Security: January 2009 Archives


Willste wissen was auf dem Handy von [insert-somebody-here] so drauf ist? Einfach den
CSI Stick kaufen. Gewählte Nummern, SMS, Kalender, gelöschte Daten, alles verfügbar nachdem man das Ding kurz angeschlossen hat. Für nur 300$..

Dont trust the nice friendly woman voice in your car: GPS Spoofing

Damn cool Stuff: Improving Binary Comparison
If you have an executable and you suspect that it might contain a statically linked library for which you have source access (or which you have analyzed before), we want BinDiff to be able to port the symbols into the executable you have, even if the compiler versions and build environments differ significantly, and even if the versions of the library are not quite the same

Dazu passend: Binnavi 2.0 Preview

Major Security Fuckup #1: Telekom Sicherheitslücke offenbart 30 Millionen Handydaten
Major Security Fuckup #2: Hacker decken ungesicherte Türen in Playstation Home auf

DDoS Attacken, und weitere Informationen zum "Cyberwar" zwischen Russland und Georgien.

Quantom cryptography is useless, lol, hat wohl noch niemand bemerkt? ;-)

Wow, 2009 ist 1945: Adolf Hitler planned propaganda cable TV
The Orwellian screens would have been set up in public places and would show "people's television", depicting how the Aryan race should live, with the Nazis focusing on news, sport and education.
[...]

Prototype programmes included Family Chronicles: An Evening with Hans and Gelli, which was an early reality TV show depicting a wholesome Aryan life of a young German couple [GZSZ, anyone?].


Auch cool, dass man das jetzt automatisiert machen kann: A Picture is Worth a Thousand Locksmiths
software program that can perform key duplication without having the key. Instead, the computer scientists only need a photograph of the key.
WAP is fsckd: understanding the WPA Attack

Und nach dem Debian SSL Debakel: FreeBSD PRNG vulnerability
When the arc4random(9) random number generator is initialized, there may
be inadequate entropy to meet the needs of kernel systems which rely on
arc4random(9); and it may take up to 5 minutes before arc4random(9) is
reseeded with secure entropy from the Yarrow random number generator.
Oopsy...
Da Lob ich mir OpenBSD und ihre Philosophie. Man kann nun eben kein sicheres System produzieren, auch wenn man noch so viele Security Layer aufeinanderpappt, wenn das Base broken ist...
 
Wer hat meine Daten? Jeder

LOL, Niederländisches Militär bruzzelt mit dem Zielerfassungslaser eines Apache's die Kamera eines Reporters. Da kann ich nur sagen: wow, respect. Link

Auch lolig: owned by a too long ESSID

Nice Technology: Levelhead, check the movies!

About this Archive

This page is a archive of entries in the Security category from January 2009.

Find recent content on the main index or look in the archives to find all content.

January 2009: Monthly Archives

Pages