Hackers hired from UK Office of Cyber Security
It seems that in UK the management became illuminated, they discovered that the most efficient way to fight a cyber war is to hire soldier that play in the battlefield everyday, only for passion. U.K....
View ArticleMobile platform hacking: worms and botnet from phones?
The hacking community is finally starting seriously auditing and hacking Symbian OS, even if it’s difficult, hard to work on, unpleasant to debug it . There are so many mobile operating systems...
View ArticleUAE government placing backdoors into Blackberry devices
Nice attempt to place backdoors inside Blackberry devices. It seems that UAE government wanted to do something nasty placing backdoors trough software upgrades in Etilsat (local mobile operator)...
View ArticleLetter from a suicide hackers
The concept of freedom of an hacker, killing himself not to loose the most important value of his life. Read there
View ArticleIphone jailbreaking crashing towers? FUD!
It’s interesting to read a news about an anti-jailbreaking statement by apple that say that with jailbreaked phones it may be possible to crash mobile operator’s towers: By tinkering with this code, “a...
View ArticleRecuva: Nice windows data recovery tool
Not a professional tool but an easy, quick and free one. If you just accidently deleted some files on windows or your employee leave the company deleting all his data, well that you get out from...
View ArticleLicensed by Israel Ministry of Defense? How things really works!
You should know that Israel is a country where if a company need to develop encryption product they must be authorized by the government. The government don’t want that companies doing cryptography can...
View ArticleDishonest security: The SecurStart GmbH Phonecrypt case
I would like to provide considerations on the concept of ethics that a security company should have respect to the users, the media and the security environment. SecurStar GmbH made very bad things...
View ArticleEvidence that infosecurityguard.com/notrax is SecurStar GmbH Phonecrypt – A...
Below evidence that the security review made by an anonymous hacker on http://infosecurityguard.com is in facts a dishonest marketing plan by the SecurStar GmbH to promote their voice crypto product. I...
View ArticleSecurStar GmbH Phonecrypt answers on the Infosecurityguard/Notrax case:...
UPDATE 20.04.2010: http://infosecurityguard.com has been disabled. Notrax identity became known to several guys in the voice security environments (cannot tell, but you can imagine, i was right!) and...
View ArticleExploit code against SecurStar DriveCrypt published
It seems that the hacking community somehow like to target securstar products, maybe because hacking community doesn’t like the often revealed unethical approach already previously described in this...
View ArticleiPhone PIN: useless encryption
I recently switched one of my multiple mobile phones with which i go around to iPhone. I am particularly concerned about data protection in case of theft and so started having a look around about the...
View ArticleMobile Security talk at WHYMCA conference
I want to share some slides i used to talk about mobile security at whymca mobile conference in Milan. Read here my slides on mobile security . The slides provide a wide an in-depth overview of mobile...
View ArticleIOScat – a Port of Netcat to Cisco IOS
A porting of famous netcat to Cisco IOS router operating system: IOSCat The only main limit is that it does not support UDP, but that’s a very cool tool! A very good txt to read is Netcat hacker Manual.
View ArticleCelebrating “Hackers” after 25 years
A cult book, ever green since 25 years. It’s been 25 years since “Hackers” was published. Author Steven Levy reflects on the book and the movement....
View ArticleBlackberry Security and Encryption: Devil or Angel?
Blackberry have good and bad reputation regarding his security capability, depending from which angle you look at it. This post it’s a summarized set of information to let the reader the get picture,...
View ArticleWeb2.0 privacy leak in Mobile apps
You know that web2.0 world it’s plenty of leak of any kind (profiling, profiling, profiling) related to Privacy and users starts being concerned about it. Users continuously download applications...
View ArticleGSM cracking in penetration test methodologies (OSSTMM) ?
As most of this blog reader already know, in past years there was a lot of activities related to public research for GSM auditing and cracking. However when there was huge media coverage to GSM...
View Article27C3 – CCC Congress CFP: We come in peace
We come in peace We come in peace, said the conquerers of the New World. We come in peace, says the government, when it comes to colonise, regulate, and militarise the new digital world. We come in...
View ArticleRemotely intercepting snom VoIP phones
I suggest reading remotely tapping VoIp phones” on VoIP Security Alliance Blog by Shawn Merdinger . A concrete example on how current telephony infrastructure are getting more vulnerable to cyber attacks.
View ArticleESSOR, European Secure Software Defined Radio (SDR)
I had a look at European Defense Agency website and found the ESSOR project, a working project funded for 106mln EUR to develop strategic defense communication products based on new Software Defined...
View ArticleTETRA hacking is coming: OsmocomTETRA
It’s very exciting to see the release of OsmocomTETRA, the first opensource SDR (Software Defined Radio) implementation of TETRA demodulator, PHY and lower MAC layers. It’s the TETRA version of GSM...
View ArticleProgress for GSM cracking in Freiburg university
The exciting world of mobile protocols (GSM, GSM-R, TETRA, UMTS, etc) hacking is getting official research activities from universities. The investment to make opensource code releases of cracking...
View Article
More Pages to Explore .....