The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to automate the Evil Twin Attack. The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to assess wireless security by automating the Evil Twin Attack. “The tool was created to help the auditors and penetration testers […]
The Pen Test Partners researcher Ken Munro mapped and hacked connected iKettles across London demonstrating they leak WiFi passwords. The Pen Test Partners researcher Ken Munro has conducted a very singular experiment, he mapped and hacked connected kettles across London, demonstrating they leak WiFi passwords. Once again Internet of Things, this experiment demonstrates that poorly configured […]
A couple of married researchers demonstrated hot to disable high-tech sniper rifles and change their targets with unpredictable consequences. Hacking, hacking, always hacking … this time we will discuss remote hacking of High-tech Sniper Rifles. Hackers can compromise High-tech Sniper Rifles and causing problems pointing to the target. Hackers can gain access to the $13,000 […]
A team of experts hacked three UK politicians while they were using unsecured WiFi networks to demonstrate the risks they are daily exposed. Public Wi-Fi networks are dangerous places for our digital identity, we have explained several times the risks related to the connections to open WiFi hotspots. Security  experts have explained these risks to […]
A Greek security researcher has developed WiFiPhisher, a Wi-Fi social engineering tool that is designed to steal credentials from users of WPA networks. The Greek security expert George Chatzisofroniou has developed WiFiPhisher, a WiFi social engineering tool that allows an attacker to steal credentials from users of secure WiFi networks. WiFiPhisher is available for download on the software […]
Context Information Security firm has discovered a security vulnerability in LIFX smart LED light bulbs that can be remotely controlled by mobile devices. Researchers at Context Information Security have discovered a security flaw in a WiFi enabled, smart LED light LIFX bulb that can be remotely controlled via mobile devices. The discovery was the result of a […]
A team of researchers created in the lab the Chameleon WiFi virus, a malware that infects entire WiFi networks replicating contagion of a common cold within humans. A group of security researchers at the University of Liverpool in Britain have provided a proof of concept to demonstrate how to infect an entire WiFi network one shot. The team of researchers […]
Wi-Fi Protected Setup (WPS; originally Wi-Fi Simple Config) is a computing standard used to allow easy establishment of a secure wireless home network. It has been introduced by the Wi-Fi Alliance on January 8, 2007, with tha main purpose to allow home users to set up the encryption method WPA2, as well as making it […]