Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

PRC PLA Navy Targeting Undersea Communications Cables?

May 17, 2019 by Marc Handelman in Communication Security, National Security, Network Security, Physical Security

Opinion piece of merit, via James Stavridis, ADM USN (RET) and former Supreme Commander of NATO; in which, the good Admiral details behaviors, focus and actions of the PRC's People's Liberation Army Navy in relation to the world's undersea communications systems. An eye opener of immense potential downside. Today's Must Read.

May 17, 2019 /Marc Handelman
Communication Security, National Security, Network Security, Physical Security

DerbyCon 2018, Justin Herman's 'Off-Grid Coms And Power' →

November 05, 2018 by Marc Handelman in Irongeek, Information Security, ICS/SCADA, Education, Conferences, Communication Security, Communications, DerbyCon

Videography Credit: Irongeek (Adrian Crenshaw).

November 05, 2018 /Marc Handelman
Irongeek, Information Security, ICS/SCADA, Education, Conferences, Communication Security, Communications, DerbyCon

Telegram Updated, Amidst Kremlin Capers, Apple Angst →

June 04, 2018 by Marc Handelman in Encryption, Communications, Communication Security, Must Read

News from over the weekend - via 9to5Mac writer Michael Potuck, focusing on Telegram; of which, the encrypted messaging iOS app has been permitted to publish the latest update to their bits - via Apple Inc. (Nasdaq: AAPL) iTunes App Store. This, despite the declaration of illegality by Kremlin Apparatchiki. Today's Must Read.

June 04, 2018 /Marc Handelman
Encryption, Communications, Communication Security, Must Read

4G Gone Wild →

March 06, 2018 by Marc Handelman in Communication Security, Cellular Telephony, Information Security, Network Security

via Zack Whittaker, writing at the Zero Day blog at ZDNet, tells the story of recently discovered 4G LTE attacks, and the academicians studying the specifics of these pernicious exploits (the group's recently published paper is currently available). Today's MustRead. H/T

Ten attacks detailed in a new paper by researchers at Purdue University and the University of Iowa expose weaknesses in three critical protocol operations of the cellular network, such as securely attaching a device to the network and maintaining a connection to receive calls and messages. - Zack Whittaker, writing at the Zero Day blog at ZDNet

March 06, 2018 /Marc Handelman
Communication Security, Cellular Telephony, Information Security, Network Security

Satellite Woe →

December 13, 2017 by Marc Handelman in Information Security, Communication Security, Signals, Network Security

The remotest of root exploits in DirecTV's Video Bridge... H/T

December 13, 2017 /Marc Handelman
Information Security, Communication Security, Signals, Network Security

The Voice Assistant Gambit →

September 11, 2017 by Marc Handelman in All is Information, Alternate Attack Vectors, Alternate Attack Analysis, Physical Security, Information Security, Signals, Communication Security, Communications, Hardware Flaws, Hardware Security

Nicole Kobie, writing at New Scientist, tells the tale of newly researched voice assistant attack vectors leveraging signalling flaws (via an ultrasound attack) within both Apple Inc.'s (NasdaqGS: AAPL) and Amazon.com Inc.'s (NasdaqGS: AMZN) voice assitant offerings Siri and Alexa, respectively. The 'Dominoe Effect' of the ultrasound flaws in these products/services traverses down the device foodchain to Alexa and soo-to-be Siri enabled third party devices... Perhaps new protective sound generating devices are in order?

All Amazon and Apple Links in this Post are Non-affiliate

September 11, 2017 /Marc Handelman
All is Information, Alternate Attack Vectors, Alternate Attack Analysis, Physical Security, Information Security, Signals, Communication Security, Communications, Hardware Flaws, Hardware Security

BlackHat, Moritz Lipp & Clémentine Maurice's 'ARMageddon' →

August 20, 2017 by Marc Handelman in Blackhat, Conferences, Education, Communications, Communication Security, Mobile Security, Mobile Networks, Mobile, Hardware Security
August 20, 2017 /Marc Handelman
Blackhat, Conferences, Education, Communications, Communication Security, Mobile Security, Mobile Networks, Mobile, Hardware Security

Wire, Barbed →

August 16, 2017 by Marc Handelman in All is Information, Common Sense, Communication Security, Communications, Information Security, Telecom

The telecom of the 19th century North American West. via Kottke. In-built physical security, easy propagation, no need to duplicate the medium. Signals traversed easily, good conductivity, low(ish) resistance, what more did they (i.e, we) need?

August 16, 2017 /Marc Handelman
All is Information, Common Sense, Communication Security, Communications, Information Security, Telecom

Malus Domestica Nummus →

July 10, 2017 by Marc Handelman in Economics, Security Economics, Communication Security, Application Security, Operating System Security

Vice's Motherboard scribe Lorenzo Franceschi-Bicchierai regales us (on a Monday, no less), of the tale of monetary gains in the world of high-end Apple Inc. (NasdaqGS: AAPL) iPhone bugs. In this case, where, in fact, the real money resides. Today's Must Read.

July 10, 2017 /Marc Handelman
Economics, Security Economics, Communication Security, Application Security, Operating System Security