It’s common sense for Android users to check the permission list before installing an app. If the app asks for access to SMS, your contacts list or location, you know it may disclose your privacy. What if a game app only asked for the wifi_status permission?
You might install it with ease – and unknowingly have enabled 3rd parties to track your location! The Android LocationManager was considered to be the only way to acquire the location data, and required a user’s approval. However, researchers have discovered a covert channel to locate and track a user without permission by using the latent location signal disclosed by wifi scanning.Read more
Public Wi-Fi networks — like those in coffee shops or hotels — are not nearly as safe as you think. Even if they have a password, you're sharing a network with tons of other people, which means your data is at risk. Here's how to stay safe when you're out and about.
Just because most wireless routers have a firewall to protect you from the internet doesn't mean you're protected from others connected to the same network. It's remarkably easy to steal someone's username and password, or see what they're doing just by being on the same network. Don't take that chance. We're going to show you which settings are the most important ones.Read more
In yet another example of smart medical device insecurity, it has emerged recently that a line of Hospira drug pumps are exposed to a series of remotely exploitable vulnerabilities that could allow an attacker to take complete control of affected pumps or simply render them useless.
These drug infusion pumps are part of the new wave of smart and connected medical devices. Smart medical devices essentially remove the risk of human error for people requiring the chronic administration of drugs. Unfortunately, many of the companies developing these devices have repeatedly demonstrated a complete disregard for security.Read more
Hacks happen all the time. While some exploits are caused by insanely technical code created to dupe even the most advanced machines, more often it's simple human actions that are to blame.
Hackers are not necessary interested in someone’s money or secrets, so what drives them to be what they are? It is very interesting, but 86% of hackers are sure they would not be punished for their deeds. The best way to protect yourself is to know what you're doing that may be unsafe. Even the best protection software won't help someone with unsafe online practices. Here's a list of nine common things people do that quite often leads to them getting hacked.Read more
Three months after Lenovo was called out for installing dangerous software onto its computers, the world's largest PC manufacturer has once again been accused of lax security measures.
Security firm reports that it discovered major vulnerabilities in Lenovo's update system that could allow hackers to bypass validation checks, replace legitimate Lenovo programs with malicious software, and run commands from afar. Through one of the vulnerabilities, IOActive researchers explained that attackers could create a fake certificate authority to sign executables, allowing malicious software to masquerade as official Lenovo software.Read more
Recently the United States Government Accountability Office published a report warning the Federal Aviation Administration that aviation faces cybersecurity challenges in “at least three areas”, including the protection of aircraft avionics used to operate and guide aircrafts.
The media interpreted this warning to mean, “Modern aircrafts can be hacked and commandeered through onboard Wi-Fi”. But, is it really that bad? A modern passenger plane has multiple computer networks, and those networks share data of differing levels of importance, transferring the necessary information between them.Read more
Researchers have revealed a zero-day vulnerability in iOS 8 that, when exploited by a malicious wireless hotspot, will repeatedly crash nearby Apple iPhones, iPads and iPods. The attack will render vulnerable iOS things within range unstable or even entirely unusable by triggering constant reboots.
Anyone can take any router and create a Wi-Fi hotspot that forces you to connect to their network, and then manipulate the traffic to cause apps and the operating system to crash. This is not a denial-of-service where you can't use your Wi-Fi – this is a denial-of-service so you can't use your device even in offline mode.Read more
Hundreds of planes flying commercially today could be vulnerable to having their onboard computers hacked and remotely taken over by someone using the plane's passenger Wi-Fi network, or even by someone on the ground.
Modern communications technologies, including IP connectivity, are increasingly used in aircraft systems, creating the possibility that unauthorized individuals might access and compromise aircraft avionics systems. The report explains that as the air traffic control system is upgraded to use Internet-based technology on both the ground and in planes, avionics could be compromised.Read more
In his backpack Wouter Slotboom carries around a small black device with an antenna on it. I meet Wouter by chance at a random cafe in the center of Amsterdam. Some people talk, others are working on their laptops or playing with their smartphones.
Wouter removes his laptop from his backpack and hides it under a menu. A waitress passes by and we ask for two coffees and the password for the WiFi network. Meanwhile, Wouter switches on his laptop and device, launches some programs, and soon the screen starts to fill with green text lines. It gradually becomes clear that Wouter’s device is connecting to the laptops, smartphones, and tablets of cafe visitors.Read more
From takeoff to landing, the U.S. Federal Aviation Administration and its counterpart in the European Union have cleared the use of computers and mobile devices, though flyers will still be prohibited from using onboard Wi-Fi and from sending and receiving text messages, calls, and emails during takeoff and landing.
Obviously, once in the air, travelers have for some time been allowed to connect to onboard Wi-Fi networks. It is likely however that this relaxing of rules will spur more people to connect to those networks than currently do, causing us to wonder, how safe is in-air Wi-Fi in the first place?Read more