Feeds

Prisoners cannibalise mice for mobile power

USB cables hacked to charge phones

The Power of One Brief: Top reasons to choose HP BladeSystem

Convicts at a hi-tech Scottish prison are swiping computer mice from IT classes.

It turns out the mice's USB cable can be used to charge up lags' covert mobile phones. Rip the cord out of the mouse, plug it into a PlayStation and, with a bit of re-wiring, you have a power source for your handset.

PlayStations? It seems the jailbirds spending time at Her Majesty's pleasure in Addiewell, West Lothian have games consoles and HD TVs to play with, and, according to Scottish newspaper the Daily Record, are able to order their meals by computer.

While searching for the missing mice, warders at the prison found a large number of unconnected cables dangling from the PS3s, the paper reports.

The game was up, and now no one is allowed to leave computer, maths or English classes until every mouse has been accounted for.

Inmates are not allowed mobile phones. So naughty relatives will now have to smuggle in the cables too - presumably the same way the phones arrived. ®

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.