Addicted To Web Apps – 11 Services I Use

Posting this blog entry to inventory the web apps that I have signed up for over the past year, and to provide a brief commentary on what I think of them. 1) Google – excellent offering for the price. $50 a year amd you get just about everything to run a virtual office, including collaboration.2) Yahoo! – Premium email has undergone a major facelift and is a great location to integrate all thos ‘other’ email addresses one accumulates.3) .Mac or .Me…. whatever – a control freak rip-off. Don’t buy it.4) Salesforce – a great product, especially if you get the … Continue reading Addicted To Web Apps – 11 Services I Use

‘Tis The Season…. To Play With Gadgets

Merry Christmas All! I got online the other day and took a look at this site to realize how long it has been since I had posted an update. Despite the long silence, Google Analytics is showing some good statistics, so I am scratching my head on that one a bit.On to gadgets!First, bah humbug…. I have used the iPhone faithfully for the past three years and really liked the device until I found that no matter how well you take care; no matter how diligently you handle the device – buying special cases, only putting the device in your … Continue reading ‘Tis The Season…. To Play With Gadgets

iPhone Security Becomes Topic At BlackHat

Too bad I wasn’t there right at the close of the presentation yesterday, but these days I can afford not to ride a plane 13 hours to Washington D.C. At work we performed some in-house reviews of iphone security about two years ago, accepting some risks over functionality. However, three different channels of information through personal contacts, web browsing, and work relationships have raised a flag about this research being performed on iphone security. The findings revealed in the papers dispute two tenets of iphone security that have been repeated throughout the past couple years: 1) sandboxing applications so that … Continue reading iPhone Security Becomes Topic At BlackHat

Ubiquitous Security – 2010 Brings Focus To Mobile Issues

It’s no secret that I have been focusing on wireless security issues over the past two years, and I have been very vocal about how ‘wireless’ is not limited to wireless LAN. We are approaching a turning point where securing organizations will require even more emphasis on ID management and access control to establish accountability for effective monitoring, thereby establishing metrics based upon and sound measurement processes. Overall, the future challenge for governance will move from writing policy and pushing paper to sound statistical analysis (see more at securitymetrics.org), intricate log analysis, and stronger technical skills among security professionals. Introduction … Continue reading Ubiquitous Security – 2010 Brings Focus To Mobile Issues

German Researcher Cracks GSM Codes – Offensive Security Research Illegal?

This is big news, and falls in line with mobile security research to be executed during the first part of 2010. A German researcher has made eavesdropping on GSM phone conversations post-facto (not real time) as easy as a beefy computer and $3,000 of radio equipment. The key to all of this, however, is the code book that this German researcher has access to. Karsten Nohl, the German scientist, made his presentation available here. The beefy computer is to crack the GSM codes and create the lookup table. The radio equipment is for tracking the spread spectrum signal.The most interesting … Continue reading German Researcher Cracks GSM Codes – Offensive Security Research Illegal?

The Last 10 Years In Mobile Phones

This is a neat write-up of a timeline of the mobile phone over the past ten years. I wrote a similar timeline for the RSA security conference here is Japan last May, but went much further back to the original mobile phones. Wikipedia also has a great timeline in the history section of the mobile phone category. This is something we take for such granted these days, and was a rich man’s novelty just 20 years ago; but even then it was limited to gadgets installed in vehicles for the most part. My claims to this historical bit are – … Continue reading The Last 10 Years In Mobile Phones