Advertisement
Top

Category: Wireless security


Mobile, Wireless security

More Countries Waking up to Huawei Threats, US Say

July 16, 2020

Via: Security Week

“Each country is going to make their decisions for their own country, but I think there’s a growing recognition everywhere that Huawei is a problem,” National Security Advisor Robert O’Brien told journalists in Paris. His comments came after three days […]


Cyber warfare, Cyber-crime, Mobile, Wireless security

Chinese Companies Huawei and ZTE Declared National Security Threats by FCC

July 1, 2020

Via: Security Week

In response to the announcement, China asked the U.S. to stop “oppressing Chinese companies,” accusing Washington of “abusing state power” and claiming that there was no evidence of wrongdoing. The FCC said the move is part of efforts to protect […]


Mobile, Threats & Malware, Vulnerabilities, Wireless security

100,000 cheap wireless cameras vulnerable to hacking

June 12, 2020

Via: Computer Weekly

Consumer advocacy organisation Which? has issued a warning over the security of wireless camera brands made by China-based HiChip and urged the owners of more than 100,000 devices thought to be active in the UK to stop using their cameras […]


Mobile, Wireless security

Most Bluetooth Devices Vulnerable to Impersonation Attacks

May 21, 2020

Via: Dark Reading

Security researchers from three universities in Europe have found multiple weaknesses in the ubiquitous Bluetooth protocol that could allow attackers to impersonate a paired device and establish a secure connection with a victim. Most standard Bluetooth devices are vulnerable to […]


Mobile, Mobile security, Wireless security

Czech, US to Cooperate on Security of 5G Networks

May 7, 2020

Via: Security Week

The Czech government office said the document was signed remotely by Czech Prime Minister Andrej Babis and U.S. Secretary of State Mike Pompeo. The signing comes amid a global battle between the U.S. and China’s Huawei, the world’s biggest maker […]


Mobile, Mobile security, Wireless security

European Virus Tracing Apps Highlight Battle for Privacy

May 5, 2020

Via: Security Week

The use of monitoring technology, however, may evoke bitter memories of massive surveillance by totalitarian authorities in much of the continent. The European Union has in recent years led the way globally to protect people’s digital privacy, introducing strict laws […]


Cyber-crime, Malware, Mobile, Wireless security

Hackers Hijack Routers to Spread Malware Via Coronavirus Apps

March 26, 2020

Via: Threat Post

Cybercriminals are hijacking routers and changing Domain Name System (DNS) settings, in order to redirect victims to attacker controlled sites promoting fake coronavirus information apps. If victims download these apps, they are infected with information-stealing Oski malware. This latest attack […]


Mobile, Wireless security

HTC is launching the world’s most secure router

March 4, 2020

Via: TechRadar

Staying safe online could be about to get easier thanks to HTC and its new privacy-focused router. The company has tdoay unveiled the HTC Exodus 5G Hub, which it says is the world’s most secure router, offering “ultra-secure” 5G connectivity […]


Mobile, Wireless security

FCC: Wireless Carriers Violated Law by Sharing Location Data

February 3, 2020

Via: DataBreach Today

A Federal Communications Commission investigation found that one or more U.S. wireless carriers violated federal law by selling consumer location data to third parties, according to a letter FCC Chairman Ajit Pai sent to congressional lawmakers. In his letter sent […]


Mobile, Wireless security

Major vulnerabilities found in popular wireless presentation system

December 17, 2019

Via: Help Net Security

F-Secure consultants have discovered several exploitable vulnerabilities in Barco’s ClickShare wireless presentation system. Attackers can use the flaws to intercept and manipulate information during presentations, steal passwords and other confidential information, and install backdoors and other malware. Popular attack targets […]


Mobile security, Wireless security

Canada Spy Agencies Split Over Proposed Huawei 5G Ban: Media

November 14, 2019

Via: Security Week

The Canadian Security Intelligence Service (CSIS) and the Communications Security Establishment (CSE) were tasked with conducting a cybersecurity review to evaluate the risks as well as the economic costs to Canadian telecoms and consumers of blacklisting the equipment supplier. The […]


Mobile, Wireless security

Securing a Connected Future: 5G and IoT Security

September 12, 2019

Via: Security Week

Already available in some cities, 5G is ushering in an entirely new set of standards for global wireless communications. As the IoT-era continues to come into its own, businesses developing automotive, healthcare, industrial, energy and other IoT applications are planning […]


Mobile, Network security, Security, Wireless security

Top Wi-Fi routers have major security flaws

September 11, 2019

Via: TechRadar

A security researcher from Trustwave has discovered vulnerabilities in several D-Link and Comba routers which could make it easy for cybercriminals to see usernames and passwords stored on the devices. Trustwave SpiderLabs’ Simon Kenin found a total of five security […]


Mobile, Threats & Malware, Vulnerabilities, Wireless security

Routers from well-known manufacturers vulnerable to cross-router data leaks

August 19, 2019

Via: Help Net Security

While many organizations and home networks use a host and guest network on the same router hardware to increase security, a new study by Ben-Gurion University indicates that routers from well-known manufacturers are vulnerable to cross-router data leaks through a […]


Cloud security, Mobile, Mobile security, Vulnerabilities, Wireless security

Microsoft Beefs Up Wi-Fi Protection

May 27, 2019

Via: Threat Post

Microsoft has begun pushing out its May 2019 Windows 10 update, which will flag Wi-Fi networks that are using the outdated and insecure Wired Equivalent Privacy (WEP) and Temporal Key Integrity Protocol (TKIP) authentication mechanisms. WEP was introduced in 1997 […]


Mobile, Network security, Wireless security

Microsoft wants to improve routing security

May 23, 2019

Via: Help Net Security

The Mutually Agreed Norms for Routing Security (MANRS) initiative, supported by the Internet Society, announced that Microsoft has joined the program whose primary objective is to reduce the most common threats to the Internet’s routing system. Routing security is vital […]


Mobile, Wireless security

New Strain of Android Malware Found on Third-Party App Store

May 3, 2019

Via: Security Week

Researchers at Zscaler have reported on one of these third-party app stores: Smart Content Store, available via sexy.smartcontentstore[.]com and games.smartcontentstore[.]com, and offering new and updated apps. But Smart Content Store doesn’t deliver standard Android apps — it always delivers an […]


Mobile, Network security, Wireless security

5G brings great opportunities but requires a network transformation

May 1, 2019

Via: Help Net Security

Telecom operators are overwhelmingly optimistic about the 5G business outlook and are moving forward aggressively with deployment plans. Twelve percent of operators expect to roll out 5G services in 2019, and an additional 86 percent expect to be delivering 5G […]


Mobile, Vulnerabilities, Wireless security

Cisco Patches Critical Flaw In ASR 9000 Routers

April 18, 2019

Via: Threat Post

Cisco has rushed out patches for a critical vulnerability in its ASR 9000 routers that could give remote, unauthenticated attackers access to the devices – as well as the power to launch denial-of-service (DoS) attacks against them. The flaw is […]


Mobile, Network security, Wireless security

WPA3 design flaws affect security of new Wi-Fi standard

April 11, 2019

Via: Help Net Security

Researchers have discovered a number of design flaws affecting the security of the recently introduced WPA3 data transmission protocol. Collectively dubbed Dragonblood (because they affect WPA3’s Dragonfly handshake), they can be exploited to mount a DoS attack against a vulnerable […]