A Flawed Network, By Any Other Name...

A Flawed Network, By Any Other Name…

via Lily Hay Newman, writing for Wired Magazine, comes this outstanding piece on the extant tally of known flaws within deployments of 5g networking hardware infrastructure. H/T '"The thing I worry about ...
13.jpg

Krebs On Security: Brilliant Exposé Of US Wireless Carriers

Fellow member of the Security Bloggers Network - Brian Krebs and his superlative blog Krebs On Security provides a tour de force exposé of the unfortunate current security posture of the wireless ...
Image Credit:  Vermont.org

The Story: Vermont State Official Proves Carrier Claims Of Coverage Are Hogwash

Image Credit: Vermont.org John Dillon writing at Vermont Public Radio, brings forth the true story of Cory Chase, a State of Vermont Telecommunications Infrastructure Specialist and his quest to accurately detail mobile ...
The Three

The Three

Three US Based Mobile Providers Still Selling User Location Data The bad news was delivered to me on Tuesday afternoon by this outstanding post by Jon Brodkin, reporting for Ars Technica. Read ...
Ray Ozzie Points His Magic Wand At Mobile Encryption

Ray Ozzie Points His Magic Wand At Mobile Encryption

Ray Ozzie's (the former CTO of Microsoft Corporation (Masdaq: MSFT) that created Lotus Notes...) patented encryption plan is clearly not indicative of a tenable solution to the encryption problems governement agencies, and ...
A Cornucopia of Flaws, The LTE Debacle

A Cornucopia of Flaws, The LTE Debacle

via Sean Gallagher, writing at Ars Technica, comes the astounding story of mobile telephony flaws extraordinaire. Also known as the vector of choice for espionage, network intrusion, and data exfiltration. Today's MustRead ...