HackDig : Dig high-quality web security articles

How to Remove Wi-Fi Networks from Your Mac and iOS Device

If you travel regularly with your Mac or iOS device, you likely find yourself connecting to new Wi-Fi networks: at airports, in train stations, in hotels, restaurants, pubs, or at clients’ offices. Whether you connect to these networks with your Mac, iPhone, or iPad, miraculously, your devices will remember these networks and sync them via iCloud — s
Publish At:2021-03-30 12:30 | Read:183 | Comments:0 | Tags:How To Mac Wi-Fi Networks WiFi IOS

Hacking Christmas Gifts: Artie Drawing Robot

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift may introduce unexpected vulnerabilities. In this blog series, VERT will be looking at some of the Internet’s best-selling holiday gifts with an eye toward thei
Publish At:2020-12-23 13:32 | Read:438 | Comments:0 | Tags:Internet of Things IoT IoT security robot WiFi hack

[SANS ISC] Malware Victim Selection Through WiFi Identification

I published the following diary on isc.sans.edu: “Malware Victim Selection Through WiFi Identification“: Last week, I found a malware sample that does nothing fancy, it’s a data stealer but it has an interesting feature. It’s always interesting to have a look at the network flows generated by malware samples. For a while, attackers
Publish At:2020-12-22 08:31 | Read:453 | Comments:0 | Tags:Malware SANS Internet Storm Center Security BSSID GeoIP SANS

Why Leading Cities and States Should be Protecting ‘Digital Citizens’ from Mobile Threats

When most people think of Zimperium, they may recognize us as the leader in enterprise mobile device and app security. Or, they have seen the recent news on the Defense Information Systems Agency (DISA), a U.S. Department of Defense (DoD) organization, selecting us to deliver comprehensive Mobile Endpoint Protection (MEP) to the unclassified government furn
Publish At:2020-12-01 09:35 | Read:493 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

Hacking Christmas Gifts: Putting IoT Under the Microscope

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift may introduce unexpected vulnerabilities. In this blog series, VERT will be looking at some of the Internet’s best-selling holiday gifts with an eye toward their possible
Publish At:2020-11-30 00:02 | Read:617 | Comments:0 | Tags:Cyber Security Featured Articles IoT IoT security WiFi hack

FBI Warns of Wi-Fi Attacks Targeting Teleworkers at Hotels Due to COVID

The Federal Bureau of Investigation (FBI) recently issued an announcement encouraging Americans to exercise caution when using hotel wireless networks (Wi-Fi) for telework. The announcement – in-part – states, “FBI has observed a trend where individuals who were previously teleworking from home are beginning to telework from hotels. US hotels, p
Publish At:2020-10-28 09:08 | Read:707 | Comments:0 | Tags:Mobile Security Malicious WiFi mobile attacks Mobile Threat

A New Lesson for Remote Education: Chromebooks Need More Security

As school districts wrestle with how best to serve its students, one thing is crystal clear: Chromebooks will be in the mix.  Latest global forecasts show Chromebooks shipments in 2Q20 reached up to 11.6 million units. That marks the first time ever for Chromebooks to occupy 25 percent of the total quarterly notebook shipment.  Education usage – in pa
Publish At:2020-07-17 08:54 | Read:879 | Comments:0 | Tags:Chromebooks Education K-12 malware Network attacks phishing

New AgentTesla variant steals WiFi credentials

AgentTesla is a .Net based infostealer that was first seen in 2014 and has been frequently used by cybercriminals. During the months of March and April 2020, it was actively distributed through spam campaigns in different formats such as ZIP, CAB, MSI, IMG files, or Office documents. Newer variants of AgentTesla seen in the wild have the capability to col
Publish At:2020-04-16 13:30 | Read:1253 | Comments:0 | Tags:Cybercrime Malware Agent Tesla malware wifi

CVE-2019-8804: An inconsistency in Wi-Fi network configuration 

Researcher: Christy Philip Mathew (@christypriory) Relevant Devices: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation CVE: CVE-2019-8804 Summary An attacker in physical proximity of an Apple Store or an Apple retailer may be able to force a user onto a malicious Wi-Fi network during device setup, if the device
Publish At:2019-11-12 00:25 | Read:1703 | Comments:0 | Tags:iOS WiFi

WiNX: The Ultra-Portable Wireless Attacking Platform

When you are performing penetration tests for your customers, you need to build your personal arsenal. Tools, pieces of hardware and software are collected here and there depending on your engagements to increase your toolbox. To perform Wireless intrusion tests, I’m a big fan of the WiFi Pineapple. I’ve one for years (model MK5). It’s not
Publish At:2017-09-29 02:25 | Read:6207 | Comments:0 | Tags:Pentesting Security Social Engineering Hardware WiFi WiNX Wi

Tips to Stay Secure on Summer Vacations

In the excitement of summer vacations, most of us forget to equip ourselves with the privacy tools and needed security measures. Yet, such flawed data security could ruin your vacations as the cyber goons always remain on work. Therefore, here we have listed some essential steps that are must to secure your sensitive information you carry with yourself while
Publish At:2017-07-07 02:35 | Read:5513 | Comments:0 | Tags:Breaking News Security Cybersecurity GPS Hacking Identity Th

RSA Conference 2017 attendees hacked with rogue access points

Experts at Pwnie Express discovered multiple rogue access points on the show floor that were used to hack the RSA conference attendees. The news is very curious, the attendees at the 2017 RSA conference, one of the world’s largest security events, may have been hacked. Security researchers at reports at Pwnie Express were scanning the conference floor
Publish At:2017-02-19 19:45 | Read:4961 | Comments:0 | Tags:Breaking News Hacking EvilAP attack RSA Conference security

The Infernal-Twin tool, easy hacking wireless networks

The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to automate the Evil Twin Attack. The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to assess wireless security by automating the Evil Twin Attack. “The tool wa
Publish At:2015-11-09 04:30 | Read:6908 | Comments:0 | Tags:Breaking News Hacking Infernal-Twin penetration testing Pier

Beware, connected ikettles can leak WiFi passwords

The Pen Test Partners researcher Ken Munro mapped and hacked connected iKettles across London demonstrating they leak WiFi passwords. The Pen Test Partners researcher Ken Munro has conducted a very singular experiment, he mapped and hacked connected kettles across London, demonstrating they leak WiFi passwords. Once again Inte
Publish At:2015-10-19 22:20 | Read:4703 | Comments:0 | Tags:Breaking News Hacking Security iKettles Internet of Things I

Hackers can disable high-tech sniper rifles and change the target

A couple of married researchers demonstrated hot to disable high-tech sniper rifles and change their targets with unpredictable consequences. Hacking, hacking, always hacking … this time we will discuss remote hacking of High-tech Sniper Rifles. Hackers can compromise High-tech Sniper Rifles and causing problems pointin
Publish At:2015-07-31 08:20 | Read:4325 | Comments:0 | Tags:Breaking News Hacking high-tech sniper rifles WIFI