In a world where governments are demanding exceptional (and unprecedented) access to systems under the guise of national security and the looming specter of terrorism, recent events have resurfaced the conflict between privacy and security. While some believe this to be a new battle of the Internet age, it’s just a continuation of the unending crypto war between technologists and law enforcement.
LTE is a more advanced mobile network but not absolutely secure.
In this presentation, we will introduce a method which jointly exploits the vulnerabilities in tracking area update procedure, attach procedure, and RRC redirection procedure in LTE networks resulting in the ability to force a targeted LTE cellphone to downgrade into a malicious GSM network where an attacker can subsequently eavesdrop its voice calls and GPRS data.
The FBI has had a fair amount of success de-anonymizing Tor users over the past few years. Despite the encryption software's well-earned reputation as one of the best tools for online privacy, recent court cases have shown that government malware has compromised Tor users by exploiting bugs in the underlying Firefox browser—one of which was controversially provided to the FBI in 2015 by academic researchers at Carnegie Mellon University.
On 17 June, a hacker rocked the digital currency world by exploiting a security vulnerability in a non-hierarchical collective Ethereum investment fund, stealing $53m (£36m) in digital currency.
After a usual cyberattack, this would be the end of the story, with the victims left to grieve their losses. However, nothing is ever simple in the unique and quirky world of cryptocurrencies. Join IBTimes UK as we break down what happened in the Ethereum DAO attack, how it happened and what the consequences are.
Exploit kits are one of the threats that is ever present on the Internet. Indiscriminately compromising users that are simply surfing websites. As ransomware has exploded so has the proliferation of these exploit kits. This combination of ransomware, tor, and bitcoin has created a financially lucrative monster.
Parisa Tabriz, manages Google’s Chrome security engineering teams, and gave a keynote at PyCon US this year.
Her talk was even-keeled, informative, and included strong FOSS messaging about everyone's vested interest in internet security and privacy. After the talk was done, I watched her take audience questions (long enough for me to take a short conference call) where she patiently and handily fielded all manner of queries from up and down the stack.
Android users beware: a new type of malware has been found in legitimate-looking apps that can “root” your phone and secretly install unwanted programs.
The malware, dubbed Godless, has been found lurking on app stores including Google Play, and it targets devices running Android 5.1 (Lollipop) and earlier, which accounts for more than 90 percent of Android devices, Trend Micro said Tuesday in a blog post.
At 6am on May 7, 2004, Axel Gembe awoke in the small German town of Schönau im Schwarzwald to find his bed surrounded by police officers bearing automatic weapons.
One officer barked: "Get out of bed. Do not touch the keyboard." Gembe knew why they were there. But, bleary-eyed, he asked anyway. "You are being charged with hacking into Valve Corporation's network, stealing the video game Half-Life 2 , leaking it onto the Internet, and causing damages in excess of $250 million," came the reply. "Get dressed."
Isis hackers release new 'random' kill list with 4000 names from database previously available online
An Islamic State (Isis)-affiliated hacker group called the Caliphate Cyber Army (CCA)has released a new "kill list" on social media, with names, addresses and emails of over 4,000 people from across the globe. While almost half of the names in the list are of Americans, residents of the UK, France, Canada and India have also reportedly made it to the list.