Software Update to $20 Phones Could Topple 2G Cell Networks

In normal situations, when a call or SMS is sent over the network, a cellular tower “pages” nearby devices to find the one that should receive it. Normally, only the proper phone will answer—by, in effect, saying “It’s me,” as Seifert puts it. Then the actual call or SMS goes through. The rewritten firmware can Read more about Software Update to $20 Phones Could Topple 2G Cell Networks[…]

The “Red October” Campaign – An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies – Securelist

During the past five years, a high-level cyber-espionage campaign has successfully infiltrated computer networks at diplomatic, governmental and scientific research organizations, gathering data and intelligence from mobile devices, computer systems and network equipment. Kaspersky Lab’s researchers have spent several months analyzing this malware, which targets specific organizations mostly in Eastern Europe, former USSR members and Read more about The “Red October” Campaign – An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies – Securelist[…]

Use the Magic SysRq Key on Linux to Fix Frozen X Servers, Cleanly Reboot, and Run Other Low-Level Commands – How-To Geek

A useful summary: Cleanly Restarting Your System Used in sequence, some of these actions can be used to cleanly end processes, flush data to disk, unmount all file systems, and restart your computer. To perform this process, press and hold the Alt + SysRq key combination and – while holding the Alt and SysRq keys Read more about Use the Magic SysRq Key on Linux to Fix Frozen X Servers, Cleanly Reboot, and Run Other Low-Level Commands – How-To Geek[…]

$1000,- to hack US UAVs and control them

A group of researchers led by Professor Todd Humphreys from the University of Texas at Austin Radionavigation Laboratory recently succeeded in raising the eyebrows of the US government. With just around $1,000 in parts, Humphreys’ team took control of an unmanned aerial vehicle operated by the US Department of Homeland Security. They used the same Read more about $1000,- to hack US UAVs and control them[…]

Three steps to properly protect your personal data

Basically it comes down to implementing full disk encryption, creating an encrypted volume inside this with an easy password and a hidden encrypted volume with a hard password which people won’t bother to find. Then installing a tracker to find your laptop back if it gets stolen. Three steps to properly protect your personal data Read more about Three steps to properly protect your personal data[…]

International Cryptography Freedom

Since 2000 the US has cracked down hard on cryptography information sharing and it’s hard to find any information on it since around 2001. There are still a few good sources around. Piracy.com: International Cryptography Freedom. Cryptography links outside of North America C4I.org strong crypto links Treachery Unlimited Shmoo Speak Freely encrypted VOIP utopia hacktic Read more about International Cryptography Freedom[…]

Poorly secured SCADA systems logins posted live on Twitter

Basically SCADA systems are so poorly secured you can find their logins on Google. In a protest that people are uncovering vulnerabilities but the suppliers aren’t fixing the problem but rather trying to silence the exploiters entirely, this twitter account is posting links to loads of SCADA systems. So if you want to play with Read more about Poorly secured SCADA systems logins posted live on Twitter[…]