Cybersecurity

Why aren’t Stingrays rendered ineffective by standard MITM defenses? – Information Security Stack Exchange

http://security.stackexchange.com/questions/117460/why-arent-stingrays-rendered-ineffective-by-standard-mitm-defenses There’s been a lot of reporting in the past few years about law enforcement agencies using IMSI catchers (also known as Stingrays after a popular brand of them) to intercept cellular communications. Stingrays and other IMSI-catchers violate the cell tower agreements by producing an illegal signal, pretending to be a cell tower.They control the

Who Has Your Back? Government Data Requests 2015 | Electronic Frontier Foundation

Who Has Your Back? 2015: Protecting Your Data From Government Requests report https://www.eff.org/who-has-your-back-government-data-requests-2015 We live digital lives—from the videos shared on social networks, to location-aware apps on mobile phones, to log-in data for connecting to our email, to our stored documents, to our search history. The personal, the profound, and even the absurd are all

Stagefright: Millions of Android devices at risk from new exploit (Wired UK)

Security researchers have successfully exploited the Android-based Stagefright bug and remotely hacked a phone, which may leave millions devices vulnerable to attack. Israeli software research company NorthBit claimed it had “properly” exploited the Android bug that was originally described as the “worst ever discovered”. http://www.wired.co.uk/news/archive/2016-03/16/stagefright-android-real-world-hack The exploitation, called Metaphor, is detailed in a research paper

5 Major Hospital Hacks: Horror Stories from the Cybersecurity Frontlines – IEEE Spectrum

5 Major Hospital Hacks: Horror Stories from the Cybersecurity Frontlines article tells that real-world war, combatants typically don’t attack hospitals. In the cyber realm, hackers have no such scruples. “We’re attacked about every 7 seconds, 24 hours a day” Many computers and medical devices in hospitals are running ancient operating systems that are full of security holes.

Darpa Invites Techies to Turn Off-the-Shelf Products Into Weapons in New ‘Improv’ Challenge – IEEE Spectrum

The good news is that some of today’s most advanced technologies are cheap and easy to find, both online and on the shelves of major chain stores. That’s also the bad news, according to DARPA. Darpa Invites Techies to Turn Off-the-Shelf Products Into Weapons in New ‘Improv’ Challenge article tells that defense agency is nervous

What ISPs Can See

What ISPs Can See: Clarifying the technical landscape of the broadband privacy debate https://www.teamupturn.com/reports/2016/what-isps-can-see Truly pervasive encryption on the Internet is still a long way off. The fraction of total Internet traffic that’s encrypted is a poor proxy for the privacy interests of a typical user. Even with HTTPS, ISPs can still see the domains