Every year, thousands of people lose their lives in natural disasters. A major portion of deaths occur due to the lack of...
While “Wi-Fi” has sorted us out with fast wireless internet connectivity, people have misconstrued the technology for having harmful health effects on...
In late 2017, KRACK Attack crippled the popular 13-year-old WPA2 Wi-Fi standard used in our homes, offices, and public networks. The flaw allowed hackers...
Today, the world has become heavily reliant on computers owing to the various advantages they offer. It has thus become imperative that...
Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat. This is a brief walk-through tutorial that illustrates how to crack Wi-Fi networks that...
A flight of new research papers show 4G LTE networks can be exploited for all sorts of badness. There have been lots...
Many industrial networking devices from various vendors are still vulnerable to the recently disclosed KRACK attack (Key Reinstallation Attack). Many industrial networking devices...
We discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim...
Earlier this year we performed research into Broadcom’s Wi-Fi stack. Due to the ubiquity of Broadcom’s stack, we chose to conduct our...
Cyber security experts disclosed the existence of 10 unpatched security flaws in dozens of Linksys routers widely used today. The IOActive senior...
Short Bytes: The Linux kernel is the most used piece of software in the history of computing. It’s everywhere. It’s in computers,...
Israeli hacker Amihai Neiderman needed three days to hack into Tel Aviv’s free public Wi-Fi. He only worked during the evenings, after...
Short Bytes: A group of researchers has revealed a new method to steal sensitive information from a user’s computer or phone. Named WindTalker,...
Just recently I stumbled upon an Android app that lets you receive free products in various pubs, restaurants or cafes in exchange...
Sławomir Jasek with research firm SecuRing is sounding an alarm over the growing number of Bluetooth devices used for keyless entry and...
When Wi-Fi was first developed in the late 1990s, Wired Equivalent Privacy was created to give wireless communications confidentiality. WEP, as it...
Security experts are warning owners of Mitsubishi Outlander Plug-In Hybrid Electric Vehicle that their cars can be hacked via the automobile’s on-board...
Short Bytes: At the recently-held Moogfest, an art and music festival, artists Kyle McDonald and Surya Mattu showed how our devices continuously leak...
OS X: NetSpot is a free utility that makes it easy to map out your wireless network, do a site survey if...
Short Bytes: Facing problems with your broadband connection is a common headache that most people struggle with. The UK telecom regulator Ofcom...
Short bytes: There are different ways to retrieve the WiFi password of the network that you are connected to. Out of these,...