Welcome to the MacNN Forums.

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.

You are here: MacNN Forums > Software - Troubleshooting and Discussion > macOS > Introductory Guide to Securing Leopard

Introductory Guide to Securing Leopard
Thread Tools
S_J
Fresh-Faced Recruit
Join Date: Nov 2007
Status: Offline
Reply With Quote
Nov 18, 2010, 08:34 AM
 
Just published my new guide on Securing Leopard (updated for Snow Leopard). Hope some of you find it useful!

Securing Leopard | Security Generation
Sincerely,
SJ
Security Generation- Mac OS X and Network Security News, Articles and Forums
http://www.securitygeneration.com
     
Big Mac
Clinically Insane
Join Date: Oct 2000
Location: Los Angeles
Status: Offline
Reply With Quote
Nov 18, 2010, 08:50 AM
 
I like it; nice job with your site. You don't post much, do you?

"The natural progress of things is for liberty to yield and government to gain ground." TJ
     
S_J  (op)
Fresh-Faced Recruit
Join Date: Nov 2007
Status: Offline
Reply With Quote
Nov 18, 2010, 08:51 AM
 
Definitely not enough. Will have to hang around here more often
Sincerely,
SJ
Security Generation- Mac OS X and Network Security News, Articles and Forums
http://www.securitygeneration.com
     
Big Mac
Clinically Insane
Join Date: Oct 2000
Location: Los Angeles
Status: Offline
Reply With Quote
Nov 18, 2010, 09:39 AM
 
Slightly off topic, but regarding a security topic I'm wondering what you think about this report:

How Do Smartphone Stalkers Target You? | FOX 11 News

Fox 11 Los Angeles likes to sensationalize news and often gets a lot of things wrong with their tech reporting, but I was wondering what other informed people think about a story like this. They seem to imply that someone can do a whois on a phone number and get the GPS coordinates from it. Is this generally credible information?

"The natural progress of things is for liberty to yield and government to gain ground." TJ
     
S_J  (op)
Fresh-Faced Recruit
Join Date: Nov 2007
Status: Offline
Reply With Quote
Nov 18, 2010, 09:42 AM
 
The last company I worked for did a lot of research into smartphone stalking. To some extent it's a real issue, as smartphones don't yet have the level of security that exists on computers. That said, the iPhone and the Blackberry are currently more resilient to those types of attacks than Androis and the very vulnerable webOS.
Sincerely,
SJ
Security Generation- Mac OS X and Network Security News, Articles and Forums
http://www.securitygeneration.com
     
Big Mac
Clinically Insane
Join Date: Oct 2000
Location: Los Angeles
Status: Offline
Reply With Quote
Nov 18, 2010, 09:55 AM
 
The security researcher implied that you didn't even need to compromise the handset and that all you need is a phone number to get GPS coordinates for the phone - that it was a network information vulnerability rather than security problems with the handsets. That's what I found compelling about the story.

"The natural progress of things is for liberty to yield and government to gain ground." TJ
     
S_J  (op)
Fresh-Faced Recruit
Join Date: Nov 2007
Status: Offline
Reply With Quote
Nov 18, 2010, 06:02 PM
 
In the case of the report you mentioned, it's a completely different matter. It has nothing to do with mobile phone security, or what type of phone it is. That 'attack' simply takes advantage of the way the telephone network is designed, and essentially performs a massive brute-force/data mining attack.

By default the phone networks pass each other caller ID information. What these guys have done is set themselves up with their own PBX, and then spoof calls to themselves FROM your number. They are then able to obtain the caller ID information, and they can also do a reverse phone number lookup. They also receive the MSC (Mobile Switching Center) ID for a large amount of phone numbers. Although the MSC doesn't provide an actual location, they're able to deduce which MSCs refer to which areas. By correlating a user's original address information (obtained from reverse lookups), together with deduced locations based on the MSC, they're able to track where you go as you move between MSCs.

Service providers will need to make a few changes (eg. masking the MSC), in order to prevent this kind of data mining from happening.

If you want full details on how this is done, check out this white paper: http://www.thecarmensandiegoproject....go_Project.pdf
( Last edited by S_J; Nov 18, 2010 at 06:20 PM. Reason: Added Link)
Sincerely,
SJ
Security Generation- Mac OS X and Network Security News, Articles and Forums
http://www.securitygeneration.com
     
cgc
Professional Poster
Join Date: Mar 2003
Location: Down by the river
Status: Offline
Reply With Quote
Nov 18, 2010, 08:49 PM
 
I used the advice from the National Security Agency (NSA) for securing OSX. They also have same info for Windows and a couple Linux distros.

Of course, this a US Governmental organization we're talking so they probably left one backdoor open for their sole use
"Like a midget at a urinal, I was going to have to stay on my toes." Frank Drebin, Naked Gun 33 1/3: The Final Insult
     
S_J  (op)
Fresh-Faced Recruit
Join Date: Nov 2007
Status: Offline
Reply With Quote
Dec 5, 2010, 07:23 AM
 
FYI, I've launched some security-specific forums for Mac OS X/iOS for anyone interested in those topics: Forums | Security Generation
Sincerely,
SJ
Security Generation- Mac OS X and Network Security News, Articles and Forums
http://www.securitygeneration.com
     
   
 
Forum Links
Forum Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Top
Privacy Policy
All times are GMT -4. The time now is 07:44 AM.
All contents of these forums © 1995-2017 MacNN. All rights reserved.
Branding + Design: www.gesamtbild.com
vBulletin v.3.8.8 © 2000-2017, Jelsoft Enterprises Ltd.,