Archive for category Comms

The Great Radio Spectrum Famine

Mobile broadband is consuming the available radio spectrum. Serving up more won’t be easy.

Read the full article here…

http://spectrum.ieee.org/telecom/wireless/the-great-radio-spectrum-famine/1

, ,

No Comments

EP3 Sonic Defenders Now In Black

,

No Comments

Feds Propose Onerous Internet Laws

From: EFF

Government Seeks Back Door Into All Our Communications

The U.S. government has made two proposals this week that threaten online speech and privacy in radical new ways. Either one, if passed by Congress, will fundamentally rewrite the rules of the Internet. EFF is fighting hard for your rights and needs your help.

These proposals are the most frightening we’ve seen in a long time. The first is a bill called the “Combating Online Infringement and Counterfeits Act,” which would give the Justice Department new powers to censor websites accused of aiding “piracy.” The second is an Obama Administration proposal that would end online privacy as we know it by requiring all Internet communication service providers — from Facebook to Skype to your webmail provider — to rebuild their systems to give the government backdoor access to all of your private Internet communications.

more

No Comments

ZeuS Can Defeat Mobile Phone 2-factor Authentication

From: S21sec and Dave Jevans

It appears now that the criminals have developed malicious software for various mobile smart phones, than can capture these (one-time password)  banking text messages, and forward them to the criminals so that they can  log into the user’s bank account.

In his blog posting, David describes analyzing such a mobile phone malware that was designed for Symbian phones.

He calls this attack, “Man-in-the-mobile”.

, , , ,

No Comments

Ballistic Hard Case for iPhone 4

From: goballisticcase.com

iPhone 4 Ballistic HC Series Case

This Ballistic HC Case is a MUST HAVE for your brand new iPhone 4. Keep your iPhone 4 looking as good as the day you took it out of the box! Engineered with FOUR layers of protection AND a built in screen protector, this case offers security from drops, fingerprints, scratches, dust and well… life in general. We assure you this is a case you won’t want to pass up!

  • Advanced four layer protection
  • Optional outer layer for ultimate protection
  • Integrated screen protector and holster
  • 180 degree rotating belt-clip

Click here to Download the Installation and Removal Instructions

No Comments

LastPass Vetted by Steve Gibson of GRC

LastPass is a cross-platform ( Windows, Mac, Linux, iPhone, BlackBerry, Android) password manager and multi-factor authentication  tool. I have been using it in a limited test for almost a year now and I am very pleased to say that my confidence in the security of this system is high and I am adopting it as my go-to application for managing secure passwords and for multi-factor authentication. There is a free version with almost all the functionality. This is a well thought out system.

Steve Gibson of GRC.com and the Security Now podcast  goes into some detail about the LastPass CRYPTO and why this is a secure and redundant system in the podcast linked bellow . The real meat isn’t until about the 53rd minute so fast forward if you find yourself nodding off in the first part of the show.

Security Now Episode 256.

Here is a transcript of the show.

, , ,

No Comments

Communication & Location – Garmin Rino 530hcx

,

No Comments

Car-Hacking

From: MIT Tech Review

Taking Over a Car

Researchers “break in” with software and a laptop.

By Erica Naone

Car-HackingCars are becoming more computerized, an evolution that could have an unintended side effect: vulnerability to attacks. Researchers at the University of Washington and the University of California, San Diego, led by Tadayoshi Kohno and Stefan Savage, recently showed that by taking over a car’s computers, they could disable the brakes, stop the engine, and control the door locks. For now, most of the attacks require access to a port inside the car. But wreaking havoc could get easier as carmakers add more wireless connectivity. The researchers hope their work will motivate manufacturers to add security features.

,

No Comments

Apple Seeks Patent to Spy on Customers

From: EFF

While users were celebrating the new jailbreaking and unlocking exemptions, Apple was quietly preparing to apply for a patent on technology that, among other things, would allow Apple to identify and punish users who take advantage of those exemptions or otherwise tinker with their devices. This patent application does nothing short of providing a roadmap for how Apple can — and presumably will — spy on its customers and control the way its customers use Apple products.

More

,

No Comments

Protecting the Critical Infrastructure

From: IDGA

With a turbulent economic outlook, advancing threats from cyber criminals and an ongoing oil spill impacting our global ecosystem; the challenge of protecting the critical infrastructure can no longer be an exercise in reactive security. Caretakers of these systems have to look at changing how they monitor, control, and recover in the event of a cyberevent. By the looks of things BP is dealing with their fair share of Hacktivism right now.

more

, , , ,

No Comments

Cyber Security Summit

4th Cyber Security Summit

September 20 – 22, 2010, Sheraton Premiere at Tysons Corner Hotel, Vienna, VA

Info

, , ,

No Comments

Atlantic Signal Tactical Headsets

Atlantic Signal Custom Tactical Headset Systems, Options & Accessories

Atlantic SignalAtlantic Signal and its predecessor, New Eagle, have been in the business of designing and manufacturing tactical communications for L.E. and Military Operators worldwide since 1989. www.atlanticsignal.com

, ,

No Comments

Smartphones, Jailbreaking and the New Battle Front for Enterprise Security

From: IDGA

… So why is this so bad? First and foremost jailbreaking is a hack! Users are inviting a third party developer to hack your device. Plain and simple. Most recent versions of these tools are able to run over a simple webpage that is exploiting a few unpatched vulnerabilities in the smart phone operating system code. This risk was exposed last year when a worm “rick rolled” jailbroken iPhone users, exploiting a default password setting in secure shell daemon installed as part of the jailbreaking process.

more

, , , ,

No Comments

Saudis to Monitor BlackBerry Data

From: CNET

BlackBerryBlackBerry maker Research in Motion has decided to allow the government of Saudi Arabia access to BlackBerry users’ messages, in order to avoid a ban on the device in the country, the Associated Press reported Saturday.

The AP quoted an official at the Saudi Communications and Information Technology Commission as saying that the deal between RIM and the government would likely involve placing a BlackBerry server inside the country to enable the Saudis to monitor data.

, , ,

No Comments

Nationwide Simulated Emergency Communications Test

In late June every year in the United States, unbeknownst to most Americans, a nation-wide radio communications network is set up that links every major city and most of the geography of the country.  This massive amount of technological infrastructure is set up from scratch within a few hours at locations that vary from State/Local Government Emergency Operations Centers to isolated areas without utilities of any kind. Every mode of radio communications is utilized including analog, digital, voice, data, simplex, duplex, satellites and even automated relay stations launched on aircraft and with weather balloons.  For 24 continuous hours this nation-wide radio communications network is exercised with the primary objective of proving the system’s readiness and capabilities. Then as quickly as it was set up the system is dismantled and stored in preparation for when it is needed. It is the most reliable back-up emergency communication system in the world. And it does not cost the U.S. tax payers one cent — not in equipment or human resources. The benefits of such a system to emergency relief operations should be obvious.  In fact the system has demonstrated its’ value time after time during earthquakes, hurricanes, forest fires, terrorist attacks and other disasters. And all of this capability is provided by volunteers who continuously hone their technical skills and acquire/build/maintain their own equipment. These skilled radio engineers and operators along with their equipment combine into a seriously important resource for emergency communications. And the annual event that tests their readiness is called “Amateur Radio Field Day”.

For Amateur Radio operators (Hams) Field Day is a big deal. In addition to exercising their ability to set up and operate a massive emergency communications network the event also has some fun aspects. Field Day is also a big contest where stations compete to make the most contacts on as many frequencies and modes as possible. And there is the social aspect that usually involves food and ancillary outdoor family activities. This is also the major Amateur Radio annual public awareness event. If you are interested in learning about Amateur Radio or more specific radio communications technologies and techniques then visiting your local Field Day site should net you the information you seek. You will find many knowledgeable people who will welcome you and be happy to answer your questions. You might even get invited to stay for lunch and/or dinner.

The annual Field Day event is coordinated by the national association for Amateur Radio; the American Radio Relay League (ARRL). Here are some links to more information about Field Day which is held on the last full weekend of June each year.

General Field Day Information:
http://www.arrl.org/field-day

Locate a Field Day site near you:
http://www.arrl.org/field-day-locator

Until next time, best wishes.

…Roy…

No Comments