A lawyer for victims of News of the World phone hacking told the court that long after NotW knew of the police investigation of its newsgathering process, it put reporters' laptops and hard-drives "through a grinder" and took them out and "smashed them up."
The destruction of the computers is understood to have taken place around October last year, prior to the launch of Operation Weeting, the London Metropolitan Police investigation into phone hacking which has led to the arrests of 16 journalists.
The shredding of hard drives would have happened long after senior executives were made aware that phone hacking had spread beyond a single "rogue" reporter.
If you think that your phone may have been hacked so that your adversaries can watch you through the cameras and listen through the mics, one way to solve the problem is to remove the cameras and microphones, and only use the phone with a headset that you unplug when it’s not in use.
Lured by the internet’s pervasive insistence that it represents a superior, more comfortable typing experience, I recently went back to an old-timey mechanical keyboard. This was a mistake. I am now a hamfisted ASCII jazz disaster.
SpareOne Emergency Phone is a basic cellphone powered by AA batteries. This gives it a relatively short time on a charge, but means that it will have a charge after being stuffed in a drawer or glove box for months. I came across this during my search for the perfect basic phone, but be warned: […]
If you’ve got a killer app idea, but don’t have the technical expertise to pull it off, get a crash course in all things app development with the Comprehensive Android Development Bundle, now over 90% off in the Boing Boing Store. Across 83 hours of training, you’ll learn to develop for the world’s most popular mobile OS, mastering […]
Jared Sinclair developed the RSS reader app Unread, which made $10,000 in its first 24 hours on the iOS market. And we’ve all heard the story of Flappy Bird developer Dong Nguyen, whose creation was reportedly earning $50,000 a day at the height of its 2013 explosion. While those are rare examples, they’re also testament to the […]
If you or your company’s IT system are besieged by black hat cyber attacks, an ethical hacker might be all that stands between crippling damage and a company’s long-term prosperity. It’s no wonder that the market for IT security specialists is exploding. Certification is the key – so learn the tenets of ethical hacking and get […]