Breaking News
Comments
Oldest First | Newest First | Threaded View
Page 1 / 2   >   >>
old account Frank Eory
User Rank
Author
re: RIM's PlayBook hacked, patched, hacked again
old account Frank Eory   12/7/2011 9:06:38 PM
NO RATINGS
It really has been an embarrassing week for RIM. Besides this Playbook hack, there was the incident a few days ago in which two RIM executives (they are now former executives) were arrested for being drunk and disorderly on a flight to China. I hope RIM again finds its footing in 2012.

LJM
User Rank
Author
re: RIM's PlayBook hacked, patched, hacked again
LJM   12/7/2011 9:09:25 PM
NO RATINGS
Honestly, RIM is hanging on by a thread. Once they lose their security trust/cache in the corporate space, no one is going to lay their device next to an Apple device and say, "Yup, RIM wins this battle." Do you know anyone who chooses RIM for a personal device?

markhahn0
User Rank
Author
re: RIM's PlayBook hacked, patched, hacked again
markhahn0   12/7/2011 9:52:04 PM
NO RATINGS
Sorry, why is it embarassing, or even a concern for RIM how Playbook owners use their devices? A jailbreak tool is a bugfix: correcting the manufacturer's failure to provide the owner with full access.

old account Frank Eory
User Rank
Author
re: RIM's PlayBook hacked, patched, hacked again
old account Frank Eory   12/7/2011 10:26:53 PM
NO RATINGS
For the business user, RIM's security is one of its big selling points. I doubt that many of those customers will think that the ability to exploit a security hole in the crypto is a bug fix! Ask any corporate IT manager how he/she feels about users getting root access to company-owned IT assets and let us know what kind of replies you get.

SylvieBarak
User Rank
Blogger
re: RIM's PlayBook hacked, patched, hacked again
SylvieBarak   12/7/2011 10:33:25 PM
NO RATINGS
I have a BlackBerry device that's personal... but I am honestly thinking of switching next refresh cycle!

PoseTech
User Rank
Author
re: RIM's PlayBook hacked, patched, hacked again
PoseTech   12/7/2011 11:52:00 PM
NO RATINGS
RIM is certainly going downhill. They couldn't even secure the name of their next generation operating system, being force to change it from BBX to BlackBerry 10. This is a real bad oversight from the management team. RIM needs a huge overhaul of their management team if they want to stay in the game with Apple and Google.

Chris.Ciufo
User Rank
Author
re: RIM's PlayBook hacked, patched, hacked again
Chris.Ciufo   12/8/2011 12:48:43 AM
NO RATINGS
In fairness to RIM, recent FORTUNE article clearly chronicles their arduous decisions to stick with their enterprise knitting at the expense of the hip smartphone market. Yet, if RIM loses the faith of the IT dudes (as Frank Eory points out, above), they are yesterday's toast. Even though my corporate-issued Curve works pretty darn well. (I know: this hack is about a tablet, not a phone, yet guilt by association...or credibility lost...)

SylvieBarak
User Rank
Blogger
re: RIM's PlayBook hacked, patched, hacked again
SylvieBarak   12/8/2011 3:47:38 AM
NO RATINGS
I have a Playbook and have never ever found a reason to use it. Maybe now that there's a hack, I can finally find something useful and fun to do with it!

wave.forest
User Rank
Author
re: RIM's PlayBook hacked, patched, hacked again
wave.forest   12/8/2011 11:51:12 AM
NO RATINGS
"RIM had previously stated that all of its mobile devices were rigorously tested by third-party security researchers every day" It'll be interesting to know who the third-party are. It appears the third-party did a lousy job.

DVanditmars
User Rank
Author
re: RIM's PlayBook hacked, patched, hacked again
DVanditmars   12/9/2011 4:36:49 PM
NO RATINGS
Being 'hacked' by the end user is a lot different than being hacked by someone via the connected network.

Page 1 / 2   >   >>


Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
Radio
LATEST ARCHIVED BROADCAST

What are the engineering and design challenges in creating successful IoT devices? These devices are usually small, resource-constrained electronics designed to sense, collect, send, and/or interpret data. Some of the devices need to be smart enough to act upon data in real time, 24/7. Specifically the guests will discuss sensors, security, and lessons from IoT deployments.

Brought to you by:

Like Us on Facebook
Special Video Section
Once the base layer of a design has been taped out, making ...
In this short video we show an LED light demo to ...
The LTC2380-24 is a versatile 24-bit SAR ADC that combines ...
In this short video we show an LED light demo to ...
02:46
Wireless Power enables applications where it is difficult ...
07:41
LEDs are being used in current luxury model automotive ...
With design sizes expected to increase by 5X through 2020, ...
01:48
Linear Technology’s LT8330 and LT8331, two Low Quiescent ...
The quality and reliability of Mill-Max's two-piece ...
LED lighting is an important feature in today’s and future ...
05:27
The LT8602 has two high voltage buck regulators with an ...
05:18
Silego Technology’s highly versatile Mixed-signal GreenPAK ...
The quality and reliability of Mill-Max's two-piece ...
01:34
Why the multicopter? It has every thing in it. 58 of ...
Security is important in all parts of the IoT chain, ...
Infineon explains their philosophy and why the multicopter ...
The LTC4282 Hot SwapTM controller allows a board to be ...
This video highlights the Zynq® UltraScale+™ MPSoC, and sho...
Homeowners may soon be able to store the energy generated ...
The LTC®6363 is a low power, low noise, fully differential ...