The GNU Radio Foundation recently teamed up with the UC Berkeley SETI Research Center and the Breakthrough Listen project to sponsor the SETI RF Hackathon, an unprecedented wireless hackathon event. Encompassing the ultimate in Internet-of-Things (IoT) and signals hacking, professionals specializing in machine learning, radio frequency (RF), and cyber security converged at the Allen Telescope Array in California in May…. Read More
Author: Michael Piscopo
The Beginner’s Guide to External Penetration Testing Reconnaissance
External penetration testing reconnaissance is a critical first step in a professional security assessment. By using the same methods and resources that attackers use to get into networks, along with open source intelligence, pen testers can get a much richer profile of an organization’s security strengths and weaknesses and conduct more successful and accurate assessments. In… Read More
[Opinion] Encryption and Privacy: Why the FCC Needs to Consider Legal Reform of Wireless Policies
The opinions expressed in this blog article are those of the author alone. In our previous blog, we discussed how pagers used in medical settings present an opportunity for threat actors to intercept valuable protected health information (PHI) and disrupt encryption and privacy. For malicious hackers, radio-based communications are a potential attack vector that organizations should… Read More
Healthcare Security Alert: Why Do Doctors Still Use Pagers?
It’s a late Saturday morning and Joe Hacker (aka WF4EAK in underground hacking circles) fires up the software-defined radio(SDR) he bought online for $20 to listen in on the local hospital paging traffic. After all, he is trying to make a few extra bucks to buy a new Xbox, and selling healthcare information on the black… Read More
Honeypot Security: Identifying Active Hackers Through Honeypot Deception
Every security expert has a perspective on what (and who) poses the biggest network security threats: cybercriminals, lone hackers, hacktivists, insiders, compromised workstations, and even nation-states. But with so many traffic requests making their way to your corporate network, it can be hard to distinguish attackers from legitimate visitors. While security information and event management… Read More