Signalling System 7 or SS7 has long known to be vulnerable to hackers. SS7 is the control system protocol that telephone companies use to route and transfer calls between companies and, in the cellular world, between towers. Since SS7 was designed in the early 1980s, no one was terribly concerned about security. Hackers – or […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
UPDATE: This is bill is apparently worse than I thought. The Register says that a petition calling for the bill to be withdrawn has gathered 43,000 signatures in less than 24 hours. Other comments include that the bill is so poorly written that it would outlaw the NSA’s encryption, unless they add a backdoor to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Wired and other media are reporting the the head of the CIA, John Brennan, had his personal email account hacked. The hacker, a teenager, talked to Wired about how he did it. It points to general weaknesses in commercial online services security that you should understand. It is less of a surprise that Brennan’s commercial, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
You probably are well aware, at least if you are tuned in to the Android world, of the family of bugs called Stagefright. Well now there is Stagefright 2.0 and this will be an opportunity for Google and the carriers to prove to us whether they can deal with ongoing security patches or not – […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
T-Mobile and Experian both announced that an Experian database containing credit application data for prospective T-Mobile customers (people who applied to finance a new phone or new phone service) between September 2013 and September 2015 was accessed by hackers. T-Mobile outsources their credit application process to Experian, which is typical, and that is where the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Automobile hacking community is having a bang-up year. In a Wired article today, Andy Greenberg talked about two new car hacking techniques – both completely different from the ones I have talked about before. The first one is to use the Wi-Fi network in the dealer’s waiting room to hack the diagnostic equipment in […]
Continue reading →
[DISPLAY_ACURAX_ICONS]