
<?phpxml version="1.0" encoding="utf-8"?>
<rss version="2.0" 
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
>
<channel>
<title>Haaze.com / sufabmin121 / All</title>
<link>http://www.haaze.com</link>
<description>Test Web 2.0 Content Management System</description>
<pubDate>Tue, 14 Jun 2011 07:10:48 +0000</pubDate>
<language>en</language>
<item>
<title><![CDATA[How to keep hackers away from your pacemaker]]></title>
<link>http://www.haaze.com/story.php?title=how-to-keep-hackers-away-from-your-pacemaker</link>
<comments>http://www.haaze.com/story.php?title=how-to-keep-hackers-away-from-your-pacemaker</comments>
<pubDate>Tue, 14 Jun 2011 07:10:48 +0000</pubDate>
<dc:creator>sufabmin121</dc:creator>
<category>Technology</category>
<guid>http://www.haaze.com/story.php?title=how-to-keep-hackers-away-from-your-pacemaker</guid>
<description><![CDATA[(Credit:MIT, UMass)With millions of implantable medical devices in the U.S. alone, and some 300,000 more people receiving them worldwide every year, the need to protect these wireless devices from being hacked is increasingly urgent.Wearers might soon be better protected, thanks to new work out of MIT and the University of Massachusetts-Amherst, so long as they don't mind walking around in invisible shields.The system the research team will be proposing at the Association for Computing Machinery's Sigcomm conference in Toronto this August uses a jamming transmitter small enough to be worn as a watch or necklace.The device would essentially be authorized to access the implant and send encrypted instructions to the transmitter (the team calls this the &quot;shield&quot;), which would in turn decode the encryption and relay the instructions to the implant.Using a device that is separate from the medical implant is key for a few reasons: it allows for post-encryption in devices that are already implanted' it enables authorized emergency responders to simply remove the patient's shield in the event of emergencies' and it doesn't require the size of the implants to increase to accommodate and power the shield.The new system expands on a technique recently developed at Stanford University that allows for sending and receiving signals in the same frequency band. In typical wireless technology, using the same frequency band interferes with the signal, but by employing three antennas positioned precise distances apart, one band can now be used.Dina Katabi, right, works with graduate students Shyam Gollakota, left, and Haitham Hassanieh, center.(Credit:M. Scott Brauer)The MIT-UMass team was able to use this same technique but employ only two antennas which, thanks to clever signal processing, don't need to be separated. &quot;Think of the jamming signal that we are creating as a secret key' everyone who doesn't know the secret key just sees a garbage signal,&quot; says Dina Katabi, an associate professor in MIT's Department of Electrical Engineering and Computer Science.Because the shield knows the shape of its own jamming signal, however, it is able to subtract it from the received signal.Stefan Savage, a professor in the computer science and engineering department at the University of California at San Diego, says in a news release that the new system should work without any hitches. But in spite of the cleverness of the system, Savage points out an inherent Catch-22.&quot;Value in the information-security market gets created by one of two people: bad guys, or regulatory bodies,&quot; he says. &quot;You want to develop the technology in advance of the threat, but absent the threat, how do you sell the technology&quot;<br/><br/>0 Vote(s) ]]></description>
</item>

<item>
<title><![CDATA[A MacBook theft story with a happy ending]]></title>
<link>http://www.haaze.com/story.php?title=a-macbook-theft-story-with-a-happy-ending</link>
<comments>http://www.haaze.com/story.php?title=a-macbook-theft-story-with-a-happy-ending</comments>
<pubDate>Wed, 01 Jun 2011 07:10:31 +0000</pubDate>
<dc:creator>sufabmin121</dc:creator>
<category>Mobile &amp; Electronics</category>
<guid>http://www.haaze.com/story.php?title=a-macbook-theft-story-with-a-happy-ending</guid>
<description><![CDATA[The alleged thief, behind the wheel. (Credit:This Guy Has My Macbook)What would you do if your MacBook was stolen Joshua Kaufman of Oakland, Calif., started a Tumblr blog about it after his MacBook was swiped back in March. He says, via the site This Guy Has My Macbook:On March 21, 2011, my MacBook was stolen from my apartment in Oakland, CA. I reported the crime to the police and even told them where it was, but they couldn't help me due to lack of resources. Meanwhile, I'm using the awesome app, Hidden, to capture these photos of this guy who has my MacBook. Kaufman posted photos the stolen laptop was able to snap remotely, showing the alleged thief using the MacBook in bed, in a car, and at other locations. The blog became a viral Internet hit, and thanks to the media attention it generated, local police were prompted to take action after Kaufman had gathered enough information about the suspect.  The Tumblr blog was updated last night with the following information:Update: (May 31, 8:37 PM PST) ARRESTED! An Oakland police officer just called me to let me know that they arrested the guy in my photos! BOOYA! The police used my evidence (email which pointed to a cab service) that he was a driver and tricked him into picking them up. Nice work OPD! This isn't the first time social media has been called into play to find a laptop thief. In May, we heard about a similar case where a stolen MacBook was recovered after its location was shared via Twitter.Of course, these happy endings are the exception rather than the rule. Laptops are still high-value targets for thieves, and you should always exercise care when out and about with your portable gadgets. <br/><br/>0 Vote(s) ]]></description>
</item>

</channel>
</rss>
