Posts Tagged security

Blackphone Challenging Conventional Wisdom

From the Silent Circle blog:

Blackphone is an innovative new ecosystem. The idea of creating an entirely new ecosystem is not new. Microsoft had its run with Windows, Skype, and Bing. They created an entire ecosystem behind the hardware and software, but failed to innovate ahead of the curve. Blackberry had its run with the phones, BEZ servers and BBM messaging. They are now dying a thousand little deaths because they did not innovate quickly enough. Google, Apple, Samsung and others have created dominant ecosystems that tie in software, hardware, wearables, media, music and services.  They rapidly innovated new platforms and models that left Microsoft, Blackberry, Nokia, HTC and others behind quickly. It’s been an amazing run for them, but this model too is dwindling. Fast movers like Xiaomi are killing them. Innovation, security and privacy demands are already putting cracks in this windshield. The fuel that feeds their ecosystem machine is customer data… Your data. It is pure gold to them.

, , , , ,

No Comments

Privacy at the Olympics

From Silent Circle:

Russian authorities have openly acknowledged that widespread monitoring of phone, Internet and other communications systems is in place during the games and have framed these measures as part of overall security preparedness. Safety and security aside, this degree of persistent surveillance creates severe risks for visitors worried about sensitive personal and business communications being compromised when they keep in touch with colleagues and others from Sochi. There have been a number of stories over the past week warning that visitors and athletes can expect to be hacked, noting “it isn’t a mater of ‘if,” but a matter of ‘when.’”

, , , , , ,

No Comments

SimpliSafe Home Security

CNET recommends the SimpliSafe system for home security.

, , ,

No Comments

Sochi 2014: A Security Challenge

Sochi 2014: A Security Challenge is republished with permission of Stratfor.”

Summary

The Russian city of Sochi will host the 2014 Winter Olympics from Feb. 7 to Feb. 23 and the Paralympics from March 7 to March 16. Russia is no stranger to hosting high-profile global events; it hosted the 1980 Summer Olympics and is preparing for the 2018 World Cup final.

Though the 2014 games seemingly offer Moscow a perfect platform for showcasing the strength of its security apparatus, Russia will have to work overtime to protect athletes and spectators. This in turn could leave surrounding regions such as the Northern Caucasus and major cities such as Moscow and St. Petersburg exposed to militancy, terrorism and organized crime. Militants from the Caucasus striking elsewhere in Russia during the games to avoid the intense security that will be present in Sochi and to capitalize on news coverage of the highly publicized event pose the greatest threat to the games. Read the rest of this entry »

, , , , , , , , , , ,

No Comments

Central Asia and Afghanistan: A Tumultuous History

Central Asia and Afghanistan: A Tumultuous History is republished with permission of Stratfor.”

Summary

Editor’s Note: This is the first installment of a two-part series on the relationship between Central Asia and Afghanistan and the expected effects of the U.S. drawdown in Afghanistan on Central Asian security. Click here to read Part 2.

Contrary to popular perception, Central Asia is not likely to see an immediate explosion of violence and militancy after the U.S. and NATO drawdown from Afghanistan in 2014. However, Central Asia’s internal issues and the region’s many links with Afghanistan — including a web of relationships among militant groups — will add to the volatility in the region.

Analysis

Central Asia has numerous important links to Afghanistan that will open the region to significant effects after the upcoming U.S. and NATO drawdown. First and foremost, Central Asia is linked to Afghanistan geographically; Turkmenistan, Uzbekistan and Tajikistan share borders with Afghanistan that collectively span more than 2,000 kilometers (about 1,240 miles). The Afghan border with Tajikistan, along the eastern edge of Afghanistan, makes up more than half of that distance, at 1,344 kilometers. The borders with Turkmenistan (744 kilometers) and Uzbekistan (137 kilometers) run along Afghanistan’s western edge. Most of the Tajik-Afghan border is mountainous and therefore poorly demarcated, and the topography of Afghanistan’s frontiers with Turkmenistan and Uzbekistan is largely desert.  Read the rest of this entry »

, , , , , , , , ,

No Comments

Anarchy in Detroit

From Reason TV:

, , , , , , , ,

No Comments

RSA Product Weakened by NSA

From The Guardian:

RSA, the security arm of the storage company EMC, sent an email to customers telling them that the default random number generator in a toolkit for developers used a weak formula, and they should switch to one of the other formulas in the product.

, , , ,

No Comments

NSA May Have Impersonated Google

From Cnet.com:

Earlier this week, Techdirt picked up on a passing mention in a Brazilian news story and a Slate article to point out that the US National Security Agency had apparently impersonated Google on at least one occasion to gather data on people. (Mother Jones subsequently pointed out Techdirt’s point-out.)

A technique commonly used by hackers, a MITM attack involves using a fake security certificate to pose as a legitimate Web service, bypass browser security settings, and then intercept data that an unsuspecting person is sending to that service. Hackers could, for example, pose as a banking Web site and steal passwords.

, , , , , , , ,

No Comments

Mexican Town Arms Women In Struggle Against Cartel Violence

From Tea Party Economist:

The women signed up over the past four days with the Union of Peoples and Organizations of Guerrero State, or UPOEG, Xaltianguis community self-defense force commander Miguel Angel Jimenez told reporters.

, , , , , ,

No Comments

Planning for a Safe Trip

Planning for a Safe Trip is republished with permission of Stratfor.”

By Scott Stewart

In light of the current U.S. State Department global travel warning, it seems an opportune time for a discussion on how to prepare to travel safely. Perhaps the most important key to remaining out of harm’s way while traveling or working abroad is to know and understand — in advance — some of the idiosyncrasies of each country’s bureaucracy and the security risks that have been identified for your destination. This knowledge and guidance will then allow you to decide whether to even travel to a particular destination. If you do decide to travel, it will help you plan and implement proper precautions for the environment you will be visiting. Fortunately, finding safety and security information for your destination country is easier than ever in the Internet age.

Travel Advisories and Consular Information Sheets

One of the most important first steps U.S. travelers should take before beginning a trip is seeing what the U.S. government says about your destination country. A great deal of information can be obtained from the U.S. government. Travelers accordingly should read the consular information sheet and check for travel warnings and public announcements pertaining to their destination countries before embarking. Such information can be obtained in person at passport agencies inside the United States or at U.S. embassies and consulates abroad. This information also can also be obtained by calling the U.S. State Department, but the quickest and easiest way to obtain it is online: The State Department publishes them all on its website here. Read the rest of this entry »

, , , , , , ,

No Comments

Silent Circle Can’t Guarantee Customers’ Privacy From NSA

From Tech Crunch:

“We knew USG would come after us”. That’s why Silent Circle CEO Michael Janke tells TechCrunch his company shut down its Silent Mail encrypted email service. It hadn’t been told to provide data to the government, but after Lavabit shut down today rather than be “complicit” with NSA spying, Silent Circle told customers it has killed off Silent Mail rather than risk their privacy.

Full press release from Silent Circle.

What Silent Circle does:

, , , , , , , , , ,

No Comments

NSA Targeted TOR Network With Malware

From BoingBoing.net:

Initial investigations traced the address to defense contractor SAIC, which provides a wide range of information technology and C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance) support to the Department of Defense. The geolocation of the IP address corresponds to an SAIC facility in Arlington, Virginia.

, , , , , , ,

No Comments

Andriod Backup Services May Not Be Secure

If you use an Android device you may want to review how you store your settings and passwords.

From the Electronic Frontier Foundation:

If you have a recent Android phone or tablet, chances are you take advantage of a convenient feature to backup your application settings and wireless network passwords. This feature is enabled by default in Android 2.2 and later, and it can make switching to a new device or replacing a lost phone a quicker process. If you haven’t examined all the settings for your phone, you might not know if this setting is enabled.

, , , , , , , , ,

No Comments

Keeping Embassies Safe

From CNN:

Before entering a high-threat area like Benghazi, or indeed any other unstable environment, it is essential to determine if the mission is worth the risk. In assessing Benghazi, the first question that comes to mind is:  What was so important about having a diplomatic presence in a city characterized as unstable; a city the British, French and United Nations had effectively abandoned because of warring militias and earlier bombings?  Why was the United States still there? All assessments about the viability of the mission and all plans to protect U.S. diplomatic compounds around the world have to begin with answers to this question.

, , , , , ,

No Comments

Creating and Managing Passwords: How the Experts Do It

From Ars Technica:

I recently checked in with five security experts to learn about their approach to choosing and storing crack-resistant passwords. They include renowned cryptographer Bruce Schneier, who is a “security futurologist” at BT and recently joined the Electronic Frontier Foundation’s board of directors; Adriel T. Desautels, CEO of Netragard, a firm that gets paid to hack large companies and then tell them how it was done; Jeremiah Grossman, founder and CTO of WhiteHat Security; Jeffrey Goldberg, “defender against the dark arts” at AgileBits, a company that develops the popular 1Password password manager; and Jeremi Gosney, a password security expert at Stricture Consulting.

, , , ,

No Comments