Man uses Raspberry Pi to build actual working cell phone for $158

David Hunt Raspberry Pi-using tinkerer David Hunt—who previously built a bark-activated door opener for dogs—is at it again with a real, working cell phone powered by the tiny computer and a few other items. “PiPhone” cost Hunt $158 to build with these components, all held together with cable ties: Raspberry Pi Model B – $40 PiTFT Touchscreen 320×240 – $35 2500mAh LiPo battery – $15 SIM900 GSM/GPRS module – $48 DC-DC boost converter 3.3V – 5V 1A – $10 Cables, connectors, switch, etc. – $10 “As you can see from the cost of the components, you’d be FAR better off going into your local phone store and picking up a normal smartphone, but hey, where’s the fun in that?” Hunt wrote on his blog today . “I got a great kick out of the first phone call I made with this thing. And it won’t stay in one piece for long, I’ll be using those parts for other projects very soon!” Read 5 remaining paragraphs | Comments

Follow this link:
Man uses Raspberry Pi to build actual working cell phone for $158

Covert Bitcoin miner found stashed in malicious Google Play apps

Lookout Researchers scouring the official Google Play market have unearthed more Android apps that surreptitiously abuse end-user devices to carry out the computationally intensive process of mining Bitcoins. The malware, dubbed “BadLepricon” by its creators, was stowed away inside six separate wallpaper apps that had from 100 to 500 downloads each, according to a blog post published Thursday by researchers from Lookout, an anti-malware provider for smartphones. Google employees promptly removed the offending apps once Lookout reported them. It’s at least the second time in a month that third-party researchers have discovered cryptocurrency-mining apps available for download on Google servers. Four weeks ago, researchers from Trend Micro reported they found two apps downloaded from one million to five million times that mined the Litecoin and Dogecoin cryptocurrencies without explicitly informing end users. “These apps did fulfill their advertised purpose in that they provided live wallpaper apps, which vary in theme from anime girls to ‘epic smoke’ to attractive men,” Meghan Kelly, a Lookout security communications manager, wrote in Thursday’s blog post. “However, without alerting you in the terms of service, BadLepricon enters into an infinite loop where—every five seconds—it checks the battery level, connectivity, and whether the phone’s display was on.” Read 3 remaining paragraphs | Comments

View article:
Covert Bitcoin miner found stashed in malicious Google Play apps

In just one year, Zynga has lost nearly half of its daily active users

It’s been a rough year for Zynga, which has relegated founder Mark Pincus to being chairman of the board. Fortune Live Media Zynga needs some good news, and fast: in its Tuesday quarterly earnings filling, the company reported that its daily active users rose from 27 million in the last quarter of 2013 to 28 million this quarter. But when compared to the first quarter of 2013 , Zynga had 53 million daily active users—which means the company has lost about half of its most active players in a year. Just months after Zynga spent $527 million on NaturalMotion , maker of Clumsy Ninja , the embattled social gaming firm also announced that it ended its first quarter by losing over $61 million. At this time last year, the company had profited $4.1 million during the first three months of 2013. Still, the company’s chief executive tried to play the loss down. Read 3 remaining paragraphs | Comments

See the original article here:
In just one year, Zynga has lost nearly half of its daily active users

“Russian Facebook” founder flees country after being forced out as CEO

Pavel Durov, founder and former CEO of Vkontakte. Pavel Durov/VK Pavel Durov, the founder of Vkontakte (VK)—the largest social network in Russia—said on Tuesday that he fled the country one day after being forced out of the company, claiming that he felt threatened by Kremlin officials. In a  post on his profile page on Monday, Durov explained that he was fired from his position as CEO of VK and that the so-called “Russian Facebook” is now “under the complete control” of two oligarchs close to President Vladimir Putin. Durov explained that after seven years of relative social media freedom in Russia, his refusal to share user data with Russian law enforcement has set him at odds with the Kremlin, which has recently been trying to tighten its grip on the Internet, according to The Moscow Times . Read 7 remaining paragraphs | Comments

Excerpt from:
“Russian Facebook” founder flees country after being forced out as CEO

Next-gen Thunderbolt doubles speeds but changes the connector

The leaked slide that purports to out the next-generation Thunderbolt controller. VR-Zone Thunderbolt 2 just started showing up in devices late last year, but a new slide leaked by VR-Zone is giving us our first glimpse at what the next version is going to look like. Dubbed “Alpine Ridge,” the new Thunderbolt controllers will double Thunderbolt 2’s bandwidth from 20Gbps to 40Gbps, will reportedly support PCI Express 3.0, and will reduce power usage by 50 percent compared to current controllers. The downside is that the new version will require the use of a new connector—it supports charging for devices that use up to 100W of power and it’s 3 mm shorter than current connectors, but adapters will be required to maintain compatibility with older Thunderbolt accessories. Doubling the available bandwidth will enable next-generation Thunderbolt controllers to drive two 4K displays simultaneously, where current controllers can only drive one. The new controllers will allegedly be compatible with a variety of other protocols as well, including DisplayPort 1.2, USB 3.0, and HDMI 2.0. Intel will offer two different versions of the controller—a version that uses four PCI Express lanes to drive two Thunderbolt ports and an “LP” (presumably “Low Power”) version that uses two PCI Express lanes to drive one port. This is consistent with the current controllers. High-end devices like the Mac Pro and Retina MacBook Pro use two-port controllers, while lower-end, lower-power devices like the Mac Mini and MacBook Air use the one-port version. Thunderbolt 2 gave the specification a performance boost but didn’t change all that much about the protocol. It combined the original Thunderbolt’s two 10Gbps channels to allow for higher maximum speeds, but it didn’t increase the total amount of bandwidth available or introduce any new protocols. The upside is that it maintained full compatibility with all of the original Thunderbolt cables and accessories, something that this next-generation Thunderbolt controller won’t be able to do without adapters (though to be fair, USB 3.1 and the new Type-C USB connector have the same problem). Read 2 remaining paragraphs | Comments

View original post here:
Next-gen Thunderbolt doubles speeds but changes the connector

Active malware campaign steals Apple passwords from jailbroken iPhones

Sophos Security researchers have uncovered an active malware campaign in the wild that steals the Apple ID credentials from jailbroken iPhones and iPads. News of the malware, dubbed “unflod” based on the name of a library that’s installed on infected devices, first surfaced late last week on a pair of reddit threads here and here . In the posts, readers reported their jailbroken iOS devices recently started experiencing repeated crashes, often after installing jailbroken-specific customizations known as tweaks that were not a part of the official Cydia market , which acts as an alternative to Apple’s App Store. Since then, security researcher Stefan Esser has performed what’s called a static analysis on the binary code that the reddit users isolated on compromised devices. In a blog post reporting the results , he said unflod hooks into the SSLWrite function of an infected device’s security framework. It then scans it for strings accompanying the Apple ID and password that’s transmitted to Apple servers. When the credentials are found, they’re transmitted to attacker-controlled servers. Read 6 remaining paragraphs | Comments

Link:
Active malware campaign steals Apple passwords from jailbroken iPhones

Comcast bills lowered $2.4 million by scammers who accessed billing system

Alyson Hurt Two men pleaded guilty to a scam that lowered the bills of 5,790 Comcast customers in Pennsylvania by a total of $2.4 million. They now face prison time and will have to pay their ill-gotten wealth back to Comcast. 30-year-old Richard Justin Spraggins of Philadelphia pleaded guilty in February and was “ordered to make $66,825 in restitution and serve an 11- to 23-month sentence,” the Times-Herald of Norristown wrote at the time. Scaggins was described as the second-in-command of the operation. The accused ringleader, 30-year-old Alston Buchanan, pleaded guilty last week . “Buchanan faces up to 57½ to 115 years in prison, although Buchanan will likely serve a lesser sentence than the maximum,” the newspaper wrote. Read 3 remaining paragraphs | Comments

Read the original post:
Comcast bills lowered $2.4 million by scammers who accessed billing system

How to Contact Executive Customer Service and Get Your Problem Solved

We’ve all been there: You call customer service, get bounced around, transferred, and dropped. Or worse, your issue never gets resolved even after you talk to someone. You probably know you can escalate to a manager, or even higher, to “executive” support. But at that level, there’s an art to getting what you want. Here’s what you need to know. Read more…

Read More:
How to Contact Executive Customer Service and Get Your Problem Solved

Lavabit held in contempt of court for printing crypto key in tiny font

Image by Rene Walter A federal appeals court on Wednesday upheld a contempt of court ruling against Ladar Levison and his now-defunct encrypted e-mail service provider, Lavabit LLC, for hindering the government’s investigation into the National Security Agency leaks surrounding Edward Snowden. In the summer of 2013, Lavabit was ordered to  provide real-time e-mail monitoring  of one particular user of the service, believed to be Snowden, the former NSA contractor turned whistleblower. Instead of adequately complying with the order to turn over the private SSL keys that protected his company’s tens of thousands of users from the government’s prying eyes, Levison chose instead to shut down Lavabit last year after weeks of stonewalling the government. However, Levison reluctantly turned over his encryption keys to the government, although not in a manner that the government deemed useful, and instead provided a lengthy printout with tiny type, a move the authorities said was objectionable. “The company had treated the court orders like contract negotiations rather than a legal requirement,” US Attorney Andrew Peterson, who represented the government, told  PC World . Read 5 remaining paragraphs | Comments

Read More:
Lavabit held in contempt of court for printing crypto key in tiny font

Fingerprint lock in Samsung Galaxy 5 easily defeated by whitehat hackers

SRLabs The heavily marketed fingerprint sensor in Samsung’s new Galaxy 5 smartphone has been defeated by whitehat hackers who were able to gain unfettered access to a PayPal account linked to the handset. The hack, by researchers at Germany’s Security Research Labs , is the latest to show the drawbacks of using fingerprints, iris scans, and other physical characteristics to authenticate an owner’s identity to a computing device. While advocates promote biometrics as a safer and easier alternative to passwords, that information is leaked every time a person shops, rides a bus, or eats at a restaurant, giving attackers plenty of opportunity to steal and reuse it. This new exploit comes seven months after a separate team of whitehat hackers bypassed Apple’s Touch ID fingerprint scanner less than 48 hours after it first became available. “We expected we’d be able to spoof the S5’s Finger Scanner, but I hoped it would at least be a challenge,” Ben Schlabs, a researcher at SRLabs, wrote in an e-mail to Ars. “The S5 Finger Scanner feature offers nothing new except—because of the way it is implemented in this Android device—slightly higher risk than that already posed by previous devices.” Read 7 remaining paragraphs | Comments

More here:
Fingerprint lock in Samsung Galaxy 5 easily defeated by whitehat hackers