It looks like Modzero has helped BlackBerry discover a vulnerability in the way BlackBerry 10 implements file sharing over Wi-Fi.
Successful exploitation of this vulnerability could potentially result in an attacker gaining the ability to read, write, or modify data on the device. In order to exploit this vulnerability, an attacker must connect to an affected BlackBerry smartphone’s file sharing service.
Late last month, a Siamese cat named Coco went wandering in his suburban Washington, DC neighborhood. He spent three hours exploring nearby backyards. He killed a mouse, whose carcass he thoughtfully brought home to his octogenarian owner, Nancy. And while he was out, Coco mapped dozens of his neighbors’ Wi-Fi networks, identifying four routers that used an old, easily-broken form of encryption and another four that were left entirely unprotected.
Cyber security researcher Ruben Santamarta says he has figured out how to hack the satellite communications equipment on passenger jets through their WiFi and inflight entertainment systems - a claim that, if confirmed, could prompt a review of aircraft security.
Santamarta, a consultant with cyber security firm IOActive, is scheduled to lay out the technical details of his research at this week's Black Hat hacking conference in Las Vegas, an annual convention where thousands of hackers and security experts meet to discuss emerging cyber threats and improve security measures.
You’ve forked over more than $150 for a decent, bed bug- and corpse-free hotel room. You plop down on the plush duvet and open up your laptop to get online. Of course, you’ve got to pay for it! But not only do you have to pay for Wi-Fi—it only grants access to one device. What gives?
In a day and age when the average household has four mobile devices, it feels like a slap in the face. But there’s actually a way to get around this problem (and it’s probably cheaper than that Wi-Fi access costs to begin with).
Seems like every guide to securing your wireless network tells you to keep your SSID from broadcasting to make your network more secure, but is that really worthwhile? Let’s take a look at one of the silliest myths out there.
This myth has been around for a very long time, and we aren’t expecting everybody to receive this news with happy agreement. You’re welcome to state your case in the comments for why hidden wireless networks are a great idea, but we think if you keep reading, you’ll realize that it’s just not a security feature.