Cybersecurity for Dummies, for free!

cyberIf you like to learn more about cyber security, cyber warfare, advanced persisten threats and more, this is actually worth reading. Dont expect expert insight, but it is a starting point for those who like to get involved with one of the most interesting challenges of todays digitalized society. And it’s provided by Palo Alto for free here!

 

Less than 1% of Android devices had a PHA installed in 2014

According to Google, by October 2014 less than 0,5% of Android devices had Potentially Harmful Application (PHA) installed. That number is excluding non-malicious Rooting apps, but that is no surprise.

And, more importantly, “fewer than 0.15% of devices that download only from Google Play had a PHA installed.”

One main reason was that Google made improvements in the Android platform security technology, e.g., using SELinux sandboxing and use of Verify Apps functionality.

Read the full article here.

Cheap Virtual Reality (VR) of your adventures

wpid-dsc_0073.jpgJust bought a pair of coolboard from ebay. Its made out of papp and it is and feels cheap. However I found it quite cool. Not Just becase it lets you to have a VR rollercoaster experience, or can fly in google earth. You can also use it for your own 360* photospheres. Let’s say you want to show a few friends how awesome time you had skiing this weekend. Make sure to take the whole 360* photosphere using google camera for Android, use the Coolboard app from Google to show it, then put your handset into the coolboard and show them the real VR ski-trip experience!

Continue reading “Cheap Virtual Reality (VR) of your adventures”

Tor’s problem; Traffic Correlation Attacks

onion-torIn the need for privacy (with bad or good intentions), people search for tools that can provide anonymous communication online. Tor is well known for that and have existed for a long time as a respected network of multiple layers of hops and encryption (“onion rings”). Just found this interesting article from Aaron M. Johnson et.al. where they have exploited vulnerabilities in Tor network by using traffic correlation attacks. Continue reading “Tor’s problem; Traffic Correlation Attacks”

Fake base stations, surprised?

gsmmapFake base stations have been identified around government buildings in Oslo, Norway (according to Aftenposten). According to GSM Security Map, which compares the protection capabilities of mobile networks, Norway is ranked above with regards to the adaption of protection mechanisms to GSM networks. Does not seem “above” is enough to withstand fake base stations, unfortunately.

However, the use of fake base stations, even in Oslo, should not be a surprise. In November US marshalls were deploying fake cell towers on airplanes.