Friday, June 17, 2011

Google Nexus 4G Gets Detailed

There have been all sorts of rumors out there regarding Google’s next Nexus phone and we can toss another into the hat today as BGR is reporting that it might just be a monster of a smartphone that is set to hit shelves somewhere around Thanksgiving.
First, this Nexus 4G is apparently going to be running on a next-generation dual-core 1.2GHz or 1.5GHz CPU. No, no Kal-El for this thing. Instead, it’ll apparently run an OMAP 4460 or a low powered Snapdragon. In addition, it supposedly has a “monster-sized” screen that has 720p HD resolution and it will apparently come without any of the physical buttons that generally come below the display.
It should also have a 4G LTE radio inside when it arrives which means it’s possibly going to be AT&T’s first 4G LTE smartphone – which also means that it might not be a Nexus device considering all of them have started on T-Mobile – and it might also come with 1GB of RAM and 1080p HD video capture and playback. As for the cameras, a 5MP rear camera with advanced sensor, and a 1MP front facing camera for video chatting.
The Nexus 4G will also apparently arrive with Android 4.0 Ice Cream Sandwich and may be the first device to do so. All of this apparently will come in a super thin form factor making this one of the most desirable phones in recent memory, if true.

LulzSec Releases Over 62,000 Hacked Passwords

Rogue hacker group LulzSec is at it again, recently boasting on its Twitter that it had hacked the accounts of over 62,000 and provided a dump of emails and passwords free for download.
CRO of F-secure, Mikko H. Hypponen, believes that the emails and passwords were from a database kept by website Writerspace.com, according to the Hacker News. His reasoning: "Why writerspace.com? Well, the most common passwords include these: mystery, bookworm, reader, romance, library, booklover and..writerspace.So basically that's why I believe the latest Lulzsec password leak originates from writerspace.com. I'm guessing it's their user database."
Gizmodo took the database and has made a script for users to input their email address to check it against the release from LulzSec. Unless you were a member of Writerspace, you're probably not affected, but this is a good way to confirm.

Apple Sued Over Its Use Of 'iBook'Apple Sued Over Its Use Of 'iBook'

A New York book publisher has filed a lawsuit against Apple claiming its use of the term "iBook" violates the publisher's trademark, the second trademark infringement suit filed against the tech giant in less than a week.
The suit, filed yesterday by J.T. Colby and Co. in U.S. Southern District Court for New York, claims the trademark was acquired in 2006 and 2007 along with various assets of Byron Preiss, who had published more than 1,000 books under the "ibooks" brand starting in 1999.
Colby's suit acknowledges that Apple has a trademark for "iBook" related to its use on the personal computer the Mac maker sold from 1999 to 2006. However, Apple did not begin to use the term to describe an electronic book or method for delivering electronic books until 2010.
"Apple's use of the mark 'iBooks' to denote the electronic library that can be accessed via its iPad tablet computer and its iPhone is likely to overwhelm the good will of plaintiffs' 'ibooks' and 'ipicturebooks' marks and render them virtually worthless," the lawsuit states.
The lawsuit seeks injunctive relief as well as unspecified monetary damages.

LulzSec Claims Credit For CIA Site Takedown

The hacking group LulzSec, aka the Lulz Boat, on Wednesday claimed to have rendered the CIA's public website inaccessible.
"Tango down - cia.gov - for the lulz," said a tweet on the LulzSec Twitter feed. ("Tango down" is a phrase from the Tom Clancy videogame Rainbow Six, uttered after an enemy's been killed.) For at least part of the day, the CIA website couldn't be reached, or was only sporadically accessible. Some Internet watchers said the site could have been unreachable simply because LulzSec tweets led so many people to try and access the site at once, leading to its becoming slashdotted.
But LulzSec claimed to have used a distributed denial of service (DDoS) attack. "People are saying our CIA attack was the biggest yet, but it was really a very simple packet flood," said a LulzSec tweet.
That apparent attack--according to news reports, the CIA said it's still investigating--followed the group's requests, earlier in the day, for suggested targets. As part of that campaign, the group also released a phone number, which it rerouted for "phone DDoS" attacks. "Our number literally has anywhere between 5-20 people ringing it every single second. We can forward it anywhere in the world. Suggestions?" said a LulzSec tweet.