An innovative company is bringing offline access to Internet-sourced information to areas of the world with no Internet.

Can an entire library be put in your pocket? Most people would say yes. All you need is a mobile phone with access to the internet. But what about for the many people in the world that lack internet connectivity? The answer can still be “yes”, according to Syed Karim, who explained the nature of his company, Outernet, at TEDGlobal. The business aims to address the fact that about two-thirds of the world’s population still has no internet access. He told the BBC, “When you talk about the internet, you talkRead More


Smart Meters can be hacked to reduce your utility bill.

Many utility companies are installing smart meters to help customers monitor and manage their power use and help them be more energy efficient. Javier Vidal is an independent researcher who, along with Alberto Illera, has found flaws in the smart meters. He says, “we took them apart to see how they work”. What he found has raised concerns at the utility companies: smart meters can be hacked to under-report energy use. This essentially means, with a little know-how and very little scruples, you could effectively cut your electricity bill. Attackers could useRead More


The BBC will be exposing articles removed from Google by the “Right to Be Forgotten” rule.

The BBC is to publish a continually updated list of its articles removed from Google under the controversial “right to be forgotten” rule. The ruling allows people to ask Google to remove some types of information about them from its search index. But editorial policy head David Jordan told a public meeting, hosted by Google, that the BBC felt some of its articles had been wrongly hidden. He said greater care should be given to the public’s “right to remember”. The BBC will begin – in the “next few weeks”Read More


A proof-of-concept worm has demonstrated that an attacker could take control of home data storage.

A malicious worm that can roam the net seeking data stored on insecure hardware has been created by a security researcher. The proof-of-concept worm was written to illustrate how vulnerable such data stores are to malicious attack. The worm can exploit the many bugs researcher Jacob Holcomb found in popular home data storage systems. Already, he said, there was evidence cybercriminals had noticed how easy it was to exploit these data stores. Mr Holcomb started work on the worm after carrying out a series of tests on Network Attached StorageRead More


To truly teleport an object, you have to include all its quantum properties. Now, physicists have worked out how.

Teleportation

To truly teleport an object, you have to include all its quantum properties. Now, physicists have worked out how. Photons have many properties, such as their frequency, momentum, spin and orbital angular momentum. But when it comes to quantum teleportation, physicists have only ever been able to to transmit one of these properties at a time. So the possibility of teleporting a complete quantum object has always seemed a distant dream. Now, a team of Chinese physicists has worked out how to teleport more than one quantum property. The teamRead More


Top Stories for October 14, 2014


Twitter is suing the US government over spying

Twitter has sued the US government over surveillance laws. Under current regulations, Twitter cannot reveal certain information about government requests for users’ data relating to national security. Twitter argues that this violates the right to free speech, as defined by the First Amendment to the US Constitution. The firm said it brought the case in an effort to force the government to be more transparent about personal data requests. Twitter’s lawyer, Ben Lee, wrote in a blog post, “It’s our belief that we are entitled under the First Amendment toRead More


Dropbox may have lost your files.

Dropbox has confirmed that a bug in some older versions of its desktop apps deleted the files of some people who turned on Selective Sync, which limits cloud syncing to certain folders. Typically, this would happen after a crash or forced reboot, making a bad problem worse — at least a few users found that they’d lost years’ worth of content through no fault of their own. Dropbox says that it’s restoring files when it can; it’s also releasing fixed versions of its apps, preventing older apps from working and puttingRead More


Samsung plans to introduce a new type of WiFi offering 4.6 Gbps.

Samsung claims to have found a way to make wi-fi data travel five times faster than it does currently. It said its engineers had overcome two significant technical problems that had restricted the transfer of data at well below its theoretical limit of 4.6Gbps. Samsung said its engineers were working on wi-fi that operated in the 60GHz band. Current wi-fi systems use 2.4 and 5GHz bands, and some can operate at speeds in excess of 1 gigabit per second. Samsung said it had managed to limit the amount of interference data travellingRead More


Hackers who released the specs to create a counterfeit version of the Xbox One on Ebay are facing up to 5 years in jail.

Four people have been charged in the US and one in Australia for their alleged involvement in a hacking ring that stole pre-release video game data. Prosecutors have claimed that members of the group managed to use some of the information to create counterfeit versions of the Xbox One console. One of these is said to have been sold on eBay for $5,000 (£3,085) ahead of the machine’s official launch. US Army helicopter training software is also alleged to have been pirated. The US Department of Justice said that theRead More