SafeUM
Home Blog Services Download Help About Recharge

Axarhöfði 14, 110 Reykjavik, Iceland

Iceland - 2015
SafeUM
Blog
Services
Download
Help
About
Recharge
Menu
Archive
#Wi-Fi
6 Nov 2015

How connected objects help to make lives more insecure

A year ago our colleague David Jacoby, a researcher at GReAT, successfully attempted to hack his own home and discovered a lot of curious things. David’s experiment inspired many employees around the world. Many employees decided to carry out the same research on their own homes.

To probe smart things for bugs, we chose several popular Internet of Things devices, such as Google Chromecast, an IP camera and a smart coffee machine and a home security system – all of which could be controlled by a smartphone or mobile app. The models and devices were chosen at random and was quite vendor agnostic.

Read more
Tags:
Internet of Things information leaks Wi-Fi
Source:
Kaspersky Daily
2314
29 Oct 2015

Wi-Fi networks can now identify who you are through walls

Who needs a peep hole when a wifi network will do? Researchers from MIT have developed technology that uses wireless signals to see your silhouette through a wall — and it can even tell you apart from other people, too.

The team from MIT’s Computer Science and Artificial Intelligence Lab are no strangers to using wireless signals to see what’s happening on the other side of a wall. In 2013, they showed off software that could use variations in wifi signal to detect the presence of human motion from the other side of a wall. But in the last two years they’ve been busy developing the technique, and now they’ve unveiled the obvious — if slightly alarming — natural progression.

Read more
Tags:
Wi-Fi trends surveillance USA
Source:
Gizmodo
2656
21 Oct 2015

Cracking Wi-Fi passwords by hacking into smart kettles

Hackers have come after your phone, your computer, and your car. Now hackers are coming after your home refrigerators, Smart TVs, and eventually KETTLES.

Yes, your kettle turns out good for more than just heating up water or making coffee for you– they are potentially a good way for hackers to breach your wireless network. A security researcher at PenTest Partners has managed to hack into an insecure iKettle and stolen a home's Wi-Fi password. Besides boiling water, the iKettle can connect to a user's home Wi-Fi network. It also comes inbuilt with an Android and iOS app that allows the user to switch on the kettle and boil the water from other location.

Read more
Tags:
Wi-Fi information leaks Internet of Things
Source:
The Hacker News
2789
16 Sep 2015

Hacking an aircraft: is it already real?

Aviation has always been focused on safety and had remained the most secure industry that ever existed. However, the buzz was about another aspect of security — the one quite surprising for an average passenger and quite expected for an IT specialist.

It’s not a secret that today’s aircraft are one huge computer, with the pilot being more of a PC operator rather than of an actual ‘ace’ pilot — he handles a single task of supervising smart machinery. An orientation pilot and a panel operator are no more, fully replaced by computers. As it turned out that those computers are as hackable as the rest.

Read more
Tags:
hackers Wi-Fi
Source:
Kaspersky Daily
2126
8 Sep 2015

FCC accused of locking down Wi-Fi routers

The Federal Communications Commission is considering new restrictions that would make it harder for users to modify Wi-Fi routers, sparking controversy and an apparent misunderstanding over the FCC’s intentions. The FCC's stated goal is to make sure routers and other devices only operate within their licensed parameters.

Manufacturers release products that are certified to operate at particular frequencies, types of modulation, and power levels but which may actually be capable of operating outside of what they’ve been certified and tested to do. The extra capabilities can be unlocked through software updates issued by the manufacturer, or by software made by third parties.

Read more
Tags:
Wi-Fi trends USA surveillance
Source:
Ars Technica
2216
3 Aug 2015

Hacking Team built drone-based Wi-Fi hacking hardware

Leaked e-mails from Hacking Team show that the company developed a piece of rugged hardware intended to attack computers and mobile devices via Wi-Fi.

The capability, marketed as part of the company's Remote Control System Galileo, was shown off to defense companies at the International Defense Exposition and Conference in Abu Dhabi, and it drew attention from a major defense contractor. But like all such collaborations, it may have gotten caught up in the companies' legal departments. Co-founder Marco Valleri outlined the roadmap for a number of Hacking Team's platforms, including its "Tactical Network Injector".

Read more
Tags:
Wi-Fi drones surveillance NSA USA Galileo
Source:
Ars Technica
2286
14 Jul 2015

Google Photo app uploads your images to cloud, even after uninstalling

Have you ever seen any mobile application working in the background silently even after you have uninstalled it completely? I have seen Google Photos app doing the same.

Your Android smartphone continues to upload your phone photos to Google servers without your knowledge, even if you have already uninstalled the Google Photos app from your device. Nashville Business Journal editor David Arnott found that Google Photos app uploaded all his personal photographs from the device into the service even after uninstalling it.

Read more
Tags:
Google Wi-Fi information leaks
Source:
The Hacker News
Author:
Mohit Kumar
2054
8 Jul 2015

Technologies that see through the walls

In the beginning of 2015, there was a wave of publications on a handheld radar called RANGE-R that has been used by government services. The radar system is able to ‘see through the walls’, it registers motion inside closed spaces.

The existence of such a device was surprising for many journalists tasked with publishing the features of RANGE-R. These radars have long been in mass production for military and intelligence-service needs. Prior to that, the technology was only available for some governmental services. Today, the radar system is more widely used due to technological advancements that contributed to price decreases.

Read more
Tags:
trends surveillance Wi-Fi
Source:
Kaspersky Daily
Author:
Vladislav Biryukov
2391
24 Jun 2015

Game-over HTTPS defects in dozens of Android apps expose user passwords

Researchers have unearthed dozens of Android apps in the official Google Play store that expose user passwords because the apps fail to properly implement HTTPS encryption during logins or don't use it at all.

The roster of faulty apps have more than 200 million collective downloads from Google Play and have remained vulnerable even after developers were alerted to the defects. The apps include the official titles from the National Basketball Association, the Match.com dating service and the PizzaHut restaurant chain. They were uncovered by AppBugs, a developer of a free Android app that spots dangerous apps installed on users' handsets.

Read more
Tags:
HTTPS information leaks Android password Wi-Fi
Source:
Ars Technica
2265
8 Jun 2015

How apps track your location without asking for permission

It’s common sense for Android users to check the permission list before installing an app. If the app asks for access to SMS, your contacts list or location, you know it may disclose your privacy. What if a game app only asked for the wifi_status permission?

You might install it with ease – and unknowingly have enabled 3rd parties to track your location! The Android LocationManager was considered to be the only way to acquire the location data, and required a user’s approval. However, researchers have discovered a covert channel to locate and track a user without permission by using the latent location signal disclosed by wifi scanning. 

Read more
Tags:
surveillance Wi-Fi Android
Source:
Trustlook News
2891
SafeUM NEWS
27 Apr 2017 safeum news imgage Encrypted Group Chat
4 Apr 2017 safeum news imgage Each SafeUM user gets free anonymous phone number
10 Mar 2017 safeum news imgage SafeUM useful features to help you feel safe
28 Sep 2016 safeum news imgage Secure Messenger SafeUM
21 Jul 2015 safeum news imgage New secured zone of Google Play: secure messenger SafeUM for Android. Download, Install, Communicate
3 Apr 2015 safeum news imgage We are beginning to test SafeUM for Windows Phone
25 Feb 2015 safeum news imgage SafeUM messenger is available for public testing
20 Feb 2015 safeum news imgage Algorithms and encryption schemes used for secure messenger SafeUM
30 Jan 2015 safeum news imgage New "TOP Security!" app is on the App Store
22 Jan 2015 safeum news imgage Free "TOP Security!" app is available on Google Play
28 Oct 2014 safeum news imgage How are security keys generated in SafeUM?
19 Jun 2014 safeum news imgage SafeUM is the best messenger for data protection and information security
16 Jun 2014 safeum news imgage Become a SafeUM tester and get free PREMIUM subscription for a year
12 May 2014 safeum news imgage Why Premium secure messenger SafeUM cannot be free
25 Apr 2014 safeum news imgage Encrypted secure messaging for every mobile device
All news
First page Previous
1 2 3 4 5 6 7
Next Last page
SafeUM
Confidential Terms of Use Our technologies Company
Follow us
Download
SafeUM © Safe Universal Messenger

Axarhöfði 14,
110 Reykjavik, Iceland

Iceland - 2015