Information Security News
Computer scientists have devised a technique that could one day allow advertisers or law enforcement organizations to surreptitiously fingerprint smartphones.
The attack, recently unveiled by a team of researchers from Stanford University, could be attractive because it works against virtually any smartphone equipped with an "accelerometer." That's the sensor that determines the tilt a person is using to orient a smartphone and shifts the display to either landscape or vertical, accordingly. No special apps or permissions are required beyond a standard browser running with default settings. The technique leaves no browser cookies or other files on the device disk, making it hard for end users to detect using any security or privacy software available today.
by Mr E Snowden
I came acros this page because I have a samsung Wave phone that keeps calling the police when it is locked and the protective cover is down and will be taking it back to Currys for a second time and will demand my money back this time.
You could write what I know about mobile phones on the back of a postage stamp but I am an expert on PC Security and I can tell you that you are being watched more than ever and smasung are great TV's but the smart TV I got from them sends the MAC address of the TV using HTTP messages to Koria and Samsung.com and then the TV connects to everyone from Goolge to Youtube and all within a second of turning the TV on.
Samsung knows it you using the IP-Address since they have the MAC address registered to you and Google plus everyone else knows that you are using a samsung TV from the user-agent in tthe HTTP requests so it becomes a fair bet that Samsung is completing the triangle and is being paid to confilm it's you on that IP address to fee paying customers like Google/Microsoft who all share data.
No point locking the door if someone outside is giving away copies of your front door key
SSL/HTTPS is often not used to protect you but to hide the spyware scripts used by the likes of Google and in any case it seems that most ISP;s are now using a MITM SSL certificate to decrypt all your data.
Smart phone, smart TV's are not so smart after all so don't throw them old phones away that cannot be hacked and just think some come without a stupid one touch SOS button that might get you into a lot of trouble and gives the police an excuse to kick in anyones door and say that it was the phone that did it.
by スント 時計 アウトレット
In the HBO hit series The Wire, disposable cell phones were the bane of detectives' lives. Drug dealers obtained these prepaid "burners" in mass quantities with cash at multiple stores hundreds of miles away from where they were used. After a week or two of use, a crook would destroy one cheap handset and fetch a new one. The Baltimore Police detectives' inability to tap the phones stymied their investigation into one of the city's most ruthless crime families—until they found a way to track the devices.
The National Security Agency may have made a similar breakthrough. Cato Institute researcher and Ars alum Julian Sanchez recently pulled a few sentences from a 2009 declaration by NSA Director Keith Alexander. They describe an unnamed tool that routinely accessed the vast database of call records assembled by the NSA. Sanchez argues that the purpose may be to identify burner phones used by NSA targets. The tool, according to Alexander's declaration:
was automatically invoked to support certain types of analytical research. Specifically, to help analysts identify a phone number of interest. If an analyst conducted research supported by [REDACTED] the analyst would receive a generic notification that NSA’s signals intelligence (“SIGINT”) databases contained one or more references to the telephone identifier in which the analyst was interested; a count of how many times the identifier was present in SIGINT databases; the dates of the first and last call events associated with the identifier; a count of how many other unique telephone identifiers had direct contact with the identifier that was the subject of the analyst’s research; the total number of calls made to or from the telephone identifier that was the subject of the analyst’s research; the ratio of the count of total calls to the count of unique contacts; and the amount of time it took to process the analyst’s query. [REDACTED] did not return to the analyst the actual telephone identifier(s) that were in contact with the telephone identifier that was the subject of the analyst’s research and the analyst did not receive a listing of the individual NSA databases that were queried by [REDACTED].
Pondering interesting infosec transactions
SC Magazine Australia
ProofPoint - who are serial acquirers in the cyber-security industry - acquired Sendmail for about $23 Million in cash, paying a revenue multiple of something like 10, and a profit multiple of n/a since by the sounds of the announcement, Sendmail as a ...
Posted by InfoSec News on Oct 14http://www.thv11.com/news/article/283191/2/Jacksonville-man-arrested-on-recent-attacks-on-power-grid
Posted by InfoSec News on Oct 14http://www.baythreat.org/cfp.html
Posted by InfoSec News on Oct 14http://uk.reuters.com/article/2013/10/13/us-security-internet-idUKBRE99C03F20131013
Posted by InfoSec News on Oct 14http://economictimes.indiatimes.com/tech/internet/monendra-sahu-raipurs-ethical-hacker-in-googles-security-hall-of-fame/articleshow/24115217.cms
Posted by InfoSec News on Oct 14http://www.bizjournals.com/sanjose/news/2013/10/10/cybersecurity-is-hot-heres-the.html