For superfast 4G LTE Advanced smartphone and tablet connections, AT&T, Verizon, Sprint, T-Mobile plan new network tests, and rollouts use chipsets from Qualcomm and others

Current phones generally use only one antenna taking one stream of data at a time. LTE Advanced devices will also need more energy storage to do the necessary onboard computation. Without new breakthroughs in batteries or reductions in power consumption by other means (see “Efficiency Breakthrough Promises Smartphones that use Half the Power”), phones will simply get larger.

via For superfast 4G LTE Advanced smartphone and tablet connections, AT&T, Verizon, Sprint, T-Mobile plan new network tests, and rollouts use chipsets from Qualcomm and others | MIT Technology Review.

Will ubiquitous mobile data bring down its cost for low bandwidth users?  We shall see.

RSA, IBM Bet On Big Data Analytics To Boost Security

“So think of a host beaconing out to a C2 (command-and-control) site on a regularly scheduled basis,” he tells Dark Reading. “If an analyst can isolate the suspect host, they can eyeball a graph to see that they’re reaching out to this host regularly. But with a big data approach, you can create a rule that computes and analyzes the interval between sessions and determines whether we’re talking about normal human activity, or machine-generated — which is innocuous — or scheduled activity like malware might do.”

via RSA, IBM Bet On Big Data Analytics To Boost Security – Dark Reading.

I recently caught a piece of malware on a PC on my open wifi doing something similar.

Belkin WeMo remote shell and rapid state change exploit

Published on Jan 29, 2013

Belkin WeMo with latest firmware. Able to gain full root access and send commands including changing the state of connected device via flaw in UPnP implementation. Chose a small desk lamp and simple on/off sequence due to safety concerns. Real world this could be a fan or space heater and rapidly turn on/off without limitation. Updates with PoC soon to come.

via Belkin WeMo remote shell and rapid state change exploit – YouTube.

Stuff like this amaze me.  Again.  Just because you can put an IP stack on something doesn’t mean you should!  Below is a video showing how to break in to this device that simply controls an electric outlet.  He uses Backtrack 5 to break in.   Backtrack is a very useful set of security research tools.  The video inspires me to fire up my copy and break into something.  🙂

5 years after major DNS flaw is discovered, few US companies have deployed long-term fix

Network World – Five years after the disclosure of a serious vulnerability in the Domain Name System dubbed the Kaminsky bug, only a handful of U.S. ISPs, financial institutions or e-commerce companies have deployed DNS Security Extensions (DNSSEC ) to alleviate this threat.

via 5 years after major DNS flaw is discovered, few US companies have deployed long-term fix.

Docsis 3.1 Rides the Wireless Wave

OFDM will provide Docsis with a new order of bandwidth efficiency, but it also offers some sound business reasons for cable to adopt it. OFDM, already used for Wi-Fi and Long Term Evolution (LTE), could lead to better economies of scale and get more vendors interested in the cable market, explained Daniel Howard, the SVP of engineer and CTO at Society of Cable Telecommunications Engineers (SCTE), during a webcast earlier this month on the topic (SCTE is tasked with helping the cable industry get trained up for Docsis 3.1). (See Setting the Stage for Docsis 3.1.)

via Light Reading – Docsis 3.1 Rides the Wireless Wave.

Lots of interesting info on OFDM in this article.  I find it amazing how creative people get in squeezing not just more bandwidth, but orders of magnitude more bandwidth, using the same physical outside plant infrastructure.

Top 30 Nmap Command Examples For Sys/Network Admins

The purpose of this post is to introduce a user to the nmap command line tool to scan a host and/or network, so to find out the possible vulnerable points in the hosts. You will also learn how to use Nmap for offensive and defensive purposes.

via Top 30 Nmap Command Examples For Sys/Network Admins.

Nmap can be very useful which is why I have a link to it in the Tools section on this page.

Gov’t will open up radio spectrum to improve Wi-Fi

The Wi-Fi traffic jam was predictable, just as it’s predictable that there will be a mobile spectrum crunch, he said. 195 MHz of new spectrum will be opened up, all in the 5 GHz band, which has less interference but shorter ranges than the 2.4 GHz band. Opening up more spectrum has the potential to alleviate Internet-use congestion, particularly at crowded places like public Wi-Fi access points.

via FCC’s Genachowski: Gov’t will open up radio spectrum to improve Wi-Fi | Ars Technica.

Nokia’s MITM on HTTPS traffic from their phone

From the tests that were preformed, it is evident that Nokia is performing Man In The Middle Attack for sensitive HTTPS traffic originated from their phone and hence they do have access to clear text information which could include user credentials to various sites such as social networking, banking, credit card information or anything that is sensitive in nature.

via Nokia’s MITM on HTTPS traffic from their phone « Treasure Hunt.