“Research In Motion Ltd. defended itself on two fronts Thursday, denying reports it had reached a deal with the Indian government to provide access to BlackBerry messages in that country and maintaining that the battery life in its embryonic PlayBook tablet computer was comparable to that of rivals already on the market.”
From The Ottawa Citizen
“GSM mobile phone networks are becoming the backbone of communications and commerce in the developed and developing worlds, but those networks may be easily susceptible to eavesdropping, according to a presentation at the annual Chaos Communication Congress (CCC) in Berlin.”
From Threat Post
“Mobile calls and texts made on any GSM network can be eavesdropped upon using four cheap phones and open source software, say security researchers.
Karsten Nohl and Sylvain Munaut demonstrated their eavesdropping toolkit at the Chaos Computer Club Congress (CCC) in Berlin.
The work builds on earlier research that has found holes in many parts of the most widely used mobile technology.”
From BBC News
From cyber attacks on Google, to the Distributed Denial of Service attacks on Wikileaks, Nart Villeneuve has put together an extensive review of the prominent cyber crime incidents of 2010. This year, Villeneuve was one of the lead researchers on the malicious Shadow Network and the Facebook botnet “Koobface”, both research projects of the Citizen Lab’s Information Warfare Monitor. Describing trends of politically and economically motivated cyber attacks, Villeneuve provides his expert analysis.
Read Villeneuve’s 2010 Cyber Crime Review here
“There are few moments in the political atmosphere of the Middle East that fill me with genuine pride. While eyes have long been fixed on opposition movements in Iran and Egypt, suddenly Tunisia has provided one of the most inspiring episodes of indigenous revolt against a repressive regime.
Following the self-immolation of an unemployed man, riots and demonstrations have swept through the country.”
From The Guardian
Should governments have the only say in Internet governance? Non-governmental organizations are fighting to keep their seats at the Internet Governance Forum and the International Telecommunications Union. These important discussions are held in order to decide how to legislate and secure cyberspace, and typically include a variety of stakeholders such as NGOs and private firms. CTV News speaks to Ron Deibert, director of the Citizen Lab and the Canada Centre for Global Security Studies on the future of cyberspace governance.
From CTV News
“In the latest move dashing Western internet company hopes of breaking into China, it was announced that all internet phone calls were to be banned apart from those made over two state-owned networks, China Unicom and China Telecom.”
From The Telegraph
“Research In Motion Ltd. has moved quickly to refute a report that it will allow Indian authorities access to highly encrypted corporate data, including emails.
But it added in a statement Thursday that law enforcement personnel and mobile operators will maintain ‘lawful access’ to less secure consumer messaging services.”
From The Toronto Star
“Malicious text messages can crash many types of mobile phones, including devices by Samsung, Sony Ericsson, Motorola and LG, according to a presentation given at the Chaos Communication Congress hacking conference this week in Berlin.
Nicknamed ‘SMS of Death,’ the attacks were outlined by Collin Mulliner, a security researcher at the Technical University in Berlin and his colleague, Nico Golde.”
From Threat Post
“Security researchers say they have discovered a new Trojan horse program that targets mobile phones running Google’s Android operating system that may be the first to attempt to create a so-called ‘botnet’ of infected mobile devices.
The new malware, dubbed ‘Geinimi’ raises the bar on mobile malware, according to a post on the blog of mobile phone security firm Lookout Security. The malware, which has not been detected outside of China, is being packaged with repackaged versions of popular Android applications and pushed through unregulated, third party application exchanges, Lookout said.”
From Threat Post