HackDig : Dig high-quality web security articles

Using WiFi connection probe requests to track users

Researchers at the University of Hamburg demonstrated that WiFi connection probe requests expose users to track. A group of academics at the University of Hamburg (Germany) demonstrated that it is possible to use WiFi connection probe requests to identify and track devices and thereby their users. Mobile devices transmit probe requests to receive info
Publish At:2022-06-13 06:33 | Read:418 | Comments:0 | Tags:Breaking News Digital ID Mobile hacking news information sec

Practical coexistence attacks on billions of WiFi chips allow data theft and traffic manipulation

Boffins discovered bugs in WiFi chips that can be exploited to extract passwords and manipulate traffic by targeting a device’s Bluetooth component. A group of researchers from the University of Darmstadt, University of Brescia, CNIT, and the Secure Mobile Networking Lab, have discovered security vulnerabilities in WiFi chips that can be exploited
Publish At:2021-12-13 18:11 | Read:3587 | Comments:0 | Tags:Breaking News Hacking hacking news information security news

Public Wi-Fi Security: Is It Safe to Use for Business?

Let’s say you need to send an urgent email to a client while you’re at the store. Or, you’re traveling and need to take a Zoom call at your hotel. Maybe you need to access sensitive client data or employee information while on public Wi-Fi. You wonder how you should connect to the internet to do your task. The easiest and simplest thing to
Publish At:2021-12-06 10:06 | Read:2077 | Comments:0 | Tags:Data Protection Network Risk Management Security Services de

Improving security for mobile devices: CISA issues guides

The Cybersecurity and Infrastructure Security Agency (CISA) has released two actionable Capacity Enhancement Guides (CEGs) to help users and organizations improve mobile device cybersecurity. Consumers One of the guides is intended for consumers. There are an estimated 294 million smart phone users in the US, which makes them an attractive target marke
Publish At:2021-11-25 12:44 | Read:3684 | Comments:0 | Tags:Android cisa consumers emm guides jailbroken juice jacking m

Expert managed to crack 70% of a 5,000 WiFi network sample in Tel Aviv

A researcher from the security firm CyberArk has managed to crack 70% of Tel Aviv’s Wifi Networks starting from a sample of 5,000 gathered WiFi. CyberArk security researcher Ido Hoorvitch demonstrated how it is possible to crack WiFi at scale by exploiting a vulnerability that allows retrieving a PMKID hash. Hoorvitch has managed to crack 70% of a 5,00
Publish At:2021-10-26 16:15 | Read:1076 | Comments:0 | Tags:Hacking Security hacking news information security news IT I

FragAttacks: Everything You Need to Know

A cybersecurity researcher discovered a new category of Wi-Fi vulnerabilities recently. But the surprising news is that this new category is actually very old. Called FragAttacks, these 12 Wi-Fi vulnerabilities have existed since the late 90s. But they’re new to the cybersecurity world because people only recently discovered and described th
Publish At:2021-07-19 15:38 | Read:1458 | Comments:0 | Tags:Advanced Threats Malware Network Threat Hunting fragattack G

How one word can disable an iPhone’s WiFi functionality

A researcher has found a way to disable the WiFi functionality on iPhones by getting them to join a WiFi hotspot with a weird name. This shouldn’t be happening. The first thing you learn in coding school when it comes to input (which is literally any data a device has to do something with) is to validate it. Well, maybe not the first thing, but if y
Publish At:2021-07-09 13:27 | Read:1545 | Comments:0 | Tags:Exploits and vulnerabilities %n format string vulnerability

How to deal with slow internet?

One of the most frustrating things that can happen to anyone is to experience a slow internet connection. With the pandemic continuing to ravage the world, more and more people are working and studying from home. The pandemic also made entertainment venues restricted or closed, so the demand for online entertainment has never been higher. And the holy grail
Publish At:2021-04-23 03:35 | Read:2154 | Comments:0 | Tags:Mobile News Tips internet speed tips wifi

How to Remove Wi-Fi Networks from Your Mac and iOS Device

If you travel regularly with your Mac or iOS device, you likely find yourself connecting to new Wi-Fi networks: at airports, in train stations, in hotels, restaurants, pubs, or at clients’ offices. Whether you connect to these networks with your Mac, iPhone, or iPad, miraculously, your devices will remember these networks and sync them via iCloud — s
Publish At:2021-03-30 12:30 | Read:1823 | Comments:0 | Tags:How To Mac Wi-Fi Networks WiFi IOS

Hacking Christmas Gifts: Artie Drawing Robot

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift may introduce unexpected vulnerabilities. In this blog series, VERT will be looking at some of the Internet’s best-selling holiday gifts with an eye toward thei
Publish At:2020-12-23 13:32 | Read:2036 | Comments:0 | Tags:Internet of Things IoT IoT security robot WiFi hack

[SANS ISC] Malware Victim Selection Through WiFi Identification

I published the following diary on isc.sans.edu: “Malware Victim Selection Through WiFi Identification“: Last week, I found a malware sample that does nothing fancy, it’s a data stealer but it has an interesting feature. It’s always interesting to have a look at the network flows generated by malware samples. For a while, attackers
Publish At:2020-12-22 08:31 | Read:2458 | Comments:0 | Tags:Malware SANS Internet Storm Center Security BSSID GeoIP SANS

Why Leading Cities and States Should be Protecting ‘Digital Citizens’ from Mobile Threats

When most people think of Zimperium, they may recognize us as the leader in enterprise mobile device and app security. Or, they have seen the recent news on the Defense Information Systems Agency (DISA), a U.S. Department of Defense (DoD) organization, selecting us to deliver comprehensive Mobile Endpoint Protection (MEP) to the unclassified government furn
Publish At:2020-12-01 09:35 | Read:2503 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

Hacking Christmas Gifts: Putting IoT Under the Microscope

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift may introduce unexpected vulnerabilities. In this blog series, VERT will be looking at some of the Internet’s best-selling holiday gifts with an eye toward their possible
Publish At:2020-11-30 00:02 | Read:2394 | Comments:0 | Tags:Cyber Security Featured Articles IoT IoT security WiFi hack

FBI Warns of Wi-Fi Attacks Targeting Teleworkers at Hotels Due to COVID

The Federal Bureau of Investigation (FBI) recently issued an announcement encouraging Americans to exercise caution when using hotel wireless networks (Wi-Fi) for telework. The announcement – in-part – states, “FBI has observed a trend where individuals who were previously teleworking from home are beginning to telework from hotels. US hotels, p
Publish At:2020-10-28 09:08 | Read:2464 | Comments:0 | Tags:Mobile Security Malicious WiFi mobile attacks Mobile Threat

A New Lesson for Remote Education: Chromebooks Need More Security

As school districts wrestle with how best to serve its students, one thing is crystal clear: Chromebooks will be in the mix.  Latest global forecasts show Chromebooks shipments in 2Q20 reached up to 11.6 million units. That marks the first time ever for Chromebooks to occupy 25 percent of the total quarterly notebook shipment.  Education usage – in pa
Publish At:2020-07-17 08:54 | Read:2632 | Comments:0 | Tags:Chromebooks Education K-12 malware Network attacks phishing


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud