Cyber IT Solutions

A bunch of geeks passionate about technology, free culture, personal liberty, open source, and squirrels.

Archive for the ‘Security’ Category

Shady Companies With Ties to Israel Wiretap the U.S. for the NSA | Threat Level | Wired.com

Posted by conzymaris on August 16, 2012

Designed to house about 4,000 earphone-clad intercept operators, analysts and other specialists, many of them employed by private contractors, it will have a 2,800-square-foot fitness center open 24/7, 47 conference rooms and VTCs, and “22 caves,” according to an NSA brochure from the event. No television news cameras were allowed within two miles of the ceremony.

via Shady Companies With Ties to Israel Wiretap the U.S. for the NSA | Threat Level | Wired.com.

Posted in Government, Online Law, Security | Leave a Comment »

Wikileaks uncovers TrapWire surveillance

Posted by Ron Fabre on August 15, 2012

“In short, TrapWire is surveillance software used by both private industry and the U.S. government and its allies oversees, allowing both public and private sector users to help in counter-terrorism and anti-crime efforts.  The software uses algorithms and data from a variety of surveillance sources — including CCTV and human-input from spotted suspicious behavior — to, in essence, predict potentially criminal activity.”

via ZDNet.

Posted in Government, Science and Technology, Security | Leave a Comment »

NSA: It Would Violate Your Privacy to Say If We Spied on You | Danger Room | Wired.com

Posted by conzymaris on June 19, 2012

The surveillance experts at the National Security Agency won’t tell two powerful United States Senators how many Americans have had their communications picked up by the agency as part of its sweeping new counterterrorism powers. The reason: it would violate your privacy to say so.

via NSA: It Would Violate Your Privacy to Say If We Spied on You | Danger Room | Wired.com.

Posted in Government, Online Law, Security | Tagged: | Leave a Comment »

Hacker’s Demo Shows How Easily Credit Cards Can Be Read Through Clothes And Wallets – Forbes

Posted by conzymaris on January 31, 2012

At the Shmoocon hacker conference, Paget aimed to indisputably prove what hackers have long known and the payment card industry has repeatedly downplayed and denied: That RFID-enabled credit card data can be easily, cheaply, and undetectably stolen and used for fraudulent transactions. With a Vivotech RFID credit card reader she bought on eBay for $50, Paget wirelessly read a volunteer’s credit card onstage and obtained the card’s number and expiration date, along with the one-time CVV number used by contactless cards to authenticate payments. A second later, she used a $300 card-magnetizing tool to encode that data onto a blank card. And then, with a Square attachment for the iPhone that allows anyone to swipe a card and receive payments, she paid herself $15 of the volunteer’s money with the counterfeit card she’d just created. (She also handed the volunteer a twenty dollar bill, essentially selling the bill on stage for $15 to avoid any charges of illegal fraud.)

via Hacker’s Demo Shows How Easily Credit Cards Can Be Read Through Clothes And Wallets – Forbes.

Posted in Security | Leave a Comment »

The Importance Of Anonymity On The Web

Posted by conzymaris on January 23, 2012

Jacob Appelbaum stands on stage at Linux.conf.au 2012 to deliver the final keynote on Friday morning, patiently waiting for his introduction from the conference organizer.In his hand he holds a smartphone, capturing a photograph of his audience which he later says he uploaded in case his phone is confiscated at the airport on his way back to the United States of America, of which he is ironically a citizen.

via The Importance Of Anonymity On The Web.

Posted in Security | Leave a Comment »

Air Force Drone Controllers Embrace Linux, But Why?

Posted by conzymaris on January 13, 2012

Did a Windows virus outbreak in systems related to military drones cause the Air Force to switch its control systems from Windows to Linux?

“Last year, U.S. military drone control systems were infected with Windows USB worms. They seem to be moving the control systems to Linux now,” said Mikko Hypponen, chief research officer at F-Secure, via Twitter.

via InformationWeek Mobile Edition – NEWS & ANALYSIS – Air Force Drone Controllers Embrace Linux, But Why?.

Posted in Security | Tagged: | Leave a Comment »

US customs can and will seize laptops and cellphones, demand passwords | Naked Security

Posted by conzymaris on January 10, 2012

The American Civil Liberties Union has brought a suit against the US government over its seizure of the laptop of a computer security consultant – a seizure carried out at a Chicago airport about a year ago without a search warrant or any charges of crimes.

via US customs can and will seize laptops and cellphones, demand passwords | Naked Security.

Posted in Security | Tagged: | Leave a Comment »

Have RIM, Nokia & Apple provided Indian Military with backdoor access to cellular comm?

Posted by Ron Fabre on January 9, 2012

In exchange for mobile presence in India, RIM, Nokia and Apple have allegedly provided backdoor access for the Indian intelligence to spy on communication.

via ZDNet.

Those with a Blackberry, iPhone, or Nokia device are at risk.

Posted in Security | Leave a Comment »

 
Follow

Get every new post delivered to your Inbox.