Telecom and Networking

Linux TCP SACK and PTP vulnerabilities

Linux PCs, Servers, Gadgets Can Be Crashed by ‘Ping of Death’ Network Packets writes that it is possible to crash and slow-down network-facing Linux servers, PCs, smartphones and tablets, and gadgets, by sending them a series of maliciously crafted packets. Netflix has published a security paper with many details. There are four vulnerabilities, three of

Bluetooth 5.1 location technology demo

Last week when I visited Arrow IoT summit I saw Bluetooth location services in use.  Two booth on the even showed Bluetooth positioning in two compartments. Quuppa Oy showed their own Bluetooth-based indoor positioning technology, which is used in many applications. With its unique Angle-of-Arrival (AoA) method and positioning algorithms, the system enables real-time tracking of

Intel, Qualcomm and Google are cutting off business with Huawei

It seems that USA-China trade war has really started now: America was the land of free trade … precisely until it is not anymore. https://www.androidauthority.com/intel-qualcomm-huawei-988011/ Intel, Qualcomm, Broadcom, and Xilinx have reportedly moved to stop supplying Huawei. Google has also suspended business with Huawei in the wake of the ban. https://techcrunch.com/2019/05/20/several-chip-companies-including-qualcomm-and-intel-have-reportedly-stopped-supplying-huawei-after-blacklist/ According to Bloomberg, semiconductor

China Spying on Undersea Internet Cables – Schneier on Security

https://www.schneier.com/blog/archives/2019/04/china_spying_on.html It seems that supply chain security is an insurmountably hard problem in Internet age. For years, the US and the Five Eyes seems to have had a monopoly on spying on the Internet around the globe. Now other countries seem to want in too. The recent focus on cyber security discussion has been a

Internet RFC Series Turn 50

http://www.circleid.com/posts/20190407_internet_rfc_series_turn_50/We have just passed the fiftieth anniversary for the Internet “Request for Comments” (RFC) series which started in April 1969 with the publication of RFC1 titled “Host Software” authored by Stephen D. Crocker. — “Today, more than 8500 RFCs have been published, ranging across best practice information, experimental protocols, informational material, and, of course, Internet

Does 5G pose health risks?| EDN

https://www.edn.com/electronics-blogs/5g-waves/4461754/Does-5G-pose-health-risks—part-1- There has been some talk about 5G and health risks that range from hardly anything to frying your brain and controlling the population. This interesting article series is exploring the health risks posed by mmWave radiation onto humans. Millimeter wave (mmWave) frequencies extend from 30 GHz to 300 GHz. From the literature, there can

New Tech Secures Medical Devices By Using Your Body as a Conduit for Communication

https://blog.hackster.io/new-tech-secures-medical-devices-by-using-your-body-as-a-conduit-for-communication-8ca7b8128f67 The article says: “Virtually all wearable devices today communicate wirelessly through either Bluetooth, WiFi, or simple RF (Radio Frequency) signals. While we could try to make those more secure, there is always the possibility that they could be intercepted or spoofed. This new technology avoids the problem altogether by allowing devices to communicate across