spoofing   463

« earlier    

GPS spoofing, low-cost GPS simulator - DEF CON 23 , 2015
DEFCON-23-Lin-Huang-Qing-Yang-GPS-Spoofing.pdf
HUANG Lin, YANG Qing
Unicorn Team – Radio and Hardware Security Research
Qihoo 360 Technology Co Ltd
GPS  spoofing  DefCon  China  hacking 
11 days ago by pierredv
3G & 4G Networks Are Prone to Stingray Surveillance Attacks - Jul 2017
"3G and 4G LTE devices deployed worldwide have a critical security vulnerability that could be used by Stingray devices, security researchers revealed at the Black Hat Conference in Las Vegas. Researchers said all the modern and high-speed networks have a protocol flaw that enables mobile devices to connect with the cell operator, allowing attackers to track and monitor users."

"Many believe that the modern protocols, unlike 2G, protect users against easy-to-use tracking and surveillance. However, latest research reveals a flaw in the authentication and key agreement, which enables a phone to communicate securely with the user’s cell network."

"While this flaw doesn’t reportedly allow attackers to intercept calls or messages, it does enable them to monitor consumption patterns and track the phone location."
StingRay  IMSI-catcher  3G  4G  cellular  spectrum-vulnerability  cyber-spectrum  spoofing 
15 days ago by pierredv
Spoofing GPS Locations with low cost TX SDRs, RTL-SDR Sep 2015
At this years Defcon 2015 conference researcher Lin Huang from Qihoo 360 presented her work on spoofing GPS signals. Qihoo 360 is a Chinese security company producing antivirus software. Lin works at Qihoo as a security researcher where her main job is to prevent their antivirus software and users from becoming vulnerable to wireless attacks. Her research brought her to the realm of GPS spoofing, where she discovered how easy it was to use relatively low cost SDRs like a USRP B210/BladeRF/HackRF to emulate GPS signals which could allow a wireless attacker to manipulate the GPS on smartphones and cars.
RTL-SDR  Defcon  GPS  spoofing 
16 days ago by pierredv
GNSS Interference and Spoofing Detection | BroadSense | Talen-X
Via Dale, Jan 2019

"BroadSense is a GPS interference and detection sensor designed to detect jamming and spoofing. Utilizing sophisticated GNSS receivers and 75+ advanced algorithms, BroadSense can detect when the GPS signal or GPS spectrum is compromised."
Talen-X  GPS  jamming  spoofing 
18 days ago by pierredv
Mass GPS Spoofing Attack in Black Sea? Jul 2017
"The RNT Foundation has received numerous anecdotal reports of maritime problems with AIS and GPS in Russian waters, though this is the first publicly available, well-document account, of which we are aware.

Russia has very advanced capabilities to disrupt GPS. Over 250,000 cell towers in Russia have been equipped with GPS jamming devices as a defense against attack by U.S. missiles. And there have been press reports of Russian GPS jamming in both Moscow and the Ukraine. In fact Russia has boasted that its capabilities “make aircraft carriers useless,” and the U.S. Director of National Intelligence recently issued a report that stated that Russia and others were focusing on improving their capability to jam U.S. satellite systems."
GPS  spoofing  Russia  Dana-Goward 
19 days ago by pierredv
Troy Hunt: Here's Why Your Static Website Needs HTTPS
adversaries / govs / business / ISP / etc - will inject content into website connections, including ads, malware, cryptomining, etc
https  tls  ssl  cybersecurity  http  spoofing  mitm 
6 weeks ago by bwiese
Connected Vehicle Security Vulnerabilities | IoT Security Headlines, Mar 2018
"In the history of mandatory regulation of computerized vehicles, an E-Letter entitled, “Black box is not safe at all,” was published in Science [1] in 2017. It mentioned that on-board diagnostics (OBD-II) specifications were made mandatory for all cars sold in the United States in 1996. The European Union made European OBD (EOBD) mandatory for all gasoline (petrol) vehicles sold in the European Union starting in 2001."
cyber-spectrum  automobile  transportation  spectrum-vulnerability  cybersecurity  hacks  jamming  spoofing 
8 weeks ago by pierredv
GPX Generator - Easy GPX file generation!
Create GPX files fast and simple by clicking on Google Maps! Use the generated code file to simulate walking on your IOS app using Xcode.
generation  map  file  spoofing  location 
november 2018 by JohanHWB
Voice Phishing Scams Are Getting More Clever
"Most of us have been trained to be wary of clicking on links and attachments that arrive in emails unexpected, but it’s easy to forget scam artists are constantly dreaming up innovations that put a new shine on old-fashioned telephone-based phishing scams. Think you’re too smart to fall for one? Think again: Even technology experts are getting taken in by some of the more recent schemes (or very nearly)."
a  little  sunshine  latest  warnings  the  coming  storm  cabel  sasser  caller  id  spoofing  matt  haughey  metafilter  panic  inc.  phone  phishing  slack  vishing 
october 2018 by jonerp

« earlier    

related tags

#techabuse  /tool/security  2015  2018  3g  4g  5g  a  activedirectory  ad  address  adfraud  adinventory  advantages  advertising  ai  anti-gaming  anti  antispoofing  api  apple's  arp  arstechnica  article  artificialintelligence  asvspoof  atis  attack  audio  australia  automobile  autonomousvehicles  aws  bar  biometrics  bitcoin  bitfines  bloodhound  browsers  buzzfeed  by  cabel  call_spoofing  caller  callerid  cameras  capture  cars  catfish  cellular  cert  challenges  china  code  comcast  coming  computerlearning  computervision  conferences  countermeasure  countermeasures  cracking  criticism  crypto  cryptocurrency  cyber-spectrum  cybersecurity  dana-goward  dane  dataprotection  datasets  defcon  delicious  design  detection  development  dhs  dkim  dmarc  dns  domains  domestic_abuse  domestic_surveillance  domestic_violence  drones  dynamic  easier  easy  email  emails  energy  exchange  exploit  face  facebook  facedetection  facerecognition  facial  facialdetection  facialrecognition  facialtracking  factoring  falls  file  findmyiphone  fm  fooling  for  fraud  g-iot  generation  get  gis  gnss  gnuradio  golden  google  gps  gpsworld  gsm  hack  hacking  hackrf  hacks  hardware  hash  haughey  hotspot  http  https  humphreys  id  idn  idna  ieee-spectrum  imsi-catcher  inc.  informatiebeveiliging  infosec  injection  interactive  investing  iot  ip  iridium  jamming  kerberos  keys  latest  law  layer3  legal  linux  little  location  mac  mac_address  machinelearning  mail  mailflow  mailsploit  make  map  matching  matt  meraki  metafilter  michaelorlando  microsoft  mitm  ml  mobile  mobiles  mta  mua  navigation  navy  network  networking  neuralnet  new  newscientist  novatel  numbers  office365  onlineadvertising  panic  papers  password  pentesting  personal_alarms  persuasion  phishing  phone  police  policies  privacy  privileges  publishing  punycode  python  radio  recognition  reddit  reinforcement_learning  replay  rf  rfc-1342  rfc  rfc1342  rfc3492  rtl-sdr  rule  russia  safari  sasser  scam  sdr  security  sender  sensors  service  setup  sextants  shared  sinkholing  sites  slack  smap  smarthome  smarthomeabuse  smartjunctions  smartroads  smarttraffic  smarttransport  smarttv  software  spam  speaker-verification  spectrum-vulnerability  speech  spn  spoof  spoofdetection  spotify  spyware  ssl  stalkers  stalkerware  stalking  static  stingray  storm  sunshine  surveys  sysadmin  talen-x  the  ticket  tls  to  todo  tool  tools  tracking  transmit  transport  transportation  trick  trimble  tweeting  type:howto  ubuntu  ui  unicode  utilities  validation  vishing  vision  voice  voicedetection  voiceverification  voip  warnings  weaponisediot  web  whatsapp  whatsfake  whitehouse.gov  wifi  windows  windstream  wired  xss  zachharris 

Copy this bookmark:



description:


tags: