Blog

New Android Apps for Wiretap-proof Communications

June 24, 2014

Just released for public beta, two new apps promise wiretap-proof communications for wary users of Android-based smartphones. Developed for Google's Android mobile platform by hacker Moxie Marlinspike and his startup Whisper Systems, the "RedPhone" app encrypts calls made over VoIP using ZRTP, an open source cryptography scheme. Their "TextSecure" app employs a similar open source cryptography method known as "Off The Record" to send and receive scrambled text messages. As he described in a recent Forbes.com blog posting, Marlinspike intends for the apps to be used in place of Android phones' built-in calling and texting systems, thereby subverting insecure communication systems.

Read More

Create Your Own Cellphone Network

March 26, 2015

While most of us depend on major carriers for cell phone service, it is now possible to create small GSM networks for relatively little expense using parts that can be found at many hardware stores. Within these networks callers can communicate between handsets on a local level, and on an internet-enabled system calls can be made over VoIP.

Read More

Thousands of Unsecured Devices Found

June 24, 2014

Columbia University researchers scanning the internet have discovered approximately 21,000 devices (including webcams, VoIP products and routers) that are completely vulnerable to remote attack.

Read More

Skype VoIP: Who's listening in?

June 24, 2014

Described as the first ever "wiretap Trojan," a new virus that can eavesdrop on calls made with the popular Voice over Internet Protocol (VoIP) service Skype is raising concerns about the the security of personal computer-driven telecommunications and the prevalence of surveillance in the ecosystem of this increasingly popular technology.

Read More

2009's Five Most Dangerous Attacks

June 24, 2014

Hackers continue to penetrate many more companies than administrators care to admit, according to two security experts at the RSA Conference. More interesting to our community, however, is the fact that four of the five attacks on the list are infected via devices, instead of Windows PCs.

Read More
COMMENTS