SternisheFan writes with this snippet from gizmodo: "The Associated Press reports that smartphone robberies now account for nearly half of all robberies in San Francisco, as well as an impressive 40 percent here in New York City. And the numbers aren't just high, they're getting higher fast. In Los Angeles, smartphone robberies are up 27 percent from last year, with no signs of slowing down. The thefts come in all varieties as well. Victims have reported having their phones—iPhones in particular (surprise!)—yanked out of their hands while talking, snatched just as public transit reaches a stop, or even taken at gunpoint." When I was relieved at gunpoint of my (very, very dumb) phone a few years ago in Philadelphia (very, very dumb), it made for a lousy evening. Have you been robbed (or accosted) like this? If so, where?
New submitter jaa101 writes "Facebook has refused a request from Australian police to take down a page with details of undercover police vehicles saying it cannot stop people taking photos in public places. The original story is paywalled and it doesn't give a link to the relevant page which seems to be here . This page for the state of Victoria has 12000 likes but a similar page for the state of Queensland has over 34000, and there are other Australian pages too."
An anonymous reader writes "In his latest story, Brian Krebs reports on a collaboration between brand holders and credit card companies to shut down payment processing for rogue online pharmacies, pirate software sellers and fake anti-virus scams. By conducting test purchases, they map out which banks are being used to accept payments for which scams. Writes Krebs, 'Following the money trail showed that a majority of the purchases were processed by just 12 banks in a handful of countries, including Azerbaijan, China, Georgia, Latvia, and Mauritius.' These results are then fed to Visa and Mastercard who typically shut down the merchant accounts 'within one month after a complaint was lodged.' If you can't accept payments, you can't make money — and without money you can't pay the spammers who advertise your product. This effort is apparently quite effective and has led to much concern by those running such sites."
e065c8515d206cb0e190 writes "Several websites have announced the launch of Silent Circle, PGP's founder Phil Zimmermann's new suite of tools for the paranoid. After a first day glitch with a late approval of their iOS app, the website seems to now accept subscriptions. Have any slashdotters subscribed? What does SilentCircle provide that previous applications didn't have?"
theodp writes "The NY Times reports a judge in the second-degree murder case against George Zimmerman has ruled that Trayvon Martin's school and social media records should be provided to the defense. Judge Debra S. Nelson said Martin's Twitter, Facebook and school records were relevant in the self-defense case. In those instances, showing whether a victim 'had an alleged propensity to violence' or aggression is germane, the judge said. The defense also got permission for access to the social media postings of a Miami girl who said she was on the phone with Martin just before the shooting. Time to update the Miranda warning to include: 'Anything you Tweet or post can and will be held against you in a court of law'?'"
Trailrunner7 writes "There are thousands of apps in the Google Play mobile market that contain serious mistakes in the way that SSL/TLS is implemented, leaving them vulnerable to man-in-the-middle attacks that could compromise sensitive user data such as banking credentials, credit card numbers and other information. Researchers from a pair of German universities conducted a detailed analysis of thousands of Android apps and found that better than 15 percent of those apps had weak or bad SSL implementations. The researchers conducted a detailed study of 13,500 of the more popular free apps on Google Play, the official Android app store, looking at the SSL/TLS implementations in them and trying to determine how complete and effective those implementations are. What they found is that more than 1,000 of the apps have serious problems with their SSL implementations that make them vulnerable to MITM attacks, a common technique used by attackers to intercept wireless data traffic. In its research, the team was able to intercept sensitive user data from these apps, including credit card numbers, bank account information, PayPal credentials and social network credentials."
Bismillah writes "The 'Skynet' anti-filesharing law introduced last year in New Zealand is starting to bite, with people being hauled in front of the Copyright Tribunal by the music industry after receiving three notices. Of the three Copyright Tribunal cases to be heard currently, the first one's just been dropped. Why? Nobody knows. RIANZ isn't saying. Interesting things: the accused was the ISP account holder, a student sharing a place with others who also used the Internet connection. The cost of the five songs downloaded is NZ$11.95 but RIANZ wanted NZ$1,075.50 because it estimated the music was shared/downloaded 90 times in total. A high deterrent penalty of NZ$1,250 was also asked for."
CuteSteveJobs writes "The New Matilda reports how the U.S. is now able to extradite people for minor offences, and asks why foreign governments so willingly give up their nationals to the U.S. to 'face justice' over minor crimes committed outside U.S. borders? Lawyer Kellie Tranter writes, 'the long arm of the Government is using criminal enforcement powers to enforce commercial interests at the behest of corporations and their lobbyists.' A former NSW Chief Judge said it was bizarre 'that people are being extradited to the U.S. to face criminal charges when they have never been to the U.S. and the alleged act occurred wholly outside the U.S.' He said although copyright violations are a great problem, a country 'must protect its nationals from being removed from their homeland to a foreign country merely because the commercial interests of that foreign country.' Australia recently 'streamlined' its laws to make extradition to the U.S. even easier."
An anonymous reader writes "For all of those wondering about China's massive high speed rail network, it costs some serious cash. Running high speed lines across the nation is expensive — to the tune of $100 billion dollars a year. This covers the cost to maintain the network, build it, and pay all of the staff. The problem is, corruption has reared its ugly head. The network itself has had its share of problems, with people dying as a result. There is also the problem that many of Chinese poor make so little money they can't afford to ride it. The sad fact is that so much money is being spent, no one can even keep count."
hypnosec writes "The Dutch Ministry of Justice and Security has proposed some rather over the line measures and wants to extend such powers to the police that would allow them to break into computers and mobile phones in any part of the world. According to the proposal (PDF in Dutch), dated October 15, the ministry has asked for powers that would allow police to not only break into computers, but also allow them to install spyware, search for data in those computers, and destroy data. As explained by digital rights group 'Bits of Freedom,' which obtained the copy of the proposal, if the Dutch police get such powers, the security of computer users would be lessened and there will be a 'perverse incentive to keep information security weak.'"
OverTheGeicoE writes "If you're concerned about possible health effects from TSA's X-ray body scanners, you might be pleased to learn that TSA is making changes. TSA is removing X-ray body scanners from major airports including Los Angeles International, Boston's Logan, Chicago's O'Hare, and New York City's JFK. Then again, these changes might not please you at all, because they are not mothballing the offending devices. No, they are instead moving them to smaller airports like the one in Mesa, AZ. Is this progress, or is TSA just moving potentially dangerous scanners from 'Blue' areas to 'Red' ones right before a presidential election?"
Yesterday we ran a video interview with Eben Moglen, who according to Wikipedia, "is a professor of law and legal history at Columbia University, and is the founder, Director-Counsel and Chairman of [the] Software Freedom Law Center." And as we also said yesterday, since 2011 he's been working with FreedomBox, a project working toward "a personal server running a free software operating system, with free applications designed to create and preserve personal privacy." Prof. Moglen is also one of the most polished speakers anywhere, on any topic, in our opinion. So please enjoy this second video of him speaking to (and answering questions from) Slashdot readers.
An anonymous reader sends this quote from the Chronicle of Higher Education: "[Minnesota's] Office of Higher Education has informed the popular provider of massive open online courses, or MOOC's, that Coursera is unwelcome in the state because it never got permission to operate there. It's unclear how the law could be enforced when the content is freely available on the Web, but Coursera updated its Terms of Service to include the following caution: 'Notice for Minnesota Users: Coursera has been informed by the Minnesota Office of Higher Education that under Minnesota Statutes (136A.61 to 136A.71), a university cannot offer online courses to Minnesota residents unless the university has received authorization from the State of Minnesota to do so. If you are a resident of Minnesota, you agree that either (1) you will not take courses on Coursera, or (2) for each class that you take, the majority of work you do for the class will be done from outside the State of Minnesota.' Tricia Grimes, a policy analyst for the state's Office of Higher Education, said letters had been sent to all postsecondary institutions known to be offering courses in Minnesota."
coondoggie writes "It's not clear if the Federal Trade Commission is throwing up its hands at the problem or just wants some new ideas about how to combat it, but the agency is now offering $50,000 to anyone who can create what it calls an innovative way to block illegal commercial robocalls on landlines and mobile phones."
schliz writes "This week, Australia's Attorney-General released a discussion paper about introducing laws that would force companies to notify members of the public any time personal information about that customer falls into the wrong hands. California introduced similar mandatory data breach notification laws in 2003, but Australian privacy advocates are now opposing the move, saying it's a decade too late."