The Poisoned Handshake: Using Fake Cell Towers to Manipulate Cell Phone Networks

When you are on the move, your cell phone automatically detects the signal from the nearest tower. Tower signals may overlap but the strength of their signals will not be uniform and there are occasional dead spots where you can lose a signal completely. Cell phones are designed to seek out the strongest signal. This … Continue reading The Poisoned Handshake: Using Fake Cell Towers to Manipulate Cell Phone Networks

Hackers Turn off Google Play Protect to Install Banking Malware

When you get a new Android phone, you get a pre-installed version of Google Play Protect. From a cybersecurity viewpoint, that's good. You want as many barriers between you and cyber criminals as you can get. By default, Google Play Protect is always active. In principle, Play Protect checks any app you download from the … Continue reading Hackers Turn off Google Play Protect to Install Banking Malware

The Strange Case of the Iranian Proud Boys Impersonators and the 2020 Election

I hesitate to write this post because being objective these days can get you into trouble. Depending on which end of the political spectrum you're on, the name, Proud Boys, will conjure up images of either extreme right wing, KKK Nazis or patriots fighting for the preservation of Western culture. It's a tangled web of … Continue reading The Strange Case of the Iranian Proud Boys Impersonators and the 2020 Election