SITmobile PLATFORM #spain

Publicado el 7 de oct. de 2013

Nuestra Plataforma multicanal te permite comunicarte con tus clientes de forma directa a su teléfono móvil vía SMS, Instant Messaging Message, Email y Push Notification (Push a la App). ¡¡Un gestor 360º para sus campañas de comunicación push!!







Location, Dates & Times


Mobile World Congress 2015 will take place 2-5 March 2015. The event will once again take place at Fira Gran Via in Barcelona, Spain.

The physical address of the venue is:

Fira Gran Via
Av. Joan Carles I,
64 08908 L’Hospitalet de Llobregat,

Unless otherwise noted, all events take place at Fira Gran Via. However, selected events will take place at Fira Montjuïc, a venue 4 km down the road.

Fira Montjuïc
Avda. Reina Maria Cristina,
s/n 08004

Please do not send any MWC materials or shipments to these addresses as they will be refused.

Report: UK and US spies have cracked BlackBerry’s BES encryption


By Peter Sayer
09 September 2013

The U.S. National Security Agency is able to read messages sent via a corporate BlackBerry Enterprise Server (BES), according to a report by German news magazine Der Spiegel. The purpose of this spying is economic or political, and not to counter terrorism, the magazine hints.

The report, published in English on Monday, cites internal documents leaked by former NSA contractor Edward Snowden.

Governments have long demanded that BlackBerry provide access to encrypted messages carried by its email and BlackBerry Messenger (BBM) services, to allow them to monitor for terrorist activity.

BlackBerry has complied in the case of its consumer-grade BlackBerry Internet Service (BIS), notably providing the Indian government with access to consumer messages. Indeed, Der Spiegel cited NSA documents claiming that since 2009, analysts have been able to see and read


Find the best InfoSec talent without breaking your
recruiting budget! Post a Job, $99 for 31 days.
Hot InfoSec Jobs - http://www.hotinfosecjobs.com/

MOTOROLA Moto X by Google Factory

Motorola revela el primer teléfono de la era Google, el Moto X



El Moto X pone menos énfasis en el control manual, en favor de sensores integrados y siempre activos para responder a la palabra, los gestos y el contexto.

Moto X by Motorola

Moto X by Motorola



Firefox OS

Firefox OS3 (nombre clave: Boot to Gecko o B2G)4 es un sistema operativo móvil, basado en Linux, de código abierto, para smartphones y tabletas. Es desarrollado por Mozilla Corporation bajo el apoyo de otras empresas como Telefónica5 y una gran comunidad de voluntarios de todo el mundo. Este sistema operativo está enfocado especialmente en los dispositivos móviles incluidos los de gama baja. Está diseñado para permitir a las aplicaciones HTML5 comunicarse directamente con el hardware del dispositivo usando JavaScript y open web APIs.4 Ha sido mostrado en smartphones6 7 y Raspberry Pi,8 compatibles con Android

El 1° de julio de 2013, Telefónica comenzó la venta de terminales con Firefox OS.9 ZTE ha confirmado en la CES 2013 que comercializará un smartphone con Firefox OS.10





Obama in 2007: No more spying on citizens who are not suspected of a c…….. #Politicianslie #ObamaRectifies

Excerpt from President Obama’s speech at the Woodrow Wilson Center in August 2007.

This Administration also puts forward a false choice between the liberties we cherish and the security we demand. I will provide our intelligence and law enforcement agencies with the tools they need to track and take out the terrorists without undermining our Constitution and our freedom.

That means no more illegal wire-tapping of American citizens. No more national security letters to spy on citizens who are not suspected of a crime. No more tracking citizens who do nothing more than protest a misguided war. No more ignoring the law when it is inconvenient. That is not who we are. And it is not what is necessary to defeat the terrorists. The FISA court works. The separation of powers works. Our Constitution works. We will again set an example for the world that the law is not subject to the whims of stubborn rulers, and that justice is not arbitrary.

This Administration acts like violating civil liberties is the way to enhance our security. It is not.


NSA data-gathering: Overkill or necessary tool?

Flash Points: CBS News State Department Correspondent Margaret Brennan speaks with CBS News Senior National Security Analyst Juan Zarate about the recent revelation that the U.S. government is collecting data on the internet and telephone use of Americans, and the balance between privacy and security that the program has attempted to strike.

Source clip: https://www.youtube.com/watch?v=SEdpT…

White House Press Briefings are conducted most weekdays from the James S. Brady Press Briefing Room in the West Wing.

Steven VanRoekel, Federal Chief Information Officer, discusses the goals of the digital government strategy

Was ist die Bestandsdatenauskunft? (Sage NEIN!) [german]

Synchronstimme by Bruno Gert Kramm


Anonymous – Operation Bestandsdatenauskunft:http://www.youtube.com/watch?v=ZdY8wp…

Bestandsdatenschnüffelgesetz stoppen!

Privatsphäre ist Menschenrecht- auch im Internet! – Nein zum Bestandsdatengesetz!

Am 21.03.2013 hat der Bundestag erneut ein Gesetz beschlossen, welches tief in unser Grundrecht auf Privatsphäre eingreift. Das Gesetz erlaubt staatlichen Diensten und Behörden (Geheimdienste, Polizei, BKA und Zoll) den weitreichenden Zugriff auf sogenannte Telekommunikations-Bestandsdaten.

mirrored from Bruno Kramm

Anonymous News – follow us on:

International: http://www.twitter.com/AnonNewsINT
Germany: http://www.twitter.com/AnonNewsDE
Facebook: http://www.facebook.com/AnonymousNewsDE
Google Plus: http://www.gplus.to/AnonNewsDE
Diaspora: https://wk3.org/u/anonnewsde
Blog: http://anonnewsde.tumblr.com

Reverse-Engineering a Cryptographic RFID Tag


The security of embedded devices often relies on the secrecy of proprietary cryptographic algorithms. These
algorithms and their weaknesses are frequently disclosed through reverse-engineering software, but it is
commonly thought to be too expensive to reconstruct designs from a hardware implementation alone. This
paper challenges that belief by presenting an approach to reverse-engineering a cipher from a silicon implementation. Using this mostly automated approach, we reveal a cipher from an RFID tag that is not known
to have a software or micro-code implementation. We reconstruct the cipher from the widely used Mifare
Classic RFID tag by using a combination of image analysis of circuits and protocol analysis. Our analysis reveals that the security of the tag is even below the level that its 48-bit key length suggests due to a number of
design flaws. Weak random numbers and a weakness in the authentication protocol allow for pre-computed
rainbow tables to be used to find any key in a matter of seconds. Our approach of deducing functionality from circuit images is mostly automated, hence it is also feasible for large chips. The assumption that
algorithms can be kept secret should therefore to be avoided for any type of silicon chip.
Il faut qu’il n’exige pas le secret, et qu’il puisse sans inconvenient tomber entre les mains de l’ennemi. ´
([A cipher] must not depend on secrecy, and it must not matter if it falls into enemy hands.)
August Kerckhoffs, La Cryptographie Militaire, January 1883 [13]


AISEC-TR-2012-001-Android-OS-Security #Android #Security



[docstoc docId=”128360067″ mId=”-10″ width=”630″ height=”550″ slideMode=”false” showRelatedDocs=”true” showOtherDocs=”true” allowdownload=”true” url=”http://www.docstoc.com/docs/128360067/AISEC-TR-2012-001-Android-OS-Security”%5DAISEC-TR-2012-001-Android-OS-Security%5B/docstoc%5D

PDF: http://www.docstoc.com/docs/128360067/AISEC-TR-2012-001-Android-OS-Security