More than ten years after war driving became a household term, Sophos has reinvented the term ... and unfortunately would that random, wireless networks are still vulnerable today.Read More >
Android researchers have found a way to capture Google's ClientLogin authentication protocol on open WiFi networks and then use it to impersonate others on all of Google's services, not just Calendar and Contacts.Read More >
Firesheep, the latest threat to Wi-Fi users, is free, open source, and easy for even the intermediate user to figure out. In fact, over the past three months, more than 1 million individuals have downloaded Firesheep and have the ability to see what other Wi-Fi users on an unsecured network are doing.Read More >
With more generations of electric cars coming, will they be subject to the same “roaming” that is found between cell phone providers? In a joint venture between Europe networking service providers, the development of e-roaming for the electric vehicle industry is forthcoming. This past week, Nokia Siemens Networks announced the development of a new authentication service, which will enable electric vehicle drivers to “roam,” at the Mobile World Congress.
E-Clearing.net is the brand-new service that will use your information (e.g., your charging contract ID or PIN number) to authorize charging among various electric car networks, simplifying customer billing much like how it is done with wireless phone service now.Read More >
German researchers recently discovered how easy it is for someone to jailbreak your iPhone and reveal your passwords in six minutes. This type of hack doesn’t require the use of the phone’s passcode, mainly because the cryptographic key on current iOS devices operates independently from it.
The attack works based on existing vulnerabilities on Apple’s iPhone that enable access to the operating file system. Many of the passwords available to the attacker range from Google or Microsoft Exchange email accounts to VPN and WiFi access and more.Read More >
According to recent research, there are many common office devices that are major hacking targets. In the past decade, printers have become more high-tech with Web, email, and WiFi capabilities, without the security to protect them from unwanted attacks. According to the Technology Review,Read More >
A new series of smart appliances just announced by LG will--in addition to having smart grid connectivity--communicate with each other over the network, as well as connect to owners' smartphones and tablet devices, giving them control over a wide range of energy-saving and diagnostic functions--bringing the kitchen to the forefront of the Internet of Things.Read More >
A recent article in The New York Times looks at a number of new technologies that use ambient radio waves to provide power for wireless, low-power devices and sensors. Harnessing waves from everything in the air -- cellphone antennas, radio stations, TV towers, WiFi transmitters -- these new technologies are using otherwise wasted energy to power a wide range of low-power sensors.Read More >