Meshach writes "Google has been found guilty for refusing to take down a libelous search result in an Australian court (ruling). Music promoter Milorad Trkulja sued Google for refusing to take down links to website articles promoting libelous claims that Trkulja was connected to organized crime in Melbourne. Google told Trkulja to contact the sites on which the offensive materials were posted, as those webmasters controlled the content. But the Supreme Court of Victoria decided Google was responsible for removing the damaging links the moment Trkulja asked them to remove the content. As a result of the jury's decision in the case, Google will have to pay $200,000 in damages to Trkulja."
Lucas123 writes "Next year, smart phones will begin shipping with the ability to have dual identities: one for private use and the other for corporate. Hypervisor developers, such as VMware and Red Bend, are working with system manufacturers to embed their virtualization software in the phones, while IC makers, such as Intel, are developing more powerful and secure mobile device processors. The combination will enable mobile platforms that afford end users their own user interface, secure from IT's prying eyes, while in turn allowing a company to secure its data using mobile device management software. One of the biggest benefits dual-identity phones will offer is enabling admins to wipe corporate data from phones without erasing end users profiles and personal information."
An anonymous reader writes "As if we needed further proof that DRM really is more trouble for publishers and consumers than it's worth, Good Old Games, the DRM-free download store that specializes in retro games, has yet more damning evidence. In an interview this week, the store's managing director says that its first venture into day one releases earlier this year with Witcher 2 was a storming success — and the version that hit the torrent sites was a cracked DRM version bought from a shop. The very definition of irony."
MyFirstNameIsPaul writes "In an announcement dated Monday, Nov 26, 2012, Dublin-based InTrade stated 'that due to legal and regulatory pressures, InTrade can no longer allow U.S. residents to participate in our real-money prediction markets.' The Washington Post reports that the Commodity Futures Trading Commission filed a complaint in federal court against InTrade for 'illegally facilitating bets on future economic data, the price of gold and even acts of war,' demonstrating just how far the long arm of U.S. law can reach."
Sparrowvsrevolution writes "You may remember a vulnerability in four million keycard locks presented at the Black Hat conference in July. Hacker Cody Brocious showed he could insert a device he built for less than $50 into the port at the bottom of the common hotel lock, read a key out of its memory, and open it in seconds. Two months later, it turns out at least one burglar was already making use of that technique to rob a series of hotel rooms in Texas. The Hyatt House Galleria in Houston has revealed that in at least three September cases of theft from its rooms, the thief used that Onity vulnerability to effortlessly open rooms and steal valuables like laptops. Petra Risk Solutions, an insurance firm focus the hospitality industry also reports that at least two other hotels in Texas were hit with the attack. Onity has been criticized for its less-than-stellar response to a glaring vulnerability in its devices. The Hyatt says Onity didn't provide a fix until after its break-ins, forcing the hotel to plug its locks' ports with epoxy. And even now, Onity is asking its hotel customers to pay for the full fix, which involves replacing the locks' circuit boards."
Dupple writes "When a cellphone is reported stolen in New York, the Police Department routinely subpoenas the phone's call records, from the day of the theft onward. The logic is simple: If a thief uses the phone, a list of incoming and outgoing calls could lead to the suspect. But in the process, the Police Department has quietly amassed a trove of telephone logs, all obtained without a court order, that could conceivably be used for any investigative purpose. The call records from the stolen cellphones are integrated into a database known as the Enterprise Case Management System, according to Police Department documents from the detective bureau. Each phone number is hyperlinked, enabling detectives to cross-reference it against phone numbers in other files."
coondoggie writes "Sandia National Laboratories physicist Willis Whitfield, 92, passed away earlier this month and left a technological legacy that continues to reverberate today: The legendary clean room. The original laminar-flow 10 x 6 clean room developed 50 years ago by Whitfield was more than 1,000 times cleaner than any cleanrooms used at the time and ultimately revolutionized microelectronics, healthcare and manufacturing development. According to Sandia, with slight modifications, it is still the clean room standard today."
coondoggie writes "A team of world-wide law enforcement agencies took out 132 domain names today that were illegally selling counterfeit merchandise online. The group, made up of U.S. Immigration and Customs Enforcement's Homeland Security Investigations and law enforcement agencies from Belgium, Denmark, France, Romania, United Kingdom and the European Police Office, targeted alleged counterfeiters selling everything from professional sports jerseys, DVD sets, and a variety of clothing to jewelry and luxury goods."
An anonymous reader writes "The Illinois anti-eavesdropping law was cut down slightly. While protecting the average citizen from eavesdropping, it also put in place prohibitions against recording the police as they were doing their jobs. An appeals court sided with the ACLU, saying that it was too great a restriction on First Amendment rights. Today, the U.S. Supreme Court refused to hear the appeal, cementing in place the lower court's ruling. In Illinois, you can now secretly record the police."
An anonymous reader writes "Ordered to tell Samsung all of the company's HTC secrets, Apple throws a tantrum and adds a bunch of new products to the never-ending list of products Samsung has infringed on. Apple's tantrum stems from a ruling on Thursday that could have a large effect on the Apple lawsuit. The Apple lawsuit, which was filed in February, alleges that Samsung violated Apple patents related to user interface, technology and style. The first decision was found in favor of Apple to the tune of $1 billion, but Samsung is trying to get that ruling thrown out. But as the Apple lawsuit has gone on, the Apple lawsuit has gotten fiercer, and because of a ruling on Thursday, Apple throws a tantrum and is trying to add even more products into the lawsuit."
The tough economic times have had a huge effect on scientific research and development funding. The looming "fiscal cliff" may be the last straw for many programs. "The American science programs that landed the first man on the moon, found cures for deadly diseases and bred crops that feed the world now face the possibility of becoming relics in the story of human progress. American scientific research and development stands to lose thousands of jobs and face a starvation diet of reduced funding if politicians fail to compromise and halt the United States' march towards the fiscal cliff's sequestration of federal funds."
cstacy writes "The Nassau County (New York) Police Department is 'very concerned' about reports that shreds of police documents (with social security numbers, phone numbers, addresses, license plate numbers, incident reports, and more) rained down as confetti in the Macy's Thanksgiving Day Parade. The documents also unveiled the identities of undercover officers, including their SSNs and bank information, according to WPIX-TV. Macy's has no idea how this happened, as they use commercial, colored confetti, not shredded paper."
An anonymous reader writes "We've heard this one before, over and over again: pirates are the biggest spenders. It therefore shouldn't surprise too many people to learn that shutting down Megaupload earlier this year had a negative effect on box office revenues. The latest finding comes from a paper titled: 'Piracy and Movie Revenues: Evidence from Megaupload.'"
Hugh Pickens writes "The Orlando Sentinel reports that a google search was made for the term 'foolproof suffocation' on the Anthony family's computer the day Casey Anthony's 2-year-old daughter Caylee was last seen alive by her family — a search that did not surface at Casey Anthony's trial for first degree murder. In the notorious 31 days which followed, Casey Anthony repeatedly lied about her and her daughter's whereabouts and at Anthony's trial, her defense attorney argued that her daughter drowned accidentally in the family's pool. Anthony was acquitted on all major charges in her daughter's death, including murder. Though computer searches were a key issue at Anthony's murder trial, the term 'foolproof suffocation' never came up. 'Our investigation reveals the person most likely at the computer was Casey Anthony,' says investigative reporter Tony Pipitone. Lead sheriff's Investigator Yuri Melich sent prosecutors a spreadsheet that contained less than 2 percent of the computer's Internet activity that day and included only Internet data from the computer's Internet Explorer browser – one Casey Anthony apparently stopped using months earlier — and failed to list 1,247 entries recorded on the Mozilla Firefox browser that day — including the search for 'foolproof suffocation.' Prosecutor Jeff Ashton said in a statement to WKMG that it's 'a shame we didn't have it. (It would have) put the accidental death claim in serious question.'"
An anonymous reader sends this excerpt from The Hill: "The past week's violence in Gaza has rekindled calls for Twitter to shutter the accounts of U.S.-labeled terror groups such as Hamas. Seven House Republicans asked the FBI in September to demand that Twitter take down the accounts of U.S.-designated terrorist groups, such as Hamas, Hezbollah and Somalia's al Shabaab. The letter to FBI Director Robert Mueller was spearheaded by Rep. Ted Poe (R-Texas), who said Wednesday that the recent events vindicated the request. 'Allowing foreign terrorist organizations like Hamas to operate on Twitter is enabling the enemy,' [Poe said] 'Failure to block access arms them with the ability to freely spread their violent propaganda and mobilize in their War on Israel.'"