Klemens Schillinger’s Substitute Phones are made of high-quality, heavy-duty plastic designed to mimic the look and feel of a traditional smartphone. The devices feature stone beads which are designed to simulate the various gestures one would make on their smartphone. They’re like phone-shaped fidget spinners. The same tactile urge to touch and swipe like your actual smartphone does, is fulfilled, but will give you a break from the constant text messages and notifications.The calming limitation can also offer help for smartphone addicts to cope with withdrawal symptoms.
Wheel chair bound Samsung employee is alleged to have stolen 8,474 smartphones from the company over the course of two years to pay off his gambling debt. Authorities claim his spree took place between December 2014 and November 2016 at the Samsung headquarters in Suwon, South Korea . It took them a long time to notice what was going down, since he was wheelchair bound and wasn’t required to pass thru the scanner. The phones were sold to a second-hand phone retailer for 800 million won or(US$711,743) dollars. The employee was arrested.
The United States Federal Bureau of Investigation paid $900,000 to hack the San Bernardino gunman’s iPhone, Senator Dianne Feinstein (D) said this week. n 2016, the FBI contracted an unnamed third-party security firm to unlock the password-protected iPhone 5c of San Bernardino, California shooter Syed Rizwan Farook, who along with his wife killed 14 people in an attack in December 2015.
The Associated Press, Vice Media, and USA Today took the FBI to court over the agency’s nondisclosure, arguing that it had lacked “adequate justification.” FBI director James Comey hinted that the agency paid “more money than he would earn in his remaining seven years on the job” — or roughly least $1.3 million.
Researchers at King Abdullah University of Science and Technology (KAUST) in Saudi Arabia have developed a new self-destruct mechanism that can destroy electronics within 10 seconds wirelessly or by triggering certain sensors.
The researchers are now planning to roll out the technology targeting government agencies and corporations who need an extra layer of security for computing devices that might get lost or stolen.
The first customers who will receive this new technology will be: Intelligence communities, corporations, banks, hedge funds, social security administrations, and collectors who handle massive data.
The KAUST researchers are now working on different models to trigger the self-destruct mechanism. One model uses GPS sensors for the trigger if the device is moved more than 50 metres away from its starting point. Another uses a light sensor to automatically trigger the self-destruct mechanism when the device is illuminated by a desk lamp. That test mimics a security scenario where a top secret device is moved out of a box and exposed to light. More testing will be conducted before launching the final product. These include more localized self-destruct options that require adjustment to the polymer layer in terms of its thickness and different heater locations allowing it to target specific components on a device such as a laptop’s memory chips.
The overall cost of adding the self-destruct security mechanism would likely be about $15 or less, depending on volume.
After his smartphone was stolen, a film student allowed his smartphone to get stolen again. This time it was filled with spyware to keep tabs on the thief.
An iPhone was not used to lure the thief. You can’t run spyware apps on the iPhone, and you don’t have the same level of control you do with Android.
The filmmaker used an HTC One preloaded with a special type of app that would give him total remote control of the phone. He could also use it to spy on everything the thief did, provided there was an active internet connection at the time. He could take photos and record videos, enable the microphone of the device to snoop in on conversations, collect all location data, read all the text messages, access call history, check contacts, and see all the contents of the phone.
It all happened thanks to a spyware app installed on the device that the thief didn’t even know was there. van der Meer also blocked the phone’s ability to receive Android updates in order to make sure his malware app wasn’t wiped out by a knowledgeable thief.