Top

Category: Wireless security


Mobile, Wireless security

New Android 14 Security Feature: IT Admins Can Now Disable 2G Networks

August 9, 2023

Via: The Hacker News

Google has introduced a new security feature in Android 14 that allows IT administrators to disable support for 2G cellular networks in their managed device fleet. The search giant said it’s introducing a second user setting to turn off support, […]


Mobile, Wireless security

5G surpasses expectations, becomes a global game-changer

April 28, 2023

Via: Help Net Security

5G connectivity has reached a tipping point globally as 5G networks are now active in 47 of the world’s 70 largest economies by GDP, according to Viavi. VIAVI revealed that there are 2,497 cities globally with commercial 5G networks, across […]


Mobile, Wireless security

Red Hat and Samsung partner on new 5G RAN solution

February 28, 2023

Via: Help Net Security

Red Hat extend partnership with Samsung to introduce a virtualized radio access network (vRAN) solution that offers advanced integration and automation features. The technology will be designed to help service providers better manage networks at scale while also addressing the […]


Mobile, Wireless security

Atos 5Guard strengthens 5G security posture for organizations

February 24, 2023

Via: Help Net Security

Atos has launched its new ‘5Guard’ security offering for organizations looking to deploy private 5G networks and for telecom operators looking to enable integrated, automated, and orchestrated security to protect and defend their assets and customers. A new end-to-end 5G […]


Mobile, Wireless security

Trend Micro establishes new subsidiary for 5G cybersecurity

January 7, 2023

Via: Help Net Security

Trend Micro has established CTOne, a new Trend Micro subsidiary focused on advancing 5G network security and beyond. The group’s intellectual capital and leadership come from Trend Micro’s culture of innovation and is the latest incubation project to launch as […]


Mobile, Wireless security

Keysight collaborates with Qualcomm to accelerate 5G non-terrestrial network communication

January 6, 2023

Via: Help Net Security

Keysight Technologies has collaborated with Qualcomm Technologies to establish an end-to-end 5G non-terrestrial network (NTN) connection. Based on this successful demonstration of call signaling and data transfer using orbit trajectory emulation, Keysight and Qualcomm Technologies aim to accelerate 5G NTN […]


Mobile, Wireless security

5G can reduce – but also create – security risk

November 23, 2022

Via: Help Net Security

As 5G connections are rapidly spreading, more and more questions and misconceptions are arising. What are the most common ones and how can they affect security teams? 5G is a comparatively new technology and many cybersecurity teams have not had […]


Hacker, Mobile, Threats & Malware, Wireless security

European Police Arrest a Gang That Hacked Wireless Key Fobs to Steal Cars

October 18, 2022

Via: The Hacker News

Law enforcement authorities in France, in collaboration with Spain and Latvia, have disrupted a cybercrime ring that leveraged a hacking tool to steal cars without having to use a physical key fob. “The criminals targeted vehicles with keyless entry and […]


Mobile, Wireless security

MITRE and Department of Defense announce FiGHT framework to enhance 5G security

September 27, 2022

Via: Help Net Security

MITRE and the Department of Defense (DoD) announced the launch of the FiGHT (5G Hierarchy of Threats) adversarial threat model for 5G systems. FiGHT empowers organizations to, for the first time, reliably assess the confidentiality, integrity, and availability of 5G […]


Mobile, Wireless security

iBASIS collaborates with jtendo to protect customers’ signaling networks

September 20, 2022

Via: Help Net Security

iBASIS has integrated the multi-protocol signaling firewall of jtendo to its Managed Cloud-Based Security Portfolio, iBASIS Security iQ360. The increase in the number of network protocols (also covering 5G), technologies, and roaming traffic creates a greater complexity requiring advanced features […]


Mobile, Threats & Malware, Vulnerabilities, Wireless security

Passengers Exposed to Hacking via Vulnerabilities in Airplane Wi-Fi Devices

September 14, 2022

Via: Security Week

Researchers have discovered two potentially serious vulnerabilities in wireless LAN devices that they say are often used in airplanes. Researchers Thomas Knudsen and Samy Younsi of Necrum Security Labs identified the vulnerabilities in the Flexlan FX3000 and FX2000 series wireless […]


Mobile, Threats & Malware, Vulnerabilities, Wireless security

Google Patches Critical Android Flaw Allowing Remote Code Execution via Bluetooth

August 2, 2022

Via: Security Week

The critical vulnerability is tracked as CVE-2022-20345 and it affects the System component. It has been patched with Android 12 and 12L updates. According to Google, an attacker does not require additional execution privileges to remotely execute arbitrary code over […]


Mobile, Threats & Malware, Vulnerabilities, Wireless security

Researcher Shows How Tesla Key Card Feature Can Be Abused to Steal Cars

June 13, 2022

Via: Security Week

The research was conducted by Martin Herfurt, an Austria-based member of the Trifinite research group, which focuses on Bluetooth security. Herfurt’s analysis targeted a change made by Tesla in August 2021 to key card access, removing the requirement for users […]


Mobile, Wireless security

You can now add Bluetooth to the list of privacy threats to be worried about

June 10, 2022

Via: TechRadar

Security experts have found a way to track people using the Bluetooth chips integrated into their mobile devices, and laptops, but it’s a lot harder than it sounds (and not quite effective, yet). Researchers at the University of California, San […]


Mobile, Wireless security

Researchers Find Way to Run Malware on iPhone Even When It’s OFF

May 16, 2022

Via: The Hacker News

A first-of-its-kind security analysis of iOS Find My function has demonstrated a novel attack surface that makes it possible to tamper with the firmware and load malware onto a Bluetooth chip that’s executed while an iPhone is “off.” The mechanism […]


Mobile, Wireless security

EU believes Open RAN could improve 5G security

May 13, 2022

Via: TechRadar

A report from the European Union (EU) says Open RAN technology has the potential to enhance the continent’s cybersecurity provisions but warns that certain conditions must be met if this promise is to be fulfilled. The Radio Access Network (RAN) […]


Mobile, Wireless security

Electric Vehicle DC charging tripped by a wireless hack

March 30, 2022

Via: The Register

Researchers from the University of Oxford published details of a vulnerability in the Combined Charging System that has the potential to abort charging. The Combined Charging System (CCS) is one of the plethora of standards in the EV charging world, […]


Access control, Mobile, Security, Wireless security

How to share your Wi-Fi password safely

January 11, 2022

Via: Malwarebytes

You may not have as many people visiting your home due to the pandemic, but restrictions are a hit-and-miss affair. It’s possible your region has opened up a little, and you’re seeing folks in your home for the first time […]


Mobile, Wireless security

Researchers Uncover New Coexistence Attacks On Wi-Fi and Bluetooth Chips

December 16, 2021

Via: The Hacker News

Cybersecurity researchers have demonstrated a new attack technique that makes it possible to leverage a device’s Bluetooth component to directly extract network passwords and manipulate traffic on a Wi-Fi chip, putting billions of electronic devices at risk of stealthy attacks. […]


Mobile, Network security, Security, Wireless security

Wardrivers Can Still Easily Crack 70% of Wi-Fi Passwords

October 26, 2021

Via: Dark Reading

The same standard that allows wireless devices to remain connected and roam between access points also allows attackers to easily collect critical Wi-Fi keys that can later be hashed to find Wi-Fi network passwords, a researcher found in a wardriving […]