radio attack
![iPhone](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094202/iphone2-400x200.jpg)
Protect your smartphone from radio-based attacks
By now, most of us are aware that smartphones are powerful computers and should be treated as such. It’s not a coincidence that most of the security tips given to smartphone …
![audio](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093143/audio1-400x200.jpg)
Radio frequency: An invisible espionage threat to enterprises
You can’t see it, but corporate airspaces are under attack via radio frequencies. Foreign governments, competitors and cyber criminals are all conducting radio-based attacks …
![siren](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101354/siren-400x200.jpg)
Emergency alert systems used across the US can be easily hijacked
A vulnerability affecting emergency alert systems supplied by ATI Systems, one of the leading suppliers of warning sirens in the USA, could be exploited remotely via radio …
![Icarus](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110038/icarus-400x200.jpg)
Icarus takes control of drones by impersonating their operators
Researcher Jonathan Andersson, a member of Trend Micro’s TippingPoint DVLabs, has demonstrated how a specialized hardware module dubbed Icarus can be used to hijack a …
![ADAC test](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113428/adac-test-400x200.jpg)
Cheap radio attack can be used to unlock and steal 24 car models
A group of researchers from ADAC, the largest automobile club in Germany and Europe, have demonstrated how the keyless “comfort locking” system used by most …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD