Blog Posts Tagged with "Wireless"

37d5f81e2277051bc17116221040d51c

Spies Among Us

August 22, 2010 Added by:Robert Siciliano

The term spy conjures ideas about foreign operatives, moles and James Bond. You might envision forged IDs, fake passports and fraudulently issued government sponsored papers. The eleven Russian spies recently nabbed used the same equipment that you and I use today, including laptops, flash memory cards, and cell phones, but with a twist...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Mobile Phone Spyware Resellers Arrested

August 19, 2010 Added by:Robert Siciliano

The Romanian Directorate for Investigating Organized Crime and Terrorism recently arrested fifty individuals, including businessmen, doctors, engineers, a judge, a government official, a police officer, and a former member of Parliament, all accused of monitoring cell phone communications off-the-shelf software...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Dumb Thief: How to Locate a Stolen iPhone

August 11, 2010 Added by:Robert Siciliano

Using the tracking software on the iPhone, the victim was able to tell a 9-1-1 operator the location of the thief. Ten minutes later, he was in police custody. This is either the greatest ever publicity stunt or most likely the dumbest and unluckiest thief ever...

Comments  (0)

E376ca757c1ebdfbca96615bf71247bb

Risks Of Phone Removal From University Dorm Rooms

August 11, 2010 Added by:shawn merdinger

There is no easy solution to this dire situation. Universities are forced to make cost cuts in this poor economy, and telecommunications overhead like dorm phones is a easy measure to take, but the increased risk and costs are at this point not worth it...

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Jailbreak SSH Horrors Strike Back

August 09, 2010 Added by:Rob Fuller

This recent jailbreak was using a website, the individuals running that site now have the IP address of freshly jailbroken iPhones and iPads. I am not saying that they have any ill intentions, but sites have been broken into before, and that would be one hell of a gold mine...

Comments  (0)

85ac6feb584b665e85664974c546cfec

Privacy or National Security?

August 06, 2010 Added by:Ray Tan

Research In Motion executives are fond of saying that their platform is more secure than other mobile providers. If you’re using your BlackBerry to send encrypted emails to or from the Russia, China or soon from India, Saudi Arabia and the UAE, all of these security questions are moot...

Comments  (0)

E973b16363b3de77b360563237df7e32

Geo Location Based DDOS Targets Mobile Operators

July 27, 2010 Added by:Bozidar Spirovski

The sharp rise of smart mobile phones is introducing a new and concerning attack vector - a geo-location based DDOS...

Comments  (0)

16443e0c6f6e4a400fd0164b3c406170

Effective WiFi Neighborhood Watch Programs

July 26, 2010 Added by:Christopher Burgess

Neighborhood Watch groups typically focus on observation and awareness as a means of preventing crime and employ strategies that range from simply promoting social interaction and watching out for each other to active patrols by groups of citizens...

Comments  (0)

E376ca757c1ebdfbca96615bf71247bb

Weaponizing the Nokia N900 - Part 1

July 22, 2010 Added by:shawn merdinger

From a surveillance aspect, think of bad people with n900s in their pockets running Asterisk servers on their phones and connecting to each other point-to-point over encrypted tunnels - now that's a challenge...

Comments  (2)

B64e021126c832bb29ec9fa988155eaf

Wardriving shows Wireless Networks still Wide Open

July 21, 2010 Added by:Dan Dieterle

Wardriving usually consists of driving around in a vehicle searching for Wi-Fi Wireless networks using Aircrack-NG, Netstumbler, Kismet or another similar program. A wardrive was performed at a recent computer security class in Texas. The results were stunning...

Comments  (2)

6d117b57d55f63febe392e40a478011f

Wireless Technology Risks and Enterprise Security

July 10, 2010 Added by:Anthony M. Freed

Every person, company, organization or agency must realize and that unless they take positive actions to secure their business communications of cellular and radio, that they may lose their most prized positions, clients, trade secrets, and methods of operation...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Wireless Security is an Oxymoron, But There is Hope

July 03, 2010 Added by:Robert Siciliano

WiFi is everywhere. Whether you travel for business or simply need Internet access while out and about, your options are plentiful. You can sign on at airports, hotels, coffee shops, fast food restaurants, and now, airplanes. What are your risk factors when accessing wireless? There are plenty. WiFi wasn’t born to be secure. It was born to be convenient. Wireless networks broadcast messages usin...

Comments  (2)

85ac6feb584b665e85664974c546cfec

Google was capturing your wireless packets

May 18, 2010 Added by:Ray Tan

Last month the German government decided that it needed to take a closer look into Google's data collection methods. Google's Street View cars are equipped with wireless antenna's and pick up any available wireless signal along the way. It was originally thought that the Street view cars were just collecting SSID and MAC address to provide location based services to mobile users. It turns out that...

Comments  (13)

A1579a5845ff87a92326174e52499707

Hackers Lurking in Hotel Networks

March 17, 2010 Added by:Mark Smail

Many frequent business travelers spend almost as many nights sleeping in hotels as they do in their own beds. The need to stay productive when you’re on the road means that travelers must rely on whatever means available to stay connected, even if it’s an unprotected hotel wireless network.  

Comments  (3)

Page « < 1 - 2 - 3 - 4 - 5 > »