Archive for news
You are browsing the archives of news.
You are browsing the archives of news.
SILK ROAD (of history) The “silk road” of history was a group of trade routes that linked cultures and expanded civilizations by sharing ideas. It got its name from the effort to find good traveling routes for trading silk with China. But once the silk road routes were established, traders carried all manner of goods […]
We are all told to not give out our financial account access information to some stranger over the phone. We are told instead to initiate a call ourselves to our bank in order to ensure that we know to whom we are speaking. This new fraud technique appears to circumvent that advice. Beware the courier […]
If the NSA has managed to inject backdoor access into most U.S. produced technology, they can win a victory in the intelligence war, but we the citizens may find it necessary to abandon some of the use of American technology ourselves. If we can make our enemies afraid that we can access their computers and […]
A smart meter is a digital metering device used to measure public utility electric power consumption. They typically report their information via a wireless link every fifteen minutes or so. This allows the utility company to collect metering information without using human meter readers to manually observe the meter and to gain a more accurate […]
Our GPS satellite system puts out two sets of signals; one for our military, which is encrypted and highly accurate, and another signal for civilian use, which is not encrypted and is less accurate. Most domestic drones are currently using the unencrypted civilian signal set, which leaves them vulnerable to fairly simple spoofing attacks. By […]
The Jester Dynamic: A Lesson in Asymmetric Unmanaged Cyber Warfare – [sans.org] 2. Background On December 30, 2010, a patriot hacker posted a message to an Internet Chat Relay (IRC) Server. Quoting Steve Jobs, the hacker typed: “A small team of A players can run circles round a giant team of B and C players” […]
This article describes how criminals have begun to integrate bluetooth technology into card reader skimmers to make it more effective for them to collect stolen card information. Josh Wright is an expert on bluetooth and wireless security in general and is a Senior Instructor at the SANS Institute, where he authored (and often teaches) the […]
U.S., Australia to add cyber realm to defense treaty – [reuters.com] (Reuters) – The United States and Australia will take the rare step on Thursday of declaring the cyber realm as part of a mutual defense treaty, meaning that a cyber attack on one could lead to a response by both nations. U.S.-Australia Ministerial Consultations […]
It’s now become fairly easy and cheap to make an autonomous flying model drone. Telemetry that relays information collected by a drone back to the ground has been demonstrated. Wireless hacking from equipment mounted on a flying drone has been demonstrated. Flying drones are becoming smaller, cheaper and more automated. Flying model aircraft have been […]
Slip-Up in Chinese Military TV Show Reveals More Than Intended – [theepochtimes.com] Piece shows cyber warfare against US entities A standard, even boring, piece of Chinese military propaganda screened in mid-July included what must have been an unintended but nevertheless damaging revelation: shots from a computer screen showing a Chinese military university is engaged in […]