On September 28th, I delivered presentation on topic “Location Based Services – Security and Privacy Aspects” on global group Telenor Security Conference 2011. Abstract: Location based services are fast growing area in various types of businesses, particularly concerning mobile operators … Continued
There is serious vulnerability with A5/1 encryption scheme used in GSM networks. It can lead to interception of GSM calls. This vulnerability has been presented by Karsten Nohl and Chris Paget at the 26th Chaos Communication Congress (26C3).
After quite some time of silence regarding my work on Wireless Intrusion Detection and Prevention Systems (WIDS / WIPS), I’m considering continuing that work. In past I have done research, published couple of papers on this topic at conferences and journals and also created concept, basic architecture and design of system and products. This possible “reactivating” of work is particularly pushed by recent interest of companies, organizations and institutions including commercial, government etc, and requirements of many production environments.
This is just brief description. If you are interested in more details or want to consider contribution or investment into this development send me e-mail.
Gábor Török, senior mobile software engineer who has been involved in S60 platform development since 2000, posted interesting article on his blog. Title of this post is “Symbian Platform Security – hacked?” and it links to another couple blogs and … Continued
This sounds unbelievable but document marked as strictly confidential, Ericsson Interception Management System Manual is available for free download from Internet. I don’t know is that obsolete document or valid, but anyway it is very surprising that you can obtain document … Continued
In IEEE Spectrum, July 2007 issue, there is interesting article how some extremely smart hackers pulled off the most audacious cell-network break-in ever. It is still unknown who pulled off the most audacious network hack ever, but here’s (IEEE Spectrum: … Continued
Seems interesting if it is true – Tutorial: “Unlock” your iPhone with SuperSim – Hackint0sh.
At present time many people talk about possibility of eavesdropping their phone conversations, including voice, data transfers and SMS/MMS messages. On the “Systems exposition” in Germany, Mr Wilfired Hafner – general manager SecurStar, demonstrated how easy it is to listen … Continued
Bluetooth wireless technology is a short-range communications technology intended to replace the cables connecting portable and/or fixed devices while maintaining high levels of security. The key features of Bluetooth technology are robustness, low power, and low cost. The Bluetooth specification … Continued
Can mobile / cellular phone be used for remotely eavesdropping? Maybe yes, maybe no – who knows. Read interesting Schneier’s post and find out more about this.