HackDig : Dig high-quality web security articles for hackers

Qualcomm and MediaTek Wi-Fi chips impacted by Kr00k-Like attacks

Wi-Fi chips manufactured by Qualcomm and MediaTek are impacted by vulnerabilities similar to the Kr00k issue disclosed early this year. Earlier this year, experts from ESET disclosed the Kr00k, a new high-severity hardware vulnerability, that affects Wi-Fi chips manufactured by Broadcom and Cypress. The Kr00k vulnerability, tracked as CVE-2019-15126,
Publish At:2020-08-08 04:35 | Read:130 | Comments:0 | Tags:Breaking News Hacking Mobile Kr00k Wi-Fi

Why Zero-Click Cyberthreats Should Be on Your Radar

For years, the statistics have told us that human error is the greatest contributor to cyberattacks. We’ve stressed the importance of training, training and more training to prevent the almost inevitable from happening. We’ve been convinced that the key to defending against cyberthreats is to keep the unsuspecting from clicking on phishing emails
Publish At:2020-07-02 15:59 | Read:163 | Comments:0 | Tags:Application Security Endpoint Mobile Security Advanced Malwa

Why Apple Is Missing the Boat on Home Wi-fi

In April 2018, Apple announced that it was discontinuing its AirPort home wi-fi products. The AirPort Extreme, AirPort Express, and Time Capsule were easy-to-use routers and wi-fi access points that fit perfectly into the Apple ecosystem. The AirPort Express was the first easy way to stream music to devices in your home using AirPlay (initially called AirTun
Publish At:2020-06-16 16:07 | Read:233 | Comments:0 | Tags:Apple AirPort wi-fi

The Latest Mobile Security Threats and How to Prevent Them

For many of us, the last few months have drastically increased our reliance on mobile capabilities. Through the increased use of corporate mobile apps, virtual private networks (VPNs), hot spots and more, mobile communications are more ubiquitous than ever. Because of this enhanced, unprecedented and sudden dependence on mobile capabilities, mobile security
Publish At:2020-06-15 10:53 | Read:291 | Comments:0 | Tags:Mobile Security Bring-Your-Own-Device (BYOD) Data Data Breac

Lock Down Personal Smart Devices to Improve Enterprise IoT Security

The presence of internet of things (IoT) devices in employee’s homes is a neglected item in many enterprise threat models. Caution is certainly warranted here, but it’s entirely possible to improve your risk awareness and secure smart devices in a calm and measured way. Overlooking privacy and security risks has consequences. It’s in everyo
Publish At:2020-04-09 10:28 | Read:663 | Comments:0 | Tags:CISO Connected Devices Enterprise Security Home Network Secu

What Is Rich Communication Services? Breaking Down the Benefits and Security Risks

Texting has been around since the 1990s, and it has served us well. Users have sent countless messages, and these exchanges have facilitated such developments as SMS-based two-factor authentication (2FA) and Kenya’s SMS-based M-Pesa mobile payment system. But the world has since discovered countless other ways to message — methods that enable far more
Publish At:2020-03-03 09:50 | Read:627 | Comments:0 | Tags:Mobile Security Artificial Intelligence (AI) Authentication

Kr00k Wi-Fi Encryption flaw affects more than a billion devices

A high-severity hardware vulnerability, dubbed Kr00k, in Wi-Fi chips manufactured by Broadcom and Cypress expose over a billion devices to hack. Cybersecurity researchers from ESET have discovered a new high-severity hardware vulnerability, dubbed Kr00k, that affects Wi-Fi chips manufactured by Broadcom and Cypress. The vulnerability could have a severe
Publish At:2020-02-26 18:44 | Read:561 | Comments:0 | Tags:Breaking News Hacking hacking news information security news

WLAN: Emotet’s new distribution method

These days, Emotet seems to be an ever-present danger for organizational cybersecurity the world over. Just last month, it was discovered trying to make its way into the United Nations, and in 2019, it was a key player in the successive waves of ransomware that hit enterprises and public organizations from the USA to Europe. So prolific was the activity of t
Publish At:2020-02-21 11:50 | Read:618 | Comments:0 | Tags:Business News b2b emotet wi-fi

KRACK Detector is a tool to detect and prevent KRACK attacks in your network

How to discover if your network is vulnerable to KRACK attack? KRACK Detector is a script that can detect attacks against client devices on your network. Last week I published a post warning of many industrial networking devices from various vendors are still vulnerable to the recently disclosed KRACK attack (Key Reinstallation Attack). The Belgian research
Publish At:2017-11-06 10:45 | Read:6227 | Comments:0 | Tags:Breaking News Hacking Internet of Things KRACK attack KRACK

Industrial Products of many vendors still vulnerable to KRACK attack

Many industrial networking devices from various vendors are still vulnerable to the recently disclosed KRACK attack (Key Reinstallation Attack). Many industrial networking devices are vulnerable to the recently disclosed KRACK attack (Key Reinstallation Attack), including products from major vendors such as Cisco, Rockwell Automation, and Sierra Wireless. A
Publish At:2017-10-31 06:55 | Read:3410 | Comments:0 | Tags:Breaking News Hacking KRACK attack Wi-Fi WPA2

Across the Great Divide: Measuring Security Awareness Among US and UK Users

End users in the U.S. and U.K. have very different attitudes toward security. Earlier this summer, Wombat Security surveyed more than 2,000 working adults — half in the U.S. and half in the U.K. — about various cybersecurity topics and perceptions of best practices. The researchers found some interesting surprises and noted a series of different attitudes a
Publish At:2017-08-18 13:25 | Read:3844 | Comments:0 | Tags:Risk Management Cybersecurity Mobile Security Password Manag

Don’t Leave Home Without These Five Travel Security Tips

It’s vacation time for many of us, and that means it’s Christmas for criminals. In their eagerness to experience all the wonders of leisure destinations, travelers are prone to overlooking risks to their physical and digital security. Crooks know this, which is why they target people carrying cameras, sporting backpacks or exhibiting other signs
Publish At:2017-05-25 13:35 | Read:3817 | Comments:0 | Tags:Data Protection Identity & Access Mobile Security Authentica

Ultra Secret Chat Using Wi-Fi Covert Channel

“Covert Channel [Wikipedia]: a covert channel is a type of computer security attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy.”Today, in a world where the hacking techniques are getting more and more sophisticated and security meas
Publish At:2017-03-28 06:40 | Read:4039 | Comments:0 | Tags:Off Topic BSides Munich security Wi-Fi

Efficient Wi-Fi Phishing Attacks: Would You Fall for That?

In recent years, Wi-Fi networks are usually secured with the Wi-Fi Protected Access II (WPA2), a security protocol which leverages a strong cryptographic hash function (PBKDF2 with the network’s ESSID as salt) to protect the pre-shared key (PSK).Breaking into a WPA-2 network can be a great challenge during a penetration test. A modern GPU that is able
Publish At:2017-01-05 03:15 | Read:4644 | Comments:0 | Tags:Featured Articles Security Awareness encryption password Phi

Subtlety Is the Danger for Cybercrime Security Efforts

Celebrities who appear to be suddenly successful have long been called “overnight sensations.” In reality, most of these instant stars worked for years to perfect their skills before they got their big break. Cyberattacks often follow the same trajectory. They are not always immediately disruptive because they are executed stealthily over long pe
Publish At:2017-01-03 15:10 | Read:3660 | Comments:0 | Tags:Data Protection Fraud Protection Cyber Espionage Cybercrime

Tools

Tag Cloud