Новости

January 2017

Loophole found in the implementation of the signal encryption protocol used by popular messaging service WhatsApp. In April 2016 the messaging giant implemented end to end encryption into its service for added security of its users. It has now come to light that the signal encryption protocol has not been implemented correctly and could potentially be used as a backdoor that could create new encryption keys. Whilst this cannot be used for mass surveillance of users it does leave individuals who are being targeted open to exploitation.

November 2016

The regulation of investigatory powers act has now been passed in the UK which provides more power to security services and sets boundaries on their ability to gain information on citizens without a warrant. Internet companies will now have to retain browser history for up to a year and in a world where the reliance on technology and the web is ever increasing the true potential invasiveness of this act cannot be adequately measured

April 2016

German Security Researcher Karsten Nohl recently went on TV highlighting how easy it is to hack a mobile phone and gain access to a user’s messages as well as listen to their calls. The hack uses the network interchange service Signalling System 7 (SS7) known as C7 in the UK. SS7 acts as a broker between mobile phone networks and handles number translation, sms transfer and other duties that connect one network caller to another. If an SS7 system is successfully attacked then then a person’s location, messages and calls can all be monitored.

July 2011

Intsec announces a major new development programme. IDG will bring our unique secure technology together with 3G and 4G, providing users with additional facilities that include securing all messaging formats and secure voice mail. E2 is the advance product of this programme that is projected to be completed by the end of 2012. Secure global connectivity has been achieved and ensuring this continues is crucial to protecting your investment into our technology. The Intsec Development Group brings together internal and external partners covering diverse and in many cases unique technologies into one group with the aim of developing innovative secure products.

July 2011

A survey from access control management specialist Courion found that one-fifth of large IT decision makers said their business had no plan to block employee-owned devices from accessing the corporate network, and 10 percent of the respondents admitted to facing data breaches after the loss of a mobile device with access to their network. Read more source Information Week

May 2011

Android malware has jumped 400 percent since the summer of 2010, says a new report from Juniper Networks Global Threat Center. 
The report contributes the malware surge to users who are "unaware, disinterested or uneducated" in mobile security. In addition, a large number of downloads are coming from unknown sources and few smartphones are running security software. 
"Consumers can expect to see more advanced malware attacks against the Android platform," according to the report. These attacks include "command and control zombies and botnet participators, devices that are remotely controlled to execute malicious attacks." Read more source, FieceMobileIT

February 2009

International Security (INTSEC Ltd) is pleased to announce a strategic new supply contract with a major British defence contractor. Valued at just under a million pounds over two years. International Security will be supplying both Tripleton® Enigma mobile and static line encryption systems to protect high value mission critical projects within the UK and Europe. International Security looks forward to a long-term partnership providing a significant implementation of Tripleton Enigma as well as the new Falcon project scheduled to start late 2009.

October 2008

The home secretary, faces a revolt from her senior officials over plans to build a central database holding information on every telephone call, e-mail and internet visit made in the UK. 
 The Times

March 2008

"His wiretaps made Mr. Pellicano an “uninvited and unknown” party to calls between “parents and children, husband and wife, husband and lover, doctor and patient, lawyer and client,” Mr. Lally said, “so he could always remain one, two, three steps ahead of an adversary.” 
New York Times

February 2008

Two enterprising researchers claim to have figured out a way to eavesdrop on calls made using GSM mobile phones, cracking open its 64-bit A5 encryption. According to David Hulton and Steve Muller, who presented the technique at the Black Hat security conference in Washington this week, GSM calls can now be recorded over long distances and cracked open in half an hour using only $1,000 worth of field-programmable gate array-aided computer equipment and a frequency scanner. 
"The Washington Post"