Cybersecurity

Netcon GW502 found to be “competently hardened”

I work for Netcontrol that makes provides energy network automation solutions for utility communication, distribution automation, substation automation, and control centers. I have done lots of work with their embedded systems and their security. And I write to this blog actively covering many topica from electronics to network security. Now some news from my daily

Why aren’t Stingrays rendered ineffective by standard MITM defenses? – Information Security Stack Exchange

http://security.stackexchange.com/questions/117460/why-arent-stingrays-rendered-ineffective-by-standard-mitm-defenses There’s been a lot of reporting in the past few years about law enforcement agencies using IMSI catchers (also known as Stingrays after a popular brand of them) to intercept cellular communications. Stingrays and other IMSI-catchers violate the cell tower agreements by producing an illegal signal, pretending to be a cell tower.They control the

Who Has Your Back? Government Data Requests 2015 | Electronic Frontier Foundation

Who Has Your Back? 2015: Protecting Your Data From Government Requests report https://www.eff.org/who-has-your-back-government-data-requests-2015 We live digital lives—from the videos shared on social networks, to location-aware apps on mobile phones, to log-in data for connecting to our email, to our stored documents, to our search history. The personal, the profound, and even the absurd are all