telecom-fraud.blogspot.com
Telecom Fraud and Technologies: Is a Smart House a Smart choice?
http://telecom-fraud.blogspot.com/2014/06/is-smart-house-smart-choice.html
Monday, June 16, 2014. Is a Smart House a Smart choice? Over the past several weeks there have been numerous announcements about smart houses and smart homes. There was a nice summary about how The smart home is the next battleground: What to expect from the top 3 tech companies? In this article TechTimes explains how. Google, Microsoft, and Apple getting involved in home automation, it is clear that this will be the next battleground, and at the moment no one truly has the upper hand. Mike had thought u...
telecom-fraud.blogspot.com
Telecom Fraud and Technologies: Celebrating 137 years of public telephone
http://telecom-fraud.blogspot.com/2014/07/celebrating-137-years-of-public.html
Wednesday, July 9, 2014. Celebrating 137 years of public telephone. Today is the birthday of good old Ma Bell:. The Bell Telephone Company, a common law joint stock company, was organized in Boston, Massachusetts on July 9, 1877, by Alexander Graham Bell's father-in-law Gardiner Greene Hubbard, who also helped organize a sister company — the New England Telephone and Telegraph Company. (Source Wikipedia. Subscribe to: Post Comments (Atom). View my complete profile. List of my Publications. GreenfieldTech...
telecom-fraud.blogspot.com
Telecom Fraud and Technologies: February 2014
http://telecom-fraud.blogspot.com/2014_02_01_archive.html
Wednesday, February 12, 2014. Replacing Flappybird with Premium Number Fruad. Much to the dismay of millions of players, the creator of the Flappybird mobile game took it down from Google Play. Now there has been many speculations as to why someone would take down a game that was earning him $50,000 a day in advertising revenue. The various reasons have been stated as:. Threatened legal action by Nintendo. It was too addictive. Or by selling phones with it installed on e-bay. Which you can not do anymore.
telecom-fraud.blogspot.com
Telecom Fraud and Technologies: February 2015
http://telecom-fraud.blogspot.com/2015_02_01_archive.html
Sunday, February 22, 2015. Android malware can make calls even after switching your phone off. A recent warning has come out from AVG has come out that some 3rd party App stores have Apps which bring in a Android Trojan which pretends to shut off your phone when you press the power button. The Hacker News has a nice article about it Android Malware Can Spy On You Even When Your Mobile Is Off. Or you can read the original AVG post Malware Is Still Spying On You Even When Your Mobile Is Off. Subscribe to: ...
redpillsecurity.net
Resources - Red Pill Security
http://www.redpillsecurity.net/resources
The gentleman’s guide to forum spies (spooks, feds, etc.). The gentleman’s guide to forum spies (spooks, feds, etc.). Open Source is a great idea and it has changed the world! 8211; Carnal0wnage &; Attack Research Blog. 8211; McGrew Security Blog. 8211; Information Security Think Tank. 8211; Don`t Learn to HACK – Hack to LEARN. 8211; A personal blog of Tom Eston. 8211; Richard Bejtlich’s blog on digital security. 8211; Blatherings of a Security Addict. 8211; By EnableSecurity. 8211; Rapid7 Community.
voipsa.org
Security | Voice of VOIPSA
http://voipsa.org/blog/category/security
Collective thoughts and musings on the state of VoIP security today. SS7 Security On Techmeme? A Reminder About Interconnected Systems…. SS7 security issues reported on Techmeme. I did a double-take yesterday and, as Jay Cuthrell noted on Twitter. Wondered if this was a “ThrowbackThursday” taken to the extreme. But no, there was indeed a report in the Washington Post about German security researchers. SS7, or Signalling System 7. Is of course the dominant set of telephony signaling protocols used in the ...
blog.pepelux.org
Asterisk | Pepelux blog
http://blog.pepelux.org/tag/asterisk
Vídeos de mis charlas. Archivo de la etiqueta: Asterisk. El otro día impartí una clase en el Curso de Seguridad Informática y Ciberdefensa de Criptored ( http:/ www.criptored.upm.es/formacion/ciberdefensa/TemarioCursoCiberdefensa3.pdf. Por tercer año consecutivo y, esta vez, por hacer la clase un poco más amena, decidí realizar una demo sobre un ataque a un máquina vulnerable. Escogí para ello Vulnvoip. Que podéis descargar aquí: http:/ www.rebootuser.com/? Concretamente la máquina es una FreePBX. Como s...
blog.pepelux.org
Asterisk | Pepelux blog
http://blog.pepelux.org/category/asterisk
Vídeos de mis charlas. Archivos de la categoría Asterisk. Analizando la seguridad de tu Asterisk. Si decides montar una centralita Asterisk (o derivado) lo primero que debes hacer es bloquear todos los accesos a la PBX desde Internet. Muchísima gente redirige en su router el puerto 5060/UDP para que todas las conexiones del exterior vayan a su centralita. Y esto es un grave error. El operador configurará nuestro. Y, en este caso nosotros abriremos la conexión hacia él. Configuraremos un. Deberemos crear ...
blog.pepelux.org
VoIP | Pepelux blog
http://blog.pepelux.org/tag/voip
Vídeos de mis charlas. Archivo de la etiqueta: VoIP. El otro día impartí una clase en el Curso de Seguridad Informática y Ciberdefensa de Criptored ( http:/ www.criptored.upm.es/formacion/ciberdefensa/TemarioCursoCiberdefensa3.pdf. Por tercer año consecutivo y, esta vez, por hacer la clase un poco más amena, decidí realizar una demo sobre un ataque a un máquina vulnerable. Escogí para ello Vulnvoip. Que podéis descargar aquí: http:/ www.rebootuser.com/? Concretamente la máquina es una FreePBX. Como se pu...
SOCIAL ENGAGEMENT