July 19, 2021
Via: Help Net SecurityBy now, most of us are aware that smartphones are powerful computers and should be treated as such. It’s not a coincidence that most of the security tips given to smartphone users – such as refraining from opening suspicious links […]
February 11, 2021
Via: Security WeekResearch conducted by Alissa Knight, partner at marketing agency Knight Ink, on behalf of mobile API threat protection firm Approov showed that the applications are vulnerable to API attacks that unauthorized parties could leverage to access protected health information (PHI) […]
April 2, 2020
Via: Naked SecurityThe US Federal Communications Commission (FCC) on Tuesday unanimously passed new rules that require wireless carriers to implement a technology framework – by June 2021 – to filter out robocalls. This one’s been kicking around for years: it’s called STIR/SHAKEN. […]
Mobile, Mobile security, Threats & Malware, Vulnerabilities
February 7, 2020
Via: Security WeekA total of 25 vulnerabilities were fixed with Android’s February 2020 security updates, and the most important of them are two critical severity issues is System. One of these is CVE-2020-0022, a bug impacting the Bluetooth component, and which can […]
February 3, 2020
Via: DataBreach TodayA Federal Communications Commission investigation found that one or more U.S. wireless carriers violated federal law by selling consumer location data to third parties, according to a letter FCC Chairman Ajit Pai sent to congressional lawmakers. In his letter sent […]
December 17, 2019
Via: Help Net SecurityF-Secure consultants have discovered several exploitable vulnerabilities in Barco’s ClickShare wireless presentation system. Attackers can use the flaws to intercept and manipulate information during presentations, steal passwords and other confidential information, and install backdoors and other malware. Popular attack targets […]
October 29, 2019
Via: Help Net SecurityAn overwhelming majority of cybersecurity and risk management leaders believe that developments in 5G wireless technology will create cybersecurity challenges for their organizations. Their top three 5G-related concerns are greater risk of attacks on Internet of Things (IoT) networks, a […]
Mobile security, Network security, Security
July 25, 2019
Via: Security WeekBuilding upon existing 4G Long-Term Evolution (LTE) infrastructure, 5G is designed to improve bandwidth, capacity, and reliability of wireless broadband services. The technology is intended to meet increasing data and communication requirements, offering capacity for tens of billions of connected […]
Vulnerabilities, Wireless security
March 28, 2019
Via: Threat PostCisco Systems issued 27 patches Wednesday tied to vulnerabilities in its IOS XE operating system and warned customers that two small business routers (RV320 and RV325) are vulnerable to attack and that no patches are available for either. A total […]
Vulnerabilities, Wireless security
February 28, 2019
Via: Threat PostCisco is urging customers to update their wireless VPN and firewall routers, after patching a critical vulnerability that could allow unauthenticated, remote attackers to execute arbitrary code. The vulnerability, CVE-2019-1663, has a CVSS score of 9.8 and impacts the Cisco […]
December 10, 2018
Via: Security AffairsJens ‘Atom’ Steube, the lead developer of the popular password-cracking tool Hashcat, has developed a new WiFi hacking technique that allows cracking WiFi passwords of most modern routers. Jens ‘Atom’ Steube, the lead developer of the popular password-cracking tool Hashcat, […]
Vulnerabilities, Wireless security
October 18, 2018
Via: Threat PostEight D-Link routers in the company’s small/home office “DWR” range are vulnerable to complete takeover – but the vendor said it is planning on only patching two, according to a researcher. Błażej Adamczyk of the Silesian University of Technology in […]
October 3, 2018
Via: Help Net SecurityWireless routers are the most often attacked and exploited type of IoT device. They are also one of the rare IoT devices that most of us can’t do without. We need them to be as secure as can be, but […]
September 28, 2018
Via: The HillSecurity experts and privacy advocates are hopeful the rollout of the new 5G wireless network could eliminate a glaring surveillance vulnerability that allows spying on nearby phone calls. Lawmakers have been pressing the Trump administration to crack down on technology […]
August 8, 2018
Via: Security AffairsA security researcher has devised a new WiFi hacking technique that could be exploited to easily crack WiFi passwords of most modern routers. The security researcher Jens ‘Atom’ Steube, lead developer of the popular password-cracking tool Hashcat, has devised a […]
August 3, 2018
Via: Dark ReadingMore than 200,000 routers hit with a sophisticated cryptomining attack that appears to be spreading. In March, routers from Latvian manufacturer MikroTik were hit by an advanced threat dubbed Operation Slingshot. The company patched for the threat, but now a […]
Vulnerabilities, Wireless security
July 23, 2018
Via: Threat PostDasan and D-Link routers running GPON firmware are being targeted by hackers in an attempt to create a botnet. Unpatched D-Link and Dasan GPON router vulnerabilities are being targeted by hackers attempting to build a botnet army, according to research […]
Mobile security, Wireless security
July 2, 2018
Via: Security WeekNewly devised attacks on the Long Term Evolution (LTE) high-speed wireless standard break the confidentiality and privacy of communication, team of researchers claim. In a newly published paper (PDF), researchers from Ruhr-University Bochum and New York University Abu Dhabi present […]
May 25, 2018
Via: The HillThe top Democrat on the House Energy and Commerce Committee is calling for a hearing on reports that wireless location-tracking data is being shared without consumers’ approval. Rep. Frank Pallone Jr. (D-N.J.) is urging Chairman Greg Walden (R-Ore.) to convene […]
Network security, Wireless security
May 15, 2018
Via: Dark Reading‘Lock down UPnP routers,’ researchers say. A new DDoS technique is adding a new twist to this common threat and upping the chance that an attack will have an impact on business operations. The new attack leverages a known vulnerability […]