Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Wireless Web

Americans’ Views on Mobile Etiquette

August 26, 2015, Americans’ Views on Mobile Etiquette ‘Always on’ mobile connectivity poses new challenges for users about when to be present with those nearby or engaged with others on their screens. By Lee Rainie and Kathryn Zickuhr “Cellphones and smartphones have become a mainstay in the lives of many Americans, and this has introduced… Continue Reading

Mobile Messaging and Social Media 2015

Pew Report – Mobile Messaging and Social Media 2015 – August 19, 2015: “In today’s world, people — particularly young people — are continually finding and adapting new ways of communicating electronically to fit their needs. Case in point: 2015 marks the first time Pew Research Center has asked specifically about mobile messaging apps as… Continue Reading

Wireless carjackers can exploit vulnerabilities in cars, trucks, SUVs

Wired: “[Charlie Miller and Chris Valasek’s] full arsenal includes functions that at lower speeds fully kill the engine, abruptly engage the brakes, or disable them altogether. The most disturbing maneuver came when they cut the Jeep’s brakes, leaving me frantically pumping the pedal as the 2-ton SUV slid uncontrollably into a ditch. The researchers say… Continue Reading

FCC Implements Strict Rules to Halt Unwanted Telemarketing

EPIC: “The Federal Communications Commission has adopted new rules that impose strict limits on telemarketing practices. Under the rules, consumers can halt unwanted messages by telling companies to stop calling. The rules also allow phone companies to offer call-blocking services to screen out automated telemarketing calls. In 2014, the FCC received more than 215,000 complaints… Continue Reading

Fake mobile phone towers in UK track phone conversations

Privacy issues remain in the global new – via ars technica: Fake mobile phone towers discovered in London: Stingrays come to the UK – When will the Metropolitan Police stop pretending it doesn’t use them? “Fake mobile phone masts that can be used to eavesdrop on telephone conversations without users being aware have been discovered in… Continue Reading

Disruptive Financial Technology Startup – Mobile Payments

Exponential Finance: Who Will Be the Instagram or Uber of Finance? – Jason Dorrier: “Abra is exemplary of what happens when several digital technologies converge in one product. Combining an Uber-like peer-to-peer network with smartphone technology and blockchain, Abra literally stashes the cash in your pocket on your smartphone. From there, users can send cash as easy… Continue Reading

CISCO Visual Networking Index Forecast

“We are in an era where technological advances are happening at an exponential rate. According to Cisco’s Visual Networking Index Forecast, in just four years you can expect to see the number of mobile devices skyrocket, non-PC devices to reign supreme, and online video to do a complete takeover of television. Head’s up—maybe it’s time… Continue Reading

U.S. Smartphone Use in 2015

Pew – Aaron Smith: “The traditional notion of “going online” often evokes images of a desktop or laptop computer with a full complement of features, such as a large screen, mouse, keyboard, wires, and a dedicated high-speed connection. But for many Americans, the reality of the online experience is substantially different. Today nearly two-thirds of… Continue Reading

Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2014–2019

Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2014–2019: From the Summary – “Global mobile data traffic grew 69 percent in 2014. Global mobile data traffic reached 2.5 exabytes per month at the end of 2014, up from 1.5 exabytes per month at the end of 2013.Last year’s mobile data traffic was nearly 30… Continue Reading

Report – Largest global manufacturer of SIM cards hacked

The Intercept – Jeremy Scahill and Josh Begley – “American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency… Continue Reading