Snappy Tool Helps Avoid Fraudulent Wi-Fi Hotspots

Trustwave has created a Snappy tool that will make it easy to determine if the Wi-Fi network is fake or fraudulent. The utility particularly checks whether the network spoofs the MAC address and SSID. The solution is available for free downloading on the company’s GitHub repository. For years, security experts have been warning about the… Continue reading Snappy Tool Helps Avoid Fraudulent Wi-Fi Hotspots

What Is an Evil Twin Attack? How Does It Work?

Are you sure the public Wi-Fi you use is an original one, not a rogue?

How often do we connect to free Wi-Fi networks in public places? Whether to post Instagram stories with a cup of coffee we just bought or to make edits to a project while you’re waiting for your flight. In such cases, the widespread availability of public Wi-Fi is a boon. But this general use of… Continue reading What Is an Evil Twin Attack? How Does It Work?

Expert hacked 70% of Wi-Fi networks in Tel Aviv for research

CyberArk specialist Ido Hoorvitch hacked 70% of Wi-Fi networks in his native Tel Aviv, seeking to prove that home networks are poorly secured and easily compromised. To conduct the experiment, Horwich walked around town with sniffing equipment and collected data from 5,000 network hashes. Next, he exploited a vulnerability to obtain the PMKID hash normally… Continue reading Expert hacked 70% of Wi-Fi networks in Tel Aviv for research

Manufacturers release patches for Frag Attacks problems

Manufacturers of various Wi-Fi-enabled equipment and software developers for this equipment release patches for Frag Attacks problems. Let me remind you that last week the details of twelve vulnerabilities were disclosed, collectively called Frag Attacks (Fragmentation and aggregation attacks). These problems were discovered and described by the well-known information security expert Mathy Vanhoef. All Wi-Fi… Continue reading Manufacturers release patches for Frag Attacks problems

Any Wi-Fi enabled devices are vulnerable to Frag Attacks issues

The well-known information security expert Mathy Vanhoef reported the discovery of a whole set of vulnerabilities named Frag Attacks (Fragmentation and aggregation attacks), which affect all devices with Wi-Fi support, released after 1997 (computers, smartphones and “smart” devices). Let me remind you that earlier Vanhof discovered such dangerous vulnerabilities as KRACK and Dragonblood, which significantly… Continue reading Any Wi-Fi enabled devices are vulnerable to Frag Attacks issues

AIR-FI attack turns RAM into a makeshift Wi-Fi signal source

Experts from Israel’s Ben-Gurion University have demonstrated the AIR-FI attack, which turns RAM into Wi-Fi. In fact, this is a new method of extracting data from machines that are physically isolated from any networks and potentially dangerous peripherals. Such computers are often found in government systems and corporate networks, they store secret documents, as well… Continue reading AIR-FI attack turns RAM into a makeshift Wi-Fi signal source

How To Use Public Wi-Fi Safely: Risks To Watch Out For

In a world where almost everything comes with a price it’s sometimes nice to have at least free wifi. But starting with such a poetic intro here actually comes the real concern: how to use Wi-Fi for free and keep your data private.  Many people don’t realize it but using public Wi-Fi puts you at… Continue reading How To Use Public Wi-Fi Safely: Risks To Watch Out For

How can hackers crack your router?

Do you think that you are protected from hackers? Of course, you are using a wireless access point with encryption. You are wrong! pull your password from the air! There are 4 things, that hackers hope you won’t find out WEP encryption is unworkable for protecting your wireless network. WEP (stands for Wired Equivalent Privacy… Continue reading How can hackers crack your router?