internet communication is threatened by oppressive regimes. It could create an awkward ethical debate about which side is “right” in both political and legal conflicts. The tools debuted as part of Google Ideas, a conference in New York looking at how tech can play […]



Opinions on Internet Privacy [Comic]

I’m the philosopher until someone hands me a burrito. So geeks, which train of thought do You follow? Let us know in the comments section below! [Source: XKCD]

Rogue iOS App Makes Evil Transformation

Researchers at Georgia Tech say they’ve found a creative way to bypass the iTunes store security reviews: by having an app mutate once it’s installed. The same researchers also say they’ve found a way of carrying out a physical attack on iOS devices, though Apple has already mitigated it to some extent. Tielei Wang of […]

Finally: Android Gets a la Carte Permissions Control

Android devices may soon offer users far more control over what access apps have to their data and hardware. The latest release has a hidden feature that removes the all-or-nothing approach to access. A key part of the Android security system is the “permissions” system which controls dozens of settings that say whether or not […]

NSA scandal loophole: US citizen communications are compromised

The National Security Agency can gather and keep information about US citizens from online communications without a warrant for up to five years — as long as they get it by “accident”. That’s the revelation in the latest leaked documents in the NSA scandal. To date the story has largely centered on the ability of […]

Protecting Your Privacy [Comic]

For those of you who aren’t aware of what this comic is about, read this enlightening post on The New Yorker. [Source: Joy Of Tech]