HackDig : Dig high-quality web security articles

FragAttacks: Everything You Need to Know

A cybersecurity researcher discovered a new category of Wi-Fi vulnerabilities recently. But the surprising news is that this new category is actually very old. Called FragAttacks, these 12 Wi-Fi vulnerabilities have existed since the late 90s. But they’re new to the cybersecurity world because people only recently discovered and described th
Publish At:2021-07-19 15:38 | Read:354 | Comments:0 | Tags:Advanced Threats Malware Network Threat Hunting fragattack G

How one word can disable an iPhone’s WiFi functionality

A researcher has found a way to disable the WiFi functionality on iPhones by getting them to join a WiFi hotspot with a weird name. This shouldn’t be happening. The first thing you learn in coding school when it comes to input (which is literally any data a device has to do something with) is to validate it. Well, maybe not the first thing, but if y
Publish At:2021-07-09 13:27 | Read:467 | Comments:0 | Tags:Exploits and vulnerabilities %n format string vulnerability

How to deal with slow internet?

One of the most frustrating things that can happen to anyone is to experience a slow internet connection. With the pandemic continuing to ravage the world, more and more people are working and studying from home. The pandemic also made entertainment venues restricted or closed, so the demand for online entertainment has never been higher. And the holy grail
Publish At:2021-04-23 03:35 | Read:773 | Comments:0 | Tags:Mobile News Tips internet speed tips wifi

How to Remove Wi-Fi Networks from Your Mac and iOS Device

If you travel regularly with your Mac or iOS device, you likely find yourself connecting to new Wi-Fi networks: at airports, in train stations, in hotels, restaurants, pubs, or at clients’ offices. Whether you connect to these networks with your Mac, iPhone, or iPad, miraculously, your devices will remember these networks and sync them via iCloud — s
Publish At:2021-03-30 12:30 | Read:694 | Comments:0 | Tags:How To Mac Wi-Fi Networks WiFi IOS

Hacking Christmas Gifts: Artie Drawing Robot

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift may introduce unexpected vulnerabilities. In this blog series, VERT will be looking at some of the Internet’s best-selling holiday gifts with an eye toward thei
Publish At:2020-12-23 13:32 | Read:953 | Comments:0 | Tags:Internet of Things IoT IoT security robot WiFi hack

[SANS ISC] Malware Victim Selection Through WiFi Identification

I published the following diary on isc.sans.edu: “Malware Victim Selection Through WiFi Identification“: Last week, I found a malware sample that does nothing fancy, it’s a data stealer but it has an interesting feature. It’s always interesting to have a look at the network flows generated by malware samples. For a while, attackers
Publish At:2020-12-22 08:31 | Read:1085 | Comments:0 | Tags:Malware SANS Internet Storm Center Security BSSID GeoIP SANS

Why Leading Cities and States Should be Protecting ‘Digital Citizens’ from Mobile Threats

When most people think of Zimperium, they may recognize us as the leader in enterprise mobile device and app security. Or, they have seen the recent news on the Defense Information Systems Agency (DISA), a U.S. Department of Defense (DoD) organization, selecting us to deliver comprehensive Mobile Endpoint Protection (MEP) to the unclassified government furn
Publish At:2020-12-01 09:35 | Read:1210 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

Hacking Christmas Gifts: Putting IoT Under the Microscope

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift may introduce unexpected vulnerabilities. In this blog series, VERT will be looking at some of the Internet’s best-selling holiday gifts with an eye toward their possible
Publish At:2020-11-30 00:02 | Read:1211 | Comments:0 | Tags:Cyber Security Featured Articles IoT IoT security WiFi hack

FBI Warns of Wi-Fi Attacks Targeting Teleworkers at Hotels Due to COVID

The Federal Bureau of Investigation (FBI) recently issued an announcement encouraging Americans to exercise caution when using hotel wireless networks (Wi-Fi) for telework. The announcement – in-part – states, “FBI has observed a trend where individuals who were previously teleworking from home are beginning to telework from hotels. US hotels, p
Publish At:2020-10-28 09:08 | Read:1194 | Comments:0 | Tags:Mobile Security Malicious WiFi mobile attacks Mobile Threat

A New Lesson for Remote Education: Chromebooks Need More Security

As school districts wrestle with how best to serve its students, one thing is crystal clear: Chromebooks will be in the mix.  Latest global forecasts show Chromebooks shipments in 2Q20 reached up to 11.6 million units. That marks the first time ever for Chromebooks to occupy 25 percent of the total quarterly notebook shipment.  Education usage – in pa
Publish At:2020-07-17 08:54 | Read:1419 | Comments:0 | Tags:Chromebooks Education K-12 malware Network attacks phishing

New AgentTesla variant steals WiFi credentials

AgentTesla is a .Net based infostealer that was first seen in 2014 and has been frequently used by cybercriminals. During the months of March and April 2020, it was actively distributed through spam campaigns in different formats such as ZIP, CAB, MSI, IMG files, or Office documents. Newer variants of AgentTesla seen in the wild have the capability to col
Publish At:2020-04-16 13:30 | Read:2028 | Comments:0 | Tags:Cybercrime Malware Agent Tesla malware wifi

CVE-2019-8804: An inconsistency in Wi-Fi network configuration 

Researcher: Christy Philip Mathew (@christypriory) Relevant Devices: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation CVE: CVE-2019-8804 Summary An attacker in physical proximity of an Apple Store or an Apple retailer may be able to force a user onto a malicious Wi-Fi network during device setup, if the device
Publish At:2019-11-12 00:25 | Read:2206 | Comments:0 | Tags:iOS WiFi

WiNX: The Ultra-Portable Wireless Attacking Platform

When you are performing penetration tests for your customers, you need to build your personal arsenal. Tools, pieces of hardware and software are collected here and there depending on your engagements to increase your toolbox. To perform Wireless intrusion tests, I’m a big fan of the WiFi Pineapple. I’ve one for years (model MK5). It’s not
Publish At:2017-09-29 02:25 | Read:6779 | Comments:0 | Tags:Pentesting Security Social Engineering Hardware WiFi WiNX Wi

Tips to Stay Secure on Summer Vacations

In the excitement of summer vacations, most of us forget to equip ourselves with the privacy tools and needed security measures. Yet, such flawed data security could ruin your vacations as the cyber goons always remain on work. Therefore, here we have listed some essential steps that are must to secure your sensitive information you carry with yourself while
Publish At:2017-07-07 02:35 | Read:6047 | Comments:0 | Tags:Breaking News Security Cybersecurity GPS Hacking Identity Th

RSA Conference 2017 attendees hacked with rogue access points

Experts at Pwnie Express discovered multiple rogue access points on the show floor that were used to hack the RSA conference attendees. The news is very curious, the attendees at the 2017 RSA conference, one of the world’s largest security events, may have been hacked. Security researchers at reports at Pwnie Express were scanning the conference floor
Publish At:2017-02-19 19:45 | Read:6003 | Comments:0 | Tags:Breaking News Hacking EvilAP attack RSA Conference security


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud