In wireless LAN equipment that is supposedly used to provide internet connectivity in flights, two serious aircraft wifi devices vulnerabilities were discovered. The Flexlan…
WiFi Devices
WiFi Protocol Flaw: Security Flaw Allows Hijacking of Network Traffic
A cybersecurity researchers have recently discovered a critical Wifi protocol flaw in the design of the IEEE 802.11 WiFi protocol standard. This vulnerability allows…
Apple iPhone and iPad WiFi Bug Disrupts WiFi And Other Functionalities
In the newest Apple developments, Apple iPhone and iPad have been found with a new bug that renders the devices’ ability to connect via…
Frag Attacks Can Compromise Millions Of Wi-Fi Devices; Bugs As Old As 1997
In the latest security developments, a security researcher has found numerous Frag attacks vulnerabilities in the WiFi Standard, some of which date back to…
New Android Malware ‘Goldoson’ Infects Google Play via 60 Legitimate Apps with 100 Million Downloads
A new Android malware named ‘Goldoson’ has infiltrated Google Play by exploiting third-party libraries in 60 legitimate apps that collectively have over 100 million…
Google Uncovers Multiple Zero-Day Vulnerabilities in Samsung’s Exynos Chipsets
Google’s Project Zero team has found and reported 18 zero day vulnerability in Samsung’s Exynos chipsets. This chipsets are in-use various devices such as…
Pre-installed malware on Android TV box
A Canadian systems security consultant, Daniel Milisic, recently bought an Android TV box from Amazon. It came with malware. It was in its firmware.…
How A Security Concern Was Caused By An IP Address Compromise At The DRDO Missile Lab
The Defence Research and Development Organization (DRDO), which is in charge of the nation’s missile development projects, suffered a significant breach that the Indian…
Apple AirTag Bug Enabled ‘Good Samaritan’
If the AirTag has been set to lost mode, the new $30 AirTag tracking device from Apple has a feature that lets anyone who…
USB Cyber Threats Are Increasing; Critical Industrial Concern
According to the latest Honeywell research, there exist a plethora of cyber threats that are architectured to use USB sticks and other external media…