Quantcast
Channel: Playhouse of privacy, security, hacking, encryption, intelligence and some business stuff » hacking
Browsing latest articles
Browse All 23 View Live

Hackers hired from UK Office of Cyber Security

It seems that in UK the management became illuminated, they discovered that the most efficient way to fight a cyber war is to hire soldier that play in the battlefield everyday, only for passion. U.K....

View Article



Mobile platform hacking: worms and botnet from phones?

The hacking community is finally starting seriously auditing and hacking Symbian OS, even if it’s difficult, hard to work on, unpleasant to debug it . There are so many mobile operating systems...

View Article

UAE government placing backdoors into Blackberry devices

Nice attempt to place backdoors inside Blackberry devices. It seems that UAE government wanted to do something nasty placing backdoors trough software upgrades in Etilsat (local mobile operator)...

View Article

Letter from a suicide hackers

The concept of freedom of an hacker, killing himself not to loose the most important value of his life. Read there

View Article

Iphone jailbreaking crashing towers? FUD!

It’s interesting to read a news about an anti-jailbreaking statement by apple that say that with jailbreaked phones it may be possible to crash mobile operator’s towers: By tinkering with this code, “a...

View Article


Recuva: Nice windows data recovery tool

Not a professional tool but an easy, quick and free one. If you just accidently deleted some files on windows or your employee leave the company deleting all his data, well that you get out from...

View Article

Licensed by Israel Ministry of Defense? How things really works!

You should know that Israel is a country where if a company need to develop encryption product they must be authorized by the government. The government don’t want that companies doing cryptography can...

View Article

Dishonest security: The SecurStart GmbH Phonecrypt case

I would like to provide considerations on the concept of ethics that a security company should have respect to the users, the media and the security environment. SecurStar GmbH made very bad things...

View Article


Evidence that infosecurityguard.com/notrax is SecurStar GmbH Phonecrypt – A...

Below evidence that the security review made by an anonymous hacker on http://infosecurityguard.com is in facts a dishonest marketing plan by the SecurStar GmbH to promote their voice crypto product. I...

View Article


SecurStar GmbH Phonecrypt answers on the Infosecurityguard/Notrax case:...

UPDATE 20.04.2010: http://infosecurityguard.com has been disabled. Notrax identity became known to several guys in the voice security environments (cannot tell, but you can imagine, i was right!) and...

View Article

Exploit code against SecurStar DriveCrypt published

It seems that the hacking community somehow like to target securstar products, maybe because hacking community doesn’t like the often revealed unethical approach already previously described in this...

View Article

iPhone PIN: useless encryption

I recently switched one of my multiple mobile phones with which i go around to iPhone. I am particularly concerned about data protection in case of theft and so started having a look around about the...

View Article

Mobile Security talk at WHYMCA conference

I want to share some slides i used to talk about mobile security at whymca mobile conference in Milan. Read here my slides on mobile security . The slides provide a wide an in-depth overview of mobile...

View Article


IOScat – a Port of Netcat to Cisco IOS

A porting of famous netcat to Cisco IOS router operating system: IOSCat The only main limit is that it does not support UDP, but that’s a very cool tool! A very good txt to read is Netcat hacker Manual.

View Article

Celebrating “Hackers” after 25 years

A cult book, ever green since 25 years. It’s been 25 years since “Hackers” was published. Author Steven Levy reflects on the book and the movement....

View Article


Blackberry Security and Encryption: Devil or Angel?

Blackberry have good and bad reputation regarding his security capability, depending from which angle you look at it. This post it’s a summarized set of information to let the reader the get picture,...

View Article

Web2.0 privacy leak in Mobile apps

You know that web2.0 world it’s plenty of leak of any kind (profiling, profiling, profiling) related to Privacy and users starts being concerned about it. Users continuously download applications...

View Article


GSM cracking in penetration test methodologies (OSSTMM) ?

As most of this blog reader already know, in past years there was a lot of activities related to public research for GSM auditing and cracking. However when there was huge media coverage to GSM...

View Article

27C3 – CCC Congress CFP: We come in peace

We come in peace We come in peace, said the conquerers of the New World. We come in peace, says the government, when it comes to colonise, regulate, and militarise the new digital world. We come in...

View Article

Remotely intercepting snom VoIP phones

I suggest reading remotely tapping VoIp phones” on VoIP Security Alliance Blog by Shawn Merdinger . A concrete example on how current telephony infrastructure are getting more vulnerable to cyber attacks.

View Article

ESSOR, European Secure Software Defined Radio (SDR)

I had a look at European Defense Agency website and found the ESSOR project, a working project funded for 106mln EUR to develop strategic defense communication products based on new Software Defined...

View Article


TETRA hacking is coming: OsmocomTETRA

It’s very exciting to see the release of OsmocomTETRA, the first opensource SDR (Software Defined Radio) implementation of TETRA demodulator, PHY and lower MAC layers. It’s the TETRA version of GSM...

View Article


Progress for GSM cracking in Freiburg university

The exciting world of mobile protocols (GSM, GSM-R, TETRA, UMTS, etc) hacking is getting official research activities from universities. The investment to make opensource code releases of cracking...

View Article
Browsing latest articles
Browse All 23 View Live




Latest Images