Saturday, 22 December 2012

Exclusive: Hacker nabs 3m Verizon customer records

Updated at 8:00 p.m. ET: Verizon spokesperson Alberto Canal told ZDNet in an emailed statement: "We have examined the posted data and we have confirmed that it is not Verizon Wireless customer data. Our systems have not been hacked."
The hacker said in a later tweet the data likely belongs to Verizon FiOS fiber customers, rather than Verizon Wireless cellular customers. We've updated the post to reflect these changes. We've put in more questions to Verizon and will update again once we hear back.
- - -

A hacker has posted around 300,000 database entries of Verizon customers to the Web, after exploiting a vulnerability in the cellular giant's network.

The hacker, going by the name @TibitXimer on Twitter, told ZDNet earlier this evening that the hack was carried out earlier this year on July 12, which allowed him to gain root access to the server holding the customer data. Tibit gained access to a server with little difficulty after working with another hacker to identify the security flaw.

Tibit downloaded more than 3 million customer entries from Verizon's database, including names, addresses, mobile serial numbers, the opening date of each account, and account passwords. However, he said that figure was an estimate and had "no clue" exactly how many records there were, and that it was a "low estimate based on the size of one record and the size of all the files."

A fraction of the downloaded data has been published to code-sharing site Pastebin after Verizon failed to fix the vulnerability in its network, Tibit said, noting that the data was stored in plain text and did not require decryption.

The hacker said that after he informed Verizon of the exploit, the company "ignored my report," and did not comment.

Tibit said he worked alone, and while he supports Anonymous, he is not directly associated with the hacking collective.

Before the customer records were published online, Tibit showed ZDNet a snapshot of some of the data, which appeared jumbled, but was in plain text and relatively easy to understand. It clearly showed account data, including names and addresses, and what appeared to be passwords.

Tibit said the unencrypted customer files were "split up by region," but said that he "won't publish all [of the records] as I believe one region [300,000 records] is enough."
The hacker said that the leaked customer data suggests it came from customers in "Pennsylvania and maybe two more states around it."
"I might leak the rest later," he noted.

While he did not explain the exploit used to acquire the data in full, he said that the company's current security set-up allowed him to "gain root access to the server these files were stored on." He also noted that the exploit "still exists."
"The worst part of it all, every single record was in plain text," he said. "I did not have to decrypt anything." He said he couldn't understand "why they still haven't fixed the exploits," months after informing the company of its poor network security.

The Executive's Guide to Windows 8 (free ebook)

Summary: Windows 8 offers plenty of innovation -- maybe even too much. Business and IT decision makers have a lot to consider when it comes to Windows 8 deployments. Here's a deep dive on the big issues.

When Microsoft designed Windows 8 it had a couple big goals in mind. One was about driving better convergence from the PC to the tablet to smartphone. The other was about completely re-engineering Windows for a multi-touch environment. The question of how well they pulled it off and whether it was even the right strategy will continue to be debated. However, today's business leaders are faced with the immediate decision of whether Windows 8 offers value to their organizations and if they should adopt it or route around it.

To help business and IT executives tackle this issue, ZDNet and TechRepublic have created The Executive's Guide to Windows 8, a PDF ebook that digs into the big questions facing enterprises and SMBs. The ebook is available as a free download to registered ZDNet and TechRepublic members. (If you're not already a member, you can click here to register. It only takes a moment.)
The ebook contains three main sections:
  • Does it make sense to upgrade?
  • Who plans to upgrade?
  • Why did Microsoft gamble on the new UI?
As the summary to the ebook over on TechRepublic explains:
In this guide, you'll see what industry analysts and IT professionals think about the new OS, who is planning a Windows 8 deployment (and who is holding back), the reasons behind that go/no-go decision, and what Microsoft's strategy is likely to mean for corporate IT down the road.

Download it here.


                                                         Collected from--

London court told that Anonymous cyber-attacks cost PayPal £3.5 million

The court was told that the four self-styled Anonymous `hactivists' carried out a series of cyber attacks using the name `Operation Payback'; and virtually inundated the websites belonging to a number of companies - including PayPal and Ministry of Sound - with messages and requests, with the aim of making them go offline.

Three of the Anonymous hackers involved in `Operation Payback' - which cost PayPal over £3.5 million, and brought down the websites of MasterCard and the recording industry - have admitted to their role in the cyber-attacks.

The fourth accomplice - a 22-year-old Northampton University student named Christopher Weatherhead - is currently on trial at Southwark Crown Court; and faces the allegation that he was "part of a small cabal of leaders" of the cyber-attacks carried out between August 1, 2010 and January 22, 2011.

Opening the prosecution case at the London court, Sandip Patel said that Weatherhead - known by the online name `Nerdo' - played a key role in the `Operation Payback' cyberattacks; and added: "He (Weatherhead) and others like him waged a sophisticated and orchestrated campaign of online attacks that paralysed a series of targeted computer systems belonging to companies, to which they took issue with for whatever reason, that caused unprecedented harm."

Phorce ‘smart bag’ addresses battery-charging needs of mobile-device users

Kickstarter project called `Phorce' pertains to the world's first so-called `smart bag' which addresses the increasingly crucial `battery life' concerns of the growing number of users of digital devices in the present day.
 The Phorce `smart bag' chiefly aims at ending the battery-charging frenzy - which characteristically involves the frantic search for charging points - that is caused by the worries about `low battery life' of their smartphones, tablets, and other mobile devices; especially if they are addicted to their gadgets and use them extensively.

Going by the description of the Phorce `smart bag' on the crowd-funding Kickstarter site, the bag comprises an integrated 54Whr light-weight battery pack which can give the users of mobile devices the ability to charge their gadgets `on the go,' as and when they require.

For the Phorce bag, the people behind the project have set a December 22 deadline for a funding goal of $150,000. While the bag will retail at $349, backers who pledge at least $199 can avail special `early bird' offer to get the Phorce for USB in their choicest color. Even after the early bird special runs out, the same deal will be available to those who pledge a minimum of $219.

Sony India unveils next-gen hybrid Ultrabook - Vaio Duo 11


The newly-unveiled Sony Vaio Duo 11 - which weighs 1.3kg and is 17.85mm thick - will hit the Indian markets by the end December. The flexible next-generation hybrid ultrabook will be available in Gun metal colour, at a cost of Rs

Running Microsoft's latest Windows 8 operating system, the Sony Vaio Duo 11 is powered by a 1.7GHz Intel Core i5-3317U processor; and features an 11.6-inch Full HD HD OptiContrast touch panel.
Some of the other attractive features of the Vaio Duo 11 include 4GB of system RAM; storage on a 128GB SSD; a pre-loaded 64-bit version of Windows 8; 2 USB 3.0 ports; a USB 2.0 port; a full HDMI port; Ethernet; and slot for memory card. In addition, Sony's `xLoud' and `Clear Phase' smartphone and tablet technologies are also implemented on the hybrid ultrabook, which also includes Dolby Theater v4.
According to Sony, one of the USB 3.0 ports of the Vaio Duo 11 can also serve as the Sleep Charge port, which enables the users to charge any connected device even when the Duo 11 is shut down or is in sleep mode. Sony also claims that the Duo 11's battery can last for up to 4.5 hours on a single charge.

E-Law Updates Docket Tracking and Monitoring Service

New Jersey-based e-Law, a legal tracking and monitoring services provider, updated several features of its eLaw subscription services suite, which comprises eDocket online search engine for New York State courts, eWatch automated case monitoring, eCopy document retrieval services for all counties in New York and 21 counties in New Jersey, and Lawsuit Alerts, which alerts you if your firm or client has been sued.
The recent updates include a "trial" button on eLaw's eCalendar that gives you a list of upcoming court appearances, along with a view of the total number of appearances for each case. A new quick view also provides the number of times each case appears on a trial calendar.
In addition, pending trial calendar appearances now show up on a home dashboard, with a list of upcoming trial commitments immediately visible. Moreover, you can now view on your eWatch list a display of every case that courts have indicated are related to any case you follow.

Research Suggests Cellphones Deter Crime

Mobile phones have undoubtedly made us more connected than ever before, but have they also made us safer? Fresh research suggests that during the 1990s, they may have contributed to a significant drop in crime. 


 In a paper titled Mobile Phones and Crime Deterrence: An Underappreciated Link, a team of academics concluded that cellphones deter crime because they increase the chances of being caught.

"Mobile phones allow for quicker reporting of crimes, and, in some cases, real-time communication of details about the crimes and the criminals," the paper concludes. "The perceived risk of apprehension could increase among motivated offenders when they notice potential targets are carrying a mobile phone."

Additionally, mobile phones have made it much easier to report crimes to police quickly and at little cost; victims or witnesses no longer need to seek out a payphone or a landline.

The research was conducted by Jonathan Klick, a professor at the University of Pennsylvania Law School; John MacDonald, a University of Pennsylvania criminology professor; and Thomas Stratman, a professor of law and economics at George Mason University.

The overall crime rate fell by about one-third between 1991 and 2001; other researchers have attributed that decline to factors including bulked up police departments, new crime-prevention tactics; rising incarceration rates, and changes in the market for crack cocaine. The new research suggests that cellphones may also have played a role, although the authors cautioned that they lack enough data to prove causation. For one thing, the only comprehensive data available for mobile phone ownership before 1999 are national in scope, they write.

The authors examined rape and aggravated assault cases at the state level between 1999 and 2007, because those crimes are more likely to be perpetrated by strangers and therefore are more likely to be deterred by the presence of mobile phones. (Police are less likely to categorize a crime as rape when the perpetrator is known to the victim, according to the study.)

They also looked at how many residents in those states owned mobile phones, and performed a statistical analysis on the data. They found that higher rates of mobile phone use correlated to lower rates of violent crime. There was no similar negative correlation for property crime, however.

The researchers also found that crime dropped more significantly in urban areas, where mobile phones were more common. (They noted that some research has shown an increase in robberies in 2005 and 2006, when portable electronics such as iPods became popular.)

"Our findings at least suggest some effect of mobile phones on sustaining the historically low rates of crimes of interpersonal violence between 1999 and 2007 in states," the researchers concluded.

Although cellphones are already fairly pervasive, the study concluded that policymakers should urge people to carry them in hopes of deterring crime.

Websites go dark for Sandy Hook moment of silence

Some major websites went dark briefly Friday at 9:30 a.m. ET as part of a national moment of silence for the victims of last week's shooting at Sandy Hook Elementary School in Newtown, Connecticut.

A demo using Yahoo's main page as a backdrop shows what sites will look like during Web Goes Silent.
Dozens of sites participated, including Aol, The Huffington Post and Digg, and more than 100,000 people and sites have pledged to participate on the page for the Web Goes Silent campaign. People and companies are also spreading the word by tweeting their intention to go quiet with the hashtag #momentforSandyHook.
High-profile Silicon Valley venture capitalist Ron Conway promoted the online moment of silence, which is part of a larger campaign for federal gun control legislation. Conway is leading the campaign along with other big names including Ryan Seacrest, Jack Dorsey, Britney Spears, MC Hammer, Suze Orman and Tyler Florence. is a startup that uses social media to raise awareness and funds for charities and causes. Conway is also an investor in the for-profit company.
Sites that participated in Friday's moment of silence were invited to do so on their own, or it can embed an official badge with a green ribbon on their sites. Sites using the code appeared grayed out in the background with a white box in the foreground that reads "We are observing a National Moment of Silence for the victims of the Sandy Hook tragedy."
Conway joined other tech notables and some celebrities to demand action for stronger gun control in a full-page ad in the Wednesday print edition of the New York Times. The ad was run by Mayors Against Illegal Guns, a lobbying group of more than 700 U.S. mayors. It started the Demand A Plan campaign to reform gun laws after the Aurora, Colorado, shootings in July, and it has seen a surge in new support after the Sandy Hook shootings.

Collected from CNN--

Facebook tests paid messages to strangers

How much would you pay to contact a stranger? Facebook is sprucing up its messaging system, and the most interesting change is a move to charge people to send a message to someone outside their network.

New changes to Facebook's messaging system include the ability to set filters on which messages you see.

These unlucky missives are dropped in the little-known "Other" folder, where they will often spend the remainder of their digital existence unseen, unread and unloved.

Facebook is now testing a solution to help messages avoid this limbo, the company announced in a blog post Thursday. People can pay to circumvent the dreaded "Other" folder and have their messages show up directly in the recipient's inbox. The cost to send one message will be a dollar, according to AllThingsD.

In a post announcing the changes, Facebook points out that this could be helpful for people who want to contact someone about a job or reach out to anyone else they may not have a personal connection to. Charging could also help cut down on unwanted spam, according to Facebook.

"Several commentators and researchers have noted that imposing a financial cost on the sender may be the most effective way to discourage unwanted messages and facilitate delivery of messages that are relevant and useful," says the post.

The "inbox delivery test" will be available only to select people using Facebook in the U.S. for now. Companies won't have access to the feature at this time, and people are limited to one paid outgoing message a week to minimize abuse.

The social network is also rolling out new filtering options for the inbox. If you select Basic Filtering, the usual messages from friends and people in your extended network will go to the inbox. With Strict Filtering, it will be "mostly" limited to messages from friends.

The update also allows members to receive messages from the Messenger for Android app, a mutual friend throwing a party and anyone with your e-mail address.

Facebook is constantly trying to find new revenue streams, testing out services such as paying to promote posts and Facebook Gifts. The pay message option is being tested out for a few months, but if it is popular, it could be an interesting way for the site to address spam and make some money at the same time.

Collected from (CNN) --

Steve Jobs' yacht impounded over pay dispute

The Venus, a 100-million-euro ($137.5 million), 260-foot-long yacht, made its unofficial debut in late October. It's currently stuck in the Port of Amsterdam after Starck hired a debt-collection agency to attempt to remit the final payment for his design.

Late Apple co-founder Steve Jobs' yacht was unveiled in a Dutch shipyard in October and christened
Late Apple co-founder Steve Jobs' yacht was unveiled in a Dutch shipyard in October and christened "Venus."

According to lawyers at Ubik -- Starck's design company -- speaking with Reuters, the designer has only received 6 million of the 9-million-euro commission and is seeking the rest of the payment before the Venus will be released.
"These guys [Jobs and Starck] trusted each other, so there wasn't a very detailed contract," Roelant Klaassen, a lawyer for Ubik, told Reuters.

The Venus is a floating ode to both Jobs and Starck's minimalist aesthetic. Made entirely out of aluminum, with 40-foot-long floor-to-ceiling windows lining the passenger compartment and seven 27-inch iMacs making up the command center.

In Walter Isaacson's biography of Jobs, the late Apple CEO is quoted as saying that, "I know that it's possible I will die and leave Laurene with a half-built boat, but I have to keep going on. If I don't, it's an admission that I'm about to die."

Earth's biodiversity map updated for first time since 1876

A 'life map' of biodiversity showing the organisation of terrestrial life on Earth has been updated after more than a century.
The original map, drawn up by British naturalist Alfred Russel Wallace in 1876, was the first attempt to depict the myriad ways life has evolved on the world's continents.
Thanks to advances in modern technology and data on more than 20,000 species, scientists from University of Copenhagen have now produced a next generation map depicting the organisation of life on Earth.

The new map provides fundamental information regarding the diversity of life on our planet and is of major significance for future biodiversity research.
The new global map shows the division of nature into 11 large bio-geographic realms and shows how these areas relate to each other. It is the first study to combine evolutionary and geographical information for all known mammals, birds and  amphibians, a total of over 20,000 species.
The attempt to describe the natural world in an evolutionary context was made in 1876 by Wallace, the co-discoverer of the theory of natural selection, along with Charles Darwin.
"Our study is a long overdue update of one of the most fundamental maps in natural sciences. For the first time since Wallace's attempt we are finally able to provide a broad description of the natural world based on incredibly detailed information for thousands of vertebrate species," said researcher, Ben Holt in a statement.
The new map can be split into finer geographical details for each class of animals. It is made freely available to contribute to a wide range of biological sciences, as well as conservation planning and management of biodiversity.

Modern technology like DNA sequencing and a tremendous compilation of hundreds of thousands of distribution records on mammals, birds and amphibians across the globe has made it possible to produce the map.
"The map provides important baseline information for future ecological and evolutionary research. It also has major conservation significance in light of the on-going biodiversity crisis and global environmental change," said Jean-Philippe Lessard, the other co-lead-author of study.
"This holistic description of the natural world that we provide could be a new cornerstone in fundamental biology," senior researcher Carsten Rahbek, director of the Center for Macroecology, Evolution and Climate added.

Rare meteorite that exploded in US was fastest to hit Earth

A meteorite that exploded as a fireball over the US earlier this year was among the fastest and rarest meteorites to have hit the Earth, travelling a highly eccentric route to reach our planet.
Researchers led by UC Davis, SETI Institute and NASA found that the meteorite - a carbonaceous chondrite - that fell over California's Sierra foothills on April 22 was the rarest type known to have hit the Earth.
It is composed of cosmic dust and presolar materials that helped form the planets of the solar system.
Scientists learned that the meteorite formed about 4.5 billion years ago and was knocked off its parent body, which may have been an asteroid or a Jupiter-family comet, roughly 50,000 years ago.

As it flew toward Earth, it travelled an eccentric course through the solar system, flying from an orbit close to Jupiter toward the Sun, passing by Mercury and Venus, and then flying out to hit Earth.

The high-speed, minivan-sized meteorite entered the atmosphere at about 102998 km per hour. The study said it was the fastest, "most energetic" reported meteorite that's fallen since 2008, when an asteroid fell over Sudan.
"If this were a much bigger object, it could have been a disaster. This is a happy story in this case," said researcher Qing-zhu Yin in a statement.

Before entering Earth's atmosphere, the meteorite is estimated to have weighed roughly 45359.2 kg. Most of that mass burned away when the meteorite exploded.
Meteorites like Sutter's Mill are thought to have delivered oceans of water to the Earth early in its history.

Using neutron-computed tomography, researchers helped identify where hydrogen, and therefore water-rich fragments, resides in the meteorite without breaking it open.
For the first time, the Doppler weather radar network helped track the falling carbonaceous chondrite meteorite pieces, aiding scientists in the quick recovery of them, the study reports. Yin expects that the weather radar data in the public domain could greatly enhance and benefit future meteorite recoveries on land.
"For me, the fun of this scientific gold rush is really just beginning," said Yin.

Amazon Web Services to accommodate big data storage

Eyeing the growing market for big data analysis, AWS (Amazon Web Services) has introduced a storage package, called High Storage, that can offer fast access to large amounts of data.
High Storage, an Amazon EC2 (Elastic Compute Cloud) package, is designed to run data intensive analysis jobs, such as seismic analysis, log processing and data warehousing, according to the company. It is built on a parallel file system architecture that allows data to be moved on and off multiple disks at once, speeding throughput times.
[ Stay on top of the current state of the cloud with InfoWorld's special report, "Cloud computing in 2012." Download it today! | Also check out our "Private Cloud Deep Dive," our "Cloud Security Deep Dive," our "Cloud Storage Deep Dive," and our "Cloud Services Deep Dive." ]

"Instances of this family provide proportionally higher storage density per instance, and are ideally suited for applications that benefit from high sequential I/O performance across very large data sets," AWS states in the online marketing literature for this service. The company is pitching the service as a complement to its Elastic MapReduce service, which provides a platform for Hadoop big data analysis. AWS itself is using the High Storage instances to power its Redshift data warehouse service.

An AWS instance is a bundle of compute units, memory, storage and other services configured to the characteristics of a particular type of workload. High Storage is the ninth type of compute instance that AWS has introduced. It joins other instant types customized for particular workloads, such as instances optimized for using GPUs (graphics processing units) or for HPC (high performance computing) jobs.

The High Storage instance offers 35 EC2 compute units of compute capacity and 117GB of working memory. Up to 48TB of storage is spread across 24 direct attached storage hard disk drives. Spreading data across multiple disks can speed data transfers because the read-and-write speed of a single disk is no longer a bottleneck. The system can offer more than 2.4GB per second of sequential I/O performance.

Customers can evoke High Storage instances from the AWS Management Console, from the EC2 or Elastic MapReduce command lines, or from the AWS SDK or third-party libraries. The High Storage instance is currently available on the U.S. east coast and will be available in other parts of the world in the next few months. High Storage instances can be purchased ether on-demand or be reserved ahead of time at reduced cost.
Further helping potential big data-minded customers, Amazon has also turned on its data pipeline for general use, which the company announced last month.

Joab Jackson covers enterprise software and general technology breaking news for The IDG News Service. Follow Joab on Twitter at @Joab_Jackson. Joab's e-mail address is

Proposed law would stop broadband data caps that 'undermine innovation'

Proposed law would stop broadband data caps that 'undermine innovation'In the name of promoting online innovation and protecting consumers, U.S. Senator Ron Wyden (D-Ore.) this week introduced a law that would restrict ISPs' use of data caps -- limits on how much customers can upload and download on their smartphones and computers -- solely to addressing network congestion. The proposed legislation, called "The Data Cap Integrity Act," comes in the wake of a study from non-profit group The New America Foundation, which concluded that data caps on broadband usage serve only to bilk customers and stifle online innovation, rather than ensuring that Internet data travels the network lines unfettered.

"This bill is intended to help consumers manage their data more effectively and ensure that data caps are used only to serve the legitimate purpose of addressing congestion," Wyden said in a statement, adding that "data caps should not impede this innovation and the jobs it creates."

Through the Data Cap Integrity Act, the FCC (Federal Communications Commission) would establish industrywide data measurement accuracy standards as to how ISPs measure data usage; the law would also give the FCC the power to ensure that data caps are designed to manage network congestion, "rather than [to] monetize data in ways that undermine online innovation," according to Wyden.

The law would require ISPs to provide consumers with tools for managing their data consumption, and it would prevent ISPs from discriminating against any content; that is, giving favored treatment to their own services over similar services from competitors. "Data caps ... run the risk of undermining innovation in the digital economy if they are imposed bluntly and not designed to truly manage network congestion," Wyden said.

According to The New American Foundation's study, data caps don't address network congestion as ISPs have claimed. That sort of congestion stems from high levels of traffic on networks during peak hours; the critical factor is the time of day when a person uses data, not how much data a person consumes over the course of a month. Even Comcast admitted to the FCC in a disclosure document that data caps "do not address the issue of network congestion, which results from traffic levels that vary from minute to minute."
Rather, the study found that data caps serve to potentially undermine competition:
They serve to protect carriers' legacy services by discouraging consumers from accessing content online that they traditionally consumed offline. For example, customers are turning to services like Netflix, Hulu, and Crackle to watch movies and shows, rather than turning to standard cable.

"[O]ver the longer term, consumption-based billing could reduce the attractiveness of over the top video options (e.g., Netflix and Hulu), as the economic attractiveness of such over-the-top options could be partially offset by a [broadband] bill that is higher, due to [broadband] overage charges that would be driven by large amounts of data being streamed via a customer's [broadband] connection," cautioned a 2011 presentation from Credit Suisse.

In challenging the law, expect ISPs to point to a report (PDF) out of Michigan State University, funded by the National Cable & Telecommunications Association. According to the report, written by Steven Wildman, a professor of information studies, "the effects of well-designed [usage-based pricing] plans on consumers are likely to be beneficial, as are the effects of UBP on investments in the broadband infrastructure."

Funded by The National Cable & Telecommunications Association, the paper -- titled "The Economics of Usage-Based Pricing in Local Broadband Markets" -- also argues that the revenue ISPs garner from data plans "will likely contribute to better cash flows and stronger incentives to invest in broadband plant, both to improve the quality of service for current customers and to extend networks into unserved and underserved territories."

This story, "Proposed law would stop broadband data caps that 'undermine innovation'," was originally published at Get the first word on what the important tech news really means with the InfoWorld Tech Watch blog. For the latest developments in business technology news, follow on Twitter.

RIM caves to Nokia's patent demands with hopes pinned on BlackBerry 10

While the high-profile mobile patent bout between heavyweights Apple and Samsung likely has many more rounds to go, the undercard match between Nokia and RIM today came to an abrupt -- and arguably merciful -- conclusion: The winner is Nokia, as RIM has submitted to a patent license agreement for an undisclosed sum.

RIM caves to Nokia's patent demands with hopes pinned on BlackBerry 10According to an announcement from Nokia, the two companies have entered an agreement that settles all existing patent litigation between the organizations and ends legal battles in the United States, United Kingdom, and Canada. The financial structure of the agreement includes a one-time payment and ongoing payments, all from RIM to Nokia, according to the announcement.

Nokia filed patent claims in the United States and Germany against RIM (as well as HTC and ViewSonic) last May, alleging the companies infringed on a number of patents. The company last month also sought a ban on certain RIM products with wireless LAN capabilities.

Nokia and RIM may have settled so that they could focus their resources and efforts on their respective struggles in staying relevant in the mobile market. Nokia has seen itself lose market share as it's struggled to become a purveyor of Windows smartphones. Sales of the company's older Symbian-based phones, meanwhile, have plunged. According to a recent report from IHS, Nokia has lost the title of top phone maker to Samsung.

RIM, meanwhile, has suffered steadily plummeting sales and is pinning its very future on the success of the forthcoming BlackBerry 10. Fortunately for the company, the OS has garnered praise from developers and analysts.

This story, "RIM caves to Nokia's patent demands with hopes pinned on BlackBerry 10," was originally published at Get the first word on what the important tech news really means with the InfoWorld Tech Watch blog. For the latest developments in business technology news, follow on Twitter.