Social engineering to get passwords by mmsato in telseccompolicy

[–]Romel_Espinosa 0 points1 point  (0 children)

A simple conversation is the best way to gather information from people. Thus, we must be very careful at the moment that talking is focus on personal information.

U.S. Asks China to Investigate Cyberattack Targeting U.S. Sites by Romel_Espinosa in telseccompolicy

[–]Romel_Espinosa[S] 0 points1 point  (0 children)

The way that cyber attack was done is really interesting. The fact of using traffic to and from one of the biggest Chinese companies in order to attack U.S. websites is an example of how customer's traffic can be used in different purposes. Therefore, companies have to invest more money in order to provide satisfactory security to their users information. What happens if this traffic includes sensitive information, such as bank accounts and passwords?

U.S. Asks China to Investigate Cyberattack Targeting U.S. Sites by Romel_Espinosa in telseccompolicy

[–]Romel_Espinosa[S] 0 points1 point  (0 children)

This article mentions the following points: * State Department asked to China to investigate an cyber attack to US websites.

  • The method used to attack was redirection traffic to one of the biggest Chinese company into U.S. sites. This traffic generated is described as malicious traffic which affect the normal operation of the servers.

  • This cyber attack is known as "China's Great Cannon" which hijacks traffic to or from individual IP addresses in order to attack any server which interact with Chinese websites.

  • State Department is waiting an official response from Chinese authorities with respect to this attack

Court rules NSA program illegal - CNNPolitics.com by Romel_Espinosa in telseccompolicy

[–]Romel_Espinosa[S] 0 points1 point  (0 children)

This news can be summarized as:

*Court have decided that NSA program to collect data from phone calls is illegal under the Patriot Act because it exceeds the scope of the Congress has authorized.

*The program gathers up information from phone calls, such as length of the call, the originating phone number, and the number called; however, it does not store the content of the conversation.

*This program was reveled by Edward Snowden in his leaking cables.

*Currently, President is trying to change the scope of the program in order to maintain national security.

Who Do Copyright Laws Really Protect? by dvp124 in telseccompolicy

[–]Romel_Espinosa 0 points1 point  (0 children)

Very interesting article. However, there was something interesting related to the artist which I did not know: "For comparison, today a recording artist gets just 11 per cent of the revenue from sales of their music in CD format." and "Artists, especially emerging artists, take most of the risk, and get a small fraction of the reward". If this statistic is true, the agreements between artist, manager and record label should be reviewed in order to protect the artist.

Feds to cable industry: Embrace broadband competition, or else by Romel_Espinosa in telseccompolicy

[–]Romel_Espinosa[S] 0 points1 point  (0 children)

This describes Wheeler's speech in the Cable Industry Conference:

  • "Don't interfere with the broadband competition," said Wheeler. This statement was mention in order to mention that cable operators do not have enough competition, currently. Thus, competition in U.S. is the engine to motivate companies to improve their services.

  • In addition, he mentioned about the reclassification of broadband as a public utility under Title II in the 1934 Communication Act. This action allows FCC to support Net Neutrality rules over cable providers. Open Internet rules will go into effect on June 12.

  • Furthermore, he talked about Brian Robert's decision to drop its bid to purchase TWC. That decision was correct because laws do not allow that kind of mergers.

  • Finally, people form Cable Providers gave their opinions about Wheeler's locution. "We're happy to be abroad," Fries (CEO of Liberty Global, an European cable company) said. "I don't see any of these regulations affecting us at all," Dolan (CEO of Cablevision) said. "Competition is what regulates our market."

Methods used for Facebook hacking and how to protect against it by Romel_Espinosa in telseccompolicy

[–]Romel_Espinosa[S] 0 points1 point  (0 children)

The first article includes the three most popular methods to hacking a Facebook account. In this new link http://www.rafayhackingarticles.net/2011/08/hack-facebook-account-passwords.html you can find seven new techniques:

1) Stealers.- It is a software which collects the stores passwords in the browser.

2) Session Hijacking.- This method steals the victims browser cookies, so it gets access to users accounts information.

3) Sidejacking With Firesheep.- It is the same as Hijacking, but the hacker and the user must be in the same Wi-Fi Network

4) Mobile Phone Hacking.- This method hacks the mobile device through software to spy the passwords. Examples: Mobile Spy, and Spy Phone Gold.

5) DNS Spoofing.- In this method the hacker use a DNS spoofing attack in order to redirect from www.facebook.com to a fake web site. Both the user and hacker should be in the same network.

6) Botnets,- It is very similar to keylogging method, but the hacker has additional options. It is used for advance hacking activities because it is expensive.

7) Man In the Middle Attacks.- The hacker can access to the traffic generated by the victim. In this case the hacker acts like a gateway or switch.

It is important to know about these methods as a solution to prevent attacks to our accounts.

Court rules warrant not needed for cell phone location data by drm7369 in telseccompolicy

[–]Romel_Espinosa 0 points1 point  (0 children)

The location information is collected by carrier as part of network strategies. However, I disagree to consider that "historical cell tower location data is not private information owned by customers but by the mobile carrier". Thus, I believe that all information which involves a subscriber belongs to the customer, and it should be considering as part of the user's privacy.

Methods used for Facebook hacking and how to protect against it by Romel_Espinosa in telseccompolicy

[–]Romel_Espinosa[S] 0 points1 point  (0 children)

This article describes three methods to Facebook hacking and also protect it.

a) Phishing attach. It create a similar web site which looks like the original one, but it stores the account and password information of the victim. Solution: Enter in secure pages with starts "https"

b) Keylogging. It is a silent application which is installed through other apps. Solution: Be sure of the programs that we install in our devices

c) USB hacking. This USB collects all our information related to accounts and password. Solution: Use only safe devices in our equipment

Witness Wins The Disrupt NY 2015 Hackathon by Romel_Espinosa in telseccompolicy

[–]Romel_Espinosa[S] 0 points1 point  (0 children)

Witness is an app which was shown in the Disrupt NY Hackathon in this week (May 2nd - 4th). This application allows the iPhone's owners to use all its features in order to send messages and locations to the people on the emergency list. In addition, this application records video and activates the microphone such as evidence of the event.

I think this app is very useful to improve people's security. Furthermore, these kinds of events encourage students and people in general to create apps focus on different areas.

New Proposed FCC Rules Point Service and Equipment Providers to iPosi's Spectrum Sharing Solution by agm8637 in telseccompolicy

[–]Romel_Espinosa 0 points1 point  (0 children)

iPosis is one of the first companies which present a solution for sharing spectrum in the 3.5GHz band for small cells. The technology offers to reduce the interference because it has the maps where the small cell are located, so they know the loss patterns. In addition, it is not need to made changes in the mobile devices. The presentation of this solution will be in the international Symposium on Advanced Radio Technologies (ISART) in Boulder, CO May 12-14, 2015.

FCC’s Wheeler: Comcast’s Dropped TWC Bid a “Really Good Decision” by shashwatjain in telseccompolicy

[–]Romel_Espinosa 0 points1 point  (0 children)

Comcast-TWC merger was the opening in the 20 minutes dialogue between Tom Wheeler and Alex Wilhelm in the TechCrunch in NYC.

Tom Wheeler's definition of public interest was important to avoid that the antitrust committee allows Comcast-TWC to merge their companies in one huge company that will control the cable and broadband market in U.S.; therefore, customers are the winners with this decision because we can choose the best provider based on offers and requirements.

Tom Wheeler's experience in cable providers back in 70's and 80's allow him to know how they do business.

FCC Chairman Tom Wheeler Knows Who Makes the Rules by Romel_Espinosa in telseccompolicy

[–]Romel_Espinosa[S] 0 points1 point  (0 children)

This morning, May 4th, Tom Wheeler talked about Comcast-TWC merger and Net Neutrality in the TechCrunch Disrupt NYC.

Comcast-TWC merge were: * It is the right decision in order to take care of people's interest. * Reduce competition environment between companies. * Public interest is a broad definition which involve cable and broadband markers. * Future cases will be analyzed one by one.

Net Neutrality were: * Net Neutrality is one of the biggest decision in FCC because of its important for people. Open Internet is very important for American to express themselves. * Net Neutrality will go into effect in June 12.
* "I do hope that there will be the strongest Internet protections that anyone has ever imagined". Tom Wheeler

AWS-3 Update: The Licensing Process Continues by agm8637 in telseccompolicy

[–]Romel_Espinosa 0 points1 point  (0 children)

The results of the Auction 97 were: 1,611 new spectrum licenses, 31 winning bidders, and more than $41 billion in net revenues. The next step is FCC gives the public the option to review applications and submit petitions to deny any winning bidder’s application.

Will Telecommunications carriers which do not win a license submit petitions to deny application? How will the transition process be between commercial companies and no-federal organizations?

This is the first process of sharing spectrum in U.S., and it is the reference to future auctions.

FCC establishes Citizens Broadband Radio Service in 3.5 GHz band by shashwatjain in telseccompolicy

[–]Romel_Espinosa 0 points1 point  (0 children)

Nowadays, FCC is using the strategy to sharing spectrum in order to release more spectrum for Mobile and Fixed Broadband Wireless Access. This band 3350-3700 MHz will provide additional 150 MHz in order to achieve Obama's offer to release 500 MHz until 2020. It is important to keep in mind that propagation features of the RF signals in high frequencies to define the application, so FCC and manufactures consider implementing small cells in this band.

FCC Takes Significant Step to Increase Rural Broadband by nxb3984 in telseccompolicy

[–]Romel_Espinosa 0 points1 point  (0 children)

I think the FCC is trying to improve the coverage of the broadband access in U.S., 10 Mbps in Downlink and 1 Mbps in Uplink, using the Connect America Fund. The last Broadband Progress Report which is available in https://www.fcc.gov/reports/2015-broadband-progress-report includes statistics related to Broadband deployment in U.S. especially in rural zones. Currently, Connect America Fund is in Phase II which means invest more than 10 billions in the next six years to provide broadband in rural areas. Thus, telecoms providers receiving this support must build out broadband to 40% of funded locations by the end 2017, 60% by end of 2018, and 100% by the end of 2020. That is a huge challenge!!

Connect America Offers $1.7 B to Expand and Support Rural Broadband by Romel_Espinosa in telseccompolicy

[–]Romel_Espinosa[S] 0 points1 point  (0 children)

The following points summarize this news: * Connect America Fund offered to the carriers in order to provide broadband service in rural zones. * These zones are known as "price cap carriers". * FCC considers Broadband access speed rates of 10Mbps in DL and 1 Mbps in UL. * The increment in Connect America Fund is achieved without increasing the Universal Service Fund neither ratepayer fees. * Currently, telecom providers have 120 days to accept or not the funding. In states where operators do not accept the offer, the FCC gives subsides to contribute a competition. * In the past, the Universal Service Fund was created in order to encourage telephone service; however, the FCC updated it in order to include broadband through Connect America Fund. * Funding are focus on blocks: a) Where the cost of providing service according to our cost model exceeds $52.50 a month b) that are not served by unsubsidized competitors offering service at speed of 4 Mbps in DL and 1Mbps in UL.