If you follow news related to IT security then you already know that using VoIP services, that use SIP isn’t the safest way to guarantee communication for your home or company. Session Initiation Protocol (SIP) devices can be vulnerable to eavesdropping. That’s a fact.
There are tons of hardware and software using SIP, and many of our and your internet providers are also using it. Let me explain how potentially harmful and dangerous this can be for us, the end-users.
Eavesdropping for adversarial purposes is the less danger, and possibility that this will happen, is low. More possible is, that these vulnerabilities will be used in espionage in industry, since these devices are well used in companies.
Powerful weapons are being studied, developed and deployed on the Middle East battlefield. They are lethal, and meant to destroy the opponent’s morale thanks to a well-known “shock and awe” tactic.
But they do not require explosives, nor they require expensive training to be launched or operated: on the contrary, they’re so cheap compared to the damage they can impose on the enemy, that they are more and more spread every day.
To build these weapons is also very easy: it just takes a few chicks and guys in need of some easy cash, a camera, and a web server.
If you use a finite resource it tends, well, to deplete. Especially if you use more and more of it, every year, just like it wasn’t *really* finite.
We live in a paradoxical age, where everyone, at every level, wishes and believes that, magically, hydrocarbons will continue to flow abundantly for some time, if not forever. Maybe in 20 years, they say, maybe in 30, oil will become scarce. By that time, they say, we’ll be prepared to manage it.
This is very wrong. Oil is not yet completely depleted, of course: but in 3 – 4 years it will be as if it were mostly gone, and nobody is ready to cope with this.
This incredible state of blindness is due to many reasons, one of them being our weak pattern-matching skills when adverse conditions build up slowly enough to go unnoticed by our collective nervous system. And, of course, we are being systematically deceived on this subject by the media and the powers-to-be, thanks to our will to be deceived.
Readers of this portal may have not been aware, but the 19th International Olympiad in Informatics ended last week in Zagreb, Croatia. There were total of 285 high school contestants from 77 countries, 11 of them were girls. The contestants were situated at the student dormitory of Stjepan Radic, while the contest and the opening and closing ceremony was held at the Zagreb Fair.
Each participating country can have a team with 4 contestants, a team leader, a deputy team leader, and one or more observers and/or guests. This year there was only one contestant with his team leader from Cuba, while the Egyptian team had about 20 members (next year’s olympiad will be in Egypt, so they wanted to get themselves very familiar with the organization of this year’s olympiad).
Doing penetration tests can bring sometimes surprising results. But doing penetration tests on critical targets should not bring any surprising results. As Forbes few days ago informed, Scott Lunsford was offered to penetrate into nuclear power station.
As owner of the plant claimed, critical components could not né accessed from the Internet.“It turned out to be one of the easiest penetration tests I’d ever done,” Lunsford said.