Feeds

My Droid EXPLODED mid phone call, says Texan

An incendiary conversation

The Power of One Brief: Top reasons to choose HP BladeSystem

A Texas man says he had to get four stitches in his ear after a spanking new Droid 2 smartphone exploded while he was in mid conversation.

A bandaged Aron Embry told a local Fox News affiliate he heard a popping noise but didn't think much of it until he realized he sustained minor injuries.

“I felt something dripping,” he told the news outlet. “I realized that it was probably blood. I went into the house, and as I got into the bathroom and once I got to the mirror and saw it, it was only then I kinda looked at my phone and noticed the screen had appeared to burst outward.”

Embry said his Droid 2 still works perfectly, although the model he displayed for the camera had multiple cracks in the touch screen and smears of what appeared to be dried blood.

A spokeswoman for Droid manufacturer Motorola said the company is investigating the claim.

It's the latest claim of a must-have electronic device turning against its owner. Last year, a 15-year-old boy filed a $250,000 lawsuit after claiming his iPod Touch exploded and torched his trousers. MacBooks and laptops from a variety of other manufacturers have also suffered similar claims, usually, it's said, as a result of faulty batteries. Perhaps the topper is the 2002 tale of a scientist who burned his penis after placing his notebook on his lap for an hour.

Embry, who doesn't have health insurance, said he plans to hire an attorney. We have no doubt he'll find plenty of takers. ®

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.