How to Secure Your Wireless Devices?

Heimadal Security

The information sheet published by the NSA can help with the noticing of any potential threats and vulnerable public connections, and also to minimize risks in order to better secure wireless devices and […]. The post How to Secure Your Wireless Devices?

NSA shares guidance on how to secure your wireless devices

Bleeping Computer

The US National Security Agency (NSA) today published guidance on how to properly secure wireless devices against potential attacks targeting them when traveling or working remotely. [.].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Who Owns Your Wireless Service? Crooks Do.

Krebs on Security

Corrupt wireless company employees taking hundreds of thousands of dollars in bribes to unlock and hijack mobile phone service. Wireless providers selling real-time customer location data, despite repeated promises to the contrary. And you’d be forgiven if you assumed the major wireless carriers or federal regulators had their hands firmly on the wheel. Unfortunately, Sohn said, the FCC has allowed the wireless carriers to adopt this approach voluntarily.

NYC Wireless Network Outage Raises Questions About Effectiveness, Transparency

Adam Levin

A technical glitch took down a wireless network used by New York City’s municipal government, raising serious questions about security and reliability of operational technology used by the city. The New York City Wireless Network, or NYCWiN, was initially deployed in 2008 at a cost of $500 million. The post NYC Wireless Network Outage Raises Questions About Effectiveness, Transparency appeared first on Adam Levin. Data Security Government featured nycwin wireless

Rogers Wireless Services Down

Heimadal Security

The telecom giant Rogers declared that wireless calls, SMS, and data services have been restored for “a vast majority of our customers” after a mass outage that lasted several hours yesterday. The post Rogers Wireless Services Down appeared first on Heimdal Security Blog.

IoT Company Sierra Wireless Hit with Ransomware

Heimadal Security

Canada-based IoT company Sierra Wireless revealed its internal IT systems were hit by a ransomware attack on March 20th, forcing it to suspend production at its manufacturing sites. The post IoT Company Sierra Wireless Hit with Ransomware appeared first on Heimdal Security Blog.

IoT device maker Sierra Wireless hit by Ransomware attack

CyberSecurity Insiders

Canada-based Internet of Things (IoT) maker Sierra Wireless has been hit by ransomware attack bringing certain production operations of the company to a halt. Sierra Wireless claims the incident has disrupted internal systems along with the website as it is still under maintenance.

Sierra Wireless halted production at its manufacturing sites due to ransomware attack

Security Affairs

This week, IoT company Sierra Wireless disclosed a ransomware attack that hit its internal IT systems on March 20 and disrupted its production. Sierra Wireless sells 2G, 3G and 4G mobile broadband wireless modems, routers and gateways as well as software, tools, and services.

Consumer Reports Reviews Wireless Home-Security Cameras

Schneier on Security

As part of that, it's reviewing wireless home-security cameras. Consumer Reports is starting to evaluate the security of IoT devices. It found significant security vulnerabilities in D-Link cameras: In contrast, D-Link doesn't store video from the DCS-2630L in the cloud. Instead, the camera has its own, onboard web server, which can deliver video to the user in different ways. Users can view the video using an app, mydlink Lite.

Gaining Root Access on Sierra Wireless AirLink Devices

Security Boulevard

It is also a more feasible option today than it once was because wireless technology has evolved to [.]. The post Gaining Root Access on Sierra Wireless AirLink Devices appeared first on TechSpective. Security Bloggers Network IOActive Sierra Wireless AirLink wi-fi security

Vulnerability in Wireless Router Chipsets Prompts Advisory

Dark Reading

Synopsys issues an advisory for vulnerabilities affecting the chipsets of wireless routers from Qualcomm, Mediatek, and Realtek

BSides Philly 2020 – Nick Delewski’s ‘Wireless WiFi: Think More About What Wireless Really Means’

Security Boulevard

The post BSides Philly 2020 – Nick Delewski’s ‘Wireless WiFi: Think More About What Wireless Really Means’ appeared first on Security Boulevard. Many thanks to BSides Philly for publishing their outstanding videos on the organization's YouTube channel. Enjoy!

Sierra Wireless resumes production after ransomware attack

Bleeping Computer

Canadian IoT solutions provider Sierra Wireless announced that it resumed production at its manufacturing sites after it halted it due to a ransomware attack that hit its internal network and corporate website on March 20. [.].

Ransomware attack shuts down Sierra Wireless IoT maker

Bleeping Computer

Sierra Wireless, a world-leading IoT solutions provider, today disclosed a ransomware attack that forced it to halt production at all manufacturing sites. [.].

Beware! Connecting to This Wireless Network Can Break Your iPhone's Wi-Fi Feature

The Hacker News

A wireless network naming bug has been discovered in Apple's iOS operating system that effectively disables an iPhone's ability to connect to a Wi-Fi network.

Intel wireless driver updates fix Windows 10 blue screen issues

Bleeping Computer

Intel has addressed Wi-Fi and Wireless Bluetooth drivers issues causing Windows 10 blue screen of death (BSOD) errors and Bluetooth devices to lose connection or stop working. [.].

Sierra Wireless Website Still Down After Ransomware Attack

Dark Reading

The company believes the attack's impact is limited to its internal IT systems and corporate websites

Sierra Wireless Restarts Production After Being Hit by a Ransomware Attack

Heimadal Security

As announced on March 23th and updated on March 26th, Canada-based IoT company Sierra Wireless became a victim of a ransomware attack on its internal IT systems and corporate website, and temporarily closed down production at its manufacturing sites.

Cisco discovered several flaws in Sierra Wireless AirLink ES450 devices

Security Affairs

Experts at Cisco Talos group disclosed a dozen vulnerabilities uncovered in Sierra Wireless AirLink gateways and routers, including several serious flaws. Researchers at Cisco Talos group disclosed a dozen vulnerabilities affecting Sierra Wireless AirLink gateways and routers, including several serious flaws. At the time of writing, Sierra Wireless has yet to release a security advisory for these vulnerabilities.

Ransomware Attack Foils IoT Giant Sierra Wireless

Threatpost

The ransomware attack has impacted the IoT manufacturer's production lines across multiple sites, and other internal operations. Hacks IoT Malware

Cisco Fixes Critical Flaw in Wireless VPN, Firewall Routers

Threatpost

IoT Vulnerabilities Web Security Cisco Cisco patch Cisco RV110W Wireless-N VPN Firewall Cisco RV130W Wireless-N Multifunction VPN Router Cisco RV215W Wireless-N VPN Router CVE-2019-1663 RouterCisco said that CVE-2019-1663, which has a CVSS score of 9.8, allows unauthenticated, remote attackers to execute arbitrary code.

Fujitsu Wireless Keyboard Plagued By Unpatched Flaws

Threatpost

Two high-severity vulnerabilities in a Fujitsu wireless keyboard expose passwords and allow keystroke injection attacks. Hacks IoT Vulnerabilities Encryption fujitsu Keylogging keystroke injection LX390 Password radio frequency vulnerability wireless attack wireless keyboard

Tenable experts found 15 flaws in wireless presentation systems

Security Affairs

Experts at Tenable discovered 15 vulnerabilities in eight wireless presentation systems, including flaws that can be exploited to remotely hack devices. Wireless presentation systems are used to display content on a screen or through several devices, including mobile devices and laptops. Researchers at Tenable discovered 15 vulnerabilities in eight wireless presentation systems, some of them can be exploited for command injection and for gaining access to a device.

Flaws in Realtek RTL8170C Wi-Fi module allow hijacking wireless communications

Security Affairs

Researchers found multiple flaws in the Realtek RTL8170C Wi-Fi module that could be exploited to elevate privileges and hijack wireless communications. The post Flaws in Realtek RTL8170C Wi-Fi module allow hijacking wireless communications appeared first on Security Affairs.

Critical Flaws Found in Eight Wireless Presentation Systems

Threatpost

Crestron, Barco wePresent, Extron ShareLink and more wireless presentation systems have an array of critical flaws. IoT Vulnerabilities Barco wePresent Crestron critical vulnerability Extron ShareLink wireless presentation system

Unpatched Fujitsu Wireless Keyboard Bug Allows Keystroke Injection

Threatpost

An unpatched high-severity vulnerability allows keystroke injections in Fujitsu wireless keyboards. Hacks Vulnerabilities cypress semiconductor flaw keyboard vulnerability keystroke injection replay attack ujitsu Wireless Keyboard Set LX901

Sierra Wireless Patches Critical Vulns in Range of Wireless Routers

Threatpost

IoT Malware Mobile Security Vulnerabilities Web Security airlink critical vulnerabilities cve-2017-15043 cve-2018-10251 firmware upgrade patch Reaper Sierra Wireless wireless gatewaysThe flaws would leave the enterprise devices helpless to a range of remote threats, including the charms of the Reaper IoT botnet.

Security platform tracks rogue wireless devices via real-time map

Tech Republic Security

New security tool from Bastille Networks can help security teams enforce no cell-phone zones

T-Mobile discloses data breach affecting prepaid wireless customers

Security Affairs

The cybersecurity team at T-Mobile discovered an unauthorized access to information associated with a limited number of its prepaid wireless account customers. The post T-Mobile discloses data breach affecting prepaid wireless customers appeared first on Security Affairs.

Cisco addressed CVE-2019-1663 RCE flaw in wireless routers

Security Affairs

Cisco addressed CVE-2019-1663 critical flaw in several wireless routers that could be exploited by attackers to remotely execute code on the impacted devices. Cisco released security updates to address a critical flaw (CVE-2019-1663) in several wireless routers that could be exploited by attackers to remotely execute code on the impacted devices. The tech giant fixed the issue in the following releases: RV110W Wireless-N VPN Firewall: 1.2.2.1

Multiple Sierra Wireless AirLink Routers Open to Remote Code Execution

Threatpost

Critical flaws in the software of Sierra Wireless' AirLink routers enable an array of malicious attacks. IoT Vulnerabilities airlink airlink gateway critical flaw gateway remote code execution Router Sierra Wireless

Wi-Fi security: FBI warns of risks of using wireless hotel networks

Tech Republic Security

Wi-Fi networks in hotels typically favor guest convenience over strong security practices, says the FBI

Critical Flaws in Sierra Wireless 5G Gateway Allow RCE, Command Injection

Threatpost

The wireless gateways are used in PoS, industrial IoT and distributed enterprise settings. IoT Mobile Security Vulnerabilities 5G 5G security AirLink ES450 LTE gateway Command injection critical gateway remote code execution Sierra Wireless vulnerabilities

Sierra Wireless withdraws financial guidance as ransomware attack takes down plants

SC Magazine

IoT provider Sierra Wireless was the target of a ransomware attack on its internal IT systems. ( “Sierra Wireless Developer Day 2014” by Sierra Wireless Developer Program (T Cantegrel) is licensed under CC BY 2.0 ).

Wi-Fi Devices as Physical Object Sensors

Schneier on Security

The new 802.11bf standard will turn Wi-Fi devices into object sensors: In three years or so, the Wi-Fi specification is scheduled to get an upgrade that will turn wireless devices into sensors capable of gathering data about the people and objects bathed in their signals.

Two Zero-Day Bugs Open Millions of Wireless Access Points to Attack

Threatpost

Called BleedingBit, this vulnerability impacts wireless networks used in a large percentage of enterprise companies. Privacy Vulnerabilities Aironet Series Aruba BLE BleedingBit Bluetooth Low Energy cc2640 cc2650 Cisco Cisco Meraki IoT remote code execution flaw Texas Instrument chips Wireless Access Point

SEC charges group for alleged pump-and-dump Airborne Wireless stock scam

Zero Day

SEC claims investors were defrauded out of $45 million

A full replacement of all Huawei and ZTE hardware on American wireless networks will cost $1.837bn

Security Affairs

The US Federal Communications Commission (FCC) estimates the cost of a full replacement of all Huawei and ZTE hardware on American wireless networks at $1.837bn.

Ultrasonic Signals Are the Wild West of Wireless Tech

WIRED Threat Level

Inaudible signals that your phone can hear—but you can't—are often based on ad hoc tech, which makes for risky security. Security

How to Stop Cyber-Bullying With Mobile Parental Control App

Doctor Chaos

Wireless cyber bullying wirelessThe widespread adoption of mobile phones and the internet has dramatically increased the cyber-bullying occurrence. Around 75% of teens in the United States have access to mobile phone and internet and half of them have reported experiencing cyber-bullying. Among the online threats, cyberbullying is the most common and probably the most dangerous one. The online-bullying […].

Mobile 141

OAUTH 2.0 Hack Exposes 1 Billion Mobile APPS To Account Hijacking

Doctor Chaos

Wireless mobile wirelessJoseph Muniz, aka the security blogger wrote a great article on OAuth 2.0 vulnerabilities. The original article can be found here. Threatpost.com posted a write up on very scary research on OAuth 2.0 vulnerabilities from the recent Blackhat Europe 2016 conference. The original post can be found HERE. Third-party applications that allow single sign-on […].

Mobile 122

Bluetooth Vulnerability: BIAS

Schneier on Security

This is new research on a Bluetooth vulnerability (called BIAS) that allows someone to impersonate a trusted device: Abstract: Bluetooth (BR/EDR) is a pervasive technology for wireless communication used by billions of devices.

Network Monitoring: The Forgotten Cybersecurity Tool

Security Boulevard

Cloud Security Cybersecurity Data Security Featured Network Security Security Boulevard (Original) Spotlight AI in Cybersecurity Analyzing DDoS Attacks network analytics SIEM Wireless Network Security