Yes, still a thing even with the government.
00:00:00 In this section, Nick Espinoza discusses the issue of fake cell towers, also known as cell site simulators or stingrays, that can hijack iPhones and Android devices. These tools, used by both law enforcement and cybercriminals, create fake cellular towers to trick phones into connecting. While some carriers have disabled their 2G and 3G networks, many countries still rely on these networks, leading manufacturers to keep them enabled on their devices. Google has introduced measures to prevent connections to insecure towers, while Apple’s latest operating system, iOS 17, includes a lockdown mode to block 2G connections. Android users, specifically those on Google Pixel 6 or newer, also have the ability to disable 2G services.
00:05:00 In this section, the speaker discusses the susceptibility of Android devices to Stingray or Cell Site Simulator attacks and the lack of countermeasures by third-party manufacturers like Samsung. They mention the possibility of programming around this vulnerability in an open-source Android device and the hope that manufacturers will follow Apple’s lead in implementing lockdown mode. The speaker emphasizes the need for pressure on manufacturers to prioritize user safety and privacy by eliminating the risk of these attacks. They encourage viewers to engage on social media platforms and subscribe to their YouTube channel for more information on staying safe online.
SignalRGB hardware agnostic RGB control and sync software manages a huge wall of 96 keyboards, coaxing them to act as a single expansive display.
In all actuality it can make you less safe.
Google is releasing new keys. I hope that these are much better than the Titan keys they had in the past. Those were a bust.
The space industry must improve security as foreign intelligence entities seek to steal trade secrets and disrupt space-based infrastructure, US agencies caution.
PhD student admits he probably shouldn’t have given this talk
About 34% of security vulnerabilities impacting industrial control systems (ICSs) that were reported in the first half of 2023 have no patch or remediation, registering a significant increase from 13% the previous year. According to data compiled by SynSaber, a total of 670 ICS product flaws were reported via the U.S. Cybersecurity and Infrastructure Security Agency (CISA) in the first half of Attachments: