Ubiquitous Security – 2010 Brings Focus To Mobile Issues

It’s no secret that I have been focusing on wireless security issues over the past two years, and I have been very vocal about how ‘wireless’ is not limited to wireless LAN. We are approaching a turning point where securing organizations will require even more emphasis on ID management and access control to establish accountability for effective monitoring, thereby establishing metrics based upon and sound measurement processes. Overall, the future challenge for governance will move from writing policy and pushing paper to sound statistical analysis (see more at securitymetrics.org), intricate log analysis, and stronger technical skills among security professionals. Introduction … Continue reading Ubiquitous Security – 2010 Brings Focus To Mobile Issues

German Researcher Cracks GSM Codes – Offensive Security Research Illegal?

This is big news, and falls in line with mobile security research to be executed during the first part of 2010. A German researcher has made eavesdropping on GSM phone conversations post-facto (not real time) as easy as a beefy computer and $3,000 of radio equipment. The key to all of this, however, is the code book that this German researcher has access to. Karsten Nohl, the German scientist, made his presentation available here. The beefy computer is to crack the GSM codes and create the lookup table. The radio equipment is for tracking the spread spectrum signal.The most interesting … Continue reading German Researcher Cracks GSM Codes – Offensive Security Research Illegal?