carvajalcomputacion.wordpress.com
Alexander Carvajal Piña | Carvajal Computación
https://carvajalcomputacion.wordpress.com/author/carvajalcomputacion
Tu Web de Tecnologia Computación y Telefonía. Liberación de Equipos Blackberry Samsung Galaxy y HTC Android. Archivos de Autor: Alexander Carvajal Piña. Estamos de Vuelta……. 9 diciembre, 2014. Buenas tardes apreciados lectores…. Despues de una larga ausencia por cuestiones laborales y de una larga meditación he decidido volver a utilizar este blog y compartir con uds las soluciones y las noticias mas relevantes según mi punto de vista en este humilde sitio web. Estamos Mudados……. 30 diciembre, 2011.
carvajalcomputacion.wordpress.com
Hackers muestran cómo apropiarse de números teléfonicos en redes GSM | Carvajal Computación
https://carvajalcomputacion.wordpress.com/2011/12/29/hackers-muestran-como-apropiarse-de-numeros-telefonicos-en-redes-gsm
Tu Web de Tecnologia Computación y Telefonía. Liberación de Equipos Blackberry Samsung Galaxy y HTC Android. New York Times envía spam por error a 8 millones de personas. Elpida envía samples de los primeros chips de memoria RAM 4Gb DDR3 para tablets y smartphones →. Hackers muestran cómo apropiarse de números teléfonicos en redes GSM. 29 diciembre, 2011. Ah, el Chaos Computer Club. Cuna de grandes hackers, ideas y un congreso anual: Chaos Communication Congress. Según Karsten Nohl y Luca Melette. Tempor...
economist.com
Mobile security: Living on the EDGE | The Economist
http://www.economist.com/blogs/babbage/2011/08/mobile-security
Our cookie policy has changed. Review our cookies policy. For more details and to change your cookie preference. By continuing to browse this site you are agreeing to our use of cookies. More from The Economist. The Economist digital editions. Subscribe to The Economist. Activate my digital subscription. Log in or register. Middle East and Africa. All Business and finance. All Science and technology. Letters to the editor. The Economist in audio. Living on the EDGE. Aug 18th 2011, 12:08. The industry's t...
voxnews.com
Police State USA
http://www.voxnews.com/index.php/police-state-usa
US Military Propagandizes Social Media With Fake Accounts. Most people use social media like Facebook and Twitter to share photos of friends and family, chat. Infiltration by Agents or Informers Agents are law enforcement officers disguised as activists. Informers are non-agents who provide information. According to Nielson's annual "Television Audience" report the numbers of US households owning television sets is declining. CIA Death Squad Snipers Are Behind Syrian Civilian Murders. The point is that t...
h-online.com
27C3: GSM cell phones even easier to tap - The H Open: News and Features
http://www.h-online.com/open/news/item/27C3-GSM-cell-phones-even-easier-to-tap-1160200.html
In association with heise online. 29 December 2010, 17:08. 27C3: GSM cell phones even easier to tap. At the 27th Chaos Communication Congress ( 27C3. Hacker conference, security researchers demonstrated how open source software on a number of revamped, entry-level cell phones can decrypt and record mobile phone calls in the GSM network. Using a normal laptop and a homemade monitoring device, team leader Karsten Nohl of Berlins Security Research Labs. Last year, Nohl and his team showed. Also on The H:.
arstechnica.com
$15 phone, 3 minutes all that’s needed to eavesdrop on GSM call | Ars Technica
http://arstechnica.com/gadgets/news/2010/12/15-phone-3-minutes-all-thats-needed-to-eavesdrop-on-gsm-call.ars
The Rise of Specialized Databases. Sign up or login to join the discussions! Sign up to comment and more. Gear and Gadgets —. 15 phone, 3 minutes all that’s needed to eavesdrop on GSM call. Researchers at the Chaos Computer Club Congress have shown how to use four $15 …. Jon Borland, wired.com. Dec 29, 2010 2:58 pm UTC. Speaking at the Chaos Computer Club (CCC) Congress. 8220;GSM is insecure, the more so as more is known about GSM,” said Security Research Labs. Several of the individual pieces of this GS...
sp3ctr3.me
Hardware Security Resources – sp3ctr3's blog
http://www.sp3ctr3.me/hardware-security-resources
I love the smell of burnt electronics in the morning. Here are some whitepapers and blogpapers that should help you get started/learn more about hardware security. I’ve divided the page into divisions for easier viewing. I’ll keep adding to the list when I remember any other sites/papers that I refer to. Please let me know of any mistakes/suggestions down in the comments! Travis Goodspeed’s blog. Michael Ossman’s blog. Bunnie Huang’s blog. Adam Laurie’s blog. General hardware reverse engineering/ attacks.
siliconzoo.org
The Silicon Zoo
http://www.siliconzoo.org/index.html
RFID tag, NXP, 1994. RFID tag, Legic, early 90s. Prev section section name. Next section section name. Is a collection of logic cells found in silicon chips. The collection is provided freely for the study, comparison, and reverse-engineering of silicon implementations. These libraries vary for different manufacturers and process generations. The Silicon Zoo wants to make as many as possible of these libraries available to researchers. The slides of a talk at The Last HOPE.