Researcher Intercepts GSM Cell Phones During Defcon Demo
/
0 Comments
DEFCON18 -- Las Vegas -- A hardware hacking expert here at Defcon18 successfully faked several attendees' cell phones into connecting to his phony GSM base station during a live demonstration that had initially raised concerns at the Federal Communications Commission (FCC).
Video Streaming Feed at Black Hat Hacked
A security expert found a way to catch the talks at Black Hat for free, thanks to bugs in the video streaming service used by the security conference. Read the full article. [IDG News Service]
BSD Operating Systems. August issue is here!
I am happy to introduce you August issue. This time we will be mentioning Windows, Ubuntu in our magazine, but surely it will be more than connected to BSD.
Get yourself a copy and let us know if it was usefull and interesting.
We also have modified and have another survey for you, please find some time to fill it in.
Facebook Hacked or Not? – 100 Million User Profiles on Public Site
Recently in the media, there has been a big “commotion” about the 100 million Facebook profiles containing user IDs, names, URLs and other data that was obtained and place into a file and posted online by Ron Bowles a security consultant. The media and surprisingly many security professionals have been spinning this matter as massive hack on Facebook and its users, when it fact it really was not.
August Issue of Hakin9: Securing the Cloud – Free Download
August issue of Hakin9: Securing the Cloud
New issue of Hakin9 magazine already available!
Inside:
Prey: A New Hope by Mervyn Heng
An introduction to Reverse Engineering: Flash, .NET by Nilesh Kumar
Web Malware - Part 1 by Rajdeep Chakraborty
Cyber warfare with DNSbotnets by Francisco Alonso
Search Engine Security and Privacy by Rebecca Wynn
Securing the Cloud: Is it a Paradigm Shift in Information Security? by Gary Miliefsky
Radio Frequency-enabled Identity Theft by Julian Evans
Intelligence Monopolies by Matthew Jonkmann
Special Report: Capturing the New Frontier: How To Unlock the Power of Cloud Computing by Mike Armistead
iPhone Jailbreaking: Security Concern or Not?
For those who are not familiar with the term jailbreak, it is freeing a device from the constraints imposed by the vendor. It normally requires the installation of software on a computer that will allow it to be installed on the device thus breaking it wide open for access and full modification as well as access to third party non-approved software.
