Category Archives: security

Monitoring Android traffic with Wireshark

Ever wonder what data is being sent out by your Android device? Here’s a post from LinuxJournal outlining how to monitor your device’s WiFi traffic. The technique involves setting up a man-in-the-middle Wireless Access Point (WAP) on your Ubuntu Linux … Read more

DEFCON 22: WarKitteh – cat on the warprowl

Why do the wardriving yourself when your cat can do it for you? Gene Bransfield gave this presentation at the recent DEFCON 22 conference, describing his efforts to use domestic pets wearing WiFi sniffer/GPS logging gear to essentially warprowl for … Read more

At HOPE, EFF releases code for Open Wireless router

in News, security by the machinegeek | 0 comments

At last weekend’s HOPE Conference in New York City, the EFF released the code for their experimental hacker alpha wireless router software specifically designed to support secure, shareable Open Wireless networks. We are offering this hacker alpha release to engage … Read more

Linux security tip: moving your /boot partition to removable media

Today threats to your data can come from many quadrants. It’s not enough to protect against malicious online attacks; there’s the very real threat of government confiscating and examining the electronic devices carried by international travelers, and even planting spyware. … Read more

Shmoocon 2014: vehicle infotainment data forensics

Courtney Lancaster gave this talk at Shmoocon 2014 outlining the types of information available from vehicle infotainment systems “This talk will take an in-depth look at infotainment technologies and how to forensically acquire the data associated with the functionalities that … Read more

Academic paper: hacking with RF replay attacks

If you’re new to RF hacking you may have heard the term “replay attack” and wondered what it takes to implement one. In this academic presentation Practicing a Record-and-Replay System on USRP a group of researchers from the Shenzhen Key … Read more

Dissertation: security analysis of contactless payment cards

Here’s an interesting academic document we found related to hardware hacking. In this published doctoral dissertation, Timo Kasper from the Ruhr-University Bochum, Germany, presents in detail his efforts in analyzing the security of Mifare smart cards. “The tools are first … Read more

NSA wants to build quantum computer to penetrate “hard targets”

The Washington Post is reporting that the NSA is building a computer to defeat all forms of encryption commonly used to ensure privacy of personal communications and data. The project seeks to build “a cryptologically useful quantum computer” which would … Read more

CCC Video: Extracting keys from FPGAs, OTP tokens and door locks

This presentation on extracting keys from FPGAs, OTP Tokens and door locks is from the recent Chaos Communications Conference (CCC) in Hamburg, Germany. In it David briefly introduces implementation attacks and side-channel analysis (SCA) in particular, along with related methods … Read more

Android privacy controls appear, disappear in 4.3 – 4.4 transition

in Android, security by the machinegeek | 2 comments

Apparently what “the Google” gives, “the Google” can take away. Recently Android was being lauded for adding additional privacy controls to Android 4.3+, allowing users to install apps while denying some of the apps’ attempts to collect the user’s data. … Read more

Secure Drop open source project

“SecureDrop is an open-source whistleblower submission system managed by Freedom of the Press Foundation that media organizations use to securely accept documents from anonymous sources. It was originally coded by the late Aaron Swartz.” SecureDrop is dependent on the Tor … Read more

The street lights really ARE tracking you

Reuters has reported that overhead street lights are being retrofitted with multi-sensor capabilities. One such platform being used is known as Netsense by Sensity. The Sensity site describes the platform thusly: NetSense integrates LED lighting, sensors, high-speed networking, cloud computing, … Read more

Blackhat Euro: cheap open source USB drive write blocker

At last year’s Blackhat Europe con, Philip A. Polstra, Sr. from the University of Dubuque gave a presentation detailing how to protect your USB security drive toolkit from auto erasure by the target machine. He describes the design of an … Read more