Category: Wireless security

Mobile, Wireless security

Major vulnerabilities found in popular wireless presentation system

December 17, 2019

Via: Help Net Security

F-Secure consultants have discovered several exploitable vulnerabilities in Barco’s ClickShare wireless presentation system. Attackers can use the flaws to intercept and manipulate information during presentations, steal passwords and other confidential information, and install backdoors and other malware. Popular attack targets […]

Mobile security, Wireless security

Canada Spy Agencies Split Over Proposed Huawei 5G Ban: Media

November 14, 2019

Via: Security Week

The Canadian Security Intelligence Service (CSIS) and the Communications Security Establishment (CSE) were tasked with conducting a cybersecurity review to evaluate the risks as well as the economic costs to Canadian telecoms and consumers of blacklisting the equipment supplier. The […]

Mobile, Wireless security

Securing a Connected Future: 5G and IoT Security

September 12, 2019

Via: Security Week

Already available in some cities, 5G is ushering in an entirely new set of standards for global wireless communications. As the IoT-era continues to come into its own, businesses developing automotive, healthcare, industrial, energy and other IoT applications are planning […]

Mobile, Network security, Security, Wireless security

Top Wi-Fi routers have major security flaws

September 11, 2019

Via: TechRadar

A security researcher from Trustwave has discovered vulnerabilities in several D-Link and Comba routers which could make it easy for cybercriminals to see usernames and passwords stored on the devices. Trustwave SpiderLabs’ Simon Kenin found a total of five security […]

Mobile, Threats & Malware, Vulnerabilities, Wireless security

Routers from well-known manufacturers vulnerable to cross-router data leaks

August 19, 2019

Via: Help Net Security

While many organizations and home networks use a host and guest network on the same router hardware to increase security, a new study by Ben-Gurion University indicates that routers from well-known manufacturers are vulnerable to cross-router data leaks through a […]

Cloud security, Mobile, Mobile security, Vulnerabilities, Wireless security

Microsoft Beefs Up Wi-Fi Protection

May 27, 2019

Via: Threat Post

Microsoft has begun pushing out its May 2019 Windows 10 update, which will flag Wi-Fi networks that are using the outdated and insecure Wired Equivalent Privacy (WEP) and Temporal Key Integrity Protocol (TKIP) authentication mechanisms. WEP was introduced in 1997 […]

Mobile, Network security, Wireless security

Microsoft wants to improve routing security

May 23, 2019

Via: Help Net Security

The Mutually Agreed Norms for Routing Security (MANRS) initiative, supported by the Internet Society, announced that Microsoft has joined the program whose primary objective is to reduce the most common threats to the Internet’s routing system. Routing security is vital […]

Mobile, Wireless security

New Strain of Android Malware Found on Third-Party App Store

May 3, 2019

Via: Security Week

Researchers at Zscaler have reported on one of these third-party app stores: Smart Content Store, available via sexy.smartcontentstore[.]com and games.smartcontentstore[.]com, and offering new and updated apps. But Smart Content Store doesn’t deliver standard Android apps — it always delivers an […]

Mobile, Network security, Wireless security

5G brings great opportunities but requires a network transformation

May 1, 2019

Via: Help Net Security

Telecom operators are overwhelmingly optimistic about the 5G business outlook and are moving forward aggressively with deployment plans. Twelve percent of operators expect to roll out 5G services in 2019, and an additional 86 percent expect to be delivering 5G […]

Mobile, Vulnerabilities, Wireless security

Cisco Patches Critical Flaw In ASR 9000 Routers

April 18, 2019

Via: Threat Post

Cisco has rushed out patches for a critical vulnerability in its ASR 9000 routers that could give remote, unauthenticated attackers access to the devices – as well as the power to launch denial-of-service (DoS) attacks against them. The flaw is […]