article thumbnail

Who Owns Your Wireless Service? Crooks Do.

Krebs on Security

Corrupt wireless company employees taking hundreds of thousands of dollars in bribes to unlock and hijack mobile phone service. Wireless providers selling real-time customer location data, despite repeated promises to the contrary. Incessantly annoying and fraudulent robocalls. AT&T in particular has had a rough month.

Wireless 277
article thumbnail

Fortinet warns about Critical flaw in Wireless LAN Manager FortiWLM

Security Affairs

Fortinet warned of a now-patched Wireless LAN Manager (FortiWLM) vulnerability, tracked as CVE-2023-34990 (CVSS score of 9.6), that could lead to admin access and sensitive information disclosure. Authenticated users’ session ID tokens in FortiWLM remain static per device boot.

Wireless 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Having Confidence in Your Wireless Security

Cisco Security

As each day passes, wireless security becomes even more critical to the day-to-day operations of organizations. With the introduction of Wi-Fi 6, many organizations are shifting from a primarily wired infrastructure to one that focuses on worker mobility through wireless connectivity. The Challenges of Wireless Security.

Wireless 144
article thumbnail

FCC Proposal Targets SIM Swapping, Port-Out Fraud

Krebs on Security

30 , the FCC said it plans to move quickly on requiring the mobile companies to adopt more secure methods of authenticating customers before redirecting their phone number to a new device or carrier. In a long-overdue notice issued Sept. ” The FCC said the proposal was in response to a flood of complaints to the agency and the U.S.

Wireless 338
article thumbnail

NSA issues advice for securing wireless devices

Malwarebytes

By releasing an information sheet that provides guidance on securing wireless devices while in public (pdf) —for National Security System, Department of Defense, and Defense Industrial Base teleworkers—the NSA has provided useful information on malicious techniques used by cyber actors, and ways to protect against them. Wi-Fi and encryption.

Wireless 145
article thumbnail

Bluetooth Vulnerability: BIAS

Schneier on Security

This is new research on a Bluetooth vulnerability (called BIAS) that allows someone to impersonate a trusted device: Abstract: Bluetooth (BR/EDR) is a pervasive technology for wireless communication used by billions of devices. Those procedures are used during pairing and secure connection establishment to prevent impersonation attacks.

article thumbnail

Recycle Your Phone, Sure, But Maybe Not Your Number

Krebs on Security

New research shows how fraudsters can abuse wireless provider websites to identify available, recycled mobile numbers that allow password resets at a range of email providers and financial services online. While you’re at it, consider removing your phone number as a primary or secondary authentication mechanism wherever possible.

Mobile 359