Posted on December 04, 2013 by
Here’s a recap of our favorite news stories recently featured in the Rift Recon newsletter:
Drug Traffickers Hacked Major Shipping Port Tracking System
The scheme sounds like a work of near science fiction. But police in the Netherlands and Belgium insist it’s true, and say they have the evidence to prove it: two tons of cocaine and heroin, a machine gun, a suitcase stuffed with $1.7 million, and hard drive cases turned into hacking devices.
Kentucky’s Case of the Missing Bourbon
America’s decade-old romance with Kentucky bourbon, a drink formerly as plebeian as a Chevrolet, has come to this: high-end bar chefs and foodies everywhere have been abuzz since 65 cases of Pappy Van Winkle, one of the nation’s most expensive and sought-after bourbons, disappeared from a warehouse here.
Thieves, Spies, and Silicon Valley Startups a Cautionary Tail
Last Christmas Eve, a man broke into Adara Networks’ San Jose headquarters, using copies of both physical and electronic keys. He seemed to know exactly what he was looking for. The thief left rows of desks untouched as he cruised toward the lab holding the source code for Adara’s proprietary data-center networking software. Fortunately for Adara, he triggered an alarm on the lab door and fled.
How The Chinese Are Hacking Us Through Our Limos
Kevin Mandia, CEO of the cybersecurity company Mandiant, takes a lot of limo rides. Normally, his limo company emails him PDF copies of his invoices after every trip. Recently, though, something changed. “I’ve been receiving PDF invoices not from them, but from an [advanced hacking] group back in China; that’s awesome,” said Mandia in D.C. recently. He only caught the attack when the hackers sent receipts on days when he hadn’t used the car service. “I forwarded them to our security service, and they said, ‘Yup, that’s got a [malicious] payload.’”
Your mission, should you choose to accept it, is to intercept contactless card and NFC smartphone payment passwords at distances of up to 90cm using a backpack, a shopping cart, and a small antenna. Mission: Impossible? Apparently not, according to a paper published by the Institute of Engineering and Technology on Tuesday.
For more real-life smash and grab stories, break into the Rift Recon Newsletter Archives or sign up for our semi-seekly list with the form in the left-hand sidebar. Got a tip on a hot story? Send it to firstname.lastname@example.org.
Rift Recon tailors its clients from a suite of exclusive security service providers, in order to meet their specialized needs in software or hardware, utilities for cyber/physical security assessment, tool creation and team outfitting, as well as specialized trainings, and expert referrals.
Our team meets and verifies all equipment needs from solid standards to exotic tooling, and deftly handles client needs for cyber and physical security specialist placement.
Rift operates across a variety of security disciplines including product security, physical security, hardware/software research, and development (including middleware, electronic devices and kits). We also cater to professionals who are striving to meet their own clients’ various cyber and physical security needs.
Our client range spans independent trainers, corporations, to high net worth individuals. We consult red teams, independent cyber or physical security contractors, product security teams, and companies that require exacting, and/or executive-grade assessment reports.
Rift provides a suite of services.
Rift Recon excels at identifying and recruiting top-level talent, and holds a strong track record for meeting our clients’ unique physical security needs.
Discreet and methodical, Rift stands as the premiere company in the world positioned to expertly source, secure, or innovate and manufacture hardware to meet the exacting - often critical - software and hardware security needs of its clients.
Contact Rift Recon day or night for gear, consultations, to explore opportunities, or even just to find out more: email@example.com