UPDATE FIXES VERIZON IPHONE 5 DATA GLITCH; CUSTOMERS WON'T BE CHARGED FOR OVERAGES
Verizon iPhone 5 customers may have noticed an issue wherein their phones gobbled up extra cellular data when they were theoretically connected to Wi-Fi networks. Those customers now have two bits of good news: There’s a special software update that fixes the problem, and they won’t be responsible for unexpected charges related to unintended network overages related to the issue that spurred the carrier update in the first place.
10 HOT IT SKILLS FOR 2013
The number of companies planning to hire tech professionals continues to grow, with 33% of the 334 IT executives who responded to Computerworld's 2013 Forecast survey saying they plan to increase head count in the next 12 months..
APPLE WARNS ICLOUD USERS OF LOOMING STORAGE LOSS
Apple on Monday began reminding some iCloud users that they will soon lose the 20GB of free storage they'd received when they migrated from MobileMe.
Nook Video set for fall premier
Barnes and Noble Tuesday announced that Nook Video will premiere this fall in the U.S. and UK. The service will offer access to movies and TV shows for streaming and download.
Eight simple steps to make the upgrade to iPhone 5 easier
A little planning can save time - and voice messages - when you upgrade to the new iPhone 5
Friday, November 2, 2012
Cell-site outages fall to 19 percent in area hit by Sandy, FCC says
Thursday, November 1, 2012
Comcast offers free Wi-Fi in the wake of Sandy
Thursday, October 11, 2012
iPad mini tablet said to be Wi-Fi only
3G iPad mini not coming near term to help keep price down, report says
Monday, January 10, 2011
Hacker to use cloud for brute force WiFi crack
A security researcher claims to have figured out a quick and inexpensive way to break a commonly used form of password protection for wireless networks using powerful computers that anybody can lease from Amazon.com over the Web.
Thomas Roth, a computer security consultant based in Cologne, Germany, says he can hack into protected networks using specialised software that he has written that runs on Amazon's cloud-based computers. It tests 400,000 potential passwords per second using Amazon's high-speed computers.
That leaves businesses as well as home networks prone to attack if they use relatively simple passwords to secure their networks.
Amazon leases time on computers to developers and companies that don't have the money to buy their own equipment, or don't use it frequently enough to justify doing so. Customers include individual programmers and corporate users.
A spokesman for Amazon said that Roth's research would only violate his company's policies if he were to use Amazon Web Services (AWS) and its Elastic Compute Cloud (EC2) computing service to break into a network without permission of its owner.
"Nothing in this researcher's work is predicated on the use of Amazon EC2. As researchers often do, he used EC2 as a tool to show how the security of some network configurations can be improved," said Amazon spokesman Drew Herdener.
"Testing is an excellent use of AWS, however, it is a violation of our acceptable use policy to use our services to compromise the security of a network without authorisation."
Roth will distribute his software to the public and teach people how to use it later this month at the Black Hat hacking conference in Washington, D.C.
He said he is publicising his research in a bid to convince skeptical network administrators that a commonly used method for scrambling data that travels across WiFi network passwords is not strong enough to keep crafty intruders from breaking in to networks.
That encryption method, dubbed WPA-PSK, scrambles data using a single password. If a potential intruder is able to figure out the password, he or she can gain access to computers and other devices on the network.
Roth said that the networks can be broken into if hackers use enough computer power to "brute force" their way into figuring out the passwords that protect networks.
Those passwords were difficult for the average hacker to break until Amazon.com recently started leasing time on powerful computers at relatively inexpensive rates: It takes the processing capability of multiple computers to perform mathematical calculations needed to break the passwords.
The online retailer charges users 28 cents a minute to use machines that Roth used in his attack. It would cost at least tens of thousands of dollars to purchase and maintain that equipment.
Roth said that he used his software and Amazon's cloud-based computers to break into a WPA-PSK protected network in his neighborhood. It took about 20 minutes of processing time. He has since updated his software to speed its performance and believes he could hack into the same network in about 6 minutes.
"Once you are in, you can do everything you can do if you are connected to the network," he said.
Roth said he was not publicising his discovery to encourage crime, but to change a misconception among network administrators:
"People tell me there is no possible way to break WPA, or, if it were possible, it would cost you a ton of money to do so," he said. "But it is easy to brute force them."
Friday, January 30, 2009
T-Mobile Refreshes the BlackBerry Curve
T-Mobile's update of the BlackBerry Curve, the 8900, isn't an earth-shattering revision of one of Research in Motion's most successful QWERTY keyboard models. But for those who are content to browse over T-Mobile's somewhat pokey EDGE network when Wi-Fi isn't available, it offers an improved camera, a sleeker design, and a snappier processor than its predecessor, the Curve 8320 (which is still available from T-Mobile but for US$100 less than the 8900).
Like the 8320, the 8900 is a quad-band phone, meaning you can use it on pretty much any GSM network worldwide. For data, it supports EDGE, the 2.5G network technology that approximates dialup in real-world performance. That's fine for e-mail, but Web browsing is somewhat sluggish (although the desktop-style browser does a good job of rendering large pages and then letting you zoom in on sections of interest).
Black with silver accents, the 8900 is slightly skinnier, a tad more lightweight and more sculpted looking than earlier Curves, with some of the design motifs we've seen in the BlackBerry Bold and Storm. I'm on the fence about the use of red type for keypad numbers, which is more subtle but also makes them slightly less legible than on the 8900's predecessors (which used black on silver). Still, when the phone screen is on, the red numbers do glow so I had no problems dialing. RIM continues to refine its keyboards, and thumb-typing on the Curve is eminently doable. Of course, you get the terrific corporate and Internet e-mail features RIM is known for.
Voice call quality was solid in my tests, Like its predecessor, the 8900 uses UMA technology to let you make voice calls over Wi-Fi when a Wi-Fi network is present. However you must sign up for T-Mobile's Hotspot at Home service to enable seamless transition from Wi-Fi to cellular calls.
The supplied media clips looked good, given the smallish but bright high-res screen. The 8900 comes with the updated media manager introduced since the last Curve, a definite plus. The 3.2-megapixel camera with built in flash and autofocus is also an upgrade from the previous 2-megapixel model, and it definitely shows in the improved images; shutterbugs will appreciate the difference.
Overall performance on apps definitely seemed snappier thanks to the upgraded CPU RIM is touting. Wi-Fi setup was easy and quick. GPS location, on the other hand, wasn't so hot with my production-level unit. The device hung for quite some time on its own requests for satellite fixes, and ultimately appeared to give up. I'm trying to figure out what happened here and will update as needed.
That glitch aside, the Curve 8900 should appeal to T-Mobile BlackBerry fans who feel the original Curve is starting to get a bit tired-and who have no particular need for a handset that supports faster UMTS/DSMA data networks. The rather high $300 pricetag (with a two-year T-Mobile contract) can be lowered to $200 via mail-in rebate when the device hits T-Mobile's retail outlets next week (B to B customers can start ordering now).
Nortel quits WiMax deal with Alvarion
The troubled networking vendor joined with Alvarion last June after cutting back its own WiMax efforts. After years of struggling to recover from a financial scandal and compete against bigger rivals, Nortel filed for bankruptcy earlier this month. Alvarion said in a press release Thursday that Nortel had informed it of the decision to quit the WiMax deal.
Alvarion is a WiMax specialist based in Israel. The collapse of the deal will hurt its fourth-quarter financial results, due to be announced Feb. 4. The company won't be able to recognize about US$2.4 million in revenue from sales of products to Nortel in the quarter. Alvarion expects that to take $0.04 per share out of its fourth-quarter bottom line, which the company now expects to show a loss of $0.08. Nortel is obligated to pay Alvarion for certain research and
"The action, while difficult, was a necessary step addressing Nortel's current situation and intention to narrow the company's focus," said Richard Lowe, Nortel's president of carrier networks, in the press release. The companies are working on shifting over their joint WiMax customers to Alvarion, he said.
Nortel has its own WiMax infrastructure products, but they're best-suited to use in developed markets, said IDC analyst Godfrey Chua. Alvarion's gear is better for the developing world, which still makes up the lion's share of the WiMax market, he said. But Nortel's move didn't surprise Chua.
"They really need to make some hard choices," he said. "They can't stay at the scale where they are now."
Going up against larger rivals, including Alcatel-Lucent, Nokia Siemens Networks and Huawei Technologies, Nortel is likely to sell off parts of its business and become a specialist in one or two technologies, Chua said. The company will probably focus on LTE (Long-Term Evolution), the fourth-generation mobile data system most mobile operators are expected to adopt, he said. But that will be a hard technology to translate into revenue, since it won't be widely deployed until 2010 or 2011.