NetSec
  corner   



HOME

LINUX

CYBERLAW

VIRTUALIZATION

Bugtraq

Packetstorm

FD

GrokLaw


RSS Feed


Netsec, comsec, infosec and IA news, research and trends

 

12.29.2010

 
Breaking GSM encryption for cheap. GSM is starting to remind me of WEP.



12.24.2010

 
What is Traitorware? "you can look forward to a day when your iPhone may record your voice, take a picture of your location, record your heartbeat, and send that information back to the mothership."




12.22.2010

 
How I Stopped Worrying and Loved the Backdoor (ahem, SFW), a follow-up to the OpenBSD IPSEC FBI backdoor fiasco.

"just some observations i had made during ipsec hacking years later... some parts of ipsec code were to say at least strange looking."



12.14.2010

 
FBI backdoored OpenBSD IPSEC?

According to Gregory V. Perry: "My NDA with the FBI has recently expired, and I wanted to make you aware of the fact that the FBI implemented a number of backdoors and side channel key leaking mechanisms into the OCF, for the express purpose of monitoring the site to site VPN encryption system implemented by EOUSA, the parent organization to the FBI."

[...]

"This is also probably the reason why you [Theo de Raadt] lost your DARPA funding, they more than likely caught wind of the fact that those backdoors were present and didn't want to create any derivative products based upon the same."

[...]

"This is also why several inside FBI folks have been recently advocating the use of OpenBSD for VPN and firewalling implementations in virtualized environments, for example Scott Lowe is a well respected author in virtualization circles who also happens top [sic] be on the FBI payroll, and who has also recently published several tutorials for the use of OpenBSD VMs in enterprise VMware vSphere deployments."

What's that van doing at the end of the street?



12.13.2010

 
Major Ad Networks Found Serving Malicious Ads



12.08.2010

 
Open-Source Project Server Hacked, Software Rigged With Backdoor Trojan



12.07.2010

 
Binalyze is a malware repository (over 11 million samples thus far) created to help malware researchers analyze and respond to emerging threats.





This page is powered by Blogger.


Site Meter Locations of visitors to this page