On September 28th, I delivered presentation on topic “Location Based Services – Security and Privacy Aspects” on global group Telenor Security Conference 2011. Abstract: Location based services are fast growing area in various types of businesses, particularly concerning mobile operators … Continued
I was cited and quoted couple of times in IEEE Computer Magazine article “Fighting Intrusions into Wireless Networks”, Springer Link Book “Novel Algorithms and Techniques in Telecommunications and Networking” and Telektronikk Journal.
There is serious vulnerability with A5/1 encryption scheme used in GSM networks. It can lead to interception of GSM calls. This vulnerability has been presented by Karsten Nohl and Chris Paget at the 26th Chaos Communication Congress (26C3).
After quite some time of silence regarding my work on Wireless Intrusion Detection and Prevention Systems (WIDS / WIPS), I’m considering continuing that work. In past I have done research, published couple of papers on this topic at conferences and journals and also created concept, basic architecture and design of system and products. This possible “reactivating” of work is particularly pushed by recent interest of companies, organizations and institutions including commercial, government etc, and requirements of many production environments.
This is just brief description. If you are interested in more details or want to consider contribution or investment into this development send me e-mail.
Academic researchers have found an exploitable hole in a popular form of wireless networking encryption. The hole is in a part of 802.11i that forms the basis of WiFi Protected Access (WPA), so it could affect routers worldwide.
Do you owe cell phone? Yes, of course. Then read this: Cell Phone Spying: Is Your Life Being Monitored? It says: It connects you to the world, but your cell phone could also be giving anyone from your boss to … Continued
The outbreak of a wireless computer worm that spreads among portable devices like a flu epidemic is a possibility, according to a new mathematical model developed by Imperial College London researcher Christopher Rhodes and BT researcher Maziar Nekovee. Their model … Continued
Hacking challenge Bangkok 2007: AirRaid2 – Wireless Hacking Tournament. From tournament description: Wireless networks using 802.11 and Bluetooth have become common deployments in today’s corporate environments. To underscore the importance of securing these wireless networking technologies, ThinkSECURE is following up our … Continued
WEP is dead and here’s the proof – explanation how attack on the 802.11 wireless security protocol works: Gone in 120 seconds: cracking Wi-Fi security | The Register.
Ryan Naraine writes on his ZDNet blog about Wi-Fi hacking with a handheld PDA. The palm-sized PDA tucked away in Justine Aitel’s pocketbook just might be the most scary device on display at this year’s RSA security conference. Aitel is … Continued