LogoLogoLogoLogoLogo
  • Home
  • About
  • News
  • Projects
    • Research & Experiments
    • Community & Education
  • Events
  • Contact
    • General Contact
    • Media Enquiries
  • Home
  • About
  • News
  • Projects
    • Research & Experiments
    • Community & Education
  • Events
  • Contact
    • General Contact
    • Media Enquiries
Search:
August 26, 2011
in Security, Technology, Telecommunications
by Ruan Müller

MIT researchers craft defense against wireless man-in-middle attacks

MIT researchers have devised a protocol to flummox man-in-the-middle attacks against wireless networks. The all-software solution lets wireless radios automatically pair without the use of passwords and without relying on out-of-band techniques such as infrared or video channels. Dubbed Tamper-evident pairing, or TEP, the technique is...

Read More
March 16, 2009
in Data Centers, Development, Programming, Security, Telecommunications
by Ruan Müller

New rogue DHCP server malware

A bold new type of malware has been identified.  Its attack vector is based on hijacking the DNS settings for devices on a local area network. Any device regardless of operating system that depends on an internal or external name server can be affected. The trojan...

Read More
December 3, 2008
in Business, Security, Technology, Telecommunications
by Ruan Müller

SonicWall License Server Problems Compromises Security

Technical problems with the license management servers at SonicWall Inc. created havoc last week for users of the company's firewall and e-mail security products, leaving many companies temporarily unprotected against spam, phishing and malware threats. The problems resulted in affected enterprise users of the SonicWALL UTM...

Read More
November 17, 2008
in Security, Technology, Telecommunications
by Ruan Müller

Lojacking Mobiles Phones Without The help From Service Providers Surfaces In FBI Documents

Triggerfish, also known as cell-site simulators or digital analyzers, are nothing new: the technology was used in the 1990s to hunt down renowned hacker Kevin Mitnick. By posing as a cell tower, triggerfish trick nearby cell phones into transmitting their serial numbers, phone numbers, and...

Read More
November 7, 2008
in Security, Technology, Telecommunications
by Ruan Müller

Wi-Fi WPA TKIP Key (Partially) Exploited by Researchers

Early coverage of the Wi-Fi WPA TKIP Key crack indicated that TKIP keys were broken, but ars technica clears up the details of the attack: They are not. "We only have a single keystream; we do not recover the keys used for encryption in generating the...

Read More
November 6, 2008
in Security, Technology, Telecommunications
by Ruan Müller

Wi-Fi WPA TKIP Key Exploited by Researchers

Via Slashdot: Researchers Erik Tews and Martin Beck 'have just opened the box on a whole new hacker playground, says Dragos Ruiu, organizer of the PacSec conference. At the conference, Tews will show how he was able to partially crack WPA encryption in order to read...

Read More
October 7, 2008
in Business, Security, Technology, Telecommunications
by Ruan Müller

Canadian Digital Security Strategy Progress

A national cyber-security strategy that will seek to protect key infrastructure as well as Canadians' identities is on the way , an RCMP executive says. Details of the strategy — a partnership between the public and private sectors — will emerge over the next few months,...

Read More
August 26, 2008
in Security, Technology, Telecommunications
by Ruan Müller

The Internet’s Biggest Security Hole

Via Wired: Two security researchers have demonstrated a new technique to stealthily intercept internet traffic on a scale previously presumed to be unavailable to anyone outside of intelligence agencies like the National Security Agency. The tactic exploits the internet routing protocol BGP (Border Gateway Protocol) to let...

Read More
August 18, 2008
in Business, Technology, Telecommunications
by Ruan Müller

Google Launches White Space Broadband Website

Google announced today that it is seeking to develop grass roots support for its "white spaces" campaign at the FCC, its lobbying effort to convert some radio airwaves in order to provide wireless broadband access. The "Free the Airwaves" campaign invites consumers to sign a petition,...

Read More
July 27, 2008
in Development, Programming, Technology, Telecommunications
by Ruan Müller

Open Source driver for Atheros 802.11n Devices

A new driver by Atheros has been released for use in Linux.  It is licensed under the ISC license, so BSD users  should be able to make use of the drivers as well. The new driver doesn't use a proprietary hardware abstraction layer and no firmware...

Read More
  • 1
  • 2

ABOUT

Ruan Müller is an Cyber Security Specialist based out of Vancouver Canada working as a Principal Security Consultant by day, and an Independent Security Researcher at night.

He is also serves on the board at the Mainland Advanced Research Society as the Director of Operations.

News

  • BSides Vancouver 2017 has launched.
  • HARX – HAR (HTTP Archive) eXtractor Tool
  • Ready Room Briefings #01: CloudSecurity
  • Vancouver Enterprise Forum – Cyber Crime + eMoney Laundering
  • Security BSides Vancouver 2014, Drone Workshop

RESEARCH PROJECTS

HARX
PCAP VISUALIZATION
PCAP RENDERER

EVENTS

There are no upcoming events at this time.

Copyright 2017© Ruan Müller