Fingerprint lock in Samsung Galaxy 5 easily defeated by whitehat hackers

SRLabs The heavily marketed fingerprint sensor in Samsung’s new Galaxy 5 smartphone has been defeated by whitehat hackers who were able to gain unfettered access to a PayPal account linked to the handset. The hack, by researchers at Germany’s Security Research Labs , is the latest to show the drawbacks of using fingerprints, iris scans, and other physical characteristics to authenticate an owner’s identity to a computing device. While advocates promote biometrics as a safer and easier alternative to passwords, that information is leaked every time a person shops, rides a bus, or eats at a restaurant, giving attackers plenty of opportunity to steal and reuse it. This new exploit comes seven months after a separate team of whitehat hackers bypassed Apple’s Touch ID fingerprint scanner less than 48 hours after it first became available. “We expected we’d be able to spoof the S5’s Finger Scanner, but I hoped it would at least be a challenge,” Ben Schlabs, a researcher at SRLabs, wrote in an e-mail to Ars. “The S5 Finger Scanner feature offers nothing new except—because of the way it is implemented in this Android device—slightly higher risk than that already posed by previous devices.” Read 7 remaining paragraphs | Comments

More here:
Fingerprint lock in Samsung Galaxy 5 easily defeated by whitehat hackers

Amazon’s Smartphone Gets Its First Spy Shots Along With Rumored Specs

 Amazon’s smartphone leaks are starting to pile up quickly, and today our own report about some of its 3D features and Android-based FIreOS operating system was followed quickly by an extensive report about the phone’s supposed specs, complete with pics of the gadget housed in a case designed to keep its final look a secret. The pics and specs come from BGR, which reports that Amazon is… Read More

Read this article:
Amazon’s Smartphone Gets Its First Spy Shots Along With Rumored Specs

See Which Folders Are Taking Up Space in Windows 8.1 Settings

Among the other new features in Windows 8.1’s latest update , Microsoft has also added a small rundown of what’s taking up space in your home folder and Recycle Bin. Read more…

Continue Reading:
See Which Folders Are Taking Up Space in Windows 8.1 Settings

Microsoft’s Office Online–the free, web-based version of Word, Excel, PowerPoint and OneNote–is he

Microsoft’s Office Online —the free, web-based version of Word, Excel, PowerPoint and OneNote—is headed for the Chrome Web Store as a series of apps. Read more…

View the original here:
Microsoft’s Office Online–the free, web-based version of Word, Excel, PowerPoint and OneNote–is he

There’ll be no escape from the FBI’s new facial recognition system

If you thought that the NSA wanted too much personal information , just wait a few months. The EFF is reporting that the FBI’s new facial recognition database, containing data for almost a third of the US population, will be ready to launch this summer. Codenamed NGI, the system combines the bureau’s 100 million-strong fingerprint database with palm prints, iris scans and mugshots. Naturally, this has alarmed privacy advocates, since it’s not just felons whose images are added, but anyone who has supplied a photo ID for a government job or background check. According to the EFF’s documents, the system will be capable of adding 55, 000 images per day, and could have the facial data for anything up to 52 million people by next year. Let’s just hope that no-one tells the Feds about Facebook , or we’re all in serious trouble. Filed under: Internet Comments Source: EFF

Read more here:
There’ll be no escape from the FBI’s new facial recognition system

IRS Can Now Seize Your Tax Refund To Pay a Relative’s Debt

Hugh Pickens DOT Com (2995471) writes “Just in time for the April 15 IRS filing deadline comes news from the Washington Post that hundreds of thousands of taxpayers expecting refunds are instead getting letters informing them of tax debts they never knew about: often a debt incurred by their parents. The government is confiscating their checks, sometimes over debts 20—30 years old. For example, when Mary Grice was 4 (in 1960), her father died … ‘Until the kids turned 18, her mother received survivor benefits from Social Security … Now, Social Security claims it overpaid someone in the Grice family in 1977. … Four years after Sadie Grice died, the government is coming after her daughter. … “It was a shock, ” says Grice, 58. “What incenses me is the way they went about this. They gave me no notice, they can’t prove that I received any overpayment, and they use intimidation tactics, threatening to report this to the credit bureaus.”‘ The Treasury Department has intercepted … $75 million from debts delinquent for more than 10 years according to the department’s debt management service. ‘The aggressive effort to collect old debts started three years ago — the result of a single sentence tucked into the farm bill lifting the 10-year statute of limitations on old debts to Uncle Sam.'” Read more of this story at Slashdot.

View the original here:
IRS Can Now Seize Your Tax Refund To Pay a Relative’s Debt

Latest Update Brings KitKat to Google Glass

It’s been a while since we last heard of a software update for Glass and now I guess we know why. The team over at Mountain View has been busy updating the face-computer to run on the latest version of Android (4.4.2 a.k.a. KitKat). Read more…

See more here:
Latest Update Brings KitKat to Google Glass

Police Are Testing a "Live Google Earth" To Watch Crime As It Happens

In Compton last year, police began quietly testing a system that allowed them to do something incredible: Watch every car and person in real time as they ebbed and flowed around the city. Every assault, every purse snatched, every car speeding away was on record—all thanks to an Ohio company that monitors cities from the air. Read more…

Continue reading here:
Police Are Testing a "Live Google Earth" To Watch Crime As It Happens

After Netflix pays Comcast, speeds improve 65%

Netflix’s decision to pay Comcast for a direct connection to the Comcast network has resulted in significantly better video streaming performance for customers of the nation’s largest broadband provider. Netflix has bemoaned the payment, asking the government to prevent Comcast from demanding such interconnection ” tolls .”But there’s little doubt the interconnection has benefited consumers in the short term. Average Netflix performance for Comcast subscribers rose from 1.51Mbps to 1.68Mbps from January to February, though the interconnection didn’t begin until late February. In data released today, Netflix said average performance on Comcast has now risen further  to 2.5Mbps , a 65 percent increase since January. Comcast’s increased speed allowed it to pass Time Warner Cable, Verizon, CenturyLink, AT&T U-verse, and others in Netflix’s rankings. Comcast remains slower than Cablevision, Cox, Suddenlink, Charter, and Google Fiber. Read 4 remaining paragraphs | Comments

Continue reading here:
After Netflix pays Comcast, speeds improve 65%

LogAnalysis maps the structure of gangs using phone records

It’s no surprise that law enforcement agencies use mobile phone records to investigate criminal activity, but a platform called LogAnalysis could facilitate some of the most sophisticated analysis for all that raw data. Developed by Emilio Ferrara and his team at Indiana University, the software uses call records and other info to map hierarchies within criminal organizations according to “social network theory.” (Hint: Those who make the most calls are usually at the bottom, while those in charge tend to communicate the least.) And by automatically importing call records and removing ambiguous or redundant information, LogAnalysis streamlines the process of analyzing that data. In a paper , Ferrara and other researchers describe how LogAnalysis processed call records for a group convicted of several robberies, drug trafficking and extortion. By clustering together calls based on the time and date, the software revealed which numbers traced back to gang members involved in a particular robbery or murder. The data also clumped calls together in 14 different subgroups, revealing individuals (or at least phone numbers) involved in specific crimes. As the MIT Technology Review points out, many of the researchers behind this paper are based in Sicily, so it’s likely that some of the call data in this case comes from Italy. If that’s true, we have a pretty good idea what criminal organization they’re talking about here. Filed under: Networking Comments Via: MIT Technology Review Source: Detecting Criminal Organizations in Mobile Phone Networks (paper)

Read the original:
LogAnalysis maps the structure of gangs using phone records