wireless
![Google Station](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110335/google-station-400x200.jpg)
Google wants to revamp public Wi-Fi networks, but what about security?
William Shakespeare once wrote, “the eyes are the windows to your soul,” but if you ask savvy retailers, they might say it’s guest Wi-Fi. Why? New Wi-Fi systems allow them to …
![Volkswagen](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195715/volkswagen-400x200.jpg)
Hundreds of millions of cars can be easily unlocked by attackers
Security researchers have come up with a way to unlock cars manufactured by vendors around the world, and are set to present their findings on Friday at the Usenix security …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111134/blueprint-400x200.jpg)
New home router OS tackles firmware shortcomings
Untangle announced the release of a new operating system for consumer Wi-Fi routers at DEF CON 24. Router hardware has evolved and improved over the years, but its firmware …
![modem router](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111333/modem-router-400x200.jpg)
FCC orders TP-Link to allow third-party firmware on their routers
The Federal Communications Commission’s Enforcement Bureau has reached a $200,000 settlement with TP-Link in regards to selling in the US routers that could operate at output …
![KeySniffer](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111339/keysniffer-400x200.jpg)
Low-cost wireless keyboards open to keystroke sniffing and injection attacks
Bastille Networks researcher Marc Newlin has discovered a set of security vulnerabilities in low-cost wireless keyboards that could be exploited to collect all passwords, …
![modem router](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111333/modem-router-400x200.jpg)
50+ vulnerabilities found in popular home gateway modems/routers
Researcher Gergely Eberhardt with Hungarian security testing outfit SEARCH Laboratory has unearthed over fifty vulnerabilities in five home gateway modems/routers used by …
![Wi-Fi](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111417/wifi-400x200.jpg)
Wi-Fi hack experiment conducted at Republican National Convention site
Avast security researchers conducted a Wi-Fi hack experiment at various locations around the Republican National Convention site in Cleveland to demonstrate how risky it can …
![signal](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112805/signal-400x200.jpg)
Ubiquiti routers hit by backdoor-generating worm
A worm targeting wireless network equipment developed by US-based Ubiquiti Networks has already managed to compromise thousands of routers across the world. To spread it, …
![Wi-Fi Zone](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194848/wifi_zone-400x200.jpg)
Germany set to end copyright liability for open Wi-Fi operators
People who travel to Germany are often surprised at the lack of public, open Wi-Fi networks. That’s because German law (Störerhaftung – “liability of …
![Wireless](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195303/wireless-green-400x200.png)
A rogue access point at RSA Conference? Here’s what happened
Ever since businesses began to offer Wi-Fi access to customers, experts have warned that open hotspots are not secure. Open Wi-Fi hotspots don’t ask a user for a …
![MouseJack](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194223/mousejack-400x200.jpg)
MouseJack: Remote exploitation via radio frequencies
Bastille has uncovered a massive vulnerability in wireless mice and keyboards that leaves billions of PC’s and millions of networks vulnerable to remote exploitation via radio …
![Wi-Fi Zone](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194848/wifi_zone-400x200.jpg)
1 in 3 home routers will be used as public Wi-Fi hotspots by 2017
Juniper Research predicts that at least 1 in 3 home routers will be used as public Wi-Fi hotspots by 2017, and that the total installed base of such dual-use routers will …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD