Category: Information Security
-
Keeping my Droid “G”
Freshly back from a new round of security based conferences I will take a moment to point out one of the more interesting topics for me this time around. The discussion on Cell Phone Spying (not that I made it inside the actual talk with the ungodly line). More specifically how by using a frequency […]
-
RSA Discusses The Challenge of Securing RFID
RSA researcher Ari Juels sat down with SearchSecurity.com to discuss various topics. One of which was the constrained capabilities of RFID (like wireless bar codes), and how it affects the security posture needed to secure these devices. But, in fact, it’s possible to shoehorn in capabilities for which these tags were not explicitly designed. For […]
-
Wanted:Someone to run National Cybersecurity
There is a cNet report on the director of the NSA stating “We do not want to run cybersecurity for the U.S. government” At least not for all the government agencies, just a select few. With all the latest high profile security breaches on government facilities the brutal honesty of the statement is understood. And […]
-
The Death of the Guard?
Suffering the same fate as many other technology projects during our economic slowdown it appears the CommerceGuard project has had it operations suspended by GE. The CommerceGuard project was responsible for development of the CommerceGuard Container Security Device System (CSD) whose purpose was to track and secure shipment containers. The system was developed to meet […]
-
Sorry Sir, but I am going to have to see your console
The guys over at infowars.com made note of an interesting fight brewing up between a Boston College student backed by the EFF & a Legal firm vs. The Newton Courts, of Mass. Fairly easy to note the ignorance of their technical staff with the following statement: “Uses two different Operating systems to hide his illegal […]
-
Cisco PIX & ASA Multiple DoS, ACL Bypass, & Authentication Bypass Vulnerabilities (Bugtraq ID:34429)
Some fairly critical issues disclosed on a very popular security product. Cisco PIX Security Appliance and ASA 5500 Series Adaptive Security Appliance are prone to multiple denial-of-service vulnerabilities, an ACL-bypass vulnerability, and an authentication-bypass vulnerability. Read More Here … An attacker can use readily available network utilities to exploit these issues. The following example data […]
-
Who should be America’s CTO?
Never before has a presidential candidate used technology in the way the Obama administration did during the past elections. From Youtube, to twitter tweets sent from him trusty Blackberry. Obama definitely leveraged his technilogical savvy in his favor. So then why after more than a handful of months into his term has he still not […]
-
The Secret Battles of Electronic Warfare
This is not the first time we have mentioned the rise of computer security related crimes or pointed out the hacking of or weaknesses of many critical metropolitan infrastructures. With that said the recent hacking events first mentioned over the past weekend does again cast a big bright light on how living in our ‘digital […]
-
Pen Testing with RUBY
It was in 2006 that the language known as RUBY was fully accepted as a standard language. The self described “open source programming language with a focus on simplicity and productivity” is one of the more powerful languages in use today. The folks over at Matasano Security (not affiliated with “matz” Y.Matsumoto the creator of […]
-
LSYiPDT: Biometric Security Software
While the concept is pretty clear the development team is having some issue with resources ($$). You can read more about the concept first shown in the Android Dev Challenge at Androidandme.com. You can also show your support for the dev team by voting for them to help get some funding here. I am pretty […]