Public Wi-Fi networks — like those in coffee shops or hotels — are not nearly as safe as you think. Even if they have a password, you're sharing a network with tons of other people, which means your data is at risk. Here's how to stay safe when you're out and about.
Just because most wireless routers have a firewall to protect you from the internet doesn't mean you're protected from others connected to the same network. It's remarkably easy to steal someone's username and password, or see what they're doing just by being on the same network. Don't take that chance. We're going to show you which settings are the most important ones.
Read moreIn yet another example of smart medical device insecurity, it has emerged recently that a line of Hospira drug pumps are exposed to a series of remotely exploitable vulnerabilities that could allow an attacker to take complete control of affected pumps or simply render them useless.
These drug infusion pumps are part of the new wave of smart and connected medical devices. Smart medical devices essentially remove the risk of human error for people requiring the chronic administration of drugs. Unfortunately, many of the companies developing these devices have repeatedly demonstrated a complete disregard for security.
Read moreHacks happen all the time. While some exploits are caused by insanely technical code created to dupe even the most advanced machines, more often it's simple human actions that are to blame.
Hackers are not necessary interested in someone’s money or secrets, so what drives them to be what they are? It is very interesting, but 86% of hackers are sure they would not be punished for their deeds. The best way to protect yourself is to know what you're doing that may be unsafe. Even the best protection software won't help someone with unsafe online practices. Here's a list of nine common things people do that quite often leads to them getting hacked.
Read moreRecently the United States Government Accountability Office published a report warning the Federal Aviation Administration that aviation faces cybersecurity challenges in “at least three areas”, including the protection of aircraft avionics used to operate and guide aircrafts.
The media interpreted this warning to mean, “Modern aircrafts can be hacked and commandeered through onboard Wi-Fi”. But, is it really that bad? A modern passenger plane has multiple computer networks, and those networks share data of differing levels of importance, transferring the necessary information between them.
Read moreResearchers have revealed a zero-day vulnerability in iOS 8 that, when exploited by a malicious wireless hotspot, will repeatedly crash nearby Apple iPhones, iPads and iPods. The attack will render vulnerable iOS things within range unstable or even entirely unusable by triggering constant reboots.
Anyone can take any router and create a Wi-Fi hotspot that forces you to connect to their network, and then manipulate the traffic to cause apps and the operating system to crash. This is not a denial-of-service where you can't use your Wi-Fi – this is a denial-of-service so you can't use your device even in offline mode.
Read moreHundreds of planes flying commercially today could be vulnerable to having their onboard computers hacked and remotely taken over by someone using the plane's passenger Wi-Fi network, or even by someone on the ground.
Modern communications technologies, including IP connectivity, are increasingly used in aircraft systems, creating the possibility that unauthorized individuals might access and compromise aircraft avionics systems. The report explains that as the air traffic control system is upgraded to use Internet-based technology on both the ground and in planes, avionics could be compromised.
Read moreIn his backpack Wouter Slotboom carries around a small black device with an antenna on it. I meet Wouter by chance at a random cafe in the center of Amsterdam. Some people talk, others are working on their laptops or playing with their smartphones.
Wouter removes his laptop from his backpack and hides it under a menu. A waitress passes by and we ask for two coffees and the password for the WiFi network. Meanwhile, Wouter switches on his laptop and device, launches some programs, and soon the screen starts to fill with green text lines. It gradually becomes clear that Wouter’s device is connecting to the laptops, smartphones, and tablets of cafe visitors.
Read moreFrom takeoff to landing, the U.S. Federal Aviation Administration and its counterpart in the European Union have cleared the use of computers and mobile devices, though flyers will still be prohibited from using onboard Wi-Fi and from sending and receiving text messages, calls, and emails during takeoff and landing.
Obviously, once in the air, travelers have for some time been allowed to connect to onboard Wi-Fi networks. It is likely however that this relaxing of rules will spur more people to connect to those networks than currently do, causing us to wonder, how safe is in-air Wi-Fi in the first place?
Read moreGoogle and Core Security are at odds over the severity of a vulnerability affecting a number of Android mobile devices, details of which were released by the security vendor today.
The issue was reported to the Android security team and in subsequent communication between the two parties, the severity of the vulnerability was debated, culminating with Core’s disclosure. Google three times acknowledged Core’s report and request for a timeline on a patch, and each time Google said it did not have one. The flaw is a remotely exploitable denial-of-service vulnerability in Wi-Fi-Direct, a standard that allows wireless devices to connect directly.
Read moreAs employees increasingly demand a more mobile and social workplace, the pressure is on for enterprises to deliver the same technology experience employees have in their personal lives to their work lives.
With an emphasis on intuitive collaboration and enhanced productivity, initiatives such as BYOD encourage this sort of working behavior. From a security perspective however, it also heightens the level of risk in a company. In light of the changes to how we work, a new research conducted a global study which revealed the working habits of professionals around the world, and their attitudes towards online data protection.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland