As most of this blog reader already know, in past years there was a lot of activities related to public research for GSM auditing and cracking.
However when there was huge media coverage to GSM cracking research results, the tools to make the cracking was really early stage and still very inefficient.
Now Frank Stevenson , norwegian [...]
Archive for July, 2010
GSM cracking in penetration test methodologies (OSSTMM) ?
Published by July 23rd, 2010 in Privacy, intelligence, interception, security and technology. 2 CommentsSnake-oil security claims on crypto security product
Published by July 19th, 2010 in Privacy, business, management, security and technology. 3 CommentsSecurity market grow, more companies goes to the market, but how many of them are taking seriously what they do?
You know, doing security technology mean that you are personally responsible for the protection of the user’s information. You must make them aware of what they need, exactly what your are doing and which kind of [...]
Web2.0 privacy leak in Mobile apps
Published by July 17th, 2010 in Privacy, intelligence, security and technology. 0 CommentsYou know that web2.0 world it’s plenty of leak of any kind (profiling, profiling, profiling) related to Privacy and users starts being concerned about it.
Users continuously download applications without knowing the details of what they do, for example iFart just because are cool, are fun and sometime are useful.
On mobile phones users install [...]
AES algorithm selected for use in space
Published by July 8th, 2010 in Privacy, security and technology. 0 CommentsI encountered a nice paper regarding analysis and consideration on which encryption algorithm it’s best suited for use in the space by space ship and equipments.
The paper has been done by the Consultative Committee for Space Data Systems that’s a consortium of all space agency around that cumulatively handled more than 400 mission to space.
[...]
Blackberry Security and Encryption: Devil or Angel?
Published by July 7th, 2010 in Privacy, business, intelligence, interception, security and technology. 3 CommentsBlackberry have good and bad reputation regarding his security capability, depending from which angle you look at it.
This post it’s a summarized set of information to let the reader the get picture, without taking much a position as RIM and Blackberry can be considered, depending on the point of view, an extremely secure platform or [...]
A cult book, ever green since 25 years.
It’s been 25 years since “Hackers” was published. Author Steven Levy reflects on the book and the movement.
http://radar.oreilly.com/2010/06/hackers-at-25.htmlSteven Levy wrote a book in the mid-1980s that introduced the term “hacker” — the positive connotation — to a wide audience. In the ensuing 25 years, that word [...]