In its quest to help enterprises seek out and neutralize all threats to their Wi-Fi networks, AirMagnet is now looking to the skies.
In a free software update to its AirMagnet Enterprise product last week, the Wi-Fi security division of Fluke Networks added code specifically crafted to detect the Parrot AR Drone, a popular unmanned aerial vehicle that costs a few hundred dollars and can be controlled using a smartphone or tablet.
The Tesla Model S is essentially a computer on wheels, and as such, it has become the target of a hacking contest at the SyScan 360 security conference in Beijing. One of the contestants, Qihoo 360 Technology Co. apparently succeeded and were able to take over several of the car’s systems. While the car was in motion, the car’s locks, horn, headlights and skylight were all remotely operated by the contestants.
BigBoss, one of the biggest and most popular Cydia repositories, has allegedly been hacked. Attackers “Kim Jong-Cracks” claim to have gained access to all packages — including paid titles — and made them available for free via their own repo. Cydia users are advised to steer well clear of it, however.
Well-known manufacturers of residential and SME wireless routers will have reason to feel nervous as hackers at the annual DefCon security conference aim to break into their products to find undocumented vulnerabilities or so-called Zero Days.
The sponsors behind the DefCon SOHOpelessly Broken competition, Independent Security Evalutators and digital rights lobby group Electronic Frontier Foundation are confident the hackers will find vulnerabilities too, as a number of router vendors have been accused of carelessness in security terms in the past.
Fake apps dressed up to look like official ones but actually designed to steal user data are increasingly targeting Android phone users, according to a study by Trend Micro.
The company looked at the top 50 free apps in Google's Play Store and then searched Google's app store and others to see if fake versions existed. It found fake versions existed for 77 percent of the apps. The fake apps are often made to look like the real ones and have the same functions, but carry a dangerous extra payload.