43 years old “UFO eccentric” hacker Gary McKinnon just loses appeal against his extradition to the States for computer crimes he committed 7 years ago.
If you’ve lived under a rock during the last few years what this dude did was basically break into .gov computers looking for UFO related material.
Probably the last case of recreational [...]
Archive for July, 2009
This is big business, this is the American way
Published by July 31st, 2009 in cybercrime, security and technology. 0 CommentsRussia: the best worldwide place for cybercrime business
Published by July 30th, 2009 in cybercrime, cyberwarfare and intelligence. 0 CommentsRussia is a very beautiful place for any committed cybercrime business owner.
FBI and Mcafee are trying to do something, do they will ever succeed?
I don’t think so, it’s a political issue as russia is not going to extradite any cybercriminal and is not going to provide strong international cooperations.
Always remember that in Russia Business Network [...]
Iphone jailbreaking crashing towers? FUD!
Published by July 30th, 2009 in business, security and technology. 0 CommentsIt’s interesting to read a news about an anti-jailbreaking statement by apple that say that with jailbreaked phones it may be possible to crash mobile operator’s towers:
By tinkering with this code, “a local or international hacker could potentially initiate commands (such as a denial of service attack) that could crash the tower software, rendering the [...]
chinese espionage: the worst and more silent threat for western countries
Published by July 27th, 2009 in business, cybercrime, cyberwarfare and management. 0 CommentsHi all,
in the past few years i saw an incredible increase in the amount of “public” news about espionage against different western countries and usually coming from far-east, typically china.
China want to be the largest economic power within 2020 and it’s following a grow rate of 8% per year. Their “controlled” capitalism without the inefficiency [...]
Criminal business model: Somali pirate case study
Published by July 27th, 2009 in business and cybercrime. 0 CommentsHi all,
this blog post is to have a nice economical point of view on somali pirates business model, something nice as also crime is a business and need it’s business evaluation:
An economic Analysis of Somali Pirates Business Model
It sounds much like a great deal, check it out the details:
The attack model and costs
The negotiation phase [...]
The concept of freedom of an hacker, killing himself not to loose the most important value of his life.
Read there
1st august 2009: Switzerland start realtime internet interception
Published by July 21st, 2009 in cyberwarfare, intelligence, interception and security. 0 CommentsThe intelligence strength is increasing everywhere… also in Switzerland that had a well known privacy protection approach!
Read the WikiLeaks Article
UAE government placing backdoors into Blackberry devices
Published by July 21st, 2009 in Privacy, cyberwarfare, intelligence, interception and security. 0 CommentsNice attempt to place backdoors inside Blackberry devices.
It seems that UAE government wanted to do something nasty placing backdoors trough software upgrades in Etilsat (local mobile operator) blackberry devices, obviously with the cooperation of the mobile operator itself.
Fortunately, the power of the security community discovered and unveiled the facts. Check it out.
Etisat patch designed for [...]
Chinese Spying NSA/USA buying Cryptographic Equipment on Ebay
Published by July 12th, 2009 in cyberwarfare and intelligence. 1 CommentIt’s amazing.
A chinese guy has been engaged within an espionage activity for the People’s Republic of China buying and exporting cryptographic equipments, radio and other secure hardware on eBay.
It’s unbelivable, read there, Chi Tong Kuok found on eBay:
1 software for a VDC-300 airborne data controller, used for secure satellite communications from the American military aircraft
1 [...]
Nokia World in Stuttgard 2-3 September
Published by July 11th, 2009 in business and technology. 0 CommentsEveryone who’s business is directly connected to mobile, aggregators, operators and generally speaking mobility application should really attend Nokia World where most of the world key people in the mobile business .
It’s extremely interesting to see the evolution of the business models related to the Application Portals, how the mobile operators are changing their approach [...]
Saas business models growth a lot during the past few years and i personally appreciate it.
No software to be installed, configured, maintained, service available when you needed with a early adoption time and most important reduction (or apparent reduction) of the total costs of ownership.
I had few experience with SaaS business (as a customer) and [...]
Today i found a very nice set of 22 ‘best advices’ on Fortune coming from world leaders and i would really like to link there some of the most interesting ones (at least for me).
I think that those suggestion let you work and manage your projects and goals (in any situation you play a leadership [...]
Mobile platform hacking: worms and botnet from phones?
Published by July 7th, 2009 in security and technology. 0 CommentsThe hacking community is finally starting seriously auditing and hacking Symbian OS, even if it’s difficult, hard to work on, unpleasant to debug it .
There are so many mobile operating systems (Symbian OS, Nokia S40, Windows Mobile, RIM OS, Mac OS X, Android/Linux, Brew) that a worm/virus being able to leverage a cross-platform vulnerability it’s [...]
The real goal of online marketing: lead generation
Published by July 7th, 2009 in business, management and technology. 0 CommentsOften i discuss about online marketing, however it include the mysterious “marketing” magic word that’s tipically subject to misunderstanding and misconception .
The end goal of online marketing is to generate qualified leads coming from international markets.
Some interesting links about it, and how things should be properly done are below:
Online registrations into lead
B2B Web Lead Generation [...]
Voice encryption in government sectors
Published by July 6th, 2009 in Privacy, business, cyberwarfare, intelligence, interception and security. 0 CommentsI will make some in depth articles about how voice encryption really works in government environments.
The open standards and open source still have to reach the military and government environments for what’s related to secure speech.
To give you an idea of the complexity and kind of particular issues that exists, look at the USA 3G [...]
You know, product management it’s a job for half-fish, half-meat guys, that understand both business needs and technology issues.
I found two amazing and very well done presentations about it, i suggest to read it as it clarify a lot of things of the marketing and technical activities applied to the management of products inside companies [...]
Women as agents of future geopolitical changes
Published by July 6th, 2009 in intelligence. 0 CommentsNice to read about Global Trends 2025 from United States National Intelligence Council.
How the various audio compression codec sounds?
Published by July 6th, 2009 in technology. 0 CommentsYou know, we would not be able to use VoIP and have cheap international phone calls without audio compression codecs.
It’s plenty of them, some royalty free, some patented by telco’s lobby (think that some patented and royalty-based codec it’s also a standard, where all market player have to pay the most aggressive one that acquired [...]
Hackers hired from UK Office of Cyber Security
Published by July 6th, 2009 in cybercrime, cyberwarfare and intelligence. 0 CommentsIt seems that in UK the management became illuminated, they discovered that the most efficient way to fight a cyber war is to hire soldier that play in the battlefield everyday, only for passion.
U.K. Employs ‘Naughty Boys’ to Battle Other Hackers U.K. Employs ‘Naughty Boys’ to Battle Other Hackers
Voice Security and Privacy slides
Published by July 6th, 2009 in Privacy, intelligence and technology. 0 CommentsBelow my slides on voice security and privacy from Security Summit 2009.
mmm, yes i am working in this area from 2005, will write again about it.
2009: Voice Security And Privacy (Security Summit - Milan)
View more presentations from Fabio Pietrosanti.
sux