Nearest Neighbor: a remote attack on Wi-Fi networks
We discuss the recently discovered Nearest Neighbor attack method, which enables attackers to compromise a Wi-Fi network from the other side of the world.
92 articles
We discuss the recently discovered Nearest Neighbor attack method, which enables attackers to compromise a Wi-Fi network from the other side of the world.
A detailed guide to configuring privacy settings in the ASICS Runkeeper running app.
A detailed guide on setting up privacy in the adidas Running app.
A detailed guide to configuring privacy settings in the MapMyRun fitness tracker.
This guide will walk you through the essential privacy settings in the Nike Run Club training app.
Want to keep your runs, rides, and hikes private on Strava? This guide will walk you through the essential privacy settings in this popular fitness app.
Recent research describes a method for snooping on what Apple Vision Pro users enter on the virtual keyboard.
The U.S. National Institute of Standards and Technology (NIST) has issued the first post-quantum encryption standards — FIPS 203, FIPS 204, and FIPS 205.
Researchers have discovered several potential attack vectors targeting bicycles fitted with Shimano Di2 wireless gear-shifting system.
In the wake of Google and Facebook, Mozilla has introduced its own technology for replacing third-party cookies: let’s take a look at how privacy-preserving attribution works.
Fraudsters are using AI-generated digital clones to bypass Know Your Customer (KYC) procedures and open money laundering accounts.
Telegram bot sells subscriptions to phishing tools to hack Microsoft 365 accounts, including 2FA bypass.
The masterminds behind the colossal botnet encompassing 19 million IP addresses used free VPN services as bait to lure unsuspecting users.
A zero-day vulnerability actively exploited by attackers has been discovered in Internet Explorer — the browser that Microsoft supposedly laid to rest over a year ago.
The JavaScript CDN service Polyfill.io has started spreading malicious code. Remove the service’s script from your website.
Developers’ accounts are being hijacked using fake job offers sent from a legitimate GitHub address.
The updated EU Network and Information Security Directive (NIS 2) came into force in January 2023. Member states have until October 17, 2024, to transpose it into national law. What does this mean, and how to prepare for it?
A new phishing technique uses progressive web apps (PWAs) to mimic browser windows with convincing web addresses to steal passwords.
Our experts have discovered ransomware they’ve dubbed “ShrinkLocker”, which encrypts infected computers’ drives using BitLocker — a utility built into Windows.
We discuss key aspects of WhatsApp’s security and privacy, and how to configure this messenger to enhance protection.
Google has unveiled new privacy and security features coming to Android 15. We take a look at the innovations in the upcoming operating system update.