Blog Posts Tagged with "Wireless"
Spies Among Us
August 22, 2010 Added by:Robert Siciliano
The term spy conjures ideas about foreign operatives, moles and James Bond. You might envision forged IDs, fake passports and fraudulently issued government sponsored papers. The eleven Russian spies recently nabbed used the same equipment that you and I use today, including laptops, flash memory cards, and cell phones, but with a twist...
Comments (0)
Mobile Phone Spyware Resellers Arrested
August 19, 2010 Added by:Robert Siciliano
The Romanian Directorate for Investigating Organized Crime and Terrorism recently arrested fifty individuals, including businessmen, doctors, engineers, a judge, a government official, a police officer, and a former member of Parliament, all accused of monitoring cell phone communications off-the-shelf software...
Comments (0)
Dumb Thief: How to Locate a Stolen iPhone
August 11, 2010 Added by:Robert Siciliano
Using the tracking software on the iPhone, the victim was able to tell a 9-1-1 operator the location of the thief. Ten minutes later, he was in police custody. This is either the greatest ever publicity stunt or most likely the dumbest and unluckiest thief ever...
Comments (0)
Risks Of Phone Removal From University Dorm Rooms
August 11, 2010 Added by:shawn merdinger
There is no easy solution to this dire situation. Universities are forced to make cost cuts in this poor economy, and telecommunications overhead like dorm phones is a easy measure to take, but the increased risk and costs are at this point not worth it...
Comments (0)
Jailbreak SSH Horrors Strike Back
August 09, 2010 Added by:Rob Fuller
This recent jailbreak was using a website, the individuals running that site now have the IP address of freshly jailbroken iPhones and iPads. I am not saying that they have any ill intentions, but sites have been broken into before, and that would be one hell of a gold mine...
Comments (0)
Privacy or National Security?
August 06, 2010 Added by:Ray Tan
Research In Motion executives are fond of saying that their platform is more secure than other mobile providers. If you’re using your BlackBerry to send encrypted emails to or from the Russia, China or soon from India, Saudi Arabia and the UAE, all of these security questions are moot...
Comments (0)
Geo Location Based DDOS Targets Mobile Operators
July 27, 2010 Added by:Bozidar Spirovski
The sharp rise of smart mobile phones is introducing a new and concerning attack vector - a geo-location based DDOS...
Comments (0)
Effective WiFi Neighborhood Watch Programs
July 26, 2010 Added by:Christopher Burgess
Neighborhood Watch groups typically focus on observation and awareness as a means of preventing crime and employ strategies that range from simply promoting social interaction and watching out for each other to active patrols by groups of citizens...
Comments (0)
Weaponizing the Nokia N900 - Part 1
July 22, 2010 Added by:shawn merdinger
From a surveillance aspect, think of bad people with n900s in their pockets running Asterisk servers on their phones and connecting to each other point-to-point over encrypted tunnels - now that's a challenge...
Comments (2)
Wardriving shows Wireless Networks still Wide Open
July 21, 2010 Added by:Dan Dieterle
Wardriving usually consists of driving around in a vehicle searching for Wi-Fi Wireless networks using Aircrack-NG, Netstumbler, Kismet or another similar program. A wardrive was performed at a recent computer security class in Texas. The results were stunning...
Comments (2)
Wireless Technology Risks and Enterprise Security
July 10, 2010 Added by:Anthony M. Freed
Every person, company, organization or agency must realize and that unless they take positive actions to secure their business communications of cellular and radio, that they may lose their most prized positions, clients, trade secrets, and methods of operation...
Comments (0)
Wireless Security is an Oxymoron, But There is Hope
July 03, 2010 Added by:Robert Siciliano
WiFi is everywhere. Whether you travel for business or simply need Internet access while out and about, your options are plentiful. You can sign on at airports, hotels, coffee shops, fast food restaurants, and now, airplanes. What are your risk factors when accessing wireless? There are plenty. WiFi wasn’t born to be secure. It was born to be convenient. Wireless networks broadcast messages usin...
Comments (2)
Google was capturing your wireless packets
May 18, 2010 Added by:Ray Tan
Last month the German government decided that it needed to take a closer look into Google's data collection methods. Google's Street View cars are equipped with wireless antenna's and pick up any available wireless signal along the way. It was originally thought that the Street view cars were just collecting SSID and MAC address to provide location based services to mobile users. It turns out that...
Comments (13)
Hackers Lurking in Hotel Networks
March 17, 2010 Added by:Mark Smail
Many frequent business travelers spend almost as many nights sleeping in hotels as they do in their own beds. The need to stay productive when you’re on the road means that travelers must rely on whatever means available to stay connected, even if it’s an unprotected hotel wireless network.
Comments (3)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization