Smartphone apps are great at a lot of things. They can make our pictures look
terrible "artistic", they can keep us connected to friends, they can even set us up on random blind dates with strangers we know nothing about, but it turns out they're not great at identifying skin cancer -- at least not most of them. A new study shows that smartphone apps designed to identify cancerous lesions misdiagnose them more than half the time. Good news, dermatologists! You haven't been replace by robots yet!
Smartphone apps are great at a lot of things. They can make our pictures lookRead More
When you think of Third World problems, you general think of lack of food, lack of shelter, lack of clean water supplies, and things like that. While these are some of the more prominent issues, there are also many, many more you probably wouldn't think of, like lack of access to corrective lenses, for example. Over one billion people in Third World countries are getting by with eyesight that is anywhere from "pretty bad" to "totally abysmal" because they lack access to optometrists, diagnostic equipment, and lenses. There may be a solution on the horizon however: $2 smartphone-operated diagnostic scopes in conjunction with liquid-lens glasses that can make themselves.Read More
Scary fact of the day: Your car can get hacked. Not with an axe or something, but via SMS. Security researchers Don Bailey and Mathew Solnik at iSec Partners (lucky for all of us that this isn't a different [x]Sec) have figured out a way to hack cars with SMS by essentially sneaking into the series of communications that allow smartphone apps to unlock car doors or even start the engines. Apparently, it isn't even that hard. The pair have reported that they were able to figure out how to intercept the messages that come from a car-starter mobile app and then spoof them with a laptop in about 2 hours time. Bailey is scheduled to talk about his findings at the Black Hat conference in Las Vegas, and luckily for car owners and car companies, he's a nice enough guy not to mention the pair of products they hacked or any technical details about the process until the software makers can patch up these insecurities. Read More