Remove Hacking Remove Surveillance Remove Wireless
article thumbnail

On Chinese "Spy Trains"

Schneier on Security

That's why there is so much worry about Chinese-made equipment for the new 5G wireless networks. The reason these threats are so real is that it's not difficult to hide surveillance or control infrastructure in computer components, and if they're not turned on, they're very difficult to find.

article thumbnail

A flaw in Verizon’s iOS Call Filter app exposed call records of millions

Security Affairs

The issue likely affected most Verizon Wireless users, as the service is often enabled by default. Call metadata can enable real-time surveillance if misused. Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini ( SecurityAffairs hacking,Verizon)

Wireless 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Planet WGS-804HPT Industrial Switch flaws could be chained to achieve remote code execution

Security Affairs

The Planet WGS-804HPT industrial switch is used in building and home automation networks to provide connectivity of Internet of things (IoT) devices, IP surveillance cameras, and wireless LAN network applications. Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini ( SecurityAffairs hacking,IOT)

article thumbnail

Russian spies are attempting to tap transatlantic undersea cables

Security Affairs

The Register reports that the secret structures of GCHQ are part of the surveillance programme codenamed “CIRCUIT” and also refers to an Overseas Processing Centre 1 (OPC-1), while another centre, OPC-2, has been planned, according to documents leaked by Snowden. SecurityAffairs – hacking, undersea cables). Pierluigi Paganini.

Wireless 145
article thumbnail

Attack of drones: airborne cybersecurity nightmare

Security Affairs

Naturally, threat actors follow the trend and exploit the technology for surveillance, payload delivery, kinetic operations, and even diversion. Let’s overview common tools or platforms built specifically to hack drones and see how some of these may assist cybersecurity applications in real world scenarios. Market overview.

article thumbnail

After SIMJacker, WIBattack hacking technique disclosed. Billions of users at risk

Security Affairs

Researchers are warning of a new variant of recently disclosed SimJacker attack, dubbed WIBattack , that could expose millions of mobile phones to remote hacking. WIBattack is a new variant of the recently discovered Simjacker attack method that could expose millions of mobile phones to remote hacking. Pierluigi Paganini.

Hacking 111
article thumbnail

Security Affairs newsletter Round 280

Security Affairs

Is the Belarusian government behind the surveillance Android app banned by Google? The Twitter account of Indian Prime Minister Modi was hacked Evilnum APT used Python-based RAT PyVil in recent attacks SunCrypt Ransomware behind North Carolina school district data breach U.S. SecurityAffairs – hacking, newsletter).

Wireless 114