Feeds

Prisoners cannibalise mice for mobile power

USB cables hacked to charge phones

Top three mobile application threats

Convicts at a hi-tech Scottish prison are swiping computer mice from IT classes.

It turns out the mice's USB cable can be used to charge up lags' covert mobile phones. Rip the cord out of the mouse, plug it into a PlayStation and, with a bit of re-wiring, you have a power source for your handset.

PlayStations? It seems the jailbirds spending time at Her Majesty's pleasure in Addiewell, West Lothian have games consoles and HD TVs to play with, and, according to Scottish newspaper the Daily Record, are able to order their meals by computer.

While searching for the missing mice, warders at the prison found a large number of unconnected cables dangling from the PS3s, the paper reports.

The game was up, and now no one is allowed to leave computer, maths or English classes until every mouse has been accounted for.

Inmates are not allowed mobile phones. So naughty relatives will now have to smuggle in the cables too - presumably the same way the phones arrived. ®

Seven Steps to Software Security

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.