aLTEr: Hackers can spy on your 4G browsing sessions thanks to LTE flaws

Vulnerabilities have been discovered in LTE that would make it possible for an attacker to tap into 4G networks for the purposes of spying on and hijacking 4G browsing sessions.

BY Mark Wycislik-Wilson

http://www.topix.com/tech/computer-security/2018/06/alter-hackers-can-spy-on-your-4g-browsing-sessions-thanks-to-lte-flaws?fromrss=1

The best home security system

Engadget and Wirecutter have found the best home security system:
“After spending more than 40 hours researching and two months testing 12 monitored home security systems, we found SimpliSafe to be the best self-installed option for most people. SimpliSafe gives you the benefits of a 24/7-monitored security system without locking you into a long-term contract, and it’s affordable, reliable, and easy to install and use. SimpliSafe also offers the most comprehensive choice of systems for homes and budgets of all sizes.”

https://www.engadget.com/2018/05/20/the-best-home-security-system/

New DDoS Reflection-Attack Variant

Bruce Schneier is reporting:

“This is worrisome:

DDoS vandals have long intensified their attacks by sending a small number of specially designed data packets to publicly available services. The services then unwittingly respond by sending a much larger number of unwanted packets to a target. The best known vectors for these DDoS amplification attacks are poorly secured domain name system resolution servers, which magnify volumes by as much as 50 fold, and network time protocol, which increases volumes by about 58 times.

On Tuesday, researchers reported attackers are abusing a previously obscure method that delivers attacks 51,000 times their original size, making it by far the biggest amplification method ever used in the wild. The vector this time is memcached, a database caching system for speeding up websites and networks. Over the past week, attackers have started abusing it to deliver DDoSes with volumes of 500 gigabits per second and bigger, DDoS mitigation service Arbor Networks reported in a blog post.”

https://www.schneier.com/blog/archives/2018/03/new_ddos_reflec.html

How to Fight Mobile Number Port-out Scams

Brian Krebs reports: “T-Mobile, AT&T and other mobile carriers are reminding customers to take advantage of free services that can block identity thieves from easily “porting” your mobile number out to another provider, which allows crooks to intercept your calls and messages while your phone goes dark. Tips for minimizing the risk of number porting fraud are available below for customers of all four major mobile providers, including Sprint and Verizon.”

https://krebsonsecurity.com/2018/02/how-to-fight-mobile-number-port-out-scams/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+KrebsOnSecurity+%28Krebs+on+Security%29&utm_content=FeedBurner