Smartphone Used To Scan Data From Chip-Enabled Credit Cards

An anonymous reader sends this news from the CBC: “Using a Samsung Galaxy SIII — one of the most popular smartphones available in Canada — and a free app downloaded from the Google Play store, CBC was able to read information such as a card number, expiry date and cardholder name simply holding the smartphone over a debit or credit card. And it could be done through wallets, pockets and purses. … Although the NFC antennas in current smartphones need to be very close to a card in order to work — no farther than 10 cm — that could change with the next generation of Android smartphones. Legary said the Samsung Galaxy S4, set to go on sale this spring, might have a much more capable NFC antenna, which could not only read credit cards from a greater distance, but could also be able to read the chips embedded in enhanced driving licenses and passports.” Read more of this story at Slashdot.

More here:
Smartphone Used To Scan Data From Chip-Enabled Credit Cards

More evidence that Haiti’s cholera epidemic started with UN Peacekeepers

Haiti has been battling a massive cholera outbreak since, roughly, around the time international aid groups arrived in the country following the 2010 earthquake. Now, genetic evidence links the strain of cholera in Haiti to a rare strain native to Nepal — further proof that it was Nepalese UN Peacekeepers who brought cholera to Haiti . This news comes two months after the UN claimed immunity from any financial liability relating to the outbreak, writes Stacey Singer at the Palm Beach Post.        

See the original article here:
More evidence that Haiti’s cholera epidemic started with UN Peacekeepers

New US$100 bill in circulation 10/8

The new US$100 bill will go into circulation on October 8, 2013. New security features include a “3-D Security Ribbon” woven into the paper. The image changes from bells to 100s with the viewing angle, and “color-shifting” bell graphic that changes from copper to green, “an effect which makes the bell seem to appear and disappear within the (copper-colored) inkwell.” ” The Redesigned $100 Note ”        

Follow this link:
New US$100 bill in circulation 10/8

Federal Magistrate Rules That Fifth Amendment Applies To Encryption Keys

Virtucon writes “U.S. Magistrate William Callahan Jr. of Wisconsin has ruled in favor of the accused in that he should not have to decrypt his storage device. The U.S. Government had sought to compel Feldman to provide his password to obtain access to the data. Presumably the FBI has had no success in getting the data and had sought to have the judge compel Feldman to provide the decrypted contents of what they had seized. The Judge ruled (PDF): ‘This is a close call, but I conclude that Feldman’s act of production, which would necessarily require his using a password of some type to decrypt the storage device, would be tantamount to telling the government something it does not already know with “reasonably particularity” — namely, that Feldman has personal access to and control over the encrypted storage devices. Accordingly, in my opinion, Fifth Amendment protection is available to Feldman. Stated another way, ordering Feldman to decrypt the storage devices would be in violation of his Fifth Amendment right against compelled self-incrimination.'” If the government has reasonable suspicion that you have illicit data, they can still compel you to decrypt it. Read more of this story at Slashdot.

Read this article:
Federal Magistrate Rules That Fifth Amendment Applies To Encryption Keys

This Is the Camera That Found Dzhokhar Tsarnaev

Law enforcement didn’t pull any punches during its manhunt for the Boston Marathon bombers, going so far as to lock down an entire metropolis while they searched. Even when officers thought they had the second suspect cornered in Watertown boat, they confirmed their suspicions with a camera that can spot people from up to 10 miles away. Just to be sure. More »        

More:
This Is the Camera That Found Dzhokhar Tsarnaev

Do you know more about science than the average American?

Feeling science-savvy? Take Pew Research Center’s 13 question Science and Technology Knowledge Quiz and see where you stand against a representative sampling of Americans. Read more…        

View post:
Do you know more about science than the average American?

More Cannovation? ‘360 Lid’ Beer Can Making the Rounds

While Budweiser’s new bowtie-shaped beer can is a couple of weeks away from launch, a series of smaller breweries have already launched another new type of can: One with a ” 360 Lid ” that peels completely away, allowing tipplers to drink brew through a circular, drinking-glass-like aperture. Here at the Core77 offices we rarely drink beer out of cans. (That’s not snobbery; unlike bottles, cans cannot be broken against desks and wielded as weapons during editorial squabbles that devolve into melees.) But the few times we have, we’ve never had a problem getting beer to pour from the tab-sized opening into our gulping mouths. So why the new can? Pennsylvania-based licenser Sly Fox Brewing Company insists a circular opening “allows the full flavor and aroma of the beer to hit the drinker’s senses.” And yes, the drinking rim is rounded over, so you don’t cut your lips with each swig. (more…)        

View the original here:
More Cannovation? ‘360 Lid’ Beer Can Making the Rounds

BitTorrent Sync creates private, peer-to-peer Dropbox, no cloud required

BitTorrent today released folder syncing software that replicates files across multiple computers using the same peer-to-peer file sharing technology that powers BitTorrent clients. The free BitTorrent Sync application is labeled as being in the alpha stage, so it’s not necessarily ready for prime-time, but it is publicly available for download and working as advertised on my home network. BitTorrent, Inc. (yes, there is a legitimate company behind BitTorrent ) took to its blog to announce  the move from a pre-alpha, private program to the publicly available alpha. Additions since the private alpha include one-way synchronization, one-time secrets for sharing files with a friend or colleague, and the ability to exclude specific files and directories. Read 13 remaining paragraphs | Comments

Read the article:
BitTorrent Sync creates private, peer-to-peer Dropbox, no cloud required

China Behind 96% of All Cyber-Espionage Data Breaches, Verizon Report Claims

colinneagle writes “Verizon’s 2013 Data Breach Investigation Report is out and includes data gathered by its own forensics team and data breach info from 19 partner organizations worldwide. China was involved in 96% of all espionage data-breach incidents, most often targeting manufacturing, professional and transportation industries, the report claims. The assets China targeted within those industries included laptop/desktop, file server, mail server and directory server, in order to steal credentials, internal organization data, trade secrets and system info. A whopping 95% of the attacks started with phishing to get a toehold into their victim’s systems. The report states, ‘Phishing techniques have become much more sophisticated, often targeting specific individuals (spear phishing) and using tactics that are harder for IT to control. For example, now that people are suspicious of email, phishers are using phone calls and social networking.’ It is unknown who the nation-state actors were in the other 4% of breaches, which the report says ‘may mean that other threat groups perform their activities with greater stealth and subterfuge. But it could also mean that China is, in fact, the most active source of national and industrial espionage in the world today.'” The report also notes that financially-motivated incidents primarily came from the U.S. and various Eastern European countries. Read more of this story at Slashdot.

Read the article:
China Behind 96% of All Cyber-Espionage Data Breaches, Verizon Report Claims