Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

A Flawed Network, By Any Other Name...

November 13, 2019 by Marc Handelman in Information Security, Network Security, Mobile Security, Mobile Networks, Mobile Telephony

via Lily Hay Newman, writing for Wired Magazine, comes this outstanding piece on the extant tally of known flaws within deployments of 5g networking hardware infrastructure. H/T

'"The thing I worry about most is that attackers could know the location of a user," Purdue's Hussain says. "5G tried to solve this, but there are many vulnerabilities that expose location information, so fixing one is not enough."' - via Lily Hay Newman, writing for Wired

November 13, 2019 /Marc Handelman
Information Security, Network Security, Mobile Security, Mobile Networks, Mobile Telephony

Krebs On Security: Brilliant Exposé Of US Wireless Carriers

August 14, 2019 by Marc Handelman in Radio Telephony, Feet of Clay, Security Bloggers Network, Mobile Telephony, Mobile Security, Mobile Networks

Fellow member of the Security Bloggers Network - Brian Krebs and his superlative blog Krebs On Security provides a tour de force exposé of the unfortunate current security posture of the wireless carriers in the United States. Read it my friends, and weep for your mobile telephony, and the decidely non-righteous path the Carriers are on.

"If you are somehow under the impression that you — the customer — are in control over the security, privacy and integrity of your mobile phone service, think again. And you’d be forgiven if you assumed the major wireless carriers or federal regulators had their hands firmly on the wheel. No, a series of recent court cases and unfortunate developments highlight the sad reality that the wireless industry today has all but ceded control over this vital national resource to cybercriminals, scammers, corrupt employees and plain old corporate greed." - via the inimitable Brian Krebs at Krebs On Security

August 14, 2019 /Marc Handelman
Radio Telephony, Feet of Clay, Security Bloggers Network, Mobile Telephony, Mobile Security, Mobile Networks

Image Credit: Vermont.org

The Story: Vermont State Official Proves Carrier Claims Of Coverage Are Hogwash

January 17, 2019 by Marc Handelman in Mobile Telephony, Mobile Networks, Radio, Radio Telephony

John Dillon writing at Vermont Public Radio, brings forth the true story of Cory Chase, a State of Vermont Telecommunications Infrastructure Specialist and his quest to accurately detail mobile telephony signal coverage in his stunningly beautiful State (easily one of the most beautiful States in this Union of ours). This superbly written screed also includes a link to Mr. Chase's interactive arcGIS map and his excruciatingly detailed Mobile Wireless 2018 Report. Enjoy. H/T

"The state challenged the carriers' maps following a rigorous procedure for data collection outlined by the FCC. That’s what had Chase driving around with the six cell phones, each capable of sophisticated download speed tests every 20 seconds. The result was 187,506 download speed test results at locations about 360 meters apart along all of the major roads in the state." - via John Dillon writing at Vermont Public Radio

January 17, 2019 /Marc Handelman
Mobile Telephony, Mobile Networks, Radio, Radio Telephony

The Three

January 10, 2019 by Marc Handelman in Feet of Clay, Information Security, CPNI, Demise of Privacy, Mobile Networks, Mobile Telephony, Mobile Security

Three US Based Mobile Providers Still Selling User Location Data

The bad news was delivered to me on Tuesday afternoon by this outstanding post by Jon Brodkin, reporting for Ars Technica. Read it and weep my friends, as they will know you by your location... Think it's time to move to a dumb phone from your current leaky smartphone? Think again Binky, as your location can still be determined and sold (if only from triangulated tower geography when your phone mpves from cell to cell and registers with the tower).

"In June 2018, all four major US wireless carriers pledged to stop selling their mobile customers' location information to third-party data brokers. The carriers were pressured into making the change after a security problem leaked the real-time location of US cell phone users. But an investigation by Motherboard found that "T-Mobile, Sprint, and AT&T are [still] selling access to their customers' location data and that data is ending up in the hands of bounty hunters and others not authorized to possess it, letting them track most phones in the country." - via Jon Brodkin, reporting for Ars Technica*

January 10, 2019 /Marc Handelman
Feet of Clay, Information Security, CPNI, Demise of Privacy, Mobile Networks, Mobile Telephony, Mobile Security

Ray Ozzie Points His Magic Wand At Mobile Encryption →

April 30, 2018 by Marc Handelman in Encryption, Mobile Telephony, Mobile Security, Poor Architecture

Ray Ozzie's (the former CTO of Microsoft Corporation (Masdaq: MSFT) that created Lotus Notes...) patented encryption plan is clearly not indicative of a tenable solution to the encryption problems governement agencies, and vendors like (Nasdaq: AAPL) are grapplig with like two behemoth Olympic wrestlers on a greased floor. In answer to this rigamarole comes in the form of a particularly interesting post hand-crafted by the inimitable Dan Goodin, at ArsTechnica, in which, the Good Mr.Goodin tells all. Today's MustRead. 20180506 Update: Read El Reg's Thomas Claburn's take on the Ray Ozzie crypto-solution, such as it is...

April 30, 2018 /Marc Handelman
Encryption, Mobile Telephony, Mobile Security, Poor Architecture

A Cornucopia of Flaws, The LTE Debacle →

April 22, 2018 by Marc Handelman in Mobile Networks, Mobile Security, Mobile Telephony, Information Security

via Sean Gallagher, writing at Ars Technica, comes the astounding story of mobile telephony flaws extraordinaire. Also known as the vector of choice for espionage, network intrusion, and data exfiltration. Today's MustRead.

April 22, 2018 /Marc Handelman
Mobile Networks, Mobile Security, Mobile Telephony, Information Security
Rant of Dev.jpg

Developer Errors Exposes 180 Million Phones to Compromise →

November 14, 2017 by Marc Handelman in Cellular Telephony, Mobile Security, Mobile Telephony, Mobile Networks, Lack of Security Regimen, Or Lack Thereof

Oops, They Did It Again! Coupled with the other well-known security issues (e.g., the recently exposed (but decades old) SS7 Flaw) this latest display of security-related development governance (or lack-thereof) by the MNO's is highly dangerous; and spans borders.

November 14, 2017 /Marc Handelman
Cellular Telephony, Mobile Security, Mobile Telephony, Mobile Networks, Lack of Security Regimen, Or Lack Thereof

The Banning →

October 12, 2017 by Marc Handelman in Data Leakage, Data Loss Prevention, Information Security, Mobile Security, Mobile Networks, Mobile Telephony

Behold, the top banned (i.e., blacklisted by the Enterprise) iOS and Android mobile applications with data generated by Appthority.

'According to Appthority’s proprietary Mobile Threat Risk Score, Uber, WhatsApp Messenger and Facebook Messenger are the riskiest Android apps commonly found in enterprise environments. The riskiest iOS apps found in enterprises are Facebook, Pandora and Yelp.' - via Helpnet Security

October 12, 2017 /Marc Handelman
Data Leakage, Data Loss Prevention, Information Security, Mobile Security, Mobile Networks, Mobile Telephony