Category: Mobile Phones
-
T-Mobile Voice Mail Compromise Demonstrated for Gizmodo
Reading Time: < 1 minuteGizmodo published an article yesterday that says that a mobile security firm has reverse engineered the exploit used to access the T-Mobile voice mailboxes of several celebrities. A security consultant demonstrated this to Joel Johnson by gaining unauthorized access to Joel’s voice mail while he waited. This article further illustrates the…
-
Bluetake BT400 G5 Headset Pairs with Multiple Bluetooth Phones Simultaneously
Reading Time: < 1 minuteGeekzone published an interesting review of the Bluetake BT400 G5 Bluetooth Headset. The feature that stood out for me is the BT400 G5’s ability to pair with multiple Bluetooth-enabled mobile phones simultaneously. The reviewer was able to successfully answer calls on two phones, rapidly alternating between the two. Although most of…
-
PalmSource Chooses SyncML for Future Handheld Synchronisation
Reading Time: < 1 minuteBrighthand reports that PalmSource is developing new synchronisation tools for the PalmOS based on SyncML, an XML-based vendor-independent standard. This is a smart move by PalmSource because it: begins the process of getting them out of the desktop organizer business, gives the customer more personal information management application choices (including PC…
-
Larry Magid Thinks the Paris Hilton Data Theft Will Compel Mobile Carriers to Improve Security
Reading Time: < 1 minuteLarry Magid of CBSnews.com thinks that the Paris Hilton Sidekick II Personal Data Theft will force mobile carriers to improve security. He thinks that her role as the victim in this situation may be her “greatest contribution to mankind”. Perhaps that’s a bit of an overstatement. I like the idea that…
-
My.T-Mobile.com Website Still Has Some Potentially Dangerous Vulnerabilities
Reading Time: < 1 minuteEarlier today, I reported on the publication of Paris Hilton’s personal information that was stored in her T-Mobile Sidekick II. I did some more research and learned that the information published today is at least similar to information that Nicolas Jacobsen stole during the period from August to October 2004. This…
-
Release of Paris Hilton’s Personal Info Illustrates Worrisome Security Situation with T-Mobile Sidekick II
Reading Time: 2 minutesA number of outlets reported that hackers posted Paris Hilton’s Sidekick II address book on-line. Although it is not clear from the stories I’ve read whether this incident is a continuation of the security breach that was the key element in the Nicolas Jacobsen case or if this is a new breach,…
-
Motorola and Skype Establish Alliance for “Seamless Mobility”
Reading Time: < 1 minuteOne of the other interesting developments that came out of the 3GSM World Congress was the announcement of an alliance between Motorola and Skype designed to set VoIP free from the PC for small office and home users. Skype is a Luxembourg-based VoIP (Voice over Internet Protocol) service provider. It’s hard…
-
Motorola SLVR V8 Photos Posted on MobileBurn
Reading Time: < 1 minuteMobileBurn published a good set of photos of the recently-announced Motorola SLVR V8 mobile phone. The photos were shot at a Motorola-sponsored dinner in Cannes, France that was organized around the 3GSM World Congress. I was particularly interested in the photo comparing the SLVR V8 and the RAZR V3. The RAZR…