iPad Launch Blindsided Windows Team, Reveals Former Microsoft Executive

The launch of the iPad ten years ago was a big surprise to everyone in the industry — including to Microsoft executives. Steven Sinofsky, the former President of the Windows Division at Microsoft, shares Microsoft’s perspective as well as those of the other industry figures and press on the iPad: The announcement 10 years ago today of the “magical” iPad was…

Robert Cringely Attempts an Air-Launching Space Startup

“How does a 67-year-old hack with three minor children recover from going blind, losing his home and business in a horrible fire (like 2,000 others, we are still fighting with insurance companies), while appeasing an angry crowd of Kickstarter supporters armed with pitchforks and shovels?” That crowd still wants long-time tech pundit Robert X. Cringely to deliver on his Kickstarter-funded project…

GE Fridges Won’t Dispense Ice Or Water Unless Your Water Filter ‘Authenticates’ Via RFID Chip

JustAnotherOldGuy writes: Count GE in on the “screw your customers” bandwagon. Twitter user @ShaneMorris tweeted: “My fridge has an RFID chip in the water filter, which means the generic water filter I ordered for $19 doesn’t work. My fridge will literally not dispense ice, or water. I have to pay General Electric $55 for a water filter from them.” Fortunately, there…

Here Is the Technical Report Suggesting Saudi Arabia’s Prince Hacked Jeff Bezos’s Phone

A report investigating the potential hack of Jeff Bezos’ iPhone indicates that forensic investigators found a suspicious file but no evidence of any malware on the phone. Motherboard: It also says that investigators had to reset Bezos’s iTunes backup password because investigators didn’t have it to access the backup of his phone. The latter suggests that Bezos may have forgotten his…

Amazon Boss Jeff Bezos’ Phone ‘Hacked By Saudi Crown Prince’

According to the Guardian, Amazon CEO Jeff Bezos had his phone “hacked” in 2018 after receiving a WhatsApp message from the personal account of the crown prince of Saudi Arabia. From the report: The encrypted message from the number used by Mohammed bin Salman is believed to have included a malicious file that infiltrated the phone of the world’s richest man,…

The FBI Can Unlock Florida Terrorist’s iPhones Without Apple

The FBI is pressing Apple to help it break into a terrorist’s iPhones, but the government can hack into the devices without the technology giant, according to experts in cybersecurity and digital forensics. From a report: Investigators can exploit a range of security vulnerabilities — available directly or through providers such as Cellebrite and Grayshift — to break into the phones,…

Massive New Cambridge Analytica Leak Will Show Global Voter Manipulation on ‘Industrial Scale’

A new leak of more than 100,000 documents from Cambridge Analytica’s work in 68 different countries “will lay bare the global infrastructure of an operation used to manipulate voters on ‘an industrial scale,'” writes the Guardian. Long-time Slashdot reader Freshly Exhumed shares their report: The release of documents began on New Year’s Day on an anonymous Twitter account, @HindsightFiles, with links…

Major US Companies Breached, Robbed, and Spied on by Chinese Hackers

Rob Barry and Dustin Volz, reporting for Wall Street Journal: The hackers seemed to be everywhere. In one of the largest-ever corporate espionage efforts, cyberattackers alleged to be working for China’s intelligence services stole volumes of intellectual property, security clearance details and other records from scores of companies over the past several years. They got access to systems with prospecting secrets…

Visa Warns That Hackers Are Scraping Card Details From Gas Pumps

Visa has issued a statement warning consumers that cybercriminals are actively exploiting a weakness in gas station point-of-sale (POS) networks to steal credit card data. Engadget reports: The company’s fraud disruption teams are investigating several incidents in which a hacking group known as Fin8 defrauded fuel dispenser merchants. In each case, the attackers gained access to the POS networks via malicious…