On Sunday, NASA launched three PhoneSats into orbit. House in a standard "cubesat" structures, a Google-HTC Nexus One serves as the onboard computer and sensor system, taking photos of Earth. Aamateur radio operators are monitoring the transmissions and picking up data packets that will be recombined here on Earth. According to a NASA press release, the use of commercial-of-the-shelf parts, a minimalist design, and limited mission requirements kept the cost of each satellite as low as $3500. PhoneSat: NASA's Smartphone Nanosatellite
If you're one of those people who tend to lose their phone shortly after putting it down, then you'll want to read this. According to a new study, if you lose your smartphone, you have a 50/50 chance of getting it back. But chances are much higher -- nearly 100 percent -- that whoever retrieves it will try to access your private information and apps.
According to a study by Symantec, 96 percent of people who picked up the lost phones tried to access personal or business data on the device. In 45 percent of cases, people tried to access the corporate email client on the device.
"This finding demonstrates the high risks posed by an unmanaged, lost smartphone to sensitive corporate information," according to the report. "It demonstrates the need for proper security policies and device/data management."
Symantec called the study the "Honey Stick Project." In this case the honey on a stick consisted of 50 smartphones that were intentionally left in New York, Los Angeles, Washington, D.C., San Francisco and Ottowa, Canada. The phones were deposited in spots that were easy to see, and where it would be plausible for someone to forget them, including food courts and public restrooms.
None of the phones had security features, like passwords, to block access. Each was loaded with dummy apps and files that contained no real information, but which had names like "Social Networking" and "Corporate Email" that made it easy for the person who found it to understand what each app did. Each phone also was loaded with programs to track what finders did with the devices, and to send that information to the researchers.
Read the rest