March 13, 2024
Via: Help Net SecurityMany wireless headsets using Bluetooth technology have vulnerabilities that may allow malicious individuals to covertly listen in on private conversations, Tarlogic Security researchers have demonstrated last week at RootedCON in Madrid. “Many of the examples presented during the conference were […]
December 27, 2023
Via: TechRadarAmerican mobile virtual network operator (MVNO) Mint Mobile has confirmed suffering a data breach affecting an unknown number of its customers. The company revealed the news in an email sent to its customers, in which it explained “We are writing […]
October 27, 2023
Via: The RegisterThree years after Apple introduced a menu setting called Private Wi-Fi Address, a way to spoof network identifiers called MAC addresses, the privacy protection may finally work as advertised, thanks to a software fix. “To communicate with a Wi-Fi network, […]
August 9, 2023
Via: The Hacker NewsGoogle has introduced a new security feature in Android 14 that allows IT administrators to disable support for 2G cellular networks in their managed device fleet. The search giant said it’s introducing a second user setting to turn off support, […]
April 28, 2023
Via: Help Net Security5G connectivity has reached a tipping point globally as 5G networks are now active in 47 of the world’s 70 largest economies by GDP, according to Viavi. VIAVI revealed that there are 2,497 cities globally with commercial 5G networks, across […]
February 28, 2023
Via: Help Net SecurityRed Hat extend partnership with Samsung to introduce a virtualized radio access network (vRAN) solution that offers advanced integration and automation features. The technology will be designed to help service providers better manage networks at scale while also addressing the […]
February 24, 2023
Via: Help Net SecurityAtos has launched its new ‘5Guard’ security offering for organizations looking to deploy private 5G networks and for telecom operators looking to enable integrated, automated, and orchestrated security to protect and defend their assets and customers. A new end-to-end 5G […]
January 7, 2023
Via: Help Net SecurityTrend Micro has established CTOne, a new Trend Micro subsidiary focused on advancing 5G network security and beyond. The group’s intellectual capital and leadership come from Trend Micro’s culture of innovation and is the latest incubation project to launch as […]
January 6, 2023
Via: Help Net SecurityKeysight Technologies has collaborated with Qualcomm Technologies to establish an end-to-end 5G non-terrestrial network (NTN) connection. Based on this successful demonstration of call signaling and data transfer using orbit trajectory emulation, Keysight and Qualcomm Technologies aim to accelerate 5G NTN […]
November 23, 2022
Via: Help Net SecurityAs 5G connections are rapidly spreading, more and more questions and misconceptions are arising. What are the most common ones and how can they affect security teams? 5G is a comparatively new technology and many cybersecurity teams have not had […]
Hacker, Mobile, Threats & Malware, Wireless security
October 18, 2022
Via: The Hacker NewsLaw enforcement authorities in France, in collaboration with Spain and Latvia, have disrupted a cybercrime ring that leveraged a hacking tool to steal cars without having to use a physical key fob. “The criminals targeted vehicles with keyless entry and […]
September 27, 2022
Via: Help Net SecurityMITRE and the Department of Defense (DoD) announced the launch of the FiGHT (5G Hierarchy of Threats) adversarial threat model for 5G systems. FiGHT empowers organizations to, for the first time, reliably assess the confidentiality, integrity, and availability of 5G […]
September 20, 2022
Via: Help Net SecurityiBASIS has integrated the multi-protocol signaling firewall of jtendo to its Managed Cloud-Based Security Portfolio, iBASIS Security iQ360. The increase in the number of network protocols (also covering 5G), technologies, and roaming traffic creates a greater complexity requiring advanced features […]
Mobile, Threats & Malware, Vulnerabilities, Wireless security
September 14, 2022
Via: Security WeekResearchers have discovered two potentially serious vulnerabilities in wireless LAN devices that they say are often used in airplanes. Researchers Thomas Knudsen and Samy Younsi of Necrum Security Labs identified the vulnerabilities in the Flexlan FX3000 and FX2000 series wireless […]
Mobile, Threats & Malware, Vulnerabilities, Wireless security
August 2, 2022
Via: Security WeekThe critical vulnerability is tracked as CVE-2022-20345 and it affects the System component. It has been patched with Android 12 and 12L updates. According to Google, an attacker does not require additional execution privileges to remotely execute arbitrary code over […]
Mobile, Threats & Malware, Vulnerabilities, Wireless security
June 13, 2022
Via: Security WeekThe research was conducted by Martin Herfurt, an Austria-based member of the Trifinite research group, which focuses on Bluetooth security. Herfurt’s analysis targeted a change made by Tesla in August 2021 to key card access, removing the requirement for users […]
June 10, 2022
Via: TechRadarSecurity experts have found a way to track people using the Bluetooth chips integrated into their mobile devices, and laptops, but it’s a lot harder than it sounds (and not quite effective, yet). Researchers at the University of California, San […]
May 16, 2022
Via: The Hacker NewsA first-of-its-kind security analysis of iOS Find My function has demonstrated a novel attack surface that makes it possible to tamper with the firmware and load malware onto a Bluetooth chip that’s executed while an iPhone is “off.” The mechanism […]
May 13, 2022
Via: TechRadarA report from the European Union (EU) says Open RAN technology has the potential to enhance the continent’s cybersecurity provisions but warns that certain conditions must be met if this promise is to be fulfilled. The Radio Access Network (RAN) […]
March 30, 2022
Via: The RegisterResearchers from the University of Oxford published details of a vulnerability in the Combined Charging System that has the potential to abort charging. The Combined Charging System (CCS) is one of the plethora of standards in the EV charging world, […]