Week 30 in Review – 2013

Resources

  • Hackers turn Verizon box into spy tool – youtube.com

    Researchers at iSec hacked into a Verizon network extender, which anyone can buy online, and turned it into a cell phone tower small enough to fit inside a backpack capable of capturing and intercepting all calls, text messages and data sent by mobile devices within range.

  • Project Artemis OSINT activities on Deep Web – resources.infosecinstitute.com

    We have worked mainly in two directions: the first one related to a massive analysis of a meaningful number of Tor URLs and hidden services and their evolution at the time, and in a second breach we explored the possibility to track users within Tor networks.

  • The Real Cost of a Data Breach Infographic – veracode.com

    What happens when you let your application security posture go unchecked? Data breaches happen and with every breach comes a cost. As we’ve just witnessed in recent headlines regarding the five Eastern European computer programmers that went on a seven year hacking spree, this cost can be quite high with damages estimated to exceed $300 million.

Tools

  • trailofbits/iverify-oss – github.com

    iVerify is an integrity validator for iOS devices capable of reliably detecting modifications such as malware and jailbreaks, without the use of signatures. It runs at boot-time to thoroughly inspect the device, identifying any changes and collecting relevant artifacts of these changes for offline analysis. This will let you know if the device has simply been jailbroken or if it has been modified in a much sneakier way.

Vulnerabilities

Other News

  • Barnaby Jack, Computer Hacker, Dead at 36 – bloomberg.com

    Barnaby Jack, a computer-security professional with a showman’s flair for demonstrating technical weaknesses in ATMs and medical devices, has died. He was 36.

  • Spy agencies ban Lenovo PCs on security concerns – afr.com

    Computers made by the world’s biggest PC-maker, Lenovo, have been banned from the “secret” and ‘‘top secret” ­networks of the intelligence and defence services of Australia, the US, Britain, Canada, and New Zealand.

2017-03-12T17:39:39-07:00 July 29th, 2013|Security Tools, Security Vulnerabilities, Week in Review|0 Comments

Leave A Comment