Going forward with further discussions about FBS (false base stations) considering detection and prevention approaches that can be taken to act as a deterrent against them or their use; it is inescapable thus unavoidable that readers need to be aware of the meanings of abbreviations and definitions adopted for 5G and the reason for my trewmte blog look-up reference. This doesn't suggest you
Hiển thị các bài đăng có nhãn security. Hiển thị tất cả bài đăng
Hiển thị các bài đăng có nhãn security. Hiển thị tất cả bài đăng
Thứ Năm, 25 tháng 4, 2019
Thứ Hai, 22 tháng 4, 2019
5G-NR False Base Stations (Part 1)
By ana06
On tháng 4 22, 2019
In 5G-NR, attackers, false base station, investigations, MiTM, mobile network, rogue UE, security

This is my first technology post for a while at trewmte blogspot as my time in research now extends to 5G-NR; network investigations; connected cars and autonomous vehicles; drones; in addition to existing digital forensics, smartphone examinations and cell site analysis. I have a number new insights and revelations for readers this year about the aforementioned subjects. So I will be more active
Thứ Tư, 28 tháng 6, 2017
IM Telegram Replay Attack - Android
By ana06
On tháng 6 28, 2017
In android, Deobfuscator.cpp, MTProto, Replay Attack, Research, security, source code, Telegram App, thesis, Tomáš Sušánka, Trudy, WhatsApp

Hopefully, readers will have had the opportunity and time to read about WhatsApp here at the trewmte.blogspot:
WhatsApp network forensics - http://trewmte.blogspot.co.uk/2017/06/whatsapp-network-forensics.htmlWhisper Signal WhatsApp - http://trewmte.blogspot.co.uk/2017/06/whisper-signal-whatsapp.html
So it's time to move on to the next instant messaging app known as Telegram. It is relevant to
WhatsApp network forensics - http://trewmte.blogspot.co.uk/2017/06/whatsapp-network-forensics.htmlWhisper Signal WhatsApp - http://trewmte.blogspot.co.uk/2017/06/whisper-signal-whatsapp.html
So it's time to move on to the next instant messaging app known as Telegram. It is relevant to
Chủ Nhật, 19 tháng 6, 2016
Learning from Posters Pt2 - Forensics, Cyber and Security
Part 2 - Continuing on from Part 1 showing the collection of learning from posters which I thought it would be helpful to the community to have them posted in a single location.
Learning from Posters Pt1 - Forensics, Cyber and Securityhttp://trewmte.blogspot.co.uk/2016/06/learning-from-posters-pt1-forensics.html
Learning from Posters Pt1 - Forensics, Cyber and Securityhttp://trewmte.blogspot.co.uk/2016/06/learning-from-posters-pt1-forensics.html
Learning from Posters Pt1 - Forensics, Cyber and Security
Part 1 - I have been collecting these learning from posters which I thought it would be helpful to the community to have them posted in a single location.
Learning from Posters Pt2 - Forensics, Cyber and Securityhttp://trewmte.blogspot.co.uk/2016/06/learning-from-posters-pt2-forensics.html
Learning from Posters Pt2 - Forensics, Cyber and Securityhttp://trewmte.blogspot.co.uk/2016/06/learning-from-posters-pt2-forensics.html
Thứ Bảy, 21 tháng 11, 2015
BYOD - CJIS MOBILE APPENDIX - FBI
By ana06
On tháng 11 21, 2015
In bring your own insurance, bring your own mortgage. smartphones, BYOD, mobile devices, organisation security, organisation technology, security

Bring Your Own (BYO) what?
Take away the scenario of government and local authorities involvement and merely consider private industry then the latter may have no enforcement rights to control BYOD (bring your own device) smartphone usage as these employees and out-source workers are being used and are paying for company communications out of their wages/salary merely so that a natural business
Take away the scenario of government and local authorities involvement and merely consider private industry then the latter may have no enforcement rights to control BYOD (bring your own device) smartphone usage as these employees and out-source workers are being used and are paying for company communications out of their wages/salary merely so that a natural business
Thứ Ba, 11 tháng 8, 2015
BYOD: Cyber Classification
By ana06
On tháng 8 11, 2015
In BYOD, Critical Security Controls (CSC), CSC, cyber, cyberattack, organisation security, organisation technology, security

Having an effective Cyber defence requires " identification " of the methodology proposed for each measures adopted in the Critical Security Controls (CSC) programme. The Critical Security Controls listed below has been developed from the combined knowledge of actual attacks and effective defences of experts from every part of the cyber security ecosystem.
CSC 1: Inventory of Authorized and
CSC 1: Inventory of Authorized and