Remove Firmware Remove Mobile Remove Wireless
article thumbnail

A Device to Turn Traffic Lights Green

Schneier on Security

As mentioned earlier, the Flipper Zero has a built-in sub-GHz radio that lets the device receive data (or transmit it, with the right firmware in approved regions) on the same wireless frequencies as keyfobs and other devices. Perhaps the most well-known branding for these types of devices is called Opticom.

article thumbnail

Tenable experts found 15 flaws in wireless presentation systems

Security Affairs

Experts at Tenable discovered 15 vulnerabilities in eight wireless presentation systems, including flaws that can be exploited to remotely hack devices. Wireless presentation systems are used to display content on a screen or through several devices, including mobile devices and laptops. Pierluigi Paganini. Pierluigi Paganini.

Wireless 106
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

EU to Force IoT, Wireless Device Makers to Improve Security

eSecurity Planet

The European Union is poised to place more demands on manufacturers to design greater security into their wireless and Internet of Things (IoT) devices. The goal of the amendment – called a “delegated act” – is to ensure that all wireless devices are safe before they are sold in the EU. percent over the same period in 2020, with 313.2

Wireless 109
article thumbnail

D-Link issues beta hotfix for multiple flaws in DIR-3040 routers

Security Affairs

Network equipment vendor D-Link has released a firmware hotfix to fix multiple vulnerabilities in the DIR-3040 AC3000-based wireless internet router. Network equipment vendor D-Link has released a firmware hotfix to address multiple vulnerabilities affecting the DIR-3040 AC3000-based wireless internet router.

Firmware 128
article thumbnail

Practical coexistence attacks on billions of WiFi chips allow data theft and traffic manipulation

Security Affairs

A group of researchers from the University of Darmstadt, University of Brescia, CNIT, and the Secure Mobile Networking Lab, have discovered security vulnerabilities in WiFi chips that can be exploited to extract passwords and manipulate traffic on a WiFi chip by targeting a device’s Bluetooth component. ” concludes the paper.

Wireless 114
article thumbnail

Counterfeit versions of popular mobile devices target WhatsApp and WhatsApp Business

Security Affairs

.” If the wpa_supplicant system app (which allows controlling wireless connections) was involved in the launch of the backdoor, Android.BackDoor.3104 It allows a remote or local client to connect and operate in the “mysh” console application, which must first be installed on the device or initially present in its firmware.

Mobile 98
article thumbnail

Experts show how to run malware on chips of a turned-off iPhone

Security Affairs

Researchers devised an attack technique to tamper the firmware and execute a malware onto a Bluetooth chip when an iPhone is “off.” ” Experts pointed out that when an iPhone is turned off, most wireless chips (Bluetooth, Near Field Communication (NFC), and Ultra-wideband (UWB)) continue to operate. .”

Malware 98