English flagItalian flagKorean flagChinese (Simplified) flagChinese (Traditional) flagPortuguese flagGerman flagFrench flagSpanish flagJapanese flagArabic flagRussian flagGreek flagDutch flagBulgarian flagCzech flagCroatian flagDanish flagFinnish flagHindi flagPolish flagRomanian flagSwedish flagNorwegian flag
Catalan flagFilipino flagHebrew flagIndonesian flagLatvian flagLithuanian flagSerbian flagSlovak flagSlovenian flagUkrainian flagVietnamese flagAlbanian flagEstonian flagGalician flagMaltese flagThai flagTurkish flagHungarian flagBelarus flagIrish flagIcelandic flagMacedonian flagMalay flagPersian flag

Archive for July, 2009

This is big business, this is the American way

43 years old “UFO eccentric” hacker Gary McKinnon just loses appeal against his extradition to the States for computer crimes he committed 7 years ago.
If you’ve lived under a rock during the last few years what this dude did was basically break into .gov computers looking for UFO related material.
Probably the last case of recreational [...]

Russia: the best worldwide place for cybercrime business

Russia is a very beautiful place for any committed cybercrime business owner.
FBI and Mcafee are trying to do something, do they will ever succeed?
I don’t think so, it’s a political issue as russia is not going to extradite any cybercriminal and is not going to provide strong international cooperations.
Always remember that in Russia Business Network [...]

Iphone jailbreaking crashing towers? FUD!

It’s interesting to read a news about an anti-jailbreaking statement by apple that say that with jailbreaked phones it may be possible to crash mobile operator’s towers:
By tinkering with this code, “a local or international hacker could potentially initiate commands (such as a denial of service attack) that could crash the tower software, rendering the [...]

chinese espionage: the worst and more silent threat for western countries

Hi all,
in the past few years i saw an incredible increase in the amount of “public” news about espionage against different western countries and usually coming from far-east, typically china.
China want to be the largest economic power within 2020 and it’s following a grow rate of 8% per year. Their “controlled” capitalism without the inefficiency [...]

Criminal business model: Somali pirate case study

Hi all,
this blog post is to have a nice economical point of view on somali pirates business model, something nice as also crime is a business and need it’s business evaluation:
An economic Analysis of Somali Pirates Business Model
It sounds much like a great deal, check it out the details:
The attack model and costs
The negotiation phase [...]

Letter from a suicide hackers

The concept of freedom of an hacker, killing himself not to loose the most important value of his life.
Read there

1st august 2009: Switzerland start realtime internet interception

The intelligence strength is increasing everywhere… also in Switzerland that had a well known privacy protection approach!
Read the WikiLeaks Article

UAE government placing backdoors into Blackberry devices

Nice attempt to place backdoors inside Blackberry devices.
It seems that UAE government wanted to do something nasty placing backdoors trough software upgrades in Etilsat (local mobile operator) blackberry devices, obviously with the cooperation of the mobile operator itself.
Fortunately, the power of the security community discovered and unveiled the facts. Check it out.

Etisat patch designed for [...]

Chinese Spying NSA/USA buying Cryptographic Equipment on Ebay

It’s amazing.
A chinese guy has been engaged within an espionage activity for the People’s Republic of China buying and exporting cryptographic equipments, radio and other secure hardware on eBay.
It’s unbelivable, read there, Chi Tong Kuok found on eBay:

1 software for a VDC-300 airborne data controller, used for secure satellite communications from the American military aircraft
1 [...]

Nokia World in Stuttgard 2-3 September

Everyone who’s business is directly connected to mobile, aggregators, operators and generally speaking mobility application should really attend Nokia World where most of the world key people in the mobile business .
It’s extremely interesting to see the evolution of the business models related to the Application Portals, how the mobile operators are changing their approach [...]

Saas: is the end of the myth?

Saas business models growth a lot during the past few years and i personally appreciate it.
No software to be installed, configured, maintained, service available when you needed with a early adoption time and most important reduction (or apparent reduction) of the total costs of ownership.
I had few experience with SaaS business (as a customer) and [...]

Best advices by world leaders

Today i found a very nice set of 22 ‘best advices’ on Fortune coming from world leaders and i would really like to link there some of the most interesting ones (at least for me).
I think that those suggestion let you work and manage your projects and goals (in any situation you play a leadership [...]

Mobile platform hacking: worms and botnet from phones?

The hacking community is finally starting seriously auditing and hacking Symbian OS, even if it’s difficult, hard to work on, unpleasant to debug it .
There are so many mobile operating systems (Symbian OS, Nokia S40, Windows Mobile, RIM OS, Mac OS X, Android/Linux, Brew) that a worm/virus being able to leverage a cross-platform vulnerability it’s [...]

The real goal of online marketing: lead generation

Often i discuss about online marketing, however it include the mysterious “marketing” magic word that’s tipically subject to misunderstanding and misconception .
The end goal of online marketing is to generate qualified leads coming from international markets.
Some interesting links about it, and how things should be properly done are below:

Online registrations into lead
B2B Web Lead Generation [...]

Voice encryption in government sectors

I will make some in depth articles about how voice encryption really works in government environments.
The open standards and open source still have to reach the military and government environments for what’s related to secure speech.
To give you an idea of the complexity and kind of particular issues that exists, look at the USA 3G [...]

Product Management

You know, product management it’s a job for half-fish, half-meat guys, that understand both business needs and technology issues.
I found two amazing and very well done presentations about it, i suggest to read it as it clarify a lot of things of the marketing and technical activities applied to the management of products inside companies [...]

Women as agents of future geopolitical changes

Nice to read about Global Trends 2025 from United States National Intelligence Council.

How the various audio compression codec sounds?

You know, we would not be able to use VoIP and have cheap international phone calls without audio compression codecs.
It’s plenty of them, some royalty free, some patented by telco’s lobby (think that some patented and royalty-based codec it’s also a standard, where all market player have to pay the most aggressive one that acquired [...]

Hackers hired from UK Office of Cyber Security

It seems that in UK the management became illuminated, they discovered that the most efficient way to fight a cyber war is to hire soldier that play in the battlefield everyday, only for passion.

U.K. Employs ‘Naughty Boys’ to Battle Other Hackers U.K. Employs ‘Naughty Boys’ to Battle Other Hackers

Voice Security and Privacy slides

Below my slides on voice security and privacy from Security Summit 2009.
mmm, yes i am working in this area from 2005, will write again about it.

2009: Voice Security And Privacy (Security Summit - Milan)

View more presentations from Fabio Pietrosanti.

sux




About

You are currently browsing the Playhouse of privacy, security, hacking, encryption, intelligence and some business stuff weblog archives for the month July, 2009.

Longer entries are truncated. Click the headline of an entry to read it in its entirety.

Latest

Categories